Professional Documents
Culture Documents
Journal of Innovative Technology and Exploring Engineering
Journal of Innovative Technology and Exploring Engineering
Journal of Innovative Technology and Exploring Engineering
xploring Eng
dE ine
an
er
y
e Technolog
ing
IjItEe
ativ
Inte
ov
EX
N
rn
O
P
OR TI ati
L
ING VA nn
INNO on
al Journal of I
www.ijitee.org
Exploring Innovation
Editor-In-Chief Chair
Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India.
Scientific Editors
Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran
Dr.Ch.V. Raghavendran
Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.
Manager Chair
Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India
Editorial Chair
Dr. Arun Murlidhar Ingle
Director, Padmashree Dr. Vithalrao Vikhe Patil Foundation’s Institute of Business Management and Rural Development, Ahmednagar
(Maharashtra) India.
Editorial Members
Dr. Wameedh Riyadh Abdul-Adheem
Academic Lecturer, Almamoon University College/Engineering of Electrical Power Techniques, Baghdad, Iraq
Dr. T. Sheela
Associate Professor, Department of Electronics and Communication Engineering, Vinayaka Mission’s Kirupananda Variyar
Engineering College, Periyaseeragapadi (Tamil Nadu), India
Dr. Shivanna S.
Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India
Dr. S. Murugan
Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi (Tamil Nadu), India
Dr. P. Malyadri
Professor, ICSSR Senior Fellow Centre for Economic and Social Studies (CESS) Begumpet, Hyderabad (Telangana), India
Dr. K. Prabha
Assistant Professor, Department of English, Kongu Arts and Science College, Coimbatore (Tamil Nadu), India
Dr. Balachander K
Assistant Professor, Department of Electrical and Electronics Engineering, Karpagam Academy of Higher Education, Pollachi
(Coimbatore), India
Dr. T. Velumani
Assistant Professor, Department of Computer Science, Kongu Arts and Science College, Erode (Tamilnadu), India
Dr. Subramanya.G.Bhagwath
Professor and Coordinator, Department of Computer Science & Engineering, Anjuman Institute of Technology & Management
Bhatkal (Karnataka), India
Dr. K. Kannan
Professor & Head, Department of IT, Adhiparasakthi College of Engineering, Kalavai, Vellore, (Tamilnadu), India
Volume-9 Issue-1, November 2019, ISSN: 2278-3075 (Online)
S. No Published By: Blue Eyes Intelligence Engineering & Sciences Publication Page No.
Paper Title: Cost-Effective Autonomous Garbage Collecting Robot System using Iot and Sensor Fusion
Abstract: Waste collection and management is a subject undergoing extensive study, and solutions are being
proposed meticulously. Thanks to an exponential rise in population, there is an increased production of waste,
and also a significant amount of litter consisting of plastic, paper, and other such products carelessly thrown
about and scattered in public. Thus, the need for a more robust waste management strategy is essential.
Presently, waste management techniques either lack efficiency, or incur high costs. Several Governmental as
well as Non-Governmental Organizations have made efforts to clean public spaces. Collection of the
unorganized and scattered garbage is the preliminary and most vital step of waste management, following proper
segregation and disposal. This paper proposes, explains, and implements an original concept of making a
modular, scalable and cost effective system for garbage collection. Making an efficient use of Internet of Things
to maintain a constant connection between a central server and a network of garbage processing and collecting,
independent, autonomous robots, we rely upon such a system to produce accurate results, as well as considerably
reduce the cost, hence providing a feasible solution to minimize human effort and costs during waste collection.
It provides a gateway towards implementing garbage collecting robots in smart cities. Rather than describing the
design of a single robot, we propose an entire system of robots interconnected in a network, to optimize time,
energy and overall speed. There is always a trade-off between accuracy, efficiency and cost of garbage
collection, especially when robots get into the picture. Our purpose is to find the perfect balance between these
factors.
Index Terms : autonomous, image processing, IoT, garbage collector, low-cost, sensor fusion.
References:
1. S. Watanasophon, and S. Ouitrakul, “Garbage Collection Robot on the Beach using Wireless Communications” In Proc. 3rd
International Conference on Informatics, Environment, Energy and Applications IPCBEE, vol.66 (2014).
2. J. Bai, S. Lian, Member, IEEE, Z. Liu, K. Wang, D. Liu, “Deep Learning Based Robot for Picking up Garbage on the Grass
Automatically” In Proc. IEEE Transaction on Consumer Electronics TCE.2018.2859629.
3. S. Kulkarni, S. Junghare, “Robot Based Indoor Autonomous Trash Detection
1. Algorithm using Ultrasonic Sensors”, presented at 2013 International Conference on Control, Automation, Robotics and Embedded
Systems(CARE).
4. T. Takeshita, T. Tomizawa, “A house Cleaning Robot System - path indication and Position estimation using ceiling camera” presented 1-8
at SICE-ICASE International Joint Conference2006 in Bexco, Busan, Korea.
5. S. Nolfi, “Evolving non-Trivial Behaviors on Real Robots: a garbage collecting robot” , Institute of Psychology, National Research
Council, Rome, Italy. Technical Report 96-04, March 1996.
6. S. Apoorva, Chaithanya, R. S. Prabhu, S.B. Shetty, D. D’Souza, “Autonomous Garbage Collector Robot”, presented at Internation al
Journal of Internet of Things 2017, 6(2): 40-42.
7. Technomentis, “Automated Garbage Collector”, instructables.com.[Online].Available: https://www.instructables.com/id/Automated-
Garbage-Collector/ . [Accessed April 10, 2019].
8. S. Khandare, S. Badak, Y. Sawant, S. Solkar, “Object Detection Based Garbage Collection Robot”, International Research Journal of
Engineering and Technology (IRJET), Volume 05, Issue 03. March 2018.
9. Y. Kim, J. Jefferson, Dr. A. Bovik, R. Chen, S. Chu, B. Nguyen, K. Tan, “Automated Garbage Collecting Robot”, EEE464 Senior
Design Project, Electrical and Computer Engineering Department, University of Texas at Austin, Spring 2017.
10. K. Kamal, S. Mukesh, S. S. Ganesh Kumar, M. Sudhakaran, “Design of Garbage Collection Robot using Wireless Technology”,
International Research Journal in Advanced Engineering and Technology, Vol 3, Issue 2(2017), pp. 1901-1911.
11. Rama Prabha D, S. Mahindru, A. Srivastava, P. Nilalohita, “Autonomous Garbage Collector-Robodumpster”, International Journal of
Civil Engineering and Technology(IJCIET), Volume 9, Issue 12(December 2018), pp. 545-552
12. S. Parashar, P. Tomar, “Waste Management by a robot- A Smart and Autonomous Technique”, IOSR Journal of Electronics and
Communication Engineering(IOSR-JECE), Volume 13, Issue 3, Ver. 2(May-June 2018), pp. 31-36
13. G. Ferri, A. Manzi, P. Salvini, B. Mazolai, C. Laschi, P. Dario, “DustCart, an autonomous robot for door-to-door garbage
collection:from DustBot project to the experimentation in the small town of Peccioli”, presented at the 2011 IEEE International
Conference on Robotics and Automation, May 2011, Shanghai, China .
14. G. Sivasankar, B. Durgalakshmi, K. Seyatha, “Autonomous Trash Collecting Robot”, International Journal of Engineering Research
and Technology(IJERT), Volume 6, Issue 04, April 2017.
15. K. Satish, “Autonomous Plastic Trash Disposal Drone- The Trash-Bot”,instructables.com,[Online].
Available:https://www.instructables.com/id/AUTONOMOUSPLASTICTRASH-DISPOSALDRONE-THE-TRASH-B/ [Accessed April
15, 2019].
16. A. Hamlet, Arroyo, Schwartz , “Robo-Dumpster: The Autonomous Garbage Truck”, EEL5666, Intelligent Machine Design Lab,
University of Florida
17. G S Kanna, S S Kumar, R Ragavan, M Balakrishnan, “Automatic Garbage Separation Robot Using Image Processing Technique”,
International Journal of Scientific and Research Publications, Vol 6,Issue 4(2016).
18. Gupta, R.K., Balamurugan, S., Aroul, K., Marimuthu, R, “IoT based door entry system,” Indian Journal of Science and Technolog y,
9(37), pp. 1-5
19. Singh, A.K., Balamurugan, S., Aroul, K., Marimuthu, R, “Design of universal module for personal security,” Indian Journal of Science
and Technology, 9(30),99031.
References:
1. Kate, Rohit J. "Using dynamic time warping distances as features for improved time series classification." Data Mining and Kn owledge
Discovery 30.2 (2016): 283-312.
2. Abanda, Amaia, Used Mori, and Jose A. Lozano. "A review on distance based time series classification." Data Mining and Knowle dge
Discovery 33.2 (2019): 378-412.
3. Dau, Hoang Anh, et al. "The UCR time series archive." arXiv preprint arXiv:1810.07758 (2018).
4. Krause EF. Taxicab geometry: An adventure in non-Euclidean geometry. Courier Corporation; 1986.
5. Berndt, Donald J., and James Clifford. "Using dynamic time warping to find patterns in time series." KDD workshop. Vol. 10. No. 16.
1994.
6. Ishan Yash. (2019, July 19). ishanyash/DTW-Example: Test release of my work (Version v1.0.0). Zenodo.
http://doi.org/10.5281/zenodo.3343058
7. Scholkopf B, Smola AJ. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press; 2001
Dec 1.
8. Hoang Anh Dau, Eamonn Keogh, Kaveh Kamgar, Chin-Chia Michael Yeh, Yan Zhu, Shaghayegh Gharghabi , Chotirat Ann
Ratanamahatana,Yanping Chen, Bing Hu, Nurjahan Begum, Anthony Bagnall , Abdullah Mueen and Gustavo Batista (2018). The
UCR Time Series Classification Archive. URL https://www.cs.ucr.edu/~eamonn/time_series_data_2018/
9. Chen, Tianqi, and Carlos Guestrin. "Xgboost: A scalable tree boosting system." Proceedings of the 22nd acm sigkdd international
conference on knowledge discovery and data mining. ACM, 2016.
10. Hastie, Trevor, Robert Tibshirani, and Jerome Friedman. "The elements of statistical learning: data mining, inference, and prediction,
Springer Series in Statistics." (2009): xxii-745.
11. Lin, J., Keogh, E., Patel, P., and Lonardi, S., Finding Motifs in Time Series, The 2nd Workshop on Temporal Data Mining, the 8th
ACM Int' l Conference on KDD (2002)
12. Patel P, Keogh E, Lin J, Lonardi S. Mining motifs in massive time series databases. In2002 IEEE International Conference on D ata
Mining, 2002. Proceedings. 2002 Dec 9 (pp. 370-377). IEEE.
13. Keogh, E., Lin, J. and Fu, A., 2005, November. Hot sax: Efficiently finding the most unusual time series subsequence. In Fifth IEEE
International Conference on Data Mining (ICDM'05) (pp. 8-pp). Ieee.
14. Keogh E, Chakrabarti K, Pazzani M, Mehrotra S. Dimensionality reduction for fast similarity search in large time series databases.
Knowledge and information Systems. 2001 Aug 1;3(3):263-86.
15. Schäfer, Patrick, and Ulf Leser. "Fast and accurate time series classification with weasel." Proceedings of the 2017 ACM on
Conference on Information and Knowledge Management. ACM, 2017.
References:
1. A. Oner, S.Akyuz. “An Experiment on Optimum Usage of GGBS For The Compressive Strength Of Concrete”Cement & Concrete
Composite 29,2006,510- 514
2. Venu Malagavelli. “High Performance Concrete With GGBS and Robo Sand” International Journal of Engineering Scienc e and
Technology Vol.2 {10},2010, 5107-5113.
3. A.H.L Swaroop, K. Venkateswararao, Prof P Kodandaramaro “Durability Studies on Concrete with Fly Ash and GGBS”
International Journal of Engineering Research and Application, Vol. 3, Issue 4, 2013, 285- 289.
4. Deval Soni, Suhasini Kulkarni, Vilin Parekh “Experimental On High Performance Concrete With Mixing Of Alccofine And Fly
Ash” Indian Journal Of Research, Vol. 3, Issue. 4, 2013, 84-86.
5. Yatin H Patel, P.J Patel, Prof Jingnesh M Patel, Dr. H S Patel “Experiment On Durability Of High Performance Concrete With
Alccofine & Fly Ash” IJAERS.
6. P.j.Patel & H S,Patel “Effect Of Compressive And Flexural Strength Of High Performance Concrete Incorporating Alccofine
And Fly Ash” IJCSEIERD, Vol. 3, Issue 2, 2013,109-114.
7. Praveen Nayak S, H. S. Narashimhan, Raghunandan V. Kadaba “Hardened Properties of Concrete Made With Micro Alccofine
and Silica - A Performance Optimization Based revision” International Journal Of Engineering Research And Development, Vol. 10,
Issue 8, 2014, 01-09. Dr. Sanjay Sharma, Saurabh Gupta, Er. Devinder Sharma “A rearch On Alccofine. A Supplementary
Cementitous Material” International Journal Of Modern Trends In Engineering And Research, 2015, 114-118.
8. IS: 10262- 2009 Concrete Mix Design Manual
9. IS: 516- 1959 Code for testing compressive strength of concrete
10. IS: 5816- 1970 Code for testing split tensile strength of concrete
11. IS: 383- 1970 Code for specification for coarse aggregate and fine aggregate 44.
12. IS: 456- 2000 plain and reinforced concrete code of practice manual
13. IS: 8112- 1989 Specification for ordinary Portland cement.
14. Concrete technology theory & practice by MS Shetty.
15. IS -383:1970 Code Book for Grading Of Aggregate.
16. IS-12269:1987 Code Book to Conforming 53 Grade Cement.
17. M.Adams Joe et.al Kumar Shantveerayya1 , Vikas Nikkam2 “An Experiment on the Properties of Glass Fibre Reinforced and
Ground Granulated Blast Furnace Slag Concrete”
18. "Advances in Structural Engineering", Springer Nature, 2015.
19. Ground granulated blast furnace slag chemical composition collected from Vijayanagar Bellary Karnataka.
20. FOSROC SP-430 test certification from forsroc chemicals Pvt. Ltd Bangalore.
References:
1. ACFE, “Report to the Nations 2018 Global Study on Occupational Fraud and Abuse,” 2019.
2. ACFE, “Survai Fraud di Indonesia,” Indones. Chapter#111, 2017.
3. R. Hamdani, Kumalahadi, and D. Urumsah, “The Classification of Corruption in Indonesia: A Behavioral Perspective,” SHS
Web Conf., 2017.W. Economic and F. Surveys, World Economic and Financial Surveys Global Financial Stability Report, no
April. 2014.
4. 4. B. L. Handoko, D. L. Warganegara, and S. Ariyanto, “Perception Of Financial Auditor On Usage Of Computer Assisted Audit
Techniques,” in 2018 3rd IEEE International Conference on Computational Intelligence and Application, 2018.
5. R. Kumari Tiwari and J. Debnath, “Forensic accounting: a blend of knowledge,” Journal of Financial Regulation and
28-32
Compliance. 2017.
6. E. I. Okoye, Fiia, and F. Fsm, “Forensic Accounting: A Tool for Fraud Detection and Prevention in the Public Sector. (A Study of
Selected Ministries in Kogi State),” Int. J. Acad. Res. Bus. Soc. Sci., 2013.
7. K. Salleh and R. A. Aziz, “Traits, Skills and Ethical Values of Public Sector Forensic Accountants: An Empirical Investigation,”
Procedia - Soc. Behav. Sci., 2014.
8. C. Albrecht, D. Holland, R. Malagueño, S. Dolan, and S. Tzafrir, “The Role of Power in Financial Statement Fraud Schemes,” J.
Bus. Ethics, vol. 131, no. 4, pp. 803–813, 2015.
9. N. A. Aris, S. Maznah, M. Arif, R. Othman, and M. M. Zain, “Fraudulent Financial Statement Detection Using Statistical
Techniques: The Case Of Small Medium Automotive Enterprise,” vol. 31, no. 4, pp. 1469–1478, 2015.
10. M. Vadoodparast, A. R. Hamdan, and Hafiz, “Fraudulent Electronic transaction detection using KDA Model,” IJCSIS) Int. J.
Comput. Sci. Inf. Secur., vol. 13, no. 2, 2015.
11. R. Elkamhi, J. Ericsson, and C. A. Parsons, “The cost and timing of financial distress,” J. financ. econ., 2012.
12. E. I. Altman, E. K. Laitinen, and A. Suvas, “Financial Distress Prediction in an Interna- tional Context : A Review and Empirical
Analysis of Altman ’ s Z- Score Model,” 2017.
13. Tarjo and N. Herawati, “Application of Beneish M-Score Models and Data Mining to Detect Financial Fraud,” Procedia - Soc.
Behav. Sci., 2015.
14. S. L. Indarto and I. Ghozali, “Fraud Diamond: Detection Analysis on the Fraudulent Financial Reporting,” Risk Gov. Control
Financ. Mark. Institutions, vol. 6, no. 4, pp. 116–123, 2016.
15. B. L. Handoko, “THE EFFECT OF INSTITUTIONAL OWNERSHIP AND LEVERAGE TOWARDS PROFIT MANAGEMENT
IN CONSUMER GOODS INDUSTRY LISTED IN BEI Teori Keagenan ( Agency Theory ) Manajemen Laba,” Binus Bus. Rev.,
vol. 6, no. 3, pp. 414–423, 2015.
16. R. C. Rosli, L. M. Ling, and R. Embi, “Tax malfeasance of high net-worth individuals in Malaysia: Tax audited cases,” in Journal
of Financial Crime, 2018.
17. D. Bogdanov, M. Jõemets, S. Siim, and M. Vaht, “How the Estonian tax and customs board evaluated a tax fraud detection system
based on secure multi-party computation,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), 2015.
18. M. D. Beneish, “The Detection of Earnings Manipulation,” Financ. Anal. J., vol. 55, no. 5, pp. 24–36, 1999.
19. H. Sulistiyo and I. Ghozali, “The role of religious control in dysfunctional audit behavior: An empirical study of auditors of public
accounting firm in Indonesia,” J. Appl. Bus. Res., 2017.
20. U. Sekaran and R. Bougie, “Research Methods For Business. A Skill Builing Approch. 7th Edition,” Book, 2016.
21. I. Ghozali and L. Sulistyani, “Firm capabilities role as mediator of relationship between levers of control and firm performance
(empirical study on financial institutions in Indonesia),” Inf., 2016.
22. S. B. Jackson, T. M. Keune, and L. Salzsieder, “Debt, equity, and capital investment,” J. Account. Econ., 2013.
23. D. T. H. Manurung and A. L. Hardika, “Analysis of Factors that Influence Financial Statement Fraud in the Perspective Fraud
Diamond: Empirical study on Banking Companies Listed on The Indonesia Stock Exchange year 2012 to 2014,” Int. Conf.
Account. Stud., no. August, 2015.
24. N. M. Zaki, “The Appropriateness of Fraud Triangle and Diamond Models in Assessing the Likelihood of Fraudulent Financial
Statements - An Empirical Study on Firms Listed in the Egyptian Stock Exchange.,” Int. J. Soc. Sci. Econ. Res., vol. 02, no. 02, pp.
2403–2433, 2017.
Paper Title: Mechanical Properties of Pavement Quality Concrete using Recycled Aggregate
Abstract: The mechanical properties of pavement quality concrete using recycled concrete aggregate (RCA)
obtained from the concrete debris as coarse aggregate (CA) are experimentally determined and presented in this
paper. M40 grade concrete was tested with conventional granite CA before adding RCA and then CA was
replaced by RCA at the rate of 10, 20, 30, 40 and 50%. The concrete was tested in fresh state by slump and
compaction factor (CF) value to evaluate variations in workability. The compressive strength and flexural
strength of concrete were conducted to ascertain performance in hardened state. The water absorption test was
conducted as a part of durability test. The gradual reduction of slump value was noticed after adding RCA as
aggregate in concrete. The slump value had been maintained by substituting the superplastizer without varying
the w/c ratio. The strength properties were calculated after 3, 7 and 28 days curing. No significant reduction of
strength was observed up to the 30% replacement of RCA and the strength was reduced by adding more than
30% of RCA. From the results obtained in this investigation, it was concluded that the RCA could be used up to
40% as CA for pavement quality concrete.
Key words: Recycled aggregate, Pavement quality concrete, Mechanical properties, Water absorption
References:
1. K. Naveenkumar, M. Rohith, S.R. Sagar, and Hemalatha S Bandre, “Properties of Pavement Quality Concrete for Partial Replacement
of Natural Coarse Aggregates with Coconut Shell Aggregates”, International Journal of Applied Engineering Research, Vol.13, No. 7,
2018, pp. 146 -149.
2. B.J. Panditharadhya, T. Sowmyashree, C.S. Manjunath, and C.S. Siddu Karthik,“Properties of Pavement Quality Concrete with
Partial Replacement of Fine Aggregates by Iron Ore Tailings”, International Journal of Innovative Research in Science, Engine ering
and Technology, Vol.5, 2016, pp.7392 - 7409
3. M. Sivaraja, and K. Poongodi,“Lightweight self-compacting concrete at high temperatures”, GRAĐEVINAR, Vol.67, No.4, 2015,
pp.329 - 338
4. M. Veerapathran, and P. Murthi, “High performance concrete with steel slag aggregate”, GRAĐEVINAR, Vol.66 Issue: 7, 2014,
pp.605-612.
5. 5. Alan Sekaran, Murthi Palaniswamy & Sivagnanaprakash Balaraju, “A study on suitability of EAF oxidizing slag in concrete; An
eco-friendly and sustainable replacement for Natural coarse aggregate”, The scientific world Journal, Vol.1, 2015, pp.1-8
6. P.Murthi, S.Alan, C.Chkkaravarthi & N.Raguraman,“Sustainable replacement of steel slag as coarse aggregate in concrete” 33-38
International Journal of Applied Engineering Research, Vol.10, no.53, 2015, pp.341 - 345.
7. P.Gunasekaran, S. Kumar, and M. Lakshmipathy. “Mechanical and Bond properties of Coconut shell concrete”, Construction and
Building Materials, Vol. 25, No.1, 2011, pp. 92-98.
8. V.SenthilKumar, P.Jayabharath, G.Kesavan, V. Karthikeyan, “Experimental Study on Replacing Aggregates in Concrete”,
International Research Journal of Engineering and Technology, Vol.5, No.5, 2018, pp. 1057 - 1073.
9. Ashraf M. Wagih, Hossam Z. El-Karmoty, Magda Ebid, Samir H. Okba, “Recycled construction and demolition concrete waste as
aggregate for structural concrete”, HBRC Journal, Vol.9, 2013, pp.193 - 200.
10. Binod Kumar, “Properties of pavement quality concrete and dry lean concrete with copper slag as fine aggregate”, International
Journal of Pavement Engineering, Vol. 14, No.8, 2013, pp.746 -752.
11. H.C. Puneeth, S.P. Mahendra, B. Sachin, and V, Subbaiah, “Replacement of Recycled Construction and Demolition Waste Coarse
Aggregates in Pavement Quality Concrete”, International Journal of Applied Engineering Research, Vol.13, No.7, 2018, pp.139-145.
12. Shodolapo Oluyemi Franklin, Mmasetlhomo Tommy Gumede, “Studies on Strength and Related Properties of Concrete Incorporating
Aggregates from Demolished Wastes: Part 1-A Global Perspective”, Open Journal of Civil Engineering, 2014, Vol.4, pp.311-317.
13. M.Etxeberria E.Vázquez A.Marí M.Barra, “Influence of amount of recycled coarse aggregates and production process on
properties of recycled aggregate concrete”, Cement and Concrete Research, Vol.37, No. 5, 2007, pp. 735-742
14. Jianzhuang Xiaoa,, Jiabin Lia, Ch. Zhangb, “Mechanical properties of recycled aggregate concrete under uniaxial loading”, Cement
and Concrete Research, Vol. 35, 2005, pp. 1187 - 1194
15. P.J. Nixon, “Recycled concrete as an aggregate for concrete - a review”, Materials and Structures, Vol.11, No.65, 1978, pp. 371 - 378.
16. T.C. Hansen, “Recycled aggregate and recycled aggregate concrete, second state-of-the-art report, developments from 1945-1985”,
Materials and Structures, Vol.19, No.111, 1986, pp. 201 - 246
17. Caijun Shi, Yake Li, Jiake Zhang, Wengui Li, Linlin Chong, Zhaobin Xie , “Performance enhancement of recycled concrete aggregate
- A review”, Journal of Cleaner Production, Vol. 112, 2016, pp.466-472
18. Sallehan Ismail, Mahyuddin Ramli, “Engineering properties of treated recycled concrete aggregate (RCA) for structural
applications”, Construction and Building Materials, Vol. 44, 2013, pp. 464 - 476.
19. IS:2386 (Part 3) - 1963, Methods of test for aggregates for concrete (specific gravity, density, voids, absorption and bulking)
20. IS:2386 (Part 4) - 1963, Methods of test for aggregates for concrete
21. IS: 269-2015 Ordinary Portland cement - specification (Sixth revision)
22. IRC: 15-2011 Standard Specification and code of practice for construction of Concrete Roads (Fourth Revision)
23. IS: 1199-1959 Method of Sampling and Analysis of Concrete (Eleventh edition 2004)
24. IS: 516–1959 Method of tests for strength of concrete (Eighteenth edition 2006)
25. ASTM C1585 - 13 Standard Test Method for Measurement of Rate of Absorption of Water by Hydraulic-Cement Concretes
26. G.S. Yadav, N. Prabhanjan, G. Sahithi, G. Sangeetha, A.Srinivas, and A.S. Krishna, “Strength Investigation of Fly Ash Based
Concrete Waste Steel Fibre and Polypropylene Fibre as Reinforcing Materials”. International Conference on Emerging Trends in
Engineering (ICETE) 2019, pp. 155-161. Springer, Cham.
27. IS: 456-2000 Plain and Reinforced Concrete - Code of Practice
28. N.K.Amudhavalli, and P.Murthi, “Relationship between Compressive Strength and Flexural Strength of Rice Husk Ash and Silica
fume Based Polypropylene Fibre Reinforced Blended Concrete”, Australian Journal of Basic and Applied Sciences Vol.8, No.15,
2014, pp.113-119.
29. Mohamed. Alsheltat, “Modeling Suggestion on Relationship between Compressive Strength and Tensile Strength of High Strength
Concrete”, International Research Journal of Engineering and Technology, Vol.5, No.5, 2018, pp.2332 – 2338.
30. Chamroeun Chhorn, Seong Jae Hong, Seung Woo Lee, Relationship between compressive and tensile strengths of roller-compacted
concrete, Journal of Traffic and Transportation Engineering, Vol.5, No.3, 2018, pp.215-223.
Paper Title: Development of DTMF Centred Remotely Located Fire Extinguishing Robot
Abstract: The hazardous situation such as conflagration makes the humans’ life most inconvenient and risky. It
is an unavoidable situation and it is very difficult for humans to face such situations. But mechanical devices can
handle such situations without Human intervention. Sometimes it is also difficult to reach fire place at remote
location. A robot can easily handle such situations and can efficiently work in hazardous units. The robot can
easily reach the places where man cannot reach. In the present paper a fire extinguisher robot is developed to
detect fire and the robot smidgens water on flames. The robot is operated and controlled with mobile phone.
Dual Tone Multi Frequency tones are produced to control the movement of the robot. In the present work an
Arduino UNO microcontroller is interfaced with fire sensors and generates sequence of steps to control robot
movements, direction, and pumping of water. The robot movement and other operations are controlled from
remote location.
References:
1. J. Tao and X. Wei, “Effect of ground granulated blast-furnace slag on the hydration and properties of cement paste,” Advances in
Cement Research, 31(6), 251–260, 2019.
2. V.M. Sounthararajan, “Effect of Accelerated Curing on the Furnace Slag Based Polypropylene Fibre Reinforced Concrete,”
Advanced Material Research 2018. vol. 1150, pp. 91-102, 2018
3. V.M. Sounthararajan “Empirical prediction models for strength gain properties of fly ash based concrete subjected to accelerated
curing,” Advanced Material Research 2018. vol. 1150, pp. 73-90, 2018
4. Tarannum, Rameshwari, Shruti, Kalappa. M. Sutar, “Experimental Studies on Pozzolanic Acton of GGBS and Strength
Properties of GGBS Concrete,” International journal for Innovative Research in Science & Technology, 1(12), 69-74, 2015.
5. M.Prathap Kumar, Vaddi Srinivas and M,Zoheb Nawaz, “ Experimental Investigation on High Strength Concrete using GGBS,
Fly ash & SP-430 Super Plasticizer,” International of Civil Engineering and Technology, 8(9), 2017.
6. Sivakumar and VM. Sounthararajan, “Strength Properties of Processed Fly Ash Concrete,” Journal of Engineering and
Technological Sciences, vol. 47, no. 3, pp. 320-334, 2015.
7. K. V. Schuldyakov, L. Y. Kramar, and B. Y. Trofimov, “The properties of slag cement and its influence on the structure of the
hardened cement paste,” Procedia Engineering, 150, 1433–1439, 2016.
8. V.S. Tamilarasan, P. Perumal, J. Mahaswari, “Workability Studies on Concrete with GGBS As A replacement for cement With
and Without Superplasticiser,” International Journal of Advanced research in Engineering and Technology, 3(2), 13-17, 2012.
9. Nwofor, T.C. and Sule, S., Investigating geometric characteristics of cement concrete materials. International Journal of
Innovative Research in Advance Engineering, 1(9), 74-82, 2012.
10. Gurpreet S. and Rafat S., Effect of waste foundry sand (WFS) as partial replacement of sand on strength. Journal of Construction
and Building Material 26, 416-422, 2012.
11. Nwofor, T.C., Sule, S. and Eme, D.B. “A comparative study of the methods of concrete mix design using crushed and uncrushed
coarse aggregates,” International Journal of Scientific and Engineering Research, 6(8), 1182-1194, 2015.
12. K Ganesh Babu and V. Sree Rama Kumar, "Efficiency of GGBS in Concrete”, Cement and Concrete Research, 30, 1031 -1036,
2000.
13. M. Collepardi, "Admixtures used to enhance placing characteristics of concrete", Cement and Concrete Composite, 20,103-112,
1998.
Authors: Peruri Venkata Anusha, Ch.Anuradha, Patnala S.R. Chandra Murty, Ch. Surya Kiran
Paper Title: Detecting Outliers in High Dimensional Data Sets Using Z-Score Methodology
Abstract: Outlier detection is an interesting research area in machine learning. With the recently emergent tools
and varied applications, the attention of outlier recognition is growing significantly. Recently, a significant
number of outlier detection approaches have been observed and effectively applied in a wide range of fields,
comprising medical health, credit card fraud and intrusion detection. They can be utilized for conservative data
analysis. However, Outlier recognition aims to discover sequence in data that do not conform to estimated
performance. In this paper, we presented a statistical approach called Z-score method for outlier recognition in
high-dimensional data. Z-scores is a novel method for deciding distant data based on data positions on charts.
The projected method is computationally fast and robust to outliers’ recognition. A comparative Analysis with
extant methods is implemented with high dimensional datasets. Exploratory outcomes determines an enhanced
accomplishment, efficiency and effectiveness of our projected methods.
References:
1. K. Shim, R. Rastogi and S. Ramaswamy "Efficient Algorithms for Mining Outliers from Large Data Sets", ACM SIGMOD
Conference Proceedings, 2000.
8. 2. P. Yu. And C. C. Aggarwal "Finding Generalized Projected Clusters in High Dimensional Spaces", ACM SIGMOD Conference
Proceedings, 2000.
3. D. A. Keim, C. C. Aggarwal, and A. Hinneburg "What is the nearest neighbor in high dimensional spaces?” , VLDB Conference
48-53
Proceedings, 2000.
4. A.Swami, T. Imielinski and R. Agrawal "Mining Association Rules between Sets of Items in Large Databases". ACM SIGMOD
Conference Proceedings, 1993.
5. P. Raghavan., R. Agrawal, and A. Arning "A Linear Method for Deviation Detection in Large Databases", KDD Conference
Proceedings, 1995.
6. T. Lewis. and V. Barnett "Outliers in Statistical Data", John Wiley and Sons, NY 1994.
7. U. Shaft., R. Ramakrishnan, J. Goldstein, and K. Beyer "When is Nearest Neighbors Meaningful?” , ICDT Conference
Proceedings, 1999.
8. J. Sander., R. T. Ng, H.-P. Kriegel, and M. M. Breunig "LOF: Identifying Density-Based Local Outliers", ACM SIGMOD
Conference Proceedings, 2000.
9. P. Yu. and C. C. Aggarwal “Fast Algorithms for Projected Clustering", ACM SIGMOD Conference Proceedings, 1999.
10. S. Mehrotra and K. Chakrabarti "Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces",
VLDB Conference Proceedings, 2000.
11. X. Xu., J. Sander, H.-P. Kriegel and M. Ester "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases
with Noise", KDD Conference Proceedings, 1996.
12. R. P. Tai., J. B. Orlin and C. C. Aggarwal "Optimized Crossover for the Independent Set Problem", Operations Research 45(2),
March 1997.
13. R. Ng. E and Knorr "Algorithms for Mining Distance-based Outliers in Large Data Sets", VLDB Conference Proceedings,
September 1998.
14. P. Raghavan., D. Gunopulos, J. Gehrke and R. Agrawal “Automatic Subspace Clustering of High Dimensional Data for Data
Mining Applications", ACM SIGMOD Conference Proceedings, 1998.
9. Keywords: Fuzzy number, Hexagonal Fuzzy Numbers, Arithmetic operations on Hexagonal fuzzy numbers,
Hexagonal Fuzzy assignment problems, Hexagonal Fuzzy optimal solution, Diagonal Optimal method.
54-57
References:
1. Amitkumar and Anilgupta, Assignment and travelling salesman problems with coefficients as LR fuzzy parameters, International
journal of applied science and engineering, 10(3) (2012) 155-170.
2. A. Arockiaswamy and S. Nithya, Solving Fuzzy Assignment For Hexagonal Fuzzy number using ones assignment method and
robust’s ranking technique, International Journal of mathematics and its application, 4(4) (2016) 397-405.
3. K. Arumugam, R. Abdul Saleem and S.Arunvasan, Solving fuzzy assignment problem using symmetric Hexagonal fuzzy number,
International Journal of mathematics and its application, 6(1) (2018) 741-746.
4. M.L.Balinski and R.E.Gomory, A primal method for the assignment and transportation problems, Management science, 10 (1964)
578-593.
5. S.Chanas and D.Kuchta, A concept of the optimal solution of the transportation problem with fuzzy cost, Fuzzy sets and syste ms,
82 (3) (1996) 299-305.
6. M.S.Chen, On a fuzzy assignment problem, Tamkang journal of mathematics, 22 (1985) 407-411.
7. C.F. Chien, J.H.Chen and C.C. Wei, Constructing a comprehensive modular fuzzy ranking framework and illlustration, Journal of
quality, 18(4) (2011) 333-349.
8. S. Dhanasekar and S.Hariharan, Haar Hungarian algorithm to solve fuzzy assignment problem, International journal of pure and
applied mathematics, 113(7) (2017) 58-66.
9. D.Dubios and P. Fortemps, Computing improved optimal solutions to max -min flexible constraint satisfaction problems, European
journal of Operations research, 143 (1999) 305-315.
10. L.S.Huang and G.H.Xu, Solution of Assignment problem of restriction of qualification, Operation research and Management
Science, 14 (2005) 28-31.
11. G.J. Klir. G.J and B.Yuan, Fuzzy sets and logic: Theory and application Prentice Hall, 1995.
12. M.Khalid, Mariam Sultana and Faheem Zaidi, A new diagonal optimal approach for assignment problem, Applied mathematical
sciences, 8(160) (2014) 7979-7986.
13. C.J.Lin and U.P.Wen, A Labeling algorithm for the fuzzy assignment problem, Fuzzy sets and systems, 142(3) (2004) 373-379.
14. S.Mukherjee and K. Basu, Application fuzzy ranking method for solving assignment problems with fuzzy costs, International
journal of computational and applied mathematics, 5 (2010) 359-368.
15. C.S.Ramakrishnan, An improvement to Goyal's modified VAM for the unbalanced transportation problem, Journal of operational
research society, 39(6) (1988) 609- 610.
16. H.H.Shore, The transportation problem and the Vogel approximation method, Decision sciences, 1(3 -4) (1970) 441–457.
17. X. Wang, Fuzzy optimal assignment problems, Fuzzy math, 3 (1987) 101-108.
18. X.Wang and E.E.Kerre., Reasonable properties for the ordering of fuzzy quantities-I, Fuzzy sets and systems, 118(3) (2001) 375-
385.
19. X.Wang and E.E.Kerre, Reasonable properties for the ordering of fuzzy quantities-II, Fuzzy sets and systems, 118(3) (2001) 387-
405.
20. R.R.Yager, Procedure for ordering fuzzy subsets of the unit interval, Information sciences, 24(2) (1981) 143 -161.
21. Y.Yuan, Criteria for evaluating fuzzy ranking methods, Fuzzy sets and systems, 43(2) (1991) 139-157.
22. L.A.Zadeh, Fuzzy sets: Information and control, 8(3) (1965) 338-353.
References:
1. Anil Kumar, A., Sai Krishna, K. & K., Sai Reddy, R.B.G. (2017). Mini CNC 2d Sketcher for Accurate Building
Drawing.International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 6, June 2017, pp. 543–549, Article
ID: IJCIET_08_06_060
2. Anil Kumar, A., Sai Krishna, K., Sai Reddy, R.B.G. and Shakti Prasad, V. CNC Machine for Drawing, B.Tech. Project Report,
MLR Institute of Technology, 2017.pp. 801–808.
3. Benhabib, Beno. (2003). Manufacturing: Design, Production, Automation, and Integration. New York: Marcel Dekker.
4. Kajal J. Madekar1, Kranti R. Nanaware2, Pooja R. Phadtare3, Vikas S. Mane4. (2016). Automatic mini CNC machine for PCB
drawing and drilling. International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 02.
5. Kornel F. Ehmann, Rechard E. DeVor, Shiv G. Kapoor. (2002). Micromesh-scale Mechanical Manufacturing Opportunities and
Challenges. JSME/ASME International Conference on Materials and Processing.
6. Markku. S. (2015). Planning of an electric system for a small CNC machine. Seinäjoki University of Applied Sciences.
7. Pabla. B. S., Adithan. M. (1994). CNC Machines. New Delhi, India. New Age International (P) Limited.
Authors: Johan Ihsan bin Mahmood, Muhammad Farhan Daud, Pranesh Krishnan
Paper Title: Design and Fabrication of Flood Barrier for Domestic Usage at the Doorframe
Abstract: There are many types of flood barrier, but commonly used are sandbags as it is the easiest to get as
well fixed type of flood barrier. The problem with sandbags and fixed type flood barrier is sandbagged will get
messy, and a hassle after the flood water has been receding while fixed type flood barrier only can be used on
11. one side of doorframe. Therefore, this project tries to create a new design that will solve both problems by using
Solidworks software. Result of this project showed what the effect on the structure design when the maximum
force was applied. Some of parts in the invented flood barrier are working as intended. 63-67
References:
1. D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004.
2. C. Perkins, D. Johnson and J. Arkko, "Mobility Support in IPv6", RFC 6275, July 2011.
3. Koodli, Rajeev. "Fast handovers for Mobile IPv6", RFC-4068, 2005.
4. C. Perkin, “IP Mobility Support for IPv4”, RFC-3220, August 2002.
5. Arun Kr. Tripathi, and Shweta Singh: “Ensuring Reliability in Cloud Computing and Comparison on IPv6 encouraged with protocols”,
International Conference on Science, Technology, Humanities and Business Management (ICSTHBM-16), 2016, pp. 9-14.
6. Seid, Howard A., and Albert Lespagnol. "Virtual private network." U.S. Patent No. 5, 16 Jun. 1998.
7. Chaehwan Kim, Hyunwoo Hwang, Jung-Woo Baik and Kyung-GeunLee, "Multicast based Proxy Mobile IPv6 for inter-domain
handover", Mathematical and Computer Modelling, Vol. 57, Issues 11–12, June 2013, pp. 2863-2872.
8. Luigi Atzori, Antonio Iera, Giacomo Morabito, "The Internet of Things: A survey", Computer Networks: The International Journa l of
Computer and Telecommunications Networking, Vol. 54 Issue 15, October 2010, pp. 2787-2805.
9. S. Kong, W. Lee, Y. H. Han, M. K. Shin and H. You, “Mobility management for all-IP mobile networks: Mobile IPv6 vs. Proxy
Mobile IPv6, IEEE Wireless Communications Vol. 15, Issue 2, pp. 36–45, April 2008.
10. Arun Kumar Tripathi, J. S. Lather and R. Radhakrishnan, “Secure and Optimized Authentication Scheme in Proxy Mobile IPv6
(SOAS-PMIPv6) to reduce Handover Latency”, I. J. Computer Network and Information Security, Vol. 9, Issue 10, pp. 1-12, October
2017.
12. 11. Montavont, Nicolas, and Thomas Noel. "Handover management for mobile nodes in IPv6 networks", IEEE Communications magazine
Vol. 40, Issue. 8, August 2002, pp. 38-43.
12. McNair, Janise, and Fang Zhu. "Vertical handoffs in fourth-generation multinetwork environments." IEEE Wireless communications 68-72
Vol. 11, Issue. 3, June 2004, pp: 8-15.
13. Allan Borges Pontes, Diego dos Passos Silva, Jose Jailton, Otavio Rodrigues and Kelvin Lopes Dias, "Handover management in
integrated WLAN and mobile WiMAX networks" IEEE Wireless Communications, Vol. 15, Issue. 5, 2008, pp. 86-95.
14. Ruidong Li, Jie Li, Kui Wu, Yang Xiao, and Jiang Xie, “An enhanced fast handover with low latency for Mobile IPv6, IEEE
Transactions on Wireless Communications, Vol. 7, no. 1, pp. 334-342, January 2008.
15. N. Montavont and T. Noel, "Handover management for mobile nodes in IPv6 networks”, IEEE Communications Magazine, Vol. 40,
Issue 8, pp. 38-44, August 2002.
16. Fei Shi, Keqiu Li, Yanming Shen, "Seamless handoff scheme in Wi-Fi and WiMAX heterogeneous networks", Future Generation
Computer Systems, Vol. 26, Issue 8, pp. 1403-1408, October 2010.
17. Ing-Chau Chang, Yi-Ting Mai, "The end-to-end QoS guarantee framework for interworking WiMAX PMP and mesh networks with
Internet" Computers & Electrical Engineering, Vol. 39, Issue 6, pp. 1905-1934, August 2013.
18. Y. Ahmet Şekercioğlu, Milosh Ivanovich, Alper Yeğin, "A survey of MAC based QoS implementations for WiMAX networks",
Computer Networks, vol. 53, Issue 14, pp. 2517-2536, September 2009.
19. P. Taaghol et al, "Seamless Integration of Mobile WiMAX in 3GPP networks", IEEE Commun. Mag., Vol. 46, pp 74–85, 2008.
20. Andrews, Jeffrey G., Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX: Understanding Broadband Wireless
Networking, Pearson Education, 2007.
21. A. Ghosh, D.R. Wolter, J.G. Andrews, R. Chen, "Broadband wireless access with WiMax/802.16: current performance benchmarks
and future potential", IEEE communications magazine, Vol. 43. Issue. 2, 2005, pp. 129-136.
22. Silva, Ricardo, Jorge Sa Silva, and Fernando Boavida. "A proposal for proxy-based mobility in WSNs", Computer Communications,
Vol. 35, Issue 10, June 2012 pp. 1200-1216.
23. Jianfeng Guan, Huachun Zhou, Zhiwei Yan, Yajuan Qin and Hongke Zhang, "Implementation and analysis of proxy MIPv6." Wireless
Communications and Mobile Computing Vol. 11, Issue 4, 2011, pp. 477-490.
24. Shweta Singh and Arun Kumar Tripathi, “Analyzing for Performance Factors in Cloud Computing”, International Conference on
Sustainable Computing Techniques in Engineering, Science and Management, International Journal of Control Theory and
Applications (IJCTA), Vol. 9, Issue 21, Sept 2016, pp. 87-96.
25. Shweta Singh and Arun Kr. Tripathi: “Analysis of Delay and Load Factors in Wired and Wireless Environment”, Second International
Conference on Recent Trends in Science, Technology, Management & Social Development (RTSTMSD-15), International Journal of
Science, technology and Management (IJSTM), 2015, pp. 1-8.
26. Olusegun O. Omitola, Segun O. Olatinwo, and O. Shoewu: “Evaluation and Investigation of Throughput and Delay on Ethernet and
FDDI Technologies using OPNET”, The Pacific Journal of Science and Technology, Vol. 15. No 1, 2014, pp. 125-128.
27. Shweta Singh and Arun Kr Tripathi: “A Comparative Study of Internet Protocols in MANET”, International Conference on “Advance s
in Computer Sciences” (ICACDS-16) in Book Series on Communications in Computer and Information Science, Springer Singapore,
Vol. 721, 2017, pp. 221-231
28. Arun Kumar Tripathi, Akash Rajak, Ajay Kumar Shrivastava, “Role of 5G Networks: Issues, Challenges and Applications”,
International Journal of Engineering and Advanced Technology, Vol. 8, Issue 6, August 2019, pp. 3172-3178.
29. Javier Carmona-Murillo José-Luis González-Sánchez David Cortés-Polo Francisco-Javier and Rodríguez-Pérez, "QoS in Next
Generation Mobile Networks: An Analytical Study", Resource Management in Mobile Computing Environments, Vol. 3, pp. 25-41,
2014.
30. H. Petander, E. Perera, K. C. Lan, and A. Seneviratne, “Measuring and improving the performance of network mobility managemen t in
IPv6 networks,” IEEE Journal on selected areas in communications, Vol. 24, No. 9, September 2006, pp. 1671–1681.
Keywords : Environmental monitor, Detection management software, QGIS mapping, pollution contaminants.
References:
1. Vandanapu, Swamy, and K. Muthumani. "Heat of Hydration and Alkali-Silicate Reaction in Oil Palm Shell Structural
Lightweight Concrete." Silicon (2019): 1-7.
2. M. Senthil Kumar et.al, Experimental investigations on mechanical and microstructural properties of Al 2 O3 /SiC
reinforced hybrid metal matrix composite, IOP Conference Series: Materials Science and Engineering, Volume
402, Number 1, PP 012123.(https://doi.org/10.1088/1757899X/402/1/012123)
3. L.Natrayan et al. Optimization of squeeze cast process parameters on mechanical properties of Al 2 O3 /SiC reinforced
hybrid metal matrix composites using taguchi technique. Mater. Res. Express; 5: 066516. (DOI: 10.1088/2053 -
1591/aac873,2018)
13. 4. Krishnamurthy, Muthumani, and Swamy Nadh Vandanapu. "Micro-structural and interfacial transition zone investigation on
oil palm shell lightweight concrete." International Journal of Microstructure and Materials Properties 14.5 (2019): 448-461.
5. S.Yogeshwaran, R.Prabhu, Natrayan.L, Mechanical Properties of Leaf Ashes Reinforced Aluminum Alloy Metal Matrix 73-80
Composites, International Journal of Applied Engineering Research ISSN 0973 -4562 Volume 10, Number 13, 2015.
6. L. Natrayan, V. Sivaprakash, M.S.Santhosh, Mechanical, Microstructure and wear behavior of the material AA6061
reinforced SiC with different leaf ashes using advanced stir casting method. International Journal of Engineering and
Advanced Technology. Volume-8, Issue-2S, December 2018, 366-371.
7. Swamynadh, V., and K. Muthumani. "Properties of structural lightweight concrete containing treated oil palm shell as coarse
aggregate." Asian Journal of Civil Engineering 19.6 (2018): 673-678.
8. Kumar, M. S., Mangalaraja, R. V., Kumar, R. S., and Natrayan, L. (2019). Processing and Characterization of
AA2024/Al2O3/SiC Reinforces Hybrid Composites Using Squeeze Casting Technique. Iranian Journal of Materials Science &
Engineering, 16(2) 55-67.
9. Natrayan, L., M. Senthil Kumar, and Mukesh Chaudhari. "Optimization of Squeeze Casting Process Parameters to Investigate
the Mechanical Properties of AA6061/Al2O3/SiC Hybrid Metal Matrix Composites by Taguchi and Anova Approach."
Advanced Engineering Optimization Through Intelligent Techniques. Springer, Singapore, 2020. 393-406.
10. L. Natrayan and M. Senthil Kumar. Study on Squeeze Casting of Aluminum Matrix Composites-A Review. Advanced
Manufacturing and Materials Science. Springer, Cham, 2018. 75-83. (https://doi.org/10.1007/978-3-319-76276-0_8.)
11. Gauderman, W. J. et al. (2000).Association Between Air Pollution and Lung Function Growth İn Southern California
Children. American Journal of Respiratory and Critical Care Medicine, 162:pp.1383 –1390.
12. M. S. Santhosh, R. Sasikumar, L. Natrayan, M. Senthil Kumar, V. Elango and M. Vanmathi. (2018). Investigation of
mechanical and electrical properties of kevlar/E-glass and basalt/E-glass reinforced hybrid Composites. . Inter J Mech Prod
Engi Res Develop., 8(3): 591-598.
13. L.Natrayan, MS Kumar, Mukesh Chaudhari, Characterization of Al6061 Reinforced Al 2O3 Hybrid Metal Matrix Composites
with Variable Squeeze Pressure, Journal of Advanced Research in Dynamic and Control Systems 11 (03), 1636-1642.
Keywords: Active Neighborhood Pattern Sensitive Fault (ANPSF), Tiling method, Type-1 neighborhood,
Binary counter, Hamiltonian, Gray pattern generator, Xilinx ISE 14.2, Nexys 4 DDR Artix 7 FPGA.
References:
1. V. D. A. Michael Lee Bushnell, Vishwani D. Agrawal, “Essentials of Electronic Testing for Digital, Memory, and Mixed -Signal
VLSI Circuits”. New York: Kluwer Academic Publishers, 2nd ed., 2002
2. M. A. Miron Abramovici, Melvin A. Breuer, Arthur D. Friedmaan, “Digital Systems Testing and Testable Design ”Jaico
Publishing House, 2002
3. C. Huzum, P. Cascaval, “A Multibackground March Test for Static Neighborhood Pattern-Sensitive Faults in Random-Access
Memories” 2012.
4. Anu Samanta, Mousumi Saha, Ajay Kumar Mahato “BIST Design for Static Neighborhood Pattern Sensitive Fault Test ”,
International Journal of Computer Applications, iC3S-2012.
5. K.-L. Cheng, M.-F. Tsai, and C.-W. Wu, “Neighborhood pattern-sensitive fault testing and diagnostics for random access
memories,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 21, no. 11, pp. 1328– 1336, Nov. 2002
6. K. Cheng and C.-W. Wu, " Efficient neighborhood pattern-sensitive fault test algorithms for semiconductor memories", in Proc.
IEEE VLSI Test Symp(VTS), Marina Del Rey, California, Apr 2001, pp. 225-237
7. S.V. Yarmolik and Mrozek, "Multi Background Memory Testing", In Proc. Th MIXDES 14 International Conference,
Ciechocinek, Poland, June 2000
8. AJ. van de Goor, Testing Semiconductor Memories: Theory and Practice, John Wiley & Son, Chichester, England,1991.
9. M Parvathi, " Novel Test Methods for NPSF Faults in SRAM”, CCTES 2018.
10. Nexys4 DDR FPGA xilix user guide , in xilinx provided web page.
References:
1. Altoaimy L, Kurdi H, Alromih A, Alomari A, Alrogi E, Ahmed SH. Enhanced distance-based gossip protocols for wireless
sensor networks. In annual consumer communications & networking conference 2019 (pp. 1-4). IEEE.
2. Kwiatkowska M, Norman G, Parker D. Analysis of a gossip protocol in PRISM. ACM SIGMETRICS Performance Evaluation
Review. 2008;36(3):17-22.
3. Norouzi A, Babamir FS, Zaim AH. A novel energy efficient routing protocol in wireless sensor networks. Wireless Sensor
Network. 2011;3(10):341.
4. Khandelwal A, Jain YK. An efficient k-means algorithm for the cluster head selection based on SAW and WPM. International
Journal of Advanced Computer Research. 2018;8(37):191-202.
5. Iyengar SS, Brooks RR, editors. Distributed Sensor Networks: Sensor Networking and Applications (Volume Two). CRC press;
15. 2016.
6. Alromih A, Al-Rodhaan M, Tian Y. A Randomized watermarking technique for detecting malicious data injection attacks in
heterogeneous wireless sensor networks for internet of things applications. Sensors. 2018; 18(12):4346. 87-92
7. Olasupo TO, Olasupo KO. Investigation of factors that determine the performance of wireless sensor systems for large-scale on
demand deployment. Universal Journal of Communications and Network. 2017;5(1):1-22.
8. Irandegani M, Bagherizadeh M. Designing an asynchronous multi-channel media access control protocol based on service quality
for wireless sensor networks. International Journal of Advanced Computer Research. 2017; 7(32):190.
9. Hammoudeh M, Newman R. Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application
performance. Information Fusion. 2015; 22:3-15.
10. Bharti D, Nainta N, Monga H. Performance analysis of wireless sensor networks under adverse scenario of attack. In
international conference on signal processing and integrated networks 2019 (pp. 826-828). IEEE.
11. Dahda N, Sindhwani M, Singh C. Energy efficient hybrid technique based on dynamic clustering in wireless sensor network. In
international conference on intelligent circuits and systems 2018 (pp. 229-234). IEEE.
12. Sharma HG, Sharma R. A study of static and random sink node in wireless sensor network. In international conference and
workshops on recent advances and innovations in engineering 2018 (pp. 1-4). IEEE.
13. Habib A, Saha S, Nur FN, Razzaque A, Mamun-Or-Rashid M. An efficient mobile-sink trajectory to maximize network lifetime
in wireless sensor network. In international conference on innovation in engineering and technology 2018 (pp. 1-5). IEEE.
14. Sandhu JK, Verma AK, Rana PS. A data-driven framework for survivable wireless sensor networks. In international conference
on contemporary computing 2018 (pp. 1-6). IEEE.
15. Muruganantham N, El-Ocla H. Genetic algorithm-based routing performance enhancement in wireless sensor networks. In
international conference on communication and information systems 2018 (pp. 79-82). IEEE.
16. Rubel MS, Kandil N, Hakem N. Priority management with clustering approach in wireless sensor network (WSN). In
international conference on digital information, networking, and wireless communications 2018 (pp. 7-11). IEEE.
17. Singh AK, Kumar P. Advancement in quality of services in wireless sensor networks. In international conference on internet of
things: smart innovation and usages 2018 (pp. 1-5). IEEE.
18. Zhang C, Fei S. A data collection algorithm with mobile elements in wireless sensor networks. In youth academic annual
conference of Chinese association of automation 2018 (pp. 1040-1044). IEEE.
19. Zhou L, Shan Y, Chen X. An anonymous routing scheme for preserving location privacy in wireless sensor networks. In
information technology, networking, electronic and automation control conference 2019 (pp. 262-265). IEEE.
20. Dubey AK, Gupta U, Jain S. Analysis of k-means clustering approach on the breast cancer Wisconsin dataset. International
Journal of Computer Assisted Radiology and Surgery. 2016;11(11):2033-47.
21. Dubey AK, Gupta U, Jain S. Comparative study of k-means and fuzzy c-means algorithms on the breast cancer data. International
Journal on Advanced Science, Engineering and Information Technology. 2018;8(1):18-29.
Keywords : PEGASIS ; networks of wireless sensors ; TOKEN ; chain formation ; node of the leader ; data
transmission
References:
1. Akkaya, Kemal, and Mohamed Younis. "A survey on routing protocols for wireless sensor networks." Ad hoc networks 3.3(2005):
325-349.
2. S. Lindsey, and C. Raghavendra, “PEGASIS : Power-efficientgathering in sensor information systems,” IEEE Aerospace Conferenceb
Proceedings, 2002, pp.1125-1130.
3. YU Yong-chang, WEI Gang, “An Improved PEGASIS Algorithmin Wireless Sensor Network,” Acta Electronica Sinica,
vol.36,pp.1309-1313, July 2008.
4. Feng Sen, Qi Bing and Tang Liangrui, “An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor
Networks,”Eighth International Conference on Fuzzy Systems and KnowledgeDiscovery (FSKD), 2011, pp.2230-2233.
5. WANG Lin-ping, BI Wu, CAI Zhen and WANG Zu-feng,“Improved algorithm of PEGASIS protocol introducing doublecluster heads
in wireless sensor network,” International Conferenceon Computer, Mechatronics, Control and Electronic Engineering,2010, pp .148-
151.
6. GUO Wen-yu, ZHANG Wei, and LU Gang, “PEGASIS protocol in wireless sensor network based on an improved ant colony
algorithm,” Second International Workshop on Education Technology and Computer Science, 2010, pp.64-67.
7. Young-Long Chen, Neng-Chung Wang, Chin-Ling Chen and Yu-Cheng Lin, ” A Coverage Algorithm to Improve the Performance of
PEGASIS in Wireless Sensor Networks,” 12th ACIS
8. International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing,20 11,
pp.123-127.
9. Young-Long Chen, Yu-Cheng Lin and Neng-Chung Wang, “an intersection-based coverage algorithm for pegasis architecture in
10. wireless sensor networks,” Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian, 15-17 July,
2012, pp.1727-1731.
11. Zibouda Aliouat and Makhlouf Aliouat,” Efficient Management of Energy Budget for PEGASIS Routing Protocol,” 6th International
12. Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012, pp.516-521.
13. Mohsin Raza Jafri, Nadeem Javaid, Akmal Javaid and Zahoor Ali Khan,” Maximizing the Lifetime of Multi-Chain PEGASIS Using
14. Sink Mobility,” World Applied Sciences Journal 21, 2013, pp.1283-1289.
15. Madhuri Gupta and Laxmi Saraswat,” Energy Aware Data Collection in Wireless Sensor Network Using Chain Based PEGASIS,”
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014,Jaipur, India.
16. R. K. Yadav and Arpan Jain, “CHATSEP: Critical Heterogeneous Adaptive Threshold Sensitive Election Protocol for Wireless Sensor
Networks,” IEEE International Conference on Advances inComputing, Communications and Informatics (ICACCI), 2014,pp.81 -86.
17. Lewis, Franck L. "Wireless sensor networks." Smart environments:technologies, protocols, and applications (2004): 11-46.[14].
Akyildiz, Ian F., et al. "Wireless sensor networks: asurvey." Computer networks 38.4 (2002): 393-422.
18. Akkaya, Kemal, and Mohamed Younis. "A survey on routingprotocols for wireless sensor networks." Ad hoc networks 3.3(2005): 325-
349.
Authors: Wafa Zubair AL-Dyani, Farzana Kabir Ahmad, Siti Sakira Kamaruddin
Paper Title: Event Detection Model for Facebook News Posts
Abstract: Abstract: Event detection has wide application especially in the area of news streams analyzing
where there is a need to monitor what events are emerging and affecting people’s lives. This is crucial for public
administrations and policy makers to learn from their previous mistakes to make better decisions in the future.
Different researchers have introduced several event detection models for Facebook news posts in. However,
majority of these models have not provided adequate information about the discovered news events such as
location, people and activity. In addition, existing models have ignored the problem of high dimensional feature
space which affects the overall detection performance of the models. This research presents a conceptual event
detection model for mining events from large volume of short text Facebook news posts and summarize their
valuable information. This is crucial for public administrations and policy makers to learn from their previous
mistakes to make better decisions in the future. The proposed model includes pre-processing, feature selection,
event detection and summarization phases. The pre-processing phase involves several steps to convert
unstructured text news posts into structure data. Feature selection phase to select the optimal feature subset.
17. Meanwhile, event detection phase uses these features to construct undirected weighted graph and apply dynamic
graph technique to identify the clusters from the graph and then annotate each cluster to its corresponding event.
At the end of this paper, several unresolved problems in the construction of event detection model from 98-102
Facebook news posts are reported to be used as future work for the current study.
Keywords: Event detection, Facebook, Feature selection, graph, news, text clustering.
References:
1. F. Wanner, A. Stoffel, D. Jäckle, B. C. Kwon, A. Weiler, and D. A. Keim, “State-of-the-Art Report of Visual Analysis for Event
Detection in Text Data Streams,” pp. 1–15, 2014.
2. F. Abdullah, K. R. Ku-Mahamud, F. Ahmad, N. F. A Ghani, and M. M Kasim, “Relative efficiency assessment of projects using data
envelopment analysis: A case study,” Int. J. Digit. Content Technol. its Appl., vol. 6, no. 9, pp. 310–318, 2012.
3. M. H. Singh, “Clustering of text documents by implementation of K-means algorithms,” Streamed Info-Ocean, vol. 1, no. 1, pp. 53–63,
2016.
4. A. Goswami and A. Kumar, “A survey of event detection techniques in online social networks,” Soc. Netw. Anal. Min., vol. 6, no. 1, p.
107, 2016.
5. N. Sormanen, J. Rohila, E. Lauk, T. Uskali, J. Jouhki, and M. Penttinen, “Chances and challenges of computational data gathering and
analysis: The case of issue-attention cycles on Facebook,” Digit. Journal., vol. 4, no. 1, pp. 55–74, 2016.
6. L. C. Passaro, A. Bondielli, and A. Lenci, “FB-NEWS15: A Topic-Annotated Facebook Corpus for Emotion Detection and Sentiment
Analysis,” in Proceedings of the Third Italian Conference on Computational Linguistics CLiC-it 2016., 2016.
7. S. A. Salloum, C. Mhamdi, M. Al-Emran, and K. Shaalan, “Analysis and Classification of Arabic Newspapers’ Facebook Pages using
Text Mining Techniques,” Int. J. Inf. Technol., vol. 1, no. 2, pp. 8–17, 2017.
8. G. Leban, B. Fortuna, and M. Grobelnik, “Using News Articles for Real-time Cross-Lingual Event Detection and Filtering.,” in
NewsIR@ ECIR, 2016, pp. 33–38.
9. Ahmed Al-Rawi, “News values on social media: News organizations’ Facebook use,” Journalism, pp. 1–19, 2016.
10. M. Allahyari et al., “A brief survey of text mining: Classification, clustering and extraction techniques,” arXiv Prepr.
arXiv1707.02919, 2017.
11. B. Xue, M. Zhang, W. N. Browne, and X. Yao, “A survey on evolutionary computation approaches to feature selection,” IEEE Trans.
Evol. Comput., vol. 20, no. 4, pp. 606–626, 2016.
12. T. R. Chandran, A. V Reddy, and B. Janet, “Text Clustering Quality Improvement using a hybrid Social spider optimization,” Int. J.
Appl. Eng. Res., vol. 12, no. 6, pp. 995–1008, 2017.
13. N. Panagiotou, I. Katakis, and D. Gunopulos, “Detecting events in online social networks: Definitions, trends and challenges,” in
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 9580, Springer, 2016, pp. 42–84.
14. R. Hassanian-esfahani and M. Kargar, “A survey on web news retrieval and mining,” in Web Research (ICWR), 2016 Second
International Conference on, 2016, pp. 90–101.
15. Q. H. Ramadan and M. Mohd, “A review of retrospective news event detection,” in Semantic Technology and Information Retrieval
(STAIR), 2011 International Conference on, 2011, pp. 209–214.
16. X. Dai, Y. He, and Y. Sun, “A Two-layer text clustering approach for retrospective news event detection,” in Artificial Intelligence and
Computational Intelligence (AICI), 2010 International Conference on, 2010, vol. 1, pp. 364–368.
17. J. Deng, F. Qiao, H. Li, X. Zhang, and H. Wang, “An Overview of Event Extraction from Twitter,” in Cyber-Enabled Distributed
Computing and Knowledge Discovery (CyberC), 2015 International Conference on, 2015, pp. 251–256.
18. F. Zarrinkalam and E. Bagheri, “Event identification in social networks,” Encycl. with Semant. Comput. Robot. Intell., vol. 1, no. 01,
p. 1630002, 2017.
19. C. S. Cracs and P. Porto, “A Three-Step Data-Mining Analysis of Top-Ranked Higher Education Institutions ’ Communication on
Facebook,” 2018.
20. A. Alsaeedi, M. A. Fattah, and K. Aloufi, “A hybrid feature selection model for text clustering,” in System Engineering and
Technology (ICSET), 2017 7th IEEE International Conference on, 2017, pp. 7–11.
21. S. Arora and P. Anand, “Binary butterfly optimization approaches for feature selection,” Expert Syst. Appl., vol. 116, pp. 147–160,
2019.
22. B. Manaskasemsak, B. Chinthanet, and A. Rungsawang, “Graph Clustering-Based Emerging Event Detection from Twitter Data
Stream,” in Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016, pp. 37–41.
23. S. . Abdulsahib, A.K., Kamaruddin, “Graph based text representation for document clustering,” J. Theor. Appl. Inf. Technol., vol. 76,
no. 1, pp. 1–13, 2015.
24. A. Edouard, “Event detection and analysis on short text messages,” 2018.
25. S. Katragadda, R. Benton, and V. Raghavan, “Framework for real-time event detection using multiple social media sources,” 2017.
26. B. S. Khan and M. A. Niazi, “Network Community Detection : A Review and Visual Survey,” 2016.
27. Q. Chen, X. Guo, and H. Bai, “Semantic-based topic detection using Markov decision processes,” Neurocomputing, vol. 242, pp. 40–
50, 2017.
28. Y. Zhang, C. Szabo, and Q. Z. Sheng, “Sense and focus: towards effective location inference and event detection on Twitter,” in
International Conference on Web Information Systems Engineering, 2015, pp. 463–477.
Authors: Deep Tripathi, Rakesh Kumar, P. K. Mehta, Amrendra Singh
References:
1. Yahia A., Tanimura M., Shimabukuro A. and Shimoyama Y.: Effect of rheological parameters on self compactability of concrete
containing various mineral admixtures. In Proceedings of the first RILEM International symposium on self-compacting concrete, pp.
523-35, Stockholm, (1999).
2. Kurita M. and Nomura T.: Highly-flowable steel fiber-reinforced concrete containing fly ash. Special Publication 178, 159-176 (1998).
3. Duan, Ping, Chunjie Yan, and Wei Zhou.: Influence of partial replacement of fly ash by metakaolin on mechanical properties and
microstructure of fly ash geopolymer paste exposed to sulfate attack. Ceramics International 42 (2), 3504-3517 (2016).
4. Sabir B.B., Wild S. and Bai J.: Metakaolin and calcined clays as pozzolans for concrete: a review. Cement and concrete composites 23
(6), 441-454 (2001).
5. Madandoust R., and Mousavi S.Y.: Fresh and hardened properties of self-compacting concrete containing metakaolin. Construction
and building materials 35, 752-760 (2012).
6. Kavitha O. R., Shanthi V.M., Arulraj G.P., and Sivakumar P.: Fresh, micro-and macrolevel studies of metakaolin blended self-
compacting concrete. Applied Clay Science 114, 370-374 (2015).
7. Caldarone M.A., Gruber K.A., and Burg R.G.: High reactivity metakaolin (HRM): a new generation mineral admixture for high
performance concrete. Concrete International 16 (11), 37-41(1994).
8. Frıas M., Rojas M.I.S., and Cabrera J.: The effect that the pozzolanic reaction of metakaolin has on the heat evolution in me takaolin-
cement mortars. Cement and Concrete Research 30 (2), 209-216 (2000).
9. Hassan A.A.A., Lachemi M., and Hossain K.M.A.: Effect of metakaolin on the rheology of self-consolidating concrete: In Design,
production and placement of self-consolidating concrete, pp. 103-112. Springer, Dordrecht, (2010).
10. Chopra, Divya, and Rafat Siddique.: Strength, permeability and microstructure of self-compacting concrete containing rice husk ash.
Biosystems engineering 130, pp. 72-80 (2015).
11. IS: 8112 (1989). : Specification for 43 grade ordinary Portland cement. Bureau of Indian standards, New Delhi, India (1989).
12. IS: 383 (1987). : Specification for coarse and fine aggregate from natural sources for concrete. Bureau of Indian Standards, New
Delhi, India (1987).
13. IS: 3812- 2000.: Specification for Pulverized Fuel Ash, Part 1: For Use as Pozzolana in Cement. Cement Mortar and Concrete (2002).
14. EFNARC.: Specification and guidelines for self-compacting concrete. UK: EFNARC; (2005).
15. IS: 14858- 2000.: Requirements for compression testing machine used for testing of concrete and mortar. Bureau of Indian Standards,
New Delhi, India (2002).
16. IS: 516 (1959).: Specification for methods of test for strength of concrete. Bureau of Indian standards, New Delhi, India (19 59).
17. Brabha H Nagaratnam, Ahmed Faheem, Muhammad Ekhlasur Rahman, Mohammad: Mechanical and Durability Properties of
Medium Strength Self Compacting Concrete with High-Volume Fly Ash and Blended Aggregates. R Periodica Polytechnica Civil
Engineering 59(2), pp. 155-164 (2015).
18. Lenka, S., and K. C. Panda.: Effect of metakaolin on the properties of conventional and self compacting concrete. Advances in
concrete construction.5 (1), pp. 31-48 (2017).
Paper Title: Fine Tuning Data Mining Algorithm for an Efficient Classification of E-Coli
Abstract: E. coli is the first organisms to be sequenced as genome and the classification within the DEC
pathotypes has epidemiologic and clinical implications for managing diarrheal diseases. In many developing
countries E.coli leads to cause of diarrhea in children. where the mode of transmissions takes place via food and
water. based on their pathogenic phenotype and diseases they cause it can be classified into 6 groups.
consequently, our awareness of the spectrum of diseases and syndromes that they cause is quite limited. Also,
because we cannot readily identify infected patients, there are many complexities in defining the modes of
attainment, prevention and treatment strategies, and estimating the burden of infectious squealed. These
infections create many challenges, and no progress will take place until the diagnostic potential for these agents
got improved. Identifying E. coli isolate co-express LA reiterates the difficulty of assigning bacteria to groups on
the basis of their adherence phenotype or genotype. Therefore the analysis of E -coli with molecular methods
demonstrates that strains carry will represent more characteristics of typical EPEC and also the lack of AggR
regulon, we propose a novel classification approach for classifying E-coli therefore to recognize pathogens. In
addition, the ability to simultaneously induce attaching effacing lesions and biofilm production may enhance the
potential of the strains to cause diarrhea and prolong bacterial residence in the intestines, thus worsening
19. malnutrition in the patients.
Keywords: Ecoli , classification , BayesNet, Navie Bayes, RBFNetwork, SMO. 109-113
References:
1. Qiang Yang and Xindong Wu, (2006) "10 Challenging Problems In Data Mining Research", International Journal of Information
Technology & Decision makingvol. 05, No. 04, pp. 597-604 ,https://doi.org/10.1142/S0219622006002258.
2. Norouzi, Monire & Souri, Alireza & Zamini, Majid. (2016). A Data Mining Classification Approach for Behavioral Malware Detection.
Journal of Computer Networks and Communications. 2016. 1-9.
3. (https://doi.org/10.5120/ijca2017915922) Jindal, Rajni & Taneja, Shweta. (2017). A Novel Weighted Classification Approach using
Linguistic Text Mining. International Journal of Computer Applications. 180. 9-15. 10.5120/ijca2017915922.
4. Coenen, F., Leng, P., Zhang, L.: Threshold Tuning for Improved Classification Association Rule Mining, pp. 216 –225. Springer,
Heidelberg (2005)
5. Han, J., Kamber, M.: Data Mining: Concept and Techniques, 2nd edn., pp. 285–311. Morgan Kaufmann Publishers, San Francisco (2006)
6. Ismaeel, A. G., & Mikhail, D. Y. (2016),”Effective data mining technique for classification cancers via mutations in gene using neural
network”, arXiv preprint arXiv:1608.02888.
7. Nilashi, M., Ibrahim, O., Ahmadi, H., &Shahmoradi, L. (2017), “A knowledge-based system for breast cancer classification using fuzzy
logic method”, Telematics and Informatics, 34(4), 133-144.
8. Mahapatra, R., Majhi, B., & Rout, M. (2012),”Reduced feature based efficient cancer classification using single layer neural network”,
Procedia Technology, 6, 180-187.
9. Nguyen, T., Khosravi, A., Creighton, D., &Nahavandi, S. (2015), “Hidden Markov models for cancer classification using gene ex pression
profiles”, Information Sciences, 316, 293-307.
References:
1. Aaron Orendorff, Global Ecommerce, 2017, September 1
2. Ajeet Khurana, Advantages of E-commerce Over Traditional Retail, 2017, November 19)
3. Darren DeMatas, 5 Types of Ecommerce Business Models That Work Right Now, 2018, February 3
4. Digital Russia. New reality. Research by McKinsey Global Inc. July 2017. [Electronic resource] URL:
http://www.tadviser.ru/images/c/c2/Digital-Russiareport.pdf (accessed 19.10.18).
5. Dobrynin A. P., To Black.Yu, Chuprynousky.P., Chuprynousky P. V., Sinyakov.A. the Digital economy-the different ways to the
effective use of technology (BIM, PLM, CAD, IoT, Smart City, Big Data, etc.) / / INTERNATIONAL JOURNAL of OPEN
INFORMATION TECHNOLOGIES. - 2016. - № 4. - From 4-11
6. Guskova M. N., Frolova T. V., Isaeva E. A. the Current state of the Russian financial market // In the collection: Institutional and
infrastructure aspects of the development of various economic systems collection of articles of the International scientific and
practical conference. - 2016. - Pp. 145-151.
7. Korovkina E. V. Creation of a digital ecosystem of a commercial Bank: main ways and predicted results. Scientific notes of
young researchers. - 2017. - № 3. -P. 68-71.
8. Maslennikov V. V., Fedotov M. A., Sorokin A. N. New technologies are changing our world // Bulletin of the financial
University. - 2017. - № 3. - P. 6-11
9. Miroshnichenko M. A., Trenevska A. I. Innovations in the banking sector as a vector of development of the ecosystem of the
digital economy. Knowledge economy in Russia: from the generation of knowledge and innovation to cognitive of
industrialization: proceedings of the IX Intern. science.-prakt. Conf./ OTV. the editorship of V. V. Ermolenko, M. R. Zakaryan.
Krasnodar: Kuban. state UN-T. - 2017. – № 313. - P. 267-280.
10. Miroshnichenko M. A., Trenevska K. A., Mamykina, E. V. Study of the process of "digitalization" of the banking sector in the
broader ecosystem of the digital economy of Russia // Polythematic network electronic scientific journal of the Kuban state
agrarian University. - 2017. - № 133. - P. 434-447
11. Petrov A. R., Rodionova E. V. Creation of digital ecosystem as a key element of functioning of modern commercial banks.
Innovative development. -2017. - № 12. - Pp. 136-138
12. Rudakova O. S. Banking ecosystems in the digital economy // Proceedings of the International scientific and practical Internet
conference. - 2018. - P. 232-238.
13. Yakushenko K. V., Shimanskaya A.V. Digital transformation of information support of economic management of the EAEU
member States// news of science and technology. -2017. - № 2. - P. 11-20.
14. Yusupova O. A. Internet banking as a direction of digitalization of banking business: state, problems, prospects // Financial
Analytics: problems and solutions. -2016. - № 34. - P. 12-25.
Authors: Sathiskumar S, Dhavaneeswaran N, Dhanush Guru R.
Performance and Emission Testing of Methyl Ester of Aloe Vera using Metal Oxide as Additive in
Paper Title:
CI Engine
Abstract: This experimental research evaluate the performance and emission characteristics of a single
cylinder 4 – stroke multi-fuel VCR engine, we obtained gel from the aloe vera as the raw material for biodiesel
production in the transesterification process. We blended the obtained biodiesel in various ratios with the diesel
and it was named B10, B20, and B30. The properties of the biodiesel were tested before it was used as a fuel.
The performance and emission testing were done in a single cylinder 4 – stroke multi-fuel VCR engine with an
eddy current dynamometer. The biodiesel played a major role in reducing hydrocarbon and carbon monoxide
emissions. But it resulted in certain disadvantages of using aloe vera biodiesel in CI engines i.e., it emits more
nitrous oxide than diesel and also it has more fuel consumption. To eliminate these drawbacks, aluminum oxide
(Al2O3) was used as a nano additive. Based on the performance and emission results obtained, we chose the best
blend using a design optimization software called "design expert". The performance and emission results were
used in the software which will offer comparative tests, screening, and optimization to choose the best biodiesel
blend. B20 was chosen as the best blend and aluminum oxide nano additive was used in two percentages as 50
ppm and 100 ppm with the B20 blend. These nanoparticles added to the biodiesel reduced the ignition delay
21. during the combustion process which resulted in improved thermal efficiency, brake specific fuel consumption
and reduction in nitrogen oxide emissions to meet the objectives of this research.
Keywords: Fossil fuels, biodiesel, aloe vera, emission, nano additives, aluminum oxide, ignition delay 126-133
References:
1. Marcelo Silva, Andre E Machado, Ana Carolina R de Castro, Bruno Carvalho, (2015), biodiesel production process starting from aloe
vera: A paper presented in the international conference on engineering and computer education
2. Marcelo Silva, Andre E Machado, Ana Carolina R. de Castro, Bruno Carvalho, Barbara C.A.da Rocha, Thaiane de Castro Mello, Lorran
Santana, Rayanne Murras(2015) Technical aspects of the production of aloe vera gel biodiesel: A paper presented in the international
conference on safety, Health, and Environmental world congress
3. P.Vidhya, Dr.S. Sunil Kumar Reddy, V. Govind Naik (2014): Investigation on the performance and emissions of Aloe vera blends with
EGR system: International journal of innovative research in science, engineering, and technology (ISSN:2319- 8753)
4. Marcelo Silva, Barbara C.A .da Rocha, Lorran Santana, Rayanne Murras, Thaiane Mello (2015): The importance of pre-treatment with
alkaline wash for the obtaination of biodiesel from vegetable oil aloe vera: A paper presented in the international conference on
engineering and computer education
5. P.J Ayanthi, Srinivasa RAO M, (2016): Effects of nanoparticles additives on performance and emissions characteristics of a DI Diesel
engine fuelled with biodiesel: International journal of advances in engineering & technology (ISSN: 22311963)
6. Ajay Kumar Gupta, Mona Gupta (2004): Synthesis and surface engineering of iron oxide nanoparticles for biomedical application s:
ELSEVIER:- Applied catalysis
7. Soner Gumus, Hakan Ozcan, Mustafa Ozbey, Bahattin topaloglu (2016): Aluminium oxide and copper oxide nano diesel fuel properties
and usage in a compression ignition engine: ELSEVIER: Applied catalysis
8. Ali M.A. Attia, Hesham M. El-Batsh and Ahmed I. El-Seesy, Mohamed S. Shehata (2014): Effects of alumina nanoparticles additives
into jojoba methyl ester-diesel mixture on diesel engine performance: International Mechanical Engineering Congress & Exposition
(IMECE2014-39988).
9. A.M. Ashrafu, H.H. Masjuki, M.A. Kalam, H.K. Rashedul, H. Sajjad, M.J. Abedin (2014): Influence of anti-corrosion additive on the
performance, emission and engine component wear characteristics of an IDI diesel engine fueled with palm biodiesel: ELSEVIER:
Applied catalysis
10. M. Akmal Adzmi, Adam Abdullah and Afif Naqiuddin (2019): Combustion characteristics of biodiesel blended with Al2O3 and SiO2
nanoparticles: AIP Conference Proceedings
11. Praveen Anchupogu1 & Lakshmi Narayana Rao2 & Balakrishna Banavathu (2018): Effect of alumina nano additives into biodiesel-
diesel blends on the combustion performance and emission characteristics of a diesel engine with exhaust gas recirculation:
Environmental Science and Pollution Research (DOI-10.1007)
12. L. Jeryrajkumar, G. Anbarasu, T. Elangovan (2016): Effects on Nano Additives on Performance and Emission Characteristics of
Calophyllim inophyllum Biodiesel: International Journal of Chem Tech Research (ISSN: 0974-4290)
13. Krishnan, Anbarasu, (2017): A Review on Emission Control Strategy by Adding Nano Additives in CI Engine: International Resear ch
Journal of Engineering and Technology (e-ISSN: 2395 -0056)
14. Vasudevan Raghavan, S. Rajesh, Shintre Paraga & V. Avinash, (2009): Investigation of Combustion Characteristics of Biodiesel and Its
Blends: Combustion Science and Technology
15. Vivek W. Khond, V.M. Kriplani, (2016): Effect of nanofluid additives on performances and emissions of emulsified diesel and biodiesel
fuelled stationary CI engine: A comprehensive review: Renewable and Sustainable Energy Reviews
16. Nagarajan Jeyakumar & N Bose (2019): Effect of Pentanol-biodiesel blends on performance and emission characteristics of diesel
engine: International Journal of Ambient Energy
17. H.M. Mahmudula, F.Y. Hagosa, R. Mamata, A. Abdul Adama, W.F.W. Ishakb, R. Alenezic (2017): Production, characterization, and
performance of biodiesel as an alternative fuel in diesel engines – A review: ELSEVIER: Journal of science and technology
18. K. Sureshkumar, R. Velraj, R. Ganesan (2008): Performance and exhaust emission characteristics of a CI engine fueled with Pongamia
pinnata methyl ester (PPME) and its blends with diesel: ELSEVIER: Journal of environmental engineering
19. S Padmanabhan, T Vinoth Kumar, M Chandrasekaran & S Ganesan (2018): Investigation of Sapindus seed biodiesel with nano additive
on single-cylinder diesel engine: International Journal of Ambient Energy
20. Vishal Saxena, Niraj Kumar, Vinod Kumar Saxena (2017): A comprehensive review of combustion and stability aspects of metal
nanoparticles and its additive effect of diesel and biodiesel fuelled C.I. Engine: ELSEVIER: Applied catalysis
21. Cenk Sayin (2010): Engine performance and exhaust gas emissions of methanol and ethanol–diesel blends: ELSEVIER: Journal of
science and technology
22. Thiyagarajan Subramanian & Edwin Geo Varuvel & Saravanan Ganapathy & S. Vedharaj & R. Vallinayagam (2018): Role of fuel
additives on the reduction of NOX emission from a diesel engine powered by camphor oil biofuel: Environmental Science and Pollution
Research
References:
1. M. Felderer, A. Beer, “Using defect taxonomies for requirements validation in industrial projects,” In Proceedings of the 21st
IEEE International Requirements Engineering Conference, Rio de Janeiro, Brasil, July 2013, pp. 296-301.
2. S. Nazir, Y. H. Motla, T. Abbas, A. Khatoon, J. Jabeen, M. Iqra, K. Bakhat, “A process improvement in requirement verification
and validation using ontology,” In Proceedings of the 1st Asia-Pacific World Congress on Computer Science and Engineering,
Nadi, Fiji, November 2014, pp. 26-33.
3. I. Sommerville. (2016, March, 01). Software engineering (10th ed.).
4. D. Boyd, N. B. Ellison, “Social network sites: definition, history, and scholarship,” Journal of Computer-Mediated
Communication, vol.13, no.1, December 2007, pp. 210-230.
5. Y. Jeong, G. Bae, The trends and perspectives of the social networking service (SNS), Emerging Issue Report, Korea Institute of
Science and Technology Information, 2007.
6. S. Ko, B. Hwang, Y. Ji, “A study on social network service and online social capital: focusing on a korean and chinese case,”
Journal of Society for e-Business Studies, vol.15, no.1, February 2010, pp. 103-118.
7. S. Hong, J. Oh, “Comparative analysis on twitter, facebook and kakaostory user access factor,” In Proceedings of the 3rd
International Conference on ICT Convergence, Jeju island, South korea, October 2012, pp. 248-252.
Keywords:
References:
1. Timothy A. Manzone, Hung Q. Dam, Daniel Soltis, and Vidya V. Sagar, “Blood Volume Analysis: A New Technique and New Clinical
Interest Reinvigorate a Classic Study,” J Nucl Med Technol. 2007 Jun;35(2):55-63; quiz 77, 79. Epub 2007 May 11.
2. Ryosuke Murakia, Arudo Hiraokab, Kazuyuki Nagataa, Kosuke Nakajimaa, Tomoya Oshitaa, Masahisa Arimichia,Genta Chikazawab,
Hidenori Yoshitakaband Taichi Sakaguchi, “Novel method for estimating the total blood volume: the importance of adjustment using
the ideal body weight and age for the accurate prediction of haemodilution during cardiopulmonary ypass,” Interact Cardiovasc Thorac
Surg. 2018 Dec 1;27(6):802-807.
3. Prathap Moothamadathil Baby, Pramod Kumar, Rajesh Kumar, Sanu S. Jacob, Dinesh Rawat, V. S. Binu, and Kalesh M. Karun , “A
novel method for blood volume estimation using trivalent chromium in rabbit models,” Indian J Plast Surg. 2014 May-Aug; 47(2): 242–
248
4. J. G. Jones and C. A. J. Wardrop, “Measurement of blood volume in surgical and intensive care practice,” BJA: British Journal of
Anaesthesia, Volume 84, Issue 2, Feb 2000, Pages 226–235
5. E. Pirnia, A. Jakobsson, E. Gudmundson,, and J. A. Jensen,"DATA ADAPTIVE ESTIMATION OF TRANSVERSAL BLOOD FLOW
VELOCITIES",2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP).
6. Jonathan Pore, Thomas Deffieux, Mathieu Pernot, Charlie Demene, Jerome Baranger, Mickael Tanter ,"H igh-resolution vector Doppler
for cerebral blood flow estimation", 2017 IEEE International Ultrasonics Symposium (IUS).
7. D. Vray, A. Needles, V.X.D. Yang, F.S. Foster ,"High frequency B-mode ultrasound blood flow estimation in the microvasculature",
IEEE Ultrasonics Symposium, 2004.
8. L. Loevstakken, S. Bjaerum, D. Martens, H. Torp ,"Real-time blood motion imaging a 2D blood flow visualization technique", IEEE
Ultrasonic Symposium, 2004.
9. F. Karnangar, M.A. Masnadi-Shirazi, K. Behbehani, R. Zhang, N. Nazeran, B.D. Levine ,"A model of cerebral blood flow velocity as a
function of mean arterial blood pressure using Kalman filter estimation techniques", Proceedings of the Second Joint 24th Annual
Conference and the Annual Fall Meeting of the Biomedical Engineering Society] [Engineering in Medicine and Biology.
10. Dimple Modgil, David S. Rigie, Michael D. Bindschadler, Adam M. Alessio, Patrick J. La Rivire ,"Vectorial total variation d enoising
for myocardial blood flow estimation in dynamic CT", 2014 IEEE Nuclear Science Symposium and Medical Imaging Conference
(NSS/MIC).
11. Aditi Kathpalia, Ycel Karabiyik, Bente Simensen, Eva Tegnander, Sturla EikNes, Hans Torp, Ingvild Kinn Ekroll, Gabriel Kiss,"A
Robust Doppler Spectral Envelope Detection Technique for Automated Blood Flow Measurements ",2015 IEEE.
12. A.C. Santos ; S.S. Furuie ,"Estimation of coronary blood flow by contrast propagation using X-ray cineangio graphic images",
Computers in Cardiology 2001. Vol.28 (Cat. No.01CH37287).
13. K. Marasek and A. Nowicki, "Comparison of the performance of three maximum Doppler frequency estimators coupled with different
spectral estimation methods.," Ultrasound Med. Biol., vol. 20, no. 7, pp. 629-638, 1994.
14. JN Hilberath, ME Thomas, T Smith, C Jara, DJ Fitzgerald, K Wilusz, X Liu, and JD Muehlschlegel, "Blood volume measurement by
hemodilution: association with valve disease and re-evaluation of the Allen Formula" ,June 24, 2015.
15. B. H. Su, T. Watanabe, M. Shimizu, and M. Yanagisawa, “Echocardiographic assessment of patent ductus arteriosus shunt flow pattern
in premature infants,” Archives of Disease in Childhood: Fetal and Neonatal Edition, vol. 77, no. 1, pp. F36–F40, 1997.
16. Koert A. deWaal, "The Methodology of Doppler-Derived Central Blood Flow Measurements in Newborn Infants",International Journal
of Pediatrics Volume 2012.
17. M. Kluckow and N. Evans, “Superior vena cava flow in newborn infants: a novel marker of systemic blood flow,” Archives of Dis ease
in Childhood: Fetal and Neonatal Edition, vol. 82, no. 3, pp. F182–F187, 2000.
18. Burns PN, Simpson DH (1998) Pulse inversion Doppler: a new ultrasound technique for nonlinear imaging of microbubble contrast
agents and tissue. Radiology 209(P):190
19. N. Evans, V. Gournay, F. Cabanas et al., “Point-of-care ultrasound in the neonatal intensive care unit: international perspectives,”
Seminars in Fetal and Neonatal Medicine, vol. 16, no. 1, pp. 61–68, 2011.
20. K. de Waal and M. Kluckow, “Functional echocardiography; from physiology to treatment,” Early Human Development,vol. 86, no. 3,
pp. 149–154, 2010.
Authors: Wang Chen Xi, Sara Ravan Ramzani, Imran Ahmed Shahzad
Paper Title: The Effects of Organisational Cultures on Supply, Chain Performance
Abstract: The purpose of this study was to examine the relationship between organizational culture and supply
chain performance. Data were collected with the help of structured questionnaire and then analyzed with the help
of PLS SEM technique. The Results showed that there is a positive and significant impact of organization culture
24. on supply chain performance. Study is useful for both the future researchers and practioners as it highlighted the
newly adopted methodology in the area of supply chain management in specific while logistics in general and
142-148
insight out that the cultural impact is significant while going to green supply chain paradigm.
References:
1. Caifeng Liu, Lin Feng, Guochao Liu, Huibing Wang, Shenglan Liu,” Bottom-up Broadcast Neural Network For Music Genre
Classification”, ScienceDirect,Elsevier,Pattern Recognition, Jan, 2019.
2. Prasenjeet Fulzele, Rajat Singh, Naman Kaushik, Kavita Pandey,” A Hybrid Model For Music Genre Classification”,
Proceedings of 2018 Eleventh International Conference on Contemporary Computing (IC3), Aug, 2018.
3. Nilesh M. Patil, Dr. Milind U. Nemade,” Music Genre Classification Using MFCC, K-NN and SVM Classifier”, International
Journal Of Computer Engineering In Research Trends, Vol. 4, Issue. 2, Feb, 2017.
4. Ahmed Elbir, Hilmi Bilal Cam, Mehmet Emre lyican, Berkay Ozturk, Nizamettin Aydin,” Music Genre Classification and
Recommendation by using Machine Learning Techniques“,Innovations in Intelligent Systems and Applications Conference, Oct,
2018.
5. Pradeep Kumar D, Sowmya B. J., Chetan, and K. G. Srinivasa ,” A Comparative Study of Classifiers for Music Genre
Classification based on Feature Extractors”, IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, Aug, 2016.
6. Anshuman Goel, Mohd. Sheezan, Sarfaraz Masood, Aadam Saleem,” Genre Classification of Songs Using Neural Network”,
International Conference on Computer and Communication Technology (ICCCT), Sept, 2014.
7. Jan Jakubik,” Evaluation of Gated Recurrent Networks in Music Classification Tasks”, Information System Arxhitecture and
Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology, 2017.
8. George Tzanetakis,” Musical Genre Classification of Audio Signals”, IEEE Transactions on Speech and Audio Processing, July,
2002.
9. Lin Feng, Shenlan Liu, Jianing Yao,” Music Genre Classification with Paralleling Recurrent Convolutional Neural Network”,
arXiv, Dec, 2017.
10. Jont B. Allen and Lawrence R. Rabiner,” A Unified Approach to Short Time Fourier Analysis and Synthesis”, Proceeding of the
IEEE, VOL 65, No.11, Nov, 1977.
11. Rikiya Yamashita, Mizuho Nishio, Richard Kinh Gian Do, Kaori Togashi,” Convolution Neural Network: an overview and
application in radiology”, Springer, Volume 9, Issue 4, Aug, 2018.
12. Keren Simonyan and Andrew Zisserman,” Very Deep Convolution Networks For Large Scale Image Recognition”, ICLR 2015.
13. Alex Graves and Navdeep Jaitly,” Towards End-to-End Speech Recognition with Recurrent Neural Networks”, Proceedings of
the 31st International Conference on Machine Learning, vol 32, 2014.
14. Yoshua Bengio, Patrica Simard and Paolo Fransconi,” Learning Dependencies with Gradient Descent is Difficult”, IEEE
Transactions On Neural Networks, Vol 5, No 2, Mar, 1994.
15. Sepp Hochreiter, Jurgen Schmidhuber,” Long Short-term Memory”, Neural Computation, 1997.
16. Yoshua Bengio, Cho et. al,” Learning Phase Representation using RNN Encoder-Decoder for Statistical Machine Transalation”,
arXiv, Sept, 2014.
17. Mike Schuster and Kuldip K. Paliwal,” Bidirectional Recurrent Neural Networks”, IEEE Transactions on Signal Processing, vol
45, no. 11, 1997.
18. Bob L. Strum,” The GTZAN dataset: Its contents, its faults, their effects on evaluation, and its future use”, arXiv, Jun, 2013
19. Understanding LSTM network, Available at: https://colah.github.io/posts/2015-08-Understanding-LSTMs/
20. Mel Frequency Ceptral Coefficient (MFCC) tutorial, Available at: http://practicalcryptography.com/miscellaneous/machine-
learning/guide-mel-frequency-cepstral-coefficients-mfccs/
Paper Title: Enhhanced and Efficient Memory Model For Hadoop Mapreduce
Abstract: Usage of high-performance computing (HPC) infrastructure adopting cloud-computing environment
offers an efficient solution for executing data intensive application. MapReduce (MR) is the favored high
performance parallel computing framework used in BigData study, scientific, and data intensive applications.
Hadoop is one of the significantly used MR based parallel computing framework by various organization as it is
freely available open source framework from Apache foundation. The existing Hadoop MapReduce (HMR)
based makespan model incurs memory and I/O overhead. Thus, affecting makespan performance. For
overcoming research issues and challenges, this manuscript presented an efficient parallel HMR (PHMR)
makespan model. The PHMR includes a parallel execution scheme in virtual computing worker to reduce
makespan times using cloud computing framework. The PHMR model provides efficient memory management
design within the virtual computing workers to minimize memory allocation and transmission overheads. For
evaluating performance of PHMR of over existing model experiment are conducted on public cloud environment
using Azure HDInsight cloud platform. Different application such as bioinformatics, tex mining, stream, and
non-stream application is considered. The overall result obtained shows superior performance is attained by
PHMR over existing model in term of makespan time reduction and correlation among practical and theoretical
makespan values.
Keywords— Big data, Data intensive application, Caching, Cloud computing, high-performance computing,
HMR, Scientific application.
References:
27. 1. K. Taura, T. Endo, K. Kaneda, and A. Yonezawa, “Phoenix: a parallel programming model for accommodating dynamically
joining/leaving resources,” in SIGPLAN Not., vol. 38, no. 10, pp. 216–229, 2003. 161-168
2. B. He, W. Fang, Q. Luo, N. K. Govindaraju, and T. Wang, “Mars: a MapReduce framework on graphics processors,” in Proceedings of
the 17th international conference on Parallel architectures and compilation techniques - PACT ’08, p. 260, 2008.
3. M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, “Dryad: distributed data-parallel programs from sequential building blocks,”
ACM SIGOPS Oper. Syst. Rev., vol. 41, no. 3, pp. 59–72, Mar. 2007.
4. M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica,“Spark: Cluster Computing with Working Sets,” in Proceedings of
the 2nd USENIX Conference on Hot topics in Cloud Computing, (Boston,MA), June 2010.
5. J. Dean and S. Ghemawat, “MapReduce: Simplified Data Processing on Large Clusters,” ACM Commun., vol. 51, no. 1, pp. 107–113,
Jan. 2008.
6. “Apache Hadoop.” [Online]. Available: http://hadoop.apache.org/. [Accessed: 21-july-2018].
7. U. Kang, C. E. Tsourakakis, and C. Faloutsos, “PEGASUS: Mining Peta-scale Graphs,” Knowl. Inf. Syst., vol. 27, no. 2, pp. 303–325,
May 2011.
8. X. Shi et al., "Mammoth: Gearing Hadoop Towards Memory-Intensive MapReduce Applications," in IEEE Transactions on Parallel and
Distributed Systems, vol. 26, no. 8, pp. 2300-2315, Aug. 1 2015.
9. J. Zhu, J. Li, E. Hardesty, H. Jiang and K. C. Li, "GPU-in-Hadoop: Enabling MapReduce across distributed heterogeneous platforms,"
Computer and Information Science (ICIS), 2014 IEEE/ACIS 13th International Conference on, Taiyuan, pp. 321-326, 2014.
10. M. Zaharia, A. Konwinski, A.D. Joseph, R.H. Katz and I. Stoica, &ldquo,Improving Mapreduce Performance in Heterogeneous
Environments,&rdquo, Proc. Eighth USENIX Conf. Operating Systems Design and Implementation (OSDI), pp. 29-42, 2008.
11. D. Dahiphale et al., "An Advanced MapReduce: Cloud MapReduce, Enhancements and Applications," in IEEE Transactions on
Network and Service Management, vol. 11, no. 1, pp. 101-115, March 2014.
12. E. Deelman, G. Singh, M. Livny, B. Berriman and J. Good, "The cost of doing science on the cloud: The Montage example," 2008 SC -
International Conference for High Performance Computing, Networking, Storage and Analysis, Austin, TX, pp. 1-12, 2008.
13. N. Chohan, C. Castillo, M. Spreitzer, M. Steinder, A. Tantawi, and C. Krintz, “See spot run: using spot instances for mapreduce
workflows,” in Proc. 2010 USENIX Conference on Hot Topics in Cloud Computing, ser. HotCloud’10. USENIX Association, pp. 7 –7,
2010.
14. X. Lin, Z. Meng, C. Xu, and M. Wang, “A Practical Performance Model for Hadoop MapReduce,” in Cluster Computing Workshops
(CLUSTER WORKSHOPS), 2012 IEEE International Conference on, pp. 231–239, 2012.
15. X. Cui, X. Lin, C. Hu, R. Zhang, and C. Wang, “Modeling the Performance of MapReduce under Resource Contentions and Task
Failures,” in Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on, vol. 1, pp. 158–163,
2013.
16. W. Xiao, W. Bao, X. Zhu and L. Liu, "Cost-Aware Big Data Processing Across Geo-Distributed Datacenters," in IEEE Transactions on
Parallel and Distributed Systems, vol. 28, no. 11, pp. 3114-3127, 2017.
17. M. Khan, Y. Liu and M. Li, "Data locality in Hadoop cluster systems," 2014 11th International Conference on Fuzzy Systems and
Knowledge Discovery (FSKD), Xiamen, pp. 720-724, 2014.
18. M. Xu, S. Alamro, T. Lan and S. Subramaniam, "CRED: Cloud Right-Sizing with Execution Deadlines and Data Locality," in IEEE
Transactions on Parallel and Distributed Systems, vol. 28, no. 12, pp. 3389-3400, 2017.
19. H. Alshammari, J. Lee and H. Bajwa, "H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jo bs," in IEEE
Transactions on Cloud Computing, vol. PP, no. 99, pp. 1-1, 2016.
20. Daria Glushkova, Petar Jovanovic, Alberto Abelló, “MapReduce Performance Models for Hadoop 2.x”, in Workshop Proceedings of the
EDBT/ICDT 2017 Joint Conference, ISSN 1613-0073, 2017.
21. M. Ehsan, K. Chandrasekaran, Y. Chen and R. Sion, "Cost-Efficient Tasks and Data Co-Scheduling with AffordHadoop," in IEEE
Transactions on Cloud Computing, vol. PP, no. 99, pp. 1-1, 2017.
22. M. Khan, Y. Jin, M. Li, Y. Xiang and C. Jiang, "Hadoop Performance Modeling for Job Estimation and Resource Provisioning," in
IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 441-454, 2016.
23. Khan, M., Huang, Z., Li, M., Taylor, GA., – Optimizing Hadoop parameter settings with gene expression programming guided PSO.
Concurrency Computation: Practice and Experience, DOI: 10.1002/cpe.3786, 2016.
24. Apache, Centralized Cache Management in HDFS. Update date 2014.
25. Y. Huang, Y. Yesha, M. Halem, Y. Yesha and S. Zhou, "YinMem: A distributed parallel indexed in-memory computation system for
large scale data analytics," 2016 IEEE International Conference on Big Data (Big Data), Washington, DC, pp. 214-222, 2016.
26. Zhang, J., et al., A Distributed Cache for Hadoop Distributed File System in Real-Time Cloud Services, in Proceedings of the 2012
ACM/IEEE 13th International Conference on Grid Computing. 2012, IEEE Computer Society. p. 12-21.
27. Longbin, L., et al. ShmStreaming: A Shared Memory Approach for Improving Hadoop Streaming Performance. in Advanced
Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on. 2013.
28. J. Kim, H. Roh and S. Park, "Selective I/O Bypass and Load Balancing Method for Write-Through SSD Caching in Big Data
Analytics," in IEEE Transactions on Computers, vol. 67, no. 4, pp. 589-595, April 1 2018.
29. L. G. Valiant. A bridging model for parallel computation. Communications of the ACM, 33(8):103–111, August 1990
30. G. Malewicz, M. Austern, A. Bik, J. Dehnert, J. Horn, I. Leiser, N. Czajkowski, “Pregel: a system for largescale graph processing,”. In
Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pages 135–146, Indianapolis, Indiana, USA,
2010.
31. T. White, Hadoop: The Definitive Guide. O’Reilly Media, 2009.
32. Saccharomyces genome database (SGD). (2015). [Online] Available: http://www.yeastgenome.org/
33. Influenza Virus Resource. (2015). [Online] Available: http://www.ncbi.nlm.nih.gov/genomes/FLU/FLU.html.
34. Amazon product dataset “http://jmcauley.ucsd.edu/data/amazon/”, last accessed sep 2, 2018.
35. Changjian Wang; Yuxing Peng; Mingxing Tang; Dongsheng Li; Shanshan Li; Pengfei You, "MapCheckReduce: An Improved
MapReduce Computing Model for Imprecise Applications," Big Data (BigData Congress), 2014 IEEE International Congress on , vol.,
no., pp.366,373, June 27 2014-July 2 2014.
36. S. Dooms, T. De Pessemier, and L. Martens, “Movietweetings: a movie rating dataset collected from twitter,” in Workshop on
Crowdsourcing and Human Computation for Recommender Systems, CrowdRec at RecSys, vol. 13, 2013.
Paper Title: Determination of Optimum Position of Shear Wall in an Irregular Building for Zone III & IV
Abstract: Stiffness is the property of the structure that is responsible for absorbing the external forces. For the
case a multistory building, when the height of the building increases, the lateral stiffness of the building
decreases. With low lateral stiffness, the building becomes more vulnerable to lateral forces like wind and
earthquake. In order to prevent the structure from damage from the lateral forces, lateral stiffness is induced in
the structure by means of shear walls. With the introduction of shear wall, we observe a considerable decrement
in lateral displacement and increase in base shear. The resistance of lateral forces in terms of magnitude by shear
wall depends on its location in the building. In this paper, a G+15 storey building is considered. The building is
irregular in nature (T shaped). A comparative study is done to obtain the optimum position of shear wall in the
structure. For optimization, the total length of the shear wall in the structure is kept constant. The whole
modeling and analysis is done by ETABS v. 2016. The comparative study is done on the basis of base shear,
storey displacement & storey drift. The above values are calculated by the dynamic approach of analysis of
building subjected to seismic loading.
Keywords: Shear Wall, Response Spectrum Analysis, Time History Analysis, Irregular Buildings
References:
1. C.V.R.Murthy, Rupen Goswami, A.R. Vijaynarayanan, Vipul V. Mehta, Some Concepts in Earthquake Behaviour of Buildings, Gujarat
State Disaster management Authority.
2. ETABS reference guide by CADD CENTRE.
3. IS 1893(Part 1): 2016.
4. IS 456:2000
5. IS 875 (Part 1 & Part 2): 1967
6. Romy Mohan & C. Prabha, “Dynamic Analysis of RCC Buildings with Shear Wall”, International Journal of Earth Sciences and
Engineering, ISSN 0974-5904, Volume 04, No 06 SPL, October 2011.
7. Bulent Erkmen & Arturo E. Schultz, “Self-Centering Behavior of Unbonded, Post-Tensioned Precast Concrete Shear Walls” , Journal
of Earthquake Engineering,13:1047–1064, 2009,ISSN: 1363-2469 print / 1559-808X online, DOI: 10.1080/13632460902859136.
8. Mario De Stefano & Barbara Pintucchi, “A review of research on seismic behavior of irregular building structures since 2002”, Bull
29. Earthquake Eng (2008) 6:285–308 ,DOI 10.1007/s10518-007-9052-3
9. Varsha R. Harne, “Comparative Study of Strength of RC Shear Wall at Different Location on Multi-storied Residential Building”,
International Journal of Civil Engineering Research. ISSN 2278-3652 Volume 5, Number 4 (2014), pp. 391-400. 174-183
10. J. C. D. Hoenderkamp, “Second Outrigger at Optimum Location on High-Rise Shear Wall, The Structural Design Of Tall And Special
Buildings”, Struct. Design Tall Spec. Build. 17, 619–634 (2008), published online 27 July 2007 in Wiley Inter-science
(www.interscience.wiley.com). DOI: 10.1002/tal.369.
11. Ashish S. Agrawal, S.D. Charkha, “Effect of Change in Shear Wall Location on Storey Drift of Multistorey Building Subjected to
Lateral Loads” , International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 2, Issue 3, May-Jun
2012, pp.1786-1793.
12. Ravikanth Chittiprolu, Ramcharla Pradeep Kumar, “Significance of shear wall in high rise irregular buildings”, Earthquake Engineering
Research Centre.
13. J.V. Sunil Ganesh, Mallikarjun S. Bhandiwad, “Seismic Analysis of Irregular Multistoried Structure with Shear Wall”, The International
Journal of Science & Technology, Vol. 2, 2014, ISSN: 2321 – 919X.
14. R.S. Malik. S.K. Madan, V.K. Sehgal, “Effect of height on Seismic Response Of Reinforced Cement Concrete Framed Buildings With
Curtailed Shear Wall”, Journal of Engineering & Technology, Vol. 1, 2011, DOI : 10.4103/0976-8580.74549
15. M.S. Ainawala, Dr. P.S. Pajgade, “Design of Multistoried RCC Building with and Without Shear Wall”, International Journal of
Engineering Sciences & Research Technology, ISSN: 2277-9655.
16. Wakchaure M.R, Ped S.P, “Earthquake Anlysis Of High Rise Buildings With And Without In Filled Walls”, International Journal of
Engineering and Innovative Technology, Vol. 2, 2012 ISSN ; 2277-3754.
17. Mohamed A. Dahesh, Ahmet Tuken, Nadeem A. Siddique, “Controlling The Earthquake Induced Lateral displacement Of Tc Buildings
Using Shear Walls: Parametric Study”, Springer, DOI: 10.1007/s12517-015-1903-7.
18. P.P Chandukar, Dr. P.S. Pajgade, “Sesmic Analysis of RCC Buildings with and without shear wall”, International Journal Of Modern
Engineering Research, Vol. 3,2013 .ISSN : 2249-6645
19. Ehasn Salimi Firzabad, Dr. K. Rama Rao, Bahador Bagheri, “Effect of shear wall configuration on Seismic Performance of Buildings”,
ACEE, DOI: 02.AETACE.2012.3.7
20. Suchta Tuppad, R.J. Fernandes, “Optimum Location of Shear Wall in a multi-story building subjected to seismic behavior using genetic
algorithm”, International Research Journal of Engineering and Technology, Vol. 2, 2015, ISSN 2395-0056.
21. Abhija Moha, Arathi S, “Comparison of RC Shear Wall with openings in Regular and Irregular Building”, International Journal of
Engineering Research & Technology, Vol. 6, June 2017, ISSN : 2278-0181.
22. S.K Hirde and N.K. Shelar, “Effect of position of RC Shear Wall on Seismic Performance of Buildings on Plain and Sloping Grounds”,
International Journal of Current Engineering and Technology, Vol. 5, 2015 ISSN : 2277-4106.
23. Poornima D, Sajay S J, Yajnobhavi HM, “Seismic Analysis of RC Residential Multistorey Buildings for different locations of sh ear
wall”, International Journal of Science Technology & Engineering, Vol. 3, 2017. ISSN : 2349-784X
24. Lakshmi K.O., Prof. Jayshree ramanujan, Mrs. Bindu Sunil, Dr. Taju Koltali, Prof. Mercy Joseph, Poweth, “Effect of Shear Wall
location in buildings subjected to seismic loads”, ISOI Journal of Engineering and Computer Science, Vol.1, 2017
Farida Smolnikova, Zhayik Tokhtarov, Nadezhda Kenijz, Elena Nelyubina, Igor Grigoryants,
Authors:
Elena Bobkova, Olga Orlovtseva, Alla Konobeeva, Natalia Nikolaeva
30. Technological Process of Germination of Wheat Grain under the Water Tincture of Aloe and ITS
Paper Title:
Physical-Chemical Properties
Abstract: Germination of wheat grain promotes the transition of hardly digestible nutrients into an easily
accessible form with increasing the amount of vitamins and minerals. This paper presents the technological
process of wheat grain germination under the water tincture of aloe. The germinating power and ability of wheat
grain grown in 25% solution of water tincture of aloe are 95% and 95%, respectively. The analysis of the data
shows that the amount of all nutrients decreases, since the destruction of the protein-carbohydrate complex. The
activity of enzymes increases, and the cellular destruction of the endosperm occurs. Carbohydrates reduction is
associated with intensive grain respiration. Germination is also associated with a decrease in fat from 2.45% to
1.25%.
Index Terms: rumen, treatment, alkaline, sodium hydroxide, protein loss, water-binding capacity
References:
1. Tretyak, L., Rebezov, M., Toshev, A., Zalilov, R., Prokhasko, L., Abuova, A., Loretts, O., Okuskhanova, E., Zaitseva, T., 201 7. The use
of ozone-air mixture for reduction of microbial contamination in grain brewing raw material. Annual Research and Review in Biology,
14 (6), pp. 1-9.
2. Osintseva, D., Osintsev, E., Rebezov, M., Prokhasko, L., Seilgazina, S., Kurmanbayev, S., Nurzhumanova, Z., Yessimbekov, Z.,
Voytsekhovskiy, V., Maksimiuk, N., Zalilov, R., 2017. Ozonation and microwave treatments as new pest management methods for 184-187
grain crop cleaning and disinfection. Annual Research and Review in Biology. 20 (5).
3. Morita, N., Miyake, K., Maeda, T., Van Hung, P., 2013. Germinated buckwheat for functional foods, Advances in cereal and
pseudocereal research for functional foods, pp. 75-90.
4. Safronova, T.N., Kazina, V.V., Safronova, K.V., 2017. Development of technological parameters of wheat germination. Technique and
technology of food production, (44:1), pp. 37-43.
5. Kulushtayeva, B., Nurymkhan, G., Smolnikova, F., Okuskhanova, E., Kozubayeva, L., Abilova, M., Khayrullin, M., Kisimov, B., 2019.
Technology of production, nutritional value and food safety of gluten free bread. International Journal of Recent Technology and
Engineering, 7 (6), pp. 1338-1344.
6. Khoneva, M.S., Rudenko, O.V., Usatikov, S.V., Bugayets, N.A., Tamova, M.Y.U., Fedorova, M.A., Mogilny, M.P., 2018. Optimizing
technological process of hydroponic germination of wheat grain by graphic method. Journal of Pharmaceutical Sciences and Research,
10 (2), pp. 381-390.
7. Bastrikov, D., Pankratov, G., 2006. Change in the biochemical properties of grain during watering. Bakery products, (1), pp. 40-41.
8. Rumyantsev, A. V., Glukhovtsev, V. V., Kukushkina, L. A., 2015. Scientific advances in the selection of varieties of spring soft wheat.
Legumes and cereals, (2 (14), pp. 58-63.
9. National Standard GOST 9404-88. Flour and bran. Method of moisture content determination. 1990.
10. Zhurba, O.V., Dmitriev M.Ya., 2005. Medicinal, poisonous and harmful plants. Moscow: KolosS.
11. Olennikov, D.N., Zilfikarov, I.N., Ibragimov, T.A., 2010. A study of the chemical composition of aloe tree. Chemistry of plant
materials, 3, pp. 77–82.
Authors: Savitha C, D. Ramesh
Paper Title: Distribution Based Crowd Abnormality Detection
Abstract: The complications of abnormal behavior and behavior identification are very eminent problems in
the video processing. Abnormal behavior detector can be designed by choosing the region of interest through
feature detector and by tracking them over the short time period. Therefore, the detector shows the trade-off
among the object tracking and optical flow. Since, various regions normally display the various types of motion
pattern, we introduce Distribution Based Crowd Abnormality Detection (DCAD) which catches the statistics of
object trajectories which are passing via the Spatio-temporal cube. This technique directly provides the
distribution to define the frame. Also clustering is not required to build the dictionary. Besides, we exploited the
motion trajectories to calculate the “power potentials” in the pixel space which defines the amount of
interaction among the people. Furthermore, utilize the standard method for classification by considering SVMs
(Support Vector Machines) discriminative learning method to recognize the abnormalities.
Keywords: Detection, Tracking, Template Detector, Distribution Based Crowd Abnormality Detection
(DCAD), UMN Dataset.
References:
31. 1. Saurabh Maheshwari, Surbhi Heda, “A Review on Crowd Behavior Analysis Methods for Video Surveillance”, ACM, pp.1 -5, March
2016
2. Sjarif, Nilam & Shamsuddin, Siti Mariyam & Mohd Hashim, Siti. (2012). “Detection of abnormal behaviors in crowd scene: A review”. 188-195
International Journal of Advances in Soft Computing and its Applications. 4.
3. Min Sun, Dongping Zhang, Leyi Qian, Ye Shen, “Crowd Abnormal Behavior Detection on Label Distribution Learning”, 8th
International Conference on Intelligent Computation Technology and Automation (ICICTA), Nanchang, pp. 345-348. IEEE-2015
4. Zhao T, Nevatia R "Bayesian human segmentation in crowded situations", vol 2. Computer Vision Pattern Recognition 2003 IEEE
Computer Society Conference, pp 459–466
5. Rabaud V, Belongie S (2006) "Counting crowded moving objects", 2006 IEEE Computer Society Conference on Computer Vision
Pattern Recognition (CVPR’06), pp 705–711
6. Krausz B, Bauckhage C "Analyzing pedestrian behavior in crowds for automatic detection of congestions", 2011 IEEE Internatio nal
Conference on Computer Vision Workshops (ICCV workshops), Barcelona, 2011, pp 144–149
7. H. Fradi, B. Luvison and Q. C. Pham, "Crowd Behavior Analysis Using Local Mid-Level Visual Descriptors," in IEEE Transactions on
Circuits and Systems for Video Technology, vol. 27, no. 3, pp. 589-602, March 2017
8. Rittscher J, Tu PH, Krahnstoever N (2005) "Simultaneous estimation of segmentation and shape", 2005 IEEE Computer Society
Conference on Computer Vision Pattern Recognition (CVPR’05), pp 486–493
9. Y. Hao, J. Wang, Y. Liu, Z. Xu and J. Fan, "Extracting Spatio-Temporal Texture signatures for crowd abnormality detection," 2017
23rd International Conference on Automation and Computing (ICAC), Huddersfield, IEEE 2017, pp. 1-5
10. Solmaz B, Moore BE, Shah M (2012) "Identifying behaviors in crowd scenes using stability analysis for dynamical systems". IEEE
Transactions On Pattern Analysis And Machine Intelligence 34:2064–2070
11. Hu M, Ali S, Shah M (2008) "Detecting global motion patterns in complex videos". 2008 19th International Conference on Pattern
Recognition, IEEE Tampa, FL, 2008, pp.1-5.
12. Kratz L, Nishino K (2009) "Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models". Computer
Vision Pattern Recognition CVPR 2009 IEEE Conference, pp 1446–1453
13. Kratz L, Nishino K (2010) "Tracking with local spatio-temporal motion patterns in extremely crowded scenes". Computer Vision
Pattern Recognition (CVPR) 2010 IEEE Conference, pp 693–700
14. L. Lazaridis, A. Dimou and P. Daras, "Abnormal Behavior Detection in Crowded Scenes Using Density Heatmaps and Optical Flow,"
2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 2060-2064.
15. Shaoci Xie, B. Xiaohong Zhang, Jing Cai, " Video crowd detection and abnormal behavior model detection based on machine learning
method," in Springer, Neural computing and applications January 2019, Volume 31, Supplement 1, pp 175–184
16. Mengshi Qi, Yunhong Wang, “Stag-Net: "An Attentive Semantic RNN for Group Activity and Individual Action Recognition” IEEE
Transactions On Circuits And Systems For Video Technology 2019. DOI 10.1109/TCSVT.2019. 2894161
17. Aggarwal, J.K., Ryoo, M.S.: “Human Activity Analysis: a Review”. ACM 43, 3 (2011).
18. Mehran,R, Oyama.A, Shah,M.: "Abnormal Crowd Behavior Detection Using Social Force Model. In: Computer Vision and Pattern
Recognition”, IEEE Conference on CVPR 2009, pp.935–942.
19. Kim,S.,Guy,S.J.,Manocha,D.”Velocity-based modeling of physical interactions in multi-agent simulations”. In: Proceedings of the 12th
ACM SIGGRAPH/Eurographics Symposium on Computer Animation, pp. 125–133 (2013)
20. Yang,W.,Wang,Y., Lan,T., Robinovitch,S.N., Mori,G.: "Discriminative Latent Models For Recognizing Contextual Group Activities".
IEEE Trans. Pattern Anal. Mach. Intell. 34(8), 1549–1562 (2012)
21. Chen, D.Y., Huang, P.C.: "Motion-based unusual event detection in human crowds".Elsevier, Journal of. Visual. Communication and.
Image Representation. 22(2), 178–186 (2011).
22. Shao,J.,Chen,C.L.,Wang,X.: "Learning scene-independent group descriptors for crowd understanding". IEEE Trans. Circuits Syst.
Video Technol. 27(6), 1290–1303 (2017).
23. Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) "Anomaly detection in crowded scenes". CVPR, p 250.
24. Hu X, Hu S, Huang Y, Zhang H, Wu H (2016) "Video anomaly detection using deep incremental slow feature analysis network". IET
Comput Vis 10:265.
25. Mousavi H, Nabi M, Kiani H, Perina A, Murino V (2015) “Crowd motion monitoring using tracklet-based commotion measure”. In:
Image Processing (ICIP), 2015 IEEE International Conference, pp 2354–2358.
26. Ravanbakhsh M, Nabi M, Mousavi H, Sangineto E, Sebe N ”Plug-and-play CNN for crowd motion analysis: an application in abnormal
event detection”. arXiv:1610.00307v3 27 Jan 2018.
27. Zhou S, Shen W, Zeng D, Fang M, Wei Y, Zhang Z (2016) “Spatial–temporal convolutional neural networks for anomaly detection and
localization in crowded scenes”. Signal Process: Image Communication Volume 47, September 2016, Pages 358-368
28. Rabiee H, Haddadnia J, Mousavi H, Nabi M, Murino V, Sebe N (2016) “Emotion-based crowd representation for abnormality
detection”. preprint: arXiv:1607.07646.
29. Rabiee H, Haddadnia J, Mousavi H (2016) "Crowd behavior representation: an attribute-based approach”, Springer Plus 5:1179.
30. Chen K, Gong S, Xiang T, Change Loy C (2013) “Cumulative attribute space for age and crowd density estimation” IEEE conference
on computer vision and pattern recognition, pp 2467–2474.
31. Wang H, Kläser A, Schmid C, Liu C-L (2011) “Action recognition by dense trajectories”, Computer Vision Pattern Recognition
(CVPR) 2011 IEEE Conference, pp 3169–3176.
32. W. Ge, R. T. Collins, and R. B. Ruback, “Vision-based analysis of small groups in pedestrian crowds”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 34, no. 5, pp. 1003–1016, 2012
33. H. Fradi; B. Luvison; Q. C. Pham, "Crowd Behavior Analysis Using Local Mid-Level Visual Descriptors," in IEEE Transactions on
Circuits and Systems for Video Technology, vol.PP, no.99, 2017.
34. T. Bai and J. Tan, "Automatic detection and removal of high-density impulse noises," in IET Image Processing, vol. 9, no. 2, pp. 162-
172, 2015
35. Anna Yankovskaya, Yury Dementyeve, Artem Yamshanovb", Application of Learning and Testing Intelligent System with Cognitive
Component Based on Mixed Diagnostics Tests," in Procedia - Social and Behavioral Sciences 206 ( 2015 ) 254 – 261
36. V. Saligrama and Z. Chen, “Video anomaly detection based on local statistical aggregates,” in IEEE Conference on Computer Vis ion
and Pattern Recognition, CVPR, 2012, pp. 2112–2119.
37. Octavio Camarena, Erik Cuevas , MarcoPérez-Cisneros, Fernando Fausto, Adrián González, and Arturo Valdivia “LS-II: An Improved
Locust Search Algorithm for Solving Optimization Problems”, Mathematical Problems in Engineering, Volume 2018, Article ID
4148975.
38. Y. Cong, J. Yuan, and J. Liu, “Sparse reconstruction cost for abnormal event detection.” in Computer Vision and Pattern Recog nition,
CVPR, 2011, pp. 3449–3456
39. S.Wu, B. E. Moore, and M. Shah, “Chaotic invariants of lagrangian particle trajectories for anomaly detection in crowded scenes,” in
IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2010, pp. 2054–2060.
40. Raghavendra, R. & Del Bue, Alessio & Cristani, Marco & Murino, Vittorio. (2011). “Abnormal Crowd Behavior Detection by Social
Force Optimization”. Springer 134-145. 10.1007/978-3-642-25446-8_15.
41. W. Li, V. Mahadevan, and N. Vasconcelos, “Anomaly detection and localization in crowded scenes,” IEEE Trans. Pattern Analysis and
Machine Intelligence, vol. 36, no. 1, pp. 18–32, 2014.
42. V. Kaltsa, A. Briassouli, I. Kompatsiaris, L. J. Hadjileontiadis, and M. G. Strintzis, “Swarm intelligence for detecting interesting events
in crowded environments,” IEEE Transactions on Image Processing, vol. 24, no. 7, pp. 2153–2166, 2015.
Authors: Babji Prasad Chapa, Sasibhushana Rao Gottapu, Suresh Dannana
Paper Title: Performance Analysis of CBSS for CR Based 5G
Abstract: With the rapid and continuous growth of mobile users and services across the world, 5G is
anticipated to be the next step in the development of the cellular network. The conceptualized architecture for
5G uses a dynamic spectrum sharing (DSS) approach to include a common spectrum resources that is shared by
a multitude of varied network entities and systems. While this proposed solution would vitally enhance the entire
efficiency of spectrum. In this situation, the unique function of spectrum sensing (SS) that belongs to the
cognitive radio (CR) paradigm is recently being introduced as one of the primary facilitators for effective DSS
with less interference. The dissemination of the testing criteria for the detection problem is examined in this
32. paper to get the precise formulas for probability false alarm (Pf) and detection probability (Pd). The performance
of the covariance detector can be evaluated by using pd and pf expressions. Finally, theoretical Pd, Pf expressions 196-200
are verified with simulations.
Index Terms: Cognitive radio, Detection probability, Dynamic spectrum access, False alarm probability,
Spectrum sensing.
References:
1. Panwar N, Sharma S, Kumar Singh A, “A survey on 5G: the next generation of mobile communication,” Elsevier Phys Commun
18(2), 2016 pp. 64–84.
2. Andrews JG , “What will 5G be?,” IEEE J Sel Areas Commun 32(6), 2014, pp.1065–1082.
3. Mitola J, Maguire GQ, “Cognitive radio: making software radio more personal,” IEEE Pers Commun 6(4), 1999, pp. 13-18.
4. Yucek T, Arslan H, “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE Commun Surv Tutorials
11(1), 2009, pp. 116–130.
5. Ali A, Hamouda W, “Advances on spectrum sensing for cognitive radio networks: theory and applications,” IEEE Commun Surv
Tutorials, 2016, PP(99):
6. ASonneschein & P. M. Fishman, “Radiometric detection of spread spectrum signals in noise of uncertain power,” IEEE Trans.
Aerosp. Electron. Syst., 1992, vol. 28, no. 3, pp. 654–660.
7. Mariani, A. Giorgetti, & M. Chiani, “Effects of noise power estimation on energy detection for cognitive radio applications,”
IEEE Trans. Commun., 2011, vol. 59, no. 12, pp. 3410–3420.
8. V. Rakovic, D. Denkovski, V. Atanasovski, P. Mähönen, & L. Gavrilovska, “Capacity-aware cooperative spectrum sensing based
on noise power estimation,” IEEE Trans. Commun., 2015, vol. 63, no. 7, pp. 2428–2441.
9. A.Taherpour, M. Nasiri-Kenari, & S. Gazor, “Multiple antenna spectrum sensing in cognitive radios,” IEEE Transactions on
Wireless Communications, 2010, vol. 9, no. 2, pp. 814–823.
10. Y. Zeng, & Y. C. Liang, “Spectrum sensing algorithms for cognitive radio based on statistical covariance,” IEEE Trans. Veh.
Technol., 2009, vol. 58, no. 4, pp. 1804–1815.
11. Y. Zeng, Y. Laing, E. Peh, & A. T. Hoang, “Cooperative Covariance and Eigenvalue Based Detections for Robust Sensing,” in
IEEE Global Telecommunications Conference(GLOBECOM), IEEE, 2009, pp. 1–6.
12. Z. D. Bai, “On the distribution of largest eigenvalue in principle components analysis,” Anal. Statist., 2001, vol. 29, no. 2, pp.
295–327
13. Z.D. Bai, “Methodologies in spectral analysis of large dimensional random matrices, a review,” Statist. Sinica, 1999, vol. 9, pp.
611–677.
14. Y. Zeng and Y.C. Liang, “Eigenvalue-based spectrum sensing algorithms for cognitive radio,” IEEE Trans. Commun., 2009, vol.
57, no. 6, pp. 1784–1793.
15. F. Penna, R. Garello, D. Figliloli, & M. A. Spirito, “Exact nonasymptotic threshold for eigenvalue based spectrum sensing,” in
Proc. 4th Int. Conf. Cognitive Radio Oriented Wireless Netw. Commun., Hannover, Germany, 2009.
16. M. Chaini & A. Zanella , “Joint distribution of an arbitrary subset of the ordered eigenvalues of Wishart matrices,” in IEEE 19th
International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2008, pp.1–6.
Paper Title: Determinant Factors of Environmental Responsibility for the Passenger Car Users
Abstract: The main aim of this study is to find out the demographic variables and their driving factors
influencing the environmental responsibility of passenger car users. There are around 73.85 million passenger
car was produced (OICA, 2018), and it is forecasted that 2 billion of car expected on the road before the end of
2040. Vehicles are the primary generator of emission per liter of fuel exhausts around 140-210 Co2/km released
in the air. The people who are using the vehicles are to be held responsible for the vulnerability which is resulted
35. because of emission from the tailpipe. According to the Japan Automobile Manufacturer Association (JAMA),
80% of tailpipe emission was released by the vehicle users and the remaining 20% by the vehicle manufacturers.
Therefore this paper understands the factors influencing the environmental responsibility of the passenger car 219-224
users.
Keyword : CatBoosting, Support Vector Regression, Acoustic signals, Earthquake, Exploratory Data
Analysis, Skew, RMS, Peak.
References:
1. V.M> Zobin, Introduction to volcanic seismology. Elsevier,2011.
2. W.H. Lee, P. Jennings ,C. Kissinger and H.Kanamori. International handbook of earthquake and engineering seismology. Academic
Press,@002,Vol.81.
3. Y. Peng, R. Lahusen, B. Shriazi and W.Song, “Design of smart sensing component for volcano monitoring.” in IET 4th Internatio nal
Conference on Intelligent Environments,July 2008,pp.1-7.
4. R.P.Duin,M.Orozoo-Alzate and J.M. Londono-Bornilla, “Classi-~ fication of volcano events observed by multiple seismic stations,” in
2-0th International Conference on Pattern Recgnition(ICPR),2010,pp.1052-1055.
5. R. Lara-ueva, P. Bernal, M.G. Saltos,D. Ben’itez and J.L Roiolvarez. “Time and frequency feature selection for seismic events from
cotopaxi volcano.” in Asia-Pacific Conference on Computer Aided System Engineering(APCASE).2014,2015,pp.129-134.
6. D. Cardenas-Pe’na,M. Orozoo-Alzate, and G. Castellanos-Dominguez,”Selection of time-variant features for earthquake classification at
the nevado-del-ruiz volcano, “Computers & Geosciences,vol. 51,pp.293-304,2013
7. B.J. Restrepo, M. Alvarez , and R.Henao, “Comparison between gen- ‘ erative and discriminative approaches for seismic events
classification- Comparaioin entre enfoques generativos y discrimativos para la’ classification de eventos s ‘’ ismicos, “Scientia et
Technica,vol.1,no.37,2007.
8. R.A. Lara-cueva,D.S Bentez E.V. Carrera,M.Ruiz, and J.L> Roig-Ivarez,”Automatic recognition of long period events from volcano
earthquakes at cotopaxi volcano, “IEEE Transactions on Geoscience and Remote Sensing,vol.54,no.9.pp.5247-5257,2016.
9. G.Curilem,J. Vergara,G. Fuentealba, G.Agnua and M.Chag “on ‘ “Classification of seismic signals at Villarrica volcano(Chile) using
neural networks and genetic algorithms, “Journal of Volcanology and Geothermal research,vol.180,no.1,pp.1-8,2009.
10. R.Lara-cueva,D.Ben’itez,E.Carrera,M.Ruiz,an d J.Roig-Alvaraz,’ “Feature selection of seismic waveforms for long period event
detection at cotopaxi volcano, “Journal of Volocanlogy and Geothernal research, vol.316,pp.34-49,2016.
11. Precursory Pattern based Feature Extraction Techniques for Earthquake Prediction. Lei Zhang, LangchunSi, Haipeng yang, Yuanzh i Hu,
Jianfeng Qiu.
Paper Title: Mechanical Behaviour of Fibre Reinforced Concrete using Shape Memory Alloys
Abstract: Usage of smart materials in concrete is extensively increasing. This study focuses on behavior of
fiber reinforced concrete, using shape memory alloys (SMA) fibers. SMA adopted for this study is NiTi shape
memory alloy crystals. Concrete is tested for slump and mechanical properties tested are compressive strength
for 7 and 28 days. Flexural strength is tested for 28 days. Constant rates of 1% of SMA fibers are added to the
concrete mix. Also regular steel fiber reinforced is prepared and test values are compared with SMA fiber
reinforced concrete.
Keyword : shape memory alloy (SMA), fiber reinforced concrete, mechanical properties, steel fibers.
References:
1. Yamen Ibrahim Elbahy, Maged A. Youssef, Flexural behaviour of superelastic shape memory alloy reinforced concrete beams during
loading and unloading stages, Engineering Structures,
Volume 181,2019,Pages 246-259, ISSN 0141-0296,
37. https://doi.org/10.1016/j.engstruct.2018.12.001.
2. Abdulsamee M. Halahla, Yazan B. Abu Tahnat, Amin H. Almasri, George Z. Voyiadjis, The effect of shape memory alloys on the
ductility of exterior reinforced concrete beam-column joints using the damage plasticity model, Engineering Structures, 230-232
Volume 200,2019,109676, ISSN 0141-0296,
https://doi.org/10.1016/j.engstruct.2019.109676.
3. Qiwen Chen, Moochul Shin, Bassem Andrawes,Experimental study of non-circular concrete elements actively confined with shape
memory alloy wires,Construction and Building Materials,
Volume 61,2014,Pages 303-311, ISSN 0950-0618,
https://doi.org/10.1016/j.conbuildmat.2014.02.076.
4. B. Mas, D. Biggs, I. Vieito, A. Cladera, J. Shaw, F. Martínez-Abella, Superelastic shape memory alloy cables for reinforced concrete
applications, Construction and Building Materials,Volume 148, 2017, Pages 307-320, ISSN 0950-0618,
https://doi.org/10.1016/j.conbuildmat.2017.05.041.
5. Joan M. Rius, Antoni Cladera, Carlos Ribas, Benito Mas,Shear strengthening of reinforced concrete beams using shape memory alloys,
Construction and Building Materials,Volume 200,2019,
Pages 420-435,ISSN 0950-0618,
https://doi.org/10.1016/j.conbuildmat.2018.12.104.
6. Farhad Aslani, Yinong Liu, Yu Wang,The effect of NiTi shape memory alloy, polypropylene and steel fibres on the fresh and
mechanical properties of self-compacting concrete,Construction and Building Materials,Volume 215,2019,Pages 644-659,ISSN 0950-
0618,
https://doi.org/10.1016/j.conbuildmat.2019.04.207.
Keyword : Recycled aggregate (RA), Pervious concrete, Compressive strength, Split Tensile strength, Bearing
strength and ANSYS Software
References:
1. Alalea Kia, Hong S. Wong, Christopher R. Cheeseman, “Defining clogging potential for permeable concrete”, “Journal of
Environmental Management”, page no 44-53, 2018
2. Dang Hanh Nguyen, Mohamed Boutouil, Nassim Sebaibi, Fabienne Baraud, Lydia Leleyter, “Durability of pervious concrete using
crushed seashells”, “Construction Building Materials”, page no 137-150, 2017
3. Iveta Novakova, Karel Mikulica, “Properties of concrete with partial replacement of natural aggregate by recycled concrete aggregate
from precast production”, “Procedia Engineering”, page no 360-367, 2016
4. Jigar J. Anghan , Harsh V. Gevariya, Jugal Mistry, “A Review Paper on Permeable Concrete as A Road Pavement for a Storm Water”,
“International Journal for Scientific Research & Development” Vol. 6, Issue 02, 2018 ISSN (online): 2321-0613.
5. Memery Serifou, Z.M.Sbrtai, S.Yotte, M.O.Boffoue, E.Emeruwa, F.Bos, “A Study of concrete made with fine and coarse aggregates recycled
from fresh concrete waste”, “Hindawi Publishing Corporation Journal of construction Engineering”, Vol. 5, pages 1-5, Article ID 317182,
2013
6. Neetu B. Yadav, Jayesh A. Shah, Rushabh A. Shah, “Pervious Concrete: Solution for Low Cost Construction”, “International Journal of
Innovative Science and Modern Engineering”, Vol.1, Issue-10, September 2013, ISSN: 2319–6386
7. P. Saravana Kumar; and G. Dhinakaran, “Effect of Admixed Recycled Aggregate Concrete on Properties of Fresh and Hardened Concrete”,
“Journal of Materials in Civil Engineering”, Vol.24 Issue 4 - April 2012.
8. Prachi Sohoni and Vaishali Sahu, “Comparative Strength studies of Recycled aggregate concrete and Fresh Concrete”, “Civil
Engineering urban planning: An International journal”, Vol.2 No.3, 2015
9. Suraya Hani Adnan, Lee Yee Loon ,Ismail Abdul Rehman, Hamidah Mohd Saman, Mia Wimala Soejoso, Fakulti Kejuruteraan Awam
dan Alem Sektiar, “Compressive strength of recycled aggregate concrete with various percent of recycled aggregate”, “National Seminar
on Civil Engineering Research (SEPKA 2007), 11-12 December 2007”, Universiti Teknologi Malaysia, Skudai.
Keyword : Simulation modeling, intracranial pressure, brain tissue temperature, MATLAB, hyperthermia,
cerebral blood volume
References:
16. . H. Ropper, R. H. Brown, “Adams and Victor’s principles of neurology”, 8 th ed. New York, NY:McGraw-Hill; 2005, pp: 529-545.
17. R. G. Geocadin, P. N. Varelas, D. Rigamonti, and M. A. Williams, “Continuous intracranial pressure monitoring via the shunt reservoir
to assess suspected shunt malfunction in adults with hydrocephalus,” Neurosurg. Focus, vol. 22, no. 4, 2007, p. E10.
18. C. Hamani, M. V. Zanetti, F. C. Pinto, A. F. Andrade, O. Ciquini Jr., and R. Marino Jr., “Intraventricular pressure monitorin g in patients
with thalamic and ganglionic haemorrhages,” Arq Neuropsiquiatr, vol. 61, no. 2B, 2003, pp. 376-380.
19. W. R. Gowers, “A Manual of Diseases of the Nervous System. Philadelphia”, PA: P. Blakiston Son and Co., 1895.
39. 20. J. Guillaume, P. Janny, “Manometrie intracranienne continue interest de la method et premiers resultants”, Rev Neu rol 84: 131-142,
1951.
21. R. Aaslid, T. M. Markwalder, H. Nornes, “Noninvasive transcranial Doppler ultrasound recording of flow velocity in basal cere bral 239-246
arteries”, J Neurosurg., Dec; 57(6), 1982, pp:769–74.
22. J. Bellner, B. Romner, P. Reinstrup, K. A. Kristiansson, E. Ryding, and L. Brandt, “Transcranial Doppler sonography pulsatility index
(PI) reflects intracranial pressure (ICP),” Surgical Neurology, vol. 62, no. 1, 2004, pp. 45–51.
23. S. G. Voulgaris, M. Partheni, H. Kaliora, N. Haftouras, I. S. Pessach, and K. S. Polyzoidis, “Early cerebral monitoring using the
transcranial Doppler pulsatility index in patients with severe brain trauma,” Medical Science Monitor, vol. 11, no. 2, 2005, pp. CR49–
CR52.
24. J. A. Moreno, E. Mesalles, J. Gener et al., “Evaluating the outcome of severe head injury with transcranial Doppler ultrasonography”,
Neurosurgical Focus, vol.8, no.1, articlee8, 2000.
25. A. Behrens, N. Lenfeldt, K. Ambarki, J. Malm, A. Eklund, and L. O. Koskinen, “Transcranial Doppler pulsatility index: not an accurate
method to assess intracranial pressure,” Neurosurgery, vol. 66, no. 6, 2010, pp. 1050–1057.
26. M. Ursino, M. Iezzi, and N. Stocchetti, “Intracranial pressure dynamics in patients with acute brain damage: a critical analy sis with the
aid of a mathematical model”, IEEE Trans. Biomed. Eng. 42: 529–540, 1995.
27. M. Ursino, C. A. Lodi, S. Rossi, and N. Stocchetti, “Intracranial pressure dynamics in patients with acute brain damage”, J. Appl.
Physiol. 82: 1270–1282, 1997.
28. Y. Nakagawa, M. Tsuru, and K. Yada, “Site and mechanism for compression of the venous system during experimental intracranial
hypertension”, J. Neurosurg. 41: 427–434, 1974.
29. J. D. Michenfelder, Cerebral Blood Flow and Metabolism, In: Cucchiara RF, Michenfelder JD(ed) Clinical neuroanesthesia . Churchill
Livingstone, New York, pp: 1-40, 1990.
30. L. Leenders, et al, “Cerebral Blood Flow, Blood Volume and Oxygen Consumption”, Brain 113, 113:27-47, 1990.
31. A. Jung, “Statistical analysis of biomedical data”, PhD Thesis, 2003.
32. F. J. W. Roughton and J. W. Severinghaus, “Accurate determination of O 2 dissociation curve of human blood above 98.7% saturation
with data on O2 solubility in unmodified human blood from 0° to 37 °C”, Journal of Applied Physiology, 35(6):861-869, December
(1973).
33. J. W. Severinghaus, “Simple, accurate equations of human blood O 2 dissociation computations”, Journal of Applied Physiology, 46:
599-602, January-June (1979).
34. A. Zwart, G. Kwant, B. Oeseburg and W. G. Zijlstra, “Human whole body oxygen affinity: effect of temperature”, Jour nal of Applied
Physiology, 57:429-434, July-December (1984).
35. A. V. Hill, “The possible effects of the aggregation of the molecules of haemoglobin on its dissociation curve”, Journal of Physiology,
XL:iv-vii, 1910.
36. G. A. Truskey, F. Yuan, and D. F. Katz, “Transport Phenomena in Biological Systems”, chapter Oxygen-Haemoglobin Equilibria,
Prentice Hall, 2004.
37. J. G. Stone, R. R. Goodman, K. Z. Baker, C. J. Baker, and R. A. Solomon, “Direct intraoperative measurement of human brain
temperature”, Neurosurgery, vol. 41, no. 1, 1997, pp. 20–24.
38. M. S´egol`ene, V. Fanny, and G. Thomas, “Review Article: Brain Temperature: Physiology and Pathophysiology after Brain Injury ”,
Hindawi Publishing Corporation, Anesthesiology Research and Practice, Volume 2012, Article ID 989487, 13 pages, doi:
10.1155/2012/989487.
39. M. Cabanac, “Adjustable set point: to honor Harold T. Hammel,” Journal of Applied Physiology, vol. 100, no. 4, 2006, pp. 1338 –1346.
40. W. J. Greeley, et al, “The Effect of Hypothermic Cardiopulmonary Bypass and Total Circulatory Arrest on Cerebral Metabolism in
Neonates, Infants and Children”, Journal of Thoracic and Cardiovascular Surgery, vol. 101, 1991, pp: 783-794.
41. W. J. Thoman, et al., “A Computer Model of Intracranial Dynamics”, 19 th International Conference-IEEE/EMBS, Oct. 30-Nov. 2, 1997,
pp: 2197-2200, Chicago, IL. USA.
42. L. D. Mishra, “Cerebral blood flow and anaesthesia: a review”, Indian J. Anaesth. 2002; 46(2): 87-95.
43. A. Lumb, “Carbon dioxide. In: Nunns Applied Respiratory Physiology”, 6th ed. Oxford: Butterwoth Heineman, 2005: Chapter 10,
222-48.
44. C. Geers, G. Gros, “Carbon dioxide transport and carbonic anhydrase in Blood and muscle”, Physiological Reviews 2 000; 80(2):
681-15.
45. G. J Arthurs, M. Sudhakar, “Carbon dioxide transport”, Continuing
Education in Anaesthesia Critical Care & Pain, Volume 5, Issue 6, 1 December 2005, pp: 207–210, doi: 10.1093/bjaceaccp/mki050
46. H. Chris, “Calculated and measured bicarbonate: is there a difference?”, The Biomedical Scientist, November 2008, pp: 959-961.
47. T. Alifia, K. Hari, “Cerebral Physiology, Continuing Education in Anaesthesia”, Critical Care & Pain, Vol. 13, No. 4, 2013.
48. K. Goyal, M. Uddin, S. K. Salwan, “Modeling and simulation study of cerebrospinal fluid circulation in human brain”, IEEE 4 th
International conference (SPIN 2017), pp: 104-108.
Paper Title: A Structural Equation Modeling on Analysis of Preference Advertisement in Building Brand Equity
Abstract: Preference advertisement is a promotional system in which marketer claims the superiority of their
product or brand over competing product(s) or brand, directly or indirectly. Preference advertisement helps in
comparing alternative brands on bases of features, price, and other distinctive information. Brand equity is the
total worth of the brand. Brand equity can be measured in two different perspective i.e. cognitive psychology is
the attribute perception that is related to the awareness regarding the brand features and associations whereas
another information economics is associated towards strong brand name which is created through the quality of
the product and good quality generates a premium prices for the brand. In the monetary terms it’s the value that
the organization expects from the brand. Preference advertisement can either be transferred directly to the brand.
The objective of this study is to analyze the impact of preference advertisement in building the brand equity.
Therefore to achieve the objective, different analysis tools used in the study are: mean, confirmatory factor
analysis and structural equation modeling technique. The finding shows that preference advertisement has a
significantly positive impact on building the brand equity.
Paper Title: Enhancement of Security in Flying AD-HOC Network Using a Trust Based Routing Mechanism
Abstract: Security is one of the most vital aspect for implementing FANETs in adverse environments. Hence,
research in this area has emerged as an important FANETs field in the recent past. Compared to wired networks,
FANETs are more vulnerable to security attacks due to lack of a trusted centralized authority and easy
eavesdropping. Further, as nodes in flying ad-hoc networks are susceptible to attacks, a trust model based on
direct, as well as indirect trust degrees from similar trusted neighbors is integrated in order to overcome the
vulnerability due to attacks by malicious/selfish nodes and to provide reliable packet transmissions. Fading away
of trust is incorporated with a perspective to ensure the uncertainty of trust with time until it is updated. Also,
AODV algorithm is used for routing in combination with calculated trust values so that efficient transmission of
messages can take place.
Keyword : Mobile Adhoc Network (MANET), AODV Protocol, FANET, Network Security.
41.
References:
1. Mentari Djatmiko, Roksana Boreli, Aruna Seneviratne, Sebastian Ries, “Trust Based Content Distribution for Mobile Ad Hoc 253-257
Networks” in 2011 IEEE 19th Annual International Symposium on Modelling, Analysis, and Simulation of Computer and
Telecommunication Systems.
2. Dilraj Singh, Amardeep Singh, “Trust Based Routing Protocols in Mobile Ad Hoc Networks” in 2014, 4th IEEE International
Conference on wireless communications, networking and mobile computing.
3. Ilker Bekmezci and Ozgur Koray Sahingoz and Samil Temel, “Flying Ad-hoc Networks (FANETs): A survey” in Ad Hoc Networks
journal, vol. 11, pp. 1254-1270, Jan 2013.
4. Sumathy Subramaniam, R. Saravanan and Pooja K. Prakash, “Trust Based Routing to Improve Network Lifetime of Mobile Ad Hoc
Networks” in Journal of Computing and Information and Technology, Volume 18, Issue 5, October 2013, pages 666-677.
5. Su Bing, Ma Zheng hua and Sun Yu-qiang, “A trusted based encryption mechanism for efficient communication over wireless
networks”, in 2008, 14th IEEE International conference on Computer Science and Technology and Cloud Computing.
6. http://www-rp.lip6.fr/ns-doc/ns226-doc/html/aodv_8cc_source.htm\
7. http://www.cs.binghamton.edu/~kliu/research/ns2code/
8. C. E. Perkins and E. M. Royer, “The ad hoc on-demand distance vector protocol,” in Ad hoc Networking, Addison-Wesley, pp. 173–
219, 2000.
9. S.Bhimla, N.Yadav,”Comparison between AODV protocol and DSR protocol in MANET”, IJAERS, Vol 2, issue 1, 2012.
10. https://www.researchgate.net/figure/Figure-FANET-Applications-In-Sensor-NetworksDifferent-sensor-devices-can-be-used-
to_fig1_317446275.
Keyword : Data mining, Bayesian Classifier, Clustering, Rain fall prediction, Linear Regression Technique,
K-fold, Weather predictions, Multiple Regression Technique.
References:
1. Aswini.R, Kamali.D, Jayalakshmi.S, R.Rajesh, “Predicating Rainfall and forecast weather sensitivity using data mining techniq ues”,
42. International Journal of Pure and Applied Mathematics, Vol. 119 No. 14 2018.
2. Chowdari K.K, Dr. Girisha R, Dr. K C Gouda, “A study of rainfall over India using data mining”, International Conference on
Emerging Research in Electronics, Computer Science and Technology – 2015. 258-263
3. Sandeep Kumar Mohapatra, Anamika Upadhyay, Channabasava Gola, “Rainfall prediction based on 100 years of Meteorological
Data”, IEEE-2017.
4. Tharun V.P, Ramya Prakash, S. Renuga Devi, “Prediction of Rainfall Using Data Mining Techniques”, 2nd International Conference
on Inventive Communication and Computational Technologies, IEEE-2018.
5. Abishek.B, R.Priyatharshini, Akash Eswar M, P.Deepika, “Prediction of Effective Rainfall and Crop Water Needs using Data Mining
Techniques”, International Conference on Technological Innovations in ICT For Agriculture and Rural Development, IEEE-2017.
6. Chandrasegar Thirumalai, M Lakshmi Deepak, K Sri Harsha, K Chaitanya Krishna, “Heuristic Prediction of Rainfall Using Machine
Learning Techniques”, International Conference on Trends in Electronics and Informatics ICEI 2017.
7. Minghui Qiu, Peilin Zhao, Ke Zhang, Jun Huang, Xing Shi, Xiaoguang Wang, Wei Chu, “A Short-Term Rainfall Prediction Model
using Multi-Task Convolutional Neural Networks”, International Conference on Data Mining, IEEE-2017.
8. Valmik B Nikam, B.B.Meshram, “Modeling Rainfall Prediction Using Data Mining Method: A Bayesian Approach”, Fifth
International Conference on Computational Intelligence, Modelling and Simulation, IEEE-2013.
9. A.Geetha, Dr. G.M.Nasira, “Data Mining for Meteorological Applications: Decision Trees for Modeling Rainfall Prediction”,
International Conference on Computational Intelligence and Computing Research, IEEE-2014.
10. Soo-Yeon Ji, Sharad Sharma, Byunggu Yu, Dong Hyun Jeong, “Designing a Rule-Based Hourly Rainfall Prediction Model, IEEE IRI
August 8-10, 2012.
11. R. Sukanya, K. Prabha,” Comparative Analysis for Prediction of Rainfall using Data Mining Techniques with Artificial Neural
Network”, International Journal of Computer Sciences and Engineering, ISSN: 2347-2693, IJCSE-2017.
12. Fahad Sheikh, S. Karthick, D. Malathi, J. S. Sudarsan, C. Arun, “Analysis of Data Mining Techniques for Weather Prediction”, Indian
Journal of Science and Technology, Vol 9(38), ISSN (Print): 0974-6846, IJST-2016.
13. Ramsundram N, Sathya S, Karthikeyan S, “Comparison of Decision Tree Based Rainfall Prediction Model with Data Driven Model
Considering Climatic Variables”, Irrigation Drainage Sys Eng, an open access journal ISSN: 2168-9768, 2016.
14. Bhaskar Pratap Singh, Pravendra Kumar, Tripti Srivastava, Vijay Kumar Singh, “Estimation of Monsoon Season Rainfall and
Sensitivity Analysis Using Artificial Neural Networks”, Indian Journal of Ecology (2017) 44 (Special Issue-5): 317-322.
Keyword : Passive tracking, Differential Pressure Controlled system, R-134a, Canister, Conduit.
References:
1. Mostefa Ghassoul, “Single axis automatic tracking system based on PILOT scheme to control the solar panel to optimize solar e nergy
extraction”, Energy Reports, Volume 4, November 2018, Pages 520-527.
2. R.G. Vieira, F.K.O.M.V. Guerra, M.R.B.G. Vale, M.M. Araújo, “Comparative performance analysis between static solar panels and
single-axis tracking system on a hot climate region near to the equator”, Renewable and Sustainable Energy Reviews, Volume 64,
October 2016, Pages 672-681.
3. S.A. Sharaf Eldin, M.S. Abd-Elhady, H.A. Kandil, “Feasibility of solar tracking systems for PV panels in hot and cold regions”,
Renewable Energy, Volume 85, January 2016, Pages 228-233.
4. Ali H. ALmukhtar, “Design of Phase Compensation for Solar Panel Systems for Tracking Sun”, Energy Procedia, Volume 36, 2013,
Pages 9-23.
5. H. Bentaher, H. Kaich, N. Ayadi, M. Ben Hmouda, A. Maalej, U. Lemmer, “A simple tracking system to monitor solar PV panels”,
43. Energy Conversion and Management, Volume 78, February 2014, Pages 872-875.
6. S. Aziz, S. Hassan, “On Improving the Efficiency of a Solar Panel Tracking System”, Procedia Manufacturing, Volume 7, 2017, Pages
218-224. 264-269
7. Hyuna Kang, Taehoon Hong, Seunghoon Jung, Minhyun Lee, “Techno-economic performance analysis of the smart solar photovoltaic
blinds considering the photovoltaic panel type and the solar tracking method”, Energy and Buildings, Volume 193, 15 June 2019 , Pages
1-14.
8. M.A. Abdelghani-Idrissi, S. Khalfallaoui, D. Seguin, L. Vernières-Hassimi, S. Leveneur, “Solar tracker for enhancement of the thermal
efficiency of solar water heating system”, Renewable Energy, Volume 119, April 2018, Pages 79-94.
9. Kee-Hoon Kim, Sung-Bae Cho, “An efficient concentrative photovoltaic solar system with Bayesian selection of optimal solar tracking
algorithms”, Applied Soft Computing, Volume 83, October 2019, 105618.
10. Chao-Kai Yang, Tsung-Chieh Cheng, Chin-Hsiang Cheng, Chi-Chia Wang, Chang-Chun Lee, “Open-loop altitude-azimuth
concentrated solar tracking system for solar-thermal applications”, Solar Energy, Volume 147, 1 May 2017, Pages 52-60.
11. Nadia AL-Rousan, Nor Ashidi Mat Isa, Mohd Khairunaz Mat Desa, “Advances in solar photovoltaic tracking systems: A review”,
Renewable and Sustainable Energy Reviews, Volume 82, Part 3, February 2018, Pages 2548-2569.
12. Hao Zhong, Guihua Li, Runsheng Tang, Wenli Dong, “Optical performance of inclined south–north axis three-positions tracked solar
panels”, Energy, Volume 36, Issue 2, February 2011, Pages 1171-1179.
13. Wafa Batayneh, Ahmad Bataineh, Ibrahim Soliman, Saleh Abed Hafees, “Investigation of a single-axis discrete solar tracking system
for reduced actuations and maximum energy collection”, Automation in Construction, Volume 98, February 2019, Pages 102 -109.
14. Junbin Zhang, Zhuojun Yin, Peng Jin, “Error analysis and auto correction of hybrid solar tracking system using photo sensors and
orientation algorithm”, Energy, Volume 182, 1 September 2019, Pages 585-593.
15. Zhengcao Hua, Chao Ma, Mancang Ma, Lingling Bin, Xiulan Pang, “Operation characteristics of multiple solar trackers under typical
weather conditions in a large-scale photovoltaic base”, Energy Procedia, Volume 158, February 2019, Pages 6242-6247.
16. Masoumeh Abdollahpour, Mahmood Reza Golzarian, Abbas Rohani, Hossein Abootorabi Zarchi, “Development of a machine vision
dual-axis solar tracking system”, Solar Energy, Volume 169, 15 July 2018, Pages 136-143.
17. A.Z. Hafez, A.M. Yousef, N.M. Harag, “Solar tracking systems: Technologies and trackers drive types – A review”, Renewable and
Sustainable Energy Reviews, Volume 91, August 2018, Pages 754-782.
18. Yasser M. Safan, S. Shaaban, Mohamed I. Abu El-Sebah, “Performance evaluation of a multi-degree of freedom hybrid controlled dual
axis solar tracking system”, Solar Energy, Volume 170, August 2018, Pages 576-585.
19. Jose A. Carballo, Javier Bonilla, Lidia Roca, Manuel Berenguel, “New low-cost solar tracking system based on open source hardware
for educational purposes”, Solar Energy, Volume 174, 1 November 2018, Pages 826-836.
20. Jerin Kuriakose Tharamuttam, Andrew Keong Ng, “Design and Development of an Automatic Solar Tracker”, Energy Procedia,
Volume 143, December 2017, Pages 629-634.
Paper Title: Auxillary Safety Locking System of Vehicle Doors using Arduino
Abstract: The main aim of the project is to prevent the Dooring accidents and to provide safety for the
passengers and pedestrians. We are eliminating this problem by the use of Auxiliary Safety locking system
connected to each door of the vehicle using Arduino. To prevent accident due to passenger’s carelessness, the
upcoming vehicle is sensed using an ultrasonic sensor and the doors of the vehicle are locked automatically. Due
to this, the passengers can’t open their car door from inside while the vehicle is moving towards the car. After
the vehicle is passed, the doors are unlocked.
Keyword : Attacks, cross-layer attacks, cross-layer solutions, layered solutions, Internet of Things, wireless
sensor networks.
References:
1. G Sarita A., Manik L. D.: Internet of Things –A Paradigm Shift of Future Internet Applications. Institute of technology Nirma
University, 1–7 (2011).
2. Al-Fuqaha, Ala, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. “Internet of things: A survey on
enabling technologies, protocols, and applications.”Communications Surveys & Tutorials, IEEE 17, no. 4 (2015): 2347 –2376.
3. Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad, Security Patterns-
Integrating Security and System Engineering, John Wiley & Sons, Ltd., 2006.
4. William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition, Prentice Hall, 2005
5. Sliman, Jamila Ben, Ye-Qiong Song, Anis Koubâa, and Mounir Frikha. “A three-tiered architecture for large-scale wireless hospital
sensor networks.” In Workshop Mobi Health Infin conjunction with BIOSTEC, p. 64. 2009.
6. Kirby, Karen K. “Hours per patient day: not the problem, nor the solution.”Nursing Economics 33, no. 1 (2015): 64.
7. Prakash, R., Ganesh, A. B. and Girish, S. V., 2016. Cooperative wireless network control based health and activity monitoring system.
46. Journal of medical systems, 40(10), p. 216.
8. Prakash, R., Ganesh, A. B. and Sivabalan, S., 2017. Network Coded Cooperative Communication in a Real-Time Wireless Hospital
Sensor Network. Journal of medical systems, 41(5), p. 72. 282-290
9. Rabaey J, Ammer J, Silva JL, Patel D (2000). PicoRadio: Ad hoc Wireless Networking of Ubiquitous Low-Energy Sensor/Monitor
Nodes. Workshop on VLSI: pp. 9-14.
10. Ray Hunt, Network Security: The Principles of Threats, Attacks and Intrusions, part1 and part 2, APRICOT, 2004.
11. Ehab Al-Shaer, “Network Security Attacks I: DDOS”, DePaul University, 2007.
12. Idrees SK, Chee-Onn C, Hiroshi I, Tanveer AZ (2010). Threat Models and Security Issues in Wireless Sensor Networks ''proc. (ICINC
2010), 1: 384-389. Kuala Lumpur, Malaysia.
13. Yang H, Luo H, Ye F, Lu S, Zhang L (2004). Security in Mobile Ad Hoc
14. Networks: Challenges and Solutions. IEEE Wireless Communications, 11(1): 38-47
15. Ganeriwal, S.; Srivastava, M.B. Reputation-based framework for high integrity sensor networks ACM Trans. Sens. Netw. 2008, 4, 1–
37.
16. Momani, M.; Subhash, C. GTRSSN: Gaussian trust and reputation system for sensor networks. Adv. Comput. Inform. Sci. Eng. 2008,
2008, 343–347.
17. Shaikh, R.A.; Jameel, H.; D’Auriol, B.J.; Lee, H.J.; Lee, S.Y.; Song, Y.-J. Group based trust management scheme for clustered wireless
sensor networks. IEEE Trans. Parallel. Distrib. Syst. 2009, 20, 1698–1712.
18. Feng, R.; Xu, X.; Zhou, X.; Wan, J. A trust evaluation algorithm for wireless sensor networks based on node behaviors and d -s
evidence theory. Sensors 2011, 11, 1345–1360.
19. Daojing, H.; Chun, C.; Chan, S.; Bu, J.; Vasilakos, A.V. ReTrust: Attack-resistant and lightweight trust management for medical sensor
networks. IEEE Trans. Inform. Technol. Biomed. 2012, 16, 623–632.
20. Wu, R.; Deng, X.; Lu, R.; Shen, X. Trust-based anomaly detection in wireless sensor networks. In Proceedings of the 1st IEEE
International Conference on Communications in China: Communications Theory and Security, Beijing, China, 15–17 August 2012; pp.
203–207.
21. Marzi, H.; Li, M. An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput. Sci. 2013, 19,
1159–1166.
22. Shao, N.; Zhou, Z.; Sun, Z. A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks. In Proceedings of the
International Conference on Cloud Computing and Security, Nanjing, China, 13–15 August 2015; pp. 157–168.
23. Ganeriwal, S.; Balzano, L.K.; Srivastava, M.B. Reputation based framework for high integrity sensor networks. In Proceedings of the
2nd ACM Workshop Security Ad Hoc Sensor Network, Washington, DC, USA, 25–29 October 2004; pp. 66–77.
24. Luo, W.; Ma, W.; Gao, Q. A dynamic trust management system for wireless sensor networks. Sec. Commun. Netw. 2016, 9, 613–621.
25. Atakli, I.M.; Hu, H.; Chen, Y.; Ku,W.S.; Su, Z. Malicious node detection in wireless sensor networks using weighted trust eva luation.
In Proceedings of the Symposium on Simulation of Systems Security, Ottawa, ON, Canada, 14–17 April 2008; pp. 836–843.
26. Ishmanov, F.; Malik, S.A.; Kim, S.W.; Begalov, B. Trust management system in wireless sensor networks: Design considerations and
research challenges. Trans. Emerg. Telecomun. Technol. 2013, 2013, doi:10.1002/ett.2674
27. Yao, Z.; Kim, D.; Doh, Y. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings
of the IEEE International Conference on Mobile Ad hoc & Sensor System, Vancouver, BC, Canada, 9–12 October 2006; pp. 437–446.
28. Li, X.; Zhou, F.; Du, J. A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics
Secur. 2013, 8, 924–935.
29. Jiang, J.; Han, G.; Wang, F.; Shu, L.; Guizani, M. An efficient distributed trust model for wireless sensor networks. IEEE Trans.
Parallel Distrib. Syst. 2015, 26, 1228–1237.
30. Ishmanov, F.; Kim, S.W.; Nam, S.Y. A robust trust establishment scheme for wireless sensor networks. Sensors 2015, 15, 7040–7061.
31. Bao, F.; Chen, I.R.; Chang, M.; Chao, J.H. Trust-based intrusion detection in wireless sensor networks. In Proceedings of the IEEE
International Conference on Communications, Kyoto, Japan, 5–9 June 2011; pp. 1–6.
32. Bao, F.; Chen, I.R.; Chang, M.; Chao, J.H. Hierarchical trust management for wireless sensor networks and its applications to trust-
based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 2012, 9, 169–183.
33. Zhang, T.; Yan, L.; Yang, Y. Trust evaluation method for clustered wireless sensor networks based on cloud model. Wirel. Netw. 2016.
34. Rajeshkumar, G.; Valluvan, K.R. An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for
wireless sensor network. Wirel. Pers. Commun. 2016.
35. U. Ghugar, J. Pradhan, S. K. Bhoi, R. R. Sahoo, and S. K. Panda, “PL-IDS: physical layer trust based intrusion detection system for
wireless sensor networks,” International Journal of Information Technology, vol. 10, no. 4, pp. 489–494, 2018.
36. Aslam J, Li Q, Rus D, “Three power-aware routing algorithms for sensor networks,” WCMC, 2 (3): 187-208, 2003.
37. Madden SR, Franklin MJ, Hellerstein JM, and Hong W, “TAG: a Tiny Aggregation service for ad-hoc sensor networks,” Proc. OSDI,
2002.
38. Yu Z, and Guan Y, “A robust group-based key management scheme for wireless sensor networks,” IEEE WCN C, 4: 13-17, 2005.
39. Mingbo X, Xudong W, and Guangsong Y, “Cross-Layer Design for the Security of Wireless Sensor Networks,” Proceedings of the 6 th
WCICA, 2006.
40. Slijepcevic S, and Potkonjak M, “On Communication Security in Wireless Ad-Hoc Sensor Networks,” Eleventh IEEE International
WETICE, 1(1): 139-144, 2002.
41. Qi X, and Ganz A, “Runtime security composition for sensor networks (SecureSense),” VTC 2003-Fall, 5: 2976-2980, 2003.
42. G. Thamilarasu, A. Balasubramanian, S. Mishra, and R. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad
Hoc Networks,” in Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems,Washington, DC, USA, Nov. 2005.
43. X. Liu, G. Noubir, R. Sundaram, and S. Tan, “SPREAD: Foiling Smart Jammers Using Multi-Layer Agility,” in IEEE International
Conference on Computer Communications (INFOCOM), Anchorage, AK, USA, May. 2007, pp. 2536–2540.
44. V. Toubiana and H. Labiod, “A Cross Layer Attack against MANET Cooperation Enforcement Tools,” in IEEE
InternationalConference on Networks, Dec. 2008, pp. 1–5.
45. Kalpana S, and Ghose MK, “Cross Layer Security Framework for Wireless Sensor Networks”, IJSA, 5(1): 39-52, 2011.
46. Gandhimathi, L., and G. Murugaboopathi ”Cross layer intrusion detection and prevention of multiple attacks in Wireless Sensor
Network using Mobile agent,” Information Communication and Embedded Systems (ICICES), 2016 International Conference on.
IEEE, 2016.
47. K. Hasan, S. Shetty, and T. Oyedare, “Cross Layer Attacks on GSM Mobile Networks Using Software Defined Radios,” in IEEE
Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, Jan 2017, pp. 357–360.
48. Sathya, D, and Krishneswari, K, “Cross –Layer Intrusion Detection System for Wireless Sensor Networks,” Journal of Scientific &
Industrial Research, Vol. 75, April 2016, pp. 213-220.
49. S Aryai, and Govind Binu, “Cross layer approach for detection and prevention of Sinkhole Attack using a mobile agent,” 2nd
International Conference on Communication and Electronics Systems (ICCES), 2017, pages=359-365.
50. Reema Kumari and Kavita Sharma, “Cross-Layer Based Intrusion Detection and Prevention for Network,” Handbook of Research on
Network Forensics and Analysis Techniques, 2018, Pages: 19.
51. Amira Ben Ammar, Ali Dziri, Michel Terre, and Habib Youssef, “Cross-Layer Approach Based Energy Minimization for Wireless
Sensor Networks,” Wireless Personal Communications: An International Journal, Volume 98 Issue 2, January 2018, Pages 2211-2221.
52. Md. Motaharul Islam, Ali Alzahrani, Mohammad Raihan Kabir, and Rifat Rahma, “Honeypot based Cellular Cross-layer Intrusion
Detection and Response,” IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.6, June 2018.
53. Jiawei Tan, Anfeng Liu, Ming Zhao, Hailan Shen, and Ming Ma, “Cross-layer design for reducing delay and maximizing lifetime in
industrial wireless sensor networks,” EURASIP Journal on Wireless Communications and Networkingvolume 2018, Article number:
50 (2018).
54. Imen Bouabidi1 and Pr. Mahmoud Abdellaoui, “Cross layers security approach via an implementation of data privacy and by
authentication mechanism for mobile WSNs,” Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 1, 97-
107 (2017).
55. Nabil Ali Alrajeh, Shaullah khan, Jaime Lloret, and Jonathan Loo, “Secure Routing Protocol Using Cross-Layer Design and Energy
Harvesting in Wireless Sensor Networks,” Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks,
Volume 2013, Article ID 374796,11 page.
56. Amar Amouri, Salvatore D. Morgera, Mohamed A. Bencherifm and Raju Manthena, “A Cross-Layer, Anomaly-Based IDS for WSN
and MANET,” Sensors 2018, 18, 651; doi:10.3390/s18020651.
57. Liyang Zhang, Francesco Restuccia, Tommaso Melodia, and Scott M. Pudlewski, “Taming Cross-Layer Attacks in Wireless Networks:
A Bayesian Learning Approach,” IEEE Transactions on Mobile Computing, Volume: 18, Issue: 7, July 1 2019.
58. ARYA I S, Dr. BINU G S, “Cross Layer Approach For Detection and Prevention Of Sinkhole Attack Using A Mobile Agent,”
Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017), IEEE Xplorer.
59. Davi Resner, Gustavo Medeiros de Araujo, and Antônio Augusto Fröhlich, “Design and implementation of a cross-layer IoT protocol,”
Science of Computer Programming, Volume 165, 1 November 2018, Pages 24-37.
60. P. T. Sharavanan & D. Sridharan, & R. Kumar, “A Privacy Preservation Secure Cross Layer Protocol Design for IoT Based Wireless
Body Area Networks Using ECDSA Framework,” Journal of Medical Systems (2018) 42:196.
61. JianWang, Shuai Jiang, and Abraham O. Fapojuwo, “A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor
Networks,” Sensors 2017, 17, 1227; doi:10.3390/s17061227.
62. Umashankar Ghugar, Jayaram Pradhan, Sourav Kumar Bhoi , and Rashmi Ranjan Sahoo, “LB-IDS: Securing Wireless Sensor Network
Using Protocol Layer Trust-Based Intrusion Detection System,” Hindawi Journal of Computer Networks and Communications,
Volume 2019, Article ID 2054298, 13 pages.
Keyword : GDPR, data protection, data security, cybercrime, real estate, IT security, threats of the Internet.
References:
1. R. Dobler, and D. Ittstein, “Digitalisierung. Interdisziplinär,“ p. 2, 2018
2. G. Vornholz, “Digitalisierung der Immobilienwirtschaft,“ page25, 2019
3. Statista GmbH, (2019. September 20). Umfrage zum zukünftigen Einfluss von Megatrends auf den Immobilienmarkt in Deutschland
[Online] Available: https://de.statista.com/statistik/daten/studie/797769/umfrage/umfrage-zum-zukuenftigen-einfluss-von-megatrends-
auf-den-deutschen-immobilienmarkt/
4. General Data Protection Regulation GDPR, (2019. September 20). [Online] Available: https://gdpr-info.eu/
5. W. Lassmann, “Wirtschaftsinformatik, Nachschlagewerk für Studium und Praxis“ vol. 1, p 400, 2006
6. Statista GmbH, (2019. September 20). DSGVO Konformität von Unternehmen in Deutschland [Online] Available
https://de.statista.com/infografik/13651/dsgvo-konformitaet-von-unternehmen-in-deutschland/
7. General Data Protection Regulation GDPR, (2019. September 20). [Online] Available: https://gdpr-info.eu/
8. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 02). DSGVO
48. Aufwand im laufenden Betrieb [Online] Available: https://www.bitkom.org/Presse/Presseinformation/Kaum-Fortschritt-bei-der-
Umsetzung-der-Datenschutz-Grundverordnung.html#item-385
9. Statista GmbH, (2019. September 20). Meinungen zum Thema Datenschutz im Internet nach Geschlecht in Deutschland 2018 [Online] 298-308
Available https://de.statista.com/statistik/daten/studie/911174/umfrage/meinungen-zum-thema-datenschutz-im-internet-nach-
geschlecht-in-deutschland/
10. Statista GmbH, (2019. September 20). Umfrage zur Zuständigkeit für den Schutz von persönlichen Daten im Internet [Online]
Available https://de.statista.com/infografik/16771/umfrage-zur-verantwortung-beim-thema-datenschutz/
11. Statista GmbH, (2019. September 20). Umfrage zum Schutz persönlicher Daten von Jugendlichen im Netz in Deutschland 2018
[Online] Available https://de.statista.com/statistik/daten/studie/505798/umfrage/schutz-persoenlicher-daten-von-jugendlichen-im-netz/
12. Statista GmbH, (2019. September 20). Umfrage zum Datenschutzverhalten von Jugendlichen in Deutschland 2018 [Online] Available
https://de.statista.com/statistik/daten/studie/867410/umfrage/umfrage-zum-datenschutzverhalten-von-jugendlichen-in-deutschland/
13. A. Sodtalbers, C. Commerce, and A. Heise, “IT-Recht – Software-Recht, E-Commerce-Recht, Datenschutz-Recht“ p. 271, 2010
14. A. Sodtalbers, C. Commerce, and A. Heise, “IT-Recht – Software-Recht, E-Commerce-Recht, Datenschutz-Recht“ p. 271, 2010
15. Bundesamt für Sicherheit in der Informationstechnik, “Leitfaden Informationssicherheit – IT-Grundschutz kompakt,“ p. 11. 2011
[Online] Available: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Leitfaden/GS-
Leitfaden_pdf.pdf?__blob=publicationFile&v=3
16. Statista GmbH, (2019. September 20). Einschätzung der Sicherheit von Daten im Internet in Deutschland bis 2018 [Online] Available
https://de.statista.com/statistik/daten/studie/217842/umfrage/sicherheit-von-persoenlichen-daten-im-internet/
17. Statista GmbH, (2019. September 20). Einschätzung der Sicherheit von persönlichen Daten im Internet in Deutschland 2019 [Online]
Available https://de.statista.com/statistik/daten/studie/872116/umfrage/einschaetzung-der-sicherheit-von-persoenlichen-daten-im-
internet-in-deutschland/
18. Bürgerliches Gesetzbuch Civil Law Book (2019. September 20), “Definition Verbraucher,“Vol 83 § 13 Verbraucher, 2019 [Online]
Available https://www.gesetze-im-internet.de/bgb/BJNR001950896.html
19. Startpage BV, (2019. September 20). The world's most private search engine [Online] Available https://www.startpage.com/
20. Statista GmbH, (2019. September 20). Einsatz von Maßnahmen zum Schutz vor Datenmissbrauch im Internet 2017 [Online] Available
https://de.statista.com/statistik/daten/studie/28771/umfrage/haltung-zu-sicherheitsrisiken-im-internet/
21. Produkthaftungsgesetz Product liability law (2019. September 20), “Definition Herrsteller, ProdHaftG § 4 Herrsteller, p. 2 [Online]
Available www.gesetze-im-internet.de/prodhaftg/ProdHaftG.pdf
22. Produkthaftungsgesetz Product liability law (2019. September 20), “Definition Produkt, ProdHaftG § 2 Produkt, p. 1 [Online]
Available www.gesetze-im-internet.de/prodhaftg/ProdHaftG.pdf
23. A. Yunlong Z. Zedtwitz, and D. Assimakopoulos, “Responsible Product Innovation: Putting Safety First” p. 289, 2017
24. R. Stair, and G. Reynolds, ”Principles of Information Systems”, p. 283, 2015
25. Quality management systems - Requirements (ISO 9001:2015), (2019. September 20) [Online] Available https://www.din.de/de/wdc-
beuth:din21:235671251
26. Bundesamt für Sicherheit in der Informationstechnik, (2019. September 20), „“ISO 27001 Zertifizierung auf Basis von IT-
Grundschutz“ [Online] Available
https://www.bsi.bund.de/DE/Themen/ZertifizierungundAnerkennung/Managementsystemzertifizierung/Zertifizierung27001/GS_Zertifi
zierung_node.html
27. E. Lauterschlag, (2019. September 20), “WLAN Verschlüsselung: Welche Methoden gibt es und welche ist am sichersten?“ [Online]
Available http://www.was-ist-malware.de/it-sicherheit/wlan-verschluesselung/
28. L. Nielsen, “ERP-Software in kleinen und mittelständischen Unternehmen: Ein optimiertes Vorgehensmodell,“ p. 11, 2014
29. Disha Experts “Olympiad Champs Cyber Class 7 with Past Olympiad Questions,” p. 138, 2018
30. HowStuffWorks, (2019. September 20), “How Web Servers Work” [Online] Available https://computer.howstuffworks.com/web-
server3.htm
31. Weka Medie publishing, (2019. September 20), “SpeedPort-Router zur Fritzbox machen” [Online] Available https://www.pc-
magazin.de/ratgeber/speedport-fritzbox-hack-firmware-modding-download-anleitung-tutorial-2309816.html
32. Heise Medien GmbH & Co. KG, (2019. September 20), “Facebook-Datenskandal” [Online] Available
https://www.heise.de/thema/Facebook_Datenskandal
33. Statista GmbH, (2019. September 20). Umfrage zur Nutzerreaktion auf Datenschutzvorwürfe gegen Facebook in Deutschland 2018
[Online] Available https://de.statista.com/statistik/daten/studie/821263/umfrage/nutzerreaktion-auf-datenschutzvorwuerfe-gegen-
facebook-in-deutschland/
34. Bundesamt für Sicherheit in der Informationstechnik, (2019. September 20), “ Datendiebstahl - BSI fordert verantwortungsvolles
Handeln der Betreiber“ [Online] Available
https://www.bsi.bund.de/DE/Presse/Kurzmeldungen/Meldungen/news_yahoo_BSI_fordert_verantwortungsvolles_Handeln_23092016.
html
35. Statista GmbH, (2019. September 20). Umfrage zu organisatorischen IT-Sicherheitsmaßnahmen in Unternehmen 2018 [Online]
Available https://de.statista.com/statistik/daten/studie/444794/umfrage/umfrage-zu-technischen-it-sicherheitsmassnahmen-in-
unternehmen/
36. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 20). “Datenschutz im
Internet – Eine repräsentative Untersuchung zum Thema Daten im Internet aus Nutzersicht,“ p. 23, 2011 [Online] Available
https://www.bitkom.org/sites/default/files/file/import/BITKOM-Publikation-Datenschutz-im-Internet.pdf
37. Compendio-Autorenteam, “Informatik für technische Kaufleute und HWD, Grundlagen mit Beispielen, Repetitionsfragen und
Antworten sowie Übungen,“ vol. 1, p. 167, 2009
38. Statista GmbH, (2019. September 20). Ausgaben für IT-Sicherheit in Deutschland bis 2019 [Online] Available
https://de.statista.com/statistik/daten/studie/1041736/umfrage/ausgaben-fuer-it-security-in-deutschland/
39. TechTarget Germany GmbH, (2019. September 20). “Data Center Infrastructure Management (DCIM),” [Online] Available
https://www.computerweekly.com/de/definition/Data-Center-Infrastructure-Management-DCIM
40. Research International Data Corporation, Inc. [Online] Available https://www.idc.com/about
41. TechTarget Germany GmbH, (2019. September 20). “Definition Zettabyte,” [Online] Available
42. https://www.computerweekly.com/de/definition/Zettabyte
43. Statista GmbH, (2019. September 20). Prognose zum weltweit generierten Datenvolumen 2025 [Online] Available
https://de.statista.com/statistik/daten/studie/267974/umfrage/prognose-zum-weltweit-generierten-datenvolumen/
44. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 20).“Datenschutz im
Internet – Eine repräsentative Untersuchung zum Thema Daten im Internet aus Nutzersicht,“ p. 21, 2011 [Online] Available
https://www.bitkom.org/sites/default/files/file/import/BITKOM-Publikation-Datenschutz-im-Internet.pdf
45. Statista GmbH, (2019. September 20). Polizeilich erfasste Fälle von Cyberkriminalität in Deutschland bis 2017 [Online] Available
https://de.statista.com/statistik/daten/studie/295265/umfrage/polizeilich-erfasste-faelle-von-cyberkriminalitaet-im-engeren-sinne-in-
deutschland/
46. Statista GmbH, (2019. September 20). Umfrage zu den Vorfällen von Cybercrime in Unternehmen weltweit 2017 [Online] Available
https://de.statista.com/statistik/daten/studie/499324/umfrage/vorfaelle-von-cybercrime-in-unternehmen-weltweit/
47. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ vol. 8, p. 1159, 2016
48. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ vol. 8, p. 1346, 2016
49. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ [Online] Available https://www.duden.de/rechtschreibung/Social_Engineering
50. ITservice Sustemhaus, (2019. September 20). ”Webbasierte Angriffe steigt weiter an” [Online] Available http://www.pc-doktor-
blog.de/webbasierte-angriffe-steiger-weiter-an-mehr-als-4-500-angriffe-pro-tag/
51. Bibliographisches Institut GmbH, „Duden - Deutsches Universalwörterbuch: Das umfassende Bedeutungswörterbuch der deutschen
Gegenwartssprache,“ [Online] Available https://www.duden.de/rechtschreibung/Botnet
52. Kaspersky Labs GmbH, (2019. September 20). “What is Malicious Code?” [Online] Availablehttps://www.kaspersky.com/resource-
center/definitions/malicious-code
53. TechTarget Germany GmbH, (2019. September 20). “Definition Denial of Service (DoS),” [Online] Available
https://www.computerweekly.com/de/definition/Denial-of-Service-DoS
54. PINNOW & Partner Unternehmens- und Technologieberatungsgesellschaft mbH., (2019. September 20). “ Unterschätztes Risiko
Insider-Angriff,” [Online] Available https://www.datensicherheit.de/aktuelles/unterschaetztes-risiko-insider-angriff-27834
55. TechTarget Germany GmbH, (2019. September 20). “Definition Ransomware,” [Online] Available
https://www.computerweekly.com/de/definition/Ransomware
56. I. Sommerville, “Software Engineering“, vol. 8, p. 556, 2007
57. M. Hesseler, and M. Görtz, Marcus, “Basiswissen ERP-Systeme – Auswahl, Einführung & Einsatz betriebswirtschaftlicher
Standardsoftware“, vol. 1, p. 362, 2007
58. Statista GmbH, (2019. September 20). Umfrage in Deutschland zu Schutzmaßnahmen gegen Internetkriminalität 2018 [Online]
Available https://de.statista.com/prognosen/952937/umfrage-in-deutschland-zu-schutzmassnahmen-gegen-internetkriminalitaet
59. M. Wind, and D. Kröger, “Handbuch – IT in der Verwaltung“ p. 276,2006
60. Research International Data Corporation, Inc., (2019. September 20). “Mehr Mobilität erfordert bessere Lösungen für mehr Sicherheit
beim Einsatz mobiler Endgeräte“ [Online] Available https://www.it-times.de/news/idc-mehr-mobilitat-erfordert-bessere-losungen-fur-
mehr-sicherheit-beim-einsatz-mobiler-endgerate-12763/
49. Paper Title: Present State-of-The-ART of Dynamic Association Rule Mining Algorithms
Abstract: Association Rule Mining (ARM) is a data mining approach for discovering rules that reveal latent 309-316
associations among persisted entity sets. ARM has many significant applications in the real world such as
finding interesting incidents, analyzing stock market data and discovering hidden relationships in healthcare data
to mention few. Many algorithms that are efficient to mine association rules are found in the existing literature,
apriori-based and Pattern-Growth. Comprehensive understanding of them helps data mining community and its
stakeholders to make expert decisions. Dynamic update of association rules that have been discovered already is
very challenging due to the fact that the changes are arbitrary and heterogeneous in the kind of operations. When
new instances are added to existing dataset that has been subjected to ARM, only those instances are to be used
in order to go for incremental mining of rules instead of considering the whole dataset again. Recently some
algorithms were developed by researchers especially to achieve incremental ARM. They are broadly grouped
into Apriori-based and Pattern-Growth. This paper provides review of Apriori-based and Pattern-Growth
techniques that support incremental ARM.
Keyword : Data mining, incremental association rule mining, apriori-based, Pattern-Growth ARM algorithms.
References:
1. D. Cheung, J. Han, V. Ng, and C. Y. Wong. Maintenance of Discovered Association Rules in Large Databases: An Incremental
Updating Technique. Proceedings of the 12th International Conference on Data Engineering pages 106—114, February 1996.
2. D. Cheung, S. D. Lee, and B. Kao. A General Incremental Technique for Updating Discovered Association Rules. Proceedings of t he
Fifth International Conference On Database Systems for Advanced Applications pages 185—194, April 1997.
3. N. F. Ayan, A. U. Tansel, and M. E. Arkun. An Efficient Algorithm to Update Large Itemsets with Early Pruning. Proceedings of the 5th
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining pages 287—291, August 1999.
4. S.D.Lee, David W.Cheung and Ben Kao, Is Sampling Useful in Data Mining? A Case in the Maintenance of Discovered Association
Rules, Data Mining and Knowledge Discovery, Volume 2 Issue 3, September 1998 Pages 233-262 Kluwer Academic Publishers
Hingham, MA, USA.
5. S.Thomas, S. Bodagala, K.Alsabti and S. Ranka. An Efficient Algorithm for the Incremental Updation of Association Rules in Large
Databases. In KDD’97, New Port Beach, California, Aug.1997.
6. Z. Zhou and C. I. Ezeife. A Low-Scan Incremental Association Rule Maintenance Method based on the Apriori property. Proceedings of
the 14th Canadian Conference on Artificial Intelligence, June 2001.
7. Ezeife C.I., Su Y. (2002), “Mining Incremental Association Rules with Generalized FP-Tree”, In: Cohen R., Spencer B. (eds) Advances
in Artificial Intelligence. AI 2002. Lecture Notes in Computer Science, vol 2338. Springer, Berlin, Heidelberg.
8. Cheung W, Zaiane OR (2003), “Incremental mining of frequent patterns without candidate generation or support constraint”, In: Desai
BC, Ng W (eds) Proceedings of the IDEAS 2003.IEEE Computer Society Press, Los Alamitos, CA, pp 111–116.
9. C. K. Leung, Q. I. Khan and T. Hoque. “ CanTree: A Tree Structure for Efficient Incremental Mining of Frequent Patterns”, Pro ceedings
of the Fifth IEEE International Conference on Data Mining (ICDM’05), 2005.
10. Tanbeer S.K., Ahmed C.F., Jeong BS. Lee YK. (2008) , “CP-Tree: A Tree Structure for Single-Pass Frequent Pattern Mining”, In:
Washio T., Suzuki E., Ting K.M., Inokuchi A. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2008. Lecture Notes
in Computer Science, vol 5012. Springer, Berlin, Heidelberg.
11. Totad, S.G., Geeta, R.B. & Prasad Reddy, P.V.G.D, “Batch incremental processing for FP-tree construction using FP-Growth
algorithm”, Knowledge and Information Systems, November 2012, Volume 33, Issue 2, pp 475–490 .https://doi.org/10.1007/s10115-
012-0514-9.
12. Lydia Nahla, Driff & Drias, Habiba. (2017). An Efficient Incremental Mining Algorithm for Dynamic Databases. 1 -12. 10.1007/978-3-
319-58130-9_1.
13. S¸ erban, G., Campan, A., Czibula, I.G.. A programming interface for finding relational association rules. ˆ International Journal of
Computers, Communications & Control 2006;I(S.):439–444.
14. Diana-Lucia Miholca, Gabriela Czibula, Liana Maria Crivei,A new incremental relational association rules mining approach, Procedia
Computer Science,Volume 126,2018,Pages 126-135,ISSN 1877-0509, https://doi.org/10.1016/j.procs.2018.07.216.
15. Genomics, C.C... Eukaryothic promoter database. 2017.
16. Archana Gupta, Sanjeev Jain, Akhilesh Tiwari, “COMVAN: A Novel Data Structure for Storing Large Database for Incremental
Association Mining”, TECHNIA – International Journal of Computing Science and Communication Technologies, VOL.9 NO. 2,
January. 2017 (ISSN 0974-3375), pp 1110- 1113.
17. Archana Gupta, Akhilesh Tiwari and Sanjeev Jain,Computer Science IJCSIS, Journal of. “A System for Incremental Association Ru le
Mining without Candidate Generation.” IJCSIS July Vol 17 No 7, 2019.
18. Satyavathi N., Rama B., Nagaraju A.,“Research Travelogue-Performance Evaluation of Index support Item Set Mining
Algorithms”,International Journal of Pure and Applied Mathematics,Volume 120 No. 6 2018, 3641-3651,ISSN: 1314-3395 (on-line
version),url: http://www.acadpubl.eu/hub/Special Issue.
19. Satyavathi N., Rama B., Nagaraju A. (2017) Incremental Updating of Mined Association Rules for Reflecting Record Insertions. In:
Satapathy S., Prasad V., Rani B., Udgata S., Raju K. (eds) Proceedings of the First International Conference on Computational
Intelligence and Informatics. Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore
Paper Title: The Innovative Trends in Architecture and Urban Planning of Health Care Institutions
Abstract: The article depicts and systematizes innovative global trends in the field of architecture and urban
planning of healthcare institutions taking as the example leading countries in the field of healthcare (Hong Kong,
Singapore, and the United Arab Emirates). The territorial, administrative and demographic features that
significantly affect the formation and functioning of the architecture and urban planning network of medical
institutions are analyzed. The features, indicators, and structure of the public and private sectors of the medical
50. organization of the listed countries are examined in detail. The main innovative trends in the architecture and
urban planning of the healthcare network that put the considered countries on the top of the world leaders in the
317-323
efficiency of healthcare organization rapidly are identified. The trends are considered in urban planning,
architecture, medical, economic, environmental, technological and innovative aspects.
Keyword : innovations, trends, design of medical institutions, hospitals, architecture, urban planning.
References:
1. I. V. Bulakh, “The main trends in organization of architectural environment of medical institutions”. Web of Scholar. Warszawa, 2018,
No 5 (23), Vol. 1, pp. 59−62.
2. I. V. Bulakh, “Common Features of Architectural Design of the Medical Purpose Building. Science & Technique. Minsk, 2019, No 18
(4), pp. 311−318. DOI:10.21122/2227-1031-2019-18-4-311-318
3. I. V. Bulakh, “Complex public health institutions as a complex urban development system”. Сolloquium-journal. Warszawa, 2019, No
1 (25), pp. 4−6. DOI: 10.24411/2520-6990-2019-00001
4. Rating of the countries of the world by level of healthcare in 2018. Available: https://www.bloomberg.com/news/articles/2018-09-
19/u-s-near-bottom-of-health-index-hong-kong-and-singapore-at-top
5. I. V. Bulakh, “Energy efficiency use of bioclimatic facades in medical buildings”. Development of modern science: the experience of
European countries and prospects for Ukraine: monograph / edited by authors. 3rd ed. Riga, Latvia: Baltija Publishing, 2019, pp.
597−616.
6. I. V. Bulakh, “New approaches to the functional planning of hospitals and entrance groups of medical institutions”. Сolloquium-
journal. Warszawa, 2019, No 9 (33), Vol. 1, pp. 4−6. DOI: 10.24411/2520-6990-2019-10213
7. I. V. Bulakh, “Artistic-aesthetic formation and evolution of architectural and urban planning space”. Science and Innovation. Kyiv,
2019, 15(5), https://doi.org/10.15407/scin15.05.038.
8. G. Kovalska, I. Merylova, I. Bulakh, “Urban improvement of comprehensive schools and out of school educational establishments in
Ukraine”. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019, Vol.8, Issue 12, submitted for
publication.
9. I. Bulakh, V. Timokhin, G. Kovalska, I. Merylova, Y. Tretiak, “Urban environment as a phenomenon and object of architectural and
urban aesthetics”. Architectural Science Review, submitted for publication.
10. I. V. Bulakh, “Dynamics of architectural and urban planning hospital system`s evolution”. Science & Technique, submitted for
publication.
11. P. M. Ivanov, Hong Kong: history and modernity. Moscow: Science, 1990, 281 p.
12. Group for Child Mortality Estimation. UNICEF. Available:
https://www.un.org/en/development/desa/population/publications/mortality/child-mortality-report-2018.asp
13. V. P. Gusterin, Cities of the Arab East. Moscow: East-West, 2007, 352 p.
14. Clusters, Hospitals & Institutions: Hong Kong. Available:
http://www.ha.org.hk/visitor/ha_visitor_index.asp?Content_ID=10036&Lang=ENG&Dimension=100&Ver=HTML
15. Queen Mary Hospital. Available: https://www.legco.gov.hk/yr13-14/english/fc/pwsc/papers/p14-08e.pdf
16. Gleneagles Hong Kong Hospital. Available: https://www.p-t-group.com/en/project-detail.php?projects_id=41
17. Hong Kong Children's Hospital. Available: http://greenbuilding. hkgbc. org.hk/ projects/view/22
18. Lee Kuan Yu, From the Third World to the First. History of Singapore 1965-2000. Moscow: Mann, Ivanov and Ferber, 2013, 165 p.
19. Malaysia and Singapore. Guide. Moscow: Astrel, 2017, 368 p.
20. World Mortality Report. Department of Economic and Social Affairs. Population Division. New York, 2013, 106 р.
21. Healthcare and Healthy Lifestyle Services. Available: https://www.healthhub.sg/directory/clinics-and-polyclinics
22. Parkway Hospitals Singapore: For uncompromising quality health care. Available: https://www.bworldonline.com/ parkway-hospitals-
singapore-for-uncompromising-quality-health-care/
23. Biopolis Singapore. Available: https://surbanajurong.com/perspective/surbana-jurongs-journey-one-north/
24. Ng Teng Fong General Hospital & Jurong Community Hospital. Available: https://www.aia.org/showcases/76821-ng-teng-fong-
general-hospital--jurong-commun
25. Listing of Licensed Healthcare Institutions. Available:
http://hcidirectory.sg/hcidirectory/hospital.do?JSESSIONID=SDMmdS3bhkp3jwnT0nnDh2GtYm1F2c5pBDJw1bm4nvGsLqzTV51G
!2085494145!171391194
26. P. Vine, I. Al Abed. United Arab Emirates: A New Perspective. Publisher: Trident Press, 2001, 320 р.
27. Modern UAE health care: From a mud hut to skyscraper hospitals. Available: https://www.thenational.ae/uae/health/modern-uae-
health-care-from-a-mud-hut-to-skyscraper-hospitals-1.300036
28. UAE. Healthcare providers. Available: https://government.ae/en/information-and-services/health-and-fitness/healthcare-providers
29. Brightpoint Royal Women's Hospital. Available: https://www.nmcroyalwomenshospital.ae/nmc-royal-womens-hospital-womens-
hospital-abu-dhabi-uae.html
30. Al Jalilah Hospital. Available: https://www.aljalilachildrens.ae/
31. Rashid Medical Complex. Available: https://www.greshamsmith.com/ project/rashid-medical-complex/
32. Emirates Space Hospital. Available: https://www.thenational.ae/uae/health/space-clinic-being-developed-to-treat-emirati-astronauts-
1.700621
33. M. O. Didichenko, “Definition and rating of the morphology landmarks of the urban planning system”. Urban planning and territorial
planning, 2018, Issue 68, pp. 130-139. Available: http://nbuv.gov.ua/UJRN/MTP_2018_68_19
Authors: Surinder Paul, Manokamna, ShubhpreetKaur , P.S. Malhi, Anupinder Singh, Arvind Kumar
Effect of Fe Substitution on the Structural, Electrical and Dielectric Properties of
Paper Title:
LA0.70CA0.30MNO3 Cathode for Sofcs
Abstract: Perovskite solid solutions (La0.70Ca0.30)(FexMn1-x)O3 where x = 0.01, 0.20, 0.30 and 0.40
ceramics were synthesized by solid state reaction route. The structural studies were carried by X-Ray diffraction
method and the observed results have indicated that all the prepared samples were crystallized into single phase.
The surface morphology was studied by Scanning Electron Microscopy and the images have revealed that grain
size has increased with the increasing concentration of Fe. Archimedes principle was used to calculate the
density of all the sintered samples and the density values were observed to be in increasing order. The
impedance and dielectric properties have been characterized at different ranges of temperature and frequency.
The value of electrical conductivity were found to be more than 100 S cm-1, which indicate that the synthesized
51. material is suitable material for cathode of Solid Oxide Fuel Cell.
324-328
Keyword : Solid Oxide Fuel Cell, Cathode Material, XRD, Conductivity, Magnites
References:
1. J.E.O’Brein, C.M.Stoots, J.S.Herring, J.J. Hartvigsen, “J. Fuel Cell Sci.Technol”.;2006; Vol -3; 213–219.
2. A. Hauch, S.H. Jensen, S. Ramousse, M. Mogensen, “J. Electrochem. Soc”.; 2006 Vol- 153; Pp A1741–A1747.
3. R. Rivera-Tinoco, C. Mansilla, C. Bouallou, “Energy Convers. Manag.” 2010 ; Vol- 51, Pp 2623–2634
4. S.C.Singhal, “Solid State Ionics” 135 (2000) 305.
5. N.Q. Minh, Ceramic fuel cells, “J. Am. Ceram. Soc.”1993; Vol.- 76, Pp 563–588 .
6. M. Dokiya,” Solid State Ionics”, 2002; 152–153, 383–392.
7. S.C. Singhal, “Solid State Ionics”, 2002; 152–153, 405–410.
8. N.P. Brandon, S. Skinner, B.C.H. Steele,” Annu. Rev. Mater. Res.” 2003; 33, 183–213 .
9. K.C. Wincewicz, J.S. Cooper, “Journal of Power Sources” 2005, Vol.- 140, Pp 280–296 .
10. C.Sun, R.Hui, J. Roller, “Journal of Solid State Electrochem.” 14 (2010) 1125.
11. H.H. Mobius, “ Journal of Solid State Electrochem.”1997; Vol- 1, Pp 2–16.
12. S. Carter, A. Selcuk, R.J. Chater, J. Kajda, J.A. Kilner, B.C.H. Steele, “Solid State Ion” 1992;.Vol 53–56, Pp 597–605.
13. R.A. De Souza, J.A. Kilner, J.F. Walker, “Material. Letter”2000 . Vol -43, Pp 43–52.
14. V.V. Srdic, R.P. Omorjan, J. Seydel, “Material Science and Engg”2005. Vol- 116, Pp 119–124.
15. H. Ullmann, N. Trofimenko, F. Tietz, D. Strover, A. Ahmad-Khanlou, “Solid State Ion”2000; Vol- 138, Pp 79–90 .
16. Y. Takeda, Y. Sakaki, T. Ichikawa, N. Imanishi, O. Yamamoto; “Solid State Ion” 1994: Vol -72, Pp 257–264 .
17. Z. Jie, L.I. Chen, K. Linglong, W.U. Xuewei, M.A. Yongchang; “journal of Rare Earths”2011 ; Vol -29, Pp 1066–1069.
18. T.Badapanda, S. Sarangi, B. Behra , S.Anwar ; “Current applied Physics” 2014 , 14: 1192-1200.
19. U. Dash , S. Sahoo , P. Chaudhuri ., S.K.S. Parashar , K. Parashar ; “Journal of Advanced ceramics”2014, 3:89-97.
20. B. Tiwari, R.N.P. Choudhary, “ IEEE transactions on dielectric and electrical insulation 2010, 17: 5-17.
21. R. Ranjan , R. Kumar , B.Behra , R.N.P.Choudhary ;2009; Physica B, 404: 3709-3716.
22. M.R. Biswal. J. Nanda , N.C. Mishra ,S. Anwar, A. Mishra “ Advanced Materials Letter” 2014 5: 531-537.
23. M. Kumar, K. L. Yadav, J. Phys.: Condensed Matter (2002) 19:242202.
24. K.S. Cole and H.Robert. ;1941; “ Journal of Chemical Physics” 9:341-351
25. S. Havriliak and S.Negami , 1967. Polymer 8: 161-210.
Authors: Kapil Joshi, N.K.Joshi, Manoj Diwakar, A.N. Tripathi, Himanshu Gupta
Paper Title: Multi-Focus Image Fusion using Non-Local Mean Filtering and Stationary Wavelet Transform
Abstract: Today’s research era, image fusion is a actual step by step procedure to develop the visualization of
any image. It integrates the essential features of more than a couple of images into a individual fused image
without taking any artifacts. Multi-focus image fusion has a vital key factor in fusion process where it aims to
increase the depth of field using extracting focused part from different multiple focused images. In this paper
multi-focus image fusion algorithm is proposed where non local mean technique is used in stationary wavelet
transform (SWT) to get the sharp and smooth image. Non-local mean function analyses the pixels belonging to
the blurring part and improves the image quality. The proposed work is compared with some existing methods.
The results are analyzed visually as well as using performance metrics.
Keyword : Image Fusion, Stationary Wavelet Transforms (SWT), Non-Local Mean Filter (NLM).
References:
1. Yang, B., Luo, J., Guo, L., & Cheng, F. (2016).Simultaneous image fusion and demosaicing via compressive sensing. Information
Processing Letters, 116(7), 447-454.
2. Xu, X., Wang, Y., & Chen, S. (2016). Medical image fusion using discrete fractional wavelet transform. Biomedical Signal Processing
and Control, 27, 103-111.
3. Liu, C., Long, Y., & Mao, J. (2016). Energy-efficient multi-focus image fusion based on neighbor distance and morphology. Optik-
International Journal for Light and Electron Optics, 127(23), 11354-11363.
4. Zhang, B., Lu, X., Pei, H., Liu, Y., Zhou, W., & Jiao, D. (2016).Multi-focus image fusion based on sparse decomposition and
53. background detection. Digital Signal Processing, 58, 50-63.
5. Xiao, J., Liu, T., Zhang, Y., Zou, B., Lei, J., & Li, Q. (2016).Multi-focus image fusion based on depth extraction with inhomogeneous
diffusion equation. Signal Processing, 125, 171-186.A339:A355 344-350
6. Kaplan, N. H., Erer, I., &Ersoy, O. (2016).Fusion of multifocus images by latticestructures. Journal of Visual Communication and
Image Representation, 38, 848-857.
7. Meng, F., Song, M., Guo, B., Shi, R., & Shan, D. (2017).Image fusion based on object region detection and Non -Subsampled Contourlet
Transform. Computers & Electrical Engineering, 62, 375-383.
8. Ghassemian, H. (2016). A review of remote sensing image fusion methods. Information Fusion, 32, 75-89.
9. James, A. P., &Dasarathy, B. V. (2014). Medical image fusion: A survey of the state of the art. Information Fusion, 19, 4-19.
10. El-Gamal, F. E. Z. A., Elmogy, M., &Atwan, A. (2016).Current trends in medical image registration and fusion. Egyptian Informatics
Journal, 17(1), 99-124.
11. Yang, Y., Park, D. S., Huang, S., &Rao, N. (2010).Medical image fusion via an effective wavelet-based approach. EURASIP Journal on
Advances in Signal Processing, 2010(1), 579341.
12. Sarker, S., Chowdhury, S., Laha, S., &Dey, D. (2012). Use of non-local means filter to denoise image corrupted by salt and pepper
noise. Signal & Image Processing, 3(2), 223.
13. Singh, A., &Verma, R. S. (2017).An efficient non-local approach for noise reduction in natural images.International Journal of
Advanced Research in Computer Science, 8(5).
14. Buades, A., Coll, B., & Morel, J. M. (2005, June).A non-local algorithm for image denoising.In 2005 IEEE Computer Society
Conference on Computer Vision and Pattern Recognition (CVPR'05) (Vol. 2, pp. 60-65).IEEE.
15. Raghuvanshi, D., Singh, H., Jain, P., &Mathur, M. (2012). Comparative Study of Non-Local Means and Fast Non-Local Means
Algorithm for Image Denoising. International Journal of Advances in Engineering & Technology, 4(2), 247.
16. S., Aggarwal, S., & Kumar, P. (2016).Analysis of Various Issues in Non-Local Means Image DenoisingAlgorithm.International Journal
of Advanced Research in Computer and Communication Engineering, 5(5), 740.
17. Ravi, P., & Krishnan, J. (2018).Image Enhancement with Medical Image Fusion using Multiresolution Discrete Cosine
Transform. Materials Today: Proceedings, 5(1), 1936-1942.
18. Farid, M. S., Mahmood, A., & Al-Maadeed, S. A. (2019).Multi-focus image fusion using Content Adaptive Blurring. Information
Fusion, 45, 96-112.
19. Rajini, K. C., &Roopa, S. (2017, March). A review on recent improved image fusion techniques. In Wireless Communications, Sig nal
Processing and Networking (WiSPNET), 2017 International Conference on (pp. 149-153). IEEE.
20. Joshi, K., Kirola, M., Chaudhary, S., Diwakar, M., & Joshi, N. K. (2019). Multi-Focus Image Fusion Using Discrete Wavelet Transform
Method. Available at SSRN 3383141.
21. Vaqur, M., & Joshi, K. A REVIEW: IMAGE FUSION USING DCT AND DWT.Gupta, H., Chauhan, H., Bijalwan, A., & Joshi, K.
(2019). A Review on Image Denoising. Available at SSRN 3385374.
Paper Title: Hybrid Mode of Medical Image Watermarking To Enhance Robustness and Imperceptibility
Abstract: In Modern healthcare systems, diagnostic information of patients is managed digitally.
Watermarking strategies plays a significant role to ensure the security, authenticity and management of
biomedical images and related patient information. This paper explores different invisible Digital watermarking
methods both in spatial and transform / frequency domain and then Hybrid method by combining two techniques
to justify better results for medical images. Here, host image considered is a medical image and patient’s
information is a watermark which is embedded into it. The embedded watermark is hidden in medical host
image and its quality should not be degraded to avoid misdiagnosis by doctors. In this paper, LSB, SVD, DCT,
DWT and Hybrid techniques (DWT+SVD) are implemented for embedding and extraction process of invisible
medical image watermarking. The performance is evaluated based on PSNR as a measure of imperceptibility
and CRC & SSIM as a check of robustness. The attacks introduced are cropping, rotating, and noise like
Gaussian, Salt & Paper, Speckle and Poisson. Results reveal that DWT provides higher PSNR values but it is
robust for few attacks only. On the other side, SVD provides consistent SSIM for all attacks, although PSNR
values are less than that of DWT. Hence a hybrid technique is implemented by incorporating benefits of DWT
and SVD both and achieved optimal values of PSNR as well as SSIM to provide better security to medical
images by preserving the quality as well.
Paper Title: IoT Implementation in Manufacturing using Data Analysis and Data Managemnt
Abstract: Since The Mechanical Miracle Happened In Light Of The Fact That Most Of The Calculations And
Estimations Of The Segments Required For The Collecting And Limit Of A Particular Thing Has Been Done
Physically But At This Point This Example Has Changed With The Introduction Of Iot Devices In
Organizations. These Gadgets Impart And Share Information With One Another Over Web To Make The Way
Toward Assembling Less Confounds And Efficient. For Instance, A Sensor Has Been Appended To The
Machine Which Estimates The Measure Of Vibrations Which Are Delivered While The Machine Is Working.
This information is then moved to a server over WLAN which can be viewed to or by any individual who is
working in the organization and after that be examinations to know the state of the said machine. Along the lines
57. any meltdown or breakage in system or in process that can occur because of unseemly use of the machine can be
avoided. This information can be seen by individuals who work for the organization, who has a login id and
secret key and has a gadget with a working web association as this information is visible or displayed on a site 371-375
that can be gotten to on any gadget utilizing any working framework.
The server that stores the information is kept running on MS Windows and the webpage from which the
information can be gotten to is made utilizing different web improvement dialects.
Keyword : IOT, Industry 4.0, Data Science, Data Management, Networking, Machine Learning
References:
1. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
2. Smart Factories in Industry 4.0: A Review of the Concept and of Energy Management Approached in Production Based on the Inter net
of Things Paradigm
3. Training a Hidden Markov Model-Based Knowledge Model for Autonomous Manufacturing Resources Allocation in Smart Shop Floors
4. An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain
5. Establishing and improving manufacturing performance measures
6. Implementation of A Production-Control System using Integrated AutomationML and OPC UA
7. Establishing and improving manufacturing performance measures
8. Software-Defined Industrial Internet of Things in the Context of Industry 4.0
9. Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations
10. Real-Time Manufacturing Machine and System Performance Monitoring Using Internet of Things
11. Development of a simulation-based decision support system for controlling stochastic flexible job shop manufacturing systems.
Paper Title: Mobile Based Multi-Factor Authentication Algorithm for Secure Online Transaction
Abstract: In today’s world, online payment system is one of the essential requirements of people. Security in
online transactions is still a major challenge for the researchers. This work is emphasizing on providing highly
secure environment for online transactions to user. One time password is one of the mechanisms to reduce online
fraud, still many cases of fake transactions are happening frequently. It requires more attention to establish the
faith in E-banking services. The present research article is proposing a multi-factor based secure algorithm
which enhances the security for the online transaction services. To increase the authenticity, the proposed
algorithm is working on two strategies: a) One Time Password Based Authentication and b) Dedicated Hardware
Based Authentication.
Paper Title: Classification of Diabetic Retinopathy Features using Bag of Feature Model
Abstract: Deep learning (DL) as well as feature learning by unsupervised methods have made tremendous
consideration in the past decades because of its great and dynamic capacity to change input data into high level
depictions by means of various machine learning (ML) methods and approaches. Therefore these interests have
also showed a fast and steady growth in the arena of medical image analysis, especially in Diabetic Retinopathy
(DR) classification. On contradiction, manual interpretation involves excessive processing time, large amount of
expertise and work. Sternness of the DR is analyzed relative to the existence of Microaneurysms (MAs),
Exudates (EXs) and Hemorrhages(HEs). Spotting of DR in its early stage is crucial and important to avoid
blindness. This paper proposes an algorithm to build an automated system to extract the above mentioned DR
59. features which are the elemental and initial signs of diabetic retinopathy. Initial step in this algorithm is
preprocessing of the original image. The next step in this features extraction algorithms is elimination of optic
disc (OD) and blood vessels which have similar characteristic with these features. Blood vessels are segmented 381-385
using Multi-Level Adaptive Thresholding. OD is segmented using morphological operations. Feature extraction
and classification is achieved by using deep Bag of Feature (BoF) model which uses Speeded Up Robust
Features Our method achieved 100% acuuracy in DRIVE database and over 90% accuracy for e-OPTHA
database. Thus, the proposed methodology represents a track towards precise and highly automated DR
diagnosis on a large substantial scale along with better sensitivity and specificity.
Keyword : Bag of Feature model, microaneurysms, Diabetic Retinopathy, haemorrhages and exudates.
References:
1. Spencer, T., Olson, J.A., McHardy, K.C., Sharp, P.F., Forrester, J.V. “An image processing strategy for the segmentation and
quantification of microaneurysms in fluorescein angiograms of the ocular fundus.” Computers in Biomedical Research 29, 284–
302,1996.
2. A. D. Fleming, S. Philip, K. A. Goatman, J. A. Olson and P. F. Sharp, "Automated microaneurysm detection using local contrast
normalization and local vessel detection," in IEEE Transactions on Medical Imaging, vol. 25, no. 9, pp. 1223-1232, Sept. 2006.
3. Zhang, B., Wu, X., You, J., Li, Q. and Karray, F. “Detection of microaneurysms using multi-scale correlation coefficients.” Pattern
Recognition, 43(6), pp.2237-2248, 2010.
4. Lazar and A. Hajdu, "Retinal Microaneurysm Detection Through Local Rotating Cross-Section Profile Analysis," in IEEE
Transactions on Medical Imaging, vol. 32, no. 2, pp. 400-407, Feb. 2013.
5. D. Kavitha and S. S. Devi, ―Automatic detection of optic disc and exudates in retinal images,‖ in Intelligent Sensing and Information
Processing, 2005. Proceedings of 2005 International Conference on. IEEE, 2005, pp. 501–506.
6. P. H. Princye and V. Vijayakumari, ―Detection of exudates and feature extraction of retinal images using fuzzy clustering method,”
Computational Intelligence and Information Technology, 2013.
7. Mizutani, A., Muramatsu, C., Hatanaka, Y., Suemori, S., Hara, T. and Fujita, H., 2009, March. Automated microaneurysm detection
method based on double ring filter in retinal fundus images. In Medical Imaging 2009: Computer-Aided Diagnosis(Vol. 7260, p.
72601N). International Society for Optics and Photonics.
8. A. Osareh, M. Mirmehdi, B. Thomas, and R. Markham, “Comparative exudate classification using support vector machines and neural
networks”, in International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2002, pp. 413–
420.
9. L. Xu and S. Luo, “Support vector machine based method for identifying hard exudates in retinal images,” in Information, Compu ting
and Telecommunication, 2009. YC-ICT’09.IEEE Youth Conference on. IEEE, 2009, pp. 138–141.
10. V. V. Kumari and N. Suriya Narayanan, “Diabetic retinopathy-early detection using image processing techniques,” International
Journal on Computer Science and Engineering, vol. 2, no. 02, pp. 357–361, 2010
11. S. Roychowdhury, D. D. Koozekanani, and K. K.Parhi, “Dream: diabetic retinopathy analysis using machine learning,” IEEE journal of
biomedical and health informatics, vol. 18, no. 5, pp. 1717–1728, 2014.
12. Anil Kumar K.R and Meenakshy K, “ Retinal Vasculature Extraction using Non-Subsampled Contourlet Transform and Multi-structure
Element Morphology by Reconstruction,” International Journal of Recent Technology and Engineering (IJRTE), Vol-8 Issue-2, July
2019. Page No.: 116-125.
13. Dutta, Suvajit, et al. "Classification of diabetic retinopathy images by using deep learning models." International Journal of Grid and
Distributed Computing 11.1 (2018): 89-106.
14. 14. K. Adem, “Exudate detection for diabetic retinopathy with circular hough transformation and convolutional neural networks,”
Expert Systems with Applications, vol. 114, pp.289–295, 2018.
Keyword : Information communication technology (ICT), e-resources, e-learning, distance learning systems,
cloud technologies.
References:
1. Mohammed Mansur Ibrahim and Muesser Nat. Blended learning motivation model for instructors in higher education institutions
(2019) International Journal of Educational Technology in Higher Educationhttps://doi.org/10.1186/s41239-019-0145-2
2. Bates, A. W. T., &Sangrà, A. (2011). Managing technology in higher education: Strategies for transforming teaching and learning.
Hoboken: Wiley.
3. Buabeng-Andoh Charles, YidanaIssifu. Innovations in education: Students’ perceptions of implementing ICT in learning in second -
60. cycle institutions in Ghana. 7th World Conference on Educational Sciences, (WCES-2015), 05-07 February 2015, NovotelAthens
Convention Center, Athens, Greece
4. Tezci, E. (2012). Factors that influence pre-service teachers’ ICT usage in education. European Journal of Teacher Education, 34(4), 386-392
483-499.
5. Moore, M. G., &Kearsley, G. (2011). Distance Education: A Systems View of Online Learning, 3rd edn. Michigan: CengageLearning.
6. Gikas, J., & Grant, M. M. (2013). Mobile computing devices in higher education: Student perspectives on learning with cellpho nes,
smartphones & social media. The Internet & Higher Education, 19, 18–26.
7. Moore, J. L., Dickson-Deane, C., &Galyen, K. (2011). e-learning, online learning, and distance learning environments: Are they the
same? The Internet and Higher Education, 14(2), 129–135.
8. Ng’ambi, D., &Bozalek, V. (2015). Massive open online courses (MOOCs): Disrupting teaching and learning practices in higher
education. British Journal of Educational Technology, 46(3), 451–454.
9. Porter, W. W., Graham, C. R., Spring, K. A., & Welch, K. R. (2014). Blended learning in higher education: Institutional adoption and
implementation. Computers & Education, 75, 185–195.
10. Natalia P. Nikonova, Larisa N. Gorina, Linar G. Akhmetov (2019). The use of cloud technologies in the Modern Educational Proc ess.
International journal of Innovative technology and Exploring Engineering. Vol:8 Issue 9S3.
11. Measuring the Information society report, Volume 1, 2018, ITU Publications, p.2
12. Adriana Denisa MANEA. Educational Values within the Scope of the Technological Revolution. Astra Salvensis. VII(2019), no.14,
p.31-37.
13. Anchalee Ngampornchai and Jonathan Adams. Students’ acceptance and readiness for E-learning in Northeastern Thailand.
InternationalJournalofEducational technologyinHigherEducation (2016)
14. Arnold and Sangrà. Dawn or dusk of the 5th age of research in educational technology? A literature review on (e-)leadership for
technology-enhanced learning in higher education (2013-2017).
InternationalJournalofEducationalTechnologyinHigherEducation(2018)
15. “Measuring the Information society report” Volume 1, 2018, ITU Publications.
16. McLachlan, C., Craig, A., & Coldwell, J., (2010). Student perceptions of ICT: A Gendered Analysis, in ACE 2010 : Proceedings of the
Twelfth Australasian Computing Education Conference, Australian Computer Society, Sydney South, N.S.W.
17. Wigfield, A., & Eccles, J.S. (2000). Expectancy-value theory of achievement motivation. Contemporary Educational Psychology, 25,
116-119.
18. Adi Suyani. ICT in Education: Its benefits, difficulties and organizational development issues. Jurnal Sosial Humaniora. Vol 3 no.1,
2010
Salhana Ismail, Aizat Mohd Taib, Norinah Abd. Rahman, Dayang Zulaika Abang Hasbollah,
Authors:
Ahmad Bukhari Ramli
Paper Title: Slope Stability of Landfill with Waste Degradation
Abstract: Nowadays, a large amount of municipal solid waste (MSW) is generated due to the rapid
urbanisation in developing countries leads to the demand for larger and higher capacity landfills. Bioreactor
landfill technology has been introduced to accelerate the stability of landfill and to solve the issue of limited
landfill area. However, the accelerated degradation of the refuse in bioreactor landfills also considerably changes
the geotechnical characteristics of the waste in the landfill and thereby increases the concern for waste stability.
Hence, this study aims to analyse the stability of both conventional and bioreactor landfill slope with the effects
of waste degradation. Finite element method has been used in the slope stability analysis and the stability is
presented by the factor of safety. The objectives of this study are i) to determine and assess the main parameter
which influences the stability of the waste slope, ii) to determine the effects of waste degradation to the waste
properties and iii) to obtain the factor of safety of the landfill slope using numerical analysis by finite element
method. From the literature review, it is found that slope stability of a landfill mainly depends on the
geotechnical properties of waste, such as moisture content, unit weight, shear strength parameters and hydraulic
conductivity of waste. After the degradation process, engineering properties of field refuse are affected which
includes the increased pore-water pressure and unit weight, decreased strength and lower hydraulic conductivity.
Based on the analysis of conventional landfill slope stability by using Plaxis software, slope ratio of 1:3, 1:4 and
1:5 calculated safe with 1.69, 2.3 and 2.8 whereas the analysis of bioreactor landfill slope stability calculated
safe only for slope ratio of 1:4 and 1:5 with 1.60 and 1.97. Moreover, the factor of safety for steeper slopes is
lower and vice versa. From the parametric analysis, it is found that the full height of slope and unit weight of
waste input affect the result analysis. This study is significant to evaluate the landfill slope stability with the
effects of waste degradation and to ensure both conventional and bioreactor landfill slope stability for long
periods.
Keyword : Landfill, bioreactor, waste degradation, finite element analysis, factor of safety.
References:
1. M. Warith, “Solid waste management: new trends in landfill design,” Emirates Journal for Engineering Research, 8.1, 2003, pp. 61-70.
2. Y. Huang and G. Fan, “Engineering geological analysis of municipal solid waste landfill stability,” Natural Hazards, 84, 2016.
3. G.S. Babu, K.R. Reddy, and A. Srivastava, “Influence of spatially variable geotechnical properties of MSW on stability of lan dfill
slopes,” Journal of Hazardous, Toxic, and Radioactive Waste, 18(1), 2012, pp. 27-37.
61. 4. A. Jahanfar, B. Gharabaghi, E.A. McBean, and B.K. Dubey, “Municipal solid waste slope stability modeling: a probabilistic
approach.,” Journal of Geotechnical and Geoenvironmental Engineering, 143(8), 2017, 04017035.
5. W. Gao, X.-C. Bian, W.-J. Xu, and Y.-M. Chen, “Storage capacity and slope stability analysis of municipal solid waste landfills,” 393-398
Journal of Performance of Constructed Facilities, 32(4), 2018, 04018036.
6. F. Koelsch, K. Fricke, C. Mahler, and E. Damanhuri, “Stability of landfills - The Bandung dumpsite disaster,” in Proceedings Sardinia,
2005.
7. Q. Xu, T. Tolaymat, and T.G. Townsend, “Impact of pressurized liquids addition on landfill slope stability,” Journal of Geote chnical
and Geoenvironmental Engineering, 138(4), 2011, pp. 472-480.
8. D. Zekkos, E. Kavazanjian,J. D. Bray, N. Matasovic, and M. Riemer, “Physical Characterization of Municipal Solid Waste for
Geotechnical Purposes,” Journal of Geotechnical and Geoenvironmental Engineering - J GEOTECH GEOENVIRON ENG, 136, 2010.
9. G. Blight, “Slope failures in municipal solid waste dumps and landfills: a review,” Waste Management & Research, 26(5), 2008, pp.
448-463.
10. K.R. Reddy, H. Hettiarachchi, R.K. Giri, and J. Gangathulasi, “Effects of degradation on geotechnical properties of municipal solid
waste from Orchard Hills Landfill, USA,” International Journal of Geosynthetics and Ground Engineering, 1(3), 24, 2015.
11. F. Pohland, W. Cross, J. Gould, and D. Reinhart. “Behavior and assimilation of organic and inorganic priority pollutants codi sposed
with municipal refuse,” Volume 2. Appendices. Final report, Pittsburgh Univ., PA (United States). Dept. of Civil Engineering, 1993.
12. M.S. Hossain and K.K. Penmethsa, “Changes in geotechnical properties of Municipal Solid Waste (MSW) in bioreactor landfill with
degradation,” International Journal of Environmental Engineering, 3(3-4), 2011, pp. 349-370.
13. M. Hossain, M. Haque, and L. Hoyos, “Dynamic properties of municipal solid waste in bioreactor landfills with degradation,”
Geotechnical and Geological Engineering, 28(4), 2010, pp. 391-403.
14. K.R. Reddy, H. Hettiarachchi, J. Gangathulasi, and J.E. Bogner, “Geotechnical properties of municipal solid waste at differen t phases
of biodegradation,” Waste Management, 31(11), 2011, pp. 2275-2286.
15. A. Mohd Taib, M.R. Taha, and D.Z. Abang Hasbollah, “Validation of Numerical Modelling Techniques in Unsaturated Slope
Behaviour,” Jurnal Kejuruteraan, 5(Special Issue 1), 2018, pp. 29-35.
16. M. Mukhlisin, S.J. Matlan, M. Ahlan, and M. Taha, “Analysis of Rainfall Effect to Slope Stability in Ulu Klang, Malaysia,” Jurnal
Teknologi, 72, 2015.
17. E. Altalhea, M. Taha, and F. Abdrabbo, “Bearing Capacity of Strip Footing on Sand Slopes Reinforced with Geotextile and Soil Nails,”
Jurnal Teknologi, 65, 2013.
18. M. Mukhlisin, M.R. Baidillah, M.R. Taha, and A. El-Shafie, “Effect of soil water retention model on slope stability analysis,”
International Journal of Physical Sciences, 6(19), 2011, pp. 4629-4635.
19. M. Mukhlisin, I. Idris, W.Z. Yaacob, A. ElShafie, and M. Taha, “Soil slope deformation behavior in relation to soil water interaction
based on centrifuge physical modeling,” International Journal of Physical Sciences, 6, 2011, pp. 3126-3133.
20. R. Harianto, S. Alfrendo, W.C. Looi, W.J.L. Heng, and L.V. Han, “Effects of unsaturated properties on stability of slope covered with
Caesalpinia crista in Singapore,” Environmental Geotechnics, 0(0), 2018, pp. 1-11.
21. C. Kristo, H. Rahardjo, and A. Satyanaga, “Effect of variations in rainfall intensity on slope stability in Singapore,” International Soil
and Water Conservation Research, 5(4), 2017, pp. 258-264.
22. C.-C. Fan and R.-Y. Zeng, “Effect of characteristics of unsaturated soils on the stability of slopes subject to rainfall,” Japanese
Geotechnical Society Special Publication, 2(29), 2016, pp. 1060-1064.
23. M. Datta, “Stability of Slopes for Closure of Old Waste Dumps,” in GeoCongress 2008: Geotechnics of Waste Management and
Remediation, 2008, pp. 184-191.
24. T. Matsui and K.-C. San, “Finite element slope stability analysis by shear strength reduction technique,” Soils and foundations, 32(1),
1992, pp. 59-70.
25. R.K. Giri and K.R. Reddy, “Slope stability of bioreactor landfills during leachate injection: effects of heterogeneous and an isotropic
municipal solid waste conditions,” Waste Management & Research, 32(3), 2014, pp. 186-197.
26. N. Norsyahariati, N. Daud, A. Nurul Ayunie, I. Siti Aisyah, and A. Amimul, “The Stability Evaluations of Municipal Landfill i n
Malaysia for Future Land Use,” in Advanced Materials Research. Trans Tech Publ., 2014.
27. A. Omari, “Slope stability analysis of industrial solid waste landfills,” 2012.
28. M. Hossain and M. Haque, “Stability analyses of municipal solid waste landfills with decomposition,” Geotechnical and Geologi cal
Engineering, 27(6), 659, 2009.
Keyword : M/M/1 queue; switching policy; Simulation Techniques; Steady state probabilities
62.
References:
1. Banks J. Handbook of Simulation. Wiley Online Library, 1998. 399-403
2. D. Gross, Fundamentals of QueuingTheory, JohnWiley & Sons, Hoboken, NJ, USA, 4th edition, 2008.
3. G. Arul Freeda Vinodhini, V.Vidhya, Computational Analysis of Queues with Catastrophes in a Multiphase Random Environment,
Mathematical Problems in Engineering, Volume 2016, Article ID 2917917, 7 pages, http://dx.doi.org/10.1155/2016/2917917.
4. Huang Qing, S.R.Chakravarthy, Analytical and simulation modeling of a multi-server queue with Markovian arrivals and priority
services, Simulation Modelling Practice and Theory, Volume 28, November 2012, Pages 12-26.
5. Leonard Cleinrock, Queueing System, Volume 2, Computer Application(1976), 324-628.
6. Yael Perlman , Amir Elalouf , Uri Yechiali, Dynamic allocation of stochastically-arriving flexible resources to random streams of
objects with application to kidney cross-transplantation, European Journal of Operational Research 265 (2018) 169–177.
7. Katsaliaki K, Mustafee N. Applications of simulation within the healthcare context. J Oper Res Soc 2011;62:1431–51.
8. Zhang Ying,Guo Jingtian, Simulation of Queuing Disciplines Based on EXTEND, Journal of WUT(Information&Management
Engineering), 2007(5), pp. 20-24.
Keyword : Design, Smart system, Garage system, Automation system, Security, Safety.
References:
1. Afaz Uddin Ahmed , Taufiq Mahmud Masum , Mohammad Mahbubur Rahman , Design of an Automated Secure Garage System
Using License Plate Recognition Technique, I.J. Intelligent Systems and Applications, 2014, 02, 22-28.
2. Poonamsakhare, Gajala Shaikh, Satya Balaji and Rashmi Mahajan. Article: Implementation of Smart Garage. IJCA Proceedings on
National Conference on Advances in Computing, Communication and Networking ACCNET 2016(5):26-29, June 2016. Full text
available. BibTeX.
3. Ramneet Kaur, Balwinder Singh, design and implementation of car parking system on FPGA, International Journal of VLSI design and
Communication Systems (VLSICS) Vol.4, No.3, June 2013.
4. Ahidur, Md , Islam, Rahabul, Depiction of IoT Based Smart Vehicles Garage System. International Journal of Innovative Science and
Research Technology, Volume 3, Issue 8, August – 2018 3. 1-3, 2018.
5. https://www. Northshorecommercialdoor .com/lik2gadoopmo .html [accessed 19/02/2019]
65 References:
1. Salman iqbal,liana mat kian, bubak dhaghighi, muzammil hussain, suleman khan, Muhammad khurra khan, kim kwang, Raymond choo,
“ On cloud security attacks: A taxanomy and intrusion detection and prevention as a service, “ in journal of network and computer 414-417
applications , volume -74, PP. No 98-120, 2016.
2. Priyanka Chauhan, Rajender Singh, “ Security attacks on cloud computing with possible solutions,”, in international journal of
advanced research in computer science and software engineering,” vol-6, issue 1, PP.No 92-96, 2016.
3. Ardian J Duncan, Sadie Creese, Michal Goldsmith, “ Insider attacks in cloud computing,” in IEEE 11 th national conference on Trust
security and privacy in computing and communication, 2012.
4. Meiko Jensen, joy chwenk, nibs gruksha, lugi lo lacano, “ on technical security issues in cloud computing in “IEEE international
conference on cloud computing,”,PP. No. 2009
5. Ajey singh,, manesh Shrivastav, “ Overview of attacks on cloud computing,” in international journal of engineering and innovative
technology, vol-1, issue-4 , 2012.
6. Rashmi V. Deshmukh, Kailas K. Devadkar, Understanding DDoS Attack & Its Effect In Cloud Environment, in Procedia Computer
Science, volume -49, PP.No. 202 – 210, 2015.
7. A.M lonea, D.E. Popescu,H. Tianfiekd,” Detecting DDos attacks in cloud computing environment,” in International journal compute
communication, Vol-8, issue-, PP.No 70-78, 2013,
8. Victoria, NSW,”EDOS-shield- A two step mitigation technique against DDos attacks in cloud computing”, in IEEE international
conference on utility and cloud computing, PP.No 49-56 , 2011.
9. Miami, Florida, “Attack surfaces: A taxonomy for attacks on cloud services,” in IEEE international conference on cloud computing,
PP.No-276-279, 2010
10. Poonam Yadav, and Sujata, Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA, In
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol.3, No.3, PP.No. 25-41,2013.
11. Qiao Yan, F. RichardYu, Qingxian Gang, Jianqiang li, “Software defined networking and distributed denial of service(DDOS) attacks in
cloud environment: A Survey, some research issues and challenges,” in IEEE communication Survey & Tutorial, Vol-18, issue-1,2016
12. Naseer amara, Hang Zhiqui, Awais ali, “Cloud computing security threats and attacks with their mitigation techniques,” in International
conference on cyber enabled distributed computing and knowledge discovery, PP.No. 244-252, 2017.
13. Akhilesh kumar, “Handling DDoS attacks in Cloud computing based on SDN system,”in International journal of science computer
science engineering and information technology,volume-2, issue-2, PP.No. 62-68, 2017.
14. Vidhya V, “A review of DoS attack in Cloud computing,” in IOSR journal of computer engineering, volume-16, issue-5,PP.No. 32-35,
2017.
15. Shakti Arora and Surjeet Dalal, “A variant of secret Sharing with Poly 1305,” Recent development of computational intelligenc e,
(Springer Series of computational intelligence), ISBN 978-3-03012500-4, Doi/10.1007/978-3-030-12500-4–C-CTP-05/2016.
16. Shakti Arora and Surjeet Dalal, “Hybrid algorithm designed for handling remote integrity check mechanism over dynamic cloud
environment,” International journal of Engineering & Technology (Scopus), vol. 7 no.2.4, pp.161-164, 2018,.
17. Shakti Arora and Surjeet Dalal, “Enhanced privacy preserving access control in the cloud,” International Journal of Recent Research
Aspects, vol. 4, pp. 66-70, 2016.
18. Shakti Arora and Surjeet Dalal, “Study of Integrity Based Algorithms in Decentralized Cloud Computing Environme nt,” International
Journal of Institutional and Industrial Research, vol.1, no.1, pp. 15-17, 2016.
19. Shakti Arora and Surjeet Dalal, “Novel approach for Integrity Verification in Dynamic Cloud environment,” International journ al of
science and information security, vol.14, no. 8, 2016.
Authors: Aruna Varanasi, SSK Teja Madduri, Alekya Malka, Vineeth Chepuri
Keyword : Mobile Ad-hoc Network, Centralized Cluster Configuration, Grid-Based Clustering, Verification
Algorithm, Wireless Network, Network Lifetime.
References:
1. Bi .Y, Sun .L, Ma .J, Li .N, Khan .I.A and Chen .C, “HUMS: An autonomous moving strategy for mobile sinks in data-gathering sensor
networks,” Eurasia Journal of Wireless Communication and Networking, Special Issue on Novel Techniques for Analysis and Desig n,
December 2007.
2. Chandrakala .C.B, Prema .K.V and HAREESHA .K.S, “Energy Efficient and Entropy based Clustering for MANET”, Indian Journal of
Science and Technology, Vol. 9(S1), pp.1-7, December 2016.
3. Kotishwaran Thanigaivelu and Krishnan Murugan,” Grid-based Clustering with Predefined Path Mobility for Mobile Sink Data
Collection in WSN”, IETE TECHNICAL REVIEW, Vol.29 (2), pp. 133-147, MAR-APR 2012.
4. Li .J and Mohapatra .P, “Analytical modelling and mitigation techniques for the energy hole problem in sensor networks,” Else vier
Pervasive and Mobile Computing, Vol.3 (8), pp.233-254, 2007.
5. Lin .K, Chen .M, Zeadally .S and Rodrigues .J.J.P.C, “Balancing energy consumption with mobile agents in wireless sensor networks”,
Elsevier Journal of Future Generation Computer Systems, Vol. 28(2), pp.446-456, February 2012.
6. Martaa .M and Cardei .M, “Improved sensor network lifetime with multiple mobile sinks,” Elsevier Pervasive and Mobile Computing,
Vol. 5(5), pp. 542-55, Oct. 2009.
7. Sandeep Singh, Rajinder Singh, “Detection and Isolation of Selective Packet Drop Attack in MANET” International Advanced
Research Journal in Science, Engineering and Technology, Vol.4 (7), pp.94-99, July 2017.
8. Sherin Joy C.” Grid Based Energy Efficient Multipath Routing Protocol In Wireless Sensor Network Using Fuzzy Approach”.
International Journal of Engineering Research & Technology (IJERT), Vol. 3(4), pp.1122-1126, April 2014.
9. Thanigaivelu .K and Murugan .K, “Impact of Sink mobility on network performance in wireless sensor networks” in proc of IEEE
International conference on Networks and Communications, (NetCoM-2009), pp. 7-11, 27-29, Dec- 2009.
10. Wu .X, Chen .G, and Das .S.K, “Avoiding energy holes in wireless sensor networks with non -uniform node distribution”, IEEE
Transactions on Parallel and Distributed System, Vol.19 (5), pp. 710-200, May 2008
11. Younis .O and Fahmy .S, “HEED: A hybrid, energy-efficient, distributed clustering approach for Ad Hoc sensor networks”, IEEE
Transactions on Mobile Computing, Vol. 3(4), pp. 366-79, Oct-Dec. 2004.
12. Received from https://en.wikipedia.org/wiki/Neighbourhood_components_analysis
13. https://www.igi-global.com/dictionary/probability-of-false-alarm-/46090
14. https://en.wikipedia.org/wiki/Probability_of_error
15. https://www.igi-global.com/dictionary/miss-detection-probability/46227
16. https://en.wikipedia.org/wiki/Packet_loss
Paper Title: Designing a Novel PTS Method to Reduce Peak to Average Power Ratio in OFDM
Abstract: Most of the wireless standards used these days, heavily rely on Orthogonal Frequency Division Multiplexing
(OFDM). Peak to Average Power Ratio (PAPR) is one of the known key acknowledged confines of OFDM. Reduced PAPR
at OFDM transmitter helps power amplifier to operate in stable mode and reduction in complexity of digital to analog
converter (DAC). Several PAPR reduction techniques have been evolved from different principles such as signal scrambling
techniques, such as Partial Transmit Sequence (PTS), signal distortion techniques such as Clipping, etc. Reducing PAPR
degrades bit error rate (BER) or computational complexity. PTS is one of the best methods of PAPR reduction. There is large
scope of betterment of PTS to get a best PAPR reduction technique. In this paper we have concentrated on PTS scheme by
exploring PTS and its variants evolved over a period of time. We proposed a novel PTS with best performance balancing
PAPR and BER performance. Design and development of scheme is done using a graphical programming environment
LabVIEW (Laboratory Virtual Instrumentation Engineering Workbench) and real time environment validation is done with
software defined radio – NIUSRP2922, which is National Instruments Universal Software Radio Peripheral. The paper has
three sections in first section, Introduction, the OFDM fundamentals and PAPR are defined in design perspective, in second
section conventional and proposed PTS schemes have been explained. The third section consists of result and conclusion.
Keyword : DC-DC converter, superlift luo converter, proportional and integral controller ,Particle Swarm
Optimization
References:
1. K. Sundareswaran, Kiran Kuruvinashetti, P.S. Nayak,Application of Particle Swarm Optimization for Output Voltage Regulation of
Dual Input Buck-Boost Converter ,International Conference on Green Computing Communication and Electrical Engineering
(ICGCCEE), 6-8 March 2014
2. B. G. Dobbs and P. L.Chapman (2003), "A Multiple-Input DC-DC Converter Topology," IEEE Trans. Power Electron., vol. 1, no. 1, 436-440
pp. 6-9.
3. M. Namnabat, M. Bayati Poodeh, S. Eshtehardiha, “Comparison the Control Methods in Improvement the Performance of the DC-DC
Converter”, International Conference on Power Electronics 2007, (ICPE’07), pp.246-251, 2007
4. Fang Lin Luo, Hong Ye, “Advanced DC-DCconverters”, CRC Press.
5. Luo ,F.L, “Positive output Luo- converter voltage lift Technique”, IEE-EPAprocessdings,146(4),July 1999,pp.415-432.
6. J.F.HUANG, F.B.DONG, “Modelling and Control on Isolated DC-DC Converter”, Power Electronics, voI.44, pp.87-89, April 2010.
7. Kennedy J, and Eberhart, R " Particle Swarm Optimization,"Proceddings IEEE International Conference on Neural Networks,Vol 41 ,
November/December 1995,PP942-1948
8. R.Suresh Kumar, J.Suganthi, “Improving the Boost Converter PID Controller Performance Using Particle Swarm
Optimization”,EuropenJournal of Scientific Research, Vol.85 No3 September,2012,pp.327 – 335.
9. Y.Li and Z.C.Duan,”Optimization for parameter of PID based on PSO”, Machinery & Electronics, Issue: 9 pp. 26-28, 2004.
10. [B.Nagaraj, P. Vijayakumar “A comparative study of PID controller tuning using GA, EP, PSO, and ACO”, Journal of Automation,
Mobile Robotics & Intelligent Systems, volume 5, 2011.
11. Ashish Grover, Anita Khosla, Dheeraj Joshi “Study of different simulation software’s for optimization and economic analysis of
photovoltaic system” international journal of advanced research (ijar), Vol 7, Issue 05,2019.
12. Luo, F.L. and H. Ye, 2001. DC/DC conversion techniques and nine series Luo converters. In: Power Electronics Handbook, Rashid,
M.H. (Ed.), CA, Academic, San Diego, pp: 17-17.
13. Ibrahim Alhamrouni , M. K. Rahmat, F. A. Ismail , Mohamed Salem , Awang Jusoh , T. Sutikno, “Design and development of SEPIC
DC-DC boost converter for photovoltaic application” International Journal of Power Electronics and Drive System (IJPEDS) Vol. 10,
No. 1, March 2019, pp. 406~413
Authors: Ahmad Fauzan Zakki, Aulia Windyandari, Deddy Chrismianto, Iqbal Habib
Development of Monohull Fish Processing Vessel Hullform to Support Domestic Fishing Activities in
Paper Title:
Indonesia
Abstract: This research is focused on the development of the design and prototype of monohull fish
processing vessel hullform to support fishing activities such as catching fish, collecting fish from the smaller
boats and processing fish catches. The extensive on-board facilities in the fish processing vessel are maintaining
the freshness of the catch and improving the quality of catch fish than traditional fishing boat. The initial stage of
this study is determining the principal dimension and exploring of the configurations of monohull hull forms.
Furthermore, the investigation of resistance characteristics, intact stability and seakeeping behavior was carried
out using strip theory and computational fluid dynamic methods. Regarding the performance of the hulls
resistance, the analysis indicates that the hull form with smaller block coefficients showed better resistance
characteristics. In the case of intact stability, the results of the analysis showed that the model 2 of monohull hull
form showed better intact stability characteristics compared to the other models.
Paper Title: An GPS Based Online Blood Bank Management using Database Management System
Abstract: Blood is one of the main components of our body helping in some of the major functions and its presence in
right quantity is very important for proper functioning. Therefore, blood need is going increasingly and in great demand
because of so increase in the numbers of accidents, surgery or diseases where blood production is very less resulting in loss
of blood from the victim’s body. So, it is becoming a great need to propose a system which is very much efficient and time
friendly and currently proposed system of online blood donation system is not much efficient and non-real time service. We
have introduced our system where hospitals can directly contact the persons who have registered themselves having blood
type same as required within their local area or person can donate blood himself to the nearest blood banks and his blood
type updated in along with the total quantity of blood of different types available in the different blood banks. The time
requirement of the blood by the needed has been improved effectively in our system.
Keyword : E-Learning; Effectiveness of Teaching; Teaching and Learning Tools, New Education.
References:
1. Arkorful, V., & Abaidoo, N. (2014). The role of eLearning, the advantages and disadvantages of its adoption in Higher Education.
International Journal of Education and Research, 2(12).
2. Adebisi. J. F. (2013). Time management practices and its effect on business performance. Canadian Social Science, 9(1),165-168.
3. Al-Adwan, A., & Smedley, Jo. (2012). Implementing eLearning in the Jordanian Higher Education System: Factors affecting impact.
International Journal of Education and Development using Information and Communication Technology (IJEDICT), 8(1), 121-135.
4. Bora, U. J. & Ahmed, M. (2013). ELearning using Cloud Computing. International Journal of Science and Modern Engineering
(IJISME), 1(2).
5. Chen, X., Jin, R., Suh, K., Wang, B. & Wei, W. (2012). Network Performance of Smart Mobile Handhelds in a University Campus
WiFi Network.
73. 6. Clark, R. C., & Mayer, R. E. (2016). E-learning and the science of instruction: Proven guidelines for consumers and designers of
multimedia learning: John Wiley & Sons.
7. Ecclesfield, N., & Garnett, F. (2015). ELearning and Public Value. Innovation in Teaching and Learning in Information and Computer
Sciences, 5(4), 1-7. 458-463
8. Gilakjani, A. P. (2012). A match or mismatch between the learning styles of the learners and teaching styles of th e teachers.
International Journal of Modern Education and Computer Science, 11, 51-60.
9. Hair, J. F., Celsi, M., Money, A. H., Samouel, P., & Page, M. (2015). The essentials of business research methods. Third edition. New
York: Routledge.
10. Huang, E. Y., Lin, S. W. & Huang, T. K. (2012). What type of learning style leads to online participation in the mixed-mode eLearning
environment? A study of software usage instruction. Journal of Computers & Education, 58, 338-349.
11. Jethro, O. O., Grace, A. M., & Thomas, A. K. (2012). ELearning and its effect on teaching and learning in global age. International
Journal of Academic Research in Business and Social Sciences, 2(1).
12. Lukman, R. & Krajnc, M. (2012). Exploring non-traditional learning methods in virtual and real-world environments. Article in
Educational Technology & Society, 15(1), 237-247.
13. Lumadi, M. W (2013). ELearning’s impact on the academic performance of student-teachers: a curriculum lens. Mediterranean Journal
of Social Sciences, 4(14).
14. Mann, A. S. (2014). Science Teachers‘ Experience in integrating Information and Communication Technology (ICT) into their teaching
practices. Degree of Master of Teaching Department of Curriculum, Teaching and Learning Ontario Institute for Studies in Education of
the University of Toronto.
15. Masoumi, D., & Lindström, B. (2012). Quality in E‐Learning: A Framework for Promoting and Assuring Quality in Virtual Institutions.
Journal of Computer Assisted Learning, 28(1), 27-41.
16. Osuafor, A. M. & Emeji, E. O. (2015). Utilization of ELearning Facilities by Science Teacher Educators for Teaching Pre-Service
Teachers in Nigerian Colleges of Education. Asian Journal of Education and E-Learning, 3(2).
17. Parry, D. C. L., Marwood, S., & Walsh, C. (2015). Realizing E-Learning matters in a Bioscience. Bioscience Education Journal, 10.
18. Sekaran, U., Bougie, R. (2017). Research Methods for Business: A Skill Building Approach. United Kingdom: John Wiley & Sons, Ltd,
Publication
19. Sclater, N. (2012). E-Learning in the Cloud. International Journal of Virtual and Personal Learning Environments, 1(1), 10-19.
20. Umar, I. N., & Jalil, N. A. (2012). ICT Skills, Practices and Barriers of Its Use Among Secondary School Students. Procedia – Social
and Behavioral Sciences, 46, 5672-5676.
21. Venkataraman, S. & Sivakumar, S. (2015). Engaging Students in Group Based learning through eLearning techniques in Higher
Education System. International Journal of Emerging Trends in Science and Technology, 2(1), 1741-1746.
22. Verhoeven, J. C., Heerwegh, D., & Kurt, D. W. (2012). First year university students’ self-perception of ICT skills: Do learning styles
matter? Education and Information Technologies, 17 (1), 109-133.
23. Wit, K.D., Heerwegh, D.& Verhoeven, J.C. (2012). Do ICT Competences Support Educational Attainment at University? Journal of
Information Technology Education, 11.
Keyword : Plant leaf disease, Field screening, Machine learning, Fuzzy C-Means, Maize.
References:
1. R. Kumar, K. Srinivas, and M. A. M. Miah, “12th Asian Maize Conference and Expert Consultation on Maize for Food, Feed,
Nutrition and Environmental Security,” no. October, 2014.W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA:
Wadsworth, 1993, pp. 123–135.
2. L. Ahirwar, “Assessment of system productivity of rice-maize cropping system under irrigated ecosystem,” no. March, pp. 0–4, 2019.
3. S. Bashir and N. Sharma, “Remote Area Plant Disease Detection Using Image Processing,” vol. 2, no. 6, pp. 31 –34, 2012.
4. A. R. Ram, “Plant Disease Detection Using Leaf Pattern : A Review,” vol. 2, no. 6, pp. 774–780, 2015.
5. B. N. Prasad, M. Rathore, G. Gupta, and T. Singh, “Performance Measure of Hard c-means, Fuzzy c-means and Alternative c-means
Algorithms,” vol. 7, no. 2, pp. 878–883, 2016.
464-467
6. J. D. K, R. Ganesan, and A. Merline, “Fuzzy-C-Means Clustering Based Segmentation and CNN-Classification for Accurate
Segmentation of Lung Nodules,” vol. 18, pp. 1869–1874, 2017.
7. P. A. S. Bhide, “Brain Segmentation using Fuzzy C means clustering to detect tumour Region,” vol. 1, no. 2, pp. 85–90, 2012.
8. V. Radhika, “Segmentation of Oil Spill Images using Improved FCM and Level Set Methods,” vol. 3, no. 7, pp. 2786–2791, 2011.
9. M. Rameez et al., “ScienceDirect Vehicle Vehicle Classification Based on Multiple Fuzzy C-Means Clustering Using Dimensions and
Speed Features Using Dimensions and Speed Features,” Procedia Comput. Sci., vol. 126, pp. 1344–1350, 2018.
10. M. Premasundari and C. Yamini, “A Violent Crime Analysis using Fuzzy C-Means Clustering Approach,” vol. 6956, no. April, pp.
1939–1944, 2019.
11. R. Suganya and R. Shanthi, “Fuzzy C- Means Algorithm- A Review,” vol. 2, no. 11, pp. 1–3, 2012.
12. A. Srivastava, B. Hazela, P. Khanna, and D. Arora, “Application of Fuzzy C-Means (FCM) Algorithm in Image Apportionment,” pp.
4–8, 2019.
13. C. Kanan and G. W. Cottrell, “Color-to-Grayscale : Does the Method Matter in Image Recognition,” vol. 7, no. 1, 2012.
14. K. Padmavathi and K. Thangadurai, “Implementation of RGB and Grayscale Images in Plant Leaves Disease Detection – Comparative
Study,” vol. 9, no. February, pp. 4–9, 2016.
15. R. V Yampolskiy, “Efficiency Theory : a Unifying Theory for Information, Computation and Intelligence,” vol. 1, no. 21, pp. 1–3,
2014.
16. A. N. Patil, “Survey on Detection and Classification of Plant Leaf Disease in Agriculture Environment,” vol2, no. 3, November, 2017.
17. V. Singh and A. K. Misra, “Detection of plant leaf diseases using image segmentation and soft computing techniques,” Inf. Process.
Agric., vol. 4, no. 1, pp. 41–49, 2017.
18. J. Garcia and A. Barbedo, “Digital image processing techniques for detecting, quantifying and classifying plant diseases,” pp. 1–12,
2013.
19. N. J. Cunniffe, F. F. Laranjeira, F. M. Neri, R. E. Desimone, and C. A. Gilligan, “Cost-Effective Control of Plant Disease When
Epidemiological Knowledge Is Incomplete : Modelling Bahia Bark Scaling of Citrus,” vol. 10, no. 8, 2014.
20. C. Schmitz, S. Bartsch, and A. Meyer, “Mobile App Usage and Its Implications for Service Management – Empirical Findings from
German Public Transport,” Procedia - Soc. Behav. Sci., vol. 224, no. August 2015, pp. 230–237, 2016.
Authors: Viktor Glaz, Yuliya Glaz, Aleksander Zbritskiy, Tatiana Ivchik, Alexey Tolmachev
Paper Title: An Efficient Techniques used for Diagnosis of Mitral Valve Regurgitation Severity
Abstract: Mitral valve diseases are more common nowadays and might not show up any symptoms. The
earlier diagnosis of mitral valve abnormalities such as mitral valve stenosis, mitral valve prolapses and mitral
valve regurgitation is most important in order to avoid complex situation. Many existing methodologies such as
heart sound investigation model, 3-layered artificial neural network (ANN) of phonocardiogram recordings, 3-
layer artificial neural network (ANN) of phonocardiogram recording, echocardiography techniques and so on are
there for Mitral Valve diagnosis, but still most of the methods suffer from inefficient image segmentation and
misclassification problems. In order to address this issue, this paper proposes two techniques namely 1) Deep
Learning based Convolutional Neural Network (CNN) model for Mitral Valve classification model meant for
diagnosis and edge detection-based segmentation model to enhance the classifier accuracy. 2) Watershed
Segmentation for Mitral Valve identification and image segmentation and Xception model with Random Forest
(RF) classifier for training and classification. The proposed models are evaluated in terms of three parameters
namely accuracy, sensitivity and specificity, which proved that the proposed models are efficient and appropriate
for Mitral Valve diagnosis.
Keyword : Deep Learning based Convolutional Neural Network (CNN) model, Edge detection-based
segmentation model, Watershed Segmentation, Xception model with Random Forest (RF) classifier.
References:
1. B. Ericson, Heart Sounds and Murmurs: A Practical Guide, Mosby-Year Book Inc., 1997.
2. Ulrich, C., Jensen, M., Oberlin, R., Tavakolian, K., Khosrow-Khavar, F., Blaber, A., Sørensen, K. and Schmidt, S., 2018, September.
Determining the Respiratory State from a Seismocardiographic Signal-A Machine Learning Approach. In 2018 Computing in
Cardiology Conference (CinC) (Vol. 45, pp. 1-4). IEEE.
3. Ahmad, S.A., Chavan, C., Badhani, R., Diwan, A., Periasamy, M. and Wankhade, V., 2019. Epidemiology of frequent admitters of
cardiovascular diseases in urbanizing Pune population. Australasian Medical Journal (Online), 12(7), pp.189-199.
4. Mayr, A., Pamminger, M., Reindl, M., Greulich, S., Reinstadler, S.J., Tiller, C., Holzknecht, M., Nalbach, T., Plappert, D.,
Kranewitter, C. and Klug, G., 2019. Mitral annular plane systolic excursion by cardiac MR is an easy tool for optimized progn osis
assessment in ST-elevation myocardial infarction. European Radiology, pp.1-10.
5. DeGroff, Curt G., Sanjay Bhatikar, Jean Hertzberg, Robin Shandas, Lilliam Valdes-Cruz, and Roop L. Mahajan. "Artificial neural
78. network–based method of screening heart murmurs in children." Circulation 103, no. 22 (2001): 2711-2716.
6. H. Nygaard, L. Thuesen, J.M. Hasenkam, E.M. Pedersen, P.K. Paulsen, Assessing the severity of aortic valve stenosis by spectr al
analysis of cardiac murmurs (spectral vibrocardiography). Part I. Technical aspects, Journal of Heart Valve Disease 2 (July (4)) (1993) 486-491
454–467.
7. J.E. Hebden, J.N. Torry, Identification of aortic stenosis and mitral regurgitation by heart sound analysis, Computers in Cardiology 24
(1997) 109–112.
8. Bijvoet, G.P., Teske, A.J., Chamuleau, S.A.J., Hart, E.A., Jansen, R. and Schaap, J., 2019. Global longitudinal strain to predict left
ventricular dysfunction in asymptomatic patients with severe mitral valve regurgitation: literature review. Netherlands Heart Journal,
pp.1-8.
9. M. Brusco, H. Nazeran, Development of an intelligent PDA-based wearable digital phonocardiograph, in: Proceedings of the 2005
IEEE Engineering in Medicine and Biology 27th Annual Conference, 4, 2005, pp. 3506–3509.
10. J. Herold, R. Schroeder, F. Nasticzky, V. Baier, A. Mix, T. Huebner, A. Voss, Diagnosing aortic valve stenosis by correlation analysis
of wavelet filtered heart sounds, Medical and Biological Engineering and Computing 43 (2005) 451–456.
11. A. Voss, A. Mix, T. Huebner, Diagnosing aortic valve stenosis by parameter extraction of heart sound signals, Annals of Biomedical
Engineering 33 (September (9)) (2005) 1167–1174.
12. K. Higuchi, K. Sato, H. Makuuchi, A. Furuse, S. Takamoto, H. Takeda, Automated diagnosis of heart disease in patients with he art
murmurs: application of a neural network technique, Journal of Medical Engineering and Technology 30 (March–April (2)) (2006) 61–
68.
13. C. Ahlstrom, P. Hult, P. Rask, J.E. Karlsson, E. Nylander, U. Dahlstrom, P. Ask, Feature extraction for systolic heart murmur
classification, Annals of Biomedical Engineering 34 (November (11)) (2006) 1666–1677.
14. S. Pavlopoulos, A. Stasis, E. Loukis, A decision tree-based method for he differential diagnosis of aortic stenosis from mitral
regurgitation using heart sounds, Biomedical Engineering OnLine (June (3)) (2004) 1–5.
15. S. Chauhan, P. Wang, C.S. Lim, V. Anantharaman, A Computer Aided MFCC based HMM system for automatic auscultation,
Computers in Biology and Medicine 38 (2) (2008) 221–233.
16. I. Turkoglu, A. Arslan, E. Ilkay, An expert system for diagnosis of the heart valve diseases, Expert Systems with Applications 23
(2002) 229–236.
17. H. Uguz, A. Arslan, I. Turkoglu, A biomedical system based on hidden Markov model for diagnosis of the heart valve diseases, Pattern
Recognition Letters 28 (2007) 395–404.
18. E. Comak, A. Arslan, I. Turkoglu, A decision support system based on support vector machines for diagnosis of the heart valve
diseases, Computers in Biology and Medicine 37 (2007) 21–27.
19. Martin, Sébastien, Vincent Daanen, Olivier Chavanon, and Jocelyne Troccaz. "Fast segmentation of the mitral valve leaflet in
echocardiography." In International Workshop on Computer Vision Approaches to Medical Image Analysis, pp. 225 -235. Springer,
Berlin, Heidelberg, 2006.
20. Costa, Eva, Nelson Martins, Malik Saad Sultan, Diana Veiga, Manuel João Ferreira, Sandra da Silva Mattos, and Miguel Tavares
Coimbra. "A Preliminary Approach for the Segmentation of Mitral Valve Regurgitation Jet in Doppler Ecocardiography Images." I n
BIOIMAGING, pp. 47-54. 2017.
21. Dukler, Yoni, Yurun Ge, Yizhou Qian, Shintaro Yamamoto, Baichuan Yuan, Long Zhao, Andrea L. Bertozzi, Blake Hunter, Rafael
Llerena, and Jesse T. Yen. "Automatic valve segmentation in cardiac ultrasound time series data." In Medical Imaging 2018: Im age
Processing, vol. 10574, p. 105741Y. International Society for Optics and Photonics, 2018.
22. Pouch, Alison M., Hongzhi Wang, Manabu Takabe, Benjamin M. Jackson, Joseph H. Gorman III, Robert C. Gorman, Paul A.
Yushkevich, and Chandra M. Sehgal. "Fully automatic segmentation of the mitral leaflets in 3D Transesophageal echocardiographic
images using multi-atlas joint label fusion and deformable medial modeling." Medical image analysis 18, no. 1 (2014): 118-129.
23. Burlina, Philippe, Chad Sprouse, Daniel DeMenthon, Anne Jorstad, Radford Juang, Francisco Contijoch, Theodore Abraham, David
Yuh, and Elliot McVeigh. "Patient-specific modeling and analysis of the mitral valve using 3D-TEE." In International Conference on
Information Processing in Computer-Assisted Interventions, pp. 135-146. Springer, Berlin, Heidelberg, 2010.
24. P. Abdul Khayum, R. Sudheer Babu. Severity Analysis of Mitral Regurgitation Using Multi-Objective Firefly Optimization Method
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-4S2 March,
2019 P. Abdul
25. Villard, Pierre‐Frederic, Peter E. Hammer, Douglas P. Perrin, Pedro J. del Nido, and Robert D. Howe. "Fast image‐based mitral valve
simulation from individualized geometry." The International Journal of Medical Robotics and Computer Assisted Surgery 14, no. 2
(2018): e1880.
26. Saito, Ken, Hiroyuki Okura, Nozomi Watanabe, Kikuko Obase, Tomoko Tamada, Terumasa Koyama, Akihiro Hayashida, Yoji Neishi,
Takahiro Kawamoto, and Kiyoshi Yoshida. "Influence of chronic tethering of the mitral valve on mitral leaflet size and cooptation in
functional mitral regurgitation." JACC: Cardiovascular Imaging 5, no. 4 (2012): 337-345.
Paper Title: Secure Data Performance Analysis with OLSR and AODV Routing Protocols in MANET
Abstract: MANETs are vigorous network to obligate node links due to the wireless frequency affect the
network performance. It evaluates the link constancy by redefining the link availability that connected
throughout a specific time period. MANETs have an identical status to acquaintance by the node resources with
any other network. In this work, network is able to deal with vital reform that competent, consistent, and
accessible network to perform enhance network protocol along with data security. AODV network nodes need
connections broadcast forward the message that requested a connection that create a series of impermanent
routes back to the requesting node. In this work, a link state protocol is calculated an alternative and fragmented
path from source to destination by re-routing traffic through it, regardless of the locations of failure and the
number of failed links. Also, the purpose of this research work is to provide secure bit data networking and
occupy bit-memory address to enhance the node data capacity size, hence it reduces packets loss, delay time, and
improve throughput when re-join the nodes while failure. OLSR generate a control overhead to maintain routing
table to consume data traffic bandwidth. This study reduces the control overhead to improve the performance of
OLSR by optimizing control messages intervals to have enhanced and secure data transmission. In this work, a
secure and reliable bit-data is presented which have a memory address search process between two data address
as simulated in this work.
Paper Title: Detecting Kidney Disease using Naïve Bayes and Decision Tree in Machine Learning
Abstract: Chronic Kidney Disease (CKD) mostly influence patients suffered from difficulties due to diabetes
or high blood pressure and make them unable to carry out their daily activities. In a survey , it has been revealed
that one in 12 persons living in two biggest cities of India diagnosed of CKD features that put them at high risk
for unfavourable outcomes. In this article, we have analyzed as well as anticipated chronic kidney disease by
discovering the hidden pattern of the relationship using feature selection and Machine Learning classification
approach like naive Bayes classifier and decision tree(J48). The dataset on which these approaches are applied is
taken from UC Irvine repository. Based on certain feature, the approaches will predict whether a person is
diagnosed with a CKD or Not CKD. While performing comparative analysis, it has been observed that J48
decision tree gives high accuracy rate in prediction. J48 classifier proves to be efficient and more effective in
detecting kidney diseases.
Keyword : Chronic Kidney disease (CKD), Classification Techniques- J48, machine learning, naïve Bayes.
References:
1. https://www.healthline.com/human-body-maps/kidney
2. https://kidney.org.au/your-kidneys/support/kidney-disease/types
80. 3. Abeer, Ahmad, ‘Diagnosis and Classification of Chronic Renal failure Utilizing Intelligent Data Mining Classification’, International
Journal of Information Technology and Web Engineering, Volume 9 Issue 4, Pages 1-12, October 2014
4. Z. Sedighi, H. Ebrahimpour-Komleh, and S. J. Mousavirad, ‘Feature selection effects on kidney disease analysis’, International 498-501
Congress on Technology, Communication and Knowledge (ICTCK), pp. 455–459, 2015.
5. Manish Kumar, ‘Prediction of Chronic Kidney Disease Using Random Forest Machine Learning Algorithm’, International Journal of
Compute Science and Mobile Computing, Vol 5, Issue 2, pp. 24-33, Feb-2016.
6. S. Ramya ,Dr. N. Radha, ‘Diagnosis of Chronic Kidney Disease Using Machine Learning Algorithms’, International Journal of
Innovative Research in Computer and Communication Engineering, Vol 4, Issue 1, January 2016.
7. D. S.Vijayarani, Mr. S. Dhayanand, ‘Data Mining Classification Algorithms for Kidney Disease Prediction’, International journal of
Cybernetics and informatics (IJCI), Vol 4, August 2015.
8. Lambodar Jeena, Narendra Ku. Kamila, ‘Distributed Data Mining Classification Algorithms for Prediction of Chronic Kidney Disease’,
International Journal of Engineering Research in management and Technology, Vol 4, Issue 11, Nov 2015
9. Jurlin Rubini, “Generating Comparative Analysis of Early Stage Prediction of Chronic Kidney Disease”, International Journal o f
Modern Engineering Research, Vol 5, Issue 7, July 2015
10. P. Swathi baby, T. Panduranga Vital, ‘Statistical Analysis and Predicting Kidney Disease Using Machine Learning Algorithms’,
International Journal of Engineering Research and Technology (IJERT), Vol 4, Issue 07, pp. 206-210, July -2015.
11. P. Panwong and N. Iam-On, ‘Predicting transitional interval of kidney disease stages 3 to 5 using data mining method’, Second Asian
Conference on Defence Technology (ACDT), Vol 12, Issue 2, pp. 145–150, 2016
12. K. R. A. Padmanaban and G. Parthiban, ‘Applying Machine Learning Techniques for Predicting the Risk of Chronic Kidney Disease’,
Indian Journal of Science and Technology, vol. 9, pp. 29, Aug. 2016.
13. Boukenze, A. Haqiq, and H. Mousannif, ‘Predicting Chronic Kidney Failure Disease Using Data Mining Techniques’, in Advances in
Ubiquitous Networking 2, Springer, Vol 8, pp. 701–712, Singapore, 2017.
14. https://archive.ics.uci.edu/ml/datasets/chronic_kidney_disease#
15. http://dataaspirant.com/2017/02/06/naive-bayes-classifier-machine-learning
16. http://shodhganga.inflibnet.ac.in/bitstream/10603/21206/14/14_chapter%205.
Paper Title: Assessment of Joint Space in Knee Osteoarthritis using Particle Swarm Optimization Technique
Abstract: Osteoarthritis (OA) is one of the most common joint disorder which is debility seen in elderly &
overweight people which affects the cartilage of bone joints like knee, feet, hip, and spine. In OA usually,
cartilage is ruptured due to the kneading of bones with each other which will end up causing severe pain. In this
condition, it is necessary to analyze the severity of OA which involves various medical imaging and clinical
examination techniques. In this paper, automated analysis and detection of OA are proposed by calculating the
thickness of cartilage which also helps to effectively detect and analyze the abnormalities in bone structures.
81. Where we have considered various knee X-ray images. Initially, preprocessing and noise removal is performed.
Further by implementing Particle Swarm Optimization (PSO) segmentation and thresholding, the specified knee
region is cropped and analyzed to calculate the thickness of cartilage to detect the presence of OA. 502-507
Keyword : Osteoarthritis (OA), Articular Cartilage, X-ray images, Segmentation, Particle Swarm Optimization.
References:
1. Kazam JK, Nazarian LN, Miller TT, Sofka CM, Parker L, Adler RS, “Sonographic evaluation of femoral trochlear cartilage in patients
with knee pain”, Journal of Ultrasound in Medicine. Volume 30, Issue 6, pp: 797-802, Jun 2011.
2. Lilik Anifah, Ketut Eddy Purnama, Moch Hariadi, Mauridhi Hery Purnomo “Automatic Segmentation of Impaired Joint Space Are a for
Osteoarthritis Knee X-ray Image using Gabor Filter based Morphology Process”, The Journal of Technology & Science, Volume
22,Issue 3, pp:159-165,Aug 2011.
3. Mahima Shanker Pandey, Rajitha Suneeta Agarwal “ Computer Assisted Automated Detection of Knee Osteoarthritis using X-ray
Images”, Science& technology The International Quarterly Journal, ISSN 2394-3769, Volume 1, Issue 2,pp:74-79, April 2015.
4. Shivanand S. Gornale, Pooja U. Patravali, Ramesh R. Manza “A Survey on Exploration and Classification of Osteoarthritis Using Image
Processing Techniques”, International Journal of Scientific and Engineering Research (IJSER), ISSN 2229-5518, Volume 7, Issue 6,July
2016.
5. Bindushree R, Sanjeev Kubakaddi, Nataraj Urs “ Detection of Knee Osteoarthritis by Measuring the Joint Space Width in Knee X ray
Images”, International Journal of Electronics & Communication, ISSN 2321-5984, Volume 3, Issue 4, pp:18-21,April 2015.
6. Subramonium.M and Rajini.V “Support Vector Machine Approach for the Diagnosis of Arthritis from Digital X-ray Images Using Local
Ternary Pattern”, Indian Journal of Applied Research, Volume 3, Issue 9, Sept 2013.
7. G.W. Stachowiak, M. Wolski, and T. Woloszynski, P. Podsiadlo, “Detection and prediction of osteoarthritis in knee and hand jo ints
based on the X-ray image analysis”, Biosurface and Biotribology, Volume 2, Issue 4, pp: 162-172, Dec 2016.
8. Shamir L, Ling SM, Scott Jr WW, Bos A, Orlov N, Macura TJ, Eckley DM, Ferrucci L, Goldberg IG, “Knee X-ray image analysis
method for automated detection of osteoarthritis” IEEE Transactions on Biomedical Engineering Volume 56, Issue 2, pp:407-415, 2009.
9. N. Alamelumangai, Dr. J. Devishree, “PSO Aided Fuzzy Inference System for Ultrasound Image Segmentation”, International Journ al of
Computer Applications, Volume 7, Issue 14, pp. 16-20, 2010.
10. M.G.H. Omran, A. Salman, A.P. Engelbrecht, “Dynamic Clustering using PSO with Application in Image Segmentation”, Pattern
Analysis and Applications, Springer, Volume 8, Issue 4, pp. 332-344, 2006.
11. F. Yi, Z. Chongxun, P. Chen, L. Li, “White Blood Cell Image Segmentation using On-Line Trained Neural Network”, 27th Annual
International Conference of the Engineering in Medicine and Biology (IEEE-EMBS), pp. 6476-6479, 2005.
12. B.Jyothi, Y.Madhavee Latha, P.G.Krishna Mohan, V.S.K.Reddy “Medical Image Retrieval Using Moments”, International Journal of
Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Volume 2, Issue 1, Jan 2013.
13. Snekhalatha U, Anburajan M, Sowmiya V, Venkatraman B, and Menaka M “Automated hand thermal image segmentation and feature
extraction in the evaluation of rheumatoid arthritis”. Journal of engineering in medicine. 229. 319-31, 2015.
14. Shivanand S. Gornale, Pooja U. Patravali, Ramesh R. Manza, “Detection of Osteoarthritis using Knee X-Ray Image Analyses: A
Machine Vision Based Approach”, International Journal of Computer Applications (IJCA), ISSN-0975-8887, Volume 145, Issue 1,
pp.20-26, July 2016.
15. D E T Shepherd and B. B. Seedhom “Thickness of human articular cartilage in joints of the lower limb” Annals of the rheumatic
diseases, Volume 58, Issue 1, pp: 27-34, 1999.
Authors: Neha Munjal, Shiv Singh, Agnibha Das Majumdar, Gopal Rizal
Paper Title: Biophysics Research Trends in India: Special Reference to Indian Universities
Abstract: Biophysics is an effervescent scientific field where scientists from many areas including chemistry,
physics, zoology etc, use their skills to explore and develop new tools for understanding how the life sciences
work. The objective of this paper is to present the preliminary results and to identify the growth and
development of Indian research in Biophysics. The data was collected from Online Union Catalogue of Indian
Universities [1]. The catalogue has 4,36,967 Ph.D theses from 317 Indian universities. Indicators regarding the
distribution records of Biophysics thesis, as well as the subject, supervisor, top University, state wise, keywords
was analyzed with modular Scientometrics information system. The data comprises of 569 theses out of which
the majority was from West Bengal followed by Karnataka. The most contributor departments were Biophysics
followed by Physics.
83. Abstract: An automobile’s bumper is the front-most or rear-most part, ostensibly designed to allow the car to
sustain an impact without damage to the vehicle’s safety systems. They are not capable of reducing injury to
vehicle occupants in high-speed impacts, but are increasingly being designed to mitigate injury to pedestrians 512-516
struck by cars. The automobile bumper weight is reduced by the utilization of composite and high- strength
gilded sheet of a skinny material. Once the motor vehicle is hit from the front or behind, the bumper beam
collapses. The impact force is transmitted to the left and right front frames on the bumper beam and bumper
stays. The impact energy created throughout the crash is absorbed by plastic deformation on the bumper beam
and bumper stays that square measure the specified elements of bumper For characteristic the foremost effective
material, varied analysis like static analysis, impact or crash analysis, dynamic and modal analysis area unit
required the target of the work is to counsel the foremost effective material for bumper that is ready to ensure
rider safety, with high strength to weight quantitative relation through the static and dynamic analysis.
Paper Title: Dynamic Analysis of Structure using Fluid Viscous Damper for Various Seismic Intensities
Abstract: The Dynamic analysis for 5 Storey RC Structure with various seismic intensities are carried out in
the present work. SAP 2000 Software considered the structure for modeling. Six ground acceleration for various
intensities on MMI Scale to relate seismic response and seismic intensities. In the result, similar variation in
storey displacement and base shear with intensities V, VI, VII, VIII, IX and X was witnessed. Through this we
can conclude that RC Building using Time History analysis is essential to know if the structure is safe against
seismic force or not.
85. Paper Title: Accelerating Information Security in Cloud Computing using a Novel Holomorphic Scheme
Abstract: In the past decades, many security algorithms are invented and used in many applications for
521-529
encryption and decryption of information or data. All the secure algorithms were uses the security key of size
8bit, 16bit, 32bit, 64bit and 128bits for encryption and decryption but literature survey says that higher the key
size, higher the security. But the higher key size has number more bits and its requires more memory for storage
and also to perform each and every bit through computational operations leads to more delay. To address these
issues, the key and plain text are of 128bits and converted into integer. The converted integer values of key and
plaintext are encrypted and decrypted using Holomorphic through Advanced Encryption Standard (AES). The
research method is sophisticated and more protected through meaning fully lesser key in size and is
accomplished for encryption in terms integer key and plaintext moderately than binary bits, therefore larger size
of key and plaintext can be minimized and reduced the computational complexities. Finally the cipher text is
uploaded into cloud through Real Time Transport Protocol (RTP) and Real Time Transport Control Protocol
(RTCP) for storage. The main problem with continuous sharing of information into cloud is security attacks so
in this research work, three different multimedia signals such as ECG, EEG and biomedical images are
converted into integer and encrypted using AES. The stored data can access by the authorized users and can
decode the information after decryption using AES.
Paper Title: Diagnosis of Cervical cancer using CLAHE and SGLDM on RGB Pap smear Images through ANN
Abstract: Cervical cancer is one of the most preventable Cancers in the present day. PAP and HPV tests are
86. followed for early diagnosis for screening procedure. In medical field, it is difficult to detect Pap smear images
through microscope. Image processing is a vital role to take right decision by using various technique and
algorithms. In this paper, the proposed technique is used to enhance the Pap smear images by comparing 530-534
Histogram Equalization in Contrast Stretching algorithm, Power Law Transformation for Gamma Correction,
Shading Correction, Contrast Limited Adaptive Histogram Equalization (CLAHE). The Quality measurement
MSE, PSNR, SC and NAC value has been calculated to find performance analysis of enhanced Pap smear
images. Then proposed four different feature extraction algorithms SGLDM- Spatial Gray Level Difference
Method, RDM- Run Difference Method, LBP- Local Binary Pattern and HOG-Histogram of Oriented Gradients
are used to extract features of Pap images. Experimental results are obtained for a data set of 215 Pap images
taken from the Management and Decision Engineering Laboratory (MDE-LAB) database. MATLAB R2016a
used as a programming tool. ANN Classification is used for each feature extraction algorithm to evaluate the
accuracy level. Thus, CLAHE achieved the good result for enhancement and SGLDM feature extraction
algorithm reached 93% accuracy using ANN.
Paper Title: Cooling Heat Transfer Analysis using Multiple Inline Inclined Air Jet Impingement
Abstract: Air cooling has its own advantages in packaging technology and such many applications. The
analysis of multi-jet impingement cooling process is performed. Air is used as fluid in present system. A
simulated component with heater plate is cooled with four jets. All jets are placed inline or considered in a row.
The jets are inclined to base and reference target to be cooled. The inclination of each jet is changed according to
various configurations from 60 and 120 Degree to make packaging as compact as possible. Different
configurations are examined and best combination is selected for study of variation of target to jet distance.
Interface of flow from one jet with other is creating turbulence and effect of this on cooling target plate is
studied experimentally. The graphs are plotted giving variations of Nusselt number as per Reynolds number in
laminar range up to 2000. Jet inclination combination with first jet -inside, second jet - outside, third jet -
outside, and fourth jet – inside is considered as giving best results with inclinations as 60-120-60-120 degree
87. respectively. The laminar flow, with jet position inline, in which jet fluid flow lines gets mixed and creating
turbulence gives higher average Nusselt number indicating better cooling performance. Further experiments 535-540
using various fluids and various jet combinations / inclinations may be performed. The correlation is presented
showing variation between Nusselt number and Reynolds number for typical case.
Keyword : Packaging, Cooling, Jet impingement, Inclined Jet, Average Nusselt number.
References:
1. Ingole S. B., "Heat transfer analysis for multiple jet cooling of high temperature electronics target," in IEEE International Conference
on Intelligent Computing and Control Systems, 2017.
2. Jung-Yang San, Wen-Zheng Shiao, "Effects of jet plate size and plate spacing on the stagnation Nusselt number for a confined circular
air jet impinging on a flat surface," International Journal of Heat and Mass Transfer , vol. 49, pp. 3477 - 3486, 2006.
3. E. Baydar, Y. Ozmen, "An experimental investigation on flow structures of confined and unconfined impinging air jets," Heat Mass
Transfer, vol. 42, pp. 338-346, 2006.
4. Jung-Yang San, Yi-Ming Tsou, Zheng-Chieh Chen, "Impingement heat transfer of staggered arrays of air jets confined in a channel,"
International Journal of Heat and Mass Transfer, vol. 50, pp. 3718-3727, 2007.
5. D. Rundström, B. Moshfegh, "Investigation of Heat Transfer and Pressure Drop of an Impinging Jet in a Cross-Flow for Cooling of a
Heated Cube," ASME Journal of Heat Transfer, vol. 130, 2008.
6. Ingole S. B., Sundaram K. K., "Review of Experimental Investigation In Heat Transfer For Jet Impingement Cooling," International
Review of Mechanical Engineering,, vol. 6, no. 3, pp. 346-356, 2012.
7. Mao-Yu Wen, "Flow structures and heat transfer of swirling jet impinging on a flat surface with micro-vibrations," International
Journal of Heat and Mass Transfer, vol. 48, pp. 545-560, 2005.
8. P. A. Dellenback, J. L. Sanger, "Heat Transfer in Coaxial Jet Mixing With Swirled Inner Jet," ASME Journal of Heat Transfer, vol.
116, pp. 864-870, 1994.
9. Sung Kook Hong, Dong Hyun Lee, Hyung Hee Cho, "Heat/Mass transfer measurement on concave surface in rotating jet
impingement," Journal of Mechanical Science and Technology, vol. 22, pp. 1952-1958, 2008.
10. F. Gori, I. Petracci, V. Tedesco, "Cooling of two smooth cylinders in row by a slot jet of air with low turbulence," Applied Thermal
Engineering, vol. 27, pp. 2415-2425, 2007.
11. A. M. Iluber, R. Viskanta, "Cornvective Heat Transfer to a Confined Impinging Array of Air Jets With Spent Air Exits," ASME Journal
of Heat Transfer, vol. 116, p. 571, 1994.
12. Jemmy S. Bintoro , Aliakbar Akbarzadeh, Masataka Mochizuki, "A closed-loop electronics cooling by implementing single phase
impinging jet and mini channels heat exchanger," Applied Thermal Engineering, vol. 25, pp. 2740-2753, 2005.
13. Colin Glynn, Tadhg O’Donovan, Darina B. Murray, "Jet Impingement Cooling," Unknown Source.
14. K. M. Graham, S. Ramadhyani, "Experimental and Theoretical Studies of Mist Jet Impingement Cooling," ASME Journal of Heat
Transfer, vol. 118, pp. 343-349, 1996.
15. Cemil Y, Nedim Sozbgr, S. C. Yao, Hasan Rıza Guven, "Experimental Measurements And Computational Modeling For The Spray
Cooling of A Steel Plate," Journal of Thermal Science and Technology, vol. 31, no. 1, pp. 27-36, 2011.
16. Giuseppe Di Lorenzo, OronzioManca, Sergio Nardini, Daniele Ricci, "Numerical Study of Laminar Confined Impinging Slot Jets wi th
Nanofluids," Hindawi Publishing Corporation Advances in Mechanical Engineering, pp. 1-15, 2012.
17. Weiwei Deng, Alessandro Gomez, "Electro spray cooling for microelectronics," International Journal of Heat and Mass Transfer, vol.
54, pp. 2270-2275, 2011.
18. Roy J. Issa, "Heat Transfer Performance of an Oil Jet Impinging on a Downward-Facing Stainless Steel Plate," Thermal Science, vol.
15, no. 2, pp. 397-408, 2011.
19. Jivtesh Garg, Mehmet Arik, Stanton Weaver, "Meso Scale Pulsating Jets for Electronics Cooling," Journal of Electronic Packaging,
vol. 127, pp. 503-511, 2005.
20. Yogen Utturkar, Mehmet Arik, "An Experimental and Computational Heat Transfer Study of Pulsating Jets," ASME Journal of Heat
Transfer, vol. 130, 2008.
21. Anna Pavlova, Michael Amitay, "Electronic Cooling Using Synthetic Jet Impingement," ASME Journal of Heat Transfer, vol. 128, pp.
897-907, 2006.
22. Dan S. Kercher, Jeong-Bong Lee, Oliver Brand, Mark G. Allen, Ari Glezer, "Microjet Cooling Devices for Thermal Management of
Electronics," IEEE Transactions on Components and Packaging Technologies , vol. 26, no. 2, pp. 539-546, 2003.
23. S. C. Arjocu, J. A. Liburdy, "Identification of Dominant Heat Transfer Modes Associated With the Impingement of an Elliptical Jet
Array," ASME Journal of Heat Transfer, vol. 122, pp. 240-247, May 2000.
24. Bertrand P.E. Dano, James A. Liburdy, Koonlaya Kanokjaruvijit, "Flow characteristics and heat transfer performances of a semi
confined impinging array of jets: effect of nozzle geometry," International Journal of Heat and Mass Transfer, vol. 48, pp. 6 91-701,
2005.
25. Brian P. Whelan, Anthony J. Robinson, "Nozzle geometry effects in liquid jet array impingement," Applied Thermal Engineering, vol.
29, pp. 2211-2221, 2009.
26. Azusa Kanamori, Munehiko Hiwada, Kenyuu Oyakawa, Izuru Senaha, "Effect of Orifice Shape on Flow Behavior and Impingement
Heat Transfer," The Open Transport Phenomena Journal, vol. 3, pp. 9-16, 2011.
27. Ingole S. B., K. K. Sundaram, "Heat Transfer Enhancement Factor Characteristics for Collective Cooling Using Inclined Air Jet," 17th
IEEE Electronics Packaging Technology Conference, pp. 1-6, 2015.
28. H. S. Sheriff , D. A. Zumbrunnen, "Effect of Flow Pulsations on the Cooling Effectiveness of an Impinging Jet," ASME Journal of
Heat Transfer, vol. 116, pp. 886-895, 1994.
29. Luis A. Brignoni, Suresh V. Garimella, "Experimental Optimization of Confined Air Jet Impingement on a Pin Fin Heat Sink," IEEE
Transactions On Components And Packaging Technology, vol. 22, no. 3, pp. 399-404, 1999.
30. D. H. Lee, Y. S. Chung, "Jet Impingement Cooling of Chips Equipped With Multiple Cylindrical Pedestal Fins," ASME Journal of
Electronic Packaging, vol. 129, pp. 221-228, 2007.
31. Seok Pil Jang, Sung Jin Kim, "Microchannel Heat Sink Subject to an Impinging Air Jet," ASME Journal of Heat Transfer, vol. 127,
pp. 770-779, 2005.
32. Sunil B Ingole, Kalyan K Sundaram, "Investigation of maximum Nusselt number with inclined and non-confined offset jet
impingement cooling," International Journal of Heat and Technology, vol. 36, no. 3, pp. 869-876, 2018.
33. Ingole S. B., Sundaram K. K., "Experimental average Nusselt number characteristics with inclined non-confined jet impingement of air
for cooling application," Experimental Thermal and Fluid Science, vol. 77, pp. 124-131, 2016.
34. Ali A. Al Mubarak, Syed M. Shaahid, Luai M. Al-Hadhrami , "Heat Transfer in a Channel with Inclined Target Surface Cooled By
Single Array of Centered Impinging Jet," Thermal Science, vol. 17, no. 4, pp. 1195-1206, 2013.
35. A.S. Cavadas, F.T. Pinho, J.B.L.M. Campos, "Laminar flow field in a viscous liquid impinging jet confined by inclined plane w alls,"
International Journal of Thermal Sciences , vol. 59, pp. 95-110, 2012.
36. Hakan F. Oztop ,Yasin Varol, Ahmet Koca, Mujdat Firat, Betul Turan, Ilhan Metin, "Experimental investigation of cooling of heated
circular disc using inclined circular Jet," International Communications in Heat and Mass Transfer, vol. 38, pp. 990-1001, 2011.
37. Naresh R., Ravinarayana Bhat N., "Experimental Investigation of Heat Transfer on an Inclined Plate Impinged with Cold Air Jet,"
International Journal of Science, Engineering and Technology Research, vol. 3, no. 6, pp. 1843-1849, 2014.
38. Haydar Eren, Nevin Celik, "Cooling of a heated flat plate by an obliquely impinging slot jet," International Communications in Heat
and Mass Transfer , vol. 33, pp. 372-380, 2006.
39. Jiwoon Song, Jang Woo Lee,Man Sun Yu,Sangwoo Shin,Beom Seok Kim, Hyung Hee Cho, "Thermal characteristics of inclined plate
impinged byunderexpanded sonic jet," International Journal of Heat and Mass Transfer, vol. 62, pp. 223-229, 2013.
40. Kyosung Choo, Tae Yeob Kang, Sung Jin Kim, "The effect of inclination on impinging jets at small nozzle-to-plate spacing,"
International Journal of Heat and Mass Transfer, vol. 55, pp. 3327-3334, 2012.
41. C. F. Ma, Q. Zheng, K. Wu, "Local characteristics of impingement heat transfer with oblique round free surface jets of large Prandtl
number liquid," Pergamon - International Journal of Heat and Mass Transfer, vol. 40, no. 10, pp. 2249-2259, 1997.
42. Mizuki Kito, "Effect of Inclination of Impinging Jets on Flow and Heat Transfer Characteristics," International Journal of Science and
Engineering Investigations, vol. 1, no. 9, pp. 42-47, 2012.
43. Kazuyoshi Nakabe, Elzbieta Fornalik, Jens F. Eschenbacher, Yu Yamamoto, Tomoyasu Ohta, Kenjiro Suzuki, "Interactions of
longitudinal vortices generated by twin inclined jets and enhancement of impingement heat transfer," International Journal of heat and
fluid flow, vol. 22, pp. 287-292, 2001.
44. S B Ingole, K K Sundaram, "Cold Zone Exploration Using Position of Maximum Nusselt Number for Inclined Air Jet Cooling,"
Archive of Mechanical Engineering, vol. 64, no. 4, pp. 533-549, 2017.
45. Sagar Chirade, S. B. Ingole, K K Sundaram, "Review of Correlations on Jet Impingement Cooling," International Journal of Science
and Research, vol. 4, no. 4, pp. 3107-3111, 2015.
46. Yue-Tzu Yang, Yong-Xun Wang, "Three-dimensional numerical simulation of an inclined jet with cross-flow," International Journal
of Heat and Mass Transfer , vol. 48, pp. 4019-4027, 2005.
47. B.Q. Li b, T. Cader, J. Schwarzkopf, K. Okamoto, B. Ramaprian, "Spray angle effect during spray cooling of microelectronics :
Experimental Measurements and comparision with Inverse Calculations," Applied Thermal Engineering , vol. 26, p. 1788–1795, 2006.
48. Carlo Bartoli, "Free convection enhancement between inclined wall and air in presence of expired jets at temperature differen ce of 40
K," Experimental Thermal and Fluid Science , vol. 35, pp. 283-290, 2011.
49. D. Benmouhoub, A, Mataoui, "Inclined Plane Jet Impinging a Moving Heated Wall," Fluid Dynamics and Materials Processings, vol.
10, no. 2, pp. 241-260, 2014.
Paper Title: An IoT-Based Body Area Network in Medical Care System: Related Challenges and Issues
Abstract: The Internet of Things (IoT) is the collection of open intelligent devices. The fast development of
IoT and the huge expansion of mobile technology are unveiling fresh growth opportunities in several areas,
including education, transport, and farming and, in particular, healthcare. Introduction of IoT via medical
applications has several advantages including cost savings by dropping hospital costs, health care costs, and
transportation costs, costs of human resources and costs of insurance. Recently, the academic world has
produced major progress in research and security development for IoT-based applications, particularly on IoT-
based healthcare devices. It contributes to an additional benefit of enhanced healthcare quality. However, the
increased use of IoT facilities in e-health applications, particularly in the insurance field, has resulted in
increased security and privacy issues. Medical applications are prone to data violations and widening security
problems due to the increase in access points to sensitive data through electronic medical records and the
increasing popularity of wearable technology. So there is a need of an efficient lightweight, secure verification
system, providing important security levels against various attacks, such as attacks by impersonation, a man in
the middle attack and unidentified key-sharing attacks for IoT foundation E-health. This article presents a survey
of problems, difficulties, and challenges a short analysis of multiple problems and problems suggested by
different authors using different techniques and methods.
Keyword : Authentication, Light weight, IoT, medical care system, Wireless body area network .
References:
1. Chiou, S.Y.; Ying, Z.; Liu, J. Improvement of a privacy authentication scheme Based on cloud for medical environment. J. Med. Syst.
2016, 40, 101.
2. He, D.; Kumar, N.; Chen, J. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor
networks. Multimed. Syst. 2015, 21, 49–60.
3. Xin Liu,Ruisheng Zhang, Qidong Liu; A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for
Wireless Sensor Networks, special issue Climate Change And Health, January 2017.
4. Li, C.T.; Lee, C.C.; Weng, C.Y. A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med.
Syst. 2016, 40, 117.
88. 5. K. Vasanth and J. Sbert. Creating solutions for health through technology innovation. Texas Instruments. [Online]. Available:
http://www.ti.com/lit/wp/sszy006/sszy006.pdf, accessed Dec. 7, 2014.
6. University of Bristol. SPHERE 2015. Available online: http://www.irc-sphere.ac.uk/about 541-546
7. M. H. Riaz, U. Rashid, M. Ali L. Li, “Internet of Things Based Wireless Patient Body Area Monitoring Network”, 2017 IEEE
International Conference on Internet of Things (iThings), : 970-973.
8. Jie Wan , Munassar A. A. H. Al-awlaqi, MingSong Li, Michael O’Grady, Xiang Gu, Jin Wang and Ning Cao, “Wearable IoT enabled
real-time health monitoring system”, EURASIP Journal on Wireless Communications and
Networking, Dec 2018.
9. FarahNasri, Adel atif Mtibaa.” Smart Mobile Healthcare System Based on WBSN And 5G,” International Journal of Advanced
Computer Science and Applications, Vol. 8, No. 10, 2017.
10. OlutayoBoyinbode.” A Cloud-Based Body Area Sensor Network Mobile Healthcare System,” International Journal of Advanced
Research in Computer Science and Software Engineering Volume 7, Issue 5, May 2017.
11. Higinio Mora ID, David Gil ID, Rafael Muñoz Terol D, Jorge Azorín, D AndjulianSzymanski.” An IoT-Based Computational
Framework for Healthcare Monitoring In Mobile Environments, “Sensors 2017.
12. Kavitha.Y, Lavanya.M, Mounika.A, Sasirekha.KN.VignaVinod Kumar.” A Secure IoT-Based Modern Healthcare system Using Body
Sensor Network,” International Journal Of Innovative Research In Science, Engineering And Technology, Volume 6, Special Issue 3,
March 2017.
13. Yuwen Chen, Lourdes López, José-Fernán Martínez, and Pedro Castillejo, “A Lightweight Privacy Protection User Authentication and
Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth”, Journal of Sensors, September 2018.
14. V.Sethupathi and E.George Dharma Prakash Raj, “ESHCMA: Enhanced Secure Health Care Monitoring Algorithm using One-Time
Password in Wireless Body Area Networks”, International journal of Computer Science & Network Solutions Jun.2016 -Volume 4.No.6.
15. Jia-Li Hou and Kuo-Hui Yeh, “Novel Authentication Schemes for IoT Based Healthcare Systems”, International Journal of Distributed
Sensor Networks, August 2015.
16. Zisang Xu , Cheng Xu1, Wei Liang, Jianbo Xu, and Haixian Chen, “A Lightweight Mutual Authentication and Key Agreement Schem e
for Medical Internet of Things”, IEEE Transactions, volume 7, 2019.
17. Chien-Ming Chen, Bing Xiang, Tsu-Yang Wu, and King-Hang Wang’ “An Anonymous Mutual Authenticated Key Agreement Scheme
for Wearable Sensors in Wireless Body Area Networks”, Appl. Sci. 2018, 8, 1074.
18. Chen Wang, Wenying Zheng, Sai Ji, Qi Liu, and Anxi Wang, “Identity-Based Fast Authentication Scheme for Smart Mobile Devices in
Body Area Networks”, Wireless Communications and Mobile Computing, August 2018.
19. Jingwei Liu, Qian Li, Rui Yan and Rong Sun, “Efficient authenticated key exchange protocols for wireless body area networks”,
EURASIP Journal on Wireless Communications and Networking (2015) 2015:188.
20. C.-T. Li, C.-C. Lee, C.-Y. Weng, and S.-J. Chen, “A secure dynamic identity and chaotic maps based user authentication and key
agreement scheme for e-healthcare systems,” Journal of Medical Systems, vol. 40, no. 11, article 233, 10 pages, 2016.
21. C. Li, T. Wu, C. Chen, C. Lee, and C. Chen, “An efficient user authentication and user anonymity scheme with provably security for
IoT-based medical care system,” Sensors, vol. 17, no. 7, 1482, 18 pages, 2017.
22. Y. Park and Y. Park, “A selective group authentication scheme for IoT-based medical information system,” Journal of Medical Systems,
vol. 41, no. 4, article 48, 8 pages, 2017.
Keyword : -I-V study, p-GaSb, SILVACO, Thermal Vertical Directional Solidification (TVDS).
References:
1. Akiba, N., Chiba, D., Nakata, K., Matsukura, F., Ohno, Y., & Ohno, H. (2000). Spin-dependent scattering in semiconducting
ferromagnetic (Ga,Mn)As trilayer structures. Journal of Applied Physics. https://doi.org/10.1063/1.372730.Ali, F. A., Pattnaik, P., &
Kamilla, S. K. (2011).
2. Characterisation of bulk GaSb using TCAD. TechSym 2011 - Proceedings of the 2011 IEEE Students’ Technology Symposium.
https://doi.org/10.1109/TECHSYM.2011.5783847
3. Ancona, M. G., Bennett, B. R., & Boos, J. B. (2010). Scaling projections for Sb-based p-channel FETs. Solid-State Electronics.
https://doi.org/10.1016/j.sse.2010.06.022 547-550
4. Brongersma, M. L., Shalaev, V. M., Brongersma, M. L., Fleischmann, M., Hendra, P. J., McQuillan, A. J., … Engheta, N. (2010) .
Applied physics. The case for plasmonics. Science (New York, N.Y.). https://doi.org/10.1126/science.1186905
5. Communication, R., & Communication, R. (2008). Chinese Physics B. Ultramicroscopy. https://doi.org/10.1088/1674-1056/18/7/053
6. Dutta, P. S., Bhat, H. L., & Kumar, V. (1997). The physics and technology of gallium antimonide: An emerging optoelectronic material.
Journal of Applied Physics. https://doi.org/10.1063/1.365356
7. Ganesan, K., Rao, S. S., Bhat, S. V., & Bhat, H. L. (2011). Electron paramagnetic resonance studies on Mn doped GaSb. Journal of
Applied Physics. https://doi.org/10.1063/1.3543983
8. Hársy, M., Görög, T., Lendvay, E., & Koltai, F. (1981). Direct synthesis and crystallization of GaSb. Journal of Crystal Grow th.
https://doi.org/10.1016/0022-0248(81)90070-1
9. Hidalgo, P., Méndez, B., Piqueras, J., Plaza, J., & Diéguez, E. (1999). Scanning tunneling spectroscopy study of erbium doped GaSb
crystals. Journal of Applied Physics. https://doi.org/10.1063/1.370910
10. Kamilla, S. K., Ali, F. A., Samantaray, B. K., Basu, S., & Mohanty, M. (2014). Crystal growth of bulk Ga1-xNixSb ternary alloy and it’s
characterization between 78 K to 300 K. Advanced Science Letters. https://doi.org/10.1166/asl.2014.5437
11. Kamilla, S. K., Hazra, S. K., Samantaray, B. K., & Basu, S. (2011). Electrical and magneto resistance studies of bulk Ga1-xNi xSb
ternary alloys. Solid State Sciences. https://doi.org/10.1016/j.solidstatesciences.2010.11.020
12. Kamilla, Sushanta K., Samantaray, B. K., & Basu, S. (2006). Effect of Ni concentrations on the microhardness of GaNiSb ternary alloys.
Journal of Alloys and Compounds. https://doi.org/10.1016/j.jallcom.2005.06.074
13. Karar, N., & Basu, S. (1999). Synthesis and growth of Ga1-xFexSb, a new III-V diluted magnetic semiconductor. Materials Science and
Engineering B: Solid-State Materials for Advanced Technology. https://doi.org/10.1016/S0921-5107(99)00018-5
14. Roy, U. N., & Basu, S. (1988). Etch pit density variation and electrical properties of GaSb single crystals grown by the Brid gman
method. Materials Letters. https://doi.org/10.1016/0167-577X(88)90029-8
15. Šestáková, V., & Štěpánek, B. (1995). Doping of GaSb single crystals with various elements. Journal of Crystal Growth.
https://doi.org/10.1016/0022-0248(94)00485-4
16. Stollwerck, G. (2000). Characterization and simulation of GaSb device-related properties. IEEE Transactions on
17. Electron Devices. https://doi.org/10.1109/16.822293
18. Yuan, Z., Kumar, A., Chen, C. Y., Nainani, A., Bennett, B. R., Boos, J. B., & Saraswat, K. C. (2013). Antimonide-based heterostructure
p-channel MOSFETs with Ni-alloy source/drain. IEEE Electron Device Letters. https://doi.org/10.1109/LED.2013.2280615
References:
1. Bridges, W (1991, 2003) Managing Transitions: Making the Most of Change. Cambridge, MA: Da Capo Press
2. Cummings, T & Worley, C (2001). Organization Development and Change, Mason, OH: South Western.
3. Corporate Leadership Council. (2001). The Leadership Imperative: Strategies for Increasing Leadership Bench Strength . Washington,
DC. Corporate Executive Board.
4. Robbins, S.P. (1994). Essentials of Organizational Behaviour (6th ed.) Upper Saddle River, NJ: Pearson Prentice Hall.
5. Schein, E. (1992), Organization Culture and Leadership (2nd Ed.) San Francisco, CA. Jossey-Bass Publishers.
6. https://sol.du.ac.in/mod/book/view.php?id=1803&chapterid=1752
7. http://corporatetrainingindia.net/odintervention.php
Paper Title: Effect of Soil Structure Interaction on Multi-Storeyed Building with Raft Foundation
Abstract: This paper addresses the behaviour of multi storey structure considering soil structure interaction
i.e. interaction between substructure of the building and soil. For this purpose a sample of 5 storey RC frames is
analysed in conventional method with incremental static analysis for various load combinations and determines
the parameters displacement, shear force and bending moment. Then a same 5 storey RC frame is analysed in
numerical analysis using Finite Element Method (FEM) with raft foundation by assigning the soil properties to
substructure and determine the parameters displacement, shear force and bending moment. According to the
analysis results the parameters displacements, shear force and bending moment varies from conventional
analysis to numerical analysis. Displacements of the structure increases, shear forces of the structure decreases
and bending moment of the structure decreases at some points and increases at some points from conventional
method of analysis to numerical method of analysis.
92. Keyword : Soil Structure interaction, Conventional Method of Analysis, Numerical Method of Analysis,
Displacement, Shear Force, Bending Moment..
557-570
References:
1. K. Natarajan and B. Vidivelli 2009 : Effect of column spacing on the behaviour of frame raft and soil systems.
2. Haytham Adnan Sadeq, Mohammed saleem Taha 2009: Structural design of raft foundation with soil structure interaction.
3. H.S Chore , V.A Sawant and R.K Ingle 2012: Non-linear analysis of pile groups subjected to lateral loads.
4. Sushma Pulikanti and Pradeep kumar Ramancharla 2013: SSI Analysis of framed structures supported on pile foundations
5. Vivek Garg and M.S Hora 2012: A review on interaction behavior of structure foundation soil system.
6. R. R. Chaudhari, Dr K. N. Kadam 2013: Effect Of Piled Raft Design On High-Rise Building Considering Soil Structure Interaction.
7. Gaikwad M.V, Ghogare R.B, Vagessha S. Mathada 2015: Finite element analysis of frame with soil structure interaction.
8. Lou Menglin, Wang Huaifeng, Chen Xi Zhai Yongmei 2011: Structure soil Structure interaction: literature review.
9. Dr. M. Reza Emami Azadi, Ali Akbar Soltani 2010: Effect of soil structure interaction on dynamic response of Delijan cement storage
silo under earthquake loading.
10. D. Daniel Thangaraj and L Ilampathi 2012: Numerical analysis of soil raft foundation and space frame system.
11. Eduardo Kausel 2010: Early history of soil structure interaction.
12. IS 875 (Part-3)-1987 Indian Standard Code of Practice for “Design of Wind Loads for Buildings and Structures”.
13. IS 456:2000 Indian Standard Code of Practice for “Plain and Reinforced concrete design”.
14. IS 1893 (Part-4)-2002 Indian Standard “Criteria for Earthquake Resistant Design of Structures”.
93. Paper Title: Composite Materials Based on Twaron and Nano Materials
Abstract: This research aims to participate in producing body shield that can overcome pervious drawbacks 571-575
using behaviour of shear thickening fluid. Initially, the rheological behaviour of silica-polyethylene glycol shear
thickening fluid is examined at different concentrations. Then, ballistic fabric samples are impregnated into
silica-polyethylene glycol shear thickening fluid at various concentrations of silica and tested using gas gun
simulating real ballistic threat. After that, the impact of rubbery hot water pack filled with around 66.67 wt%
starch in water is tested using gas gun. Results showed as the concentration of silica increases, the indentation
depth in the impregnated fabric decreases which may result in improving performance of ballistic fabric to 12.5
% in case of using 60 wt% silica, 7.35 % in case of using 30 wt% silica and 3.31 % in case of using 7.5 wt%
silica with respect to plain sample. As it showed that no indentation depth is formed in modelling clay when
rubbery hot water pack filled with around 66.67 wt% starch in water is tested using gas gun causing
improvement percentage to be 100% compared to plain sample of Twaron (CT 714).
Paper Title: Fake Account Detection using Machine Learning and Data Science
Abstract: Nowadays, Online Social Media is dominating the world in several ways. Day by day the number
of users using social media is increasing drastically. The main advantage of online social media is that we can
connect to people easily and communicate with them in a better way. This provided a new way of a potential
attack, such as fake identity, false information, etc. A recent survey suggest that the number of accounts present
in the social media is much greater than the users using it. This suggest that fake accounts have been increased in
the recent years. Online social media providers face difficulty in identifying these fake accounts. The need for
identifying these fake accounts is that social media is flooded with false information, advertisements, etc.
Traditional methods cannot distinguish between real and fake accounts efficiently. Improvement in fake account
creation made the previous works outdated. The new models created used different approaches such as
automatic posts or comments, spreading false information or spam with advertisements to identify fake accounts.
Due to the increase in the creation of the fake accounts different algorithms with different attributes are use.
Previously use algorithms like naïve bayes, support vector machine, random forest has become inefficient in
finding the fake accounts. In this research, we came up with an innovative method to identify fake accounts. We
96.
used gradient boosting algorithm with decision tree containing three attributes. Those attributes are spam
commenting, artificial activity and engagement rate. We combined Machine learning and Data Science to 583-585
accurately predict fake accounts.
Keyword : Data science, Fake account detection, Machine learning, Online social media
References:
1. ”Detection of Fake Twitter accounts with Machine Learning Algorithms” Ilhan aydin,Mehmet sevi, Mehmet umut salur.
2. ”Detection of fake profile in online social networks using Machine Learning” Naman singh, Tushar sharma, Abha Thakral, Tanupr iya
Choudhury.
3. ”Detecting Fake accounts on Social Media” Sarah Khaled, Neamat el tazi, Hoda M.O. Mokhtar.
4. ”Twitter fake account detection”, Buket Ersahin, Ozlem Aktas, Deniz kilinc, Ceyhun Akyol.
5. ” a new heuristic of the decision tree induction” ning li, li zhao, ai-xia chen, qing-wu meng, guo-fang zhang.
6. ” statistical machine learning used in integrated anti-spam system” peng-fei zhang, yu-jie su, cong wang.
7. ” a study and application on machine learning of artificial intellligence” ming xue, changjun zhu.
8. ” learning-based road crack detection using gradient boost decision tree” peng sheng, li chen, jing tian.
9. ” verifying the value and veracity of extreme gradient boosted decision trees on a variety of datasets” aditya gupta, kunal gusain,
bhavya popli.
10. ” fake account identification in social networks” loredana caruccio, domenico desiato, giuseppe polese.
Paper Title: Tradition in the Architecture of Wooden Churches in the South Urals
Abstract: The subject of this paper seems to be important due to the ever-increasing interest in architectural
97. traditions of Russia’s regions. The purpose of the article is to identify the characteristic features of the
architecture of modern wooden temples in the territory of the South Urals. The key approach I chose for this
586-592
study was historical architectural analysis and integration of data from archives and field surveys. A novel
systematic analysis of the evolution of church design in the region since ancient times till nowadays is offered.
For the first time, a study is made of churches building based on ‘model church design projects for Orenburg the
Orenburg defence lines’ and exemplary albums. Descriptions and analyses of the region’s lesser known little
known specimen of religious architecture are introduced for the scientific use based on the author’s own in situ
investigations. Many archival materials from Russia's central and regional repositories are considered and
published at for the first time. Key properties of modern region Eastern Orthodox churches built in different
architecture styles are formulated and classified.
Keyword : architectural solutions and concepts in church building - church architecture in XVIII and XIX
centuries - modern features of church architecture.
References:
1. Chernavskiy, N.M., (1900). Orenburgskaya eparkhiya v proshlom eya i nastoyashchem. Vypusk 1. [The Orenburg Eparchy in its past
and present. Issue 1] Orenburg: Typography of the Ecclesiastical Consistory.
2. Chernavskiy, N.M., (1901 - 1902). Orenburgskaya eparkhiya v proshlom eya i nastoyashchem. Vypusk 2. [The Orenburg Eparchy in
its past and present. Issue 2] Orenburg: Typography of the Ecclesiastical Consistory.
3. Krechetovich, I.P., (1901). Uchrezhdenie v g. Orenburge arkhiereyskoy kafedry (po dannym arkhiva kantselyarii byvshego
Orenburgskogo general-gubernatorstva) [Setting up of the Eparchy in Orenburg (according to the archives of the office of Orenburg’s
ex-Governorate General]. Orenburg.
4. Rychkov, P.I., (1887). Topografiya Orenburgskoy gubernii [The Orenburg Province Topographies]. Orenburg: Orenburg Province
Statistical Committee.
5. Pallas, P.S., (1786). Puteshestvie po raznym provintsiyam Rossiyskogo gosudarstva. Chast' 2 [Travels in different provinces of the
Russian State. Part 2]. St.-Petersburg: Typography of the Imperial Academy of Sciences.
6. Sukhodol'skiy, L.S., (1854). Rasprostranenie khristianstva v Ural'skom krae [The spread of Christianity in the Urals Region].
Orenburgskie eparkhial'nye vedomosti [The Orenburg Eparchial News], 14: 53-54; 15: 58-59; 16: 61-62; 18: 65-66; 19: 69.
7. Arkhangelskiy, I.I., (1900). Materialy dlya istorii goroda Troitska [Materials for the history of the Troitsk town]. Proceedings of the
Orenburg Archival Research Committee. VI (29): 5-51.
8. Cheremshanskiy, V.M., (1859). Opisanie Orenburgskoy gubernii. Ufa: Izd. Uchenogo komiteta ministerstva gos. imushchestva
[Description of the Orenburg Province]. Ufa: Publication of the Research Committee under the Ministry of State Assets.
9. Ignatev, R.G., (1873). Pamyatnaya knizhka Ufimskoy gubernii. Chast 2. [The Ufa Province’s Memorandum Book. Part 2]. Ufa.
10. Starikov., F.M., (1891). Istoriko-statisticheskiy ocherk Orenburgskogo kazach'ego voyska [Essays on the history and statistics of the
Orenburg Cossack Host]. Orenburg: Breslin Typography.
11. Budrina, R.A., (1904). Chelyabinskiy Odigitrievskiy zhenskiy monastyr [The Hodegetria Nunnery in Chelyabinsk]. Moscow:
I.Efimov’s Typolithography.
12. Daft of a wooden church for the Orenburg Defence Line, (Unpublished). Russian State Historical Archive, collection 1488, Plans and
drawings of civil architecture, inventory 3. Orenburg - Simbirsk province 1747-1916, folder 12.
13. Plan and facade of a stone foundation of a wooden church for the Orenburg Defence line, (Unpublished). Russian State Historical
Archive, collection 1488, Plans and drawings of civil architecture, inventory 3. Orenburg - Simbirsk province 1747-1916, folder 1.
14. Street map of Chelyabinsk (Unpublished). Russian State Military History Archive, collection 846, Military Science Archive, inventory
16, folder 22796.
15. Synod decrees in 1826 and 1828, (Unpublished). Russian State Historical Archive, collection 797, Office of the Procurator of the
Synod, inventory 3, Cases in the department of religious affairs of the Orthodox confession, folder 11869, sheet 12, turnover.
16. Russian State Archive of Ancient Documents. (n.d.a). Fund 171, register 3, d.3207 [In Russian].
17. Degtyarev, I.V. and Bozhe, V.S., (1992). Kupola nad gorodom [Domes over the City]. Chelyabinsk: Chelyabinsk Regional Centre for
Slavic Cultures.
18. Konyuchenko, V. I., (1993). Dukhovenstvo Chelyabinska nakanune revolyutsii [Chelyabinsk clergymen before the Revolution]. The
Urals cities and towns in the context of Russian culture. Regional science conference. Chelyabinsk: History and culture heritage
center of Chelyabinsk. Pp. 88-90.
19. Olenkov, V.D., (2008). Pravoslavnye khramy Chelyabinskoy oblasti. Istoriya i arkhitektura [Eastern Orthodox churches in the
Chelyabinsk Region. History and Architecture]. Chelyabinsk: JSC Autograph Publishing.
20. Gorlov, G.E. and O.Yu. Bobrov, Spiritual Vineyard of the Orenburg Region (Dukhovnaia niva Orenburzh'ia). Orenburg, Orenburg
Book Publishers, 2009, p.264 [In Russian].
21. N.E. Stremskiy, Martyrs, confessors and churches of the Orenburg Diocese of 20 th c. (Mucheniki, ispovedniki i khramy Orenburgskoj
eparkhii XX v.), part 2. Saraktash, 1999, p.415 [In Russian].
Authors: Is’haqov Mirsodiq, Alimova Rahima, Karimov Nodir, Sulaymonov Jasur, Madalimov Timur
Keyword : Control –Winding Voltage Oriented Control (CWVOC), Dual Stator Winding Induction Generator
99. (DWIG), Fuzzy Logic Controller (FLC), Semiconductor Excitation Capacitor (SEC)
References: 600-606
1. REN21, “Renewables 2016: Global status report,” 2016. [Online]. Available: http://www.ren21.net.
2. F. Blaabjerg and K. Ma, "Future on Power Electronics for Wind Turbine Systems," IEEE Journal of Emerging and Selected Topics in
Power Electronics, vol. 1, no. 3, pp. 139-152, Sept. 2013.
3. Z. Chen, J. M. Guerrero, and F. Blaabjerg, "A Review of the State of the Art of Power Electronics for Wind Turbines," IEEE
Transactions on Power Electronics, vol. 24, no. 8, pp. 1859-1875, Aug. 2009.
4. V. Yaramasu, B. Wu, P. C. Sen, S. Kouro and M. Narimani, "High-power wind energy conversion systems: State-of-the-art and
emerging technologies," Proceedings of the IEEE, vol. 103, no. 5, pp. 740-788, May 2015.
5. H. Nian and Y. Song, "Direct Power Control of Doubly Fed Induction Generator Under Distorted Grid Voltage," IEEE Transactions on
Power Electronics, vol. 29, no. 2, pp. 894-905, Feb. 2014.
6. H. Li, and Z. Chen, “Overview of different wind generator systems and their comparisons,” IET Renew. Power Gener., vol. 2, no. 2, pp.
123-138, Jun. 2008.
7. S. M. Muyeen, R. Takahashi, and J. Tamura, "Operation and Control of HVDC-Connected Offshore Wind Fa
Paper Title: App Launch for Customer Processes of a Real Estate Company
Abstract: A paperless office is not only environmentally friendly but also advantageous in many aspects. The
digitalisation of documents and corresponding processes saves time, reduces mistakes and therefore realizes cost
savings for companies. This time can be invested in better customer management. Real estate companies work
with thousands of rented apartments and as many customers and thus have to maintain and manage a lot of
customer related data. IT has already created manifold remedies with Enterprise-Resource-Planning (ERP) and
Customer- Relationship-Management (CRM) systems and models, but there is still plenty of development
100. potential to be exploited by integrating mobile solutions into the IT architecture.
The main challenge thereby is not the programming of an app but the seamless integration into customer 607-616
processes and the creation of customer acceptance and thus value. Therefore, it is investigated how mobile
applications can better control customer processes and whether such an implementation is profitable. For this
purpose, typical work and customer processes of real estate companies must be analysed, understood and
transferred to appropriate mobile solutions. This paper examines the details which need to be considered in such
projects.
Keyword : App, mobile processes, IT processes, customer processes, apartment rent, utility values analyses.
References:
1. M. Marchionini, J. Hohmann, and P. Prischl, “IT im Facility Management erfolgreich einsetzen – Das CARM-Handbuch“, vol. 2, p. 14,
2006
2. S. Toman, A. Köppe, and J. Lukowsky, Jan: “Immobilienmanagement mit SAP“, vol. 1 p. 80, 2010.
3. J. Nävy, “Facility Management: Grundlagen, Informationstechnologie, Systemimplementierung, Anwendungsbeispiele“, vol. 5, p. 1 50,
2018
4. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
5. SAP AG (2019. September 20), “SAP NetWeaver“, [Online] Available https://www.sap.com/products/netweaver-platform.html
6. PROMOS consult, REdesk , (2019. September 20)., “Verwalten ohne Aktenberge“ [Online] Available
https://www.openpromos.de/download.79bc3e11bafd704f6b80d7dde6421a77_1/
7. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
8. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
9. PROMOS consult, PRO POTSDAM GmbH (2019. September 20), “Vom Aktenberg zum elektronischen Schreibtisch“, [Online]
Available https://www.openpromos.de/download.3402be133c654947599e2eda2f4be21e_1/
10. SAP-Bibliothek (2019. September 20), “Flexibles Immobilienmanagement (RE-FX) “, [Online] Available
https://help.sap.com/viewer/f3edde02b7534becaa98da530af2aa1b/1709%20001/de-DE/8f76d7531a4d424de10000000a174cb4.html
11. Cideon Software (2019. September 20), “Software für das Engineering, AutoCAD Integration für SAP Real Estate Management (RE-
FX)“, [Online] Available https://www.cideon.com/solutions/sap-plm-solutions/sap-engineering-control-center-interfaces/sap-ectr-
interface-to-autocad/?cookie=accept&cHash=bab8e70b1c31f7d36880a36d453ea092
12. M. Amberg, M. Lang, “Innovation durch Smartphone & Co., Die neuen Geschäftspotenziale mobiler Endgeräte“, vol.1, p. 32, 2011
13. Statista GmbH, (2019. September 20). “Gesamtumsatz mit apps in Deutschland“ [Online] Available
https://de.statista.com/infografik/18297/gesamtumsatz-mit-apps-in-deutschland/
14. Statista GmbH, (2019. September 20). “Annual number of global mobile app downloads 2016-2018“ [Online] Available
https://www.statista.com/statistics/271644/worldwide-free-and-paid-mobile-app-store-downloads/ and
“Total global mobile app revenues 2014-2023“ [Online] Available https://www.statista.com/statistics/269025/worldwide-mobile-app-
revenue-forecast/
15. M. Amberg, M. Lang, “Innovation durch Smartphone & Co., Die neuen Geschäftspotenziale mobiler Endgeräte“, vol.1, p. 30, 2011
16. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 02). “Mobile
Anwendungen in der ITK-Branche, Umfrage-Ergebnisse, p.5, 2011“ [Online] Available:
https://www.bitkom.org/noindex/Publikationen/2011/Studie/Apps-Mobile-Anwendungen-in-der-ITK-Branche/App-Studie-20110511-
einzel.pdf .
17. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e. V. (Bitkom), (2019. September 02). “Mob ile
Anwendungen in der ITK-Branche, Umfrage-Ergebnisse, p.6, 2011“ [Online] Available:
https://www.bitkom.org/noindex/Publikationen/2011/Studie/Apps-Mobile-Anwendungen-in-der-ITK-Branche/App-Studie-20110511-
einzel.pdf
18. PROMOS consult, (2019. September 20)., “Easysquare app“[Online] Available https://www.easysquare.com/ueber-uns
19. PROMOS consult, Easysquare, (2019. September 20)., “Easysquare workflow“, [Online] Available
https://www.openpromos.de/workflows_services/prd.61.easysquare-workflow/
20. E. Gutenberg, “Einführung in die Betriebswirtschaftslehre“, vol. 1, p. 31, 1990
21. H. Wieczorrek, and P. Mertens, “Management von IT-Projekten“, vol. 3, p.225, 2008
22. C. Zangemeister, “Nutzwertanalyse in der Systemtechnik, Eine Methodik zur multidimensionalen Bewertung und Auswahl von
Projektalternativen“ vol. 4, p. 45, 1976
23. R. Brugger, “Der IT Business Case – Kosten ermitteln und analysieren, Nutzen erkennen und quantifizieren, Wirtschaftlichkeit
nachweisen und realisieren“, p. 89, 2009
24. R. Brugger, “Der IT Business Case – Kosten ermitteln und analysieren, Nutzen erkennen und quantifizieren, Wirtschaftlichkeit
nachweisen und realisieren“, p. 91, 2009
Paper Title: Optimization of Power system with Automatic Voltage Regulator using Soft Computing Techniques
102. Abstract: In an interconnected power system, if a load demand changes randomly, both frequency and tie line
power varies. The main aim of automatic voltage controller is to minimize the transient variations in these
624-628
variables and also to make sure that their steady state errors is zero. Many modern control techniques are used to
implement a reliable controller. The objective of these control techniques is to produce and deliver power
reliably by maintaining voltage within permissible range. When real power changes, system frequency gets
affected while reactive power is dependent on variation in voltage value. That’s why real and reactive power is
controlled separately. Our objective is here for to study and analyze the Genetic algorithms and their application
to the problems of Function Optimization and System Identification. Since there are other methods traditionally
adopted to obtain the optimum value of a function (which are usually derivative based), the project aims at
establishing the superiority of Genetic Algorithms in optimizing complex, multivariable and multimodal
function. The Genetic Algorithm is a popular optimization technique which is bio-inspired and is based on the
concepts of natural genetics and natural selection theories proposed by Charles Darwin.
Paper Title: Prior Detection of a Person’s Risk Level of Getting Suffered from Liver Cancer
Abstract: Liver Cancer becomes a major problem globally because it is responsible for the majority of death.
Identification of various Risk factors which can be either genetic or environmental becomes necessary for early
detection of Liver Cancer. To solve this problem, the data has been collected from various diagnostic centres, the
data consists of 100 cancerous and 100 non-cancerous/healthy persons, then significant frequent patterns are
identified by using the Apriori Algorithm. By employing significant frequent pattern, a prediction technique has
been developed which identify the person susceptibility toward Liver Cancer by using the Risk Factors. Most
peoples do not know that they are suffering from Liver Cancer at the early stage of cancer, and when they knew,
that time it becomes impossible to cure. So, for proper cure Early detection of Liver Cancer acquires a necessary
step in its diagnosis process, and for making a powerful preventive approach. This prediction system can
effectively and successfully predict the Liver Cancer Risk, and it has been predicted in the form of three stages
that is low Risk, medium Risk or high Risk. This approach can be used in hospitals for diagnosis of Liver
103. Cancer patients.
629-637
Keyword : Apriori Algorithm, Data Mining, Liver, and Liver Cancer.
References:
1. Y. Upadhyay and V. Wasson, “Analysis of Liver MR Images for Cancer Detection using Genetic Algorithm,” vol. 2, no. 4, pp. 730 –
737, 2014.
2. K. Ahmed, A.-A.-E. Abdullah-Al-Emran, T. Jesmin, R. F. Mukti, M. Z. Rahman, and F. Ahmed, “Early Detection of Lung Cancer
Risk
3. Using Data Mining,” Asian Pacific J. Cancer Prev., vol. 14, no. 1, pp. 595–598, 2013.
4. A. Raj and M. Jayasree, “Automated Liver Tumor Detection Using Markov Random Field Segmentation,” Procedia Technol., vol. 24,
pp. 1305–1310, 2016.
5. J. Balogh, D. V. Iii, S. Gordon, X. Li, R. M. Ghobrial, and H. P. M. Jr, “Hepatocellular carcinoma : a review,” pp. 41 –53, 2016.
6. J. Ferlay et al., “Cancer incidence and mortality worldwide : Sources , methods and major patterns in GLOBOCAN 2012,” vol. 386,
2015.
7. T. Jayalakshmi, “A Novel Classification Method for Diagnosis of Diabetes Mellitus Using Artificial Neural Networks,” 2010.
8. Y. Ben-haim, “A Streaming Parallel Decision Tree Algorithm,” vol. 11, pp. 849–872, 2010.
Paper Title: Religious Online Information Behaviour Among the Malays in the Digital Era
Abstract: Seeking knowledge is among the most important virtuein Islam. The Internet era offers more
104. sources and new ways in gaining and producing information including religious information. However, the
perception that the religious information behaviour among the Malays is not yet being studied empirically. A
framework has been developed based on theories, previous related studies and interviews with Internet users. 638-644
Three main aspects of behaviour being studied: usage, information seeking and verification. Data is collected
using printed and electronic questionnaires. There are 616 usable data successfully gathered and analyzed
through SPSS. Related to usage, the result shows that the Malays have adapted well with the Internet medium
for searching the religious information. The results also show that there are changes on the technical aspect of
information acquisition and delivery via the new media. However from the procedural aspect, the information
behaviour among Malays are still traditional in nature based on their seeking information methods. The results
suggest that the religious offline behaviour continues online, demonstrating their conservative nature. Analyzing
the beahviour against the users’ background suggests that there is a statically relationship between them. A high
percentage of users claimed that the verify online religious information, even though they differ on this in
practice. This paper ends with recommendations to improve the information behaviour among the masses.
106. Paper Title: Reliability Management: Setting-up Cloud Server in Higher Education
Abstract: This article shows the reliability plan and reliability manual for setting up two cloud servers for 654-661
Higher Education. These two servers are used for Primary Operation Services and Standby Operation Services.
This reliability plan shows what activities can be performed while setting up servers and at what reliable timings.
It also shows the tools and techniques that will be used for designing, analysis and testing services during project
development. It has the different management strategies for suppliers and specific standards and policies for
setting up a server and for quality assurance and product maintainability. This plan and manual shows how to
provide a full backup system of servers and a recovery unit in case of emergencies. This also shows how to setup
a security control system, supported by firewalls with adequate warranty
Keyword : reliability manual, reliability plan, cloud servers, security system, recovery system.
References:
1. Al-Zyoud M. F. Social Media Marketing Functional Branding Strategy and Intentional Branding. Journal of Problems and Perspectives
in Management. 16 (3), 102-116, 2018.
2. Ash J., Anderson B., Gordon R. & Langley P. Digital Interface Design and Power: Friction, Threshold, Transition. SAGE Journal
36(6), 1136-1153, DOI: 10.1177/026377581876426, 2018.
3. Bartin B., Ozbay K., Gao J. & Kurkcu. Calibration and Validation of Larfe-scale traffic simulation networks: a case study. Procedia
Computer Science, 130, 844-849, 2018
4. Bauer, E. Design for Reliability. 1st ed. Chicester: Wiley, 2011.
5. Beldick.com. Probability of failure on Demand (POFOD) Calculation, 2017.
6. Dar A. R., & Ravindram R. A Comprehensive Study on Cloud Computing Paradigm. International Journal of Advance Research in
Science and Engineering. 7(4), 235-242, 2018.
7. Entsog. Implementation Monitorig and Baseline Effect Monitoring of The Tariff Network Code. Europan Network of Transmission
System Operators for gas. Implementation and Effect Monitoring, 2018
8. Fauzi S. S. M., Suali A. J .& Sobri W. A. W. M. A Stateof the Art: Software Configuration Management Tools for Global Software
Development. Journal of Physics: Conference Series. DOI: 1088/1742-6596/1049/1/01/2006, 2017.
9. Gokulakrishnan S. Gnanasekar J. M. Efficient and Privacy for Data Integrity and Data Replication in Cloud Computing. International
Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.333-336 Volume-8 Issue-12, October,
2019.
10. Hadzhikoleva S., Hadzhikolev E., Cheresharov S., & Yovkov L. Towards Building Cloud Education Networks. TEM Journal 7(1),
219-224, DOI:10.18421/TEM71-27, 2018.
11. Iso.org. ISO/IEC 27000/270001 Information security management, 2017.
12. Jayaraj T. J., Samath A. Process Optimization of Big Data Centre Using Nature Inspired Firefly Algorithm and K-Means Clustering.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.311-320 Volume-8 Issue-
12, October, 2019.
13. Manoj K. A. Mrudula K., Srinivas K. P. Risk Factors and Security Issues in Various Cloud Storage Operations. International Journal of
Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.48-52 Volume-8 Issue-12, October, 2019.
14. Mathur M., Madan M. Software Defined Cloud Mini Data Centers-An Effort Towards Reduction in Latency of Cloud Traffic Delivery.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN : 2278-4075,pp.20-26 Volume-8 Issue-12,
October, 2019.
15. Micosoft. Testing for Reliability, Msdn.microsoft.com. 2017
16. Neufelder. Revised IEEE 1633 Recommended Practices for Software Reliability,2017.
17. O'Connor, P. and Kleyner, A. Practical Reliability Engineering, 5 th Edition. 1st ed. John Wiley & Sons, 2012.
18. Peroli M., De Meo F., Vigano L & Guardini D. MobSTer: A model-based security testing framework for web applications. Journal of
Software Testing, Verification, and Reliability. 28(8), e1685, 2018.
19. Perreault M. C. & Mosconi E. Social Media Engagement: Content Strategy and Metrics Research Opportunities. Proceedings of the
51st Hawaii International Conference on System Science, 2018.
20. Raj C. Jacob A. Performance Evaluation of SUMEGHA Cloud Computing Environment: Methodologies & Tool. Towards Reduction
in Latency of Cloud Traffic Delivery. International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN :
2278-4075,pp.875-880 Volume-8 Issue-12, October, 2019.
21. Ramos P. L., Nascimento D. C., Cocolo C., Nicola M. J., Alonso C., Ribeiro L. G.M., Ennes A., & Louzada F. Reliability -Centered
Maintenance: Analyzing Failure in Harvest Surgence Machine Using some Generalizations of Weibull Distribution. Journal of
Modelling and Simulation in Engineering. DOI: 10.115/2018/1241856, 2018.
22. Sahin C. Social Media Addiction Scale – Student Form: The Reliability and Validity Study. Journal of Educational Technology, 17 (1),
169-182, 2018.
23. Salaki R. J. Analysis and Design of Service Oriented Architecture Based in Public Senior High School Academic Information Sys tem.
5th International Conference on Electrical, Electronics and Information Engineering (ICEEIE), 180-186 Publisher IEEE, 2017.
24. Salaki R. J., C. R. Kawet., R Manoppo., & F. Tumimomor. Decision Support System Major Selection Vocational High School in Using
Fuzzy Logic Android-Based. International Conference on Electrical Engineering, Informatics, and Its Education, C1-C6, 2015
25. Salaki R. J., Mogea T., & Oroh E. Z. Design Mobile Learning (M- Learning) Android Englihs For Young Learner. International
Conference on Electrical Engineering, Informatics, and Its Education, 2015.
26. Salaki R. J & Mogea T. Online Learning as A Paradigm of Learning in Higher Education. 7th International Conference on Psychology,
Language and Teaching (ICPLT), 2016.
27. Shimizu H., Otsuka Y. & Noguchi H. Design review based on failure mode to visualise reliability problems in the development stage
of mechanical products. International Journal of Vehicle Design, vol. 53, pp. 149- 165, 2010.
28. Sutherland, K., Davis, C., Terton, U., & Visser., I. University Student Social Media Use and Its Influence on Offline Engagement in
Higher Educational Communities. Student Success, 9(2), 13-24. DOI: 10.5204/ssj.v9i2.400, 2018.
Paper Title: Technological Needs of Farm Women in Varied Farming Systems of Tamil Nadu.
Abstract: Technological base for improving productivity and income of the rural population in the field of
agriculture has broadened with the success of Green revolution. As a result of this research and transfer of
107. technology programmes, the national production has increased over time in the decades, thus balancing the
population growth and food production of our country. There is a serious and valid criticism that the modern
technologies served only male farmers and not the resource poor small farm women who account for nearly 662-665
89.00 per cent of the women farmers. It has now been realised that participation of all sections of the farming
community in particular the farm women, can be brought by developing appropriate technologies, keeping other
issues of stability, sustainability, equity and productivity. The study was taken up in three districts of Tamil
Nadu viz., Nagapattinam, Cuddalore and Perambalur districts comprising of maximum area under three
different farming systems viz., wet land, garden land and dry land respectively. The respondent of 60 small farm
women was selected from each of the selected farming systems by using proportionate random sampling
technique. The technological needs of small farm women in farm operations were measured with the help of a
specially constructed schedule, which was prepared by discussing with experts. The collected data were
tabulated and analysed using statistical tools viz., percentage analysis, mean and analysis of variance. The
majority of the farm women expressed high level of technological need in dairy farming, goat rearing and
poultry farming with the overall mean score (2.752, 2.554 and 2.516) respectively.
Paper Title: Patient Readmission Prediction Due to Diabetes using Machine Learning Classification
Abstract: Diabetes mellitus is a general illness of body caused due to a group of metabolic disorders and
conditions where the sugar level readings over a prolonged period are very high. It affects different organs of the
human body which thus harm a large number of the body's system and tissues to micro level, particularly blood
veins, nerves and also skin. It usually occurs when body has malfunctioned pancreas or there is insulin
resistance. As there have been huge advancements in machine learning field which is widely used in solving
different real life community level problems including health care and also due to presence of vast data from
different medical care centres and hospitals which can play an important role in building a machine learning
model which can predict weather a person is suffering from diabetes by using data sets from different hospitals
and medical care centres. We have collected data from different hospitals over past 10 years where we consider
different factors that determine whether admission of a person into hospital is required or not. Depending upon
the previous medical history of the person, it can be determined that weather or not the person is readmitted into
111. the hospital and within what time period. Hence in this paper we try to construct a model where we predict
weather a person is readmitted to hospital or not .Main focus is to help health care professionals, medicine 678-681
practitioners and people who suffer from its symptoms improve their treatment process by predicting the chance
of the person having diabetes, here by decreasing cost of treatment and enabling the concerned person to be self-
aware of their medical condition.
Paper Title: Equivalency of English and Uzbek Idioms with Dairy Products (Milk, Cheese, Butter and Egg)
Abstract: This paper discusses the analysis of English diary idioms and their Uzbek counterparts establishing
the level of equivalency, or non-equivalency in some cases. In order to succeed in my attempt I bring forth
theoretical input on idioms and equivalency as a process of translation. I also exhibit a clear overview of the
observed idioms by undertaking a report analysis.
Keyword : Security Risk; Web Applications; Fuzzy Logic; Analytic Network Process.
References:
1. Davis, Noopur., Samuel T. Redwine Jr., GerlindeZibulski, Gary McGraw, Watts Humphrey“Processes for Producing Secure Software –
Summary of US National Cyberscevurity Summit subgroup Report” IEEE Security & Privacy May/June 2004
2. Saaty, T. L. (2004). Fundamentals of the analytic network process—Dependence and feedback in decision-making with a single
network. Journal of Systems science and Systems engineering, 13(2), 129-157.
3. Boran, Semra&Yazgan, Harun&Goztepe, Kerim. (2011). A fuzzy ANP-based approach for prioritising projects: A Six Sigma case
study. Int. J. of Six Sigma and Competitive Advantage. 6. 133 - 155. 10.1504/IJSSCA.2011.039715.
4. Dağdeviren, M., &Yüksel, İ. (2010). A fuzzy analytic network process (ANP) model for measurement of the sectoralcompetititon level
(SCL). Expert systems with applications, 37(2), 1005-1014.
5. Chang, B., Kuo, C., Wu, C. H., &Tzeng, G. H. (2015). Using fuzzy analytic network process to assess the risks in enterprise r esource
planning system implementation. Applied Soft Computing, 28, 196-207.
6. Lin, C., Madu, C. N., Kuei, C. H., Tsai, H. L., & Wang, K. N. (2015). Developing an assessment framework for managing sustain ability
114. programs: A Analytic Network Process approach. Expert Systems with Applications, 42(5), 2488-2501.
7. Kumar, R., Zarour, M., Alenezi, M., Agrawal, A., & Khan, R. A. (2019). Measuring Security Durability of Software through Fuzz y-
Based Decision-Making Process. International Journal of Computational Intelligence Systems, 12(2), 627-642. 691-695
8. Avizienis, A., Laprie, J. C., & Randell, B. (2001). Fundamental concepts of dependability (pp. 7-12). University of Newcastle upon
Tyne, Computing Science.
9. Available online at https://www.sebokwiki.org/wiki/Reliability,_Availability,_and_Maintainability
10. Wang, C. N., Thanh, N. V., & Su, C. C. (2019). The Study of a Multicriteria Decision Making Model for Wave Power Plant Location
Selection in Vietnam. Processes, 7(10), 650.
11. Kahraman, C. (Ed.). (2008). Fuzzy multi-criteria decision making: theory and applications with recent developments (Vol. 16). Springer
Science & Business Media.
12. Sipahi, S., & Timor, M. (2010). The analytic hierarchy process and analytic network process: an overview of applications. Management
Decision, 48(5), 775-808.
13. Kumar, R., Khan, S. A., & Khan, R. A. (2016). Analytical network process for software security: a design perspective. CSI transactions
on ICT, 4(2-4), 255-258.
14. R. Kumar, S. A. Khan, R. A. Khan, Revisiting software security: durability perspective, in: inter. jour. of hyb. info. tech. (SERSC) 8(2),
(2015), pp. 311-322.
15. Alenezi, M., Kumar, R., Agrawal, A., & Khan, R. A. (2019). Usable-security attribute evaluation using fuzzy analytic hierarchy
process. ICIC Express Lett.-An Int. J. Res. Surv., 13(6).
16. Alharbe, N., Atkins, A. S., (2014). A Study of the Application of Automatic Healthcare Tracking and Monitoring System in Sau di
Arabia, International Journal of Pervasive Computing and Communications , Vol. 10, Issue 2, pp. 183-195.
17. Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, Khan R.A., (2019), Measuring Security-Durability through
Fuzzy Based Decision Making Process, International Journal of Computational Intelligence Systems, June, 2019.
18. Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, Khan R.A., (2019), Multi-level Fuzzy System for Usable-
Security Assessment, Journal of King Saud University - Computer and Information Sciences, April 2019.
19. Kavita Sahu, R. K. Srivastava, Revisiting Software Reliability, Advances in Intelligent Systems and Computing, Springer, 2019.
20. R. Kumar, S. A. Khan, R. A. Khan, (2016) Durability Challenges in Software Engineering, Crosstalk-The Journal of Defense Software
Engineering, pp. 29-31.
21. R. Kumar, S. A. Khan, R. A. Khan, (2015) Revisiting Software Security Risks, British Journal of Mathematics & Computer Science,
Volume 11, Issue 6, 2015.
22. Kavita Sahu, Rajshree, Rajeev Kumar, (2014) Risk Management Perspective in SDLC”, International Journal of Advanced Research in
Computer Science and Web based healthcare management system Engineering, pp. 1247-1251.
23. R. Kumar, S. A. Khan, R. A. Khan, (2015) Durable Security in Software Development: Needs and Importance, CSI Communication, p p.
34-36, Oct 2015.
24. Kavita Sahu, R. K. Srivastava, Soft Computing Approach for Prediction of Software Reliability, ICIC Express Letters-An International
Journal of Research and Surveys, , pp. 1213-1222, 2018.
Keyword : demographic policy, Russian Federation, population, population increase, population size
dynamics, Russia’s social policy.
References:
1. G.I. Avtsinova, “Uslyshat li vlasti Rossii sotsial'nyi nabat?” [Can the Russian government hear the tocsin of social justice?]. Vlast', 7,
2011, pp. 175–176.
2. G.I. Avtsinova, I.A. Supryaga, A.M. Khalbaeva, M.Y. Martynova, O.A. Nesterchuk, V.V. Yudaev, “Migration and public security:
Problem field of research”. Biosciences Biotechnology Research Asia, 12(1), 2015, pp. 961–964.
3. E.L. Motrich, “Rol' migratsii v dinamike naseleniya Dal'nego Vostoka Rossii” [The role of migration in population dynamics in the
Russian Far East]. Sotsial'naya Politika i Sotsiologiya, 16(1), 2017, pp. 45–53.
4. A.P. Rudnitskaya, P.V. Kvartnikov, “Rol' grazhdanskoi aktivnosti v stanovlenii tsennostnykh orientirov sovremennoi mo lodezhi” [The
role of civic engagement in the making of present-day youth’s value orientations]. TsITISE, 1, 2018, pp. 24.
5. Stolitsa Detstva. Prichiny kotorye chashche vsego zastavlyayut zhenshchin otkazyvat'sya ot rozhdeniya detei [Top reasons why women
refuse to have children], 2018. Available: https://stolicadetstva.com/news/1621/
6. Molodaya Sem'ya. Zhilishchnye programmy dlya molodykh semei [Housing programs for young families]. Available: http://molodaja-
semja.ru/how/gosudarstvennye-programmy/
7. International Monetary Fund. IMF annual report: Promoting inclusive growth, 2017. Available:
https://www.imf.org/external/pubs/ft/ar/2017/eng/index.htm
8. Total-rating.ru. VVP po PPS stran za 2015 god [National GDPs at purchasing power parity in 2015], 2016. Available: http://total-
rating.ru/1594-vvp-po-pps-stran-za-2015-god.html
9. Rosstat. Sem'ya, materinstvo i detstvo [Family, motherhood, and childhood]. Available:
http://www.gks.ru/wps/wcm/connect/rosstat_main/rosstat/ru/statistics/population/motherhood/#
10. A.P. Rudnitskaya, E.A. Novikov, “Osnovnye napravleniya formirovaniya, problemy i zadachi demograficheskoi politiki v sovremen noi
Rossii” [Key areas for the development of, issues in, and objectives for demographic policy in present-day Russia]. PolitBook, 1, 2015,
pp. 43–56.
11. T.V. Fomicheva, “Vzaimosvyaz' sotsiokul'turnykh tsennostei i reproduktivnogo povedeniya naseleniya Rossii: Sotsiolo go-
statisticheskii analiz” [An interrelationship between people’s sociocultural values and reproductive behavior in Russia: A so ciological-
statistical analysis]. Sotsial'naya Politika i Sotsiologiya, 16(5), 2017, pp. 157–166.
Keyword : Anticancer, Caco-2 cell lines, Terminalia chebula, Phyllanthus emblica, Dimocarpus longan.
References:
1. Aarthi C and Ramesh Babu PB, Anti-Cancer activity of Phyllanthus reticulatus on Colon cancer cell line. International Journal of
Civil Engineering and Technology. Vol.8, No.1, 943-947, 2017.
2. Akila P, Chandini R, Anshu Kumar Yadav, Varun Reddy, Sowmya MN and Subbarao M, In vitro anticancer activity of ethanolic
116. extracts of Piper nigrum against colorectal carcinoma cell lines. International Journal of Applied and Basic Medical Research. Vol. 7,
No.1, 67–72, 2017.
3. Murtaza M, Jayaram M, Muniandy RK, Illzam EL, Shah MJ and Sharifa AM 2016 Colorectal Cancer: Pathogenesis, Management an d 700-706
Prevention. IOSR Journal of Dental and Medical Sciences. Vol. 15, No.5, 94-100, 2016.
4. Sumitra C and Krunal N, In vitro and in vivo Methods for Anticancer Activity Evaluation and Some Indian Medicinal Plants
Possessing Anticancer Properties. Journal of Pharmacognosy and Phytochemistry. Vol.2 No.2, 140-152, 2013.
5. Syed Kamil M and Paramjyothi S, Anticancer activity of ethanol and polyphenol extracts of Portulaca quadrifida Linn on human colon
cancer cell lines. International Journal of Pharma and Bio Sciences, Vol. 3, No.3, 488 – 498, 2012.
6. Kundlik MG, Krishnapiillai, Ranju S,Hitesh BG, Thirumoorthy N, Celecoxib Loaded Microbeads: A Targeted Drug Delivery For
Colorectal Cancer. International Journal of Current Pharmaceutical Research. 2(1): 46-55, 2010.
7. Kanakarajan VP, Vijayakumar JS, Jacob E, Gopi Lilly R, Ramachandran R, Study on the Anti-cancer Activity of Tylophora indica
Leaf Extracts on Human Colorectal Cancer Cells. International Journal of Pharmacognosy and Phytochemical Research, Vol. 6, No.2,
355-361, 2014.
8. Surya Prakash DV and Meena V, Experimental and Modelling Equation of Chebulinic acid from the composition of medicinal herbs
by using soxhlet extractor. International Journal of Innovative Research in Science, Engineering and Technolog y, Vol.4, No.7, 5217-
5220, 2015.
9. Vaibhav D Aher, Arun Kumar Wahi, Immunomodulatory effect of alcoholic extract of Terminalia chebula ripe fruits. Journal of
Pharmaceutical Science and Research, Vol. 2, No.9, 539-544, 2012.
10. Shruti Bandopadhyaya, Mani Ramakrishnan, Ramesh Puttalingaiah Thylur and Yogisha Shivanna 2015 In-Vitro Evaluation of Plant
Extracts Against Colorectal Cancer Using HCT 116 Cell Line. International Journal of Plant Science and Ecology, Vol. 1, No.3, 107-
112, 2015.
11. Shenai A, Devaraj E, Roy Anitha, Cytotoxic Effect of Caralluma fimbriata against Human Colon Cancer Cells.
Pharmacognosy Journal, Vol. 9, No.2, 204-207, 2017.
12. Sathya Narayanan PC, Kalpana Devi R, Pushpalatha M, Raveenand R and Lingathurai S, International Journal of Curren t Research in
Biosciences and Plant Biology, Vol. 1, No.3, 41-49, 2014.
13. Zhuomin Zhang, Dandan Zeng and Gongke Li, Study of the volatile profilecharacteristics of longan during storage by a combinat ion
sampling method coupled with GC/MS. Journal of the Science of Food and Agriculture, Vol. 88, 1035–1042, 2008.
14. Umadevi M, Sampath Kumar KP, Bhowmik D, Duraivel S, Traditionally Used Anticancer Herbs In India. Journal of Medicinal Plants
Studies, Vol.1, No.3, 56-74, 2013.
15. Ngamkitidechakul C, Jaijoy K, Hansakul P, Soonthorn chareonnon N and Sireerata wong S, Antitumour effects of Phyllanthus
emblica L.: induction of cancer cell apoptosis and inhibition of in vivo tumor promotion and in vitro invasion of human cance r cells.
Journal of Phytotherapy Research, Vol. 24, No.9, 1405-1413, 2010.
16. Karnati R and Nahar N, Chebulinic acid from Terminalia chebula causes cell cycle arrest and induces apoptosis in Caco-2 cells.
Bangladesh Journal of Pharmacology, Vol. 2, 432-438, 2012.
17. Sumalatha D, Antioxidant and Antitumor activity of Phyllanthus emblica in colon cancer cell lines. International Journal of Current
Microbiology and Applied Sciences, Vol. 2, No.5, 189-195, 2013.
18. Lala G, Malik M, Zhao C, He J, Kwon Y, Giusti MM and Magnuson BA, Anthocyanin rich extracts inhib it multiple biomarkers of
colon cancer in rats. Journal of Nutr. Cancer,Vol.54, 84-93, 2006.
19. Eugin Amala V and Jeyaraj M, Determination of Antibacterial, Antifungal, Bioactive Constituents of Triphala by Ft-Ir And Gc-Ms
Analysis. International Journal of Pharmacy and Pharmaceutical Sciences, Vol. 6 No.8, 123-126, 2014.
20. Singh G and Kumar P, Extraction, gas chromatography-mass spectrometry analysis and screening of fruits of Terminalia chebula Retz.
for its antimicrobial potential. Journal of Pharmacognosy Research, Vol.5, No.3, 162-168,2011.
21. Balasubramanian S, Ganesh D, Poonam Panchal, Mohammad Teimouri and Surya Narayana V. V. S, GC-MS analysis of
phytocomponents in the ethanolic extract of Emblica officinalis (Indian Gooseberry). Journal of Chemical and Pharmaceutical
Research, Vol. 6, No.6, 843-845, 2014.
22. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
23. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
24. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
25. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
26. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be
published.
27. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum
Electron., submitted for publication.
28. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
29. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301].
30. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
31. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL)
32. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
33. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)
Paper Title: IoT Based Horn Control and Oil Purity Monitoring System in Vehicles
Abstract: Nowadays, we use intelligent devices in every part of our lives mainly in automobiles. Horn is one
of the important parts of the vehicle but at the same time, it creates excess noise to the surroundings. To use it
wisely, we have restricted the number of the horn to be pressed. The driver can only use a certain number of
horns per hour. If the horn exceeds, then fine will be charged from the concerned and also the duration of the
horn is limited. During the emergency time, the fine amount is relaxed. To make sure we use a camera which
will closely watch the situation of the person. The cautions will be given to the driver through the help of LCD
display and speaker. If the additional cost is not paid then the car will be locked automatically by blocking the
engine so after paying the charge it will be released. This all details will be uploaded in both companies as well
as in the government's server. One more feature is, a sensor will be used to sense the purity of the oil and will be
updated in the server for the change of oil.
Authors: G. Durga Prasad, V. Mohan Manoj, K. Ravi Prakash Babu, B. Raghu Kumar
Paper Title: Estimation of Reduced Stiffness under the Influence of Crack in a Beam
Abstract: Machine components with cantilever boundary conditions are most prominently used in
mechanical engineering applications. When such components are subjected to fatigue loading, crack may get
initiated and failure may occur. In order to prevent catastrophic failure and safe guard these components one has
to condition monitor the dynamic behavior under fatigue loading condition. Vibration based condition
monitoring is one of the most effective method to assess the fatigue failure of the component. In this paper, a
cantilever beam is analyzed for its dynamic behaviour under the influence of crack. The cantilever beam
considered for the analysis is of rectangular cross section and is uniform throughout its length. The characteristic
equation was derived for the Euler-Bernoulli cantilever beam to obtain the relationship between the location of
the crack and stiffness of the beam because the stiffness of the beam influences the natural frequency. It is found
that the stiffness of the cantilever beam is varying for varying locations of the crack in different modes of
vibration. It is clearly understood from the analysis that the vibration response of the cracked cantilever beam in
its modes of vibration is affected by the corresponding stiffness reduction based upon the location of the crack.
So, it can be inferred that the natural frequency of the cracked cantilever beam may have different values for
different locations of the crack.
References:
1. Frank Harary, Graph theory, Narosa Publishing House, New Delhi, (1969).
2. S. L. Hakimi, On Realizability of a Set of Integers as Degrees of the Vertices of a Linear Graph I, SIAM, 10( 3), (1962), 496-506.
3. Ivan Gutman, Degree-Based Topological Indices, Croat. Chem. Acta, 86 (4), (2013) 351-361.
4. G.R.Roshini, Chandrakala.S.B, B. Sooryanarayana, Randic index of transformation graphs, Int. J. Pure Appl. Math., 120(6), 2018,
6229-6241.
5. Chandrakala Sogenahalli Boraiah, Roshini Gujar Ravichandra and Sooryanarayana Badekara, Topological Indices of Transformation
Graphs of aCompliment Graph, AIP Conference Proceedings 2112, 020022 (2019).
Authors: Aniq Asyranie Zahidy, Muslich Hartadi Sutanto, Madzlan Napiah, Zahidy Abd Hamid
120. Paper Title: Measuring the Relationships of Road Service Quality and Road Traffic Accidents
Abstract: As with the most of middle-income countries, road traffic accidents (RTAs) in Malaysia constitute
719-725
a serious public health challenge to the nation. Despite the fact that great efforts have been made to understand
the causation factors of RTAs, little is known about how road service quality (RSQ) impacted road safety. The
primary objective of the current study was to explore the relationships of RSQ and RTAs from the viewpoint of
the Malaysian road users. The study employed a quantitative research approach with the use of a self-
administered questionnaire instrument to survey a group of road users. In particular, this paper reports the first
phase of the study, that is, to develop and administer an instrument to measure the relationships of RSQ and
RTAs. A two phased approach was undertaken to determine face and content validity, and reliability of this
instrument. The face and content validity were achieved by assembling a panel of academia and industry
practitioners to ensure that wording of the items, and the development of the scale, were comprehensible for data
inquiries. Reliability and internal consistency testing were achieved by employing the exploratory factor analysis
(EFA) to model the interrelationships among items, and Cronbach’s alpha to evaluate the extent to which the
items measure the same construct. Then, the instrument was pilot-tested by administration to a convenience-
quota sample of 24 road users who stopped at the rest and service areas along the case study expressway. The
results have pointed to the indication that the measurement instrument reached the accepted levels of internal
reliability. Thus, it can be concluded that the developed instrument able to collect sound quality survey data and
could enable the next stage of the study draws a valid and generalized conclusion. This paper highlighted the
value of pilot testing in terms of improving the design of research studies that contributes to the development of
best practices in RTAs research. Finally, the outcomes of the study should become a source for policy makers or
local authorities to have better understanding of the safety outcomes of road service quality from which the
prevention measures of RTAs could be improved.
Keyword : Road service quality, road traffic accidents, measurement constructs, pilot study.
References:
1. WHO, Global status report on road safety 2018: Summary, 2018, Geneva: World Health Organization.
2. K. M. Yap, “Road accidents – human’s fault?,” Jurutera, October, 2008, pp. 17-19.
3. Ministry of Transport Malaysia, Road Safety Plan of Malaysia 2014-2020, 2014, Putrajaya: Ministry of Transport Malaysia.
4. ASEAN Secretariat, ASEAN regional road safety strategy, 2016, Jakarta: The ASEAN Secretariat, Community Relations Division.
5. R. Sarani, S. A. S. M. Rahim, J. M. Marjan, and W. S. Voon, Predicting Malaysian road fatalities for year 2020, MRR 06/2012, 2012,
Kuala Lumpur: Malaysian Institute of Road Safety Research.
6. A. Abdelfatah, “Traffic fatality causes and trends in Malaysia”, Malaysia Sustainable Cities Program, Working Paper Series,
Massachusetts Institute of Technology, 2016. Available: https://scienceimpact.mit.edu/sites/default/files/documents/Abdelfatah _0.pdf.
7. Ministry of Transport Malaysia, Road Safety Plan of Malaysia 2006-2010, 2015, Putrajaya: Ministry of Transport Malaysia.
8. MIROS, General statistics 1998–2016, Malaysian Institute of Road Safety Research. Available: https://www.miros.gov.my/1/page.php?
id=17.
9. WHO, Global status report on road safety 2015, 2015, Geneva: World Health Organization,
10. OECD, OECD health data 2018 - questionnaire definitions for all indicators. Organization for Economic Co-operation and
Development, 2018. Available: http://www.oecd.org/els/health-systems/OECD- Health-data-2018-Questionnaire-DEFINITIONS.pdf.
11. Y. Darma, M. R. Karim, and S. Abdullah, “An analysis of Malaysia road traffic death distribution by road environment,” Sādhanā,
42(9), 2017, pp. 1605-1615.
12. Malaysian Highway Authority, Annual Report 2016. Available: http;//www.llm.gov.my/documents/PublishDoc/pub_ 483412202.pdf.
13. L. Abdullah and N. Zamri, “Ranking of the factors associated with road accidents using correlation analysis and fuzzy TOPSIS,”
Australian Journal of Basic and Applied Sciences, 4(2), 2010, pp. 314-320.
14. A. A. Redhwan and A. J. Karim, “Knowledge, attitude and practice towards road traffic regulations among university students,
Malaysia,” The International Medical Journal Malaysia, 9(2), 2010, pp. 29-34.
15. A. Ismail, G. S. Yi, G.S., and M. K. I. M. Zain, “Study on drivers’ behaviour relationships to reduce road accidents in Puchong,
Selangor Darul Ehsan,” Jurnal Kejuruteraan, 27, 2015, pp. 81-85.
16. Z. Sultan, N. I. Ngadiman, F. D. A. Kadir, N. F. Roslan, and M. Moeinaddin, M. (2016). “Factor analysis of motorcycle crashes in
Malaysia,” Planning Malaysia: Journal of the Malaysian Institute of Planner, Special Issue IV, 2016, pp. 135-146.
17. F. F. Mohamad, J. Mohamad, and A. S. Abdullah, “Do young Malaysian drivers involve in speeding behaviour: An investigation at
selected accident hotspots in peninsular Malaysia,” Journal of Advanced Research in Social and Behavioural Sciences, 9(1), 2017, pp.
75-83.
18. M. M. Abdul Manan, A. Várhelyi, A. K. Ҫelik, and H. H. Hashim, “Road characteristics and environment factors associated with
motorcycle fatal crashes in Malaysia,” IATSS Research, Article in Press, 2017. Available: https://doi.org/ 10.1016/j.iatssr.2017.11.001.
19. L. Najib, L. Abdullah, I. Abdullah, and Z. Salleh, “Weights of road accident causes using analytic hierarchy process,” ARPN Journal of
Science and Technology, 2(2), 2011, 39-44.
20. N. W. M. Junus, M. T. Ismail, Z. Arsad, and R. A. Rahman, “Malaysia road accidents influences based on structural time series
analysis,” Applied Mathematics and Information Sciences: An International Journal. 11(4), 2017, pp. 1029-1039.
21. P. Forsythe, “Monitoring customer perceived service quality and satisfaction during the construction process,” Construction Economics
and Building, 15(1), 2015, pp. 19-42.
22. J. J. Jr. Cronin and S. A. Taylor, “Measuring service quality: A reexamination and extension,” Journal of Marketing, 56(3), 1992, pp.
55-68.
23. Roads Australia, Building the case for customers – how the expectation of a transport experience is driving change. Melbourne: Roads
Australia, 2018. Available: https://www.roads.org.au/Portal/3/ Building%20the%20Case%20for% 20Customerts.pdf.
24. ERTRAC, European roadmap: Road user behaviour and expectations. ERTRAC Working Group on Urban Mobility, European Road
Transport Research Advisory Council, Brussels, Belgium, 2011. Available: https://www.ertrac.org/uploads/documents_publications/
Roadmap/Road%20User%20Behaviour%20and%20 Expectations.pdf.
25. T. Calvert, G. Parkhurst, and J. Perkin, User and community expectations of the major road network (MRN), The Center for Transport
and Society, University of the West of England, Bristol, 2015. Available: http://www.reesjeffreys.co.uk/wp-content/uploads /2017/10/
RJRFMRNStudyTask1cFinalReport.pdf.
26. T. H. Poister and J. C. Thomas, “The effect of expectations and expectancy confirmation/ disconfirmation on motorists’ satisfaction
with State Highways,” Journal of Public Administration Research and Theory, 21(4), 2011, pp. 601-617.
27. A. Hartmann, and M. Hietbrink, “An exploratory study on the relationship between stakeholder expectations, experiences and
satisfaction in road maintenance,” Construction Management and Economics, 31(4), 2013, pp. 345-358.
28. M. Dhurup, C. Mafini, and L. A. Masitenyane, “Factors influencing customer-service quality in the pre-cast concrete industry: An
exploratory factor analysis,” Mediterranean Journal of Social Sciences, 5(8), 2014, pp. 115-123.
29. P. Forsythe, “Monitoring customer perceived service quality and satisfaction during the construction process,” Construction Economics
and Building, 15(1), 2015, pp. 19-42.
30. CIDB, CIS 19:2011 – Quality assessment system for completed road work, 2011, Kuala Lumpur: Construction Industry Development
Board Malaysia.
31. A. Tortum, M. Y. Çodur, and B. Kılınc, “Modeling traffic accidents in Turkey using linear regression analysis,” Iğdır University
Journal Institute Science and Technology, 2(3), 2012, pp. 69-78.
32. J.-R. Chang, P.-J. Liu, and G.-C. Chen, “The service quality of roads in Taiwan from the point of view of road users and drivers,”
Journal of Marine Science and Technology, 23(3), 2015, pp. 344-352.
33. H. T. Zuna, S. P. Hadiwardoyo, and H. Rahadian, “Developing a model of toll road service quality using an artificial neural n etwork
approach,” International Journal of Technology, 4, 2016, pp. 562-570.
34. N. Pilaka, O. R. S. Rao, and P. K. Samanta, “An analysis of roadway service indicators: A comparative study of six toll roads in Pune
Region,” The IUP Journal of Operations Management, 26(3), 2017, pp. 7-22.
35. N. Che-Him, R. Roslan, M. S. Rusiman, K. Khalid, M. Kamardan, F. A. Arobi, and N. Mohamad, “Factors Affecting Road Traffic
Accident in Batu Pahat, Johor, Malaysia”, IOP Conf. Series: Journal of Physics: Conf. Series, 995 (2018) 012033. Available:
https://www.doi.org/10. 1088/1742-6596/995/1/012033
36. M. Sørensen and M. Mosslemi, Subjective and objective safety: The effect of road safety measures on subjective safety among
vulnerable road users. TØI report 1009/2009, 2009. Available:
https://www.toi.no/getfile.php/1311745/Publikasjoner/T%C3%98I%20rapporter/2009/1009-2009/1009-2009-Sum.pdf.
37. L. Eboli, G. Mazzulla, and G. Pungillo, “How to define the accident risk level of car drivers by combining objective and subjective
measures of driving style,” Transportation Research Part F: Traffic Psychology and Behaviour, 49, 2017, pp. 29-38.
38. M. Saunders, P. Lewis, and A. Thornhill, Research methods for business students, 5th ed., 2014, New Delhi: Dorling Kindersley.
39. A. Fink, The survey handbook, 2nd ed., 2003, Thousand Oaks: SAGE Publications, Inc.
40. I. Etikan, S. A. Musa, and R. S. Alkassim, “Comparison of convenience sampling and purposive sampling,” American Journal of
Theoretical and Applied Statistics, 5(1), 2016, pp. 1-4.11.
41. I. Etikan and K. Bala, “Sampling and sampling methods,” Biometrics and Biostatistics International Journal, 5(6): 00149, 2017.
Available: https://www.doi.org/10.15406/bbij.2017.05.00149.
42. J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, and R. L. Tatham, Multivariate data analysis, 6th ed., 2006, New Jersey: Prentice
Hall International.
43. L. C. Menches and A. S. Hanna, “Quantitative measurement of successful performance from the project manager’s perspective,”
Journal of Construction Engineering and Management, 132, 2006, 1284-1293.
44. M. Tavakol and R. Dennick, “Making sense of Cronbach’s alpha,” International Journal of Medical Education, 2, 2011, pp. 53-55.
45. D. George and P. Mallery, SPSS for Windows: step by step. 10th ed., 2010, Boston: Allyn and Bacon.
Authors: Shaik Abdul Mazeed, P. Sai Rani, R. Raveendranath, P. Divya, Telugu Sudharani
Authors: Zulkifli Mohamad, Nazri Muslim, Wan Zulkifli Wan Hassan, Azizi Umar, Maharam Mamat
Paper Title: Migration from Traditional Village to Group Settlement Area: AN Analysis of Felda Experience
122.
Abstract: At the time the country gained independence, most Malays were still living in traditional village
and in poverty. In order to overcome this problem, the government had introduced a form of well-planned 729-736
migration. This migration was established with specific goals such as offering land to people without one,
eradicating poverty, eliminating communist’s hide-outs and boosting country’s economic growth. By allocating
some amount of fund, the government cleared-up forest land and provided basic facilities such as houses, roads,
worshipping places and schools. This well-planned migration was top-down, locating only qualified migrants
through process of interview. In order for this migration to be successful, the government introduced the motto
best land for the best people. The first settlement of this agricultural migration is in Lurah Bilut, Bentong
Pahang. A total of 616 migrants of all races and religions, from all over the country were located in FELDA of
Lurah Bilut. The programme was then expanded to the whole country following its success. After 50 years of
operation, there are now 317 settlements, dwelt by 112,653 families. FELDA agricultural migration programme
is the only well-planned and most successful in the world. Currently, in average, participants of settlement enjoy
higher standard of living than before, whereas their children benefit from highest education standard.
Paper Title: Modeling and Simulation of Two-Dimensional Position Sensitive Detector (PSD) Sensor
124. Abstract: This paper presents Modeling and Simulation of Two-Dimensional Position Sensitive Detector
(PSD) using MATLAB. PSD is an Optical Position Sensor (OPS) that can measure a position of a radiation spot
in one or two-dimensions on a sensor surface. Unlike discrete elements such as Charge-Coupled Device (CCD), 744-753
it provides continuous position data, features high position resolution and high-speed response which give this
paper its importance. The sensor used consists of two-dimensional array of photodiodes. The sensor has four
output photocurrents that change according to the position of incident radiation on the surface. The work is
divided into three parts of Modeling and Simulation; the first part is a single photodiode, Second part is one-
dimensional array of photodiodes and the third one is two-dimensional array of photodiodes. The tool used to do
the simulation is MATLAB software because it is professional and accurate tool, it has photodiode element and
it is possible to control the beam of incident light. This research can be useful for Acquisition; Pointing and
Tracking (APT) systems where this sensor will give the necessary data to do tracking operation. Proteus
software was also been used as a secondary tool.
Keyword : effective training, monitoring of the educational process, quality of education, predictions, an
indicator, algorithmic model, ratio of interrelations, ratio of impact.
References:
1. L. N. Khilchenko et al, Monitoring of the higher professional education’s quality: issues and prospects. Modern Research of Social
Problems. (2015) №9 (53), pp. 757-770.
2. R. Sh. Ahliddonov, The art of school management. Monograph. Tashkent: Fan, (2006) Page 303.
3. Sh. E Kurbonov, E. A. Seytkhalilov, Control the quality of education. Tashkent: Turon-Iqbol, (2006) Page 592.
4. A. D. Askarov, Enhancement distance learning professional development system of public education personnel. Abstract of the
dissertation of doctor of philosophy (PhD) in pedagogical Sciences. (2017) Page 50.
5. M. V. Alyushin, L. V. Kolobashkina, Monitoring of the current status of students as a means of increasing the effectiveness of
128. educational process. The Education and science journal. (2019) № 21(2), pp.176-197.
6. A. Oduaran, Influence of Students’ Feedback on the Quality of Adult Higher Distance Education Service Delivery. Turkish Online
Journal of Distance Education. (2017) № 18, pp. 160-176. 768-774
7. Yu Chen et al, Testing a Cognitive Control Model of Human Intelligence. Scientific Reports. (2019) № 9:2898.
8. O. Müller at al, Utilizing big data analytics for information systems research: challenges, promises and guidelines. European Journal of
Information Systems. (2016) № 25, pp.289-302.
9. Shahbaz at al, Investigating the adoption of big data analytics in healthcare: the moderating role of resistance to change. Journal Big
Data. (2019) № 6:6, pp. 289-302.
10. Zh. V. Smirnova, Teaching Package Development for Engineering Training Programs. IOP Conf. Series: Materials Science and
Engineering 483 (2019) №01.
11. O. S. Andreeva at al, Comprehensive Diagnosis of Components of Pedagogical Students’ Research Competency. The Education and
science journal. (2019) № 21(1), pp. 37-58.
12. E. Y. Levina еt al, Quality Control Optimization of University Students Training. Asian Social Science. (2015) № 2:11.
13. E. V. Petrova at al, Diagnostic Methodics of Personal Development of University Students in Studying the Humanities. Journal of
Sustainable Development. (2015) № 3:8.
14. Sh. Rama, Professor’s performance for effective teaching (Kosovo case). Procedia - Social and Behavioral Sciences. (2011) № 12, pp.
117-121.
15. M. H. Sagasser at al, How do postgraduate GP trainees regulate their learning and what helps and hinders them? A qualitative study.
BMC Medical Education. (2012) № 12:67.
16. S. U. Zalutskaya at al, A Lecturer and New Quality of Russian Professional Education. Mediterranean Journal of Social Sciences.
(2015) №3:6.
17. N. V. Seregin, The Basics of Monitoring the Process of Musical Pedagogy. Problems of musical science. (2018) № 3, pp. 144-148.
18. P. P. Gusev, Methodical readiness of teachers to create an integrated educational and methodological support of the educational
process. Secondary professional education. (2013) № 3, pp. 22-25.
19. T. M. Litvinova at al, The internal system for quality assessment of education results at a medical university. Electronic Journal of
General Medicine (2018) № 15(4):em70.
20. P. Kislyakov at al, Monitoring of Education Environment according to the Social-Psychological Safety Criterion. Asian Social Science
Archives. (2014) №17:10, pp.285-291.
21. S. V. Khokhlova, Monitoring the quality of school education. The author's abstract dis.kand. ped. sciences. (2003). Page 27.
22. E. Yu. Gorkaeva, Features of teaching and methodological support in college. Young scientist. (2014) №18, pp. 538-539.
23. R. K. Johan at al, Upper Secondary School Teachers’ Digital Competence: Analysed by Demographic, Personal and Professional
Characteristics. Nordic Journal of Digital Literacy. (2016) № 3:11.
Keyword : -Means Clustering, Particle Swarm Optimization, Neural Network, Social Security Organization,
Data Mining
References:
1. H. Hassani, X. Huang, and E. Silva, “Digitalisation and Big Data Mining in Banking”, Big Data and Cognitive Computing, vol.2,
no.18, pp.1-13, 2018.
2. B. Minaie and F. Asghari, “Applying Data Mining to Discover the Rating Model and Behavioural Analysis Bank Customers”,
Proceedings of the Second Conference of Data Mining, Iran, 2008.
3. Office of Law and Regulations of the Social Security Organization Legal Aid, “Complete Set of Social Security Laws and
Regulations”, Jangal Publisher, 2015.
4. E. Khoshnoud, “The Effect of Main Dimension of Job on Organization Commitment of Social Security Staff”, MSc Dissertation in
Management, Islamic Azad University of Sanandaj, 2011(In Persian)
5. A. Farahi, A. Esaei, T. Majidi and M.R. Kangavari, “Using Data Mining to Estimate the Retirement Life of Social Security
Organization Insureds by Creating a Data Warehouse”, Proceedings of 5th International Conference of Information and Communication
Technology Management, 2008.
6. D., Olson, D., Delen, and Y., Meng, “Comparative Analysis of Data Mining Methods for Bankruptcy Prediction”, Decision Support
Systems, vol. 52, pp.464-473, 2012.
7. C.W., Cheng, S.S., Leu, Y.M., Cheng and T.C., Wu, “Applying Data Mining Techniques to Explore Factors Contributing to
Occupational
8. Injuries in Taiwan's Construction Industry”, Accident Analysis and Prevention, vol.48, pp.214-222, 2012.
9. W., Boulila, I.R., Farah, K.S., Ettabaa, and B., Solaiman, “A Data Mining Based Approach to Predict Spatiotemporal Changes in
Satellite Images”, International Journal of Applied Earth Observation and Geo-information, vol. 13, pp. 83-92, 2011.
10. K., Dejaeger, F.G., Goethals, A., Giangreco, and L., Mola, “Gaining Insight into Student Satisfaction using Comprehensible Data
Mining Techniques”, European Journal of Operational Research, vol.218, pp. 548-562, 2012.
11. M.H.A., Hijazi, F., Coenen, and Y., Zheng, “Data Mining Techniques for the Screening of Age-Related Macular Degeneration”,
Knowledge-Based Systems, vol.29, pp. 83-92, 2012.
12. D.C., Yen, Y.H., Lu, and C.F., Tsai, “Determinants of Intangible Assets Value: The Data Mining Approach”, Knowledge-Based
Systems, vol.31, pp.67-77, 2012.
13. A., Tavakoli, S., Mortazavi, Z., Hosseini, and M., Kahani, “Applying Data Mining Process to Predict Customer Turnover Pattern s in
Insurance”, Journal of Business Management Perspective, vol.4, no. 37, pp.41-55, 2010.
14. H. DanieFard, S.M. Alvani, and A. Azar, “Quantitative Research in Management: A Comprehensive Approach”, Saffar Publisher,
2009.
15. J., Kennedy, and R.C., Eberhart, “Particle Swarms Optimization”, Proceedings of the IEEE International Conference on Neural
Networks, PP.1942-1948,1995.
16. C., Bishop, “Neural Networks for Pattern Recognition”, Oxford University Press, 1995.
17. U.M., Fayad, G., Piatetsky-Shapiro, P., Smyth, and R., Uthurusamy, “Advances in Knowledge Discovery and Data Mining”, MIT
Press, 1996.
18. A., Amidi, “Sampling Methods1”, 5th Edition, PayamNoor University Press, 2002.
19. M., Kargari, and M., Sepehri, “Stores Clustering using a Data Mining Approach for Distributing Automotive Spare -parts to Reduce
Transportation Costs”, Expert Systems with Applications, vol.39, pp.474-478, 2012.
20. [19] M.J.A., Berry, and G.S., Linoff, “Data Mining Techniques for Marketing, Sales and Customer Relationship Management”, 2nd
Edition, Willey, 2004.
21. E., Hadavandi, H., Shavandi, A., Ghanbari, and S., Abbasian-Naghneh, “Developing a Hybrid Artificial Intelligence Model for
Outpatient Visits Forecasting in Hospitals”, Applied Soft Computing, vol.12, pp. 700-711, 2012.
22. K., Kumar, and G.S.M., Thakur, “Advanced Applications of Neural Networks and Artificial Intelligence: A Review”, Internationa l
Journal of Information Technology and Computer Science, vol.6, pp. 57-68, 2012.
23. S., Nabavi-Kerizi, M., Abadi, and E., Kabir, “A PSO-based Weighting Method for Linear Combination of Neural Networks”,
Computers and Electrical Engineering, vol.36, pp. 886-894, 2010.
24. J., Shahrabi, A., ZolghadrShojaei, “Advanced Data Mining: Concepts and Algorithms”, 2nd Edition, Iranian Students Booking Agency,
Academic Jihad Press, 2011.
25. J., Behbodian, “Statistics and Preliminary Probability”, 25 th Edition, ImamReza University Press, 2005(In Persian).
Paper Title: K- Means Based Probabilistic Neural Network (KPNN) For Designing Physical Machine – Classifier
Abstract: Cloud Computing necessitates virtual machines that can deploy users to a machine in a sub-
optimal fashion for effective and maximum utilization of resources conserving overall energy within the
specified duration. PNN is an effective probabilistic classifier which has been applied for a wide variety of
computer application problems. However, for big data applications, we need either pre-processing algorithms for
efficient classification with lower computing time or Mathematical tracking operators to speed up a parametric
approach. This paper focuses to combine the traditional K means algorithm and a PNN to process the data
obtained from Google cluster to classify them into pre-specified groups so as to implement PM classifier design
to monitor the Cloud usage pattern. It is found after validation of KPNN with different data sets that KPNN
works better than PNN in terms of accuracy even when the number of classes increases and turns out to be a
computationally attractive tool.
Paper Title: Control System for Smart Traffic Signal using LTE, GPS, RFID for Ambulance
Abstract: Nowadays, Ambulance services are the most affected by the Traffic Jams. This can threaten
the health state of the person within the ambulance. It can be resolved by using the Control System for Smart
Traffic Signal using LTE, GPS, RFID for Ambulance. This system creates a connection between the ambulance
and the traffic signal. So, as to assist the ambulance for a stop free travel to the destination. This system uses
Radio Frequency Identification (RFID), Global Positioning System (GPS), Long Term Evolution (LTE) as its
key components to implement the control system. The GPS helps in live tracking the ambulance movement in
order to change the traffic signal only when the ambulance is nearby the traffic signal. Once the GPS confirms
the ambulance is nearing a traffic signal, the cloud instructs the change in traffic signal’s mode and the
ambulance’s lane is granted green signal. Once, the ambulance crosses the signal, it reverts back to its original
flow. The RFID tag assists in confirming the passage of ambulance from the traffic signal. Also, this method
warns the upcoming signal and changes their signal time based on factors such as ambulance speed, distance and
expected arrival time which helps in clearing out the traffic in advance. This is continued until the ambulance
reaches its destination hospital. All these processes happen without any human intervention.
Keyword : Sierpinski carpet, fractal antenna, wind profiler Radar, HFSS, UHF.
References:
1. D. H. Werner and S. Ganguly, “An overview of fractal antenna engineering research,” IEEE Ant. Propagat. Mag., vol. 45, no. 1, pp. 38-
57, February 2003
2. L.K.Balaji Vignesh and .K.Kavitha, “A Survey on Fractal Antenna Design” International Journal of Pure and Applied Mathematics ,
Volume 120 No. 6 ,10941-10959, 2018
3. Vaisala, Inc. Wind Profiling, The History, Principles, and Applications, 2004.
4. B. Lindseth, William O.J. Brown, J. R. Jordan, D. Law, T. Hock, S. A. Cohn and Z. Popovic, "A New Portable 449 MHz Spaced
Antenna Wind Profiler Radar." IEEE Trans. on Geoscience and Remote Sensing, vol. 50, no. 9, pp. 3544-3553, September 2012.
5. A. Chatterjee, T.Mondal, Deven G.Patanvariya, Ravi Prasad K. Jagannath “, Fractal-based design and fabrication of low-sidelobe
antenna array” , International Journal of Electronics and Communications, vol. 83,pp. 549-557, January 2018.
6. B.T.P.Madhav, T.Anilkumar, S.K.Kotamraju “Transparent and Conformal Wheel-shaped Fractal Antenna forVehicular
Communication Applications” International Journal of Electronics and Communications, 2018
doi: https://doi.org/10.1016/j.aeue.2018.04.028
7. J. Anguera” Metallized foams for antenna design: application to fractal-shaped sierpinski-carpet monopole” Progress In
Electromagnetics Research, PIER 104, 239-251, 2010
8. D.H. Werner, R.L. Haupt, and P.L. Werner, “Fractal antenna engineering: The theory and design of fractal antenna arrays,” IEEE Ant.
Propagat. Mag., vol. 41, no. 5, pp. 37-59, 1999.
9. S. Ullah, F.Faisal, A.Ahmad, U. Ali, F.A.Tahir and J. A. Flint “Design and Analysis of Novel Triband flower- shaped planer antenna
for GPS and WiMAX applications” Journal of Electromagnetic waves and applications, vol. 31, no.9, pp. 927-940, April 2017.
10. Mohd G. Siddiqui, Abhishek K.Saroj, Devesh, and Jamshed A.Ansari “Multi-Band Fractaled Triangular Microstrip Antenna for
Wireless Applications” Progress In Electromagnetics Research M, Vol.65, pp. 51-60, January 2018.
11. Arpan Desai, Trushit Upadhyaya, Riki Patel, Sagar Bhatt, and Parthesh Mankodi “Wideband High Gain Fractal Antenna for Wireless
Applications” Progress In Electromagnetics Research Letters , Vol. 74, pp. 125-130, 2018.
12. Balanis C. A. Antenna Theory: Analysis and Design, John Wiley & Sons, (2005)
13. Ramesh G, Prakash B, Inder B, and Ittipiboon A. Microstrip antenna design handbook, Artech House, (2001).
Paper Title: Triangular UWB Antenna with Reduced Ground Plane Effect
Abstract: This article gives brief view of UWB microstrip antenna characteristic without a slot and with a
triangular slot on the patch of the MSA. Nowadays UWB antenna is a must for wireless communication with the
narrow pulses in the series of nanoseconds, for the application of ultra- wideband in frequency domain for very
short distance and minimum power densities. The research in this field has become more sought-after and
therefore the demand on UWB microstrip antenna is rising rapidly. The currents along the verge of the slot
initiates additional resonance, it concords with the main patch resonance, which result in the production of
overall frequency response characteristics, ultimately leads to wideband. Thus a crisp novel ultra-wideband
configuration with and without a triangular slot have been proposed. And the radiation is in the broadside of
antenna with small variation along the entire bandwidth. Thus improving the robustness of the MSA and cost
reduction. Due to the potential of UWB antennas,they are significant to improve the performance of wireless
communication systems. The MSA (microstrip antenna) is designed with FR-4 substrate. There is increase in
bandwidth due to the introduction of triangular slot in the patch and the variation in the antenna parameters are
briefed below. This document can be used as guide to design small MSA for mobile communication.
Keyword : Small fibers, big fibers, geopolymer, compressive, split tensile, flexural strength.
References:
1. Davidovits, J (1988), “Geopolymer chemistry and properties” Proceedings of the First European Conference on Soft Mineralogy,
Compiegne, France, pp. 25-48.
2. H. R. Hamilton (2016), “Comparison of Labortory and Field environmental conditioning on FRP concrete bond durability”,
3. Construction and Building Materials, Vol. 122, 30 Sep. 2016, pp. 525-536.
4. Hadigheh, S A, Gravina, R J & Smith, S T (2017), “Effect of acid attack on FRP-to-concrete bonded interfaces”, Construction and 848-852
Building Materials, vol. 152, pp. 285-303.
5. Shafqat Ali, Saeed Mirza, M & Larry Lessard (2017), “Durability assessment of hybrid FRP composite shell and its application to
prestressed concrete girders”, Construction and Building Materials, vol. 150, pp. 114-122.
6. Yue Li, Xiongfei Liu & Miaoke Wu (2017), “Mechanical properties of FRP- strengthened concrete at elevated temperature”,
Construction and Building Materials, vol. 134, pp. 424-432.
7. Alam, MS & Hussein, A (2017), “Relationship between the shear capacityand the flexural cracking load of FRP reinforced concrete
beams” , Construction and Building Materials, vol. 154, pp. 819-828
8. Kim Hung Mo, Johnson Alengaram, U & Mohd Zamin Jumaat 2016, “Structural performance of reinforced geopolymer concrete
members: A review, Construction and Building Materials”, vol. 120, pp. 251-264.
9. Albitar, M, Mohamed Ali, MS & Visintin, P 2017, “Experimental study on fly ash and lead smelter slag-based Geopolymer
Concrete columns”, Construction and Building Materials, vol. 141, pp. 104-112.
10. Thangaraj Sathanandam, Paul Awoyera, O, Venkudusamy Vijayan,& Karupannan Sathishkumar 2017, “Low carbon building:
Experimental insight on the use of fly ash and glass fibre for making geopolymer concrete”, Sustainable Environme nt Research,
vol. 27, no. 3, pp. 146-153.
11. Kolli Ramujee & PothaRaju, M 2017, “Mechanical properties of geopolymer concrete composites, Materials Today:
Proceedings”, vol. 4, no. 2, pp. 2937-2945.
12. B.Vijaya Rangan, (2008) “Mix design and production of flyash based geopolymer concrete, the Indian concrete journal”, Vol 82,pp 7-15
Paper Title: Robotic Model for Unmanned Crack and Corrosion Inspection
146.
Abstract: After prolonged usage of materials, the formation of cracks and corrosion initiates due to stress,
loading condition, the environment of operation, etc. and this affects the structural integrity of structures. 862-867
Periodic inspection of structures is usually planned, especially in industries where the impact of failure could be
devastating, such as oil and gas pipelines, storage tanks, vessels, and airplanes, etc. which are just a few amongst
others. This inspection is often aimed at detecting cracks and corrosion of internal and external components
using several forms of non-destructive testing mechanism usually performed by a specialist at a high rate.
To reduce the cost of inspection as well as downtime due to inspections and maintenance, deployments of
mobile robots with fault tracking and identification purpose are steadily increasing. This paper, therefore, details
the implementation of an image processing technique using MATLAB to identify defects of structural elements.
Paper Title: An Authentication Scheme for an IoT Environment using Advanced Multiple Encryption System
Abstract: Internet of Things (IoT) has become one of the most important fields of research as it plays a vital
role in performing an assigned task with various smart devices. These connected devices work together to
achieve a common goal. Numerous researchers have been working in various sectors of IoT for obtaining a
betterment in the entire function of an IoT environment. Securing the data being transmitted or stored in these
smart devices in one of the major fields of research. Some of the security challenges faced in an IoT
environment are in the areas of user authentication, user privacy, access control, information confidentiality,
147. trust, mobile security and policy enforcement. To overcome all these challenges. In this paper, we have proposed
a system called AMES (Advanced Multiple Encryption System) which also secures the overall communication
868-874
of the network. The paper briefs an overview of an IoT environment, consisting of some hackers where the user
connection with the controller is blocked without the presence of integrity and confidentiality. The paper also
discusses the various security benefits of RSA and SHA. The proposed AMES system is based on Hardy Wall
Algorithm and MQTT protocol. The differentiation of the proposed protocol and HTTP protocol is stated clearly
The experimental results are obtained for the proposed authentication scheme using NS3 simulator by showing
the comparison between existing hybrid security system with our proposed authentication system. The results
also state that the designed AMES authentication system using MQTT protocol can minimize the level of
security threats and other complications in transmission of the data in IoT environment.
Keyword : Advanced multiple encryption System, MQTT, Internet of Things, Authentication, Security
References:
1. Alcaraz, C. (2019). Security and Privacy Trends in the Industrial Internet of Things. Springer.
2. Zhang, J., Rajendran, S., Sun, Z., Woods, R., & Hanzo, L. (2019). Physical Layer Security for the Internet of Things: Authentication
and Key Generation. IEEE Wireless Communications.
3. Jan, M. A., Khan, F., Alam, M., & Usman, M. (2019). A payload-based mutual authentication scheme for Internet of Things. Future
Generation Computer Systems, 92, 1028-1039.
4. Rivera, D., García, A., Martín-Ruiz, M. L., Alarcos, B., Velasco, J. R., & Oliva, A. G. (2019). Secure Communications and Protected
Data for a Internet of Things Smart Toy Platform. IEEE Internet of Things Journal, 6(2), 3785-3795.
5. Malik, M., Dutta, M., & Granjal, J. (2019). A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the
Internet of Things. IEEE Access, 7, 27443-27464.
6. Zeadally, S., Das, A. K., & Sklavos, N. (2019). Cryptographic Technologies and Protocol Standards for Internet of Things. Internet of
Things, 100075.
7. Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. (2019). Perception layer security in Internet of Things. Future Generation
Computer Systems, 100, 144-164.
8. Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2019). Securing Data in Internet of Things (IoT) Using
Cryptography and Steganography Techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
9. Liu, J., Ren, A., Zhang, L., Sun, R., Du, X., & Guizani, M. (2019). A Novel Secure Authentication Scheme for Heterogeneous In ternet
of Thing. arXiv preprint arXiv:1902.03562.
10. Ferrag, M. A., Maglaras, L., & Janicke, H. (2019). Blockchain and its role in the internet of things. In Strategic Innovative Marketing
and Tourism (pp. 1029-1038). Springer, Cham.
11. M. Sundarrajan, & A.E. Narayanan (2019). A Hardy Wall Encrypted System for Securing Iot Device Id
International Journal of Recent Technology and Engineering (IJRTE), Vol 8, 586-590.
12. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography
encryption for medical image security in Internet of Things. Neural computing and applications, 1-15.
13. Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Info rmation
Security and Applications, 38, 8-27.
14. Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities.
15. Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital
Communications and Networks, 4(2), 118-137.
16. Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum world. IEEE Communications
Magazine, 55(2), 116-120.
17. Trappe, W., Howard, R., & Moore, R. S. (2015). Low-energy security: Limits and opportunities in the internet of things. IEEE Security
& Privacy, 13(1), 14-21.
18. He, D., & Zeadally, S. (2014). An analysis of RFID authentication schemes for internet of things in healthcare environment using
elliptic curve cryptography. IEEE internet of things journal, 2(1), 72-83.
19. Lee, J. Y., Lin, W. C., & Huang, Y. H. (2014, May). A lightweight authentication protocol for internet of things. In 2014 International
Symposium on Next-Generation Electronics (ISNE) (pp. 1-2). IEEE.
20. Li, F., & Xiong, P. (2013). Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE
Sensors Journal, 13(10), 3677-3684.
21. Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46(4), 46-53.
22. Vučinić, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). OSCAR: Object security architecture for the
Internet of Things. Ad Hoc Networks, 32, 3-16.
23. Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., & Guizani, M. (2017). The rise of
ransomware and emerging security challenges in the Internet of Things. Computer Networks, 129, 444-458.
24. Sahraoui, S., & Bilami, A. (2015). Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things.
Computer Networks, 91, 26-45.
25. Kim, H., Wasicek, A., Mehne, B., & Lee, E. A. (2016, August). A secure network architecture for the internet of things based on local
authorization entities. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 114-122).
IEEE.
26. Triantafyllou, A., Sarigiannidis, P., & Lagkas, T. D. (2018). Network protocols, schemes, and mechanisms for internet of thin gs (iot):
Features, open challenges, and trends. Wireless communications and mobile computing, 2018.
27. Hernandez-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., & Ladid, L. (2015). Toward a lightweight authentication and
authorization framework for smart objects. IEEE Journal on Selected Areas in Communications, 33(4), 690-702.
28. Chaimae, E., & Rahal, R. (2016, May). ECC certificate for authentication in cloud-based RFID. In 2016 2nd International Conference
on Cloud Computing Technologies and Applications (CloudTech) (pp. 200-203). IEEE.
29. Ning, H., Liu, H., & Yang, L. T. (2014). Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE
Transactions on Parallel and Distributed Systems, 26(3), 657-667.
30. Liu, Z., Huang, X., Hu, Z., Khan, M. K., Seo, H., & Zhou, L. (2016). On emerging family of elliptic curves to secure internet of things:
ECC comes of age. IEEE Transactions on Dependable and Secure Computing, 14(3), 237-248.
31. Kawamoto, Y., Nishiyama, H., Kato, N., Shimizu, Y., Takahara, A., & Jiang, T. (2015). Effectively collecting data for the location-
based authentication in Internet of Things. IEEE Systems Journal, 11(3), 1403-1411.
Paper Title: Utilizing Of Wastewater and Biomass Generated In Jordanian Sewage Treatment Plants
Abstract: This paper aims to produce and transfer data to a decision-maker so as to help within the creation
of correct property sewer water biosolids management and utilization in Jordan. Jordan has around 31
wastewater treatment plants with annual total capacity of 350 Mm3. The deficiency of water demand in the
country could be reduced by treating this quantity of wastewater. Treatment will produce a total amount of
sludge waste around 20000 tons annually. Wastewater sludge could be utilized in different usages such as;
biogas production (methane gas), organic fertilizers, additives in material construction and other applications.
Considering these amounts of reclaimed water and biomass produced, they require an extremely high budget to
operate different equipment to treat wastewater, utilize the sludge and finally to dispose of residual in landfills.
This study will provide and help to adopt best practice technologies (BPT) and related techniques to generate
energy from sludge in different wastewater treatment plants efficiently and economically while taking
environmental impacts into consideration. It is concluded that the high percentage of the energy can be produced
and reused, while the transportation cost and the disposal cost of the unwanted sludge will be reduced. A total
amount of reclaimed water of 240-260 Mm3 may be achieved by 2025, while daily electricity of 57128804 kWh
will be generated from wastewater sludge. Wastewater utilization and management will reduce the
environmental pollutions as well as providing economic value for the waste material as well. The results of
suggested techniques and methodology for utilizing wastewater and sludge in this study will save about
149. 10,683,086 JOD /Year ( 15 million $/Year).
References:
1. Abdel-Khaleq, R., (2007). "Key challenges to ensure environmental security and sustainable development in the OSCE area". Land
degradation, soil contamination, and water management. Prague, 21–23 May 2007.
2. Ahmed Ali Ulimat., (2012) “Wastewater Production, Treatment, and Use in Jordan”. Ministry of Water & Irrigation Water Authority of
Jordan”. Second Regional Workshop ‘Safe Use of Wastewater in Agriculture’, 16-18 May 2012, New Delhi, India.
3. Diane Huybrechts., (2016). ”Best Available Techniques For The Treatment, Use, And Disposal Of Waste Water Treatment Sludge".
diane.huybrechts@vito.be.
4. Fayez A. Abdulla, Amani Alfarra, Hani Abu Qdais, and Ben Sonneveld., (2016). “Evaluation of Wastewater Treatment Plants in Jordan
and Suitability for Reuse". Academia Journal of Environmental Science 4(7): 111-117, July 2016, DOI: 10.15413/ajes.2016.0305, ISSN:
2315-778X, ©2016 Academia Publishing.
5. Gabriela Neata, Razvan Teodorescu, Liviu Dinca, Adrian Basaraba., (2015). “Physico-chemical and microbiological composition of
composts from Bucharest municipal waste “. International Conference, Agriculture for Life, Life for Agriculture, Elsevier Applied
Science- Agriculture and Agricultural Science Procedia 6 ( 2015 ) 486 – 491.
6. Lettinga, G., L.W. Hulshoff-Pol, and G. Zeeman., (1999). “Biological Wastewater Treatment; Part I Anaerobic Wastewater Treatment”.
(Lecture Notes). Wageningen University and Research: Wageningen, The Netherlands.
7. Maha Alqam, Ahmad Jamrah, and Haya Daghlas., (2011). “Utilization of Cement Incorporated with Water Treatment Sludge”. Jordan
Journal of Civil Engineering, Volume 5, No. 2, 2011© 2011 JUST. All Rights Reserved.
8. Metcalf Eddy (1991). Wastewater treatment disposal and reuse 3rd. Ed., McGraw Hill.
9. Ministry of Water and Irrigation, (2016). “National Water Strategy in Jordan 2016-2025”. Ministry of Water and Irrigation, United
Kingdom of Jordan, 2016.
10. Monteiro, S., Vieira, C., Ribeiro, M. and Silva, F., (2006). “Red Ceramic Industrial Products Incorporated with Oily Wastes”.
Construction and Building Materials, 21: 2007-2011.
11. Mufeed I. Batarseh., (2011). “Polynuclear Aromatic Hydrocarbons (PAH) and Heavy Metals in Dry andWet Sludge from As-Samra
Wastewater Treatment Plant, Jordan". Prince Faisal Center for the Dead Sea, Environmental and Energy Research, Department of
Chemistry, Faculty of Science, Mutah University, Karak, Jordan. Soil and Sediment Contamination, 20:535–549, 2011, Taylor & Francis
Group, LLC.
12. Nathalie Bachmann., (2015)” Sustainable biogas production in municipal wastewater treatment plants”. Technical Brochure, Copy right
© 2015 IEA Bioenergy. First electronic edition 2015 - British Library. ISBN 978-1-910154-22-9.
13. Parul Kumar., (2014). “Sludge and Solid Wastes: Treatment and Disposal”. http://www.biologydiscussion.com/waste-
management/solid-wastes treatment. 11021.
14. Qasim, S., Motley, E. and Zhu, G., (2000). Water Works Engineering, Prentice Hall, India.
15. Salam B.A., (1985). “The contribution of the oil palm by-products towards the national energy policy – an economist point of view”. In:
Proceedings of the National Symposium on Oil Palm by- Products for Agro-based Industries, Kuala Lumpur, Malaysia. Bangi: Palm Oil
Research Institute of Malaysia. pp 133-145.
16. Schomaker, A., (2001). “Extra vergistingsstap van zuiveringsslib veelbelovend voor grotere rioolwaterzuiveringen”. 2001, Royal
Haskoning.
17. Townsend, T., Jang, Y., Jain, P. and Tolaymat, T., (2001). “Characterization of Drinking Water Sludge for Beneficial Reuse and
Disposal”. Report Published by State University System of Florida and Florida Center for Solid and Hazardous Waste.
18. T.Z.D. de Mes, A.J.M. Stams, J.H. Reith and G. Zeeman., (2003). “ Methane production by anaerobic digestion of wastewater and solid
wastes “. MES–Chapter 4–pages58-102.
19. Valentin Feodorov., (2016). “Modern technologies of treatment and stabilization for sewage sludge from water treatment plants “. 5th
international conference “Agriculture for Life, Life for Agriculture “. Elsevier Applied Science - Agriculture and Agricultural Science
Procedia 10 (2016) 417 – 430.
20. William W. Nazaroff and Lisa Alvarez-Cohen, (2001). “Environmental engineering science”. New York: John Wiley & Sons, Inc.,
[2001].
21. Yasser K. Nazzal, Mohammed Mansour, Mohammad Al Najjar, and Peter McCormick., (2000). “Wastewater Reuse Law and Standards
in the Kingdom Of Jordan”. The Ministry Of Water and Irrigation, Amman, Jordan, March 2000.
22. Youichi Koga, Hiroshi Oonuki, Takeshi Amari, Yuuki Endo, Kazuaki Kakurata and Kimitoshi Ose. (2007). “Biomass Solid Fuel
Production from Sewage Sludge with Pyrolysis and Co-Firing in Coal Power Plant”. Mitsubishi Heavy Industries, Ltd. Technical
Review Vol. 44 No. 2 (Jul. 2007).
23. Yucel, D., Yucel, C., Aksakal, E., Barik, K., Khosa, M., Aziz, I., and Islam, K., (2015) “Impacts of Biosolids Application on Soil
Quality under Alternate Year No-Till Corn-Soybean Rotation”. Water, Air & Soil Pollut., 226, 1-11.
Paper Title: A Robust Algorithm for Real Time Tracking With Optical Flow
Abstract: Object tracking is a troublesome undertaking and significant extent in data processor perception
and image handling community. Some of the applications are protection surveillance, traffic monitoring on
roads, offense detection and medical imaging. In this paper a recent technique for tracking of moving object is
intended. Optical flow information authorizes us to know the displacement and speed of objects personate in a
scene. Apply optical flow to the image gives flow vectors of the points to distinguishing the moving aspects.
Optical flow is accomplished by Lucas canade algorithm. This algorithm is superior to other algorithms. The
outcomes reveals that the intend algorithm is efficient and accurate object tracking method. This paper depicts a
smoothing algorithm to track the moving object of both single and multiple objects in real time. The main issue
of high computational time is greatly reduced in this proposed work.
Keyword : Computer Vision, Lucas Canade Algorithm, Object Tracking Optical Flow Technique.
References:
1. Amandeep, Er. Monica Goyal, a Review: "Moving Object Detection Techniques", a Monthly Journal of Computer Science and
Information Technology IJCSMC, vol. 4, Issue. 9, September 2015,pp. .345 – 349.
2. N. Prabhakar, V. Vaithiyanathan, Akshaya Prakash Sharma, Anurag Singh and Pulkit Singhal, "Object Tracking Using Frame
Differencing and Template Matching," Research Journal of Applied Sciences, Engineering and Technology vol. 4 Issue. 24, 2012,pp.
5497-5501.
150. 3. Massimo Piccardi, “Background subtraction techniques: a review,” in Proceedings of the IEEE International Conference on Systems,
Man and Cybernetics (SMC ’04), October 2004,pp. 3099–3104.
4. B.K.P.Horn and B. G. Schunck, ”Determining optical flow”,.Artificial Intelligence, vol. 17, Issue. 1-3, 1981,pp. 185-203 .
887-892
5. Bors A G,Pitas I “Prediction and tracking of moving objects in image sequences” IEEE Transactions on Image Processing, vol.9,Issue.
8, 2000,pp. 1441-1445.
6. Aslani, Sepehr, and Homayoun Mahdavi-Nasab. ”Optical flow based moving object detection and tracking for traffic surveillance”
International Journal of Electrical, Electronics, Communication, Energy Science and Engineering vol.7, Issue.9, 2013, pp. 789-793.
7. Muhammad Kamal Hossen and Sabrina Hoque Tuli," A Surveillance System Based on Motion Detection and Motion Estimation
using Optical Flow"5th International Conference on Informatics, Electronics and Vision (ICIEV) on IEEE ,2016.
8. Jaiganes Kanawathi, Siti Salasiah Mokri, Norazlin Ibrahim,Aini Hussain, Mohd Marzuki Mustafa." Motion Detection Using Horn
Schunck Algorithm and Implementation" International Conference on Electrical Engineering and Informatics on IEEE ,2009.
9. Kale, Kiran, Sushant Pawar, and Pravin Dhulekar. ”Moving object tracking using optical flow and motion vector estimation.”
Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on
IEEE, 2015.
10. J. L. Barron, D.J. Fleetand S.S. Beauchemin, “Performance of Optical Flow Techniques” IJCV 12:1, 1994,pp 43-77.
11. M.Bala Krishna, G.V.S.Praneeth, Ch.Soundarya, P.Himabindhu," Segmentation of Vehicles Based on Motion Estimation"International
Journal of Creative Research Thoughts(IJCRT),2018,pp 461-468.
12. Neha S. Sakure, Rushikesh T. Bankar, Suresh S. Salankar" Comparative Analysis of Face Tracking" International Journal of
Advanced Research in Electronics and Communication Engineering (IJARECE),vol5,issue 3,march 2016.
13. Andrey A. Mukhtarov, Sergey V. Porshnev, Vasiliy V. Zyuzin, Anastasia A. Labutina, and Anastasia O. Bobkova ," The Usage of
Optical Flow Algorithm to the Problem of Recovery Contour of the Left Ventricle of the Human Heart on the Ultrasound Image Data",
on IEEE ,march 2017.
14. C.Karthika Pragadeeswari and G. Yamuna “Improved Optical Flow for Better Object Tracking” in the proceedings of the International
Conference on Advanced Concepts in Computational Engineering and Science (ICACCES 19), Bharathiyar College of Engineering
and Technology, Karaikal, 15th March 2019.
Available At Https://En.Wikipedia.Org/Wiki/Assamese_Language.
2. “Nefamese,” 9th September 2019, Accessed On 3 rd October 2019 Available At Https://En.Wikipedia.Org/Wiki/Nefamese.
3. “Nagamese Creole,” 2 nd September 2019, Accessed On 3 rd October 2019 Available At
152. Https://En.Wikipedia.Org/Wiki/Nagamese_Creole.
4. “Assamese Alphabet,” 24 th September 2019, Accessed On 3 rd October 2019 Available At
Https://En.Wikipedia.Org/Wiki/Assamese_Alphabet. 900-905
5. J. Kalita, D. Talukdar, M. Bora, And M. Barua, “Assam Portal: Assamese Alphabet,” 1997, Accessed On 3 rd October Available At
Https://Assam.Org/Node/2330.
6. M. P. Bhuyan And S.K. Sarma, “An N-Gram Based Model For Predicting Of Word-Formation In Assamese Language,” Journal Of
Information And Optimization Sciences, 40:2, 427-440, 2019, DOI: 10.1080/02522667.2019.1580883.
7. “Assamese Numbers (অসমীয়া সংখ্য়া),” Accessed On 4th October 2019 Available At
Https://Www.Omniglot.Com/Language/Numbers/Assamese.Htm
8. P. Sarma, M. Mitra, M.P. Bhuyan, V. Deka, S. Sarmah, And S.K. Sarma, “Automatic Vowel Recognition From Assamese Spoken
Words,” International Journal Of Innovative Technology And Exploring Engineering, Vol. 8, Issue-10, 2019, Pp. 2297-2304.
9. K. Kalaivani, R. Praveena, V. Anjalipriya, And R. Srimeena, “REAL TIME IMPLEMENTATION OF IMAGE RECOGNITION
AND TEXT TO SPEECH CONVERSION,”International Journal Of Advanced Engineering Research And Technology, Vol. 2, Issue 6,
2014, Pp. 171-175.
10. B.B. Chaudhuri And U. Pal, “A COMPLETE PRINTED BANGLA OCR SYSTEM,” Pattern Recognition, Vol. 31, No. 5, 1998, Pp.
531-549.
11. Md. A. Hasnat, M. Rahman Chowdhury, M. Khan, “An Open Source Tesseract Based Optical Character Recognizer For Bangla Script,”
10th International Conference On Document Analysis And Recognition, 2009, Pp. 671-675.
12. S. Vijayarani And A. Sakila, “TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCU MENT IMAGES,”
International Journal On Cybernetics & Informatics, Vol. 4, No. 6, 2015, Pp. 25-35.
13. R.V. Adhvaryu, “OPTICAL CHARACTER RECOGNITION USING TEMPLATE MATCHING (ALPHABETS & NUMBERS),”
International Journal Of Computer Science Engineering And Information Technology Research, Vol. 3, Issue 4, 2013, Pp. 227-232.
14. S. Malakar, P. Ghosh, R. Sarkar, N. Das, S. Basu, And M. Nasipuri, “An Improved Offline Handwritten Character Segmentation
Algorithm For Bangla Script,” Proceedings Of The Fifth Indian International Conference On Artificial Intelligence, 2011, Pp.71-90.
15. M.P. Bhuyan And S.K. Sarma, “A Statistical Model For Automatic Error Detection And Correction Of Assamese Words,” International
Journal Of Recent Technology And Engineering, Vol. 8, Issue 2, 2019, Pp. 6111-6116.
16. M.P. Bhuyan And S.K. Sarma, “A Higher-Order N-Gram Model To Enhance Automatic Word Prediction For Assamese Sentences
Containing Ambiguous Words,” International Journal Of Engineering And Advanced Technology, Vol. 8, Issue 6, 2019, Pp. 29 21-2926.
17. M.P. Bhuyan, R. Purkayastha, S.K. Sarma, S. Sarmah, P. Sarma, And V. Deka, “Information Retrieval In Assamese Using Wordnet &
Assamese Wikipedia,” International Journal Of Scientific & Technology Research, Vol. 8, Issue 9, 2019, Pp. 1887-1891.
Keyword : Advance encrypt algorithm (AES), cipher text key, Diffie_Hellman convention, elliptic curve
cryptographic (ECC), Wireless or remote sensor network (WSN).
References:
1. NejmeddineAlimi, YounesLahbib, Mohsen Machhout And RachedTourkiOn Elliptic Curve Cryptography Implementations And
Evaluation 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing.
2. NajmusSaqib and UmmerIqbal Security in Wireless Sensor Networks using ECC 2016 IEEE International Conference on Advances in
Computer Applications.
3. J. Louw, G. Niezen , T.D. Ramotsoela and A.M. Abu-Mahfouz A Key Distribution Scheme using Elliptic Curve Cryptography in
Wireless Sensor Networks 2016 IEEE.
155. 4. AsmaChaouch, BelgacemBouallegue and OuniBouraoui Software Application for Simulation-Based AES, RSA and Elliptic-Curve
Algorithms 2nd International Conference on Advanced Technologies for Signal and Image Processing 2016.
5. Darrel Hankerson, Scott Vanstone ,AlfredMenezes, Guide To Elliptic Curve Cryptography, ©Springer-Verlag New York, Inc 2004 920-925
6. SudipMisra, Isaac Zhang and Subhas Chandra Misra Guide to wireless sensor networks, ©Springer-Verlag New York, Inc 2009
7. Joan Daemen, Vincent Rijmen, The Design Of Rijndael- Advanced Encryption Standard, ©Springer - Verlag Berlin Heidelberg 2002
8. Ian F. Blake, GadielSeroussi, and Nigel P. Elliptic Curves in Cryptography .Smart London Mathematical Society Lecture Note Se ries
Cambridge University Press, Cambridge, 1999
9. Raghavendra CS, Krishna M, Sivalingam, TaiebZnati. Wireless Sensor Networks ©Springer US 2004
10. On Elliptic Curve Cryptography implementations and evaluation: http://ieeexplore.ieee.org/document/7523058/
11. A key distribution scheme using elliptic curve cryptography in wireless sensor http://ieeexplore.ieee.org/document/7819342/
12. EllipticCurveCryptography: https://en.wikipedia.org/wiki/Elliptic_curve_cryptography
13. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks: https://link.springer.com/chapter/10.1007/11964254_3/
14. EllipticCurveDiffie-Hellman: https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman
15. Results of Asymmetric Performance testing (RSA) https://people.cs.uct.ac.za/~pbrittan/privacy_brittan_petzer/results_shelley.html
16. Elliptic curve cryptography https://people.cs.uct.ac.za/~pbrittan/privacy_brittan_petzer/results_shelley.html
17. Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography: http://doi.ieeecomputersociety.org/
18. A. Kumar and G.P. Hancke, "Energy Efficient Environment Monitoring System Based on the IEEE 802.15.4 Standard for Low Cost
Requirements.," IEEE Sensors Journal, vol. 14, no. 8, pp. 2557-2566
19. Gura,N., Patel,A., Wander,A.S, Eberle,H. and Chang Shantz,S. “Comparing elliptic curve cryptography and RSA on 8 -bit CPUs”.
Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 119–132. Springer ,2004
20. Levis,P., and Gay.D, TinyOS Programming. Cambridge University Press, 2009
21. Adrian Perrig, John Stankovic, David Wagner ,”Security in wireless sensor networks” Communications of the ACM June 2004 vol
47,no. 6, pp53-57.
22. Gura,N., Patel, A., et .al 2004 ” Comparing Elliptic Curve Cryptography and RSA on 8 bit CPU,” Workshop on cryptographic
hardware and embedded systems.
23. Gura,N., Patel,A., Wander,A.S, Eberle,H. and Chang Shantz,S.,2004 “Comparing elliptic curve cryptography and RSA on 8-bit CPUs”.
Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 119–132. Springer.
24. D. S. Kumar, C. Suneetha, and A. Chandrasekhar, “Encryption of data using elliptic curve over finite fields,” arXiv preprint
arXiv:1202.1895, 2012.
Keyword : Wireless sensor network, Artificial Bee Colony, TABU-GA, LEACH, RZLEACH, First node
dead, Packet Delivery Ratio.
References:
1. Bala, V. M., Kumar, M., & Sharma, V. A survey on swarm intelligence techniques.
2. Luo, J., & Hubaux, J. P. (2005, March). Joint mobility and routing for lifetime elongation in wireless sensor networks. In Pr oceedings
IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. (Vol. 3, pp. 1735-1746). IEEE.
3. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless
microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences(pp. 10-pp). IEEE.
4. Liang, W., Luo, J., & Xu, X. (2010, December). Prolonging network lifetime via a controlled mobile sink in wireless sensor ne tworks.
In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-6). IEEE.
5. Liu, B., Brass, P., Dousse, O., Nain, P., & Towsley, D. (2005, May). Mobility improves coverage of sensor networks. In Procee dings of
the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 300-308). ACM.
6. Gu, Y., Ji, Y., Li, J., & Zhao, B. (2012). ESWC: Efficient scheduling for the mobile sink in wireless sensor networks with delay
constraint. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1310-1320.
7. Konstantopoulos, C., Pantziou, G., Gavalas, D., Mpitziopoulos, A., & Mamalis, B. (2011). A rendezvous-based approach enabling
energy-efficient sensory data collection with mobile sinks. IEEE Transactions on parallel and distributed systems, 23(5), 809-817.
8. Mottaghi, S., and Zahabi, M. R., 2015. Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes. AEU-
International Journal of Electronics and Communications, 69(2), 507-514.
9. Liu, W., Lu, K., Wang, J., Xing, G., & Huang, L. (2012). Performance analysis of wireless sensor networks w ith mobile sinks. IEEE
Transactions on Vehicular Technology, 61(6), 2777-2788.
10. Xing, G., Wang, T., Xie, Z., & Jia, W. (2007, December). Rendezvous planning in mobility-assisted wireless sensor networks. In 28th
IEEE International Real-Time Systems Symposium (RTSS 2007) (pp. 311-320). IEEE.
11. Kumar, G. S., Vinu, P. M., & Jacob, K. P. (2008, December). Mobility metric based leach-mobile protocol. In 2008 16th International
conference on advanced computing and communications (pp. 248-253). IEEE.
12. Liu, B., Brass, P., Dousse, O., Nain, P., & Towsley, D. (2005, May). Mobility improves coverage of sensor networks. In Proceedings of
the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 300-308). ACM.
13. Hussain, K., Abdullah, A. H., Awan, K. M., Ahsan, F., & Hussain, A. (2013). Cluster head election schemes for WSN and MANET: a
survey. World Applied Sciences Journal, 23(5), 611-620.
14. Narendran, M., & Prakasam, P. (2017, February). Optimized lowest ID in wireless sensor network using Invasive Wee d Optimization
(IWO)-genetic algorithm (GA). In 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging
Technologies (ICAMMAET) (pp. 1-6). IEEE.
15. Karaboga, D., Okdem, S., and Ozturk, C., 2012. Cluster based wireless sensor network routing using artificial bee colony algorithm.
Wireless Networks, 18(7), 847-860.
16. Zorzi, M., and Rao, R. R.,2003. Geographic random forwarding (GeRaF) for ad hoc and sensor networks: energy and latency
performance. IEEE transactions on Mobile Computing, 2(4), 349-365.
17. El-Basioni, B. M. M., El-Kader, S. M. A., Eissa, H. S., and Zahra, M. M., 2011. An optimized energy-aware routing protocol for
wireless sensor network. Egyptian Informatics Journal, 12(2), 61-72.
18. Misra, S., and Thomasinous, P. D., 2010. A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for
wireless sensor networks. Journal of systems and software, 83(5), 852-860.
19. Karaboga, D., and Ozturk, C., 2011. A novel clustering approach: Artificial Bee Colony (ABC) algorithm. Applied soft computing,
11(1), 652-657
20. Okdem, S., Karaboga, D., and Ozturk, C., 2011, June. An application of wireless sensor network routing based on artificial be e colony
algorithm. In 2011 IEEE Congress of Evolutionary Computation (CEC) (pp. 326-330). IEEE.
21. Karaboga, D., and Akay, B., 2009. A comparative study of artificial bee colony algorithm. Applied mathematics and computation ,
214(1), 108-132.
22. Nayyar, A., & Singh, R. (2015). A comprehensive review of simulation tools for wireless sensor networks (WSNs). Journal of Wireless
Networking and Communications, 5(1), 19-47.
23. Ali, Q. I. (2012). Simulation framework of wireless sensor network (WSN) using matlab/simulink software. In MATLAB-A
Fundamental Tool for Scientific Computing and Engineering Applications-Volume 2. IntechOpen.
24. Kumar, N., Kumar, A., & Chaudhry, D. (2011). A Novel Approach to use Nano-Sensor in WSN Applications. International Journal of
Computer Applications, 975, 8887.
25. Pandey, A., Kumar, N., & Tripathi, R. C. A Framework to Prevent Mobile Sinks Accessing by Unauthorized Nodes in WSN, Special
issue on MANET, IJCA (USA), pp.-13-17, 2010.
26. Kumar, N., & Khan, R. A. (2017). Emergency Information System Architecture for Disaster Management: Metro City Perspective.
International Journal of Advanced Research in Computer Science, 8(5).
27. Kumar N., Agrawal A., Khan R.A. (2018) Smartphone with Solar Charging Mechanism to Issue Alert During Rainfall Disaster. In:
Panda B., Sharma S., Roy N. (eds) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science,
vol 799. Springer, Singapore.
28. Kumar, N., Agrawal, A., & Khan, R. A. (2019). Cost estimation of cellularly deployed IoT-enabled network for flood detection. Iran
Journal of Computer Science, 1-12.
Paper Title: Performance Analysis of Three-Phase DVR with Modified Switching Band Controller
Abstract: This paper deals with the mitigation of voltage related PQ issues by using three phase neutral
clamped VSI topology is used to realize the DVR and the design of DVR for the selection of suitable interface
inductor, DC capacitor storage series resistance and the capacitance. Here three-phase four wire DVR with
modified switching band controller topology is proposed, which overcome the frequent band violation, poor
controllability and heavy filter currents, and compared to three-phase four wire DVR with conventional filter
157. topology. The compensation capability of the proposed topology is analyzed based on simulation studies and
corresponding results are compared with different switching control strategies. The consequent merits and
demerits switching loss in VSI, ripple in compensated load voltages and error between reference injected 934-941
voltages and actual injected voltages in different switching control strategies are discussed.
Keyword : Dynamic Voltage Restorer (DVR), Neutral Clamped VSI,Switching Band Controller, Synchronous
Reference Theory (SRF) and Power Quality (PQ).
References:
1. M. Bollen, “What is power quality?” Electric Power Systems Research, vol.
2. 66, no. 1, pp. 5–14, Jul. 2003
3. T. S. Key, “Diagnosing power quality-related computer problems,” IEEE
4. Transactions on Industry Aplications, vol. IA-15, no. 4, pp. 381–393, Jul.1979.
5. M. H. J. Bollen, Understanding power quality problems: Voltage sags and
6. interruptions. Piscataway, NJ: IEEE Press, 2002.
7. A. Ghosh and A. Joshi, “The concept and operating rinciples of a mini custom power park,” IEEE Trans. Power Del., vol. 19, no. 4,
pp.1766–1774, Oct. 2004.
8. W. Reid, “Power quality issues-standards and guidelines,” IEEE Transactions on Industry Applications, vol. 32, no. 3, pp. 625–632,
May–Jun. 1996.
9. O. Anaya-Lara and E. Acha, “Modeling and analysis of custom power systems by PSCAD/EMTDC,” IEEE Trans. Power Del., vol. 17,
no. 1,pp. 266–272, Jan. 2002.
10. Ray Arnold “Solutions to Power Quality Problems” power engineering Journal, Volume 15; Issue: 2 April 2001, pp: 65-73.
11. John Stones and Alan Collision “Introduction to Power Quality” power engineering journal, Volume 15; Issue 2, April 2001, pp: 58-
64.
12. Hague, M.H.” Compensation of distribution system voltage sag by DVR and D-STATCOM”, IEEE Porto Power Tech Conference,
Volume: 1, 10th-13th Sept. 2001.
13. P. Rodríguez, J. Pou, J. Bergas, J. I. Candela, R. P. Burgos, and D. Boroyevich, “Decoupled double synchronous reference fram e PLL
for power converters control,” IEEE Trans. Power Electron.
14. Kesler,M.,Ozdemir,E.:‘Synchronous-reference-frame based control method for UPQC under unbalanced and distorted load conditions’,
IEEE Trans.Ind. Electron.,2011,5,(9),pp.3967–3975.
15. Sng,E.K.K.,Choi,S.S.,Vilathgamuwa,D.M.:‘Analysis of series compensation and DC-link voltage controls of atransformer less self-
charging dynamic voltage restorer’, IEEE Trans.Power Deliv., 2004, 19,(3),pp.1511–1518.
16. G. de Almeida Carlos, E. dos Santos, C. Jacobina, and J. Mello, “Dynamicvoltage restorer based on three-phase inverters cascaded
through an open-end winding transformer,” IEEETrans.PowerElectron., vol. 31, no. 1,pp. 188–199, Jan. 2016.
17. P. Kanjiya, B. Singh, A. Chandra, and K. Al-Haddad, “SRF theory
18. re-visited to control self-supported Dynamic Voltage Restorer for unbalanced and nonlinear loads,” IEEETrans.Ind.Appl., vol. 49,
no. 5,
19. pp. 2330–2340, Sep./Oct. 2013.
Paper Title: Mitigating the Effects of ESD using ESD Capacitor and TVS Diode
Abstract: Electrostatic discharge (ESD) can extremely damage and affect the operation of the electronic
devices which is mainly due to the discharge of static electricity through the human or an object contact to the
electronic devices. Though ESD protection has been made in many ICs internally, it can only sustain a certain
level of voltage surge. To withstand high voltage surge mainly above 4kV, external ESD protection devices such
as ESD capacitor and TVS (Transient Voltage Suppressor) are used for signal integrity considerations. For
automotive application using 12V battery, a circuit model which has the capability to explain the behaviour of
the ESD protection device for 8kV is proposed. Comparison between simulation by LTspiceXVII and calculated
results are shown and also presents the pros and cons of two different approaches. When comparing ESD
capacitor to TVS diode, the result shows 32.8 percentage reduce in voltage, 1 percentage increase in current and
1.43 percentage reduce in power dissipation. In addition to the theoretically calculated capacitor value, other
capacitors are used and its results were presented
Keyword : About four key words or phrases in alphabetical order, separated by commas.
References:
1. T. Yoshida, "A Study on Transmission Line Modeling Method for s
system-level ESD Stress Simulation", Proc. APEMC2015 SS13–1.2, 2015.
158. 2. N. Kimura, T. Yoshida, "A Study on Response Characteristics Modeling
Method for ESD Protection Device by Vector Network Analyzer", Proc. of APEMC2017 WE-PM-4-2, 2017.
3. Takahiro Yoshida, Manabu Endo, “A study on ESD protection
characteristics difference measurement of TVS diodes by VNA”, IEEE Symposium on Electromagnetic Compatibility, Beijing,
942-946
China, 2017.
4. M. Honda, "A Review of EMI Problem Caused by ESD Phenomena",
13th RCJ Reliability Symposium, pp. 183-186, 2003.
5. J.R.Barnes, “Designing Electronic Systems for ESD”, Conformity
Magazine, Vol. 8, pp. 18-27, Feb. 2003.H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag,
1985, ch. 4.
6. Ram Chundru, “An Evaluation of TVS Devices for ESD Protection”, IEEE International Symposium on Electromagnetic
Compatibility, Long Beach, CA, USA, pp. 62-67, 2011.
7. Che Hao Chuang, “System-Level ESD Protection for Automotive Electronics by Co-Design of TVS and CAN Transceiver Chips”,
IEEE Transactions on Device and Materials Reliability,Volume: 17, Issue: 3,Sept. 2017.
8. IEC/TS 62228 ed1.0 “Integrated circuits - EMC evaluation of CANtransceivers”, 2007.
9. T. Maloney and N. Khurana, "Transmission line pulsing techniques forcircuit modelling of ESD Phenomena", EOS/ESD
ymposiumProceedings (1985), pp. 49.
10. Kleveland.B., Maloney. TJ, Morgan.I.; Madden. L, Lee. T.H, Wong,S.S., "Distributed ESD protection for high-speed integrated
circuits,"Electron Device Letters, IEEE, vol.21, no.8, pp.390-392, Aug. 2000.
11. ‘TVSDevicesandPrinciples’,http://www.littelfuse.com/data/en/Application_Notes/an9768.pdf
12. Ruth Anita Shirley.D and Dr..Sasipriya.S, “Electromagnetic interference and its effect on the printed circuit board”, in Jour of Adv
Research in Dynamical & Control Systems, Vol. 10, 12-Special Issue, 2018.
13. IEC 61000-4-5 Ed.2.0, Electromagnetic Compatibility(EMC)– Part4-5:Testing and Measurement Techniques –SurgeImmunity Test,
2005.
14. IEC 61000-4-2 Ed.2.0, Electromagnetic Compatibility(EMC)– Part4-2:Testing and Measurement Techniques –ESD Immunity Test,
2008.
15. ‘System – level ESD protection guide’, http://www.ti.com/lit/sg/sszb130c/sszb130c.pdf
Authors: Gopireddy Sirisha, Parmar Harshdeepsinh, Konduri Subrahmanya Hemanth Sathiya Narayanan
Keyword : Car Control System, Fuzzy Bayesian Network, Internet-of-Things, Self-localisation and Map
Matching
References:
1. Dada Emmanuel Gbenga, Hamit Isseini Hamed, Adebimpe Adekunle Lateef and Ajibuwa Emmanuel Opeyemi, “Alcohol Detection
of Drunk Drivers with Automatic Car Engine Locking System,” Nova Journal of Engineering and Applied Sciences, Vol. 6 (1), pp. 1-
15, September 2017.
2. M. Malathi, R. Sujitha, M. R. Revathy, “Alcohol Detection and Seat Belt Control System using Arduino,” Proceedings of 2017
International Conference on Innovations in Information, Embedded and Communication Systems, March 2017.
3. A. R. Varma, S. V. Arote, C. Bharti and K. Singh, "Accident prevention using eye blinking and head movement," Proceedings of
Emerging Trends in Computer Science and Information Technology-2012(ETCSIT2012), 2012.
159. 4. Charlotte Jacobé de Naurois, Christophe Bourdin, Anca Stratulat, Emmanuelle Diaz and Jean-Louis Vercher, “ Detection and
prediction of driver drowsiness using artificial neural network models,” 10th International Conference on Managing Fatigue:
Managing Fatigue to Improve Safety, Wellness, and Effectiveness, Vol. 126, pp. 95-104, May 2019. 947-951
5. Koneti Sandeep, Ponnam Ravikumar and Sura Ranjith, “Novel drunken driving detection and prevention models using Internet of
things,” International Conference on Recent Trends in Electrical, Electronics and Computing Technologies, pp. 145-149, 2017.
6. José Vicente, Pablo Laguna, Ariadna Bartra and Raquel Bailón, “Drowsiness detection using heart rate variability,” Medical &
Biological Engineering & Computing, Vol. 56, Issue 6, pp. 927-937, 1st June,2016.
7. S Aravind Student, T. Karthick and Usha Sakthivel, “E-Eyanthra Perspiration based drunken driving prevention system”, 4th
International Conference on New Trends in Information Science and Service Science, May 2010.
8. Lavanya J, Essaki Raj R, Kamalakannan C, Suresh L, Dash S, Panigrahi B, “A Mobile Based Novice Detection of Driver’s Fatigue
Level and Accident Reporting Solution,” Power Electronics and Renewable Energy Systems, Lecture Notes in Electrical Engineering,
Vol. 326, Springer, New Delhi.
9. Boon-Giin Lee and Wan-Young Chung, “A Smartphone-Based Driver Safety Monitoring System Using Data Fusion,”
Sensors(Basel), Vol. 12 (12), pp. 17536–17552, December 2012.
10. Vennela Priyadarshni, P. Gopi Krishna and K. Sreenivasa Ravi, “GPS and GSM Enabled Embedded Vehicle Speed Limiting Device,”
Indian Journal of Science and Technology, Vol 9(17), May 2016.
11. D. Sommer and M. Golz, “Evaluation of PERCLOS Based Current Fatigue Monitoring Technologies,” In Proceedings of Annual
International Conference of the IEEE Engineering in Medicine and Biology Society 2010, pp. 4456-4459, 21 August–4 September
2010.
12. Fernando Bobillo and Umberto Straccia, “A Fuzzy Description Logic with Product T-norm,” In Proceedings of IEEE International
Fuzzy Systems Conference 2007,pp. 1-6, July 2007.
13. Sara taghipour, Mohammad Reza Meybodi and Ali Taghipour, “An Algorithm for Map Matching For Car Navigation System,” 2008
3rd International Conference on Information and Communication Technologies: From Theory to Applications, April 2008.
14. Pooja Singal and R.S.Chhillar, “Dijkstra Shortest Path Algorithm using Global Positioning System”, International Journal of
Computer Applications (0975 – 8887), Volume 101, No.6, September 2014.
15. Hao Zhu, Ka-Veng Yuen, Lyudmila Mihaylova, and Henry Leung, Fellow, IEEE, “Overview of Environment Perception for
Intelligent Vehicles,” IEEE Transactions on intelligent transportation systems, Vol. 18, No. 10, October 2017.
16. Jianfeng Zhao, Bodong Liang and Qiuxia Chen, “The key technology toward the self-driving car,” International Journal of Intelligent
Unmanned Systems, Vol. 6, No. 1, pp. 2-20, January 2008.
Paper Title: Rectangular Loop UHF Antenna for utilization of TVWS for Cognitive Radio Application
Abstract: To utilize the TV white space 470MHz to 806MHz, several wideband antennas are designed in
ultra-high frequency (UHF) band. This paper presents the monopole antenna with resonant structures arranged in
rectangular loop shape. The overall dimension of the antenna is 160mm x 100mm x 1.6mm. The performance of
the antenna in the operating frequency band 596MHz to 733MHz is evaluated using HFSS software. The overall
peak gain of the antenna is 1.653dB. In both elevation and azimuth plane, radiation pattern is omnidirectional
and the radiation efficiency is 81.79%
160.
Keyword : Cognitive Radio, Monopole antenna, TV white-space, UHF antenna.
952-955
References:
1. Federal Communications Commission Spectrum Policy Task Force,
2002. doi:10.1136/tc.1.1.73.
2. G. Staple, K. Werbach, The end of spectrum scarcity, IEEE Spectr. 41 (2004) 48–52. doi:10.1109/MSPEC.2004.1270548.
3. A.B. Flores, R.E. Guerra, E.W. Knightly, IEEE 802.11af, IEEE Commun. Mag. (2013) 92–100.
4. J.M. III, G.Q. Maguire, Cognitive Radio: Making Software Radios More Personal, IEEE Pers. Commun. 6 (1999) 13–18.
5. G.A. Raza, G. Saini, A Review on Antennas for TV White Space Spectrum Communication, Int. J. Electr. Electron. Eng. (2016) 17–20.
6. H. Wang, H. Xu, Resonant structures for handset antenna design, 2016 IEEE 5th Asia-Pacific Conf. Antennas Propagation, Conf. Proc.
(2017) 187–188. doi:10.1109/APCAP.2016.7843161.
7. M. John, M. Ammann, A Compact Shorted Printed Monopole Antenna for TV White Space Trials, 7th Eur. Conf. Antennas Propag.
(2013) 3713–3715. doi:10.21427/D7B01P.
8. M.H. JAMALUDDIN, T.A. RAHMAN, H. MOHAMAD, N. RAMLI, M.T. ISLAM, Wideband Planar U-shaped Monopole Antenna
with Meandering Technique for TV White Space Application, Radioengineering. 22 (2013) 708–713.
9. Q. Zhang, Y. Gao, C.G. Parini, Compact U-shape ultra-wideband antenna with characteristic mode analysis for TV white space
communications, in: 2016 IEEE Antennas Propag. Soc. Int. Symp. Proc., 2016: pp. 17–18. doi:10.1109/APS.2016.7695717.
10. N. Wang, Y. Gao, Q. Zeng, Compact wideband omnidirectional UHF antenna for TV white space cognitive radio application, AEU - Int.
J. Electron. Commun. 74 (2017) 158–162. doi:10.1016/j.aeue.2017.02.011.
11. A.K. Singh, M. Ranjan Tripathy, M Shaped Ultra Wide Band Monopole Antenna for TVWS CPE, in: 2018 5th Int. Conf. Signal
Process. Integr. Networks, 2018: pp. 240–243. doi:10.1109/SPIN.2018.8474241.
12. A.K. Singh, M.R. Tripathy, Planar Trapezoidal Monopole Antenna for TVWS CPE, in: 2018 3rd Int. Conf. Converg. Technol. I2CT
2018, 2018: pp. 6–8. doi:10.1109/I2CT.2018.8529689.
13. M.Y. Abou Shahine, M. Al-Husseini, Y. Nasser, K.Y. Kabalan, A. El-Hajj, A Reconfigurable Miniaturized Spiral Monopole Antenna
for TV White Spaces, in: PIERS Proc., 2013: pp. 1026–1029.
Paper Title: Single Image Super Resolution by Directionally Structured Coupled Lexicon Learning
Abstract: In this paper, a alternative algorithmic software is deliberate supported coupled wordbook gaining
knowledge of with mapping perform for the problem of single-photograph extremely good solution. Dictionaries
rectangular degree designed-group of the carry out for clustered facts. The coaching information is based into 9
clusters supported correlation between the info patches and already evolved directional templates. The
unchanging ness of the distributed representations is thought for the mission of wonderful-resolution. For each
cluster, a integrate of high-decision and low-decision dictionaries rectangular measure designed in conjunction
with their mapping-capabilities. This is a coupled word e book learning with a mapping performs enables in
strengthening, the unchangingness of disbursed example coefficients for diverse resolution stages. throughout
the reconstruction section, for a given low-decision patch a collection of directional clustered dictionaries square
measure used, and also the cluster is chosen which elements the smallest amount allotted instance errors. The
161. planned algorithmic application is as
compared with in advance paintings in addition to the presently pinnacle-ranked incredible-decision algorithmic
program. by the deliberate mechanism, the healing of directional fine options becomes extremely good. 956-958
Keyword : In this paper Dictionaries rectangular degree designed-group of the carry out for clustered facts.
References:
1. M Elad, M Aharon, Image denoising via distributed and redundant representations over learned dictionaries. IEEE Trans. Image method.
(TIP). 15, 3736–3745 (2006)
2. DL Donoho, Compressed sensing. IEEE Trans. Inf. Theory. 52, 1289–1306 (2006)
3. Harvesting Of Organs Through Aero drone by Shaik Khamuruddeen, S. V. Devika in International Journal of Innovative Technology
and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8, June, 2019
4. Intelligent Pesticide Spraying System using Quad Copter by Shaik.Khamuruddeen in International Journal of Recent Techno logy and
Engineering (IJRTE) ISSN: 2277-3878, Volume-7, Issue-5S4, February 2019.
5. Triple Frequency U-Slot Antenna for 5G and Satellite Communications by Shaik.Khamuruddeen in International Journal of Recent
Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7, Issue-5S4, February 2019.
Paper Title: Role of Information Technology in Education and Skill Based Learning for Employability
Abstract: Today India is one of the fastest growing economies in the world and with liberalisation,
privatisation and globalisation it is poised to grow further. But the question arises whether we are really ready
for this growth? Whether our students are skilled enough to compete worldwide and be a partner in this growth
mechanism? The answer is big ‘No’. It is a fact that education, lifelong learning and training are essential, but by
themselves inadequate to help individuals gain good and decent jobs. The employability scenario of graduates in
India is undoubtedly an area of great concern. In recent times information Communication Technology plays an
important role for the employability scenario in India. The old concepts of literate and illiterate society have
been replaced by digital divided. Considering the growing demand of industry it is high time for all the students
to be part of ICT driven education and training system. Further the growing demand of artificial intelligence and
data analytics put the students in more challenging position to obtain a job. The present paper is a conceptual one
and it will be an addition to the existing literature related to employability issues.
Paper Title: Use of Bottom Ash as a Partial Replacement of Fine Aggregates in Flexible Pavement
Abstract: A survey of ongoing research on bottom ash appears to demonstrate it has the ability to improve
asphalt pavement performance when used to supplant a segment of the aggregate in asphalt mixes. Bottom ash
can be utilized as an aggregate substitution, giving a considerable reserve funds to both highway organizations
and service organizations. Bottom ash has been utilized as fine aggregates in flexible pavements since the mid
1970's. The American Coal Ash Association detailed that, more than 17,200 metric huge amounts of bottom ash
was utilized in flexible pavements clearing during 2006.
The research is centered around examination of properties of bottom ash, which is the byproduct of Budgam
coal power plant and attainability investigation of utilization of bottom ash in flexible pavements of indian
roads. As indicated by the outcomes got, the best blends are delivered by mixing bottom ash with well-graded,
angular, rough textured aggregate and restricting the level of bottom ash to 25% for wearing and 16% for binder
course. Marshall Stability and flow values have been found to diminish as the level of Wet bottom ash is
increased in the blend.
Further, high level of bottom ash substitution increases ideal bitumen content, which primarily influences to high
production cost. In spite of the fact that the expense per 1 Mt of bottom ash mixed blend is higher than the
conventional mix for both surface courses, its low density increases overlay zone. In light of that the expense per
1 m2 is lower than the conventional mix. The fruitful utilization of bottom ash in black topped pavements in
165.
Jammu and kashmir would give huge monetary investment funds as well as an ecological inviting solution for a
waste material. 974-981
Paper Title: Security Modeling for Web Based Visitor’s Login System for Pursuance of Security Design Pattern
Abstract: In recent years because of the widespread use of internet and other communication media security
occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber
criminalities. Every system should be built by taking security as a main priority while building a system so as to
make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at
every phase of software development till the implementation of the software, security aspect is needed to take
into consideration before making the final design decision to avoid the expenses which may incur while
recovering of the system after the damage. For attainment of this, it is must to integrate the security at each
phase of the software development. The software developers insists on incorporating the software safeguards at
the design phase which may wind up in identifying the architecture restrictions related with the security which in
fact may not be necessary. To reduce this problem, this paper intends a structure for security development
activities. These activities consist of security requirements identification and threats analysis which are to be
converted into design decisions to lessen the risks to identified important assets. The recognized design
parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern
is to be developed to incorporate security in the software. By manually calculating values of assets and
prioritizing will help to identify the security requirements at the early stage of the software development life
cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the
software system
166. Keyword : Security Engineering process, Security Requirement Elicitation, Security modeling
References: 982-991
1. Aayush Gulati , Shalini Sharma, and Parshotam MMehmi. 2012.PROPOSING SECURITY REQUIREMENT PRIORITIZATION
FRAMEWORK., International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.3
2. Donald G. Firesmith, (2003) “Engineering Security Requirements”, Journal of object technology, vol 2, no.1, pp.53-68.
3. Zeki Yazar. A Qualitative Risk Analysis and Management Tool – CRAMM. SANS Institute Reading Room site
4. Ramchandran., 2002 .Designing Security solutions,Wiley Computer Publishing
5. Dermott JM and Fox C (1999) Using abuse case models for security requirements analysis. Department of Computer Science, James
Madison University, pp 55–64
6. Alexander IF (2003) Misuse cases, use cases with hostile intent’’. IEEE Software, pp. 58–66
7. Guttorm S, Opdahl AL (2005) Eliciting security requirements with misuse cases. RequirEng 10:34–44
8. Jacob Bergvalloch Louise Svensson .2015.Report on ‘Risk analysis review’ Linköpingsuniversitet https://www.diva-
portal.org/smash/get/diva2:821842/FULLTEXT01.pdf
9. NURIDAWATI MUSTAFA,MASSILA KAMALRUDIN,SAFIAH SIDEK. 2018. SECURITY REQUIREMENTS ELICITATION
AND CONSISTENCY VALIDATION: A SYSTEMATIC LITERATURE REVIEW ., Journal of Theoretical and Applied Information
96(16).ISSN: 1992-8645
10. Ashish Agarwal, Dr. Daya Gupta. Security Requirements Elicitation Using View Points for Online System First Internatio nal
Conference on Emerging Trends in Engineering and Technology
11. Security Requirements, http://www.dwheeler.com/secure-programs/Secure-ProgramsHOWTO/requirements.html
12. Mohamed Ghazouani, Sophia Faris, Hicham Medromi, Adil Sayouti.2014. Information Security Risk Assessment — A Practical
Approach with a Mathematical Formulation of Risk ., International Journal of Computer Applications (0975 – 8887) Volume 103(8),
13. Kakali Chatterjee ,Daya Gupta ,Asok De. 2013 .A framework for development of secure software.,CSIT., 1(2):143–157
14. Shams Tabrez Siddiqui.2017. Significance of Security Metrics in Secure Software Development.,International Journal of Applied
Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 12 – No. 6, August
2017 – www.ijais.org 10
Authors: Ms. Visnudharsini M. E, Abhimanyu Wadhwa, Nikhil Chopra, Sikander Zeb Ansari
The business capacity of broiler farmers in the partnership business pattern.” J. Indonesian Trop. Anim. Agric. 2019. 44(3):314-322.
Paper Title: A Brain Computer Interface–Based P300 Speller for Home Appliances Control System
Abstract: Enviourment control is one of the critical difficulties for handicapped individuals who experience
the ill effects of neuromuscular ailments. Brain computer interface systems empower a subject to communicate
with a PC machine without drawing down any solid action. This communication does not depend in light of any
ordinary medium of correspondences like physical developments, talking, and motion and so forth. The most
vital desire for a home control application is high accuracy and solid control. In this study, row column–based (2
169. Row, 3 columns) P300 paradigm for home appliances control was designed. In this article we analyse a real time
EEG data for P300 speller using support vector machine and artificial neural network for high accuracy. Using 1002-
this proposed method we are able to find the target appliance in a correct and fastest way. Four healthy subjects 1007
were participating in this study. Artificial neural network gives 85% accuracy within 10 flashes. The results
shows this paradigm can be used for select option of a home appliances control application for healthy subjects
with user convenient and reliable.
Paper Title: Factors Influencing the Entrepreneurial Capacity of Young Farmers for Farmer Succession
Abstract: The entrepreneurial capacity of young farmers is an important indicator for realizing farmer
succession. The research aimed to analysis descriptively entrepreneurial capacity and the factors influencing the
entrepreneurial capacity of young farmers. The study was conducted in Cianjur and Majalengka Regencies, West
Java, Indonesia. The study population was young farmers in Cianjur and Majalengka Regencies. A sample of
220 people consisted of 110 farmers in Cianjur and 110 farmers in Majalengka. Samples were selected using a
cluster random sampling technique. Data were collected by interview using a questionnaire. Research variables
consisted of individual characteristics (X1), access to information and communication technology (X2), external
support (X3), the role of agricultural instructors (X4), and entrepreneurial capacity (Y). Data analysis techniques
used were descriptive statistical techniques and multiple regression. The results of the study concluded that
youth entrepreneurship capacity mostly belonged medium classification. Majority of young farmers had junior
and senior high school education, the average length time of business was 5.8 years, majority of farmers had
never attended training, had high and easy access to information and communication technology, perceptions
and motivations was mostly classified as medium. The entrepreneurial capacity of young farmers was influenced
by education, motivation, access to information and communication technology, external factors and the role of
agricultural extension agents.
170.
1008-
Keyword : Entrepreneurial capacity, young farmers, community. 1014
References:
1. S. Wiyono, M. Sangaji, M. Ahsan, Ulil, and S. Abdullah, “Regenerasi petani, faktor-faktor yang mempengaruhi minat menjadi petani
pada keluarga petani padi dan hortikultura,” Lap. Kaji. Koalisi Rakyat untuk Ketahanan Pangan, pp. 1–46, 2015.
2. O. Anwarudin, “Opini: Peluang Agropreneur Muda,” Harian Republika, p. 6, Jan-2017.
3. H. Harniati and O. Anwarudin, “The interest and action of young agricultural entrepreneur on agribusiness in Cianjur Regency, West
Java,” J. Penyul., vol. 14, no. 1, pp. 189–198, 2018.
4. M. Leino and S. Mullola, “Temperament-Conscious Humanistic Pedagogy,” Psychology, vol. 05, no. 07, pp. 753–761, 2014.
5. F. Liani, D. Sulistyowati, and O. Anwarudin, “Perspektif gender dalam partisipasi petani pada Kawasan Rumah Pangan Lestari
(KRPL) tanaman sayuran di Kecamatan Kersamanah Kabupaten Garut Provinsi Jawa Barat,” J. Penyul. Pertan., vol. 13, no. 1, pp. 21–
32, 2018.
6. C. Saputra, O. Anwarudin, and D. Sulistyowati, “Persepsi dan adopsi pengendalian hama terpadu lalat buah pada tanaman mangga di
Kecamatan Greged Kabupaten Cirebon Provinsi Jawa Barat,” J. Penyul. Pertan., vol. 13, no. 2, pp. 49–60, 2018.
7. C. A. Putri, O. Anwarudin, and D. Sulistyowati, “Partisipasi petani dalam kegiatan penyuluhan dan adopsi pemupukan padi sawah di
Kecamatan Kersamanah Kabupaten Garut,” J. Agribisnis Terpadu, vol. 12, no. 1, pp. 103–119, 2019.
8. W. Wardani and O. Anwarudin, “Peran penyuluh terhadap penguatan kelompok tani dan regenerasi petani di Kabupaten Bogor
Jawa Barat,” J. TABARO, vol. 2, no. 1, pp. 191–200, 2018.
9. M. Khatib, S. N. Sarem, and H. Hamidi, “Humanistic education: concerns, implications and applications,” J. Lang. Teach. Res., vol. 4,
no. 1, pp. 45–51, 2013.
10. O. Anwarudin and A. Maryani, “The effect of institutional strengthening on farmers participation and self-reliance in Bogor
Indonesia,” Int. J. Res. Soc. Sci., vol. 7, no. 4, pp. 409–422, 2017.
11. A. Warya and O. Anwarudin, “Factors affecting farmer participation in paddy - special efforts program at Karawang, Indonesia,” Int. J.
Soc. Sci. Econ. Res., vol. 3, no. 8, pp. 3857–3867, 2018.
12. N. Nazaruddin and O. Anwarudin, “Pengaruh penguatan kelompok tani terhadap partisipasi dan motivasi pemuda tani pada usaha
pertanian di Leuwiliang, Bogor,” J. Agribisnis Terpadu, vol. 12, no. 1, pp. 1–14, 2019.
13. A. L. A. Latopa and N. S. A. A. Rashid, “Identifying the causes of decline in youth participation in agricultural empowerment program
of youth integrated training farm, Malete, Kwara State,” Res. Humanit. Soc. Sci., vol. 5, no. 7, pp. 2225–484, 2015.
14. A. L. A. Latopa and N. S. A. A. Rashid, “The impacts of integrated youth training farm as a capacity building center for yout h
agricultural empowerment in Kwara State, Nigeria,” Mediterr. J. Soc. Sci., vol. 6, no. 5, pp. 524–532, 2015.
15. A.-L. Ayinde, L. 1 , S. Norazizan, S. A. Rashid, A. A. Samah, and H. Abdullah, “Examining the extent of youth participation in
agricultural training program in Malete Youth Farm Kwara State,” IOSR J. Humanit. Soc. Sci., vol. 20, no. 4, pp. 65–71, 2015.
16. I. Setiawan, S. Sumardjo, P. Tjitropranoto, and A. Satria, “Study of role of agribusiness young actors on optimalization of p rivate
agricultural extension in West Java Province , Indonesia,” Int. J. Humanit. Soc. Sci., vol. 5, no. 9, pp. 161–169, 2015.
17. O. Anwarudin and Y. Haryanto, “The role of farmer-to-farmer extension as a motivator for the agriculture young generation,” Int. J.
Soc. Sci. Econ. Res., vol. 3, no. 1, pp. 428–437, 2018.
18. D. Prawiranegara, S. Sumardjo, D. P. Lubis, and S. Harijati, “Strengthening role of farmer institution in enhance of innovation
capability based on ICT in West Java Province, Indonesia,” Int. J. Humanit. Soc. Sci., vol. 5, no. 12, pp. 128–136, 2015.
19. D. Prawiranegara, S. Sumardjo, D. P. Lubis, and S. Harijati, “Effect of information quality based on cyber toward vegetable f armers
capability to manage innovation in west java,” Sosiohumaniora, vol. 18, no. 2, pp. 166–172, 2016.
20. C. W. M. Yu, “Capacity building to advance entrepreneurship education: Lessons from the teen entrepreneurship competition in Hong
Kong,” Educ. Train., vol. 55, no. 7, pp. 705–718, 2013.
21. S. F. Conway, J. McDonagh, M. Farrell, and A. Kinsella, “Cease agricultural activity forever? Underestimating the importance of
symbolic capital,” J. Rural Stud., vol. 44, pp. 164–176, 2016.
22. S. Joosse and A. Grubbstrom, “Continuity in farming - Not just family business,” J. Rural Stud., vol. 50, pp. 198–208, 2017.
23. Ó. González-Benito, J. González-Benito, and P. A. Muñoz-Gallego, “Role of entrepreneurship and market orientation in firms’
success,” Eur. J. Mark., vol. 43, no. 3–4, pp. 500–522, 2009.
24. H. N. Nasution, F. T. Mavondo, M. J. Matanda, and N. O. Ndubisi, “Entrepreneurship: Its relationship with market orientation and
learning orientation and as antecedents to innovation and customer value,” Ind. Mark. Manag., vol. 40, no. 3, pp. 336–345, 2011.
25. Y. Sato, T. Tabuchi, and K. Yamamoto, “Market size and entrepreneurship,” J. Econ. Geogr., vol. 12, no. 6, pp. 1139–1166, 2012.
26. B. Cohen and M. I. Winn, “Market imperfections, opportunity and sustainable entrepreneurship,” J. Bus. Ventur., vol. 22, no. 1, pp.
29–49, 2007.
27. O. M. Lehner and J. Kaniskas, Opportunity recognition in social entrepreneurship: A thematic meta analysis, vol. 21, no. 1. 2012.
28. H. Hansson, R. Ferguson, C. Olofsson, and L. Rantamäki-Lahtinen, “Farmers’ motives for diversifying their farm business - The
influence of family,” J. Rural Stud., vol. 32, pp. 240–250, 2013.
29. J. C. Pinho and E. S. de Sá, “Personal characteristics, business relationships and entrepreneurial performance: Some empirica l
evidence,” J. Small Bus. Enterp. Dev., vol. 21, no. 2, pp. 284–300, 2014.
30. M. Bouette and F. Magee, “Hobbyists, artisans and entrepreneurs: Investigating business support and identifying entrepreneurial
profiles in the Irish craft sector,” J. Small Bus. Enterp. Dev., vol. 22, no. 2, pp. 337–351, 2015.
31. S. Amanah and D. Sadono, “Motivation , job satisfaction and job performance of forestry extension workers in Cianjur District West
Java Province,” J. Penyul., vol. 11, no. 1, pp. 11–22, 2015.
32. A. Maryani, Y. Haryanto, and O. Anwarudin, “Strategy of agricultural extension to improve participation of the farmers in spe cial
effort in increasing rice production,” Int. J. Sci. Basic Appl. Res., vol. 36, no. 4, pp. 163–174, 2017.
33. A. Fatchiya and T. Hernanda, “The level of agri-extension worker performance in South Ogan Komering Ulu (OKU) District,” J.
Penyul., vol. 11, no. 1, pp. 79–90, 2015.
34. M. Hauser, M. Lindtner, S. Prehsler, and L. Probst, “Farmer participatory research: Why extension workers should understand a nd
facilitate farmers’ role transitions,” J. Rural Stud., vol. 47, pp. 52–61, 2016.
35. O. Anwarudin and D. Dayat, “The effect of farmer participation in agricultural extension on agribusiness sustainability in Bogor ,
Indonesia,” Int. J. Multicult. Multireligious Underst., vol. 6, no. 3, pp. 1061–1072, 2019.
36. T. Tambunan, “Women entrepreneurship in Asian developing countries: Their development and main constraints,” J. Dev. Agric.
Econ., vol. 1, no. 2, pp. 27–40, 2009.
37. B. Okpukpara, “Strategies for effective loan delivery to small scale enterprises in rural Nigeria,” J. Dev. Agric. Econ., vol. 1, no. 2, pp.
041–048, 2009.
38. M. Frese and M. M. Gielnik, “The psychology of entrepreneurship,” Annu. Rev. Organ. Psychol. Organ. Behav., vol. 1, no. 2014, pp.
413–438, 2014.
39. V. Vardhini, P. Raja, and K. Devi, “Social media as the mext mrend in social business marketing, social media as the next tre nd in
solar business marketing,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 11, pp. 760–763, 2019.
40. I. Bečicová and J. Blažek, “Is there a credit-gap in a periphery? The perception of this problem by small entrepreneurs,” J. Rural Stud.,
vol. 42, pp. 11–20, 2015.
41. V. Ledwith and K. Reilly, “Fringe bene fi ts ? Educational experiences of migrant and non-migrant youth in the urban-rural fringe of
Galway City , Ireland,” J. Rural Stud., vol. 36, no. 2014, pp. 219–225, 2014.
42. M. Arsyad, M. Muis, and Y. Sabang, “Government expenditure and private investment on the value of agricultural sector in labor
absorption,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 7, pp. 496–501, 2019.
43. K. Sankaran and C. Demangeot, “Conceptualizing virtual communities as enablers of community-based entrepreneurship and
resilience,” J. Enterprising Communities, vol. 11, no. 1, pp. 78–94, 2017.
44. G. Secundo, G. Schiuma, and G. Passiante, “Entrepreneurial learning dynamics in knowledge intensive enterprises,” Int. J. Entrep.
Behav. Res., vol. 23, no. 3, pp. 1–17, 2017.
45. J. Lepoutre, R. Justo, S. Terjesen, and N. Bosma, “Designing a global standardized methodology for measuring social entrepren eurship
activity: The Global Entrepreneurship Monitor social entrepreneurship study,” Small Bus. Econ., vol. 40, no. 3, pp. 693–714, 2013.
46. L. Zagata and L. Sutherland, “Deconstructing the ‘ young farmer problem in Europe ’ : Towards a research agenda,” J. Rural Stud.,
vol. 38, no. 2015, pp. 39–51, 2015.
47. P. Stenholm and U. Hytti, “In search of legitimacy under institutional pressures: A case study of producer and entrepreneur farmer
identities,” J. Rural Stud., vol. 35, pp. 133–142, 2014.
48. A. Grubbström, S. Stenbacka, and S. Joosse, “Balancing family traditions and business: Gendered strategies for achieving future
resilience among agricultural students,” J. Rural Stud., vol. 35, no. 2014, pp. 152–161, 2014.
49. S. Sumardjo and L. Radjabaycolle, “Community participation of Cikapundung Watershead Management Activities in Dago Village
Bandung,” J. Penyul., vol. 10, no. 1, pp. 43–58, 2015.
Keyword : Feature selection, Machine learning, Opinion mining, Text pre-processing, Twitter, Transit
opinion analysis, Social media.
References:
1. A. Gal-Tzur, A. Rechavi, D. Beimel, and S. Freund, “An improved methodology for extracting information required for transport-
related decisions from Q&A forums: A case study of TripAdvisor,” Travel Behav. Soc., vol. 10, no. September 2017, pp. 1 –9, 2018.
2. Z. Zhang, Q. He, J. Gao, and M. Ni, “A deep learning approach for detecting traffic accidents from social media data,” Transp. Res.
Part C Emerg. Technol., vol. 86, no. May 2017, pp. 580–596, 2018.
3. F. Ali, D. Kwak, P. Khan, S. M. R. Islam, K. H. Kim, and K. S. Kwak, “Fuzzy ontology-based sentiment analysis of transportation and
city feature reviews for safe traveling,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 33–48, 2017.
4. A. Huang, L. Gallegos, and K. Lerman, “Travel analytics: Understanding how destination choice and business clusters are conne cted
based on social media data,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 245–256, 2017.
5. C. Cottrill, P. Gault, G. Yeboah, J. D. Nelson, J. Anable, and T. Budd, “Tweeting Transit: An examination of social media strategies for
transport information management during a large event,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 421–432, 2017.
6. I. Casas and E. C. Delmelle, “Tweeting about public transit — Gleaning public perceptions from a social media microblog,” Case Stud.
Transp. Policy, vol. 5, no. 4, pp. 634–642, 2017.
7. K. Kim, O. joung Park, S. Yun, and H. Yun, “What makes tourists feel negatively about tourism destinations? Application of hybrid
text mining methodology to smart destination management,” Technol. Forecast. Soc. Change, vol. 123, pp. 362–369, 2017.
8. T. Kuflik, E. Minkov, S. Nocera, S. Grant-Muller, A. Gal-Tzur, and I. Shoor, “Automating a framework to extract and analyse transport
related social media content: The potential and the challenges,” Transp. Res. Part C Emerg. Technol., vol. 77, pp. 275–291, 2017.
9. X. Lv and N. M. El-Gohary, “Stakeholder Opinion Classification for Supporting Large-Scale Transportation Project Decision Making,”
in Computing in Civil Engineering 2017, 2017, pp. 333–341.
10. J. Yin, T. Tang, L. Yang, J. Xun, Y. Huang, and Z. Gao, “Research and development of automatic train operation for railway
transportation systems: A survey,” Transp. Res. Part C Emerg. Technol., vol. 85, pp. 548–572, 2017.
11. S. R. Majumdar, “The case of public involvement in transportation planning using social media,” Case Stud. Transp. Policy, vo l. 5, no.
1, pp. 121–133, 2017.
12. T. H. Rashidi, A. Abbasi, M. Maghrebi, S. Hasan, and T. S. Waller, “Exploring the capacity of social media data for modelling travel
behaviour: Opportunities and challenges,” Transp. Res. Part C Emerg. Technol., vol. 75, pp. 197–211, 2017.
13. M. Thelwall, “TensiStrength: Stress and relaxation magnitude detection for social media texts,” Inf. Process. Manag., vol. 53, no. 1, pp.
106–121, 2017.
14. Z. Zhang, Q. He, and S. Zhu, “Potentials of using social media to infer the longitudinal travel behavior: A sequential model-based
clustering method,” Transp. Res. Part C Emerg. Technol., vol. 85, no. October, pp. 396–414, 2017.
15. E. Aria, J. Olstam, and C. Schwietering, “Investigation of Automated Vehicle Effects on Driver’s Behavior and Traffic Performance,”
Transp. Res. Procedia, vol. 15, pp. 761–770, 2016.
16. D. E. Brown, “Text Mining the Contributors to Rail Accidents,” IEEE Trans. Intell. Transp. Syst., vol. 17, no. 2, pp. 346 –355, 2016.
17. G. T. Giancristofaro and A. Panangadan, “Predicting Sentiment toward Transportation in Social Media using Visual and Textual
Features,” IEEE Conf. Intell. Transp. Syst. Proceedings, ITSC, pp. 2113–2118, 2016.
18. D. Gregor et al., “A methodology for structured ontology construction applied to intelligent transportation systems,” Comput. Stand.
Interfaces, vol. 47, pp. 108–119, 2016.
19. R. M. Fleming, K. M. Feldmann, and D. M. Fleming, “Comparing a high-dose dipyridamole SPECT imaging protocol with dobutamine
and exercise stress testing protocols. Part III: Using dobutamine to determine lung-to-heart ratios, left ventricular dysfunction, and a
potential viability marker,” Int. J. Angiol., vol. 8, no. 1, pp. 22–26, 1999.
20. H. J. Parkinson, G. Bamford, and B. Kandola, “The Development of an Enhanced Bowtie Railway Safety Assessmen t Tool using a Big
Data Analytics Approach,” Int. Conf. Railw. Eng. (ICRE 2016), pp. 1 (9 .)-1 (9 .), 2016.
21. D. Ulloa, P. Saleiro, R. J. F. Rossetti, and E. R. Silva, “Mining social media for open innovation in transportation systems,” IEEE Conf.
Intell. Transp. Syst. Proceedings, ITSC, pp. 169–174, 2016.
22. J. Yang and A. M. Anwar, “Social Media Analysis on Evaluating Organisational Performance: A Railway Service Management
Context,” Proc. - 2016 IEEE 14th Int. Conf. Dependable, Auton. Secur. Comput. DASC 2016, 2016 IEEE 14th Int. Conf. Pervasive
Intell. Comput. PICom 2016, 2016 IEEE 2nd Int. Conf. Big Data, pp. 835–841, 2016.
23. D. Efthymiou and C. Antoniou, “Use of Social Media for Transport Data Collection,” Procedia - Soc. Behav. Sci., vol. 48, pp. 775–
785, 2012.
24. N. N. Haghighi, X. C. Liu, R. Wei, W. Li, and H. Shao, “Using Twitter data for transit performance assessment: a framework fo r
evaluating transit riders’ opinions about quality of service,” Public Transp., vol. 10, no. 2, pp. 363–377, Aug. 2018.
25. S. Narayanaswami, “Digital social media: Enabling performance quality of Indian Railway services,” J. Public Aff., vol. 18, no. 4, p.
e1849, Nov. 2018.
26. A. Nikolaidou and P. Papaioannou, “Utilizing Social Media in Transport Planning and Public Transit Quality: Survey of Literature,” J.
Transp. Eng. Part A Syst., vol. 144, no. 4, p. 04018007, Apr. 2018.
27. S. Symeonidis, D. Effrosynidis, and A. Arampatzis, “A comparative evaluation of pre-processing techniques and their interactions for
twitter sentiment analysis,” Expert Syst. Appl., vol. 110, pp. 298–310, 2018.
28. D. Effrosynidis, S. Symeonidis, and A. Arampatzis, “A Comparison of Pre-processing Techniques for Twitter Sentiment Analysis,”
2017, pp. 394–406.
29. Z. Jianqiang and G. Xiaolin, “Comparison research on text pre-processing methods on twitter sentiment analysis,” IEEE Access, vol. 5,
pp. 2870–2879, 2017.
30. G. Angiani et al., “A comparison between preprocessing techniques for sentiment analysis in Twitter,” CEUR Workshop Proc., vo l.
1748, 2016.
31. Y. Bao, C. Quan, L. Wang, and F. Ren, “The Role of Pre-processing in Twitter Sentiment Analysis,” Int. Conf. Intell., pp. 615–624,
2014.
32. U. Farooq, H. Mansoor, A. Nongaillard, Y. Ouzrout, and M. Abdul Qadir, “Negation Handling in Sentiment Analysis at Senten ce
Level,” J. Comput., vol. 12, no. 5, pp. 470–478, 2017.
33. B. Ma, H. Yuan, and Y. Wu, “Exploring performance of clustering methods on document sentiment analysis,” J. Inf. Sci., vol. 4 3, no.
1, pp. 54–74, 2017.
34. T. Singh and M. Kumari, “Role of Text Pre-processing in Twitter Sentiment Analysis,” Procedia Comput. Sci., vol. 89, pp. 549–554,
2016.
35. V. J. Nirmal and D. I. G. Amalarethinam, “Parallel Implementation of Big Data Pre-Processing Algorithms for Sentiment Analysis of
Social Networking Data,” Intern. J. Fuzzy Math. Arch., vol. 6, no. 2, pp. 149–159, 2015.
36. R. Duwairi and M. El-Orfali, “A study of the effects of preprocessing strategies on sentiment analysis for Arabic text,” J. Inf. Sci., vol.
40, no. 4, pp. 501–513, 2014.
37. E. Haddi, X. Liu, and Y. Shi, “The Role of Text Pre-processing in Sentiment Analysis,” First Int. Conf. Inf. Technol. Quant. Manag.,
vol. 17, pp. 26–32, 2013.
38. R. Parikh and M. Movassate, “Sentiment analysis of user-generated twitter updates using various classification techniques,” Bus.
Mark., pp. 1–18, 2009.
39. M. A. Saloot, N. Idris, and R. Mahmud, “An architecture for Malay Tweet normalization,” Inf. Process. Manag., vol. 50, no. 5, pp.
621–633, 2014.
40. M. Oussalah, F. Bhat, K. Challis, and T. Schnier, “A software architecture for Twitter collection, search and geolocation services,”
Knowledge-Based Syst., vol. 37, pp. 105–120, 2013.
41. J. Fürnkranz, “A Study Using n\ngram Features for Text Categorization,” Austrian Res. Inst. Artifical Intell., no. 1998, pp. 1–10, 1998.
42. D. Jurafsky and J. H. Martin, “Slp4-1,” Speech Lang. Process., pp. 2–7, 2014.
43. M. Thelwall, “TensiStrength: Stress and relaxation magnitude detection for social media texts,” Inf. Process. Manag., vol. 53, no. 1, pp.
106–121, 2017.
44. M. T. AL-Sharuee, F. Liu, and M. Pratama, “Sentiment analysis: An automatic contextual analysis and ensemble clustering approach
and comparison,” Data Knowl. Eng., vol. 115, pp. 194–213, 2018.
45. S. L. Lo, R. Chiong, and D. Cornforth, “An unsupervised multilingual approach for online social media topic identification,” Expert
Syst. Appl., vol. 81, pp. 282–298, 2017.
46. K. Ogada, W. Mwangi, and C. Wilson, “N-gram Based Text Categorization Method for Improved Data Mining,” J. Inf. Eng. Appl.,
vol. 5, no. 8, pp. 35–44, 2015.
47. T. Parlar, S. A. Özel, and F. Song, “QER: a new feature selection method for sentiment analysis,” Human-centric Comput. Inf. Sci.,
vol. 8, no. 1, pp. 1–19, 2018.
48. A. Yousefpour, H. N. A. Hamed, U. H. H. Zaki, and K. A. M. Khaidzir, “Feature subset selection using mutual standard d eviation in
sentiment mining,” 2017 IEEE Conf. Big Data Anal. ICBDA 2017, vol. 2018-Janua, pp. 13–18, 2018.
49. Y. Gupta and A. Saini, “A novel Fuzzy-PSO term weighting automatic query expansion approach using combined semantic filtering,”
Knowledge-Based Syst., vol. 136, pp. 97–120, 2017.
50. B. Trstenjak, S. Mikac, D. D.-P. Engineering, and undefined 2014, “KNN with TF-IDF based Framework for Text Categorization,”
researchgate.net.
51. Jiawei, Data Mining : Concepts and, vol. 05. 2012.
52. J. Quinlan, C4. 5: programs for machine learning. 2014.
Authors: Umar Daeng Palallo, Muhammad Syafar, Ridwan Amiruddin, Indar, Ahmad Yani
Paper Title: The Effect of Life Skill Education on Cigarette Control in Adolescents
Abstract: Cigarettes are one of the leading causes of death in the world and are the only legal product that
kills up to half of its use. Smoking habit causes at least 30 types of diseases in humans. The purpose of this study
was to determine the effect of life skill education models on cigarette control in adolescents in Tellulimpoe
District, Sinjai Regency. The population in this study were all adolescents living in Tellulimpoe District, Sinjai
Regency. A sampling of research with selected purposive sampling and selected cluster sampling techniques.
Selected purposive sampling uses qualitative methods, with teenage informants aged 11 years to 15 years.
Selected cluster Sampling uses quantitative methods with teenage respondents. The selected sample was 318
respondents. The study was conducted for three months, namely 1 July to 30 October 2019. The results of the
study were that adolescent attitudes were good with the formation of a good smoking cessation category of 6
people (2.7%) and a category of less 217 people (97.3%) ; adolescent attitudes less with the formation of the
intention to stop smoking with a good category of 2 people (2.1%) and less categories of 93 people (97.3%).
Subjective norms are good with the formation of quitting intentions with good categories of 0 people (0%) and
fewer categories of 89 people (100%); subjective norms less with the formation of the intention to stop smoking
with a good category of 8 people (3.5%) and the category of less than 221 people (96.5%). Adolescent beliefs
are good with the formation of the intention to stop smoking with a good category of 0 people (0%) and 21
172. people fewer categories (100%); adolescent confidence is less with the formation of the intention to stop
smoking with a good category of 8 people (2.7%) and 289 people less (97.3%). The conclusions of the study are
adolescent attitudes, subjective norms, and beliefs to stop smoking form the intention to stop smoking. Research 1026-
1030
suggestions are needed for life skill education to control smoking behavior.
Authors: Ilavalagan P
Paper Title: Storage, Handling and Safety Procedure for Fuel in Oil & Gas Industry
Abstract: After Finding the oil & gas occurrences in the subsurface using various methods and tools that
were available in Upstream Oil and Gas Industry. Further reaching the reservoir and taking out the Oil & Gas
from those to the surface the fuel have to transport and store to get purify for supply to the required user. Here
the Midstream peoples plays a vital role in it. The drilled Oil and Gas have to transport from the occurrence to
the destination Refinery so it have to be planned well and many safety procedure have to be done to avoid any
problem in those transportation and after transporting to the destination it must be maintained in perfect
temperature condition and perfect storage tanks either above the ground or the underground .Again there are
173. some safety procedures to be followed which were approved by the Government safety norms. This article deal
about the process and procedures in transporting and storage of fuels from upstream to midstream to
downstream .Also about the safety precaution and procedure to be followed to have a safe storage and handling. 1031-
1032
176. Paper Title: Homecare System for Demented People using IoT
Abstract: Internet of Things (IoT) provides many homecare systems and makes an easier life for humans. 1043-
Some homecare systems are really useful for aged people. In our society, many aged people are suffering from a 1046
disease called dementia. Dementia word describes the set of symptoms that may contain memory loss and
difficulty with thinking. The demented people are unable to recognize their family members. Also they have
difficulty to deal with day to day activities. Taking care of such people is not a dominant task if assigned to a
caretaker, but some people may not afford these much of expenses. Even if it is assigned to the caretaker, they
may be burdened with the amount of care required. In this work, to reduce the burden on the caretakers, a
homecare system using IoT is designed. An android camera phone installed at the door recognizes the face of the
arrived person and sends an unique identifier wirelessly to an android watch wore by the demented person. The
android watch alerts the user with vibration. Also, it opens the locally stored image using the unique identifier
and announces the name of the arrived person. Reminder application is also used to remind the day to day
activities with voice commands.
References:
1. E. Stabler. Notes on computational linguistics. UCLA, winter 2003
2. Iman Muwafaq Muslim Muwafaq Al-Ghabra. An Introduction to Computational Linguistics Advantages& Disadvantages. J. OF COL.
OF B .ED. NO.51 2007
3. Karen Sparck Jones Computational linguistics: what about the linguistics? Computational Linguistics, 2007.
4. Hausser. Ronald. Foundation of Computational Linguistics: Human-computer communication in natural language. Springer. 2001
5. Reiter. Ehud & Dale, Robert. Building Natural Language Processing System. 2000
6. Bailly, Gerard (ed). AudioVisual Speech Processing. 2012
7. Jurafsky, Daniel & Martin, James H. Speech and Language Processing. 2000
8. Ranta, Aarne. Grammatical Framework: Programming with Multilingual Grammars. 2011.
Paper Title: A Novel Multicast Routing Protocol for Mobile Ad-Hoc Networks
Abstract: We present a novel approach multicast routing protocol using Ant Colony Optimization and Cross
Layer Technique. This protocol is an enhancement of the existing on-demand multicast routing protocol
178. (ODMRP). Establishing communication through portable devices without any central infrastructure is possible
in Ad-hoc networks. This feature of the absence of a central infrastructure and the random mobility of the 1050-
devices give rise to multiple problems involving in security and routing. The challenges encountered by these 1054
multicast routing protocols are to provide a secured and efficient routing in these networks. In this paper we
intend to present a novel approach of on-demand multicast routing protocol using Ant Colony Optimization and
Cross Layer Technique. With this enhanced feature of cross layer technique and by applying ant colony
optimization the proposed protocol performs more efficient with minimal overhead. The performance levels of
the proposed algorithm at higher traffic load in comparison to the existing algorithms are evident from the
simulations performed using NS-2.
Keyword : Ant Colony Optimization, Cross Layer Technique, Multicast Routing Protocol, ODMRP.
References:
1. E.M.Royer.,Chai-Keong.Toh., April 1999. A review of current routing protocols for ad hoc mobile wireless networks, IEEE Personal
Communications, Vol.6(2), pp. 46–55.
2. Freebersyser, J.A., and Barry Leiner, 2001. A DoD perspective on mobile ad hoc networks, Charles E. Perkins (Ed.), Ad Hoc
Networking, Addison Wesley, pp. 29 - 51.
3. G.Jose Moses, Dr.P.Suresh varma, N.Supriya, 2012.’A Review on routing protocols in mobile adhoc networks’. IJARCS;
Vol.3,No.1,Jan-Feb,pp.59-64.
4. Asis Nasipuri, Samir R.Das, Oct.1999.‘On-demand multipath routing for mobile ad hoc networks’. Proc. Eighth Int. Conf. on
Computer Communications and Networks,; pp. 64–70.
5. Zhang, B., Mouftah, H.T., 2006.‘Destination-driven shortest path tree algorithms’, J. High Speed Network.,Vol.15, (2), pp. 123– 130.
6. Misra, S., Obaidat, M.S., Dhurandher, S.K., Verma, K., Gupta, P., 2009 ‘Using ant-like agents for fault-tolerant routing in mobile ad-
hoc networks’. ICC, pp. 1–5.
7. P. Venkata Krishna, V. Saritha, G. Vedha, A. Bhiwal and A.S. Chawla, 2012 “Quality-of-service-enabled ant colony-based
multipathrouting for mobile ad hoc networks”, IET Commun., Vol. 6, Iss. 1, pp. 76– 83.
8. G.Jose Moses, Dr.P.Suresh varma, N.Supriya, 2012.‘CL-S-ODMRP- A Cross Layered Secure ODMRP for Achieving High-
Throughput in Wireless Networks’, European Journal of Scientific Research,Vol. 87, No 2, pp.251-260.
9. Misra, S., Obaidat, M.S., Dhurandher, S.K., Verma, K.,,2009.‘Using ant-like agents for fault-tolerant routing in mobile ad-hoc
networks’. ICC, 2009; pp. 1–5.
10. P. Venkata Krishna and Iyengar, 2007. “A Cross Layer Based Qos Model For Wireless And Mobile Networks” Journal of Mobile
Communication. Iss.1 (4), pp. 114-120.
11. Sivakumar, D.; Suseela, B.; Varadharajan, R, 2012, "A survey of routing algorithms for MANET," Advances in Engineering, Science
and Management (ICAESM), International Conference, vol.30,pp.625-640.
12. NS-2, the NS Manual (formally known as NS Documentation) available at http://www.isi.edu/nsnam/ns/doc.
Keyword : Technology, Asset quality, Financial soundness, Profitability, Credit growth, Risk
References:
1. Ameur, I.G.B., and Mhiri, S.M., (2013). Explanatory Factors of Bank Performance Evidence from Tunisia.International Journal o f
Economics, Finance and Management, Vol. 2, No. 1, pp. 143-152
2. Anbar, A and Alper, D (2011). Bank Specific and Macroeconomic Determinants of Commercial Bank Profitability: Empirical
Evidence from Turkey.Business and Economics Research Journal, Vol. 2, No. 2, pp. 139-152
3. Borio, C., Gambacorta, L and Hofmann, Boris (2015). The influence of monetary policy on bank profitability, BIS Working Papers No.
514, Monetary and Economic Department
4. Boudriga, A, Boulila, Neila, Jellouli and Sana, “Does Bank Supervision Impact Nonperforming Loans: Cross-Country Determinants
Using Aggregate Data”, MPRA Paper No. 18068
5. Bukhaari and Quodous (2012). Internal and external determinants of profitability of banks; evidence from Pakistan, Interdisciplinary
Journal of Contemporary Research in Business, Vol. 3, No. 9, pp. 1037-1058
6. Claessens, S., Coleman, N and Donnelly, M (2017). Low-For-Long’ Interest Rates and Banks’ Interest Margins and Profitability: Cross
Country Evidence, Board of Governors of the Federal Reserve System, International Finance Discussion Paper Number 1197
7. Djiogap, Fouopi and Ngomsi, Augustin (2012). Determinants of Bank Long-term Lending Behavior in the Central African Economic
and Monetary Community (CEMAC), Review of Economics & Finance, Vol.2, pp 107-114
8. Godlewski, C.J. (2005). Bank capital and credit risk taking in emerging market economies.Journal of Banking Regulation, Vol. 6, No.
2, pp. 128-145
9. Gyamerah, I.A., and Benjamin, A (2015). Determinants of Bank Profitability in Ghana. International Journal of Accounting and
Financial Reporting, Vol. 5, No. 1, pp.173-187
10. Kasana, S.I. and Naveed, Q.M. (2016). The Determinants of Credit Risk in Commercial Banks of Pakistan.Journal of Poverty,
Investment and Development, Vol. 25, 65-72
11. Kohlscheen, E., Murcia, A., and Contreras, J. (2018). Determinants of bank profitability in emerging markets.BIS Working Papers No.
686, Monetary and Economic Department
12. Laveena and Guleria, K.S. (2016). A Study of Non-Performing Assets of Public Sector Banks in India.International Journal of
Research in Engineering, IT and Social Sciences, Vol. 6, Issue. 4, pp 26-34
13. Nachane, D.M., Narain, Aditya, Ghosh, Saibal, and Sahoo, S (2001). Bank response to capital requirements: Theory and Indian
evidence.MPRA Paper No. 17453
14. Owoputi, J.A., Kayode, O.F and Adeyefa, F.A., (2014). Bank specific, Industry specific and Macroeconomic determinants of bank
profitability in Nigeria.European Scientific Journal, Vol.10, No.25, pp. 408-423
15. Pausch, Thilo and Welzel, Peter. (2002).Credit Risk and the Role of Capital Adequacy Regulation.Discussion Paper Series 224,
Universitaet Augsburg, Institute for Economics
16. Petria, Nicolae, Capraru, Bogdan and Ihnatov, Iulian (2015).Determinants of Banks’ Profitability: Evidence from EU 27 Banking
Systems. Procedia Economics and Finance, Vol. 20, pp. 518-524
17. Poudel, S.R. (2018). Assessment of credit risk in Nepali commercial banks.Journal of Applied and Advanced Research, Vol. 3, No.3,
pp 65-72
18. Reserve Bank of India Bulletin (2018). Volume LXXII Number 5,
https://rbidocs.rbi.org.in/rdocs/Bulletin/PDFs/0BULLMAY20188E3D1D64EF46402A9141C9DBA570066F.PDF
19. Sahoo, Satyananda. (2013). Financial Structures and Economic Development in India: An Empirical
Evaluation.https://www.researchgate.net/publication/260255801_Financial_Structures_and_Economic_Development_in_India_An_Em
pirical_Evaluation
20. Seth, Gaurav (2016).Does Global Capital Adequacy Regulation Hamper Credit Growth? Evidence from Indian Banks. The India
Finance Conference 2016, Indian Institute of Management, Ahmedabad
21. Sheefeni, P J (2015). The Macroeconomic Determinants of Profitability among Commercial Banks in Namibia.Journal of Emerging
Issues in Economics, Finance and Banking (JEIEFB) An Online International Research Journal, Vol. 4 No. 1, pp. 1414 -1431
22. Sing and Chaudhary (2009). Profitability Determinants of Banks in India.International Journal of Global Business, Vol. 2, No. 1, pp.
163-180
23. Sufian (2011). Profitability of the Korean Banking Sector: Panel evidence on bank-specific and Macroeconomics Determinants.Journal
of Economics and Management, Vol. 07, No. 1, pp.43-72.
24. Swamy, V. (2012). Impact of macroeconomic and endogenous factors on nonperforming bank assets.International Journal of Bankin g
and Finance, Vol.9, No. 1(2), pp 27-47
25. Vishwanathan, N.S. (2016). Asset Quality of Indian Banks: Way Forward. National Conference of ASSOCHAM, New Delhi,
https://rbi.org.in/scripts/BS_SpeechesView. aspx?Id=1023
26. Wanjohi, F.M. and Njeru, A (2016). Effect of Management Efficiency on Credit Risk in Deposit Taking Saccos in Kenya. The
Strategic Journal of Business and Change Management, Vol.3, Issue. 2 (41), pp 920-933.
27. Neha Chhabra Roy and Viswanathan, T (2018). Impact of Technological Disruption on Workforce Challenges of Indian Banks –
Identification, Assessment & Mitigation. Report - Indian Institute of Banking and Finance.
28. Tulasi Rao, G. and Lokeswara Rao, T (2015). Role of Information Technology in Indian Banking Sector. IOSR Journal of Busines s
and Management, Vol.17, No. 5, pp. 80-84.
29. Parameswar, Nakul., Dhir, Swati., andDhir, Sanjay (2016). Banking on Innovation: Innovation on Banking at ICICI Bank, Global
Business and Organisational Excellence, Wiley Periodicals Inc., DOI: 10.1002/joe, pp. 7-10
30. Alt, R., and Puschmann, T. (2016). Digitalisierung der Finanzindustrie–Grundlagen der Fintech-Evolution. Springer, Berlin/
Heidelberg.
Paper Title: Mechanical Behaviour of Palm Fiber (Palmyra Spout) – Basalt Fiber - Hybrid Composites
Abstract: In general the natural fibers are taken out from the sources of animals and plants. In recent days
the natural fibers play an important role in engineering applications like automotive, aerospace and marine
industries due to abundant availability, less in cost and zero percentage environment harmless in nature. In this
paper the investigation of various mechanical properties of hybrid reinforced composite (Palm fiber Basalt S-
glass fiber) is been done on the fabricated samples. The different mechanical property includes tensile, hardness
and impact tests etc... The fabrication comprises three layers of Palm and Basalt fibers outer laminated by two
layers of S-glass fibers using injection molding method. From the various testing and investigation against the
test sample it is been concluded that the fibers in the hybrid set took a major role in determining the important
mechanical properties. Thus the fibers present in the hybrid composite increases the strength, stiffness and
weight ratio of the composite materials. The various forms and structural analysis of the hybrid composite
material are processed by using scanning electron microscope for attaining the better results and application
basis.
180.
Keyword : Natural palm and Basalt fibers, glass fibers, Composite Fabrication, Injection moulding, 1064-
Mechanical properties. 1070
References:
1. Stamboulis A, Baillie C and Peijs T. Effects of environmental conditions on mechanical and physical properties of flax fibers.
Composites: Part A 2001; 32: 1105-1115.
2. Biagiotti J, Puglia D and Kenny JM. A Review on Natural Fiber-Based Composites-Part I. Journal of Natural Fibers 2004; 1, 2: 37-68.
3. K.Raju, M.Balakrishnan ‘’Evaluation of mechanical properties of palm fiber/glass fiber and epoxy combined hybrid composite
laminates’’ Materials today proceedings doi: 10.1016/j.matpr.2019.05.359
4. Amir Asadi, Ferdinand Baaij, Hendrik Mainka, Michael Rademacher, Jeffrey Thompson, KyriakiKalaitzidou, “Basalt fibers as a
sustainable and cost-effective alternative to glass fibers in sheet molding compound (SMC)”, Composites Part B 123 (2017).
5. D. Prabu, T. Babu, K. Pradeep & S. Sanjayarun (2018) A review on mechanical properties of intra-layer palm fiber (palmyra spout) –
flax – s-glass fiber reinforced composite. Vol. 8, Issue 3, Jun 2018, 489-498 © TJPRC Pvt. Ltd
6. Bin Hao, Theresa Förster, Edith Mäder, Peng-Cheng Ma “Modification of basalt fiber using pyrolytic carbon coating for sensing
applications” Composites: Part A 101 (2017) 123–128
7. P. Pradeep., J. Edwin Raja Dhas. 2015. Evaluation of Mechanical Property on Palm/Coir Based Polymer Matrix Composites.
Advances in Materials Science and Engineering: An International Journal. 2: 9-16.
8. V. Fiore, T. Scalici, G. Di Bella, A. Valenza , “A review on basalt fiber and its composites”, Composites Part B 74 (2015) 74e94.
9. K.L.Pickering, M.G. AruanEfendy, T.M.Le, (2016) A review of recent developments in natural fibre composites and their mechanical
performance. Part A 83 (2016) 98–112.
10. Summerscales J, Dissanayake N PJ, Virk A S and Hall W. A review of basalt fibers and their composites. Part 1 – Fibres as
reinforcements, and their composites. Part 1 – Fibres as reinforcements. Composites: Part A, 2010; 41: 1329–1335.
Ruqaya Gilal, Mazni Omar, Abdul Rehman Gilal, Mawarny Md Rejab, Ahmed Waqas, Kamal
Authors:
Imran Mohd Sharif
Paper Title: Can Time Pressure and Personality Make any Sense together in Software Engineering?
Abstract: Nowadays, software development failure has become a very serious problem. Inaccurate time
estimation is one of the major causes of the software development failure. Inaccurate time estimation mostly
creates time pressure that causes several negative impacts on software developers’ mental and physical health.
The past studies had also believed that burnouts and job turnover problems happened due to time pressure.
Therefore, the objective of this study is to explore time pressure with human behavior to see if they can make
any relation. By this way, one can explore the hidden patterns between time pressure and human behavior in
software engineering. In order to carry out the study, personality and time pressure studies are explored in
general to see if past studies had ever made any space for software domain. Moreover, based on the limited
selected studies, the literature review identifies that several authors had correlated the time pressure with
personality. Unfortunately, time pressure and software developer personality are not specifically studied
together in software engineering. For that reason, this study leaves some recommendations for researchers to
contribute in the very topic to make software development better.
Paper Title: Active Shape Model based Correlative Assessment of Statistical Parameters to Detect Cataract
Abstract: The lens opacity acquired due to clouding of eye lens causing blindness is called a cataract, its
detection is challenge. Based on positional occurrence of opacity in a lens it is categorized as nuclear sclerotic,
posterior sub-capsular, and cortical cataract. Excessive use of steroids medicines, smoking, ageing, or eye injury
lens cause cataract. Gradual and progressive growth of opacity is occurring in lens due to agglomeration of water
and protein molecules. The maximum reflected rays form object, that focusing at retina lead to clear
understanding of object image. Opacity inside lens causes refraction, reflection and diffraction of reflected light
from object. This affects interpretation of image due to poor retinal reception. The patient may be advised
treatment or change in lifestyle to prohibit the further growth of cataract or to improve vision. Researches are
suggesting methods for detection of cataract from lens images by analysis of color, structural, and optical
parameters. The research work presented uses wide slit illumination lens images for analysis to detect cataract.
Due to elliptical shape of lens proposed system prefers active shape model with region properties to segment
lens structure. Mean pixel value and uniformity are parameters used to distinguish lens without cataract from
lens with cataract. The statistical parameters are dependent on probability of pixel values. Hence, using these
parameters, system can be made invariant to source illumination. Correlation is performed between parameter
vector of input image, and that of known images from database to identify and classify cataract type.
182.
Keyword : cataract, lens image, Active shape model, statistical parameters, correlation. 1076-
1079
References:
1. “Prevalence of cataract and pseudophakia/aphakia among adults in the United States”, The Eye Diseases Prevalence Research Group,
Archives of Ophthalmology, vol. 122, 2004, pp. 488-494.
2. “The World Health Report: Life in the 21st Century – A Vision for All”, World Health Organization, Geneva, 1998.
3. L. T. Chylack, J. K. Wolfe, D. M. Singer, M. C. Leske, “The lens opacities classification system III” Archives of Ophthalmology, vol.
111, 1993, pp. 831-836.
4. B. E. K. Klein, R. Klein, K. L. P. Linton, Y. L. Magli, M. W. Neider, “Assessment of Cataracts from Photographs in the Beaver Dam
Eye Study”, Ophthalmology, vol. 97, 11, 1990 pp. 1428-1433.
5. J.Nayak, “Automated Classification of Normal, Cataract and Post Cataract Optical Eye Images using SVM Classifier”, Proceedings of
the World Congress on Engineering and Computer Science 2013, vol. 1, 2013.
6. Y. Xu, X.Gao, S.Lin, D.Wing, K.Wong, J.Liu, D.Xu, C.Y. Cheng, C.Y. Cheung, T.Y.Wong , “Automatic Grading of Nuclear Cataract
from Slit-Lamp Grading Images Using Group Sparsity”, Regression Medical Image Computing and Computer-Assisted Intervention-
MICCAI 2013, Lecture Notes in Computer Science, vol. 8150, 2013, pp. 468-475.
7. X. Gao, D.W.K. Wong, T. T. Ng, C.Y. L. Cheung, C.Y. Cheng, T. Y. Wong, “Automatic Grading of Cortical and PSC Cataracts Using
Retroillumination Lens Images”, Computer Vision –ACCV 2012, Lecture Notes in Computer Science, vol. 7725, 2013, pp. 256-267.
8. R. Supriyanti, Y. Ramadhani, “ Consideration of Iris Characteristic for Improving Cataract Screening Techniques Based on Digital
Image” 2nd International Conference on Biomedical Engineering and Technology IPCBEE-2012, vol. 34, 2012, pp. 126-129.
9. R. Supriyanti, Y. Ramadhani, “The Achievement of Various Shapes of Specular Reflections for Cataract Screening System Based on
Digital Images”, International Conference on Biomedical Engineering and Technology IPCBEE 2011, vol. 11, 2011, pp. 75-79.
10. W.Huang, K. L.Chan, H.Li, J.H.Lim, J.Liu, And T.Y.Wong, “A Computer Assisted Method for Nuclear Cataract Grading From Slit-
Lamp Images Using Ranking”, IEEE Transactions On Medical Imaging, vol. 30, 1, 2011, pp. 94-107.
Paper Title: The Impact of Building Orientation on Energy Consumption in a Domestic House in Desert Climate
Abstract: Morocco has set the goal of introducing new methods of construction and positioning among the
leaders in the African continent in the field of renewable energy and sustainable buildings, efforts are therefore
focused on developing an energy efficiency policy. Orientation is one of the key factors that impact building’s
energy consumption, it’s a very important factor to consider in order to avoid summer overheating and limit
winter losses. The purpose of this scientific article is to study the impact of the orientation of a house on its
annual energy needs in terms of heating and cooling essentially, but also its internal and solar energy gains and
its losses in relation with infiltration, transmission and ventilation. In this regard, simulations were carried out
with eight different possible orientations on a small house, located in one geographical area known by its desert
climate. The final purpose is to determine the suitable orientation for dwellings in this geographical area for
energy saving while guaranteeing the thermal comfort. Based on our analysis, it was revealed that a well-
orientated house can save a considerable amount of energy throughout its life cycle.
184. Keyword : Building energy consumption, Building orientation, Energy Efficiency, energy saving,
Sustainability. 1087-
References: 1096
1. International Energy Agency, “Energy Policies Beyond IEA Countries - Morocco 2014”, 10 October 2014, 132 Pages, ISBN PDF: 978-
92-64-21148-3, All rights reserved.
2. International Energy Agency, “Energy Policies Beyond IEA Countries - Morocco 2019”, 7 Mai 2019, 158 Pages, ISBN PDF: 978-92-
64-21148-3, All rights reserved.
3. International Energy Agency, The United Nations Environment Programme (2018), The
Global Alliance for Buildings and Construction (GlobalABC). “2018 Global Status Report: Towards a zero-emission, efficient and
resilient buildings and construction sector”, 2018, ISBN No: 978-92-807-3729-5, Copyright © United Nations Environment
Programme, 2018.
4. Agence Nationale Pour le Développement des Energies Renouvelables Et De L’efficacité Energétique « Les bonnes pratiques de
l’Efficacité Énergétique dans le bâtiment»
5. The Solar Energy Laboratory, University of Wisconsin-Madison “Trnsys 16 a Transient System Simulation Program, Volume 1
Getting Started”, 2007.
6. Meteotest: Jan Remund, Stefan Müller, Stefan Kunz and Christoph Schilter “Meteonorm: Global Meteorological Database” Handbook
Part I, Software Version 7/ May 2012“©Meteotest.
7. Services of Windfinder.com GmbH & Co. KG. Version: 2019-03-13,
https://fr.windfinder.com/windstatistics/errachidia_moulay_ali_cherif. 2019
8. Benoit Beckers, “Le Diagramme Solaire” 2004, http://www.heliodon.net/downloads/Beckers_2004_Ir_Le_diagramme_solaire.pdf.
185. Paper Title: Integrated Triple Notch Bands Compact UWB Antenna for Wireless Communications
Abstract: To Suppress Conventional Narrow Band Communication Technologies From The UWB 1097-
Frequency Band An Integrated Triple Notch Bands Compact UWB Antenna Is Proposed. Band Notches Are 1100
Wimax (3.1-3.8 Ghz) ,WLAN(4.8-5.825 Ghz) And X Band (6.5-7.5 Ghz).To Attain UWB Frequency Band 2.9-
14.5 Ghz From Compact UWB Antenna Introduced Slots In A Rectangular Patch With DGS. The Projected
Compact UWB Antenna Arrangement Is Made-Up On FR4 Substrate With VSWR Is Less Than 2 Except For
Selected Notched Bands. The Proposed UWB Design Is Suitable For Impenetrable Surroundings For
Wimax/WLAN/X Band Dense. The Partial Defective Ground Structure Is Proposed To Improve Impedance
Matching And Impedance Bandwidth Is Utilized.
Paper Title: Leaving Habitat of Wild Animals in Gir National Park : a Critical Scenario and a Possible Solution
Abstract: Wild animals are the ecosystem's main link. Wildlife is important to humans because it maintains
a balance between the active environment and biotic factors. It plays an important role in making the various
natural processes of nature stable. The tradition of protecting wildlife species and their ecosystems is wildlife
conservation. In India the Asiatic lion is the wild animals species which has lowest population in the world. The
government established Gir National Park to protect the Asiatic lion and start various programs through in which
the population of Asiatic lion should increase. Even other such programs this wild animals faces lots of problem
in the national park. This paper addresses the wild animals in India relevant issues and concerns. After the
problems we have found, we have suggested a potential solution to these problems. The system uses the
Wireless Sensor Network (WSN) platform. This shows how WSN can be seamlessly integrated into the wildlife
habitats / national park located in India to enhance the wildlife design.
Paper Title: Contextualization using Context-Aware Publish and Subscribe (CAPS) based on IoT
189. Abstract: The Internet of Things (IoT) activates massive data flow in the real world. Each computer can
presently be linked to the internet and supply useful decision-making information. Virtually sensors are 1112-
implemented in every aspect of life. From different sources of sensors can produce raw data. Due to the various 1119
data sources, the method of extracting information from the flow of data is mostly complicated, networks
inadequate and criteria for real-time processing. In addition, an issue of context-aware data processing and
architecture also present, despite the fact that they are essential criteria for stronger IoT structure. In order to
meet this issue, we recommend a Context-aware Internet of Things Middleware (CAIM) architecture. This
enables the incorporation of highly diverse IoT application context information by using light weigh protocol
MQTT (Message Queue Telemetry Transport) for transmitting basic data streams from sensors to middleware
and applications. In this paper, we propose a contextualization which means that obtain data from sensors of
different sources. First have to create a context profile with the help of context type like user, activity, physical,
and environment context. Then also is create a profile by using attributes. Finally, raw data can be change into
contextualized data through CAPS (context-aware Publish-Subscribe) hybrid approach. This paper discusses the
current context analysis strategies that use either rational models or probabilistic methods exclusively. The
evaluation of identifying contextualization methods shows the shortcomings of IoT sensor data processing as
well as offers alternative ways of identifying the context.
Authors: K .Hema Latha, Kamran Ahmed Khan, Syed Asim Minhaj, Mohd Shais Khan
Paper Title: Design and Fatigue Analysis of Shot Peened Leaf Spring
Abstract: The paper handles the fatigue and failing analysis of serial shot-peened leaf springs of
190. cumbersome vehicles emphasizing on the impact of shot peening on fatigue life, coping with automotive leaf
springs, the shot peening method turns into an important step in production.In the situation of leaf spring 1120-
suspensions, however, asystematic research of the effect of shot peening about fatigue life isstill required. 1126
Experimental stress-life curves are determined with the aid of the usage of investigating clean specimen
subjected to shot peening. those test consequences are as compared to corresponding ones identified from cyclic
three-point test on shot peened serial leaf springs in order to show the influence of applied heat treatment and
shot peening approach on fatigue existence of high-strength used to get leaf spring manufacturing, reliant on the
load level. Analyses are performed to explain the effects resulting from shot peening practice on the surface
features of the high-strength spring steel under examination. The evaluation of fatigue results shows that almost
no life improvement due to production highlighting the importance for mutual variation in parameters of shot
peening and thermal treatment so that there is sufficient progress in life.
Keyword : shot peening; fatigue life; automotive leaf springs; high strength
References:
1. Renzhi Wang, Ru Jilai. On the Same Problems In the Surface Strengthening Treatment of Valve Sping for the Automobile
Combustion [J]. China Surface Engineering, 2000, 13(2):38-41 (in Chinese)
2. Wuyan Chu, et al. Stress Corrosion Cracking in Mild Steel Under Compressive Stress [J]. ScriptaMetalurgica, 1984,18:579-582
3. Renzhi Wang. Residual Stress and Fatigue Properties of Spring [J]. Physical Testing and Chemical Analysis Part A: Physical Testing.
2005,41 (11)
4. M.T.Todinov. Proceedings of 10 th National Spring Scientific Report, 8th National .
5. Spring Failure Analysis and Symposium of Spring Specialities Across the Taiwan Straits, Gueiling China. 2004:94-104
6. Zhang Yinghuai, et al. Spring Handbook [M]. Mechanical Industrial Press.1997:87
7. MargerelO’molley BSC. Stress Relaxation of Spring [J]. Wire Industry. 1988, 12: 88
8. SuDeda, Low Temperature Heat Treatment and Stabilized Treatment of Springs [J]. Spring Engineering, 2002, 3: 4-10
9. Renzhi Wang. Yao Mei, et al. Micro-Meso-Process Theory of Fatigu Crack Initiation and Theory of Internal Fatigue Limit [J].
Transactions of Metals and Heat Treatment, 1995,16(4):26
10. Liu Suo (Renzhi Wang). Fatigue Property of Metals and Shot Peening Strengthening Technology [M]. Defence Industry Press, 1977:
79
11. Xu Jiazhi, et al. The Fatigue Strength and Fracture Morfbology of Leaf Spring Steel After Prestressed Shot Peening [C]. Proce edings
of 1th International Conference on Shot Peening, Paris, France, 1981.
12. R.L.Mattson, J.G.Roberts. Internal Stress and Fatigue of Materials [M]. 1959
Keyword : language attitude, speech community, language maintenance, language development, language
situation, bilingualism, language use, perception.
References:
1. Appel, R. and P. Muysken. 1987. Language Contact and Bilingualism. Language in Society. Cambridge University Press, London and
Baltimore, MD: Edward Arnold. Pp. 403-454.
2. Baishya, Ajit Kumar. 2008. Bilingualism and North-East India, Silchar: Assam University, 1 stPublished.
3. Bloomfield, Leonard. 1935. Language, Motilal Banarsidass Publications, Delhi-110007.
4. Boruah, Bhimkanta. 2003. Asamar Bhasa, Dibrugarh: Banalata Publication, 4 th Edition.
5. Chaklader, Snehamoy. 1990. Sociolinguistics a Guide to Language Problem in India, New Delhi: Mittal Publication, First Edition.
6. Crystal, David. 1997. A Dictionary of Linguistics and Phonetics. Blackwell Publishing, 9600 Garsington Road, Oxford OX4 2DQ,
UK.
7. Dittmar, Norbart. 1976. Sociolinguistics a Critical Survey of Theory and Applications, University of Konstanz,Adward Arnold
(Publishers) Ltd., London.
8. Eagly, A. H. & Chaiken, S. 2005. Attitude Research in the 21 st Century: The Current State of Knowledge. In D. Albarrecin, B. T.
Johnson, & M. P. Zanna (Eds.), The Handbook of Attitudes (pp. 743-
9. 767). Mahwah, NJ, US:Lawrence Erlbaum Associates Publishers.
10. Fasold, Ralph W. 1987. The Sociolinguistics of Society. Oxford: England, New York: NY, USA, Blackwell Publishing.
11. Fishman, Joshua A., Ed. 1976. Advances in the Sociology of Language, Vol - I, Paris: Yeshiva University, 2 nd Edition.
12. Goswami, S. N. 1994. Studies in Sino-Tibetan Language, Guwahati: Published by Mondira Goswami, 1st Edition.
13. Griearson, G. A. 1967. Linguistic Survey of India, Vol. III, Part: II, New Delhi, Monital Banersidas.
14. Hall, Christepher J. 2008. An Introduction to Language and Linguistics Breaking the Language Spell, Continuum International
Publishing Group, New York.
15. Hakacham, Upen Rabha. 2003. Asamiya aru Asamar Bhasa-Upabhasa, Jyoti prakashan, Guwahati, First edition.
16. Hudson, R.A. (1980). Sociolinguistics, Cambridge University Press, New York.
17. Hymes, Dell. 1977. Foundations in Sociolinguistics An Ethnographic Approach, London.
18. Tavistock Publication Limited, First Published.
19. Kerlinger and Neuman. 1973. Foundations of Behavioural Research. New York: Holt, Rinehart and Winston.
20. Labov, William. 1985. Sociolinguistic Patterns, UK: Basil Blackwell Ltd., Oxford OX4 1JF.
21. Lamlert, Wallece E. 1967. A Social Psychology of Bilingualism, Journal of Social Issue, Vol. 23, Issue 2, McGill University.
22. Lightbown, P. M., Spada, N. 2006. How Languages are Learned. Oxford University Press.
23. Lyons, John. 2007. Language and Linguistics An Introduction, United Kingdom: Cambridge University Press, Cambridge CB2 2RU.
24. Newmeyer, Frederick J. Ed. 1988. Linguistics: The Cabridge Survey, Vol-IV, Language : The Socio-Cultural Context, Cambridge
University Press, Cambridge.
25. Miri, Mrinal. Ed. 2003. Linguistic Situation in North-East India, New Delhi: Concept Publishing Company, 2 nd Edition.
26. Mohanty, Ajit K. 1994. Bilingualism in a Multilingual Society: Psycho-Social and Pedagogical Implications. Mysore: Central Institute
of Indian Languages, First Published.
27. Oestreicher J. P. 1974. The Early Teaching of Modern Language and Education and Culture, Europe:Review of the Council for
Cultural.
28. Pattanayak, Debi Prasanna. Ed. 2007. Multilingualism in India, Orient Longman, 1st Edition.
29. Petty, E. Richard and Cacioppo, John T. 1981. Personal Involvement as a Determinant of Argument Based Persuasion, Journal of
Personal and Social Psychology, American Psychological Association. Vol. 41, No. 5, pp. 847-855.
30. Romaine, Suzanne. 1995 Bilingualism (2nd Ed.). Oxford: Blackwell. Pp. xvi+384.
th
31. Spolsky, Bernard. 2003. Sociolinguistics, Oxford University Press, 4 Impression.
32. Trudgill, Peter. 1995. Sociolinguistics : An Introduction to Language and Society, London: Published by Penguin Group, Revised
Edition.
Paper Title: ICONS: a Mobile Application for Introduction Culture of North Sulawesi
Abstract: Indonesia has a very artistic and cultural diversity. Currently the lack of knowledge about the
culture and art of their own country is an issue that is being experienced. Now the lack of means of support in
getting information about Indonesian art and culture, thereby lowering the curiosity about the culture and art of
Indonesia itself. North Sulawesi is a province in Sulawesi islands where lies the province on the northern tip of
Sulawesi island directly adjacent to the Philippines Country. North Sulawesi as an area that has a lot of cultural
diversity begins from historic sites, traditional houses, traditional clothing, to the beautiful tourism place in
North Sulawesi. With provided a means of education in the information provider will provide a media to share
information about the culture in North Sulawesi. Therefore, it is necessary to develop applications Introduction
to Cultural North Sulawesi, which is the application of information systems to the concept mobile based
application that is expected to attract interest in giving and receiving information about the cultures that exist in
North Sulawesi. In the development of this application using methods developed Multimedia Development Life
Cycle (MDLC) which starts from the concept phase to the distribution phase.
Paper Title: Expert System for Chili Plants Disease Detection using Certainty Factor Method
Abstract: This paper describes the creation of an expert system that is used to diagnose diseases in chili
plants using a web-based certainty factor method. This expert system is made based on the weight of symptoms
by experts so that users can find out the disease suffered by chili plants based on symptoms that arise. The
symptom weight was calculated using the certainty factor method. This method is used to accommodate
uncertainties that are often expressed by experts when detecting a disease. The design and manufacture of this
expert system are done using the PHP programming language, MySQL database, CSS and the CodeIgniter
framework. The results of the analysis between expert and expert systems have 87.09% compatibility level, and
based on the calculation of the feasibility of the system with the Delone and McLean model shows that 77.58%
of respondents agree Pakarcabaiku.com is a successful system for detecting chili disease.
Keyword : Certainty Factor, Chili Plants, Delone and McLean Model, Disease, Expert System.
References:
1. Kurniawan, H., & Rahmad, I. F. (2012). Perancangan Sistem Pakar Untuk Mendeteksi Penyakit Pada Tanaman Cabe Dengan Metode
Certainty Factor. CCIT Journal, 5(2), 186-206.
2. Rahayu, E. M. (2018). Membangun Smart City dengan Kecerdasan Buatan | SWA.co.id. Retrieved September 13, 2019, from
https://swa.co.id/swa/trends/membangun-smart-city-dengan-kecerdasan-buatan
3. Kusrini, S. (2006). Sistem Pakar Teori dan Aplikasi. Yogyakarta: Andi Offset.
193. 4. Ibrahim, H. (2015). Menanam Cabai di Musim Kemarau | hortikultura. Retrieved October 3, 2019, from
http://hortikultura.pertanian.go.id/?p=333 1145-
5. Syukur, M., Yunianti, R., & Dermawan, R. (2016). Budidaya cabai panen setiap hari: In Budidaya cabai panen setiap hari (p. 154). 1151
Penebar Swadaya Grup.
6. Turban, E., E. Aronson, J., & Liang, T.-P. (2007). Decision Support Systems and Business Intelligence. Decision Support and Business
Intelligence Systems, 7/E, 1–35. https://doi.org/10.1017/CBO9781107415324.004
7. Surya, R. (2017). Rancang Bangun Sistem Pakar Untuk Deteksi Penyakit Tuberkulosis Paru Menggunakan Metode Certainty Factor
Berbasis Web. Thesis. Universitas Multimedia Nusantara.
8. Halim, S. (2014). Rancang Bangun Sistem Pakar Pendeteksi Resiko Osteoporosis dan Osteoarthritis dengan Metode Certainty Factor
Berbasis Android. Thesis. Universitas Multimedia Nusantara.
9. Winanto, T. (2016). Sistem pakar diagnosa hama dan penyakit tanaman cabai besar menggunakan metode certainty factor. Skripsi.
STMIK Sinar Nusantara Surakarta.A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate
adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.
10. Husna, E. (2010). Implementasi certainty factor dalam sistem pakar berbasis web untuk mendiagnosa penyakit cerebrovaskular disease
(cvd) atau stroke. Thesis. Universitas Islam Negeri Sultan Syarif Kasim Riau.
11. Windhamia, K. (2017). Apa itu sistem pakar? Retrieved from https://students.warsidi.com/2017/06/pengertian-sistem-pakar-
adalah.html
12. Sutojo, T., Mulyanto, E., & Suhartono, V. (2011). Kecerdasan buatan.
13. Halim, S., Hansun, S. (2015). Penerapan Metode Certainty Factor dalam Sistem Pakar Pendeteksi Resiko Osteoporosis dan
Osteoarthritis. ULTIMA Computing, 7(2), 59-69.
14. Puspitasari, D. (2012). Sistem Pakar Diagnosa Diabetes Nefropathy Dengan Metode Certainty Factor Berbasis Web dan Mobile.
Politeknik Elektronika Negeri Surabaya ITS.
15. Jayawardanu, I.H.W., Hansun, S. (2015). Rancang Bangun Sistem Pakar untuk Deteksi Dini Katarak Menggunakan Algoritma C4.5.
ULTIMA Computing, 7(2), 48-58.
16. Veronica, O., Hansun, S. (2015). Web Based Gastric Cancer Expert System Detection Using Forward Chaining. Proc. of International
Conference on New Media – Global Society and New Media (CONMEDIA 2015), Tangerang, Indonesia.
Paper Title: Hadoop based Parallel Machine Learning Algorithms for Intrusion Detection System
Abstract: Web use and digitized information are getting expanded each day. The measure of information
194. created is likewise getting expanded. On the opposite side, the security assaults cause numerous security dangers
in the system, sites and Internet. Interruption discovery in a fast system is extremely a hard undertaking. The
1152-
Hadoop Implementation is utilized to address the previously mentioned test that is distinguishing interruption in
1156
a major information condition at constant. To characterize the strange bundle stream, AI methodologies are used.
Innocent Bayes does grouping by a vector of highlight esteems produced using some limited set. Choice Tree is
another Machine Learning classifier which is likewise an administered learning model. Choice tree is the stream
diagram like tree structure. J48 and Naïve Bayes Algorithm are actualized in Hadoop MapReduce Framework
for parallel preparing by utilizing the KDDCup Data Corrected Benchmark dataset records. The outcome
acquired is 89.9% True Positive rate and 0.04% False Positive rate for Naive Bayes Algorithm and 98.06% True
Positive rate and 0.001% False Positive rate for Decision Tree Algorithm.
Keyword : Big data, Decision Tree, Hadoop Framework, Intrusion Detection, Machine Learning, Naïve
Bayes.
References:
1. M. Usha and P. Kavitha, "Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier",
Wireless Networks, vol. 23, no. 8, 2016, pp. 2431-2446.
2. T. Abbes, A. Bouhoula and M. Rusinowitch, "Efficient decision tree for protocol analysis in intrusion detection", International Journal
of Security and Networks, vol. 5, no. 4, 2010, p. 220.
3. A. Kaur, S. Pal and A. Singh, "Hybridization of K-Means and Firefly Algorithm for intrusion detection system", International Journal
of System Assurance Engineering and Management, vol. 9, no. 4, 2017, pp. 901- 910.
4. W. Yu and H. Lee, "An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI
Decision Tree Methods", Intelligence and Security Informatics, 2009, pp. 155-160.
5. S. Lim and Y. Choi, "Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks", Journal of Sensor and
Actuator Networks, vol. 2, no. 1, 2013, pp. 70-84.
6. E. Shams and A. Rizaner, "A novel support vector machine based intrusion detection system for mobile ad hoc networks", Wireless
Networks, vol. 24, no. 5, 2017, pp. 1821-1829.
7. P. Natesan, R. Rajalaxmi, G. Gowrison and P. Balasubramanie, "Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion
Detection", International Journal of Parallel Programming, vol. 45, no. 5, 2016, pp. 1194-1213.
8. I. Krontiris, T. Giannetsos and T. Dimitriou, "LIDeA", Proceedings of the 4th international conference on Security and privac y in
communication netowrks - SecureComm '08, 2008.
9. M. Sun and J. Chen, "Research of the traffic characteristics for the real time online traffic classification", The Journal o f China
Universities of Posts and Telecommunications, vol. 18, no. 3, 2011, pp. 92-98.
10. M. Zhao, B. Jia, J. Wang, M. Wu and H. Yu, "Performance Optimization on Dynamic Adaptive Streaming over HTTP in Multi-User
MIMO LTE Networks", IEEE Transactions on Mobile Computing, vol. 17, no. 12, 2018, pp. 2853-2867.
Paper Title: Automated Traffic Sign Recognition System using Computer Vision
Abstract: There are many existing companies who are developing cars on the autonomous driving
technology. With the help of GPS and internet connectivity they create a dynamic map which helps the cars to
navigate. This technology is still new and undergoing rigorous changes. There are many shortcomings to this
existing technology. They are capable of navigating through those areas which are accounted for and surveyed
but when the car enters in any unchartered terrain or there is any internet connectivity issues, the updation in the
map is not possible, which leaves the car to navigate on its own. This can cause many troubles like you can get
late or maybe lost. So to overcome these problems we need such an intelligent system with the help of camera
feeds can monitor and identify the traffic signals dynamically. Traffic sign recognition is based on Advanced
Driving Assistance System (ADAS) which is used by vehicles to recognise various traffic signs ahead. The
system takes continuous video input from the dashboard camera or the camera mounted on the bonnet of the car.
The underlying algorithm extracts the features of the input image and matches them with an existing library of
traffic sign. The output is fed to the driving assistance system and it in turn drives the car accordingly. This
intelligent system uses computer vision. This device will take camera feeds and upgrade the ADA system
instantaneously. The algorithm has been implemented using Python language.
Keyword : Traffic signal recognition, Support vector machine, ADA, image segregation.
195. References:
1. An Automatic Traffic Sign Detection and Recognition System Based on Colour Segmentation, Shape Matching, and SVM,Safat B.
Wali, Hannan M A, Aini Hussain, Salina Abdul Samad, Department of Electrical, Electronic & Systems Engineering, 2015
1157-
2. Kernel based automatic traffic sign detection and recognition using SVM, AnjanGudigar, B. N. Jagadale, Mahesh P.k., 1160
RaghavendraU, Department of Instrumentation andControl Engineering, Manipal Institute of Technology, Manipal, 2012
3. Vision-Based Traffic Sign Detection and Analysis for Intelligent Driver Assistance Systems: Perspectives and Survey, Publisher:
IEEE, Andreas Mogelmose; Mohan Manubhai Trivedi; Thomas B. Moeslund
4. Traffic Sign Recognition Using Visual Feature toward Driver Assistance System, springer, Juan Cao, Lu Lou, Yingchun Zhang, 20 12.
5. Traffic Sign Classification with a Convolutional Network, A. Staravoitau, 2018
6. K. GUAN. B. AI. M. NICOLAS. R.GIESE. A.MOLLER. Z. ZHONG, and T. Kurner, “On the influence of scattering from traffic
signs in vehicle-to-X communications,” IEEE Trans. Veh. Technol. Aug 2016
7. Duan, J. and Viktor,”Real time road edges detection and road signs recognition”. In international Conference on Control, Automation
and Information Sciences (2015).
8. Ren , S. , Girshick , R., Girshick , R., and Sun , J .,“Towards real time object detection with region proposal networks” , I EEE trans.
Pattern Analysis & Machine Intelligence(2017).
9. Zeng, Y., Xu., Shen, D., Fang, Y., and Xiao, Z.,” Traffic sign recognition using kernel extreme learning machines with deep
perceptual features”, IEEE Trans. Intelligent Transportation Systems(2017).
10. Zhu, Z., Liang, D. Zhang, S., Huang, X., Li, B., and HU, H. ,” Traffic sign detection and classification in wild”, in Compute r Vision
and Pattern Recognition(2018)
11. S. Houben. J.Stalkamp, J.Dsalmen,M.Schlipsing, and C.Igel,” Detection of traffic signs in real world images:The German traffic sign
detection
12. 12. M.Tan. B. Wang, Zu, j. Wang. And G.Pan, “Weakly supervised metric learning for traffic sign recognition in a LIDAR-equipped
vehicle,” IEEE Trans. Intell. Transp. Syst. (2016)
13. Color Balance and Fusion for Underwater Image Enhancement Codruta O. Ancuti; Cosmin Ancuti; Christophe De Vleeschouwer;
Philippe Bekaerthttps://ieeexplore.ieee.org/document/8058463/authors#authors
14. Deep Convolutional Neural Network for Inverse Problems in Imaging Kyong Hwan Jin; Michael T. McCann; Emmanuel Froustey;
Michael Unser https://ieeexplore.ieee.org/document/7949028
15. ConnNet: A Long-Range Relation-Aware Pixel-Connectivity Network for Salient Segmentation Michael Kampffmeyer, Nanqing
Dong, Xiaodan Liang, Yujia Zhang, Eric P. Xing
16. T. Ben-Bassat and D. Shinar, ‘‘The effect of context and drivers’ age on highway traffic signs comprehension,’’ Transp. Res. F,
Traffic Psychol. Behav., vol. 33, pp. 117–127, Aug. 2015.
Authors: Caroline El Fiorenza, Sandeep Kumar Barik, Ankit Prajapati, Sagar Mahesh
Paper Title: A New Plug in EV Strategy for Mitigation of Power Variations in Distribution systems
Abstract: Increasing penetration levels of renewable energy sources in electrical grid distribution systems
causes raped power variations drawing from the penetration levels variation in electrical vehicle charging creates
the problem in the unity grid. In this paper a new artificial intelligence control technique is introduced in
electrical vehicles in order to reduce the power variations caused by the solar power and high low demand. The
fluctuations in electrical vehicle scheduling with energy storage has been studied the main effort is the
minimizing of power variations in slack bus from the specified value and high utilization storage capability.
Energy forecasting and renewable power generation are major considerations in electrical vehicle scheduling.
The fuzzy technique is used to define power storage rate of electrical vehicles. Buttery life time was taken as key
aspect and parameters that cause buttery degradation are considered while prioritizing PEVs for grid support.
However, primary purpose of PEV (to travel) is given highest priority by ensuring maximum energy level before
starting a trip.
197. Keyword : PEV, ESU, Fuzzy controller, load scheduling and flattening.
1166-
References: 1171
1. N. Rotering and M. Ilic, “Optimal charge control of plug-in hybrid electric vehicles in deregulated electricity markets,” IEEE Trans.
Power Syst..,vol. 26, no. 3, pp. 1021-1029, Aug. 2011.
2. 2. F. Guo, E. Inoa, W. Choi, and J. Wang, “Study on global optimization and control strategy development for a PHEV charging
facility,” IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2431-2441, Jul. 2012.
3. Basha, CH Hussaian, C. Rani, and S. Odofin. "A review on non-isolated inductor coupled dc-dc converter for photovoltaic grid-
connected applications." International Journal of Renewable Energy Research (IJRER) 7.4 (2017): 1570-1585.
4. S. Kushalini, J. M. Solanki, and N. N. Schulz, “ Development of 3-phase unbalanced power flow using PV and PQ models for DG and
study of impact of DG models,” IEEE Trans. Power Syst., vol. 22. No. 3, pp. 1019-1025, Aug. 2007.
5. Global, E. V. “Outlook 2016, Beyond one million electric cars.” International Energy Agency: France (2016).
6. S. Deilami, A. S. Masoum, P. S. Moses, and M. A. S. Masoum, “ Real-time coordination of plug-in electric vehicle charging in smart
grids to minimize power losses and improve voltage profile,” IEEE Trans. Smart Grid, vol. 2, no. 3, pp. 456-467, Sep. 2011.
7. K. Clement-Nyns, E. Heasen, and J. Driesen, “The impact of charging hybrid plug-in electric vehicles on a residential distribution grid,”
IEEE Trans Psys., vol. 25, no. 1, pp. 371-380, Feb. 2010.
8. H. Sikai and D. Infield, “The impact of domestic plug-in hybrid el;ectric vehicles on power distribution system loads,” in Proc. Int.
Conf. Power syst. Technol. (POWERCON), Hangzhou, chaina, 2010, pp. 1-7.
9. Padiha-Feltrin, Antanio, Darwin Alexis Quijano Rodezno, and Roberto Asnches Mantovani. “Volt-VAR Multi objective Optimization to
peak-load relief and energy efficiency in distribution networks.” IEEE Transactions on Power Delivery 30.2 (2015): 618-626.
Paper Title: A New Pattern Mining Algorithm for Analytics of Real-Time Internet of Things Data
Abstract: The rise of IoT Real time data has led to new demands for mining systems to learn complex
models with millions to billions of parameters, which promise adequate capacity to digest massive datasets and
offer powerful predictive analytics. To support Big Data mining, high-performance powerful computing
platforms are required, which impose regular designs to unleash the full power of the Big Data. Pattern mining
poses a lot of interesting research problems and there are many areas that are still not well understood. The
specifically very elementary challenges are to understand the meaningful data from the junk data that anticipated
into the internet, refer as “Smart Data”. Eighty-five percent of the entire data are noisy or meaningless. It is a
199. very tough often assigned to verify and separate to refine the data from the noisy junk. Researchers’ are
proposing an algorithm of distributed pattern mining to give some sort of solution of the heterogeneity, scaling 1178-
and hidden Big Data problems. The algorithm has evaluated in parameters like cost, speed, space and overhead. 1183
Researchers’ used IoT as the source of Big Data that generates heterogeneous Big Data. In this paper, we are
representing the results of all tests proved that; the new method gives accurate results and valid outputs based on
verifying them with the results of the other valid methods. Also, the results show that, the new method can
handle the big datasets and decides the frequent pattern and produces the associate rule sets faster than that of
the conventional methods and less amount of memory storage for processing. Overall the new method has a
challenging performance as regard the memory storage and the speed of processing as compared to the
conventional methods of frequent pattern mining like Apriori and FP-Growth techniques.
Keyword : Internet of Things, Pattern Mining, Real time analytics, Big data
References:
1. De Francisci Morales, G. (2013, May). SAMOA: A platform for mining big data streams. In Proceedings of the 22nd internation al
conference on World Wide Web companion (pp. 777-778). International World Wide Web Conferences Steering Committee.,
2. Sun, Y., & Han, J. (2013). Mining heterogeneous information networks: a structural analysis approach. ACM SIGKDD Explorations
Newsletter, 14(2), 20-28.
3. Paul, Sujni. "Parallel and distributed data mining." New Fundamental Technologies in Data Mining. InTech, 2011.
4. Da Silva, J. C., Giannella, C., Bhargava, R., Kargupta, H., & Klusch, M. (2005). Distributed data mining and agents. Engineering
Applications of Artificial Intelligence, 18(7), 791-807.
5. Qian, M., & Zhai, C. (2014, November). Unsupervised Feature Selection for Multi-View Clustering on Text-Image Web News Data. In
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (pp. 1963 -1966).
ACM. Xiao Cai, Feiping And Nie and Heng Huang, “Multi View K-Means Clustering On Big Data Proceedings of the Twenty Third
International Joint Conference On Artificial Intelligent
6. Motegaonkar, V. S., & Vaidya, M. V. (2014). A Survey on Sequential Pattern Mining Algorithms. International Journal of Computer
Science and Information Technologies (IJCSIT), 5(2), 2486-2492.
7. R. Ahmed and G. Karypis, “Algorithms for Mining the Evolution of Conserved Relational States in Dynamic Networks,” Knowledge
and Information Systems, vol. 33, no. 3, pp. 603-630, Dec. 2012.
8. M.H. Alam, J.W. Ha, and S.K. Lee, “Novel Approaches to Crawling Important Pages Early,” Knowledge and Information Systems,
vol. 33, no. 3, pp 707-734, Dec. 2012.
9. S. Aral and D. Walker, “Identifying Influential and Susceptible Members of Social Networks,” Science, vol. 337, pp. 337 -341, 2012.
10. A. Machanavajjhala and J.P. Reiter, “Big Privacy: Protecting
11. Confidentiality in Big Data,” ACM Crossroads, vol. 19, no. 1,pp. 20-23, 2012.
12. R. Agrawal, T. Imielinski, and A. Swami. Database Mining: A Performance Perspective. IEEE Transactions on Knowledge and Data
Engineering, 5(6), pp. 914–925, 1993.
13. Nasreen, S., et al., (2014) " Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A
Survey", Procedia Computer Science,37: p. 109-116.
14. Motegaonkar, V. S., & Vaidya, M. V. (2014). A Survey on Sequential Pattern Mining Algorithms. International Journal of Computer
Science and Information Technologies (IJCSIT), 5(2), 2486-2492.
15. Fan, W., &Bifet, A. (2013). Mining big data: current status, and forecast to the future. ACM SIGKDD Explorations Newsletter, 14(2),
1-5.
16. Park, B. H., &Kargupta, H. (2002). Distributed data mining: Algorithms, systems, and applications.
17. Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. Knowledge and Data Engineering, IEEE Transactions on,
26(1), 97-107. (LR).
18. Gupta, R. (2014). Journey from Data Mining to Web Mining to Big Data. arXiv preprint arXiv:1404.4140.
19. Renjit, J. A., &Shunmuganathan, K. L. (2010). Mining the data from distributed database using an improved mining algorithm. arXiv
preprint arXiv:1004.1677.
20. Tsai, C. W., Lai, C. F., Chiang, M. C., & Yang, L. T. (2014). Data mining for internet of things: A survey. Communications Su rveys &
Tutorials, IEEE, 16(1), 77-97.
Paper Title: An Exploration on Privacy Concerned Secured Data Sharing Techniques in Cloud
Abstract: Cloud service is the most popular environment utilized by millions of users for different kind of
service utilization. Cloud services needs to be provided with the concern of satisfying user requirements to
increase their popularity level. The main issues associated with cloud service handling are maintaining integrity
of data, user management, secured data transmission and so on. These issues are addressed by various authors by
introducing the different methodologies. In this analysis work, discussion about those research techniques has
been given with the detailed explanation. This paper provides the overview about the different research
techniques whose main goal is to achieve the increase the data integrity level of the shared data. This paper also
provides the discussion about various dynamic grouping techniques which tends to provide more flexible access
to the user revocation. Different research techniques proposed by various authors has been described and
compared their performance in terms of merits and demerits each research technique. The overall evaluation of
the research technique is done based on numerical outcome present in each research technique and best research
technique has been found
Keyword : Cloud services, data integrity, user privacy requirements, authentication, user revocation, dynamic
grouping
References:
1. Rittinghouse,, J. W., & Ransome, J. F. (2017). Cloud computing: implementation, management, and security. CRC press.
2. Ren, Y. J., Shen, J., Wang, J., Han, J., & Lee, S. Y. (2015). Mutual verifiable provable data auditing in public cloud
storage. 網際網路技術學刊, 16(2), 317-323.
3. Yang, H. L., & Lin, S. L. (2015). User continuance intention to use cloud storage service. Computers in Human Behavior, 52, 219-232.
4. Mazrekaj, A., Shabani, I., & Sejdiu, B. (2016). Pricing schemes in cloud computing: an overview. International Journal of Advanced
201. Computer Science and Applications, 7(2), 80-86.
5. Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: issues and current
solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485-498. 1190-
6. Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2016). Identity-based remote data integrity checking with 1198
perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
7. Tan, S., Jia, Y., & Han, W. H. (2015). Research and development of provable data integrity in cloud storage. Chinese Journal of
Computers, 38(1), 164-177.
8. Zhu, H., Tan, Y. A., Zhang, X., Zhu, L., Zhang, C., & Zheng, J. (2017). A round-optimal lattice-based blind signature scheme for cloud
services. Future Generation Computer Systems, 73, 106-114.
9. Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2016). Identity-based remote data integrity checking with
perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
10. Song, W., Wang, B., Wang, Q., Peng, Z., Lou, W., & Cui, Y. (2017). A privacy-preserved full-text retrieval algorithm over encrypted
data for cloud storage applications. Journal of Parallel and Distributed Computing, 99, 14-27.
11. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image
retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.
12. Salam, M. I., Yau, W. C., Chin, J. J., Heng, S. H., Ling, H. C., Phan, R. C., ... & Yap, W. S. (2015). Implementation of search able
symmetric encryption for privacy-preserving keyword search on cloud storage. Human-centric Computing and Information
Sciences, 5(1), 19.
13. Sohal, A. S., Sandhu, R., Sood, S. K., & Chang, V. (2018). A cybersecurity framework to identify malicious edge device in fog
computing and cloud-of-things environments. Computers & Security, 74, 340-354.
14. Hao, Z., Zhong, S., & Yu, N. (2011). A privacy-preserving remote data integrity checking protocol with data dynamics and public
verifiability. IEEE transactions on Knowledge and Data Engineering, 23(9), 1432-1437
15. Wang, B., Li, B., & Li, H. (2014). Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE transactions on cloud
computing, 2(1), 43-56.
16. Wang, B., Li, H., Liu, X., Li, F., & Li, X. (2014). Efficient public verification on the integrity of multi-owner data in the cloud. Journal
of Communications and Networks, 16(6), 592-599.
17. Wang, H., He, D., & Tang, S. (2016). Identity-based proxy-oriented data uploading and remote data integrity checking in public
cloud. IEEE Transactions on Information Forensics and Security, 11(6), 1165-1176.
18. Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2016). Identity-based remote data integrity checking with
perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
19. Shao, B., Bian, G., Wang, Y., Su, S., & Guo, C. (2018). Dynamic Data Integrity Auditing Method Supporting Privacy Protection in
Vehicular Cloud Environment. IEEE Access, 6, 43785-43797.
20. Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2018). Enabling identity -based integrity auditing and data sharing with sensitive
information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2), 331-346.
21. Arshad, M. U., Kundu, A., Bertino, E., Ghafoor, A., & Kundu, C. (2018). Efficient and scalable integrity verification of data and query
results for graph databases. IEEE Transactions on Knowledge and Data Engineering, 30(5), 866-879.
22. Lu, Y., & Hu, F. (2019). Secure Dynamic Big Graph Data: Scalable, Low-Cost Remote Data Integrity Checking. IEEE Access, 7,
12888-12900.
23. Liu, A., Fu, H., Hong, Y., Liu, J., & Li, Y. (2019). LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Transactions on
Information Forensics and Security.
24. Zhang, X., Liu, C., Nepal, S., Pandey, S., & aayvusdcf u,.\’Chen, J. (2012). A privacy leakage upper bound constraint-based approach
for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6),
1192-1202.
25. Rahulamathavan, Y., Phan, R. C. W., Veluru, S., Cumanan, K., & Rajarajan, M. (2013). Privacy-preserving multi-class support vector
machine for outsourcing the data classification in cloud. IEEE Transactions on Dependable and Secure Computing, 11(5), 467-479.
26. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2013). Privacy-preserving multi-keyword ranked search over encrypted cloud
data. IEEE Transactions on parallel and distributed systems, 25(1), 222-233.
27. Zhang, G., Liu, X., & Yang, Y. (2014). Time-series pattern based effective noise generation for privacy protection on cloud. IEEE
Transactions on Computers, 64(5), 1456-1469.
28. Zhang, X., Dou, W., Pei, J., Nepal, S., Yang, C., Liu, C., & Chen, J. (2014). Proximity-aware local-recoding anonymization with
mapreduce for scalable big data privacy preservation in cloud. IEEE transactions on computers, 64(8), 2293-2307
29. Liu, H., Ning, H., Xiong, Q., & Yang, L. T. (2014). Shared authority based privacy-preserving authentication protocol in cloud
computing. IEEE Transactions on parallel and distributed systems, 26(1), 241-251.
30. Zhang, H., Zhou, Z., Ye, L., & Du, X. (2015). Towards privacy preserving publishing of set-valued data on hybrid cloud. IEEE
Transactions on cloud computing, 6(2), 316-329.
31. Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H., & Gritzalis, S. (2015). Assurance of security and privacy requirements for
cloud deployment models. IEEE Transactions on Cloud Computing, 6(2), 387-400.
32. Shen, M., Ma, B., Zhu, L., Mijumbi, R., Du, X., & Hu, J. (2017). Cloud-based approximate constrained shortest distance queries over
encrypted graphs with privacy protection. IEEE Transactions on Information Forensics and Security, 13(4), 940-953.
33. Cheng, H., Rong, C., Qian, M., & Wang, W. (2018). Accountable Privacy-Preserving Mechanism for Cloud Computing Based on
Identity-Based Encryption. IEEE Access, 6, 37869-37882.
34. Zhu, Z., & Jiang, R. (2015). A secure anti-collusion data sharing scheme for dynamic groups in the cloud. IEEE Transactions on
parallel and distributed systems, 27(1), 40-50.
35. Chen, W., da Silva, R. F., Deelman, E., & Fahringer, T. (2015). Dynamic and fault-tolerant clustering for scientific workflows. IEEE
Transactions on Cloud Computing, 4(1), 49-62.
36. Lingwei, S., Fang, Y., Ru, Z., & Xinxin, N. (2015). Method of secure, scalable, and fine-grained data access control with efficient
revocation in untrusted cloud. The Journal of China Universities of Posts and Telecommunications, 22(2), 38-43.
37. Raghavendra, S., Meghana, K., Doddabasappa, P. A., Geeta, C. M., Buyya, R., Venugopal, K. R., & Patnaik, L. M. (2016). Ind ex
generation and secure multi-user access control over an encrypted cloud data. Procedia Computer Science, 89, 293-300
38. Xu, S., Yang, G., Mu, Y., & Deng, R. H. (2018). Secure fine-grained access control and data sharing for dynamic groups in the
cloud. IEEE Transactions on Information Forensics and Security, 13(8), 2101-2113.
39. Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., & Xiang, Y. (2018). DedupDUM: Secure and scalable data deduplication with
dynamic user management. Information Sciences, 456, 159-173
40. Cui, J., Zhou, H., Zhong, H., & Xu, Y. (2018). AKSER: Attribute-based keyword search with efficient revocation in cloud
computing. Information Sciences, 423, 343-352.
41. Luo, Y., Xu, M., Huang, K., Wang, D., & Fu, S. (2018). Efficient auditing for shared data in the cloud with secure user revocation and
computations outsourcing. Computers & Security, 73, 492-506.
42. He, Q., Zhang, N., Wei, Y., & Zhang, Y. (2018). Lightweight attribute based encryption scheme for mobile cloud assisted cyber -
physical systems. Computer Networks, 140, 163-173.
43. Peng, S., Zhou, F., Li, J., Wang, Q., & Xu, Z. (2019). Efficient, dynamic and identity-based Remote Data Integrity Checking for
multiple replicas. Journal of Network and Computer Applications, 134, 72-88.
Paper Title: SAAS: Attack Detection and Prevention with Forensic in cloud environment
Abstract: Basically cloud computing security is essential nowadays, it has arisen as a technology to allow
users as well as clients to access communications, data storage, software as well as exploitation Environment
according to pay-as-what-use structure. Conventional digital forensic can’t be investigated due to some technical
challenges like environmental as well as technical. The vibrant nature of cloud computing provides massive
opportunities to identify malicious request using various security algorithms in cloud environment. Proposed
research work identifies the current issues and provides solutions to reduce some challenges in the cloud
environment. In this paper system proposed forensic investigation of cloud security for trusted and untrusted
environments. System illustrated the various machine learning algorithms for eliminate the malicious request,
and investigate the malicious user also. Proposed method generate the user log base snapshot during the active
session and manual investigator can verify all logs and identify the malicious user. We offer a skilled technique
202. for forensic examination in the cloud with the help of virtual machine (VM) and generate snapshots. The
experimental analysis shows illustration of proposed security of system.
1199-
1203
Keyword : Software as Services, Snapshot generation, Cloud Computing, VM, Cloud Service Provider.
References:
1. Mr. DigambarPowar, Dr. G. Geethakumari “Digital Evidence Detection in Virtual Environment for Cloud Computing” ACM, 2012.
2. Saibharath S, Geethakumari G “Cloud Forensics: Evidence Collection and Preliminary Analysis” IEEE, 2015
3. Mr. Chandrashekhar S. Pawar, Mr. Pankaj R. Patil, Mr. Sujitkumar V. Chaudhari “Providing Security and Integrity for Data Stored In
Cloud Storage” ICICES, 2014.
4. DeeviRadha Rani, G. Geethakumari “An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots” International
Conference on Pervasive Computing (ICPC), 2015.
5. BKSP Kumar RajuAlluri, Geethakumari G“A Digital Forensic Model for Introspection of Virtual Machines in Cloud Computing”
IEEE, 2015.
6. Hubert Ritzdorf, NikolaosKarapanos, SrdjanCapkun “Assisted Deletion of Related Content”ACM, 2014.
7. Liang X, Zhao J, Shetty S, Liu J, Li D. Integrating blockchain for data sharing and collaboration in mobile healthcare applic ations.
InPersonal, Indoor, and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual International Symposium on 2017 Oct 8
(pp. 1-5). IEEE.
8. Manoj R, Alsadoon A, Prasad PC, Costadopoulos N, Ali S. Hybrid secure and scalable electronic health record sharing in hybrid cloud.
In2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) 2017 Apr 6 (pp.
185-190). IEEE.
9. Khan SI, Hoque AS. Privacy and security problems of national health data warehouse: a convenient solution for developing coun tries.
InNetworking Systems and Security (NSysS), 2016 International Conference on 2016 Jan 7 (pp. 1-6). IEEE.
10. Shrestha NM, Alsadoon A, Prasad PW, Hourany L, Elchouemi A. Enhanced e-health framework for security and privacy in healthcare
system. InDigital Information Processing and Communications (ICDIPC), 2016 Sixth International Conference on 2016 Apr 21 (pp.
75-79). IEEE.
Paper Title: Design of Nanotechnology Based Hazard Free Digital Circuit using Quantum Dot Cellular Automata
Abstract: Currently digital circuits have a high flying role in most communications applications. In this
Paper, a successful approach to risk-free circuit analysis and design using quantum dot cellular automata is
explored at the Nano level. This paper, which we use for both integrated and continuous digital circuits, is a
basic component of QCA circuit operation. The Quantum Dot Cellular Automata Designer Tool is very useful
for designing a large risk-free circuit. So the proposed risk-free circuit is designed and simulated using this
designing software utensil for three input stages. The proposed framework for the risk-free circuit requires only
a small number of major gate operations compared to previous structures because of its three input levels.
Keyword : Combinational logic circuit, Sequential logic circuits, QCA, Majority gate.
References:
204. 1. Ganesh,EN, Lal Kishore and Rangachar, MJS, ”Implementation of Quantum cellular automata combinational and sequential circuits
using Majority logic reduction method”, International Journal of Nanotechnology and Applications. Volume 2,1, 2008.
2. Townsend, WJ, and Abraham,JA, “Complex gate implementations for quantum dot cellular automata,” in Proceedings of 4th IEEE 1207-
Conference of. Nanotechnology, pp. 625–627, 2004. 1210
3. Walus,K, Schulhof,G and Jullien,GA, “High level exploration of quantum-dot cellular automata (QCA),” in Conference proceedings
of 38th Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 30–33, 2004.
4. Walus,K, Dysart,T, Jullien,G and Budiman,R, “QCADesigner: A rapid design and simulation tool for quantum-dot cellular
automata,”, IEEE Transaction on Nanotechnology., vol. 3, 1, pp. 26–29, 2004.
5. Heumpil Cho, and Swartzlander,EE, “Adder Design and Analyses for Quantum-Dot Cellular Automata”, IEEE Trans.
Nanotechnology., Vol.6,3, 2007.
6. Walus,K, Jullien, G.A. and Dimitrov,V, “Computer arithmetic structures for quantum cellular automata”,. Asilomar Conference on
Signals, Systems, and Computers, 2003.
7. Walus,K, Schulhof, G, Jullien,GA, Zhang,R and Wang,W, “Circuit design based on majority gates for applications with quantum-dot
cellular automata,” in Conference Proceedings of 38th Asilomar Conf. Signals, Systems and Computers, vol. 2, pp. 1354 –1357, 2004.
8. Walus,K, Jullien,GA, Dimitrov,VS, “Computer Arithmetic Structures for Quantum Cellular Automata”, Asilomar Conference on
Signals, Systems and Computers, Pacific Grove, 2003.
9. Wang, W, Walus,K, Jullien,GA, "Quantum-Dot Cellular Automata Adders" Copyright IEEE Nanotechnology Conference, , 2003.
10. Zhang,R, Walus,K, Wang,W and Jullien,GA, “A method of majority logic reduction for quantum cellular automata,” IEEE
Trans.Nanotechnol., vol. 3,4, pp. 443–450, 2004.
11. Lilly Beaulah,H,Thangaraj,K and Chitra,M, “Design of a New Energy Efficient L4 Leach Protocol based Visual Sensor Network for
Forest Monitoring System”, Asian Journal of Research in Social Sciences and Humanities (AJRSSH), Vol 6, issue 7, pp. 662-671,
2016
12. Gomathi,M, Shanmugaraja,P, Ilanchezhian,P, Thangaraj,K, and Komalavalli,D, “Analysis of Social Media Community Using
Optimized Clustering Algorithm “,Proceedings of the International Conference on Intelligent Computing Systems , 2017
Authors: Ahmed Y. Zakaria, Dalia A. Ali, Islam M. Al-Akraa, Hoda A. Elsawy, Hany A. Elazab
Authors: Mohit Kumar Kakkar, Jasdev Bhatti*, Reetu Malhotra, Manpreet Kaur, Deepika Goyal
Availability Analysis of an Industrial System under the Provision of Replacement of a Unit using
Paper Title:
Genetic Algorithm
Abstract: The main aim of this research work is to present a reliability and availability analysis of a three-
unit system (A, As, B) under the provision of replacement of a unit using the Genetic algorithm. One unit is in
standby mode so that after the failure of one unit it can be active. But one unit which is dissimilar to the previous
one can be replaced with the new one after the failure. It has been considered that there is only one repair man
availability within the organization. Here in this paper we have used the Genetic algorithm for finding out the
optimized availability of the system and also with the assistance of numbers of graphs we have analyzed
reliability characteristics, availability of the framework, so the result of the paper will be very useful for the
industry people.
Paper Title: Dowry Death Cases With Special Reference to Kamlesh Singh VS Vishwaraj Singh
Abstract: The present study is about inhuman crimes which has its origin from dowry. It enables a detailed
discussion on the timely interference of a judiciary which was considered as a new dimension in developing
women's rights against exploitation in the name of dowry. The objective of this paper was to study about the
aftermath ill effects on the victims of dowry offences and continued significance of such draconian practice
even in modern era. The word dowry is almost synonyms with indian women. Dowry is considered as a
sacramental and indispensable custom of marriage especially in Hindu religion which turned into an illegal
practices of the society due to its inhuman nature.According to manu shastra ,women were regarded as lower
class of people which denotes that they were undeclared slaves of such patriarchal society and such society
never let women for observance of equality in marital relationship. In addition to that women's dignity is
oppressed and questioned by such draconian practices like dowry. Shortcut of dowry indicating low status for
women. Ineffective implementation of stringent laws which curbs death deaths indicates the deficiency of
government machineries in protecting women’s life. It also makes an attempt to investigate the legal instruments
which related to the prohibition of dowry in India. The information acquired from this study show that Dowry
Prohibition Act, 1961 took its significance and authority from section 498-A and section 304-B which was
enumerated in Indian penal code, but Article 51-A of the constitution remains ineffective because such
provisions were never considered as an enforceable before a court of law as it was lies in directive principles of
state policy which will not bind any government machineries and it was merely a discretionary provision .In
recent trends, education is considered as a tool for increasing their bargaining power in dowry negotiations
instead of providing social awareness.Judiciary should ensure effective government machinery to implement the
stringent laws along with the legal punishment, to do away with this evil practice. the purpose of this study
random sampling method has been used There are a total of 1489 samples collected with regard to this study .
212.
Keyword : custom, dignity, government machinery, judicial activism, inequality, stringent laws. 1242-
1246
References:
1. Al-Turki, H.A., 2015. Effect of smoking on reproductive hormones and semen parameters of infertile Saudi Arabians. Urology annals,
7(1), pp.63–66.
2. Anon, Dowry. In SpringerReference.
3. Basu, S., 2005. Dowry and inheritance,
4. Bradley, T., Tomalin, E. & Subramaniam, M., 2010. Dowry: Bridging the Gap Between Theory and Practice,
5. Chancey, L. & Dumais, S.A., 2009. Voluntary childlessness in marriage and family textbooks, 1950 -2000. Journal of family history,
34(2), pp.206–223.
6. Cowan, A., 2010. Marriage and Dowry: Oxford Bibliographies Online Research Guide, Oxford University Press.
7. Goody, J. & Tambiah, S.J., 1973. Bridewealth and Dowry, CUP Archive.
8. Grossmann, I. & Varnum, M.E.W., 2015. Social structure, infectious diseases, disasters, secularism, and cultural change in Am erica.
Psychological science, 26(3), pp.311–324.
9. http://shodhganga.inflibnet.ac.in/bitstream/10603/52350/12/12_chapter%206.pdf
10. Hooja, S.L., 1969. Dowry System in India: A Case Study, Delhi] : Asia Press.
11. Katib, A.A. et al., 2014. Secondary infertility and the aging male, overview. Central European journal of urology, 67(2), pp.184–188.
12. Manning, W.D., Fettro, M.N. & Lamidi, E., 2014. Child Well-Being in Same-Sex Parent Families: Review of Research Prepared for
American Sociological Association Amicus Brief. Population research and policy review, 33(4), pp.485–502.
13. Paul, M.C., 1986. Dowry and Position of Women in India: A Study of Delhi Metropolis,
14. https://indiankanoon.org/doc/123123670/
15. Sarda, M., 2011. The Concept of “Dowry” and “Dowry Death” - a Study in the Light of Supreme Court Decision in Ashok Kumar’s
Case. SSRN Electronic Journal
16. http://dx.doi.org/10.2139/ssrn.2711605.
17. Teja, M.K., 1993. Dowry: A Study in Attitudes and Practices, South Asia Books.
18. Verma, M.P., 2017. “An analysis of dowry and dowry offences in India.” VIDHIGYA: The Journal of Legal Awareness, 12(1), p.1.
19. Walters, S., 2018. Becoming and Belonging in African Historical Demography, 1900–2000. In P. Kreager & A. Bochow, eds. Fertility,
Conjuncture, Difference: Anthropological Approaches to the Heterogeneity of Modern Fertility Declines. New York: Berghahn Books.
20. Wise, P., 2017. [Claude Bernard - then and now]. Biologie aujourd’hui, 211(2), pp.157–160.
21. Wyatt, R., 2011. Broken Mirrors: The “Dowry Problem” in India, SAGE Publications Pvt. Limited.
Paper Title: Public Opinion on Partnership under the Indian Partnership ACT 1932
Abstract: Partnership is considered as the relation between the persons who have agreed to share the profits
of a business carried on by all or any of them acting all . Section 4 of the Indian Partnership Act, 1932 deals
about Partnership.In this papaper it is analysed that the division of profits is considered to be a essential element
213. for the existence of partnership which also includes the sharing of profit and losses . A Partnership Agreement is
defined as an arrangement that is agreed by all parties to the transaction and is a successful method of helping 1247-
each of the partners to set up mutually acceptable goals, to share all the profits earned in the business equally. 1251
Partnership is a specific application of the principles of agency. Agreement of partnership need not be express ,
but can be inferred from the course of conduct of the parties to the agreement. Registration of the company is not
mandatory it’s an option according to the Indian Partnership Act ,1932. Partnership is one of the oldest forms of
business relationships and it is also a special kind of contract , which is created out of an agreement. An
empirical study is done where the samples are collected by using probability sampling and random sampling
method. Samples of approximately 1592 respondents are collected . Using the spss tool the value of the chi
square is found and the output of the research is chi square is that there is no significant association between the
there is no association between the awareness of the rights and duties of partners and age and there is no
association between partners entitled to share all the profits earned in business equally and gender. It is
concluded that Partnership is a good form of doing business by making partners and achieving big goals .
Nowadays Partnerships are still preferred by professionals , small trading and business enterprises.
Paper Title: System and Also Network Control using Virtual Machine Migration
Abstract: Virtualization of computing information has actually been actually a more and more conventional
approach lately, solely in pertinent information resource settings. This has in fact assisted in the surge of cloud
computing, where information location motorists can conveniently over-subscribe their physical internet hosting
servers with using virtual devices in order to enhance the roi for their resources. In a similar technique, the
system locations in cloud records centres are actually also considerably over-subscribed, alongside the web
hyperlinks in the crucial finishings of the system being in fact simply amongst the complete really most over-
subscribed as well as crammed of all, however, furthermore being actually the most effective costly to update.
This provides supplies a history on reports resource concepts, as well as the houses of the website visitor traffic
that perform over them. Command trivialities for handling international efficiency within records facilities seek
that gone over, coming from sending methods to migration units.
214.
Keyword : System control, Network Control, Virtual Machine Migration 1252-
1255
References:
1. C. Guo, H. Wu, K. Tan, L. Shi, Y. Zhang, and also S. Lu, "DCell: a scalable and also mistake- flexible system framework for info
centers," in Procedures of the ACM SIGCOMM 2008 meeting on Information interaction, August 2008, pp. 75-- 86.
2. C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, as well as S. Lu, "BCube: a higher efficiency, server-centric system
style for modular records locations," in Procedures of the ACM SIGCOMM 2009 seminar on Details interaction, August 2009, pp. 63-
- 74.
3. M. Al-Fares, A. Loukissas, and also A. Vahdat, "A scalable, product data center network architecture," SIGCOMM Comput. Commun.
Rev., vol. 38, pp. 63-- 74, August 2008.
4. A. Greenberg, J. R. Hamilton, N. Jain, S. Kandula, C. Kim, P. Lahiri, D. A. Maltz, Patel, and additionally S. Sengupta, "VL2: a
scalable as well as likewise adjustable data facility network," in Pro- ceedings of the ACM SIGCOMM 2009 conference on
Information communication, August 2009, pp. 51-- 62.
5. S. Kandula, S. Sengupta, A. Greenberg, P. Patel, and likewise R. Chaiken, "The nature of data location traffic: dimensions & analysis,"
in Methods of the 9th ACM SIGCOMM workshop on Net size conference (IMC '09), September 2009, pp. 202-- 208.
6. J. Dean and also S. Ghemawat, "MapReduce: streamlined information dealing with on big assortments," Commun. ACM, vol. 51, no.
1, pp. 107-- 113, January 2008.
Paper Title: PE2 - A Service Oriented Meta Task Scheduling Framework in Cloud Environment
Abstract: Cloud computing is an emerging computing environment which facilitates on demand services.
As it contributes a large pool of computing resources, scheduling of tasks in an efficient manner is one of the
main problems. Poor allocation of tasks affects the performance of the whole system. Hence it is very important
to schedule the tasks for better utilization of resources by allocating them properly to particular resources in
particular time. Efficient scheduling algorithms fulfill the user requirements and also satisfy the needs of the
cloud service providers without affecting the performance of the environment. Execution Time based Sufferage
Algorithm (ETSA), Cost and Completion Time based Sufferage Algorithm (CCTSA) and Modified Artificial
Fish Swarm(MAFSA) Algorithm are efficient task scheduling approaches developed in cloud environment.
These algorithms considered the parameters such as makespan, cost and resource utilization while scheduling
the tasks and produced better performance. This paper presents a scheduling framework which converts the
above said algorithms in to services and deployed in the cloud. Depends on the user’s requirements, the services
will be delivered.
Authors: Kuruvilla John, Abimanyu M, Rishi Raj, Aravind M Pillai, Shahana Samad
Paper Title: A Novel Technique of Gesture Recognition for Car Infotainment Control
Abstract: This paper details the development of a gesture recognition technique for car infotainment
control. Nowadays, in highway due to heavy traffic or twist and turns along the road the drivers cannot afford to
take their eyes of the road. One of the prominent human-machine interface (HMI) technology is gesture
recognition. Gesture can be used in the automotive industry to provide a secure and luxurious control interface
that will limit driver distraction. Human-machine interfaces permit working vehicle gadgets without changing
217.
the driver's consideration. A complete framework for controlling the infotainment hardware through hand
motions is clarified in this paper. 1268-
1271
Keyword : Gesture, Infotainment, Radar, Sensors.
References:
1. Pickering C, Burnham K, and Richardson M (2007), “A research study of hand gesture recognition technologies and applications for
human vehicle interaction,” in 2007 IET 3rd Institution of Engineering and Technology Conference on Automotive Electronics,
Warwick, UK.
2. Young K, Regan M (2007), “Driver distraction: a review of the literature,” Distracted Driving, Sydney, Australia: Australasia n College
of Road Safety, 2007, pp. 379-405.
3. Wachs J P, Kolsch M, Stern H, and Edan Y (2011), “Vision based hand gesture applications,” Communications of the ACM, vol. 54, no.
2, pp. 60-71
4. Breuer P, Eckes C, and Müller S (2007), “Hand gesture recognition with a novel IR time-of-flight range camera–a pilot study”, in
MIRAGE 2007, LNCS 4418, pp. 247– 260
5. Keskin C, Kırac F, Kara Y E, and Akarun L (2011), “Real time hand pose estimation using depth sensors”, in IEEE International
Conference on Computer Vision Workshops, pp 1228-1234,
6. Molchanov P, Gupta S, Kim K, and Pulli K (2015), “Multi-sensor system for driver’s hand-gesture recognition,” IEEE 11th
International Conference and Workshops on Automatic Face and Gesture Recognition, Ljubljana, Slovenia, pp. 1-8
7. Riener A, Rossbory M, and Ferscha M (2011), “Natural DVI based on intuitive hand gestures,” INTERACT Workshop User
Experience in Cars, pp. 62-66.
8. Molchanov P, Gupta S, Kim K, and Kautz J (2015), “Hand gesture recognition with 3D convolutional networks,” IEEE Conference on
Computer Vision and pattern Recognition Workshops, Boston, MA, USA, pp. 1-7.
9. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “A Novel Design of Synchronous Counter for Low Power and High-Speed
Applications,” International Journal of Engineering and Advanced Technology, vol. 8, issue. 4, pp. 779-783, 2019.
10. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Effect of clock gating in conditional pulse enhancement flip-flop for low power
applications,” International Journal of Electrical Engineering and Informatics, vol. 7. no. 2, pp. 357-365, 2019.
11. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “ Design of conditional pulse enhancement flip-flop embedded with clock gating
and signal feed-through mechanism, ”Journal of Engineering Science and Technology, vol. 14, no. 4, pp. 2000-2012, 2019.
12. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Impact of Pulse-Triggered Flip-Flops in Low Power Applications,” Journal of
Advance Research in Dynamical and Control Systems, vol. 10, issue. 1, pp. 298-306, 2018.
13. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Design of low power and high speed implicit pulse flip-flop and its application,”
International Journal of Engineering and Technology, vol. 7, no. 3, pp. 1893-1898, 2018.
14. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Performance Comparison of Explicit Pulsed Flip-Flops in Low Power and High-
Speed Application,” in Proceedings of International Conference on Circuits and Systems in Digital Enterprise Technology
(ICCSDET), Kottyam, Kerala, India, Dec. 2018.
Paper Title: Design and Simulation of Horizontally placed H-shaped Fractal Antenna
Abstract: The design and simulation of horizontally placed H-Shaped Fractal Antenna is presented in this
paper using CST Microwave Studio simulation software and the excitation is provided by using Nickel material
for feeding in Y direction, wave guide port feeding method is used.. The simulated result shows that by edge
cutting the directivity increases, return loss is very less and the voltage standing wave ratio is nearly equal to
unity as the number of iterations increases. In generating multiple frequencies., the horizontally placed H shape
fractal structure is advantageous. This antenna can be used in the Wi-Fi due to its better performance in Return
loss, VSWR and directivity. In this paper four stages of this antenna is designed and simulated, the third
iteration of this antenna is fabricated for Return loss and VSWR. The observations are conducted on antenna
parameters such as the return loss for the frequency of 9.5 GHz is -27.6 dB and observed nearly equal value for
measured results. The VSWR of both simulated and measured results are also same.
Keyword : Prioritization, Least Recently Used, Big Data, Enterprise Data Hub, Cache Algorithm, Hybrid
LRU, Cache Hit Ratio, etc.
References:
1. Ronald J. Dovich and Peter J. Eppele, "Metadata-driven data presentation module for database system", US6308168B1, February 1999
2. Yan, Ling-Ling, Renée J. Miller, Laura M. Haas and Ronald Fagin, "Data-Driven Understanding and Refinement of Schema
Mappings", SIGMOD 2001
3. Mo Chen, Rezaul Alam Chowdhury, Vijaya Ramachandran, David Lan Roche and Lingling Tong, "Priority Queues and Dijkstra's
Algorithm", UTCS Technical Report TR-07-54, October 2007, [Online] Available:
https://www.researchgate.net/publication/250152101
4. Priyanka Yadav, Vishal Sharma and Priti Yadav, "Cache Memory – Various Algorithm", International Journal of Computer Science
and Mobile Computing, Vol. 3, Issue. 9, September 2014
5. Nathan Beckmann and Daniel Sanchez of Massachusetts Institute of Technology, "Modeling Cache Performance Beyond LRU", 2016,
Online https://people.csail.mit.edu/sanchez/papers/2016.model.hpca.pdf
6. Jaafar Alghazo, Adil Akaaboune and Nazeih Botros of Illinois University at Carbondale, "SF-LRU Cache Replacement Algorithm",
2004, Online https://www.researchgate.net/publication/4088265_SF-LRU_cache_replacement_algorithm
7. R. L. Mattson, J. Gecsei and D. R. Slutz, “Evaluation techniques for storage hierarchies,” IBM Sys. J., vol. 9, no. 2, 1970
8. M. Qureshi, A. Jaleel and Y. Patt, “Adaptive insertion policies for high performance caching,” in ISCA-34, 2007
9. A. Pan and V. S. Pai, “Imbalanced cache partitioning for balanced data-parallel programs,” in MICRO-46, 2013
10. G. Keramidas, P. Petoumenos and S. Kaxiras, “Cache replacement based on reuse-distance prediction,” in ICCD, 2007
11. A. Jaleel, K. Theobald and S. Steely, “High performance cache replacement using re-reference interval prediction,” in ISCA-37, 2010.
12. O’Neil E. J., O’ Neil P. E., Weikum G., "An optimality proof of the LRU-k page replacement algorithm", ACM, vol. 46, no. 1, 1999
Paper Title: Metaheuristic Technique for Dynamic and Energy Efficient Routing (METDEER) in MANET
Abstract: The Metaheuristic Technique in Mobile Ad-hoc Network (MANET) is an experiment based
model for improving lifetime of the MANET. This contribution proposes a Balanced Network Monitoring and
Routing-Based on Ant Colony Optimization Technique (BNMR-ACOT) that enhances the lifetime of the
network by providing a balanced selection of nodes during the routing process. Experiments were conducted
with various parameters – packet delivery ratio, energy consumption of node and total overhead were compared
with existing models with BNMR, which exhibits two times better route selection levels and twenty times faster
route selection times. Node usage levels and randomization levels in the path selection component were
observed to exhibit effective performances.
Keyword : MANET, Packet delivery ratio, Energy consumption, Routing, Network Monitoring,
Randomization.
220. References:
1. Beski Prabaharan S., Ponnusamy. R, “Trust Based Random Energy Efficient Routing (TRER) in MANET”, International Journal of
Applied Engineering Research(2015), 11 (1), 448-455, Print ISSN 0973-4562, Online ISSN 0973-9769. 1282-
2. Beski Prabaharan S., Ponnusamy. R, “Energy Aware Ant Colony Optimization based Dynamic Random Routing Strategy for 1289
MANET”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) ,Volume 5,
Issue 2, on 22nd February, 2016. Pg. 143-147; ISSN(Online), 2278-021; ISSN(Print) 2319- 5940.
3. S Beski Prabaharan, R Ponnusamy, “Energy Aware Secure Dynamic Multipath Routing using ACO with Modified Local Selection
using SA”, International Advanced Research Journal in Science, Engineering and Technology (IARJSET), Vol 3, Issue 5, May
2016. ISSN(Online) 2393-8021; ISSN(Print), 2394-1588.
4. Forgy, E.W., "Cluster analysis of multivariate data: efficiency versus interpretability of classifications". Biometrics. 21: 768–769.
JSTOR 2528559, 1965.
5. Dorigo, M., Maniezzo, V., and Colorni, A., “The ant system: An autocatalytic optimizing process.” (No. 91 -016, pp. 163-183).
Technical report, 1991.
6. Dorigo, M., Maniezzo, V., and Colorni, A. (1996). Ant system: optimization by a colony of cooperating agents. IEEE Transa ctions
on Systems, Man and Cybernetics, Part B (Cybernetics), 26(1), 29-41. doi:10.1109/3477.484436.
7. Dorigo, M., and Gambardella, L. (1997). “Ant colony system: a cooperative learning approach to the traveling salesman pro blem”,
IEEE Transactions on Evolutionary Computation, 1(1), 53-66. doi:10.1109/4235.585892.
8. Kirkpatrick, S., Gelatt, C. D., and Vecchi, M. P. (1983), “Optimization by Simulated Annealing”. Science, 220(4598), 671-680.
doi:10.1126/science.220.4598.671
9. Khan, K., and Goodridge, W. (2015), “ Fault Tolerant Multi-Criteria Multi-Path Routing in Wireless Sensor Networks”,
International Journal of Intelligent Systems and Applications, 7(6), 55-63. doi:10.5815/ijisa.2015.06.06
Paper Title: Strength Properties of Concrete by using Flyash, Quarry Dust and Crumb Rubber
221. Abstract: As construction in India and other developing countries are increasing, the consumption of energy
and resources are also increasing in same alarming way. Due to urbanization many industries are developed and 1290-
the industrial wastage is also increasing day by day which is a serious concern to the environment. Many 1294
industries produce various end products, which may be used in construction industry at various places. So we
focused on some of the waste materials which can be replaced in conventional concrete, and by then cost of
construction can be reduced and is economical, also damage caused to the environment can also be reduced, at
the same time landfills can also be reduced. So, we focused on reducing the virgin materials in concrete like
cement, fine aggregate and coarse aggregate by replacing them with some waste materials which have same
properties of cement, fine aggregate and coarse aggregate. The objective of the present work is to find out the
effectiveness of fly ash, quarry dust and crumb rubber by replacing them in varied percentages. Here, cement is
replaced by fly ash with percentages as 30%, 40%, 50%, 60% and quarry dust as fine aggregate with percentages
of 20%, 30%, 40%, 50% along with crumb rubber as coarse aggregate with percentages as 5%, 10%, 15%, 20%.
The results in this study have shown a gradual reduction of compressive strength as we kept on adding the
crumbed rubber. Even though the strength obtained for 5% usage of crumbed rubber was quite satisfactory.
Paper Title: Classification of Diabetes using Random Forest with Feature Selection Algorithm
Abstract: Diabetes has become a serious problem now a day. So there is a need to take serious precautions
to eradicate this. To eradicate, we should know the level of occurrence. In this project we predict the level of
occurrence of diabetes. We predict the level of occurrence of diabetes using Random Forest, a Machine Learning
Algorithm. Using the patient’s Electronic Health Records (EHR) we can build accurate models that predict the
presence of diabetes.
Keyword : Electronic Health Records, Random Forest with Feature Selection, Machine Learning Algorithm.
References:
1. RaksehMotka,ViralParmar, “Diabetes Mellitus Forecast Using Different Data mining Techniques” IEEE International Conference on
Computer and Communication Technology (ICCCT),2013.
222. 2. Veena Vijayan V., AswathyRavikumar, “Study of Data Mining algorithms for Prediction and Diagnosis of Diabetes Mellitus”,
International Journal of Computer Application, Vol 94,pp .12-16,June 2014.
3. C.kalaiselvi, G.M.Nasira, “A New Approach of Diagnosis of Diabetes and Prediction of Cancer using ANFIS”, IEEE Computing an d 1295-
Communicating Technologies, pp 188-190, 2014. 1300
4. S.Sapna, A.Tamilarasi ,M.Pravin Kumar, “Implementation of Genetic Algorithm in Predicting Diabetes” International journal of
computer science issues,Vol.9,pp.234-240.
5. GunasekarThangarasu, P.D.D.Dominic, “Prediction of Hidden Knowledge from Clinical Database using Data mining Techniques”
International Conference on Computer and Information Sciences (ICCOINS),pp.1-5,2014.
6. SavvasKaratsiolis,Christos N. Schizas ,“ Region based Support Vector Machine Algorithm for Medical Diagnosis on Pima Indian
Diabetes Dataset”, IEEE conference on Bioinformatics and Bioengineering, pp.139-144,2012.
7. Velu C.M, K. R. Kashwan, “Visual Data Mining Techniques for Classification of Diabetic Patients”, IEEE International Advance
Computing Conference (IACC), pp-1070-1075,2013.
8. Asma A. AlJarullah , “Decision discovery for the diagnosis of Type II Diabetes”, IEEE conference on innovations in informatio n
technology,pp-303-307,2011.
9. Peter Harrington “Machine Learning in Action”,Manning Publications,2013.
10. Nirmala Devi M., Appavu alias Balamurugan S.,Swathi U.V., “An amalgam KNN to predict Diabetes Mellitus”, IEEE International
Conference on Emerging Trends in Computing ,Communication and anotechnology(ICECCN),pp 691-695,2013.
11. 2001. Random forests. Machine Learning 45(1):5–32.Breiman, L., J. H. Friedman, R. A. Olshen, and C. J. Stone. 1984. Classification
and regression trees. Monterey, CA: Wadsworth.
223. Paper Title: Random Forest Algorithm for Soil Fertility Prediction and Grading Using Machine Learning
Abstract: In society the population is increasing at a high rate, people are not aware of the advancement of 1301-
technologies. Machine learning can be used to increase the crop yield and quality of crops in the agriculture 1304
sector. In this project we propose a machine learning based solution for the analysis of the important soil
properties and based on that we are dealing with the Grading of the Soil and Prediction of Crops suitable to the
land. The various soil nutrient EC (Electrical Conductivity), pH (Power of Hydrogen), OC (Organic Carbon),
etc. are the feature variables, whereas the grade of the particular soil based on its nutrient content is the target
variable. Dataset is preprocessed and regression algorithm is applied and RMSE (Root Mean Square Error) is
calculated for predicting rank of soil and we applied various Classification Algorithm for crop recommendation
and found that Random Forest has the highest accuracy score.
Keyword : Crop Recommendation, Fertility Grading, Machine Learning, Prediction, Random Forest, Linear
Regression
References:
1. Hai-Yang Jia, Juan Chen,"Soil fertility grading with Bayesian network transfer learning, presented at the Proceedings of the Ninth
International Conference on Machine Learning and Cybernatics, Qingdao, 2010.
2. E. Manjula, S. Djodiltachoumy, “A Model for Prediction of Crop Yield” (International Journal of Computational Intelligence and
Informatics, March 2017).
3. A. Kumar & N. Kannathasan, (2011), “A Survey on Data Mining and Pattern Recognition Techniques for Soil Data Mining “, IJCSI
International Journal of Computer Science Issues, Vol. 8, Issue 3.
4. Gholap, Jay. “Performance Tuning of J48 Algorithm for Prediction of Soil Fertility.” ArXiv abs/1208.3943 (2012): n. pag.
5. “Prediction of Crop Yield using Machine Learning” Rushika Ghadge, Juilee Kulkarni, Pooja More, Sachee Nene, Priya R,
IJARCSE,vol. 5, Issue 8,2017.
6. Shivnath Ghosh, Santanu Koley (2014) “Machine Learning for Soil Fertility and Plant Nutrient Management using Back Propagatio n
Neural Networks” International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 2 Issue: 2,
ISSN: 2321-8169, pp 292 – 297.
7. Gorthi, Swathi and Huifang Dou. “PREDICTION MODELS FOR ESTIMATION OF SOIL MOISTURE CONTENT.” (2011).
8. http://dataverse.icrisat.org/dataset.xhtml?persistentId=d oi:10.21421/D2/K3BPKW
9. Oyen, D. & Lane, T. Knowl Inf Syst (2015) 43: 1. https://doi.org/10.1007/s10115-014-0775-6
10. Shah A., Dubey A., Hemnani V., Gala D., Kalbande D.R. (2018) Smart Farming System: Crop Yield Prediction Using Regression
Techniques. In: Vasudevan H., Deshmukh A., Ray K. (eds) Proceedings of International Conference on Wireless Communication.
Lecture Notes on Data Engineering and Communications Technologies, vol 19. Springer, Singapore
11. A. Arooj, M. Riaz and M. N. Akram, "Evaluation of predictive data mining algorithms in soil data classification for optimized crop
recommendation," 2018 International Conference on Advancements in Computational Sciences (ICACS), Lahore, 2018, pp. 1-6. doi:
10.1109/ICACS.2018.8333275
12. Vaneesbeer Singh,Abid Sarwar, “Analysis of soil and prediction of crop yield (Rice) using Machine Learning approach” IJARCSE,vol.
5, Issue 8,2017.
13. Miss.Snehal, S. D. (2014). Agricultural Crop Yield Prediction Using Artificial. International Journal of Innovative Research in
Electrical,Electronic, 1 (1).
14. Kajol R, Akshay Kashyap K, Keerthan Kumar T G," Automated Agricultural Field Analysis and Monitoring System Using IOT",
International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.10, No.2, pp. 17-24, 2018. DOI:
10.5815/ijieeb.2018.02.03
15. Shriya Sahu, Meenu Chawla, Nilay Khare, "An efficient analysis of crop yield prediction using Hadoop framework based on random
forest approach", Computing Communication and Automation (ICCCA) 2017 International Conference on, pp. 53-57, 2017.
16. Rashmi Priya, Dharavath Ramesh, Ekaansh Khosla, "Crop Prediction on the Region Belts of India: A Naïve Bayes Map Reduce
Precision Agricultural Model", Advances in Computing Communications and Informatics (ICACCI) 2018 International Conference on ,
pp. 99-104, 2018.
Keyword : Virtual Reality, Diabetes, medicines, obesity, cardiovascular disease, non-communicable disease.
References:
1. Doniger GM, Beeri MS, Bahar-Fuchs A, Gottlieb A, Tkachov A, Kenan H, et al. Virtual reality-based cognitive-motor training for
middle-aged adults at high Alzheimer’s disease risk: A randomized controlled trial. Alzheimers Dement (N Y). 2018 Mar 27;4:118–29.
2. Manera V, Chapoulie E, Bourgeois J, Guerchouche R, David R, Ondrej J, et al. A Feasibility Study with Image -Based Rendered
Virtual Reality in Patients with Mild Cognitive Impairment and Dementia. PLoS ONE. 2016 Mar 18;11(3):e0151487.
3. García-Betances RI, Arredondo Waldmeyer MT, Fico G, Cabrera-Umpiérrez MF. A succinct overview of virtual reality technology use
in Alzheimer’s disease. Front Aging Neurosci. 2015 May 12;7:80.
4. Alzheimer’s News Today Home - Alzheimer’s News Today [Internet]. [cited 2019 Apr 7]. Available from:
http://alzheimersnewstoday.com
5. Tarnanas I, Schlee W, Tsolaki M, Müri R, Mosimann U, Nef T. Ecological validity of virtual reality daily living activities screening for
early dementia: longitudinal study. JMIR Serious Games. 2013 Aug 6;1(1):e1.
6. Neuropsychiatry Indexed Journal - Psychiatry Open Access Journal [Internet]. [cited 2019 Apr 7]. Available from:
http://www.jneuropsychiatry.org
7. Ong CS, Krishnan A, Huang CY, Spevak P, Vricella L, Hibino N, et al. Role of virtual reality in congenital heart disease. Congenit
Heart Dis. 2018 May;13(3):357–61.
8. Virtual Reality Reporter | VR News, 360 Video, VR Camera, 3D VR Porn, Game Blog News Report! [Internet]. [cited 2019 Apr 7].
Available from: http://virtualrealityreporter.com
9. Ikbali Afsar S, Mirzayev I, Umit Yemisci O, Cosar Saracgil SN. Virtual reality in upper extremity rehabilitation of stroke patients: A
randomized controlled trial. J Stroke Cerebrovasc Dis. 2018 Dec;27(12):3473–8.
10. Neugebauer M, Tautz L, Hüllebrand M, Sündermann S, Degener F, Goubergrits L, et al. Virtual downsizing for decision support i n
mitral valve repair. Int J Comput Assist Radiol Surg. 2019 Feb;14(2):357–71.
11. http://heart.insight.heart.org [Internet]. [cited 2019 Apr 7]. Available from: http://heart.insight.heart.org
12. Schuster-Amft C, Eng K, Suica Z, Thaler I, Signer S, Lehmann I, et al. Effect of a four-week virtual reality-based training versus
conventional therapy on upper limb motor function after stroke: A multicenter parallel group randomized trial. PLoS ONE. 2018 Oct
24;13(10):e0204455.
13. Shin J, Truong QA. Manufacturing better outcomes in cardiovascular intervention: 3D printing in clinical practice today. Curr Treat
Options Cardiovasc Med. 2018 Oct 25;20(12):95.
14. Cardiology News, Research Articles | Heart Disease, Disorder Studies [Internet]. [cited 2019 Apr 7]. Available from:
http://thecardiologyadvisor.com
15. Cardiovascular Disease (CVD) - Types, Causes & Symptoms - British Heart Foundation [Internet]. [cited 2019 Apr 7]. Available from:
https://www.bhf.org.uk/informationsupport/conditions/cardiovascular-disease
16. Morie JF, Chance E. Extending the reach of health care for obesity and diabetes using virtual worlds. J Diabetes Sci Technol. 2011 Mar
1;5(2):272–6.
17. Talbot TB. Virtual reality and interactive gaming technology for obese and diabetic children: is military medical technology
applicable? J Diabetes Sci Technol. 2011 Mar 1;5(2):234–8.
18. Riva G. The key to unlocking the virtual body: virtual reality in the treatment of obesity and eating disorders. J Diabetes Sci Technol.
2011 Mar 1;5(2):283–92.
19. Grewal G, Sayeed R, Yeschek S, Menzies RA, Talal TK, Lavery LA, et al. Virtualizing the assessment: a novel pragmatic paradigm to
evaluate lower extremity joint perception in diabetes. Gerontology. 2012 May 10;58(5):463–71.
20. Freeman D, Reeve S, Robinson A, Ehlers A, Clark D, Spanlang B, et al. Virtual reality in the assessment, understanding, and treatment
of mental health disorders. Psychol Med. 2017 Oct;47(14):2393–400.
21. Diabetes Community, Support, Education, Recipes & Resources [Internet]. [cited 2019 Apr 7]. Available from:
https://www.diabetes.co.uk/
22. Klaassen R, Bul KCM, Op den Akker R, van der Burg GJ, Kato PM, Di Bitonto P. Design and evaluation of a pervasive coaching and
gamification platform for young diabetes patients. Sensors Basel Sensors. 2018 Jan 30;18(2).
23. Ruppert B. New directions in virtual environments and gaming to address obesity and diabetes: industry perspective. J Diabetes Sci
Technol. 2011 Mar 1;5(2):277–82.
24. NCDs | Noncommunicable diseases and their risk factors [Internet]. [cited 2019 Apr 7]. Available from: https://www.who.int/ncds/en/
25. Increasing burden of non-communicable diseases -- ScienceDaily [Internet]. [cited 2019 Apr 7]. Available from:
https://www.sciencedaily.com/releases/2015/06/150610093211.htm
26. Number of people with diabetes reaches 4.7 million | Diabetes UK [Internet]. [cited 2019 Apr 7]. Available from:
https://www.diabetes.org.uk/about_us/news/new-stats-people-living-with-diabetes
27. Roglic G, Organization WH. Global Report On Diabetes. Geneva, Switzerland: World Health Organization,; 2016.
28. Diabetes [Internet]. [cited 2019 Apr 7]. Available from: https://www.who.int/news-room/fact-sheets/detail/diabetes
29. Thomas JG, Bond DS. Review of innovations in digital health technology to promote weight control. Curr Diab Rep. 2014;14(5):485.
30. Thomas JG, Bond DS. Review of innovations in digital health technology to promote weight control. Curr Diab Rep. 2014;14(5):485.
31. Thomas JG, Spitalnick JS, Hadley W, Bond DS, Wing RR. Development of and feedback on a fully automated virtual reality system
for online training in weight management skills. J Diabetes Sci Technol. 2015 Jan;9(1):145–8.
32. Mirza RA, Yaqoob I. Effects of Combined Aerobic and Virtual Reality-Based Cognitive Training on 76 Years Old Diabetic Male with
Mild Cognitive Impairment. J Coll Physicians Surg Pak. 2018 Sep;28(9):S210–S212.
33. Miserez S, Chinet L, Guardia A, Matthys F, Hagon-Traub I. [Virtual reality: a tool that can be used in outpatient diabetes services].
Rev Med Suisse. 2018 Jan 10;14(588-589):111–3.
34. Calle-Bustos A-M, Juan M-C, García-García I, Abad F. An augmented reality game to support therapeutic education for children with
diabetes. PLoS ONE. 2017 Sep 28;12(9):e0184645.
35. Deutsch JE. Using virtual reality to improve walking post-stroke: translation to individuals with diabetes. J Diabetes Sci Technol. 2011
Mar 1;5(2):309–14.
36. Ruppert B. New directions in the use of virtual reality for food shopping: marketing and education perspectives. J Diabetes Sci
Technol. 2011 Mar 1;5(2):315–8.
37. Grewal GS, Sayeed R, Schwenk M, Bharara M, Menzies R, Talal TK, et al. Balance rehabilitation: promoting the role of virtual reality
in patients with diabetic peripheral neuropathy. J Am Podiatr Med Assoc. 2013 Dec;103(6):498–507.
38. Reagan L, Pereira K, Jefferson V, Evans Kreider K, Totten S, D’Eramo Melkus G, et al. Diabetes Self-management Training in a
Virtual Environment. Diabetes Educ. 2017 Jun 23;43(4):413–21.
39. Lee S, Shin S. Effectiveness of virtual reality using video gaming technology in elderly adults with diabetes mellitus. Diabetes Technol
Ther. 2013 Jun;15(6):489–96.
Paper Title: PH Meter Based Raspberry Pi and User Interface using Python
Abstract: The article about pH meter based on Raspberry Pi 3 has been created. This instrument serves as a
measure of acid base levels of solution capable of displaying a GUI ( Graphic User Interface ) based interface
programmed in the Raspberry Pi 3 System On Chip with the Python programming language. The purpose of this
research is to innovate Raspberry Pi 3 based pH measuring device, to create interfaces and store pH
measurement data based on Raspberry Pi 3 and Python programming language, find out the results of heuristic
analysis on pH meter measuring instrument innovations, and determine the accuracy of the pH meter based on
Raspberry Pi 3. The method used to pH sensor chararacterization in making this measuring instrument is
heuristic method.The characterization sensor result show that the accuracy value of the pH sensor is 99,97%, the
precision value of the pH sensor is 99,99%, the sensitivity value of pH sensor is 6,45 mV/pH, the correlation
value of the pH meter is 99,89%. Based on the result of the analysis that has been carried out, it can be conclude
the innovation in pH measuring device that are made have a good accuracy and can measure well.
Paper Title: Integrating Feature Selection and Multiclass Classification for Sport Result Prediction
Abstract: Machine learning (ML) has become the most predominant methodology that shows good results
in the classification and prediction domains. Predictive systems are being employed to predict events and its
results in almost every walk of life. The field of prediction in sports is gaining importance as there is a huge
community of betters and sports fans. Moreover team owners and club managers are struggling for Machine
learning models that could be used for formulating strategies to win matches. Numerous factors such as results
of previous matches, indicators of player performance and opponent information are required to build these
models. This paper provides an analysis of such key models focusing on application of machine learning
algorithms to sport result prediction. The results obtained helped us to elucidate the best combination of feature
selection and classification algorithms that render maximum accuracy in sport result prediction.
Keyword : Machine Learning, Prediction, Supervised learning, Classification, Feature Selection, Sport Result
Prediction
References:
1. Rory P. Bunker, Fadi Thabtah, “A machine learning framework for sport result prediction”, Applied Computing and
Informatics,Vol.15,Issue 1,January 2019.
2. A. McCabe, J. Trevathan, "Artificial intelligence in sports prediction", Information Technology: New Generations 2008. ITNG 2008.
Fifth International Conference on, pp. 1194-1197, 2008.
230. 3. Tianqi Chen, Carlos Guestrin, “XGBoost: A Scalable Tree Boosting System”, KDD ’16, August 13-17, 2016, San Francisco, CA,
USA c 2016 ACM.
4. Ramraj S, Nishant Uzir, Sunil R, Shatadeep Banerjee, “Experimenting XGBoost Algorithm for Prediction and Classification of 1339-
Different Datasets”, International Journal of Control Theory and Applications, Vol.9,2016. 1342
5. Nicholas I. Sapankevych, Ravi Sankar, “Time Series Prediction Using Support Vector Machines: A Survey IEEE Computational
Intelligence Magazine ,Volume: 4 , Issue: 2 , May 2009.
6. Janmenjoy Nayak, Bighnaraj Naik, H. S. Behera, “A Comprehensive Survey on Support Vector Machine in Data Mining Tasks:
Applications & Challenges”, International Journal of Database Theory and Application Vol.8, No.1 (2015), pp.169-186.
7. Yashima Ahuja & Sumit Kumar Yadav, “Multiclass Classification and Support Vector Machine”, Global Journal of Computer Science
and Technology Interdisciplinary Volume 12 Issue 11 Version 1.0 Year 2012.
8. Neha Mehra, Surendra Gupta, “Survey on Multiclass Classification Methods”, International Journal of Computer Science and
Information Technologies, Vol. 4 (4) , 2013, 572 – 576.
9. G. Malik , M. Tarique, “On Machine Learning Techniques For Multi-class Classification”, International Journal of Advancements in
Research & Technology, Volume 3, Issue 2, February-2014
10. S. Khalid, T. Khalil and S. Nasreen, "A survey of feature selection and feature extraction techniques in machine learning," 2014
Science and Information Conference, London, 2014, pp. 372-378.
11. Cai, Jie & Luo, Jiawei & Wang, Shulin & Yang, Sheng. “ Feature selection in machine learning: A new perspective.”(2018)
Neurocomputing. 300. 10.1016/j.neucom.2017.11.077.
12. D. Prasetio and D. Harlili, "Predicting football match results with logistic regression," 2016 International Conference On Advanced
Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-5.
13. Schumaker R.P., Solieman O.K., Chen H. (2010) Predictive Modeling for Sports and Gaming. In: Sports Data Mining. Integrated
Series in Information Systems, vol 26. Springer, Boston, MA.
14. https://hub.packtpub.com/predicting-sports-winners-decision-trees-and-pandas/
15. Che Mohamad Firdaus Che Mohd Rosli et al 2018 J. Phys.: Conf. Ser. 1020012003.
16. Maral Haghighat, Hamid Rastegari and Nasim Nourafza , “A Review of Data Mining Techniques for Result Prediction in Sports”,
ACSIJ Advances in Computer Science: an International Journal, Vol. 2, Issue 5, No.6 , November 2013.
17. Min-Ling Zhang and Zhi-Hua Zhou, "A k-nearest neighbor based algorithm for multi-label classification”, IEEE International
Conference on Granular Computing, Beijing, 2005, pp. 718-721 Vol. 2.
Paper Title: Tomato Leaf Disease Prediction using Convolutional Neural Network
Abstract: Plant diseases are the common cause of the reduction in yield eventually resulting in low income
to farmers. Researchers are at their best efforts to find a solution for the detection of plant diseases to increase
farm productivity. In this paper, a novel approach of disease detection and prediction for tomato plant leaves has
been proposed using deep learning techniques. Training of the models was performed with the use of an open
database of 13,848 images, which included 7 distinct classes of [plant, disease] combinations, including healthy
tomato crops. Convolution Neural Network which is well-suited for detection and prediction problems has been
used for predicting healthy and unhealthy leaves affected by two types of diseases septoria spot and bacteria
spot. Experiments are conducted using plant village dataset comprising of 4930 images including healthy and
unhealthy leaves. The performance of the model is evaluated using precision, recall and F1-score and the model
has achieved the highest accuracy 94.66 %. The significantly high success rate makes the model a very useful
advisory or early warning tool.
Paper Title: Optimized Uplink Scheduling Model through Novel Feedback Architecture for Wimax Network
Abstract: Broadband Wireless Access has drawn the fine attention due to the wide range of data
requirement and user mobility all the time. Moreover, WiMAX provides the best QoE (Quality of Experience)
which is based on the IEEE 802.16 standards; this includes several services such as data, video and audio.
However, in order to provide the effective and smooth experience i.e. QoS scheduling plays one of the critical
part. In past several mechanism has been proposed for effective scheduling however, through the research it is
233. observed that it can be furthermore improvised hence in this we propose a mechanism named as OUS
(Optimized Uplink Scheduling) which helps in improvising the QoS. In here, we have proposed a novel 1353-
feedback architecture and proposed optimized scheduling which helps in computing the bandwidth request this 1359
in terms helps in reducing the delay as well as jitter. Moreover, the performance evaluation is performed through
extensive simulation by varying the different SS and frequency and the results analysis confirms that our
mechanism performs way better than the existing algorithm.
Paper Title: Efficient Data Collection using Mobile Sink Scheme in IoT
Abstract: Wireless sensor networks (WSNs) have become increasingly important in the informative
development of communication technology. The growth of Internet of Things (IoT) has increased the use of
WSNs in association with large scale industrial applications. The integration of WSNs with IoT is the pillar for
the creation of an inescapable smart environment. A huge volume of data is being generated every day by the
deployment of WSNs in smart infrastructure. The collaboration is applicable to environmental surveillance,
health surveillance, transportation surveillance and many more other fields. A huge quantity of data which is
obtained in various formats from varied applications is called big data. The Energy efficient big data collection
requires new techniques to gather sensor-based data which is widely and densely distributed in WSNs and
spread over wider geographical areas. In view of the limited range of communication and low powered sensor
nodes, data gathering in WSN is a tedious task. The energy hole is another considerable issue that requires
attention for efficient handling in WSN. The concept of mobile sink has been widely accepted and exploited,
234. since it is able to effectively alleviate the energy hole problem. Scheduling a mobile sink with energy efficiency
is still a challenge in WSNs time constraint implementation due to the slow speed of the mobile sink. The paper
1360-
addresses the above issues and the proposal contains four-phase data collection model; the first phase is the
1371
identification of network subgroups, which are formed due to a restricted range of communication in sensor
nodes in a wide network, second is clustering which is addressed on each identified subgroup for reducing
energy consumption, third is efficient route planning and fourth is based on data collection. The two time-
sensitive route planning schemes are presented to build a set of trajectories which satisfy the deadline constraint
and minimize the overall delay. We have evaluated the performance of our schemes through simulation and
compared them with the generic enhanced expectation-maximization (EEM) mobility based scenario of data
collection. Simulation results reveal that our proposed schemes give much better results as compared to the
generic EEM mobility approach in terms of selected performance metrics such as energy consumption, delay,
network lifetime and packet delivery ratio.
Keyword : Wireless Sensor Network, Internet of Things, Mobile Sink Scheme, Big Data, Grouping,
Clustering.
References:
1. Z. Sheng, C. Mahapatra, C. Ghu and V.C.M. Leung, “Recent Advances in Industrial Wireless Sensor Networks Toward Efficient
Management in IoT,” IEEE Access, Vol. 19, No. 3, pp. 622 -637, May 2015.
2. E.P.K. Gilbert, B. Kaliaperumal and E.B. Rajsingh, “Research Issues in Wireless Sensor Network Applications: A Survey,”
International Journal of Information and Electronics Engineering, Vol. 2, No. 5, pp. 702-706, September 2012.
3. D.J. Cook and S.K. Das, Smart Environments: Technologies, Protocols and Applications. John Wiley, 2004.
4. D.J. Cook and S.K. Das, “How Smart are our Environments? An Updated Look at the State of the Art,” Journal of Pervasive and
Mobile Computing, Vol. 3, No. 2, pp. 53-73, March 2007.
5. K.L.M. Ang, J.K.P. Seng and A.M. Zungeru, “Optimizing Energy Consumption for Big Data Collection in Large -Scale Wireless
Sensor Networks With Mobile Collectors,” IEEE Systems Journal, Vol. 12, No. 1, pp. 616 -626, March 2018.
6. I.A.T. Hashem, N.B. Anuar, A. Gani and E. Ahmed, “The Role of Big Data in Smart City,” Article in International Journal of
Information Management, Vol. 36, No. 5, pp. 748-758, October 2016.
7. S. Boubiche, D.E. Boubiche and B. Azzedine, “Integrating Big Data Paradigm in WSNs,” International Conference on Big Data
and Advanced Wireless Technologies, November 2016.
8. A. Siddiqa, I.A.T. Hashem, I. Yaqoob, M. Marjani, S. Shamshirb, A. Gani and F. Nasaruddin, “A Survey of Big Data
Management:Taxonomy and State-of-the-Art,” Journal of Network and Computer Applications, Vol. 71, pp. 151-166, August 2016.
9. L.G. Rios and J.A.I. Diguez, “Big Data Infrastructure for Analyzing Bata Generated by Wireless Sensor Networks,” IEEE
International Congress on Big Data, pp. 816–823, July 2014.
10. N. Chand, R.C. Joshi and M. Misra, “A Zone Co‐operation Approach for Efficient Caching in Mobile Ad Hoc
Networks,” International Journal of Communication Systems, Vol. 19, No. 9, pp. 1009 -1028, January 2006.
11. A. Kumar, V. Kumar and N. Chand, “Energy Efficient Clustering and Cluster Head Rotation Scheme for Wireless Sensor
Networks,” International Journal of Advanced Computer Science and Applications, Vol. 3, No. 5, pp. 129 -130, December 2011.
12. M. Ma, Y. Yang and M. Zhao, “Tour Planning for Mobile Data-Gathering Mechanisms in Wireless Sensor Networks,” IEEE
Transactions on Vehicular Technology, Vol. 62, No. 4, pp. 1472-1783, May 2013.
13. N. Chand, “Cooperative Data Caching in WSN,” World Academy of Science, Engineering and Technology, Vol. 6, No. 3, pp. 90-
94, 2012.
14. S.S. Jawaligi and G.S. Biradar, “Reliability and Load Sensitive Data Gathering Protocol for WSNs Using Single Mobile Sink
Node,” International Conference on Emerging Technological Trends, pp. 1-10, October 2016.
15. S. Soni and N. Chand, “Energy Efficient Multi-Level Clustering to Prolong the Lifetime of Wireless Sensor Networks,” Journal of
Computing, Vol. 2, No. 5, pp. 158-165, May 2010.
16. R.N. Sharma, N. Chand, V. Sharma and D. Yadav, “Decision Support System for Operation, Scheduling and Optimization of
Hydro Power Plant in Jammu and Kashmir Region,” Renewable and Sustainable Energy Reviews, Vol. 43, No. 1, pp. 1099 -1113,
January 2015.
17. R.C. Shah, S. Roy, S. Jain and W. Brunette, “Data MULEs: Modeling a Three-Tier Architecture for Sparse Sensor Networks,”
IEEE Conference on Sensor Network Protocols and Applications, pp. 215 -233, June 2003.
18. J. Luo and J. Hubaux, “Joint Mobility and Routing for Lifetime Elongation in Wireless Sensor Networks,” IEEE Conference on
Computer and Communication Societies, pp. 1735- 1746, March 2005.
19. V. laxmi, “An Efficient Way to Gather Big data in WSN using Mobile Sink Routing,” International Journal of Advanced Research
in Computer and Communication Engineering, Vol. 4, No. 8, pp. 43-45, August 2015.
20. A. Kaswan, K. Nitesh and P.K. Jana, “Energy Efficient Path Selection for Mobile Sink and Data Gathering in Wireless Sensor
Networks,” International Journal of Electronics and Communications, Vol. 73, No. 1, pp. 110 -118, March 2017.
21. K.R.R. Babu, G.J. Suja, P. Samuel and S. Jos, “Performance Analysis of Big Data Gathering in Wireless Sensor Network Using an
EM Based Clustering Scheme,” International Conference on Advances in Computing and Communications, pp. 109 -113,
September 2015.
22. J. Du, H. Wang and Y. Wu, “A Data Collection Approach Based on Mobile Sinks for Heterogeneous Sensor Networks,”
International Conference on Wireless Communications & Signal Processing, pp. 1-6, October 2016.
23. Y. Zhang, Z. Zhou, D. Zhao, M. Barhamgi and T. Rahman, “Graph-Based Mechanism for Scheduling Mobile Sensors in Time-
Sensitive WSNs Applications,” IEEE Access, Vol. 5, pp. 1559-1569, February 2017.
24. C. Gherbi, Z. Aliouat and M. Benmohammed, “ Distributed Energy Efficient Adaptive Clustering Protocol with Data Gathering for
Large Scale Wireless Sensor Networks,” IEEE International Symposium on Programming and Systems, pp. 1-7, April 2015.
25. J.W. Kim, J.S. In, K. Hur, J.W. Kim and D.S. Eom, “An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs,”
IEEE Transactions on Consumer Electronics, Vol. 56, No. 4, pp. 2310-2316, November 2010.
26. C. Konstantopoulos, G. Pantziou, D. Gavalas, A. Mpitziopoulos and B. Mamalis, “A Rendezvous-Based Approach Enabling
Energy-Efficient Sensory Data Collection with Mobile Sinks,” IEEE Transaction on Parallel and Distributed Systems, Vol. 23, No.
5, pp. 809-817, May 2012.
27. L. He, J. Pan and J. Xu, “A Progressive Approach to Reducing Data Collection Latency in Wireless Sensor Networks with Mobile
Elements,” IEEE Transaction on Mobile Computing, Vol. 12, No. 7, pp. 1308-1320, July 2013.
28. C. Zhu, S. Wu, G. Han, L. Shu and H. Wu, “A Tree-Cluster-Based Data-Gathering Algorithm for Industrial WSNs With a Mobile
Sink,” IEEE Access, Vol. 3, No.1, pp. 381-396, May 2015.
29. A.A. Safia, Z. Aghbari and I. Kamel, “Efficient Data Collection by Mobile Sink to Detect Phenomena in Internet of
Things,” Information, Vol. 8, No. 4, pp. 123-140, October 2017.
Paper Title: Hybrid Cross Layer Mechanism For High Reliability In Under Water Wireless Sensor Network
Abstract: Underwater sensor network finds lot of applications in sea environment monitoring. Tsunami like
conditions can be monitored and reported earlier so that people on shores can be safe. Due to nature of medium,
the data delivery ratio in under water sensor networks is very low. The various problems in the underwater
sensor networks are crucial delay, Double side spreading, multipath induced fading, bandwidth limitation,
Doppler effects. These problems reduce the data delivery ratio, network lifetime and other parameters.In order to
235. increase the performance of the underwater communication system,Reed Solomon encoding technique with
hybrid cross layer methodis used in physical, data link and routing layer . The proposed method increase the 1372-
reliability of underwater wireless sensor networks. 1376
237. Paper Title: Energy Efficient Clustering using MMHC (Modified Multi-Hop Clustering)
Abstract: In recent years, the WSN has been widely used for building the DSS (Decision Support System) 1383-
for solving the real-world problem. Moreover, out of several fields, one of the interesting field that requires DSS 1388
is monitoring of agriculture environment. Nowadays, Monitoring agriculture environment has become one of the
essential field. A smart WSN system is capable of collecting as well as processing the huge data by monitoring
the soil conditions, weather situation and others. Hence, IoT (Internet of Things) is employed in order to enhance
the productivity and efficiency in the agriculture sector. IoT integrates the various technology such as RFI
(Radio Frequency Identification), cloud computing, end-user applications and middleware system. Hence, it is
obvious to obtain the higher efficiency for DC (Data Collection). In this paper shared based algorithm known as
MMHC (Modified Multi-Hop Clustering) is proposed , this algorithm has three stage i.e. assembling , coupling
and removing the redundant nodes. In this modified more than one node can be selected in the other two stage
and the more than one node can be removed in third stage, this in terms helps in achieving higher efficiency.
Later in order to evaluate the algorithm and prove the efficiency of our proposed algorithm, Comparative
analysis is done with the Leach protocol based on the several parameter and it clearly shows that our model
outperforms the Existing i.e. Leach algorithm.
Paper Title: Detecting Complex Control-Flow Constructs for Choosing Process Discovery Techniques
Abstract: Process models are the analytical illustration of an organization’s activity. They are very
primordial to map out the current business process of an organization, build a baseline of process enhancement
and construct future processes where the enhancements are incorporated. To achieve this, in the field of process
mining, algorithms have been proposed to build process models using the information recorded in the event logs.
However, for complex process configurations, these algorithms cannot correctly build complex process
structures. These structures are invisible tasks, non-free choice constructs, and short loops. The ability of each
discovery algorithm in discovering the process constructs is different. In this work, we propose a framework
238. responsible of detecting from event logs the complex constructs existing in the data. By identifying the existing
constructs, one can choose the process discovery techniques suitable for the event data in question. The proposed 1389-
framework has been implemented in ProM as a plugin. The evaluation results demonstrate that the constructs 1393
can correctly be identified.
Keyword : Process models, process discovery, event log, process structure, recommendation.
References:
1. H. R’bigui and C. Cho, “An Industrial Application of Process Mining for Analyzing a Real Order Fulfillment Process of a Shipbuilding
industry,” Proc. Of the Korean Institute of Industrial Engineers, vol.2018, no. 11, 2018, pp. 368-375.
2. W.M.P. Van der Aalst, “Process Mining: Discovery, Conformance and Enhancement of Business Processes”, 1st ed., Berlin
Heidelberg: Springer-Verlag, 2011.
3. W.M.P. van der Aalst, A.J.M.M. Weijters, and L. Maruster, “Workflow Mining: Discovering Process Models from Event Logs, ” IEEE
T. Knowl. Data En., vol.16, no.9, pp. 1128-1142, 2004.
4. S. Leemans, D. Fahland, and W. M. P. van der Aalst, “Discovering block-structured process models from event logs containing
infrequent behavior,” Int. Conf. BPM, LNBIP, vol. 171, Cham/Springer, pp. 66–78, 2014.
5. H. R’bigui, and C. Cho, “Heuristic Rule-based Process Discovery Approach from Events Data,” Int. J. Technology Policy and
Management, Special Issue on: Knowledge Management. System, vol.19, no. 4, in press, 2019.
6. H. R’bigui and C. Cho, “Customer Oder Fulfillment Process Analysis with Process Mining: An Industrial Application in a Heavy
Manufacturing Company, ” Proc. of the ACM Int. Con on Computer Science and Artificial Intelligence, pp. 247-252, Jakarta,
Indonesia, Dec 05-07, 2017.
7. D. Vazquez Barreiros, M. Chapela, M. Mucientes, Lama, and D. Berea, “Process Mining in IT Service Management: A Case Study,”
Int. Worshop on Algorithm & Theory for the Analysis of Event Data (Toruń, Poland), CEUR-WS.org, pp. 16-30, 2016.
8. H. R’bigui and C. Cho, “Purchasing Process Analysis with Process Mining of a Heavy Manufacturing Industry,” IEEE Proc. of the 9th
Int. Conf. on Information and Communication Technology, pp. 495-498, Jeju Island, Korea, Oct 17-19, 2018.
9. L. Wen, J. Wang and J. Sun, “Mining Invisible Tasks from Event Logs, ” LNCS 4505, Springer, Berlin, Heidelberg, pp. 358-365,
2007a.
10. Q. Guo, L. Wen, J. Wang, Z. Yan and P S. Yu, “Mining invisible tasks in non-free-choice constructs, ” LNCS 9253, Motahari-Nezhad
., Recker J, Weidlich M (eds.), Springer, Cham, pp. 109–125, 2015.
11. L. Wen, W M P. Van der Aalst, J. Wang, and J. Sun, “Mining process models with non-free-choice constructs, ” Data Mining and
Knowledge Discovery, vol.15 no.2., pp. 145-180, 2007b.
12. H. R’bigui and C. Cho, "Complex Control-Flow Constructs Detection from Process Related Data," 2019 21st Int. Conf. on Advanced
Communication and Technology (ICACT), PyeongChang Kwangwoon_Do, Korea (South), 2019, pp. 579-582.
Paper Title: Data Centric Access Security- an Improvised Technique to Achieve Security in Cloud Environment
Abstract: Cloud computing innovation has now turned into a good substitute to traditional computing
technological developments This advancement of technology offers a new concept of a charge-per-use access
resource model based primarily on virtualization technology. Because of the numerous advantages they offer,
cloud computing concepts are achieving rapid adoption. This would comprise price-efficiency, time involved,
and effective use of assets in computation. Given these advantages, there are many barriers to the widespread
acceptance of this emerging technology, particularly data privacy and security issues. In extension to the
conventional security hazards faced by internet-connected computer systems, cloud systems have relevant
privacy and security problems due to the virtualization and multi-tenancy environment of the cloud. A further
research target is focused on principles of Trust Computing (TC). Although these techniques offer users with
mechanisms for evaluating and assessing security, they do not yield enough controlling functionality for users.
In addition, Data Centric Security (DCS) is an evolving strategy intended to protect the data itself against
migration towards the cloud.
Keyword : Cloud Computing , Data Security , Data Centric Security, Encryption ,Trusted Computing , CRT .
References:
1. L. Chen and D. Hoang, "Active data-centric framework for data protection in cloud environment," in ACIS 2012: Proceedings
of the 23rd Australasian Conference on Information Systems 2012, Geelong, Australia, 2012, pp. 1-11.
239. 2. S. Ransom and C. Werner, "Towards Data-Centric Security in Ubiquitous Computing Environments," in Database and Expert
Systems Application, 2009. DEXA '09. 20th International Workshop on, 2009, pp. 26-30.
3. O. Knill, "A multivariable Chinese remainder theorem," arXiv preprint arXiv:1206.5114, 2012. 1394-
4. S. Ransom and C. Werner, "Towards Data-Centric Security in Ubiquitous Computing Environments," in Database and Expert Systems 1399
Application, 2009. DEXA '09. 20th International Workshop on, 2009, pp. 26-30.
5. T. J. Lehman and S. Vajpayee, "We've Looked at Clouds from Both Sides Now," in SRII Global Conference (SRII), 2011 Annual,
2011, pp. 342-348.
6. Y. Chen, V. Paxson, and R. H. Katz, "What’s new about cloud computing security?," University of California,
Berkeley Report No. UCB/EECS-2010-5 January, vol. 20, pp. 2010-5, 2010.
7. B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9 , pp.
50-57, 2011.
8. T. Dillon, W. Chen, and E. Chang, "Cloud Computing: Issues and Challenges," in Advanced Information Networking and Applicatio ns
(AINA),
9. 2010 24th IEEE International Conference on, 2010, pp. 27-33.
10. [9] Y. Chen, V. Paxson, and R. H. Katz, "What’s new about cloud computing security?," University of California,
Berkeley Report No. UCB/EECS-2010-5 January, vol. 20, pp. 2010-5, 2010.
11. K. Popovic and Z. Hocenski, "Cloud computing security issues and challenges," in MIPRO, 2010 Proceedings of the 33rd
International Convention, 2010, pp. 344-349.
12. S. Iftene, "General secret sharing based on the Chinese remainder theorem," ed: Citeseer, 2006.
13. S. A. Almulla and Y. Chan Yeob, "Cloud computing security management," in Engineering Systems Management and Its
Applications (ICESMA), 2010 Second International Conference on, 2010, pp. 1-7.
14. F. Rocha, S. Abreu, and M. Correia, "The Final Frontier: Confidentiality and Privacy in the Cloud," Computer, vol. 44, pp . 44-50,
2011.
15. R. K. L. Ko, M. Kirchberg, and B. S. Lee, "From system centric to datacentric logging - Accountability, trust & security in cloud
computing," in Defense Science Research Conference and Expo (DSR), 2011, 2011, pp. 1-4.
16. A.-R. Sadeghi, "Trusted Computing — Special Aspects and Challenges SOFSEM 2008: Theory and Practice of Computer Science."
vol. 4910, V. Geffert, J. Karhumäki, A. Bertoni, B. Preneel, P. Návrat, and M. Bieliková, Eds., ed: Springer Berlin / Heidelb erg, 2008,
pp. 98-117.
Keyword : Adaptation, Analysis phase, Ergonomic user interface (EUI), and Multi-Agent System (MAS).
References:
1. Brad A. Myers, “Why are HCI difficult to design and implement?”, Technical Report, CMU-CS-93-183, Computer Science Dept.,
Carnegie Mellon University Pittsburgh, July 1993.
2. Francois Bodart, Jean Vanderdonckt, A. Hennebert, Isabelle Sacre, and J. Leheureux, “Architecture Elements for Highly-Interactive
Business-Oriented Applications,” In 3rd International Conference on HCI. EWHCI 1993. Lecture Notes in Computer Science,
Volume: 753. Springer, Berlin, pp. 83-104.
3. A. Puerta. “A Model-Based Interface Development Environment”. In IEEE Software, V0 lume: 14, Issue: 4, Jul/Aug 1997, pp. 40-47.
DOI: 10.1109/52.595902
4. Michael E. Bratman; “Intention, Plans and Practical Reason”. CSLI Publications, 1987.
5. Chandra S. k, J. Ram, & Abdul Muqsit Khan, “The Peculiarities of Software Composition Models”, J. of Digital Information
Management, Volume: 3, Issue: 3, September 2005, pp.181-187.
6. Francois Bodart, J. Vanderdonckt Anne-Marie Hennebert, and J. Leheureux, “Towards a Dynamic Strategy for Computer-Aided Visual
Placement,” in Proceedings of Workshop on Advanced Visual Interfaces AVI94, ACM, NY, Jan. 1994, pp.78-87.
7. Donald A. Norman, and Stephen W. Draper, “User centered system design: New perspectives on human-computer interaction,” L.
Erlbaum Associates Inc. Hillsdale, NJ, USA, 1986.
8. Md. Abdul Muqsit Khan, and Chandra S.K., “Ergonomics for web applications development,” in Proceedings of 4th Int. Conf., IETET, 1406-
India, 2013, pp. 62-72. 1410
9. Ben Shneiderman, “Designing the User Interface Strategies for Effective HCI,” 5th edition, publisher Pearson, 2009.
10. Sidney L. Smith and Jane N. Mosier. “Design Guidelines for Designing User Interface Software”. Tec. Rep. MTR-10090, The MITRE
Corporation, Bedford, Massachusetts, USA, Aug.1986.
11. International Business Machines Corporation. “Object–oriented interface design: IBM common user access guidelines,” QUE, Carmel,
1992.
12. D. V. Duyne, Jason I. Hong and James A. Landay, “The Design of Sites: Patterns, Principles and Processes for Crafting a Customer-
Centered Web,” Addison Wesley Professional Publication. 2003.
13. Jenifer Tidwell, “Common Ground: A Pattern Language for HCI Design”, http://www.mit.edu/~jtidwell/interaction_patterns.html,
1999.
14. J.M.C. Bastien, D.L. Scapin, “Evaluating a user interface with ergonomic criteria,” International J. of HCI, Volume: 7, Issue: 2, pp.
105- 121, 1995.
15. Quentin Limbourg, B. Michotte, J. Vanderdonckt, L. Bouillon, and V.L Jaquero, “UsiXML: a Language Supporting Multi-Path
Development of UIs”, in Proc. IFIP Int. Conf. on Engg. for HCI LNCS, Volume: 3425, Springer, 2005, pp. 200-220.
16. www.cs.toronto.edu/km/GRL
17. Eric Yu, “Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering”, In Proceedings of ISRE 97, the 3rd
IEEE Intrnational Symposium on Requirements Eng., at Annapolis, MD. USA. 1997, pp. 226-235.
18. Chandra K. S., Md Abdul Muqsit Khan, and Gopal, “Obstacles to Machine Translation,” Int. J. of Translation, Vol. 18(1-2), Aug.
2006, pp. 89-102.
19. Chandra Sekharaiah. K., and Md Abdul Muqsit Khan, “Affective Computing: Next Generation AI Software Systems”, The IUP J. of
Information Tech., Volume: 3(4), Decmber 2007, pp. 61-74.
20. Chandra S.K., and Md Abdul Muqsit Khan, “Towards Metrics for Social Computing,” Proceedings of W0 rld Academy of Science,
Eng. and Tec. 37, January 2009, pp 1086-1090.
21. Chandra S.K., and Md. Abdul Muqsit Khan, “Computer Ergonomics: Relooking at Machines vs. Environment,” The IUP J. of
Information Tech., Volume: 2, Issue 3, 2006, pp. 19-27.
22. Md. Abdul Muqsit Khan, and Chandra S.K., “Perspective of MAS Modeling Through Roles and Ontology,” in Int. J. of Recent
Trends in Eng., Volume:1(2), 2009, pp. 294-298.
23. Chandra S.K., and Md. Abdul Muqsit Khan. “Computer Ergonomics: Relooking at Machines vs. Environment,” in ch. 21 of
Environmental Protection, Daya Publishing House, 2007, pp.104-112.
24. Chandra S. K., and Md. Abdul Muqsit Khan, “The Patents Act and Related Issues: Indian Scenario,” in Proceedings of the National
Workshop on IPR Curriculum for Eng. and Science Students, IIT Roorkee, India, 2005, pp. 18-19.
25. Md. Abdul Muqsit Khan, “Ergonomic User Interface: System Assessment and Design Process “, Int. J. of Eng. Tech. Management
and Applied Sci., Volume: 4(11), Nov. 2016, pp. 79-84.
26. Md. Abdul Muqsit Khan, “Ergonomic User Interface: System Logical Analysis and Design Process,” in Int. Journal of Eng.
Technology Sci. and Research, Volume: 4(11), Nov. 2016, pp. 64-71.
27. Md. Abdul Muqsit Khan, “Framework for Multi-Agent Based Intelligent Ergonomic User Interface System: Requirements Phase” in
Int. J. of Advanced Research in Computer Science. Vol. 8(7), Jul-Aug. 2017, pp. 599-603.
242. The Effect of Silicon-Organic Modifier of CdZnS/ZnS (GT) Quantum Dot with Wavelength 390 nm
Paper Title:
on cathodoluminescent mode
Abstract: Surface modification of quantum Dots is very demanding to improve the optical properties of 1411-
quantum Dots and it is generally carried out by depositing an organic or an inorganic layer on the quantum Dots. 1413
In this study the behavior of CdZnS/ZnS and CdZnS/ZnS (GT), both emitting at 390 nm, differ by silicon-
organic additives studying in a vacuum chamber to find out their feature and to identify the luminescent of
quantum Dots, under the action of electron bombardment to assess the capability of quantum Dots as phosphors
for further use in vacuum electronics
Keyword : quantum dots, core/shell quantum dots, light sources, cathodoluminescence, passivation,
CdZnS/ZnS, CdZnS/ZnS (GT)
References:
1. Bondarenko B.V., Rybakov Yu.L., Shakhovskoi A.G., Sheshin E.P., //Some features of the process of stabilization of field emission
characteristics of carbon fibers. //Theses of the reports of the XIX All Union Conference on Emission Electronics. Tashkent. 1984. P.
31. ( Russian).
2. Levshin V.L. et al. Researching cathodoluminescence of ZnS and some other phosphors // Works of P.N. Lebedev’s Institute of
Physics. 1963. pp. 64–135.
3. Klimov V.I., Ed. Nanocrystal Quantum Dots (2nd Ed.). // CRC Press, 2010.
4. Ozol D.I. Preliminary study of cathode ray tube phosphors on the basis of nanocrystal quantum dots // 29th International Vacuum
Nanoelectronics Conference (IVNC), 2016, Vancouver, BC, 2016, pp. 1-2.
5. Dezhurov S.V. et al. Synthesizing highly stable colloid quantum dots CDTESE/CDS/CDANS/ZNS, exhibiting fluorescence in 650-750
nm range // Russian nanotechnology, 2016, #5-6 pp. 69-74.
6. Majmaa Huda k.,Sheshin E.P.// Researching CdZnS/ZnS (GT) Quantum Dots in Cathodoluminescent Mode// International Journal of
Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue- 9S2, July 2019
Paper Title: Object Detection Method Based on YOLOv3 using Deep Learning Networks
Abstract: Object Detection is being widely used in the industry right now. It is the method of detection and
shaping real-world objects. Even though there exist many detection methods, the accuracy, rapidity, and
efficiency of detection are not good enough. So, this paper demonstrates real-time detection using the YOLOv3
algorithm by deep learning techniques. It first makes expectations crosswise over 3 unique scales. The
identification layer is utilized to make recognition at highlight maps of three distinct sizes, having strides 32, 16,
8 individually. This implies, with partner contribution of 416 x 416, we will in general form location on scales
13 x 13, 26 x 26 and 52x 52. Meanwhile, it also makes use of strategic relapse to anticipate the jumping box
article score, the paired cross-entropy misfortune is utilized to foresee the classes that the bounding box may
contain, the certainty is determined and afterward the forecast. It results in perform multi-label classification for
objects detected in images, the average preciseness for tiny objects improved, it's higher than quicker RCNN.
MAP increased significantly. As MAP increased localization errors decreased.
243.
Keyword : (YOLOv3, deeplearning, dimensional clustering, object detection)
1414-
References: 1417
1. Vermesan,O.,&Bacquet,J.(2017).Cognitive Hyper connected Digital transformation. Cognitive Hyperconnected Digital
Transformation, 1–310. doi: 10.13052/rp-9788793609105
2. Dimiccoli, M. (2018). Computer Vision for Egocentric (First-Person) Vision. Computer Vision for Assistive Healthcare, 183–
210. doi: 10.1016/b978-0-12-813445-0.00007-1
3. Khanna, S., Rakesh, N., & Chaturvedi, K. N. (2017). Operations on Cloud Data (Classification and Data Redundancy). Advances in
Computer and Computational Sciences Advances in Intelligent Systems and Computing, 169–179. doi: 10.1007/978-981-10-3773-
3_17
4. Ketkar, N. (2017). Training Deep Learning Models. Deep Learning with Python, 215–222. doi: 10.1007/978-1-4842-2766-4_14
5. Berg, A. C., & Malik, J. (2006). Shape Matching and Object Recognition. Toward Category-Level Object Recognition Lecture Notes
in Computer Science, 483–507. doi: 10.1007/11957959_25
6. He, X., & Deng, L. (2018). Deep Learning in Natural Language Generation from Images. Deep Learning in Natural Language
Processing, 289–307. doi: 10.1007/978-981-10-5209-5_10
7. Li, C.-S., Darema, F., Kantere, V., & Chang, V. (2016). Orchestrating the Cognitive Internet of Things. Proceedings of the
International Conference on Internet of Things and Big Data. doi: 10.5220/0005945700960101
8. Nagaraj, B., & Vijayakumar, P. (2012). Tuning of a PID Controller using Soft Computing Methodologies Applied to Moisture
Control in Paper Machine. Intelligent Automation & Soft Computing, 18(4), 399–411. doi: 10.1080/10798587.2012.10643251
9. Sathi, A. (2016). Cognitive Things in an Organization. Cognitive (Internet of) Things, 41– 59. doi: 10.1057/978-1-137-59466-2_4
Keyword : cryogenic treatment, fly ash reinforced LM 25 composites, cryogenic soaking period, mechanical
behaviour, Taguchi, ANOVA.
References:
1. R. Rajesh, “Effect of Chemical Treatment on the Mechanical Properties of Palm Fiber Reinforced Polymer composites”, Research
Journal of Science and Engineering Systems, vol.1, 2017, pp.8-18.
2. Volker Franco Steier, Edgar SobralAshiuchi, Lutz Reißig, and José Alexander Araújo, “Effect of a Deep Cryogenic Treatment on Wear
and Microstructure of a 6101 Aluminum Alloy,” Advances in Materials Science and Engineering, vol. 2016.
245. 3. K. Gu, J. Wang, and Y. Zhou, “Effect of cryogenic treatment on wear resistance of Ti-6Al-4V alloy for biomedical applications,”
Journal of the Mechanical Behavior of Biomedical Materials, vol. 30, 2014, pp. 131–139.
4. F.Bouzada, M. Cabeza, P. Merino, and S.Trillo, “Effect of Deep Cryogenic Treatment on the Microstructure of an Aerospace 1425-
Aluminum Alloy,” Advanced MaterialsResearch, vol.445, 2012, pp.965– 970.doi:10.4028/www.scientific.net/amr.445.9, (2012). 1431
5. Susheel Kalia, “Cryogenic Processing: A Study of Materials at Low Temperatures,”Journal of Low Temperature Physics,
vol.158, 2010, pp 934–945.
6. K. E. Lulay, Khan, Khalid; and D.Cyaaya, "The Effect of Cryogenic Treatments on 7075 Aluminum Alloy,"Engineering Faculty
Publications and Presentations, 2002. http://pilotscholars.up.edu/egr_facpubs/2
7. A.K.Singla, J.Singh and V. S. Sharma, “Processing of materials at cryogenic temperature and its implications in manufacturing : A
review”, Materials and Manufacturing Processes,2018,pp.1–38.doi:10.1080/10426914.2018.1424908, (2018).
8. X.Q.Jiang, N. Li, H.He, X. J.Zhang, C.C.Li, and H.Yang, “Effect of Cryogenic Treatment on Mechanical Properties and
Microstructures of 3102 Al-Alloy,” MaterialsScienceForum,vol.546-549,2007,pp.845–848.doi:10.4028/www.scientific.net/msf.546-
549.845.
9. J. J. Wang, X. D Xue, Z. Q. Yang, H. Zhang, , and Y.Zhou, “ Effect of Cryogenic Treatments on Mechanical Properties of 2A11
Aluminum Alloy,”AdvancedMaterialsResearch,vol.146-147,2010,pp.1646–1650.doi:10.4028/www.scientific.net/amr.146-147.1646.
10. A. Taskesen , S. Aksoz , A. T. Ozdemir , “The effect of cryogenic treatment on ageing behaviour of B4C reinforced 7075 aluminium
composites,” Kovove Mater, vol. 55 ,2017,pp. 57–67 DOI: 10.4149/km 2017 1 57.
11. S.Kumar, M. Nagaraj, N.K. Khedkar and A.Bongale, “Influence of deep cryogenic treatment on dry sliding wear behaviour of AISI
D3 die steel,”Materials Research Express,vol.5,2018, doi:10.1088/2053-1591/aadeba.
12. M. S.Rasool, M. S. M. Aripin, S.Thamizhmanii, S. B.Hasan and D.Sathiaraj, “Deep Cryogenic Treatment on Aluminum Silicon
Carbide (Al-SiC) Composite,”AdvancedMaterialsResearch,vol.383-390,2011,pp.3320–3324.doi:10.4028/www.scientific.net/amr.383-
390.3320, (2011).
13. K. E. Lulay ,K. Khan,D. Chaaya , “The effect of cryogenic treatments on 7075 aluminum alloy,” Journal of Materials Engineering and
Performance, Vol. 11(5) , 2002, pp 479–480.
14. W.Zhang, P. Bai, J.Yang, H. Xu, J.Dang and Z.Du, “Tensile behavior of 3104 aluminum alloy processed by homogenization and
cryogenic treatment,”Transactions of Nonferrous Metals Society of China, vol.24(8),2014,pp.2453–2458.doi:10.1016/s1003-
6326(14)63370-7.
15. T.Slatter and R.Thornton, “Cryogenic Treatment of Engineering Materials,” Comprehensive Materials Finishing, vol.2, 2017, pp.421–
454. doi:10.1016/b978-0-12-803581-8.09165-7.
16. R.Thornton., T.Slatter and H.Ghadbeigi, “Effects of deep cryogenic treatment on the dry sliding wear performance of ferrous
alloys,”Wear, vol.305 (1-2), 2013, pp.177–191.doi:10.1016/j.wear.2013.06.005.
17. Anil Kumar Singla, Jagtar Singh and Vishal S. Sharma, “Processing of materials at cryogenic temperature and its implications in
manufacturing: A review,”Materials and Manufacturing Processes, 2018, pp.1-38,. DOI: 10.1080/10426914.2018.1424908.
18. M.Araghchi, H. Mansouri, and R.Vafaei, “Influence of cryogenic thermal treatment on mechanical properties of an Al–Cu–Mg
alloy,”Materials Science and Technology, Vol.34 (4), 2017,pp.468–472.doi:10.1080/02670836.2017.1407553.
19. Shanmughasundaram, Palanisamy, “Investigation on the Wear Behaviour of Eutectic Al-Si Alloy- Al2O3 - Graphite Composites
Fabricated through Squeeze Casting,” Materials Research, Vol.17 (4), 2014, pp.940-946.
Paper Title: Modified Design of Savonius Wind Turbine Blade for Performance Improvement
Abstract: In the context of worldwide energetic transition, wind energy shows up as one of the most
prominent renewable energy to provide an alternative for the conventional energy source. Therefore, new
technologies of a wind turbine are developed, horizontal axis wind turbines have been extensively investigated
and evolved. However, the development of vertical axis wind turbines is still an open and area of research, The
main objective is to develop a more efficient type of wind turbines able to operate at low wind speeds to take
hold maximum wind potential, The Savonius rotor goes with such conditions, however, it faces critical
drawbacks, in particular, the low performance in comparison with horizontal axis wind turbines, as well, the
blade in return of savonius wind turbine generates a negative torque leading to a decrement of turbine
performance. The present work aims to investigate a modified model of the conventional Savonius rotors with a
focus on improving the coefficient of power, transient computational fluid dynamics (CFD) simulations are
carried out in an effort to perform a validation of numerical results according to experimental data, also to
conduct a comparative analysis of both savonius models.
Keyword : Wireless local area network, multi agent, access point, distributed constraint optimization problem,
Extended Distributed Suboptimal Channel Assignment.
References:
1. Jim Geier, “Assigning 802.11b access point channels,” Wi-Fi Planet.
2. Chen, J. K., de Veciana, G. and Rappaport, T. S. (2009). Site-Specific Knowledge and Interference Measurement for Improving
Frequency Allocations in Wireless Networks. IEEE Transactions on Vehicular Technology, vol. 58, no. 5, 2366-2377.
3. Yue, X., Wong, C.-F. and Chan, S.-H.G. (2011). CACAO: Distributed Client-Assisted Channel Assignment Optimization for
Uncoordinated WLANs. IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 9, 1433-1440.
4. Nie, N. and Comaniciu, C. (2006). Adaptive channel allocation spectrum etiquette for cognitive radio networks. Journal of Mobile
Networks and Applications, vol. 11, no. 6,779-797.
5. Huang, J., Berry, R. A. and Honig, M. L. (2006).Auction-based spectrum sharing. Journal of Mobile Networks and Applications, vol.
11, no. 3, 405-418.
6. Cao, L. and Zheng, H. (2005). Distributed spectrum allocation via local bargaining. 2nd Annual IEEE Communications Society
Conference on Sensor and Ad Hoc Communications and Networks, 475-486.
7. Peng, C., Zheng, H. and Zhao, B. Y. (2006). Utilization and fairness in spectrum assignment for opportunistic spectrum access , Journal
of Mobile Networks and Applications, vol.11, 555-576.
247. 8. Youngseok Lee, Kyoungae Kim, and Yanghee Choi, “Optimization of ap placement and channel assignment in wireless lans,” in
Proceedings of 27th Annual IEEE Conference on Local Computer Networks (LCN), 2002. 1438-
9. T. Rappaport, Wireless Communications: Principle and Practice, Prentice Hall, 1996. 1441
10. Bhaskar Krishnamachari, Stephen Wicker, Ramon Bejar, and Cesar Fernandez, “On the complexity of distributed selfconfiguration in
wireless networks,” Journal of Telecommunication Systems, 2003.
11. Filipe Mazzini, Geraldo Mateus, and James Macgregor Smith, “Lagrangean based methods for solving large-scale cellular network
design problems,” Journal of Wireless Networks, 2003.
12. Balakrishnan. S and K L Shunmuganathan. Article: A JADE Implementation of Integrated Agent System for E-Mail Coordination
(IASEC). International Journal of Computer Applications 58(5): 5-9, November 2012.
13. P.Arivazhagan, Balakrishnan. S and K L Shunmuganathan. “An Agent Based Centralized Router with Dynamic Connection
Management Scheme Using JADE”, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 11, Number 3
(2016) pp 2036-2041.
14. Balakrishnan. S and K L Shunmuganathan, R. Sreenevasan, “Amelioration of Artificial Intelligence using Game Techniques for an
Imperfect Information Board Game Geister” International Journal of Applied Engineering Research (IJAER). ISSN 0973-4562. Vol 9,
Number 22 (2014) pp. 11849-11860.
15. Balakrishnan. S and K L Shunmuganathan, An Agent Based Collaborative Spam Filtering Assistance Using JADE”, International
Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 21 (2015) pp 42476-42479.
16. S.Balakrishnan, “An Overview of Agent Based Intelligent Systems and Its Tools”, CSI Communications magazine, Volume No. 42,
Issue No. 10, January 2019, pp. 15-17.
17. S. Balakrishnan, B. Persis Urbana Ivy and S. Sudhakar Ilango, “A Novel And Secured Intrusion Detection System For Wireless Sensor
Networks Using Identity Based Online/Offline Signature”, ARPN Journal of Engineering and Applied Sciences. November 2018, Vol.
13 No. 21, pp. 8544-8547.
18. S.Balakrishnan, Vinod K, B. Shaji. (2018). “Secured and Energy Efficient AODV Routing Protocol For Wireless Sensor Network”,
International Journal of Pure and Applied Mathematics, Vol. 119, No. 10c, 2018, pp. 563-570.
19. S.Balakrishnan, J.P.Ananth, L.Ramanathan, S.P.Premnath, (2018). “An Adaptive Energy Efficient Data Gathering In Wireless Sensor
Networks”, International Journal of Pure and Applied Mathematics, Volume 118 No. 21, 2018, pp. 2501-2510.
20. J.P.Ananth, S.Balakrishnan, S.P.Premnath, (2018). “Logo Based Pattern Matching Algorithm for Intrusion Detection System in
Wireless Sensor Network”, International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp. 753 -762.
21. Ranjeethapriya K, Susila N, Granty Regina Elwin, Balakrishnan S, “Raspberry Pi Based Intrusion Detection System”, International
Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp.1197-1205.
22. Chen, J. K., de Veciana, G. and Rappaport, T. S. (2009). Site-Specific Knowledge and Interference Measurement for Improving
Frequency Allocations in Wireless Networks. IEEE Transactions on Vehicular Technology, vol. 58, no. 5, 2366-2377.
23. Mishra, A., Banerjee, S. and Arbaugh, W. (2005). Weighted coloring based channel assignment for WLANs, ACM SIGMOBILE Mob .
Comput. Commun. Rev., vol. 9, no. 3, 19-31.
Authors: D.Saravanan
Paper Title: Issues and Considerations for Effective Text Data Retrieval
Abstract: Text data retrieval is one of the major domain for extracting knowledge from the stored data sets.
248. Within the text information, the text meaningful numerical codes extracted unstructured process information is
to make the free text associated with the unstructured nature of data mining in a different stream. Number of 1442-
procedure is constructed to Performing this operations most effectively. This paper focuses one of the text 1445
retrieval process, experimental results verified proposed methods works well with most of the documents.
Keyword : Text Mining, Clusters, Text Clusters, Grouping of words, Text extraction.
References:
1. D.Saravanan, ”Clustering of video in formations using BRICH Methodology” Pak journal of biotechnology, Vol 14(Special Issue -II-
2017), Pages 377-380, Dec- 2017
2. G. Slaton and C. Buckley, "Term-weighting approaches in automatic text retrieval", Information Processing & Management, vol. 24,
1988.pp 513-523.
3. D.Saravanan, Dr.S.Srinivasan, (2013). , Matrix Based Indexing Technique for video data, Journal of computer science, 9(5), 20 13,
534-542.
4. D.saravanan, Dr.S.Srinivasan (2012). Video image retrieval using data mining Techniques, Journal of computer applications (JCA),
Vol V,Issue 01, 2012. 39-42.
5. R. Amarasiri, D. Alahakoon, M. Premaratne, and K.Smith, "Enhancing Clustering Performance of Feature Maps Using Randomness",
presented at Workshop on Self Organizing Maps (WSOM) 2005, France, 2005.pp 463-470
6. R. Amarasiri, D. Alahakoon, M. Premaratne, and K.Smith, "HDGSOMr: A High Dimensional Growing Self Organizing Map Using
Randomness for Efficient Web and Text Mining", presented at IEEE/ACM/WIC Conference on Web Intelligence (WI) 2005, Paris,
France, 2005.pp
7. D.Saravanan, A.Ramesh Kumar, “ContentBased Image Retrieval using Color Histogram”, International journal of computer science
and information technology (IJCSIT), Volume 4(2), 2013, Pages 242-245, ISSN: 0975-9646.
8. D.Saravanan “ Effective text data extraction using Hierarchical clustering technique” Int. Journal of Engg., and Advanced
Technology(IJEAT),Feb 2019, Vol. 8, Issue 3-S, Pages 741-743(ISSN 2249 8658)June 2019
9. P. Srinivasan and A. K. Sehgal, "Mining MEDLINE for Similar Genes and Similar Drugs", Department of Computer Science, The
University of Iowa TR# 03- 02, July 2003.
10. M. A. Hearst, "Untangling Text Data Mining", presented at 37th Annual Meeting of the Association for Computational Linguistics,
University of Maryland, USA, 1999.pp
11. .R. Agrawal, T. Imielinski, and A. Swami, "Mining Association Rules between Sets of Items in Large Databases", presented at 1 993
ACM SIGMOD International Conference on Management of Data, Washington, D.C.,1993.pp 207-216.
12. D.Saravanan, ”Various Assorted Cluster Performance Examination using Vide Data Mining Technique” , Global journal of pure and
applied Mathematics , Volume 11, No.6(2015), Nov 2015,ISSN 0973-1768, Pages 4457-4467
13. D D.Saravanan, “Text Information Retrieval using Data mining clustering Technique” International journal of Applied Engineering
Research , ISSN:0973-4562, Volume10, No3(2015) ,May2015,Pages 7865-7873
14. 14.D.Saravanan,V.Somasundaram “MATRIX BASED SEQUENTIAL INDEXING TECHNIQUE FOR VIDEO DATA MINING
Journal of Theoretical and Applied Information Technology 30th September 2014. Vol. 67 No.3
15. 15. Amarasiri, D. Alahakoon, and K. Smith, "HDGSOM: A Modified Growing Self-Organizing Map for High Dimensional Data
Clustering", presented at Hybrid Intelligent Systems 2004, Japan, 2004.pp 216 – 221
Keyword : Machine Learning, Artificial Neural Network, Support Vector Machine, Flood, Drought,
Prediction.
250.
References: 1451-
1. Mohamed I. Alhajri, Nazar T. Ali, M. Shubair,” Classification of Indoor Environments for Iot, Applications: A Machine Learnin g
Approach”, citation Information: Doi 10.1109/lawp. 2018.2869548, IEEE Antennas and Wireless Propagation Letters. 1457
2. Sulafa Hag Elsafi,” Artificial Neural Networks (Anns) For FloodForecasting At Dongola Station in The River Nile, Sudan”,
Alexandria Engineering Journal (2014) 53, 655–66.
3. Tuoyuan Cheng, Fouzi Harrou, Member,” Monitoring Influent Measurements at Water Resource Recovery Facility Using Data -driven
Soft Sensor Approach”, IEEE, Ying Sun And Torove Leiknes. Doi 10.1109/jsen.2018.2875954, IEEE Sensors Journal.
4. Anteneh Belayneh, Jan Adamowski, “Drought Forecasting Using New Machine Learning Methods”, Belayneh A., Adamowski J. 2013.
Drought Forecasting Using New Machine Learning Methods. Journal of Water and Land Development. No. 18 P. 3–12.
5. Amir Mosavi, Pinar Ozturk And Kwok-wing Chau, “Flood Prediction Using Machine Learning Models: Literature Review”, Water
2018, 10, 1536; doi:10.3390/w10111536
6. K. F. Fung, Y. F. Huang, C. H. Koo And Y. W. Soh,” Drought Forecasting: A Review of Modelling Approaches 2007–2017”.
7. D. Vito, Politecmico Di Milano, “Use of Multivariate Machine Learning Analysis Techniques for Flood Risk Prevention”,
https://doi.org/10.5194/isprs-archives-XLII-3-W4-549-2018.
8. Fi-john Chang , Kuolin Hsu And Li-chiu Chang ,” Flood Forecasting Using Machine Learning Methods”, Water 2019
,11,9;doi10.3390 / W11010009 , www.mdpi.com/journal/water.
9. A. L. E. Abreu And A. Chaves Neto, “Machine Learning Model for Predicting Evaporation Losses in Reservo irs”, IEEE Latin
America Transactions, Vol. 16, No. 7, July 2018.
10. Dongjun Suh And Hyunyoung Kim, Jinsul Kim,” Estimation of Water Demand in Residential Building Using Machine Learning
Approach”, 978-1-4673-6537-6/15/$31.00 ©2015 IEEE.
11. Ali Saremi, Kiarash Saremi , Amin Saremi And Mohsen Sadeghi ,” Spatial Artificial Neural Network (SANN) Based Regional
Drought Analysis”,978-0-7695-4821-0/12 $26.00 © 2012 IEEE DOI 10.1109/CICSyN.2012.11 .
12. Naman Satiya, Vinit Varu, Aakanksha Gadagkar And Darshan Shaha, “Optimization of Water Consumption Using Dynamic Quota
Based Smart Water Management System”, 978-1-5090-6255-3/17/$31.00 ©2017 IEEE.
13. Li-li Sheng, Wu-qun Cheng, Hui Xia, Xian-bing Wu And Xi-ping Zhang,” Prediction of Annual Precipitation Based on Fuzzy and
Grey Markov Process”, 978-1-4244-6527-9/10/$26.00 ©2010 IEEE.
14. Xili Wang, Lei Ma and Xilin Wang,” Apply Semi-supervised Support Vector Regression for Remote Sensing Water Quality Retrieving”,
978-1-4244-9566-5/10/$26.00 ©2010 IEEE.
15. Lingling Zhang And Yanfu Wei,” Prediction on Ecological Water Demand Based on Support Vector Machine”, 978-0-7695-3336-0/08
$25.00 © 2008 IEEE DOI 10.1109/CSSE.2008.44
251. Paper Title: Automated System for Grading Apples using Convolutional Neural Network
Abstract: Fruit grading is a process that affect quality control and fruit-processing industries to meet the 1458-
efficiency of its production and society. However, these industries have suffered from lack of standards in 1464
quality control, higher time of grading and low product output because of the use of manual methods. To meet
the increasing demand of quality fruit products, fruit-processing industries must consider automating their fruit
grading process. Several algorithms have been proposed over the years to achieve this purpose and their works
were based on color, shape and inability to handle large dataset which resulted in slow recognition accuracy. To
mitigate these flaws, we develop an automated system for grading and classification of apple using
Convolutional Neural Network (CNN) used in image recognition and classification. Two models were
developed from CNN using ResNet50 as its convolutional base, a process called transfer learning. The first
model, the apple checker model (ACM) performs the recognition of the image with two output connections
(apple and non-apple) while the apple grader model (AGM) does the classification of the image that has four
output classes (spoiled, grade A, grade B & grade C) if the image is an apple. A comparison evaluation of both
models were conducted and experimental results show that the ACM achieved a test accuracy of 100% while the
AGM obtained recognition rate of 99.89%.The developed system may be employed in food processing
industries and related life applications.
Keyword : Convolutional Neural Network, ResNet50, Artificial Neural Network, Machine learning,
Computer vision.
References:
1. Agriinfo (2015). Grading of fruits and vegetables. Retrieved September 30, 2018. From
http://agriinfo.in/default.aspx?page=topic&superid.
2. Arjenaki O., Moghaddam P. & Motlagh A.(2013).
3. Online tomato sorting based on shape, maturity, size, and surface defects using machine vision, Turkish Journal of Agriculture and
Forestry, 37, pp. 62-68. http://doi.org/10.3906/tar-1201-10
4. Bensaeed et al (2017). Oil palm fruit grading using a hyperspectral device and machine learning algorithm, IOP Conf. Ser.: Earth
Environ. Sci. 20 012017, pg 1-29. https://doi.org/10.1088/1755-1315
5. Dr. Usha, Dr Karthik & Jenifer (2017). Automated Sorting And Grading of Vegetables Using Image Processing, International Journal
of Engineering Research and General Science Volume 5, Issue 6, pg 53-61. ISSN 2091-2730
6. Giacomo Capizzi et al. (2015). "Automatic Classification of Fruit Defects based on Co-OccurrenceMatrix and Neural Networks",
Proceedings of the Federated Conference on Computer Science and Information Systems, 5, pp. 861– 867. http://doi.org/10.15439/
7. Harpreet Kaur, Baljit Singh (2013). Classification and Grading Rice Using Multi-Class SVM, International Journal of Scientific and
Research Publications, 3(4). ISSN 2250-3153
8. Hosein et al. (2017). Design, development and evaluation of an online grading system for peeled pistachios equipped with machine
vision technology and support vector machine, INFORMATION PROCESSING IN AGRICULTURE, 4, pg. 333–341.
http://dx.doi.org/10.1016/j.inpa.
9. Ishikawa et al. (2018). Classification of strawberry fruit shape by machine Learning, the international archives of the photogrammetry,
remote sensing and spatial information sciences, volume xlii-2, pg. 463-470.https://doi.org/10.5194/isprs-archives-XLII-2-463-2018
10. Mandeep & Reecha (2015). Quality Detection of Fruits by Using ANN Technique, IOSR Journal ofE lectronics and Communication
Engineering, 10. ISSN:2278-8735 PP 35-41
11. Muhammad, Ghulam (2015). "Date fruits classification using texture descriptors and shape-size features.", Engineering Applications of
Artificial Intelligence361-367.
12. Olaniyi et al (2017). Automatic System for Grading Banana Using GLCM Texture Feature Extraction and Neural Network
Arbitrations, Journal of Food Processing Engineering, 40.http://doi.org/10.1111/jfpe.12575
13. Pragati Ninawe, Shikha Pandey (2014). A Completion on Fruit Recognition System Using K-NearestNeighbors Algorithm,
International Journal of Advanced Research in Computer Engineering &Technology (IJARCET), 3(7). ISSN: 2278 – 1323
14. Rosli B. Razak1, Mahmod B. Othman, Mohd Nazaribin Abu Bakar (2012). Mango Grading By UsingFuzzy Image Analysis,
International Conference on Agricultural, Environment and Biological Sciences (ICAEBS'2012), pp 18-22.
15. Sajad S., Yousef A., Gines G. (2017). A new approach for visual identification of orange varieties using neural networks and
metaheuristic algorithms, Information Processing in Agriculture 5 (2018) 162–172. https://doi.org/10.1016/j.inpa.2017.09.002
16. Suresha M., Shilpa N.A, Soumya B. (2012). Apples Grading Based On SVM Classifier, International Journal of Computer Applications
(0975–8878) On National Conference on Advanced Computing and Communications - NCACC, April 2012
Authors: Renu Chaudhary, Swarg Deep Sharma, Nigam Kumar, Sudhanshu Aggarwal
Paper Title: Connections between Aboodh Transform and Some Effective Integral Transforms
Abstract: Integral transforms are the most useful techniques of the mathematics which are used to finding
the solution of heat transfer problems, mixing problems, electrical networks, bending of beams, signal
processing problems, which generally appears in the various disciplines of engineering and sciences. In this
research paper, connections between Aboodh transform and some effective integral transforms (Laplace
transform, Kamal transform, Elzaki transform, Sumudu transform, Mahgoub transform, Mohand transform and
Sawi transform) are discussed and integral transforms of some typical functions are given in table form in
application section to signify the fruitfulness of connections between Aboodh transform and some effective
mention integral transforms.
252.
Keyword : Laplace transform; Kamal transform; Elzaki transform; Sumudu transform; Mahgoub transform; 1465-
Mohand transform; Sawi transform; Aboodh transform. 1470
Paper Title: Dual Image Signature Method using DWT and SVD in YCbCr Colour Space
Abstract: The digital data can be easily modified and copied, so it is not secure, so owner authentication is
required to prevent this unauthorised access of digital data. Image signature (water mark) is required to embed
with digital data. The Discrete Wavelet Transform (DWT) supports image signature algorithms possess dual
resolution attaining imperceptibility. The Singular Value Decomposition (SVD) supports to achieving the
robustness in order to add the signature information to the singular values of the diagonal matrix.. In this work
implementing dual image signature method using DWT and SVD in YCbCr colour space. The cover image is
embedded with dual images to achieve better security from unauthorized persons. The proposed method
253. improves the robustness and imperceptibility of the cover image.
1471-
Keyword : . DWT, SVD, Imperceptibility, Robustness 1476
References:
1. B.Chandra Mohan, et al., “A robust digital image watermarking scheme using SVD, quantization and edge detection,” ICGST GVIP
Journal, Vol. 8-1, 2008.
2. Satyanarayana Murty.P, et al., “Towards Robust Reference Image Watermarking Using DWT SVD and Edge Detection” Int. Journal
of Computer Applications, Volume 68– No.9, April 2013.
3. G. Bhatnagar, “A new robust reference watermarking scheme based on DWT SVD,” Computer Standards & Interfaces, vol.31, no. 5,
pp. 1002-1013, 2009.
4. Liu Liang, “A new SVD DWT composite watermarking,” ICSP proceedings of IEEE Int. conference on signal processing, 2006.
5. Yahya AL-Nabhani, et.al, “Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network”
Journal of King Saud University – Computer and Information Sciences, vol. 27, pp.393–401, 2015.
Paper Title: Recent Techniques And Protocols For Data Transmission In Wireless Sensor Network
Abstract: Currently, the wireless sensor networks are hugely demanded in every field instead of due to its
vast applications specifically for the security purposes and for monitoring. Basically, the wireless sensor
networks are the infrastructure less networks which consist of mobile nodes that have memory for storage and to
process the data. There can be small networks or large networks. These days, due to the advancement of
technology, several kinds of new challenges even though the technology change life, offering a lot of facilities.
The most common problem in the atmosphere is the pollution and air pollution is hazardous for health. The
wireless sensor networks (WSNs) are utilized for controlling and managing the air pollution. In WSN, the
routing protocols are playing out a major role for the best communication of nodes to enhance the security in the
network. In the present research work, the classification of different routing protocols is discussed in detail. The
254. major routing protocols are SPIN, DD, RR, LEACH, PEGASIS, TEEN, APTEEN, HEED, GAF and so on. All
these routing protocol come under different categories as namely as flat, hierarchical, location based and the
1477-
hybrid. Additionally, a comparison is made to clarify different routing protocols with its relevant merits,
1484
demerits and classification. In this way, the current research is being more fascinating to work in the monitoring
applications such as for the air pollution monitoring systems.
Authors: Zamli, Muhammad Syafar, Sukri Palutturi, Suriah, Andi Arsunan Arsin, Hatta, Ridwan Amiruddin
Potential of Rainfall, Humidity and Temperature, Against the Increasing of larvae in Makassar City,
Paper Title:
Indonesia
Abstract: Cases of dengue hemorrhagic fever are associated with the potential for rainfall, temperature, and
humidity. In a month mosquitoes can lay eggs approximately four times. In a month mosquitoes can lay eggs
between 400 to 600 eggs. Mosquito eggs can survive, do not hatch, for six months because they do not touch the
water. The existence of rainfall, humidity, and the appropriate temperature can accelerate the process of hatching
mosquito eggs. Secondary data analysis research methods on BMKG data and Makassar City Health Department
255. data in 2014, 2015, 2016, 2017 and 2018. The data analysis was carried out on 1–8 October 2019. The
observation results revealed that high rainfall occurred in January, February, March, April, May and June. In
July, August, September the rainfall is very low. Then entering November and December, the rainfall starts to 1485-
high again. Air temperature does not occur significantly or not too extreme a difference every month. Humidity 1487
in the rainy season tends to be high. The incidence of dengue fever in the rainy season tends to increase. The
number of mosquito larvae also tends to increase in the rainy season. It is recommended that before entering the
rainy season, it should increase awareness of the incidence of dengue fever by reducing mosquito breeding sites
through draining, closing, stockpiling. Drain and close the bathtub, and bury cans, plastic, and objects that can
become mosquito breeding grounds.
Keyword : Humidity, Temperature, Rainfall, larvae.
References:
1. P. Widyorini, K. A. Shafrin, N. E. Wahyuningsih, R. Murwani, and Suhartono, “Dengue hemorrhagic fever (DHF) cases in
semarang city are related to air temperature, humidity, and rainfall,” Adv. Sci. Lett., 2017.
2. C. R. Angelina and R. Windraswara, “Factors Related with Dengue Hemorrhagic Fever Incidence in 2008-2017,” Unnes J. Public
Heal., 2019.
3. Tien Zubaidah, “Climate change impact on dengue haemorrhagic fever in Banjarbaru South Kalimantan between 2005-2010,” J.
BUSKI, 2012.
4. O. Rössler, P. Froidevaux, U. Börst, R. Rickli, O. Martius, and R. Weingartner, “Retrospective analysis of a nonforecasted rain-on-
snow flood in the Alps-A matter of model limitations or unpredictable nature?,” Hydrol. Earth Syst. Sci., 2014.
5. S. E. Lindberg et al., “Increases in mercury emissions from desert soils in response to rainfall and irrigation,” J. Geophys. Res. Atmos.,
1999.
6. A. Vlasenko, A. M. MacDonald, S. J. Sjostedt, and J. P. D. Abbatt, “Formaldehyde measurements by Proton transfer reaction - Mass
spectrometry (PTR-MS): Correction for humidity effects,” Atmos. Meas. Tech., 2010.
7. J. Lee et al., “Characteristics of aerosol types from AERONET sunphotometer measurements,” Atmos. Environ., 2010.
8. S. Rasul, A. M. Kajal, and A. Khan, “Quantifying Uncertainty in Analytical Measurements,” J. Bangladesh Acad. Sci., 2018.
9. A. Tawang, T. A. T. Ahmad, and Y. Abdullah, “Stabilization of upland agriculture under El Nino induced climatic risk: Impact
assessment and mitigation measures in Malaysia,” 2001.
10. Q. Yang et al., “Rainfall effects on the sap flow of Hedysarum scoparium,” Chinese J. Appl. Ecol., 2016.
11. I. Isnawati, B. W. Otok, S. Suharto, and A. Wibowo, “Structural Equation Modeling Based on Variance The Density Index of Larvae of
The Rainy Season in the City of Banjarbaru,” CAUCHY, 2018.
12. N. E. A. Murray, M. B. Quam, and A. Wilder-Smith, “Epidemiology of dengue: Past, present and future prospects,” Clinical
Epidemiology. 2013.
13. M. A. Stewart-Ibarra et al., “Spatiotemporal clustering, climate periodicity, and social-ecological risk factors for dengue during an
outbreak in Machala, Ecuador, in 2010,” BMC Infect. Dis., 2014.
14. S. P. M. Wijayanti et al., “The Importance of Socio-Economic Versus Environmental Risk Factors for Reported Dengue Cases in Java,
Indonesia,” PLoS Negl. Trop. Dis., 2016.
15. O. M. Sessions et al., “Discovery of insect and human dengue virus host factors,” Nature, 2009.
16. B. P. Yawn and D. Gilden, “The global epidemiology of herpes zoster,” Neurology, 2013.
17. A. A. Arsin, “BUKU: EPIDEMIOLOGI DEMAM BERDARAH DENGUE (DBD) DI INDONESIA.” Masagena Press, 2013.
18. F. J. Lardeux, R. H. Tejerina, V. Quispe, and T. K. Chavez, “A physiological time analysis of the duration of the gonotrophic cycle of
Anopheles pseudopunctipennis and its implications for malaria transmission in Bolivia,” Malar. J., vol. 7, no. 1, p. 141, 2008.
Keyword : Taguchi’s experimental design model, cybersecurity, risk assessment, system hardening
257.
References: 1496-
1. G. Taguchi, “Taguchi methods in LSI fabrication process,” in Proc. IEEE Int. Workshop Stat. Methodology, pp. 1–6, 2001.
2. G. Taguchi, S-C. Tsai, “Quality engineering (Taguchi methods) for the development of electronic circuit technology,” IEEE
1501
Transactions on Reliability, Vol. 44, No. 2, pp. 225–229, 1995
3. C. Longbottom, S. J. Bigelow, “What is IT Infrastructure? Definition from WhatIs.com”, [Online]. Available:
https://searchdatacenter.techtarget.com/definition/infrastructure [Accessed: 7 - Aug - 2019], 2017
4. M. Endrei, J. Ang, A. Arsanjani, S. Chua, P. Comte, P. Krogdahl, M. Luo, T. Newling, “Patterns: Service Oriented Architecture and
Web Services”, IBM Redbooks, p 11, 2004
5. J.Z. Zhang, J.C. Chen, E.D. Kirby, "Surface roughness optimization in an end-milling operation using the Taguchi design method",
Journal of Material Processing Technology, 184(1-3), pp 233-239, 2007
6. D. T. Semere, “Robust Design Module III”, FMG3915 Disturbance and Variation Analysis in Manufacturing Systems course material,
KTH, 2017
7. J.L. Hintze, “Taguchi Designs”, [Online]. Available: https://ncss-wpengine.netdna-ssl.com/wp-content/uploads/2012/09/PASSUG1.pdf
[Accessed: 18 - Aug - 2019], NCSS, Chapter 887, pp 887-1, 2008
8. A. Sfakianakis, C. Douligeris, L. Marinos, M. Lourenço, O. Raghimi, “ENISA Threat Landscape Report 2018, 15 Top Cyberthreats
and Trends”, ENISA, 2018
9. P. Katsumata, J. Hemenway, W. Gavins, “Cybersecurity Risk Management”, IEEE, 2010
258.
Keyword : Service Quality, Service Performance, Up-selling, Cross-selling, Telecom Retail
1502-
References: 1509
1. "Trai Telecom Subscription Data as on 31st July, 2018" (PDF). TRAI. Retrieved 20 September 2018.
https://main.trai.gov.in/sites/default/files/PRNo01Eng02012019.pdf
2. Govt will soon make Aadhaar-driving licence linking mandatory: Ravi Shankar Prasad, Indian Express, 7 Jan 2019.
3. "The Internet and Mobile Association of India". www.iamai.in. Retrieved 2018-05-03.
4. "Yearly Performance Indicators of Indian Telecom Sector (Second Edition) 2017" (PDF). TRAI. Retrieved 11 September 2018.
5. Parasuraman, A., Zeithaml, V.A. and Berry, L.L. (1988). SERVQUAL: A Multiple-Item Scale for Measuring Consumer Perceptions of
Service Quality. Journal of Retailing. 64 (1): 12- 40.
6. Bolton, R. N., & Drew, J. H. (1991). A multistage model of customers assessments of service quality and value. Journal of Con sumer
Research, 17: 375-384.
7. Cronin Jr J.J, Taylor S.A. Measuring service quality (1992). A re-examination and extension. Journal of Marketing; 56(July):55 68.
8. Shepherd C.D. Service quality and the sales force: A tool for competitive advantage. Journal of Personal Selling & Sales Management
1999;19(3):73 82.
9. Bitner, M.J. and Hubert, A.R. (1994), Encounter satisfaction versus overall satisfaction versus quality, in Rust, R.T. and Oliver, R.L.
(Eds), Service Quality: New Directions in Theory and Practice, Sage Publications, London, pp. 72-94.
10. Tsoukatos, E. and Rand, G.K. (2006), Path analysis of perceived service quality, satisfaction and loyalty in Greek insurance, Managing
Service Quality, Vol. 16 No. 5, pp. 501-19.
11. Bose, K. and Bansal, H.S , (2010).Regain Management :Issues and Strategies, In Sheth, J. N., Parvatiyar, A. &Shainesh. G (Eds.)
Customer Relationship Management, Emerging Concepts, Tools and Applications, Tata McGraw Hill Education Private Limited,
pp.63-70.
12. Hennig , T., Klee, A.: The impact of customer satisfaction and relationship quality on customer retention: A critical Reassessment and
Model Development, Psychology and Marketing, Vol. 14, No. 8, 1997, pp.737-764.
13. Parasuraman A., Zeithaml V. A. and Berry L. L. (1985) “A Conceptual Model Of Service Quality And Its Implications For Future
Research,” Journal Of Marketing, Vol.49, Pg No. 41-50
14. Peter, P.J., Churchill, G.A. & Brown, T.J. (1993). Caution in the use of difference scores in consumer research. Journal of C onsumer
Research, 19(3), 655-662.
15. Annual Report 2014-15, Cellular Operators Association of India. Retrieved from: http://www.coai.com/media-
room/news..../coaiin.../coai-annual-report-2014-15...
16. Annual Report 2014-15, Department of Telecommunications, New Delhi. Retrieved from:
http://www.dot.gov.in/reportsstatistics/annual-report-2014-15-0.
17. Annual Report 2011-12, Telecom Regulatory Authority of India, New Delhi. Retrieved
from:http://www.trai.gov.in/..../201301150318386780062Annual%20Report%20En.
18. Annual Report 2012-13, Telecom Regulatory Authority of India, New Delhi. Retrieved
from:http://www.trai.gov.in/.../AnnualReports/TRAI-English-Annual-Report-10032
19. Annual Report 2013-14, Telecom Regulatory Authority of India, New Delhi. Retrieved
from:http://www.trai.gov.in/.../AnnualReports/TRAI-Annual-Report-(English)=010420...
20. Miller Heiman, Special edition Best of sales performance tips: Find hidden revenue by cross selling and up selling © 2006 Miller
Heiman, Inc. All Rights Reserved | 10509 Professional Circle, Suite 100, Reno, NV 89521 | 775-827-411
Paper Title: An Adaptive Secret QR Code Message Passing Method Using Video Steganography
Abstract: Steganography is covert communication between the sender and the intended receiver with no
evidence to the outer world that the communication has happened. The paper proposes an multi-layer protection
approach in steganography to adaptively embed the message in the cover medium and exploit the efficiency of
the Diffie-Hellman key exchange method to be passed on to a secure channel and to be extract the secret data
without being detected. Hence the proposed system has a shade of hybrid crypto stego scehme. The study
proposes a new and adaptive steganography method that provides multiple layers of security and adaptiveness in
passing secret data which emphasizes on Imperceptibly and robustness.
Authors: Suman Sourav Prasad, Jyoti Prakash Mishra, Sambit Kumar Mishra
Paper Title: On the New Nonlinear Properties of the Nonlinear Heat Conductivity Problem
Abstract: In this article, we discuss one problem of nonlinear thermal conductivity with double
nonlinearity; an exact analytical solution has been found for it, the analysis of which allows revealing a number
of characteristic features of thermal processes in nonlinear media. The following nonlinear effects have been
established: the inertial effect, the finite propagation velocity of thermal disturbances, the spatial localization of
heat, and the effect of the finite time of the existence of a thermal structure in an absorption medium.
Keyword : degenerate nonlinear, parabolic equation, not divergent, exact solution, new effects, localization,
estimate.
References:
1. Kurdyumov S.P., Zmitrenko N.V. PMTF, 1977, No. 1, p. 3.
2. Kurdyumov S.P. Dis. for the competition Art. Doct. Phys.-Math. sciences. M .: IPM AN USSR 1979, 302 p.
3. Martinson L.K., Pavlov K. B. ZhVM and MF, 1972, v. 12, No. 4, p. 1048.
4. Samarsky A.A., Zmitrenko I.V., Kurdyumov S.P., Mikhailov A.P. DAN USSR, 1975, v. 223, No. 6, p. 1344.
266. 5. Samarsky A.A., Elenin G.G., Kurdyumov S.P. and others. DAN USSR, 1977, v. 237, No. 6, p. 1330.
6. Martinson, L.K. Evolution of a heat pulse in a nonlinear medium with volumetric heat absorption, TVT, 1983, v. 21, No. 4, 801 -803. 1542-
7. Angar Jungel, Cross-Diffusion systems with entropy structure. arXiv: 1710.01623v1 [math.AP] 4 Oct 2017. Proceedings of 1543
EQUADIFF 2017pp.1-10.
8. Aripov M. Abdullaeva Z., On the bottom of the exact solution of a nonlinear problem with absorption or a source. Bulletin of the
TATU, №4 2016, 107-113.
9. Mersaid Aripov, Shakhlo A. Sadullaeva. Properties of solutions to reaction-diffusion equation with double nonlinearity wih distributed
parameters. Log SFU. Ser. Mat and Phys., 6: 2 (2013), 157-167
10. Zeldovich B. V., Raizer Yu. P. Physics of shock waves and high-temperature hydrodynamic phenomena. M.: Science, 1966. 686 s.
11. Wang M., Wei Y. Blow-up properties for a degenerate parabolic system with nonlinear localized sources // J. Math. Anal. Appl. 343
(2008), 621--635.
12. Raimbekov J.R. The Properties of the Solutions for Cauchy Problem of Nonlinear Parabolic Equations in Non-Divergent Form with
Density // Journal of Siberian Federal University. Mathematics & Physics 2015, 8(2), 192--200.
13. Mersaid Aripov, Shakhlo A. Sadulaeva, “To properties of solutions to reaction diffusion equation with double nonlinearity with
distributed parameters”, Jour. of Siberian Fed. Univer. Math. & Phys. 6(2013), pp. 157-167
14. P. Cianci, A. V. Martynenko, and A. F. Tedeev, “The blow-up phenomenon for degenerate parabolic equations with variable
coefficients and nonlinear source,” Nonlinear Analysis: Theory, Methods & Applications A, vol. 73, no. 7, pp. 2310 –2323, 2010.
15. C. S. Chen and R. Y. Wang, “Global existence and L1 estimates of solution for doubly degenerate parabolic equation,”Acta
Mathematica Sinica ,vol.44,no.6,pp.1089–1098,2001.
16. M. Tsutsumi, “On solutions of some doubly nonlinear degenerate parabolic equations with absorption,”
17. Journal of Mathematical Analysis and Applications, vol. 132, no. 1, pp. 187–212, 1988.
Authors: N.G. Sapozhnikova, Y.E. Putihin, Y.N. Akimova, L.A. Melnikova, O.V. Antonova
267.
Keyword : account, social responsibility, financial accountability, financial status, financial performance
1544-
result, consolidated reporting
1548
References:
1. Kevorkova, Z.A., Petrov, A.M., Savina N.V. Towards liabilities of corporate systems. International Journal of Civil Engineering and
Technology. Volume 10, Issue 2, February 2019, Pages 1582-1593
2. Lymar, M.P., Kevorkova, Z.A., Petrov, A.M. The convergence of national and international accounting standards: Chinese experience.
International Journal of Civil Engineering and Technology. Volume 9, Issue 13, December 2018, Pages 82-94
3. Karpova T.P., Petrov A.M., Antonova O.V., Directions of Accounting Development in the Conditions of Digitalization. Jour of Adv
Research in Dynamical & Control Systems, Vol. 10, 07-Special Issue, 2018, pp. (117-125)
4. Chernysheva Natalia A., Perskaya Victoria V., Petrov Alexander M., Bakulina Anna A. Green Energy for Belt and Road Initia tive:
Economic Aspects Today and in the Future / International Journal of Energy Economics and Policy. 2019, 9(5), 178 -185
5. Petrov A.M., Nikiforova E.V., Kiseleva N.P., Grishkina S.N., Lihtarova O.V., Creation of the reporting on sustainable develop ment of
companies based on socioeconomic measurement statistics / International Journal of Recent Technology and Engineering. Volume -8
Issue-2, July 2019, p. 4005-4012
6. Alexander M. Petrov, Marina V. Kosolapova, Igor G. Yshanov, Nataliya K. Muravitskaya, Hursheda Nurmuhamedova The Economic
Significance of Statistical Research Activities of Representative Offices of Companies Abroad / International Journal of Inno vative
Technology and Exploring Engineering(TM). Volume-8 Issue-10, August 2019 p. 2713-2722
7. Lyudmila V. Sotnikova, Svetlana N. Polenova, Nataliya A. Mislavskaya, Alexander M. Petrov, Mariya M. Basova. Sustainable
development, macro and micro level: Russian and foreign model / International Journal of Recent Technology and Engineering.
Volume-8 Issue-2, July 2019, p. 4524-4532
8. Nikiforova E.V. PARADIGM OF PUBLIC REPORTING OF ECONOMIC ENTITIES // World Applied Sciences Journal. 2014. V.
29, No. 5, pp. 667 — 670.
9. Nobes C., Parker R. Comparative International Accounting. 13th Edition. Pearson, 2016. 640 p.
10. Mita, A.F., Utama, S., Fitriany, F., Wulandari, E.R. The adoption of IFRS, comparability of financial statements and foreign investors’
ownership. Asian Review of Accounting, 26(3), pp. 391-411.
11. Danrimi, M.L., Abdullah, M., Alfan, E. Investors’ herding practice: do IFRS and national economic culture matter? Managerial
Finance, 44(9), pp. 1117-1133.
12. Riccardi, L. China Accounting Standards: Introduction and Effects of New Chinese Accounting Standards for Business
Enterprises. 2015. 337 p.
13. L. B. Trofimova, "Evolutional Stages of Financial Accounting in the Russian Federation," L. B. Trofimova // International Accounting,
2014, No. 39 (237), pp. 14 — 23.
14. Suleymanov M.M., Magomedov R.M., Savina S.V., Fomicheva T.L.Basic models of tax federalism in global practice: Specific
characteristics and structural and functional organization. Academy of Accounting and financial studies journal.- 2018. - Vol. 22. -
Issue 3. – С. 1-9.
15. Decree No. 497 of the Russian Federation Government dated May 23, 2015, Concerning the Federal Dedicated Program of Education
Development for 2016 — 2020.
16. Petrov, A. Modern Accounting Concepts: Textbook. M.: Vuzovsky Uchebnik: INFRA-M, 2018.
17. A. M. Petrov, "issues of Standardization of Accounting Policies inside an Enterprise System of the Services Sector," International
Accounting, 2012, No. 31, pp. 10 — 16.
18. A. M. Petrov, Problems of Preparing Consolidated Statements at the Automation Stage. International Accounting, 2011, No. 33, pp. 2
— 10.
19. A. M. Petrov, "Theoretical and Methodological Background to Organization of Accounting and Tax Planning in the Enterprise Systems
of the Services Sector. Monograph", A. M. Petrov, Saint-Petersburg, 2008, Ser. Library of the Eurasian International Scientific and
Analytic Journal Problems of Modern Economy.
20. Petrov, A and Konyakhin, A., Methods and Practice of First IFRS Reporting at a Group of Companies. Monograph, Moscow, 2015.
Paper Title: Optimization of Process Parameters in MIG Welding of Two Dissimilar Materials
Abstract: MIG welding is used in automotive industries which helps in good opportunity to reduce
production costs, decrease vehicle weight and improve the strength of sheet metal joining. In this project, the
objective is to study welding parameters used in joining two dissimilar metals. Aluminum 6 series and aluminum
7 series with thickness both 6 mm was weld together using MIG welding with tailor welded blanks method. In
this project the voltage(V), wire feed(F) and gas pressure(P) are maintained according to the material used for
MIG welding. By using design expert software MIG welding parameters are optimized to obtain good tensile
strength. Response surface methodology type is used to optimization to study the parameters of MIG
WELDING.
268.
Keyword : Tensile strength, dissimilar metal welding, Metal Inert Gas Welding, aluminum 6-series and 7-
1549-
series, MIG welding, Response surface methodology
1553
References:
1. Rakesh Kumar1* and Gurinder Singh Brar(PhD Candidate, IKGPTU, Kapurthala) Department of Mechanical Engineering, North
West Institutions Group, Dhudike (Moga)-142001, Punjab, India. Mechanical Engineering Department, Guru Nanak Dev Engineering
College, Ludhiana, Punjab, India-141006. Corresponding author-e-mail address: hod me@northwest.ac.in Box, G. E. P., & D. W.
(1960). Some recent three-level models for quantitative variables analysis. Engineering, 2, 455–475.
2. Chen, W., Huang, Y., Qi, J., Tang, M., Zheng, Y., Zhao, and others (2012). Optimizing the extraction of phenolic compounds from
areca husk aided by ultrasound. Food Treatment and Conservation Paper, http:/dx.doi.org/10.1111/j.1745-4549.2012.00748.x
3. Dawson, P. L., & Dawson, R. R. (1998). Use surface reaction analysis to maximize the performance of the whole egg of
ultrapasteurized water. Science of poultry, 77, 468–474.
4. Box–Behnken development and surface response methodology to model some Turkish coals N. Aslan*, Department of Engineering
CebeciMining, University of Cumhuriyet, 58140 Sivas, Turkey Received on 21 February 2006; received in revised form on 1 June
2006
Paper Title: Efficient Region of Interest Extraction Methods for Multiple Medical Images
Abstract: Medical images do contain important and unimportant spatial regions. Compression methods
which are capable of reconstructing the image with high quality are required to compress the medical images.
For these images, only a portion of it is useful for diagnosis hence a region based coding techniques are
significant for compressing and transmission. Extracting a significant region is of great demand since a slighter
269.
mistake may leads to wrong diagnosis. This paper is focused on investigating multiple image processing
algorithms for medical images. All the images may not contain the same region of interest, so different 1554-
approaches are supposed to apply for different images. In this three types of medical images were considered 1559
like magnetic resonance (MR) brain images, computer tomography (CT) abdomen images and X-ray lung
images. In this paper three automatic region of interest extraction algorithms were proposed for different types
of images.
Keyword : Medical image compression, Region of interest, CT, MRI, abdominal image compression
References:
1. Ansari M. A., Anand R. S., "Context based medical image compression for ultrasound images with contextual set partitioning in
hierarchical trees algorithm", Advances in Engineering Software, vol. 40 no.7, pp.487-496, Jan. 2009.
2. AssafHoogi, Christopher F. Beaulieu, Guilherme M. Cunha, ElhamyHeba, Claude B. Sirlin, Sandy Napel, and Daniel L. Rubin ,
“Adaptive Local Window for Level Set Segmentation of CT and MRI Liver Lesions”, Medical Image Analysis ,2017, doi:
10.1016/j.media.2017.01.002
3. Said and W. A. Pearlman, "A new, fast, and efficient image codec based on set partitioning in hierarchical trees," in IEEE Transactions
on Circuits and Systems for Video Technology, vol. 6, no. 3, pp. 243-250, June 1996.
4. Ahmet M Eskicioglundpaul S Fisher , “ Image quality measures and their performances “, IEEE transactions on communications V ol
43, No 12
5. Baeza. I, Verdoy. A, “ROI-based procedures for progressive transmission of digital images: a comparison” Journal of Math. Comput.
Model, 2009, 50
6. Kumar, S. B. Kumar and C. Kumar, "Development of improved SSIM quality index for compressed medical images," 2013 IEEE
Second International Conference on Image, Information Processing (ICIIP-2013), Shimla, 2013
7. D. Creusere, "Robust image coding using the embedded zerotree wavelet algorithm," Proceedings of Data Compression Conference -
DCC '96, Snowbird, UT, USA, 1996
8. Maglogiannis, C. Doukas, G. Kormentzas and T. Pliakas, "Wavelet-Based Compression With ROI Coding Support for Mobile Access
to DICOM Images Over Heterogeneous Radio Networks," in IEEE Transactions on Information Technology in Biomedicine, vol. 13,
no. 4, pp. 458-466, July 2009.
9. JavidAli.T, Akhtar, P, “Significance of region of interest applied on MRI and CT images in tele-radiology-telemedicine”, Springer-
Verlag, Berlin, Heidelberg, 2008
10. Kaur, Manpreet, and Vikas Wasson. ”ROI Based Medical Image Compression for Telemedicine Application.” Procedia Computer
Science 70, 2015
11. Keita Nakagomi, Akinobu Shimizu, HidefumiKobatake, Masahiro Yakami, Koji Fujimoto, Kaori Togashi,” Multi -shape graph cuts
with neighbor prior constraints and its application to lung segmentation from a chest CT volume”, Medical Image Analysis, Volume
17, Issue 1,2013,
12. Martin bernas ,” Image quality evaluation “, VIpromCom 2002, 4th Eurisp-IEEE region 8th international symposium on video image
processing and multi- media communication 16-19 june 2002
13. M. Kass, A. Witkin, and D. Terzopoulos, “Snakes: Active contour models,” International Journal of Computer Vision, vol. 1, no. 4,
1988.
14. P. Arbelaez, “Boundary Extraction in Natural Images Using Ultra metric Contour Maps,” in IEEE Conference on Computer Vision
and Pattern Recognition Workshop (CVPRW'06) 2006
15. Pennebaker, William B., and Joan L. Mitchell, JPEG: Still Image Data Compression Standard, Van Nostrand Reinhold, 1993.
16. Placidi. G, “Adaptive compression algorithm from projections: application on medical grayscale images”, Journal of Comput. Biol.
Med.2009, 39.
17. P. Soille, Morphological Image Analysis: Principles and Applications, 2nd ed.: Springer, Berlin Heidelberg, 2004
18. Ravi Kiran and Chandrasekhar kamargaonkar, "Region Separation Techniques for Medical Images", International Journal of
Innovative Research in Science, Engineering and Technology, vol. 5, issue 2, February 2016.
19. Ravi Kiran and Chandrasekhar kamargaonkar, “Region Based Medical Image compression using Block-Based PCA”, nternational
Conference on Computation of Power, Energy Information and Communication (ICCPEIC)-2016
20. S. Miaou, F. Ke and S. Chen, "A Lossless Compression Method for Medical Image Sequences Using JPEG-LS and Inter frame
Coding," in IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 5, pp. 818-821, Sept. 2009.
21. Shuo Wang, Mu Zhou, Zaiyi Liu, Zhenyu Liu, DongshengGu, YaliZang, Di Dong, Olivier Gevaert, Jie Tian,” Central focused
convolutional neural networks: Developing a data-driven model for lung nodule segmentation”, Medical Image Analysis, Volume 40,
2017,
22. Sonja Grgic, MislavGrgic , Marta mrak , “ reliability of objective picture quality measures”, journal of electrical enginee ring Vol 55
No 1-2, 2004
23. Standard Lossy Compression”, Canadian Association of Radiologists, Ottawa, ON, 2011
24. Toshiko Kaneda and Kristin Bietsch, "2016 World population data sheet with a special focus on human needs and sustainable
resources," Population reference bureau, 1875- Connecticut Ave, NW, Suite 520, Washington DC 20009, ISSN 0085-8315, 2016.
25. Toshiyuki Okada, Marius George Linguraru, Masatoshi Hori, Ronald M. Summers, Noriyuki Tomiyama, Yoshinobu Sato,” Abdominal
multi-organ segmentation from CT images using conditional shape–location and unsupervised intensity priors” ,Medical Image
Analysis, Volume 26, Issue 1, 2015,
26. W. Yang et al., "Lung Field Segmentation in Chest Radiographs From Boundary Maps by a Structured Edge Detector," in IEEE
Journal of Biomedical and Health Informatics, vol. 22, no. 3, pp. 842-851, May 2018.
27. Z. Liu, J. Ha, Z. Xiong, Q. Wu, and K. Castleman, “Lossy-to-lossless ROI coding of chromosome images using modified SPIHT and
EBCOT,” in Proc. IEEE Int. Symp. Biomedical Imaging, Washington, DC, p. 317. Jul. 2002.
28. http://www.waiting.com/brainanatomy.html
29. http://braintumorsegmentation.org/
30. http://db.jsrt.or.jp/eng.php
31. Somasundaram, K.; Kalaiselvi, T., "Brain extraction method for T1-weighted magnetic resonance scans," Signal Processing and
Communications (SPCOM), 2010 International Conference on, vol., no., pp.1-5, 18-21 July 2010
Authors: Sandeep Kumar Panda, Sathya AR, Manoranjan Mishra, Suneeta Satpathy
Paper Title: A Supervised Learning Algorithm to Forecast Weather Conditions for Playing Cricket
Abstract: Now days, Machine learning is considered as the key technique in the field of technologies, such
as, Internet of things (IOT), Cloud computing, Big data and Artificial Intelligence etc. As technology enhances,
lots of incorrect and redundant data are collected from these fields. To make use of these data for a meaningful
purpose, we have to apply mining or classification technique in the real world. In this paper, we have proposed
270. two nobel approaches towards data classification by using supervised learning algorithm
1560-
Keyword : Machine learning, Classification, Supervised learning. 1565
References:
1. A.M. Turing: On computable numbers, with an application to the entscheidungsproblem. Gödel, uber formal unentscheidhare satze der
principia Mathematica and verwandter systeme, monatshefic math.phys.,38, 173-198 (1931).
2. Abramoff, M.D., Magal, H., Ram, S.: Image processing with image j. Biophotonics international, 11, 36-42 (2004).
3. Adam, C., Honglak, L., Andrew, Y.: An analysis of single layer networks in unsupervised feature learning. Appearing in proceeding of
the 14th international conference on artificial intelligence and statics (AISTATS), USA (2011).
4. Baye’s portrait, The IMS Bulletin, news from the institute of mathematical statistics (1998).
5. Bernand, M.: A short history of machine learning. Forbes report February 19, (2016).
6. Brijesh, B., Saurabh, P.: Data mining: A prediction for performance improvement using classification. International journal o f
computer science and information security, 9(4), 136-140 (2011).
7. Ethem, A.: Introduction of machine learning. second edition, The MIT press Cambridge, Massachusetts London, England (2010).
8. Foster, P., Ron, K.: Guest Editors introduction on applied research in machine learning. Machine learning, Kluwer Academic
publisher, Boston (1998).
9. G.Keerthika, D.sarvana, P.: Feature subset Evaluation and classification using Naive Bayes classifier. Journal of Network
communications and Emerging Technologies (JNCET),1, (2015).
10. George, F.: An extensive Empirical study of feature selection metrics for text classification. Journal of machine learning research, 3,
(2003).
11. Gurneet, K., Er.Neelam O.: A review article on naive bays classifier with various smoothing techniques. International journal of
computer science and mobile computing, 3(10), 864-868 (2014).
12. Jan, F., Tomas, s.: Pattern recognition by Affine moment invariants. Pergamon press ltd, 26, 167-174 (1993).
13. Jayashri, K., Mayura, K.: Machine learning algorithms for opinion mining and sentiment classification. International journal of
scientific and research publications, 3, 724-729 (2013).
14. Kalyani,M.R.: Data mining techniques. International journal of advanced research in computer science and software engineering , 2,
(2011).
15. Kanu, P., Jauvala, Jaymit, P.: Comparison of various classification algorithms on iris datasets using weka. International journal of
advance engineering and research development (IJAERD), 1, 2348-4470 (2014).
16. Kelvin P.M.: Naive Bayes classifier. Department of computer science, university of British Columbia (2006).
17. S.B.Kotsiants.: Supervised machine learning: A review of classification techniques. Informatica 249-268 (2007).
18. Tommi J., Satinder P.S., Michael, I.J.: Reinforcement Learning algorithm for partially observable markov decision problems.
Department of brain and cognitive science, Bid. E10 Mass achusetts institute of technology Cambridge, MA 02139.
19. V.Metsis, I. Androutsopoulos, G. Paliouras: Spam filtering with Naïve byes – which naïve bayes. 3rd conference on email and anti-
spam (CEASA) (2006).
20. Xiaojin, Z., Zoubin, G., John, L.: Semi supervised learning using Gaussian fields and harmonic functions. In: 12th Internatio nal
conference on machine learning, Washington DC (2003).
21. M Ramzan Talib, Toseef Ullah, M Umer Sarwar, M Kashif Hanif and Nafees Ayub : Application of Data Mining Techniques in
Weather Data Analysis, IJCSNS International Journal of Computer Science and Network Security, 17(6), (2017).
22. Sayali D. Jadhav , H. P. Channe: Comparative Study of K-NN, Naive Bayes and Decision Tree Classification Techniques, International
Journal of Science and Research (IJSR),5 (1), (2016).
23. LunganZhang,LiangjunYu,DianhongWang,Class-specific attribute weighted naive Bayes, Pattern Recognition ,88 ,321-330(2019).
24. David Charte,Francisco Charte,Salvador García,Francisco Herrera:A snapshot on nonstandard supervised learning problems:
taxonomy, relationships, problem transformations and algorithm adaptations Progress in Artificial Intelligence,8(1),1–14,(2019).
25. Richard B. Alley,Kerry A. Emanuel,Fuqing Zhang: Advances in weather prediction,Science,363(6425),342-344,(2019).
Paper Title: Modified AODV with Power Efficiency and Priority in WiMAX Network
Abstract: Many applications have developed for networks that are ad hoc in nature. Various routing
protocols are suggested, of which routing protocols on-demand in nature is the most widespread protocol
because they are simple to figure it out and they don’t’ use priority and power for communication of data in
routing. Routing protocol has an essential role in VANETs. In the latest decade, AODV routing protocol turns
into the consideration of concentrated research on VANETs. Several protocols were formulated to upgrade and
improve AODV in order to attain the maximum in the pursuit of consistent protocol.
Here, our proposal to improve ad-hoc distance vector suggests various points. I-AODV, our suggested protocol,
improved AODV in Power consumption and Priority models. We also evaluate performance pointers for some
metrics, like packet delivery ratio, energy, end-to-end delay, and routing overhead, in WiMAX ad hoc network.
Keyword : Routing Protocol, AODV, I-AODV, Mobility, WiMAX, VANET, Priority, Power Consumption.
References:
1. Md. Arafatur Rahman, , Md. SaifulAzad,MohammadMoshee Uddin,FarhatAnwar, “Performance Analysis of Ad hoc Routing
Protocols in Mobile WiMAX Environment”, IAENG, 35:3, IJCS_35_3_13.2010.
271. 2. RiriFitriSari,AbdusySyarif, “Performance Analysis of AODV-UI Routing Protocol With Energy Consumption Improvement Under
Mobility Models in Hybrid Ad hoc Network”, International IJCSE, ISSN : 0975-3397 Vol. 3 No. 7 July 2011, pp2904-2918
3. Dr. P. Chandrasekhar Reddy, Dr.P. C. Reddy , “Performance Analysis of Adhoc Network Routing Protocols”, Academic Open 1566-
Internet Journal, ISSN 1311-4360, Volume 17,2006. 1571
4. Wendi .B.Heinzelman, ,Lei Chen, “A Survey of Routing Protocols that Support QoS in Mobile Ad hoc Networks”, IEEE
Communication Society Networks, Vol. 21,2007
5. P.S.Sastry, M.A.L. Thathacar“Varietes of Learning Automata: An Overview”, IEEE Transactions on Systems, Man, and Cybernetics
Part: B, Cybernetics, Vol. 32, No. 6, December,2002
6. Request For Comment (RFC) AODV, http://www.ietf.org/rfc/rfc3561.txt
7. AminHamidian, “Performance of Internet Access Solutions in Mobile Ad hoc Networks”, Master Thesis, Lund University, 2001
8. WibergB.,”Porting AODV-UU Implementation tons-2 and Enabling Trace-based Simulation”, Master Thesis, Uppsala University,
2002
9. Nordstrom E. ,”APE-a Large Scale Ad hoc Network Testbed for Reproducible Performance Test”, Master Thesis, Uppsala
University,2002
10. Byoungchul. Ahn ,Chonggun. Kim, Elmurod. Talipov, “A Reverse AODV Routing Protocol in Ad hoc Mobile Networks”, IFIP,
Seoul, Korea, August2006
11. YJ Choi, C, E. Talipov, D. Jin, J. Jung, I. Ha, Kim,”Path Hopping based on Reverse AODV for Security”, APNOMS, Busan, Korea,
September2006
12. M. Zarei,“Reverse AODV Routing Protocol Extension Using Learning Automata in Ad hoc Networks”, Computer, Control and
Communication, IC4, Karachi, 5 May2009
13. M. Dave, A. Rani, “Performance Evaluation of Modified AODV for Load Balancing”, Journal of Computer Science 3, Science
Publication,2007
14. M. Portmann, Asad Amir Pirzada, “High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks”, 4rd Annual
International Conference on Mobile and Ubiquitous System: Networking & Services, MobiQuitous, Philadelphia, USA, 6-10 August,
2007
15. M. Portmann, Asad Amir Pirzada, R. Wishart, “Multi-Linked AODV Routing Protocol For Wireless Mesh Networks”, IEEE Global
Telecommunications Conference, Globecom, Washington, DC, USA, 26-30 November,2007
16. J Indulekha, Asad Amir Pirzada, M. Portmann, “Evaluation of Multi-Radio Extensions to AODV for Wireless Mesh Networks”, in
Proceedings of the 4rd ACM International Workshop on Mobility Management and Wireless Access (MobiWac), Torremolinos,
Spain, 2 October,2006
17. M. Romoozi, H. Babaei, “Multi Objective AODV Based On a Realistic Model”, International Journal of Computer Science Issues,
Vol 7, Issue 3, No. 3, May 2010
18. L. M. Gambardella, G. Di Caro, F. Ducatelle, “Special Issue on Self-Organization in Mobile Networking. AnthocNet : An Adaptive
Natured-Inspired Algorithm for Routing in Mobile Ad hoc Networks”, European Transactions and Communications, Vol. 16,2005
19. G. Einicke, J. Homer, HY. Zhang, M.E Bialkowski, “An Extended AODV Protocol for VoIP Application in Mobile Ad hoc
Network”, ECTI Transactions on Electrical Eng., Electronics, and Communications Vol.7, No.2, August,2009
20. L. Wan, L. Ding,” Improvement Suggestions to the AODV Routing Protocol”, International Conference on Wireless Networks and
Information Systems, WNIS, pp. 370, 28-29 December,2009
21. MJ Lee, X. Jing,”Energy-Aware Algorithms for AODV in Ad hoc Networks”, Proceeding of International Conference on Mobile
Computing and Ubiquitous, ICMU, Japan, 8-9 January,2004
22. P. Lorenz, F.D. Tolba, D. Magoni,”Energy Saving and Connectivity Tradeoff byAdaptative Transmission Range in 802.11g
VANETs”, International Conference on Wireless and Mobile Communication, ICWMC, IEEE Conference, pp. 45, 29-31 July,2006
23. P. Lorenz, F. D. Tolba, D. Magoni,” Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad hoc Networks”,
Global Telecommunications Conference, GlobeCom IEEE, pp. 2786-2790, 26-30 Nov,2007
24. L M. Feeney,” An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad hoc Networks’, Mobile
Networks and Applications, pp. 239-249,2001
25. P. Manzoni, J.C. Carlos,”A Performance Comparison Energy Consumption for Mobile Ad hoc Routing Network Protocols”, In
Proceedings of the 8th International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication
Systems, San Francisco, CA,2000
26. K. Ramli, R. F. Sari, A. Syarif,B. Budiardjo,“Performance Evaluation Of AODV Routing Protocol On Adhoc Networks Testbed
Using PDA”, IEEE Malaysia International Conference On Communications And IEEE International Conference On Networks, Kuala
Lumpur, Malaysia,16 -18 November,2005
27. J.H Zygmunt, B. Liang,”Predictive Distance Based Mobility Management for PCs Networks”, in Proceedings of IEEE Infocom -99,
New York, March, 21-25,1999
28. The BonnMotion Software, http://net.cs.uni-bonn.de/wg/cs/applications/bonnmotionM.A. Sayid, H. Suhaidi, G. Osman, M.M
Kadhum,”Pause Time Optimal Setting for AODV Protocol on RPGM Mpbility Model in VANETs”, International Journal of
Advanced Computer Science and Applications, Vol 1, No.6, December2010
29. Zygmunt B. Haas, Liang B.,”Predictive distance-based mobility management for PCS networks”. In: Proc. of the IEEE Infocom, S.
1377-1384,1999
30. MobilityUserManual,http://nile.cise.ufl.edu/important/mobility-user- manual.pdf
31. AbdusySyarif et al. / International Journal on Computer Science and Engineering(IJCSE)
32. Charles E. Perkins, 2001. Ad Hoc Networking: Addison Wesley,USA.
33. J. SauvolaandSun, J.Z. 2002. On Fundamental Concept of Mobility for Mobile Communications: Proc. Of 13th IEEE International
Symposium on Personal, Indoor and Mobile Radio Communication, Lisbon, Portugal, 2:799-803.
34. M. T. Wysocki, E. Dutkiewicz,andAbolhasan, 2001. A Review of Current On-demand Routing Protocols: ICN 2001, LNCS 2094,
pp:186-195.
35. Samir R. Das and Nishant Gupta, “Energy-Aware On- Demand Routing for Mobile Ad Hoc Networks”, Proceedings of the 4th
International Workshop on Distributed Computing, Mobile and Wireless Computing pp164-173.
36. Tamilarasi M. , Palanivelu T. G., “Integrated Energy- Aware Mechanism for VANETs using On-demand Routing”, International
Journal of Computer and Information Engineering , 2008, pp212-216.
37. Kaushik Mahata , Jamil Y. Khan andAliaAsheralieva, “Traffic Prediction Based Packet Transmission Priority Technique in an
Infrastructure Wireless Network”, published in Wireless Communications and Networking Conference (WCNC), 2011 IEEE, pp 404-
409
38. Shinsuke Tanaka ,Siuli Roy, SomprakashBandyopadhyay, Tetsuro Ueda andDolaSaha in IEEE Communication Society, 2004, pp4172-
4176
39. R. Tafazolli, L. Hanzo, “A Survey of QoS Routing Solution For Mobile Ad hoc Networks”, IEEE Communications Surveys &
Tutorials, Vol. 9, Issue: 2, 2007
40. Draft Amendment for Wireless Access in Vehicular Environments (WAVE), IEEE Std. P802.11p/D3.0, Jul.2007.
41. Boukerche, R. W. N. PazziandK. Abrougui, ,“Design and evaluation of context-aware and location-based service discovery protocols
for vehicular networks,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 717–735, Sep.2011
Keyword : Emotional competency, Emotional immature, Emotional Intelligence Emotional Maturity, Self
Confidence.
References:
1. Arya, A (1997).Emotional Maturity and Value of Superior Children in Family .Fourth Survey of Research in Education Vol.11,New
Dehi, NCERT.
2. C.R. Kothari (2004) .Research Methodology book published by New Age International (p) Ltd.
3. Goleman, D (1998). “What Makes a Leader” Publish in best of Harvard Business Review 1998.
4. Gaulin , Steven J.C and Donlad H. Mc. Buney. Evolutionary Psychology. Prentic Hall.2003.ISBN 978-0-13-111529-3,Chapter 6,p121-
142.
5. Geeta Ranga and Santosh Ranganekar 2009 “Knowledge of Management and Emotional intelligence Predicator of Managerial
Effectiveness.” Journal of Gurukul Business Review Vol 1,pp 55-62.
6. Handel, Steven. “Classification of Emotion”. Retrieved 30Aprial 2012.
7. Hume, D. Emotions and Moods. Organizational Behaviour, Page. No 258-297.
8. James, William (1884). “What is an Emotio?”.Mind 9(34):1888-205.
9. Jerrell,C Cassady & Mourad Ali Eissa 2008, Emotional Intelligence, Perspectives on Emotional and Positive Psychology, Peter Lang
Publishing, New York.
10. Journal of Gurukul Business Review 2009, “Knoweldge of Management and Emotional Intelligence predicator of Managerial
Effectiveness” Vol 5,pp,55-62.
11. Plutchik, Robert (1980), Emotion: Theory Research and Experience:Vol.1.Theories of emotion ,1 ,New York Academic.
12. Plutchik, Robert (2002),Emotion and Life :- Perspective from Psychology,Biology,and Evolution, Washington ,DC: American
Psychology Association.
13. Singh Dalip(2003) “Emotional Intelligence at Work –A professional Guide”. Response Book, New Delhi.
14. Singh D (2001) Emotional Intelligence at Work –A Professional Guide.New Delhi: Respose Book.
15. Jorfi H, Jorfi S & Moghadam K .Impact of emotional Intelligence on performance of Employee. Postmodern Opening,4(1),63 -74
(2010).
Paper Title: Clustering of the Multi-Value Documents based on Probabilistic Features Association Mechanism
Abstract: It is becoming increasingly difficult to cluster multi-valued data in data mining because of the
multiple data interval values of individual functions. Identifying a clustering model that is appropriate for these
disguised multi-valued data deployments in data analysis applications is an open problem. To answer this
question, this paper proposes a feature selection based on the probabilistic features association mechanism
(PFAM). The problem is mainly due to the difficulty in identifying the class information and the multiple values
for each individual features. This work explores the problem of unsupervised feature selection through
computing the probabilistic association score and multi-value data reformation for effective clustering in
multivariate datasets. By minimizing a reformation clustering error, it can conserve together the degree of
similarity and the categorization information of the actual data contents. The proposed approach is evaluated the
clustering purity and Normalized Mutual Information on multivariate document datasets. The experimental
evaluation shows the improvisation of the proposed approach.
Authors: Sri Murni Dewi, Endah Tri Puspitasari, Miftakhul Jannah, Chairita
The Use of Lightweight Brick and Bamboo on Lightweight Reinforced Concrete Panel Subject To
Paper Title:
Horizontal In-Plane Loading
Abstract: The lightweight panel is widely use in building infilled wall to reduce the building mass in lieu of
brick walls. The present innovation works use bamboo and aerated concrete blocks into precast concrete panel.
The average weight of the panel was 1650 kg/m3 compare to ordinary reinforced concrete 2200 kg/m3. Two
type of panel dimension were used 40 cm x 80 cm x 3 cm and 60 cm x 120 cm x 4 cm. Bamboo reinforcement
act as a structural framework of the panel and aerated concrete block (AAC block) functioning as infilled wall or
cladding. Panels were loaded at the in- plane panels at two position, namely at the peak and at the middle panel
height. When the load position was at the peak the average failure loads were120 N for small and large panel,
the failure occurred at compression at top diagonal frame. when the load position was at mid panel, the average
failure loads were140N for small panel and 260N for large panel, the failure occurred as shear cracks on the
panel.
The failure load of panel without aerated concrete blocks were130N for small panel and 215N for large panel.
277. Keyword : bamboo reinforced concrete, aerated concrete block, lightweight panel.
References: 1601-
1. Yushun Li, Huangying Shen, Wei Shan, Tianshi Han, Flexural behavior of lightweight bamboo –steel composite slabs, Thin-Walled 1603
Structures 53 (2012) 83–90.
2. J.G Moroz SL. Lissel. MD Hagel. Performance of bamboo reinforced concrete masonry shear walls, Construction and Building
Materials 61 (2014) pp125-137
3. SM Dewi, D Nuralinah, A Munawir,MN Wijaya, Crack Behaviour Study of Bamboo Reinforced Concrete Beam with Additional Pegs
in Reinforcing, International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 7, July 2018, pp. 1632–1640,
4. Muhtar, SM Dewi, Wisnumurti, A Munawir, The Stiffness and Cracked Pattern of Bamboo Reinforced Concrete Beams Using a Hose
Clamp, International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 8, August 2018, pp. 273–284,
5. SM. Dewi and D. Nuralinah. The Recent Research on Bamboo Reinforced Concrete. MATEC Web of Conferences. 103, 02001 2017.
6. Muhtar, S M Dewi, Wisnumurti, A.Munawir, Enhancing Bamboo Reinforcement Using a Hose-Clamp to Increase Bond Stress and
Slip Resistance, Journal of Building Engineering 26 (2019) 100896
7. SM Dewi, RM Simatupang, I Waluyohadi, The Use of Bamboo and Autoclaved Aerated Concrete Block to Reduce the Weight of
Precast Concrete Beam, AIP Conference Proceedings 1887, 020012 (2017).
8. Ari Wibowo, Indradi Wijatmiko, and Christin Remayanti Nainggolan, Structural Behavior of Lightweight Bamboo Reinforced
Concrete Slab with EPS Infill Panel, AIP Conference Proceedings · September 2017.
9. Wisnumurti, SM Dewi, A Soehardjono, Strength reduction factor ( R) and displacement amplification factor (Cd) of confined masonry
wall with local brick in Indonesia, 2nd International Conference on Sustainable Civil Engineering Structures and Construction
Materials 2014 (SCESCM 2014), Procedia Engineering 95 ( 2014 ) 172 – 17
Authors: Zuardin, Amran Razak, M. Alimin Maidin, Muhammad Tamar, Ahmad Yani
Paper Title: Patterns of Family Support in Cervical Cancer Survivors with High Resilience
Abstract: This study is aimed to explore the patterns of family support in cervical cancer survivors. This
study is focused on explaining the kinds of patterns of family support received by cervical cancer survivors who
had experienced high-resilience. It implements qualitative methods with descriptive research design. Data is
collected by screening using resilience scale and interview. The analysed data include interview results obtained
from cervical cancer survivors who had experienced high resilience. Research results showed that high resilience
among the three cervical cancer survivors is related to family support. The patterns of family support received by
the three participants include closeness, receptors, and durability. The three participants also received at least
three out of four patterns of family supports concrete support, emotional support, informative support, and award
support. Types of support most needed by the three participants are concrete support and emotional support.
Authors: Samsunnahar Khandakar, Jahirul Islam Babar, Anup Majumder, Md. Imdadul Islam
Paper Title: Complexity Analysis and Accuracy of Image Recovery Based on Signal Transformation Algorithms
Abstract: In this paper we compare and analyze the complexity of three functions: Fast Fourier transform
(FFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT), used in image
transformation. The purpose of all the algorithms is to shift the signal from space or time domain to frequency
domain for de-noising or compression. We compare the simulated process time of both one and two dimensional
FFT, DCT and DWT (Symlet and Debauches 1) using image and speech signal. The process time is found
lowest for FFT and highest for DWT, provided its basis function governs the process time and DCT provide the
moderate result. Finally the quality of compressed image under the three mathematical functions are compared,
where DWT is found as the best and FFT yields worst result.
Keyword : Basis function, MSE, Butterfly algorithm, process time, confidence level.
References:
1. Teddy Mantoro and Fifit Alfiah, ‘Comparison methods of DCT, DWT and FFT techniques approach on lossy image compression,’
2017 International Conference on Computing, Engineering, and Design (ICCED), 23-25 Nov 2017, Kuala Lumpur, Malaysia
279. 2. Fifit Alfiah, Saepudin, Sutarya, Indra Purnama and Ryan Anggara, ‘Comparison Methods of DCT, DWT and FFT Techniques
Approach on Lossy Image Compression,’ International Journal of Computer Techniques, vol. 5, Issue 1, pp.20-24, Feb 2018
3. Hamed Hakkak and Mahdi Azarnoosh, ‘Analysis of lossless compression techniques time-frequency-based in ECG signal 1607-
compression,’ Asian Journal of Biomedical and Pharmaceutical Sciences, vol. 9, Issue 66, pp.16-25, Jan 2019 1612
4. Priyanka, R. Bhonde and R. D. Ghongade, ‘A Review Paper on Design and Simulation Analysis of 32 and 64 Point FFT Using
Multiple Radix Algorithm,’ IJCSMC, vol. 5, Issue. 1, pp.198-201, January’ 2016
5. Kavita Tewari and Renu L. Kalakoti, ‘Fingerprint Recognition and Feature Extraction Using Transform Domain Techniques,’ 2014
International Conference on Advances in Communication and Computing Technologies, 0-11 Aug. 2014, Mumbai, India
6. M. P. Dale and M. A. Joshi, ‘Fingerprint Matching Using Transform Features,’ TENCON 2008, 2008 IEEE Region 10 Conference, 19-
21 Nov. 2008, Hyderabad, India
7. Ravinder Singh, Manish Mathuria, Kailash Rathore, Santosh Kumar, ‘A Robust Color Image Watermarking using Combination of
DWT and DCT,’ International Journal of Computer Applications (0975 – 8887), pp.11-14, 4th International IT Summit Confluence
2013.
8. Nawaf Hazim Barnouti, Zaid Saeb Sabri, Khaldoun L. Hameed, ‘Digital Watermarking Based on DWT (Discrete Wavelet Transform)
and DCT (Discrete Cosine Transform),’ International Journal of Engineering & Technology, volume 7(4), pp. 4825-4829, 2018
9. Shivang Ghetia, Nagendra Gajjar, Ruchi Gajjar, ‘Implementation of 2-D Discrete Cosine Transform Algorithm on GPU,’ International
Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, pp. 3024-3030, July 2013
10. Mayura Patrikar and Vaishali Tehre , ‘Design and Power Measurement of 2 And 8 Point FFT Using Radix-2 Algorithm for FPGA
Implementation,’ IOSR Journal of VLSI and Signal Processing (IOSR-JVSP), vol. 7, Issue 1, pp. 44-48, Feb. 2017
11. K. Jayaram and C. Arun, ‘Survey Report for Radix 2, Radix 4, Radix 8 FFT Algorithms,’ International Journal of Innovative Research
in Science, Engineering and Technology, vol. 4, Issue 7, pp. 5149-5154, July 2015
12. Aniket Shukla and Mayuresh Deshmukhm, ‘Comparative Study of Various FFT Algorithm Implementation on FPGA,’ vol.1, Issue 1,
pp.19-22, November 2012.
Authors: Victor Fursov, Alexander Rudnev, Olga Malinina, Ekaterina Alekhina, Inna Kushnareva
Paper Title: Development of a Methodology to Assess the Regional Labor Potential in Modern Russia
280. Abstract: The article presents the results of the development of a methodology for assessing the structural
structure of the labor potential of a region and its role in socio-economic development, territorial and 1613-
environmental features of labor resources and mechanisms of reproduction of labor potential. The development 1618
of the methodology was based on a conceptual and methodological review of foreign and domestic scientific
sources. Promising markers of labor resources in foreign science have been identified, which are manifested in
the assessment of migration risks, the impact of globalization factors, forecasting the dependence of labor
productivity at the regional level on market factors, climatic conditions, insurance mechanisms, etc. A high level
of scientists' interest in the problem of labor potential on micro-, meso and macro levels in Russia. The authors
pay special attention to the assessment of existing approaches to the methods for assessing the labor potential of
the region proposed by domestic researchers and applied in the Russian Federation; The features of the main
methodological approaches are evaluated; their classification is given, as well as the technology for conducting
the assessment, depending on the research tasks of scientists. The article describes the methodology developed
by the authors for measuring the labor potential of the region based on the index method, which allows taking
into account the specific conditions of its reproduction and use at the regional level, as well as conducting
reasonable comparative assessments. The calculations are presented according to the proposed methodology of
the state and level of development of labor potential for the regions of the North Caucasus and Southern Federal
Districts and the Russian Federation as a whole.
Authors: Anna Balykina, Ilya Nikonov, Yuri Kuznetsov, Alexander Lunegov, Alesia Bakhta
Technology Development to Suppress the Campylobacter Jejuni in Intestinal Microflora of The
Paper Title:
Broilers by Lactobacilli
Abstract: This article presents a method for determining the microflora of the blind processes of the
intestines of broiler chickens receiving heterologous lactobacilli with anti-C.jejuni activity as a feed additive in
comparison with intact chickens. In the course of a scientific and production experiment on the Cobb 500 cross
broilers, an experiment was carried out to determine the total number of bacteria in the intestinal contents by
quantitative PCR. Sequencing was performed on a MiSeq genomic sequencer (Illumina, Inc., USA) using the
MiSeq Reagent Kit v3 kit (Illumina, Inc., USA). Data were obtained on the total number of bacteria and their
taxonomic diversity. As a result of the studies, it was shown that the microflora of broilers throughout the entire
maintenance period corresponded to the norm. The use of feed additives based on lactobacilli in general had a
positive effect on the state of microflora of the blind processes of the intestine..
281.
Keyword : probiotics, lactobacilli, broilers, Campilobacter jejuni antagonism, NGS, real-time quantitative
PCR. 1619-
1622
References:
1. Nikonov I., Yildirim E., Gorfunkel E., Ilina L., Laptev G., Novikova N., Fisinin V., Dubrovin A. Мetagenomic profiles of the
gastrointestinal tract in chicken embryos. The Proceedings of XXV World's Poultry Congress Abstracts. 2016. P. 529.
2. Ilyina L., Yildirim E., Nikonov I., Filippova V., Dubrovin A., Laptev G., Novikova N., Grozina A., Fisinin V. Bacterial commu nity in
broiler intestinal caeca in connection with nutritive diets of different composition. The Proceedings of XXV World's Poultry Congress
Abstracts. 2016. P. 87.
3. Ilina L.A., Yildirim E.A., Nikonov I.N., Filippova V.A., Laptev G.Y., Novikova N.I., Grozina A.A., Lenkova T.N., Manukyan V.A .,
Egorov I.A., Fisinin V.I. Metagenomic bacterial community profiles of chicken embryo gastrointestinal tract by using T-RFLP analysis.
Doklady Biochemistry and Biophysics. 2016. Т. 466. № 1. P. 47-51.
4. Ilyina L.A., Yildirim E.A., Nikonov I.N., Filippova V.A., and others. Gastrointestinal metagenomic landscape of chicken embryos using
the T-RFLP method. Reports of the Academy of Sciences, 2016; 466 (4): 482.
5. Park Y.H., Abdullah W.N., Liong M.T. Application of probiotics for the production of safe and high-quality poultry meat. Korean J food
Sci Anim Resour, 2016; 36:567-576.
6. Oakley B.B., Lillehoj H.S., Kogut M.H., and others. The chicken gastrointestinal microbiome. Author Notes. FEMS Microbiology
Letters, 2014; 360(2): 100–112.
7. Zaki M.M., Reda W.W. Campylobacter in poultry. Vet. Med. J., 1995; 43(1): 71–76,
8. Sundaresan N.R., Saxera V.R., Rani S., PreetiJain K.P. and others. Expression profile of myostatin mRNA during the embryonic
organogenesis of domestic chicken (Gallus gallusdomesticus). Research in Veterinary Science, 2008; 85(1): 86-91.
9. Rossi D.A., Fonseca B.B.; de Melo R.T., and others. Transmission of Campylobacter coli in chicken embryos. Braz. J. Microbiol., 2012;
43(2): 535-543.
10. Stanely D., Denman S.E., Hughes R.J., et al. Intestinal microbiota associated with differential feed conversion efficiency in chickens.
Appl. Microbiol. Biotechnol., 2012; 96: 1361-1369.
11. Mottet A., Tempio G. Global poultry production: current state and future outlook and challenges. WorldsPoultSci J., 2017; 73:245–256.
12. Ellis R.J., McSweeney C.S. Animal gut microbiomes. In Manual of environmental microbiology, 4th edn. American Society of
Microbiology. 2016. 4.4.3-1–4.4.3-7
13. Borda-Molina D., Seifert J., Camarinha-Silva A. Current perspectives of the chicken gastrointestinal tract and its microbiome. Comput
Struct Biotechnol J., 2018; 16:131–139.
14. Clavijo V., Flórez M.J.V. The gastrointestinal microbiome and its association with the control of pathogens in broiler chicken
production: a review. Poult Sci., 2018; 97:1006–1021.
15. Medvecky M., Cejkova D., Polansky O., Karasova D., Kubasova T. 2018. Whole genome sequencing and function prediction of 133 gut
anaerobes isolated from chicken caecum in pure cultures. BMC Genom 19:561.
16. Choi K.Y., Lee T.K., Sul W.J. 2015. Metagenomic analysis of chicken gut microbiota for improving metabolism and health of
chickens—a review. Asian Australas J AnimSci 28:1217–1225.
17. Humphrey S., Chaloner G., Kemmett K., Davidson N., Williams N., Kipar A., Humphrey T., Wigley P. 2014. Campylobacter jejuni i s
not merely a commensal in commercial broiler chickens and affects bird welfare. MBio 5:e01364-14.
18. Blake D.P., Hillman K., Fenlon D.R., Low J.C. Transfer of antibiotic resistance between commensal and pathogenic members of the
Enterobacteriaceae under ileal conditions. J Appl Microbiol., 2003; 95:428–436.
19. Xiao Y., Xiang Y., Zhou W., Chen J., Li K., Yang H. Microbial community mapping in intestinal tract of broiler chicken. Poult Sci.,
2016; 96:1387–1393.
20. Lu J., Idris U., Harmon B., Hofacre C., Maurer J.J., Lee M.D. Diversity and succession of the intestinal bacterial community of the
maturing broiler chicken. Appl Environ Microbiol., 2003; 69:6816–6824.
21. Rinttilä T., Apajalahti J. Intestinal microbiota and metabolites—implications for broiler chicken health and performance. J Appl Poult
Res., 2013; 22:647–658.
Paper Title: Media as a Tool for Forming the President's Image (On the Example of the 2019 Election Process)
Abstract: The article deals with notion of the a politician image, in particular the president, as well as the
tools of forming it through the media in Ukraine using the example of the president’s elections 2019. His
benevolent attitude and increasing confidence of Ukrainians in his activities and extrapolated them to the events
of 2019. The article deals with the technology of comparative analysis of portrait representation on television
and Internet portals of influential Ukrainian media. The authors selected powerful Ukrainian television media,
such as 1 + 1 (TSN), ICTV (Facts), Channel 5 (news), STB (News windows), 112 (news112) for the study. On
each TV channel and site, the content not only contributed to the formation of a portrait of the president, but
gave his own attitude to it. A pilot sociological research has been conducted by the authors revealed the level of
Ukrainians’ confidence in the newly elected President of Ukraine. The survey covered the period from the 1-st
of April till the 5-th of July 5, 2019. The survey was conducted from the 11-th till the 17-th of June 2019. A total
of 1,100 recipients participated in the survey.
282. Keyword : presidential image, media, image forming tools, image communication, confidence level,
television media. 1623-
References: 1628
1. Denisyuk S. (2003) The formation of a positive image of Ukraine in the conditions of globalization. State and Law: Coll. Sciences. BC
Legal and Political Science. - Kiyv, State and Law department, Ukraine. P. 648–654.
2. Denisyuk S. (2005) Political Image as a Reflection of the Political Consciousness of Ukrainian Citizens in the Conditions of Social and
political transformations New Paradigm: Journal of Scientific Works. Kyiv, Publishing house of NPU by M.P. Drahomanov. P. 133 -
140
3. Denysyuk S. (2007) The image of a political leader in the context of the development of Ukrainian political culture: peculiarities of
formation and mechanisms of implementation: author. diss. for the sciences. degree of Doctor of Economics. Sciences: Special.
23.00.03 - «Political Culture and Ideology» Kyiv. P. 18
4. Gackowski T. (2013) Poland Political Image as the Substance of the Political Communication in the Era of PostPoliticsю Online
Journal of Communication and Media Technologies. P. 43- 45
5. Lalancette M., Raynauld V. (2017) The Power of Political Image: Justin Trudeau, Instagram, and Celebrity Politics. American
Behavioral Scientist. P. 112-121
6. McNair B. (2011) An Introduction to Political Communication, fifth edition; Routledge: London and New Yorkp. P. 274
7. Ogilvy D. (1955) The image of the brand – a new approach to creative operations, Reprinted by Courtesy of Ogilvy & Mather. P. 345
8. Pocheptsov G. (2004) From Pharaoh to President. Kiyv, Adef-Ukraine. P. 328
9. Sharlamanov K., Jovanoski F. (2014) The Role of Image in the Political Campaigns // International Journal of Scientific & Engineering
Research, Vol. 5, p. 599-60
Paper Title: Big Data Analytics for Deriving Business Intelligence Rules
Abstract: Big data is a large volume of data pool and processing and analyzing these data is tedious jobs.
283. The aim of fulfilling huge information storage needs is that the structural transformation of repository system
using traditional approaches to NoSQL technology. However, the existing technologies for storage are
1629-
inefficient since, they do not generated data that are scalable, consistent and solutions for rapidly evolving
1637
diversified data. The primary method for storing huge amounts of data is used for analytics in real time
applications like healthcare, scientific experiments, e-business and networks. In this paper, it is in sighted the
characteristics, application, tools of big data, Technologies, Big data analytics, challenges and issues in Big data.
Keyword : Big Data Analytics, Hadoop, Map Reduce Structured Data, Semi Structured and Unstructured
Data
References:
1. A. Alexandrov“The Stratosphere platform for big data analytics,”VLDB J., vol. 23, no. 6, pp. 939–964, 2014.
2. R. Sellami, S. Bhiri, and B. Defude“Supporting multi data stores applications in cloud environments,” IEEE Trans. Services Co mput.,
vol. 9, no. 1, pp. 59–71, Jan./Feb. 2016.
3. D. Wu, S. Sakr, L. Zhu, and Q. Lu “Composable and efficient functional big data processing framework,” in Proc. IEEE Int. Conf.
Big Data, 2015, pp. 279–286.
4. S. Ji, W. Li, S. Yang, P. Mittal, and R. Beyah “On the relative de-anonymizability of graph data: Quantification and evaluation,” in
IEEE INFOCOM 2016—The 35th Ann. IEEE Int. Conf. Comput. Commun., 10-14 Apr. 2016, doi: 10.1109/
INFOCOM.2016.7524585.
5. Y. Zhu, H. Jiang, J. Wang, and F. Xian “HBA: Distributed metadata management for large cluster-based storage systems,” IEEE
Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 750–763, Jun. 2008.
6. L. Chen “Optimizing Map Reduce for GPUs with effective shared memory usage,” in Proc. 21st Int. Symp. High -Performance
Parallel Distrib.Comput., 2012, pp. 199–210.
7. L. Zhao, Z. Chen, Z. Yang, and Y. Hu, “A hybrid method for incomplete data imputation,” in Proc. 17th IEEE Int. Conf. High
Performance Comput. Commun., 2015, pp. 1725–1730.
8. Hagras T, Janecek J. A simple scheduling heuristic for heterogeneous computing environments[C]//Proceedings of the Second
international conference on Parallel and distributed computing. IEEE Computer Society, 2003: 104-110.
9. S. Hoch Reiter, J.“Long short-term memory.Neural Computation, 9(8), p. 1735-1780, 1997.
10. A. Sheth“Transforming big data into smart data: Deriving value via harnessing volume, variety, and velocity using semantic
techniques and technologies,” in Proc. 30th IEEE Int. Conf. Data Eng.,2014, Art. no. 2.
11. Xuhong Zhang World economic forum, “Big data, big ImpactNew possibilities for international development,” 2012.[Online].
Available: http:// www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf
12. Liang Zhang“Big data across the Federal government”, 2014.[Online].
Available:http://www.whitehouse.gov/sites/default/files/microsites/ ostp/big_data_fact_sheet_final_1.pdf
13. H. Giersch “Urban Agglomeration and Economic Growth”. Berlin, Germany: Springer, 2012.
14. R. B. EkelundJr and R. F. Hbert “A History of Economic Theory and Method”. Long Grove, IL, USA: Waveland Press, 2013.
15. B. Liddle“The energy, economic growth, urbanization nexus across development: Evidence from heterogeneous panel estimates robust
to cross-sectional dependence,” Energy J., vol. 34, no. 2, pp. 223–244, 2013.
16. S. Ghosh and K. Kanjila“Long-term equilibrium relationship between urbanization, energy consumption and economic activity:
Empirical evidence from India,” Energy, vol. 66, no. 3, pp. 24–331, 2014.
17. S. H. Law and N. Singh “Does too much finance harm economic growth?” J. Banking Finance, vol. 41, no. 4, pp. 36–44, 2014.
18. D. Baglan and E. Yoldas “Non-linearity in the inflation-growth relationship in developing economies: Evidence from a semiparametric
panel model,” Econ. Lett., vol. 125, no. 1, pp. 93–96, 2014.
19. Q. Ashraf and O. Galor“The ‘Out of Africa’ hypothesis, human genetic diversity, and comparative economic development,” Amer.
Econ. Review, vol. 103, no. 1, pp. 1–46, 2013.
20. V. Bol_on-Canedo, N. S_anchez-Marono, and A. Alonso-Betanzos “A review of feature selection methods on synthetic data,”
Knowl.Inf. Syst., vol. 34, no. 3, pp. 483–519, 2013.
21. S. Alelyani, J. Tang, and H. Liu “Feature selection for clustering: A review,” Data Clustering: Algorithms Appl., Florida, USA: CRC
Press, 2013.
22. M. A. Hall “Correlation-based feature selection for machine learning,” Ph.D. dissertation, Dept. Comput. Sci., Univ. Waikato,
Hamilton, New Zealand, 1999.
23. M. Dash and H. Liu“Consistency-based search in feature selection,” Artificial Intell., vol. 151, no. 1, pp. 155–176, 2003.
24. M. A. Hall and L. A. Smith “Practical feature subset selection for machine learning,” in Proc. 21st Australian Comput. Sci. Conf.,
1998, pp. 181–191.
25. L. Beretta and A. Santaniello “Implementing ReliefF filters to extract meaningful features from genetic lifetime datasets,” J.
Biomed.Informat., vol. 44, no. 2, pp. 361–369, 2011.
26. Q. Gu, Z. Li, and J. Han “Generalized Fisher score for feature selection,” in Proc. 27th Conf. Annu. Conf. Uncertainty Artif.Intell.,
2011, pp. 266–273.
27. H. Peng, F. Long, and C. Ding “Feature selection based on mutual information criteria of max-dependency, max-relevance, and
minredundancy,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 8, pp. 1226–1238, Aug. 2005.
28. I. H. Witten and E. FrankData Mining: Practical Machine Learning Tools and Techniques. SanMateo,CA, USA:Morgan Kaufmann,
2005.
29. J. G. Dy and C. E. Brodley“Feature subset selection and order identification for unsupervised learning,” in Proc. Int. Conf. Mach.
Learn., 2000, pp. 247–254.
30. P. S. Bradley and O. L. Mangasarian “Feature selection via concave minimization and support vector machines,” in Proc. Int. Conf.
Mach. Learn., 1988, pp. 82–90.
31. A. Rakotomamonjy “Variable selection using SVM based criteria,” J. Mach. Learn. Res., vol. 3, no. 3, pp. 1357–1370, 2003.
32. M. Mejła-Lavalle, E. Sucar, and G. Arroyo“Feature selection with a perceptron neural net,” in Proc. Int. Workshop Feature Selection
Data Mining, 2006, pp. 131–135.
33. G. C. Cawley, N. L. C. Talbot, and M. Girolami “Sparse multinomial logistic regression via Bayesian L1 regularisation,” in Proc.
Advances Neural Inf. Process. Syst., 2007, pp. 209–216.
34. https://www.sas.com/en_in/insights/big-data/hadoop.html
Authors: Pradip Kumar Nanda, Shiva Prasad Das, Soumya Ranjan Panda, Debabrata Singh
Paper Title: Impact of Structural Aspect, Metal Gate and Channel Material on UTB-SOI-MOSFET
Abstract: Ultra Thin Body Silicon on Insulator Metal Oxide Semiconductor Field Effect Transistors (UTB-
SOI-MOSFETs) provide better immunity to Short Channel Effects (SCEs). But the behaviour changes at
miniaturization and still the many unexplored effects need to be analysied. Here in this paper, Drain Induced
284. Barrier Lowering (DIBL) and sub-threshold Slope (SS) variation of a n-channel UTB-SOI-MOSFET have been
analyzed by changing the device structural aspects like gate length (LG), BOX thickness (tBOX) and Silicon 1638-
film thickness (tSi). Also, the effect of intrinsic parameters as metal gate work function and channel material 1642
variation on DIBL and sub-threshold Slope (SS) variation has been analyzed.
Authors: Cmak Zeelan Basha, S. Srinivasa Rao, P Lavanya Lahari, B Navya, SVS Divya
286. Keyword : Form Designer, Service portal, Client Scripts, Notifications, Events, and Scheduled scripts.
1647-
References: 1649
1. Songsak Channarukul and Nattachai Saejiem “Social-aware automated course planner: An integrated recommender system for
university registration system” IEEE [Feb. 1, 2017].
2. Amer Al-Badarenah, Jamal Alsakran, "An Automated Recommender System for Course Selection", International Journal of Advanced
Computer Science and Applications (ijacsa), vol. 7, no. 3, 2016.
3. Calhoun, Vince D., and Tulay Adali. "Feature-based fusion of medical imaging data." IEEE Transactions on Information Technology in
Biomedicine 13.5 (2009): 711-720.
4. Petkov N. Biologically motivated computationally intensive approaches to image pattern recognition. Future Generation Computer
Systems. 1995 Aug 1;11(4-5):451-65.
5. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
6. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
7. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.
8. Azmira Krishna, Cmak Zeelan Basha, Syed Karimunnisa
” Computerized Face Detection and Tracking” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ,
Volume-8 Issue-12, October 2019
Keyword : Combination of relative gap position, Friction factor, Gap width, Nusselt Number, Reynolds
number, and Thermo hydraulic performance (THP).
References:
1. Han JC, Glicksman LR, Rosenow WM, (1978). Investigation of heat transfer and friction for rib-roughened surfaces. International
288. journal of heat mass transfer; 21:1143–56.
2. Lau SC, McMillin RD, Han JC, (1991). Turbulent heat transfer and friction in a square channel with discrete rib turbulators.
Transactions of the ASME, Journal of Turbomachinery; 113 (3): 360–366. 1654-
3. Lau SC, McMillin RD, Han JC, (1991). Heat transfer characteristics of turbulent flow in a square channel with angled rib. Transactions 1658
of the ASME, Journal of turbomachinery; 113 (3): 367–374.
4. Han JC, Park JS, (1988). Developing heat transfer in rectangular channels with rib turbulators. International journal of heat mass
transfer; 3 (1): 183–195.
5. Han JC, Zhang YM, (1992). High performance heat transfers ducts with parallel broken and V-shaped broken ribs. International
journal of heat mass transfer; 35 (2): 513–523.
6. Cho HH, Wu SJ, Kwon HJ, (1999). Local heat/mass transfer measurement in a rectangular duct with discrete ribs. Transaction of the
ASME Proceeding, Heat transfer, Volume 3, ISBN: 978–07918–7860–6.
7. Cho HH, Kim YY, Rhee DH, Lee SY, Wu SJ, Choi CK, (2003). The effect of gap position in discrete ribs on local heat/mass transfer
in a square duct. Journal of enhanced heat transfer; 10 (3): 287–300.
8. Aharwal KR, Gandhi BK, Saini JS, (2008). Experimental investigation of heat-transfer enhancement due to a gap in an inclined
continuous rib arranged in a rectangular duct of solar air heater. Renewable energy; 33 (4): 585–596.
9. Aharwal KR, Gandhi BK, Saini JS, (2009). Heat transfer and friction characteristics of solar air heater ducts having integral inclined
discrete ribs on absorber plate. International journal of heat mass transfer; 52 (25-26): 5970–5977.
10. Duffie JA, Beckman WA, (1980). Solar energy, thermal processes. New York: Wiley and Sons, p. 211.
11. Saini JS, (2004). Use of artificial roughness for enhancing performance of solar air heater. Proceedings of XVII National and VI
ISHME/ ASME, Heat and mass transfer, conference, January 05–07, 2004. IGCAR, Kalpakkam, India.
12. Karwa R, Solanki SC, Saini JS, (2001). Thermo-hydraulic performance of solar air heaters having integral chamfered rib roughness on
absorber plates, Energy, 26 (2), 161–76.
13. Varun, Saini RP, Singal SK, (2008). Investigation of thermal performance of solar air heater having roughness elements as a
combination of inclined and transverse ribs on the absorber plate, Renewable Energy, 33 (6), 1398-405.
14. Lewis MJ, (1975). Optimizing the thermo hydraulic performan ce of rough surface. International journal of heat mass transfer;
18 (11): 1243–1248.
Paper Title: On Infinite Number of Solutions for one type of Non-Linear Diophantine Equations
Abstract: In this article, we prove that the non-linear Diophantine equation 𝑦 = 2𝑥1𝑥2 …𝑥𝑘 + 1; 𝑘 ≥ 2, 𝑥𝑖
∈ 𝑃 − {2}, 𝑥𝑖′𝑠 are distinct and P is the set of all prime numbers has an infinite number of solutions using the
notion of a periodic sequence. Then we also obtained certain results concerning Euler Mullin sequence.
290. References:
1. D. A. Cohen and T. M. de Karz, Prime numbers and the first digit phenomenon, J. Number Theory. 18 (1984) 261–268.
2. T. M. Apostol, Introduction to Analytic number theory, Springer International student edition, Fifth reprint, Narosa Publishing house, 1665-
(1995) pp. 146-156. 1669
3. J. W. Porrars Ferreira, The pattern of prime numbers, Applied Mathematics. 8 (2017) 180–192.
4. Smarandache, article prime conjecture, Collected papers Vol.2, Moldova State university press, Kishinev, (1997) pp.190.
5. A. A. Mullin, Recursive function theory (a modern look at a Euclidean idea), Bull. Amer. Math. Soc. 69 (1963) 737.
https://doi.org/10.1090/S0002-9904-1963-11017-4
6. C. D. Cox and A. J. Van der Poorten, On a sequence of prime numbers, J. Austral. Math. Soc. 8 (1968), 571– 574.
https://doi.org/10.1017/S1446788700006236
7. D. Shanks, Euclid’s primes, Bull. Inst. Combin. Appl. 1 (1991) 33–36.
8. A. Booker, On Mullin’s second sequence of primes, Integers, 12A (2012), available at http://www.integers-ejcnt.org/vol12a.html.
https://doi.org/10.1515/integers-2012-0034
9. A. Deitmer, A First course in Harmonic Analysis, 2 nd edition, (2005), Springer, New York.
Keyword : 5th Generation, Beamforming, BDMA, BFDM, Cellular, Cloud, D2D, FBMC, GFDM, Latency,
Multi carrier, MIMO, mmWave, NOMA, OFDM, Radio Access Network, Spectrum, UFMC, Variants of
OFDM, Wireless networks
References:
1. Zaidi A., Athley F., Medbo J., Gustavsson U., Durisi Gi., Chen X., (2018), 5G physical layer: principles, models and technology
components
2. Internet Resource, Ericsson, http://www.ericsson.com/openarticle/mwc-connected-devices 1686565587c
3. Mehta H., Patel D., Joshi B., Modi H., 0G to 5G Mobile Technology, A Survey, Journal of Basic and Applied Engineering Researc h,
Volume 1, Number 6, PP 56-60, October, 2014
4. Mir M. M., Kumar S., Evolution of Mobile Wireless Technology from 0G to 5G, International Journal of Computer Science and
Information Technology, Volume 6 (3), PP 2545-2551, 2015
5. Ms. Anju Uttam Gawas, an Overview on Evolution of Mobile Wireless Communication Networks, 1G-6G, JRITCC, Volume 3, Issue
5, 2015
6. Meenal G. Kachhavay, International Journal of Computer Science and Mobile Computing, Volume 3, Issue 3, 2014
7. J.G. Andrews, What will 5G be?, IEEE, J. Sel. Areas Comm. 32, PP 1065–1082,2014
8. Satinder, Babbar V., 3G, 4G & 5G wireless mobile networks, A comparative study, ICSTM, PP 2381-2390, 2015
9. Akhil Gupta, Rakesh Kumar Jha, A Survey of 5G Network, Architecture and Emerging Technologies, IEEE, 2169-3536 (c), 2015
10. Kwadwo, P. Agyapong, Design considerations for 5G network architecture. IEEE Comm. Mag. 52(11), 65, 2014
11. DMC R&D Center, 5G Vision White Paper, http://www.samsung.com/global/business images/insights/2015/samsung5GVision0.pdf,
2015
12. Bego Blanco, technology architecture of future pillars in the 5G mobile networks: NFV, MEC and SDN, November 2017
13. R. Henderson, M. Langridge, What is 5G?, When is it coming and why do we need it?, http://www.pocket-lint.com/news/128938-
what-is-5g-when-is-it-coming-and-why-do-we-need-it, Jan 2017
14. Chaudhary R. R., A Network Overview of Massive MIMO for 5G Wireless Cellular System Model and Potentials, International
Journal of Engineering Research and General Science, Volume 2, Issue 4, PP 338 – 347, 2014
15. Kwadwo P.A., Iwamura M., Staehle D., Kiess W., Design Considerations for a 5G Network Architecture, IEEE Communications
Magazine, PP 65 - 75, November 2014
16. Larsson E.G., Edfors O., Tufvesson F., Marzetta T. L., Massive MIMO for Next Generation Wireless Systems, IEEE Communications
Magazine, (52), PP 186-195, February 2014
17. Eduardo Castaneda, Adao Silva, Atılio Gameiro, and Marios Kountouris, an Overview on Resource Allocation Techniques for Multi-
User MIMO Systems, IEEE, 1553-877X (c), 2016
18. Carolina Fortuna, Software interfaces for control, optimization and update of 5G machine type communication networks, December
2017
19. Zoraida Frias, 5G networks, Will technology and policy collide?, July 2017
20. Jing Wang, Chih Lin, Recent advances and future challenges for massive MIMO channel measurements and models, science china,
Vol. 59 021301:1–021301:16, February 2016
21. Erik Dahlman, New 5G Radio Access Technology, 2016
22. Garg S., A New Wireless Communication Technology, Radio over Fiber, KIET International Journal of Communica tions &
Electronics, Volume No. 3, Issue No.1, PP 24-27, March 2015
23. Ian F. Akyildiz, 5G roadmap, 10 key enabling technologies, September 2016
24. Shahid Mumtaz, A survey of 5G technologies, regulatory, standardization and industrial perspectives, September 201 7
25. Pablo Salva Garcia, 5G-UHD, Design prototyping and empirical evaluation of adaptive Ultra High Definition video streaming based
on scalable H.265 in virtualized 5G networks, December 2017
26. Jiasong Muan, Improved AODV routing for the ZigBee heterogeneous networks in 5G environment, April 2017
27. S. Zhang, 5G towards energy-efficient, low-latency and high reliable communications networks, IEEE, ICCS, PP 197–201, 2014
28. Akhil Gupta, Rakesh Kumar Jha, A Survey of 5G Network, Architecture and Emerging Technologies, IEEE, 2169-3536(c), 2015
29. Gaikwad, Vaibhav Vitthal, Bhor Pooja Vijay, Review of Light fidelity, International Journal for Scientific Research & Develo pment,|
Volume 4, Issue 02, ISSN (online): 2321-0613, 2016
30. S. Jia, Analyzing and relieving the impact of FCD traffic in LTE-VANET heterogeneous network, in: IEEE Int. Conference on
Telecommunications, PP 88–92, 2014
31. Mamun A.A., Anwar S., Ali H., 4G and 5G Mobile Communication Networks, Features, Analysis, Comparison and Proposed
Architecture”, IJCST, Volume 7, Issue 2, PP 154-160, 2016
32. Farris, Federated IoT services leveraging 5G technologies at the edge, January 2018
33. A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka, H.
Tullberg, M. Uusitalo, B. Timus, Fallgren, Scenarios for 5G mobile and wireless communications: the vision of the METIS project,
IEEE Commun. Mag. 52 (5), PP 26–35, 2014 doi: 10.1109/ MCOM.2014.6815890.
34. Additional Knowhow on FP7 Internet Resource, http://ec.europa.eu/research/fp7/index en.cfm
35. FP7 Integrating Project METIS (ICT 317669). [Online] Available: https://www.metis 2020.com/documents/deliverables
36. D.S. Baum, J. Hansen, J. Salo, An interim channel model for beyond 3G systems: extending the 3GPP spatial channel model (SCM),
in: 2005 IEEE 61st Vehicular Technology Conference, Volume 5, IEEE, PP 3132–3136, 2005
37. Y.J. Bultitude, T. Rautiainen, IST-4-027756 WINNER II D1. 1.2 V1. 2 WINNER II Channel Models
38. J. Medbo, K. Borner, K. Haneda, V. Hovinen, T. Imai, J. Jarvelainen, T. Jamsa, Karttunen, K. Kusume, J. Kyrolainen, P. Kyosti, J.
Meinila, V. Nurmela, Raschkowski, A. Roivainen, J. Ylitalo, Channel modeling for the fifth generation mobile communications, in:
2014 8th European Conference on Antennas and Propagation (EuCAP), PP 219–223, 2014, doi:10.1109/ EuCAP.2014. 6901730
39. The Institute of Electrical and Electronics Engineers (IEEE), IEEE Standard for Information technology–Telecommunications and
information exchange between systems–Local and metropolitan area networks–Specific requirements-Part 11: Wireless LAN Medium
Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Through-put in the 60
GHz Band, IEEE Std 802.11ad-2012 (Amendment to IEEE Std 802.11-2012, as amended by IEEE Std 802.11ae-2012 and IEEE Std
802.11aa-2012) PP 1–628, 2012, doi:10.1109/IEEESTD.2012.6392842
40. METIS II Project, Preliminary Views and Initial Considerations on 5G RAN Architecture and Functional Design, 2015, https://metis-
ii.5g-ppp.eu
41. mmMAGIC Project, mmMAGIC: Millimetre-Wave Based Mobile Radio Ac-cess Network for Fifth Generation Integrated
Communications, 2015, https://5g-ppp.eu/mmmagic
42. The 5G Infrastructure Public Private Partnership [Online]. Available: http://5g-ppp.eu
43. G. Wunder, P. Jung, M. Kasparick, T. Wild, F. Schaich, Y. Chen, S. Brink, I. Gas-par, N. Michailow, A. Festag, L. Mendes, N.
Cassiau, D. Ktenas, M. Dryjanski, S. Pietrzyk, B. Eged, P. Vago, F. Weidman, 5GNOW: non-orthogonal, asynchronous waveforms for
future mobile applications, IEEE Commun. Mag. 52(3), PP 97–105, 2014 doi:10.1109/MCOM.2014.6736749.
44. Internet Resource, 5GNOW Deliverable2.2: http://www.5gnow.eu/download/5GNOW D2.2 v1.0.pdf
45. 5th Generation Public Private Partnership, mmMAGIC: Millimeter-Wave Based Mobile Radio Access Network for Fifth Generation
Integrated Communications, 2015 http://5g-ppp.eu.
46. 5th Generation Public Private Partnership, mmMAGIC: Millimeter-Wave Based Mobile Radio Access Network for Fifth Generation
Integrated Communications, 2015 http://5g-ppp.eu.
47. Internet Resource, EMPhAtiC Deliverable 4.1: http://www.ictemphatic.eu/ images/ deliverables/deliverable d4.1 final.pdf
48. M. Olsson, C. Cavdar, P. Frenger, S. Tombaz, D. Sabella, R. Jantti, 5G Green: towards green 5G mobile networks, in: 2013 IEEE 9th
International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob, PP 212–216, 2013,
doi:10.1109/WiMOB.2013.6673363
49. Internet Resource, NEWCOM Deliverable 23.3: http://www.newcomproject.eu/ images/deliverable/D23.3
secondreportontoolsandtheirintegration on the experimentalsetups.pdf
50. T.S. Rappaport, Millimeter wave mobile communications for 5G cellular, It will work, IEEE, Access 1, 335–349, 2013
51. Internet Resource, 5GIC: http://www.surrey.ac.uk/5gic
52. Internet Resource: https://www.etri.re.kr/eng/sub6/sub6 0101.etri? DepartCode=6
53. .S. Bae, Architecture and performance evaluation of MmWave based 5G mobile communication systems, IEEE, ICTC 2014, PP 847–
851, 2014
54. T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. Wong, J. Schulz, M. Samimi, F. Gutierrez, Millimeter wave mobile
communications for 5G cellular: it will work!, IEEE Access 1 (2013) 335–349, doi: 10.1109/ACCESS.2013. 2260813
55. A. Alkhateeb, O. El Ayach, G. Leus, R. Heath, Channel estimation and hybrid precoding for millimeter wave cellular systems, IEEE J.
Sel. Topics Signal Process. 8 (5) (2014) 831–846, doi: 10.1109/JSTSP.2014.2334278
56. I.F. Akyildiz, P. Wang, S.C. Lin, Soft Air, Software defined networking architecture for 5G wireless systems, Computer Networks 85
(C), PP 1–18, 2015
57. Qualcomm, 5G - Vision for the next generation of connectivity, White Paper, 2015, https://www.qualcomm.com/
invention/technologies/5g
58. Samsung Electronics, Samsung Electronics Sets 5G Speed Record at 7.5Gbps, Over 30 Times Faster Than 4G LTE, 2014,
http://www.samsung.com/ global/ business/networks/insights/news
59. AT&T, AT&T Unveils 5G Roadmap Including Trials In 2016. http://about.att.com/ story/unveils 5G roadmap.html
60. Huawei, 5G: New Air Interface and Radio Access Virtualization, Technical Report, 2015
61. NTT DoCoMo, 5G – Future Core Network, Presentation at GSMA Mobile World Congress 2016, Barcelona, 2016, Available at:
https://www.nttdocomo.co.jp/english/info/ media center/event/mwc2016/pdf/about future core network.pdf
62. C. L. I. C. Rowell, S. Han, Z. Xu, G. Li, Z. Pan, Toward green and soft: a 5G perspective, IEEE Commun. Mag. 52 (2) (2014) 66–73,
doi: 10.1109/MCOM.2014. 6736745
63. Pekka Pirinen, A brief overview of 5G research activities, IEEE, International Conference on 5G for Ubiquitous Connectivity, PP 17–
22, 2014
64. T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. Wong, J. Schulz, M. Samimi, F. Gutierrez, Millimeter wave mobile
communications for 5G cellular, it will work!, IEEE Access 1, PP 335–349, 2013 doi:10.1109/ACCESS.2013. 2260813
65. T. Levanen, Radio interface design for ultra low latency millimeter wave communications in 5G era, Globecom Workshop, Ultra -Low
Latency and Ultra-High Reliability in Wireless Communications, PP 1420–1426, 2014
66. J.S. Bae, Architecture and performance evaluation of MmWave based 5G mobile communication system, in: IEEE ICTC 2014, 2014,
pp. 847–851.
67. L. Baochun, X. Hong, Resource allocation with flexible channel cooperation in cognitive radio networks, IEEE Transactions, Mobile
Computing, 12 (5), PP 957–970, 2013
68. F. Schaich, T. Wild, Waveform contenders for 5G-OFDM vs. FBMC vs. UFMC, 6th International Symposium on Communications,
Control and Signal Processing, ISCCSP, 2014, PP 457–460, 2014
69. 5GNow Deliverables online resources: http://www.5gnow.eu/wp-content/uploads/ 2015/04/5GNOW D3.2 v1.3. pdf
70. G. Fettweis, M. Krondorf, S. Bittner, GFDM-generalized frequency division multiplexing, 69th Vehicular Technology Conference,
IEEE, PP 1–4, 2009
71. M. Mukherjee, reduced out of band radiation based filter optimization for UFMC systems in 5G, Wireless Communications and
Mobile Computing Conference, IWCMC, 2015, PP 1150–1155, 2015
72. N. Vander Neut, PAPR reduction in FBMC systems using a smart gradient project active constellation extension method, 21st
International Conference on Telecommunications, ICT 2014, PP 134–139, 2014
73. G. Wunder, S.A. Gorgani, S.S. Ahmed, Waveform optimization using trapezoidal pulses for 5G random access with short message
support, IEEE, 16th International Workshop on Signal Processing, Advances in Wireless Communications, PP 76–80, 2015
74. D. Sabella, Energy efficiency benefits of RAN-as-a-service concept for a cloud-based 5G mobile network infrastructure, IEEE, Access
2, PP 1586–1597, 2014
75. V. Jungnickel, Software-defined open architecture for front- and backhaul in 5G mobile networks, in: IEEE International Conference
on Transparent Optical Networks, ICTON, PP 1- 4, 2014
76. J. Costa-Requena, Software defined 5G mobile backhaul, in: IEEE International Conference on SG for Ubiquitous Connectivity, PP
258 - 263, 2014
77. S. Tombaz, K.W. Sung, J. Zander, Impact of densification on energy efficiency in wireless access networks, in: The 8th Broadband
Wireless Access Workshop, PP 57 - 62, 2012
78. S. Zhang, 5G: towards energy-efficient, low-latency and high reliable communications networks, in: Proceedings of the IEEE ICCS,
2014, pp. 197–201
79. M. Olsson, 5G Green: towards green 5G mobile networks, in: International Workshop on Green Optimized Wireless Networks, PP
212–216, 2013
80. B. Li, H. Xu, Anchor: A Versatile and efficient framework for resource management in the cloud, IEEE Trans. Parallel Distrib. Syst.
24 (6), PP 1066–1076, 2013
81. A. Gohil, 5G technology of mobile communication: A Survey, in: International Conference on Intelligent Systems and Signal
Processing, PP 288–292, 2013
82. LTE Direct Workshop White Paper- Qualcomm Inc.
83. J. Qiao, Enabling device-to-device communications in millimeter wave 5G cellular networks, IEEE Comm. Mag. 209–215, 2015
84. T. Abdelzaher, Media Scope: Selective on-demand media retrieval from mobile devices, in: IEEE IPSN, PP 289–300, 2013
85. J. Domme, 5G in space: PHY-layer design for satellite communications using non-orthogonal multi-carrier transmission, in: Advanced
Satellite Multimedia Systems Conference and the 13th Signal Processing for Space Communications Workshop, ASMS/SPSC, PP
190–196, 2014
86. J. Bingham, Multicarrier modulation for data transmission, an idea whose time has come, IEEE Commun. Mag. 28 (5), PP 5–14, 1990
87. M. Schwartz, Mobile Wireless Communications, Cambridge University Press, 2004
88. Bellanger M., (2011), FBMC physical layer-principle. www.ict-phydyas.org
89. Vakilian V. (2013), Universal-filtered multi-carrier technique for wireless systems beyond LTE”. In: Globecom 2013 workshop
90. Fettweis G., Krondorf M., Bittner S,. (2009), GFDM - generalized frequency division multiplexing In: 2009 IEEE 69th vehicular
technology conference, VTC Spring 2009, Barcelona, pp 1–4
91. Abdoli J., Jia M., Ma J., (2015), Filtered OFDM: a new waveform for future wireless systems. In: 2015 IEEE 16th international
workshop on IEEE signal processing advances in wireless communications (SPAWC), pp 66–70
92. Zayani R., Medjahdi Y., Shaiek H., Roviras D., (2016), WOLA-OFDM: a potential candidate for asynchronous 5G. In: 2016 IEEE
Globecom workshops (GC Wkshps), Washington, DC, pp 1–5
93. An C., Kim B., Ryu H., (2017), WF-OFDM (windowing and filtering OFDM) system for the 5G new radio waveform. In: 2017 IEEE
XXIV international conference on electronics, electrical engineering and computing (INTERCON), Cusco, pp 1–4
Authors: Valentyna Rusavska, Taras Melikh, Olena Melikh, Tetyana Chala, Svitlana Babushko, Maiia Halyt
Estimation of the Influence of the Seasonality Factor in the Strategic Activity of Tourism and
Paper Title:
Hospitality Enterprises
Abstract: Seasonality in the modern interpretation is presented in the form of dynamic oscillatory processes
that determine the periods of growth and decline of various kinds of economic phenomena and processes.
Among all industries, tourism and hospitality are most clearly affected by the seasonality factor, since it directly
depends on periodic changes in climatic conditions during the calendar year. The tour operator, as an active
participant in the tourism market and the main producer of tourist products, must take into account the fact that
the possibilities of production and consumption within certain tourist destinations are limited by seasonal
climatic conditions.
This study offers a methodology that is based on the Holt-Winter method, which takes into account the
seasonality factor in calculating forecast values. A methodology for calculating forecast values using the MS
Excel tool was also developed. The proposed methodology is very simple to implement in practice, which will
allow all organizations, when building forecast data, to easily access and use large volumes of data.
Keyword : Supply Chain Management (SCM), Supply Chain Strategy (SCS), Supply Chain Flexibility
294. (SCF).
References: 1696-
1. Bhasin, S. (2008). Lean and performance measurement. Journal of Manufacturing Technology Management, 19(5), 670-684. 1699
2. Braunscheidel, M. J., & Suresh, N. C. (2009). The organizational antecedents of a firm’s supply chain agility for risk mitiga tion and
response. Journal of operations Management, 27(2), 119-140.
3. Chikán, A. (2008). National and firm competitiveness: a general research model. Competitiveness Review: An International Business
Journal, 18(1/2), 20-28.
4. Morash, E. A. (2001). Supply chain strategies, capabilities, and performance. Transportation journal, 37-54..
5. Frohlich, M. T., & Westbrook, R. (2001). Arcs of integration: an international study of supply chain strategies. Journal of operations
management, 19(2), 185-200.
6. Mentzer, J. T., DeWitt, W., Keebler, J. S., Min, S., Nix, N. W., Smith, C. D., & Zacharia, Z. G. (2001). Defining supply chain
management. Journal of Business logistics, 22(2), 1-25.
7. Lee, H. L. (2002). Aligning supply chain strategies with product uncertainties. California management review, 44(3), 105-119.
8. Narasimhan, R., & Jayaram, J. (1998). Causal linkages in supply chain management: an exploratory study of North American
manufacturing firms. Decision sciences, 29(3), 579-605.
9. Nunnally, J. C. (1978). Psychomettic theory McGraw Hill Book Company. INC New York.
10. Russell, R. S., & Taylor, B. W. (2009). Operations Management: Along the Supply Chain International Student Version. John Wiley
& Sons.
11. Qrunfleh, S. M. (2010). Alignment of information systems with supply chains: Impacts on supply chain performance and
organizational performance (Doctoral dissertation, University of Toledo).
12. Upton, D. M. (1994). The management of manufacturing flexibility. California management review, 36(2), 72-89.
Keyword : Chlorella, Biodiesel, Brake Power, Emissions, Fuel, Green House Gas, Injection Pressure,
Mechanical Efficiency, Methyl Ester, Microalgae etc.
References:
1. Saravanakumar M, Prabhahar M, Krishnamoorthi S, Sendilvelan S, Emission characteristics of biodiesel derived from used cooking
oil blended with diesel in the presence of potassium hydroxide (KOH) catalyst as alternative fuel for diesel engines , Rasayan Journal
of Chemistry, 11 (2018).
2. V Naresh and S Prabhakar, Performance and Emission Characteristics of Algae Oil on VCR Diesel Engine, Journal of Chemical and
Pharmaceutical Research, 2018, 10(4).
3. A. S. Sarpal, C. R. Ingrid et al., Investigation of Biodiesel Potential of Biomass of Microalgaes Chlorella, Spirulina and Tetraselmis by
NMR and GC-MS Techniques, J. Biotechnol., 6, 1 (2016).
4. Krishnamoorthi S, Prabhahar M, Saravanakumar M, Sendilvelan S, Yield characteristic of biodiesel derived from used vegetable oil
methyl ester (UVOME) blended with diesel, in the presence of sodium hydroxide (NAOH) and potassium hydroxide (KOH) cataly st,
297. as alternative fuel for diesel engines, International Journal of Mechanical and Production Engineering Research and Developme nt
(IJMPERD), 2018. 1710-
5. Y. P. Nagaraj et al., Production of Biofuel by using Micro Algae, Int. J. Curr. Microbiol. App. Sci., 3(4) (2014).
6. Bhaskar K, Sassykova L. R, Prabhahar M, Sendilvelan S, Effect of dimethoxy-methane (C3H8O2) additive on emission characteristics
1719
of a diesel engine fueled with biodiesel, International Journal of Mechanical and Production Engineering Research and Development
(IJMPERD), 2018.
7. Benemann, J. R., R. P. Goebel, J. C. Weissman, and D. C. Augenstein. 1982. Microalgae as a source of liquid fuels. Final tech nical
report. (No. DOE/ER/30014-T1). EnBio, Inc.: Fairfield, CA.
8. Jale Yanik, Ralph Stahl, Nicole Troeger and Ali Sinag, Pyrolysis of Algal Biomass, J. Anal. Appl. Pyrolysis, 103, 134-141 (2013).
9. [9] K. Chaiwong et al., Study of Biofuel and Biochar Production from Algae by Slow Pyrolysis, Biomass and Bioenergy, 56, 600-
606 (2013).
10. Prakash S, Prabhahar M, Sendilvelan S, Singh S, Bhaskar K, Experimental studies on the performance and emission characteristics of
an automobile engine fueled with fish oil methyl ester to reduce environmental pollution, Energy Procedia, 2019.
11. S. P. Anne, E. Harman-Wave et al., Micro Algae as a Renewable Fuel Source-Fast Pyrolysis of Scenedesmes, Renew. Energy, 60, 625-
632 (2013).
12. R. Velappan, S. Sivaprakasam and M. Kannan, Study the Performance of Algae Oil in Diesel Engine with Various Injection Pressu re,
IRJET, 2(5) (2015).
13. Mata, T. M., A. A. Martins, and N. S. Caetano. 2010. “Microalgae for biodiesel production and other applications: a review.”
Renewable and Sustainable Energy Reviews 14 (1): 217–32.
14. J. Kuberan and N. Alagumurthi: Performance and Emission Characteristics of Algae Bio-fuelled Diesel Engine, Int. J. Chem. Sci.:
14(4), 2016.
15. Ramachandra, T.V., M. Durga Madhab, S. Shilpi, N.V. Joshi. 2013. “Algal biofuel from urban wastewater in India: scope and
challenges.” Renew. Sustain. Energy Review; 21: 767–77.
16. R. Velappan et al., Investigation of Single Cylinder Diesel Engine using Biodiesel from Marine Algae, IJISTE, 1(4) (2014).
17. Prabhahar M, Sendilvelan S, Sassykova L.R, Studies on pongamia oil methyl ester fueled direct injection diesel engine to reduce
harmful emissions .
18. Ponnusamy, S., H. K. Reddy, T. Muppaneni, C. M. Downes, and S. Deng. 2014. “Life cycle assessment of biodiesel production fro m
algal bio-crude oils extracted under subcritical water conditions.” Bioresource Technology 170: 454–61.
19. T. Varghese, J. Raj, E. Raja and C. Thamotharan, Performance and Emission Testing on Algae Bio-fuel using Additives, IJEAT, 4(5)
(2015).
20. G. Nagane and C. Choudhari, Emission Characteristics of Diesel Engine Fueled with Algae Biodiesel –Diesel Blends, IRJET, 2(4)
(2015).
21. Kumar M.S, Prabhahar M, Sendilvelan S, Venkatesh R, Bhaskar K, Combustion, performance and emission analysis of a diesel engine
fueled with methyl esters of Jatropha and fish oil with exhaust gas recirculation, Energy Procedia, 2019.
22. J. Jayaprabakar, A. Karthikeyan, Aashwin Josiah and Anushajan, Experimental Investigation on the Performance and Emission
Characteristics of a CI Engine with Rice Bran and Micro Algae Biodiesel Blends, JCHPS Special Issue, 7 (2015).
23. R. Velappan, S. Sivaprakasam and M. Kannan, Study the Performance of Algae Oil in Diesel Engine with Various Injection Pressure,
IRJET, 2 (5) (2015).
24. Sanjay Singh, Experimental Investigation on Performance of Pre-Mixed Charge Compression Ignition Engine, IJISRT, 4 (8) (2019).
Paper Title: Adaptive Energy Efficiency Based Power Allocation for MIMO Radar Network
Abstract: Multiple-input multiple-output (MIMO) radar is used extensively due to its application of
simultaneous transmission and reception of multiple signals through multiple antennas or channels. MIMO radar
receives enormous attention in communication technologies due to its better target detection, higher resolution
and improved accurate target parameter estimation. The MIMO radar has several antennas for transmitting the
information and also the reflected signals from the target is received by the multiple antennas and it mainly used
in military and civilian fields. But sometimes the performance of the MIMO radars is degraded due to its limited
power. So the optimum power allocation is required in the communication systems of MIMO radar to improve
its performance. In this paper, an Energy Efficiency based Power Allocation (EEPA) is used to allocate the
power to a user of the clusters and also across the clusters. Here, the MIMO radars are clustered by using a naive
bayes classifier. Subsequently, an efficient target detection is achieved by using Generalized Likelihood Ratio
Test (GLRT) and then the clusters are divided into primary and distributive clusters based on the distance from
the target. Here, the proposed methodology is named as EEPA-GLRT and the implementation of this MIMO
radar system with an effective power allocation is done by Labview. The performance of the EEPA-GLRT
methodology is analyzed in terms of the power consumption of various clusters. The performance of the EEPA-
GLRT methodology is compared with Generalized Nash Game (GNG) method and it shows the power
consumption of EEPA-GLRT is 0.0549 for cluster 1 of scenario 1, which is less when compared to the GNG
method.
Keyword : Multiple-input multiple-output radar, generalized likelihood ratio test, Naive Bayes classifier,
power allocation and power consumption.
References:
1. Y. Yu, S. Sun, R.N. Madan, and A. Petropulu, “Power allocation and waveform design for the compressive sensing based MIMO
radar,” IEEE Transactions on Aerospace and Electronic Systems, Vol.50, No.2, pp.898-909, 2014.
2. W. Xia, Z. He, and Y. Liao, “On the maximum likelihood method for target localization using MIMO radar,”. Science China
Information Sciences, Vol.53, No.10, pp.2127-2137, 2010.
298. 3. N. Garcia, A.M. Haimovich, M. Coulon, and M. Lops, “Resource allocation in MIMO radar with multiple targets for non-coherent
localization,” IEEE Transactions on Signal Processing, Vol.62, No.10, pp.2656-2666, 2014. 1720-
4. X. Lan, W. Li, X. Wang, J. Yan, and M. Jiang, “MIMO radar and target Stackelberg game in the presence of clutter,” IEEE Sensors 1727
Journal, Vol.15, No.12, pp.6912-6920, 2015.
5. Y.X. Wang, G.C. Huang, W. Li, and J.L. Li, “Colocated MIMO radar waveform-design based on two-step optimizations in spatial and
spectral domains,” Frontiers of Information Technology & Electronic Engineering, Vol.18, No.7, pp.1021-1032, 2017.
6. A. Khawar, A. Abdelhadi, and T.C. Clancy, “QPSK waveform for MIMO radar with spectrum sharing constraints,” Physical
Communication, Vol.17, pp.37-57, 2015.
7. X. Song, P. Willett, S. Zhou, and P.B. Luh, “The MIMO radar and jammer games,” IEEE Transactions on Signal Processing, Vol.60 ,
No.2, pp.687-699, 2011.
8. X. Wang, Y. Xiong, B. Tang, and Y. Li, “An approach to the modulation recognition of MIMO radar sign als,” In Communications,
Signal Processing, and Systems, New York, pp. 343-351, 2012.
9. S. Liu, G. Zhang, J.D. Zhang, M. Yang, and Y. Tao, “Transmit and Receive Gain Optimization for Distributed MIMO Radar,”
Wireless Personal Communications, Vol.85, No.4, pp.1969-1986, 2015.
10. B. Ma, H. Chen, B. Sun, and H. Xiao, “A joint scheme of antenna selection and power allocation for localization in MIMO radar
sensor networks,” IEEE communications letters, Vol.18, No.12, pp.2225-2228, 2014.
11. Y. Yuan, W. Yi, T. Kirubarajan, and L. Kong, “Scaled accuracy based power allocation for multi-target tracking with colocated MIMO
radars,” Signal Processing, Vol.158, pp.227-240, 2019.
12. M. Arulraj, and T.S. Jeyaraman, “MIMO radar waveform design with peak and sum power constraints,” EURASIP Journal on
Advances in Signal Processing, Vol.2013, No.1, p.127, 2013.
13. H. Chen, S. Ta, and B. Sun, “Cooperative game approach to power allocation for target tracking in distributed MIMO radar sensor
networks,” IEEE Sensors Journal, Vol.15, No.10, pp.5423-5432, 2015.
14. H. Godrich, A.P. Petropulu, and H.V. Poor, “Power allocation strategies for target localization in distributed multiple-radar
architectures,” IEEE Transactions on Signal Processing, Vol.59, No.7, pp.3226-3240, 2011.
15. J. Yan, W. Pu, H. Liu, B. Jiu, and Z. Bao, “Robust chance constrained power allocation scheme for multiple target localization in
colocated MIMO radar system,” IEEE Transactions on Signal Processing, Vol.66, No.15, pp.3946-3957, 2018.
16. A. Abtahi, M. Modarres-Hashemi, F. Marvasti, and F. Tabataba, “Power allocation and measurement matrix design for block CS-based
distributed MIMO radars,” Aerospace Science and technology, Vol.53, pp.128-135, 2016.
17. X. Song, N. Zheng, and T. Bai, “Resource allocation schemes for multiple targets tracking in distributed MIMO radar systems,”
International Journal of Antennas and Propagation, 2017.
18. A. Deligiannis, A. Panoui, S. Lambotharan, and J.A. Chambers, “Game-theoretic power allocation and the Nash equilibrium analysis
for a multistatic MIMO radar network,” IEEE Transactions on Signal Processing, Vol.65, No.24, pp.6397-6408, 2017.
19. L. Wang, L. Wang, Y. Zeng, and M. Wang, “Jamming power allocation strategy for MIMO radar based on MMSE and mutual
information,” IET Radar, Sonar & Navigation, Vol.11, No.7, pp.1081-1089, 2017.
20. X. Song, N. Zheng, S. Yan, and H. Li, “A joint resource allocation method for multiple targets tracking in distributed MIMO r adar
systems,” EURASIP Journal on Advances in Signal Processing, Vol. 2018, No.1, p.65, 2018.
Authors: Herry Sulendro Mangiri, Herminarto Sofyan, Adhi Susanto, Didik Rohmantoro.
299. The Contribution of Teacher’s Digital Competency to Teacher’s Professionalism at Vocational High
Paper Title:
School
Abstract: Teacher professionalism is the ability of teachers to perform basic tasks as educators. The 1728-
teaching profession as educators faces challenges that require a new set of competencies and broader 1731
competencies. The development of science and technology has changed many things and in various fields are
switching in digital technology. The study aimed to analyze the contribution of teacher’s digital competency to
teacher’s professionalism at vocational high school. This study was ex-post facto research, and The data were
collected using a questionnaire with the content validity testing used construct validity. The research subjects
were 33 teachers from 3 vocational high schools in Sleman Regency. Samples were determined using
proportional random sampling. Data analysis techniques used in this study are descriptive analysis techniques
and regression methods. The result of this study showed that the digital competency and professionalism of
teachers were in the high category. Teacher’s digital competency had a positive and significant contribution to
teacher’s professionalism, with the value of contribution was 16,5%, while 83,5% was explained by the other
variables that do not investigate.
300.
Keyword : negative ideal solution (NIS), The Technique for Order of Preference by Similarity to Ideal
Solution (TOPSIS), KDD99, positive ideal solution (PIS), , multi-criteria decision making (MCDM). 1732-
1738
References:
1. Ravipati Rama Devi and MuntherAbualkibash “Intrusion Detection System Classification using different machine learning algorithms
on KDD-99 and NSL-KDD datasets - A Review Paper” International Journal of Computer Science & Information Technology
(IJCSIT) Vol 11, No 3, June 2019.
2. RanjitPanigrahia,Samarjeet Borah, “Rank Allocation to J48 Group of Decision Tree Classifiers using Binary and Multiclass Intrusion
Detection Datasets”International Conference on Computational Intelligence and Data Science (ICCIDS 2018).
3. EwaRoszkowska, “Multi-Criteria Decision Making Models By Applying TheTopsis Method To Crisp And Interval Data”.
4. Saad Mohamed Ali, Mohamed Gadal, Rania A. Mokhtar, “Anomaly Detection Approach using Hybrid Algorithm of Data Mining
Technique”2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE),
Khartoum, Sudan.
5. Raman Singh, Harish Kumar, R.K. Singla, “TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for
Network Traffic Dataset ”International Journal of Engineering and Technology (IJET).
6. Renato A.Krohlinga,AndréG.C.Pacheco, “A-TOPSIS-An approach Based on TOPSIS for Ranking Evolutionary
Algorithms”Information Technology and Quantitative Management (ITQM 2015).
7. RajniRanjan Singh, Deepak Singh Tomar,”Network forensics: detection and analysis of stealth port scanning attack”, International
Journal of Computer Networks and Communications Security, 3 (2), February 2015.
8. Shrikantupadhyay, rajniranjansingh, “Comparative Analysis based Classification of KDD’99 Intrusion Dataset” (IJCSIS) International
Journal of Computer Science and Information Security, Vol. 13, No. 3, March 2015.
9. BhavnaDharamkar, RajniRanjan Singh “A Review of Cyber Attack Classification Technique Based on Data Mining and Neural
Network Approach” International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 2– Jan 2014.
10. Megha Jain Gowadiya, Anurag Jain, “Intrusion Detection in KDD99 Dataset: A Review”International Journal of Scientific &
Engineering Research, Volume 6, Issue 11, November-2015 ISSN 2229-5518.
11. S. SobinSoniya,Maria Celestin Vigila, “Intrusion Detection System: Classification and Techniques”,2016 International Conference on
Circuit, Power and Computing Technologies [ICCPCT].
Authors: Satyanarayana Talam, Rambabu Busi, Supraja V.N.L.
Paper Title: Modeling and Simulation of MEMS based Pressure Sensor for Industrial Applications
Abstract: This paper presents an overview of design, modeling and simulation of MEMS pressure sensor is
using COMSOL Multiphysics V4.3b. An attempt has been made to achieve high sensitivity by providing
different structures for membrane (Circular, square, rectangle & triangle) with uniform surface area and
thickness. Further, simulations have been carried out with various loads ranging from 0.1 to 1MPa assigning
three materials viz., InP, GaAs and Silicon. From the analyses of simulation results, it has been observed that the
pressure sensor with circular membrane provided InP material found to exhibit more deformation and high
sensitivity of 17.3×10-12 for 10 µm thickness and 50.8×10-12 for 7 µm thickness. The reasons for enhancement
in the sensitivity are discussed in detail as function of input load, dimensional changes of diaphragm and
materials addition. These studies are highly useful to check and compute pressure in various industrial and
environmental conditions.
Authors: Shibashis Pradhan, Deepak Kumar Barik, M Vamshi Krishna, Sujatarani Raut
Paper Title: Generation of Spreading Codes with Minimum Correlation using Sorting Genetic Algorithm-II
Abstract: In a code division multiple access (CDMA) system, multiple access interference (MAI) and
Inter-symbol interference (ISI) appears if generated spreading codes are not maintained orthogonally and the
communication channel is taken as multi-path communication channel. When generated spreading codes are
multi-path spread and then channel delay occurs, it shows that ortho-gonality of the spreading codes is not
maintained. The effect of MAI can be mitigated by maintaining low cross-correlation values as much as low
between the large numbers of spreading codes. The code division multiple technique spreading codes must
maintain absolutely impulsive autocorrelation at origin and very low cross correlation other than origin to avoid
false synchronisation. i.e autocorrelation must be maximum at origin and cross correlation must be minimum at
non origin point. In this paper, we propose multi-objective Genetic Algorithm approach –Genetic Algorithm-II
(NSGA-II) to reduce the out-of-phase average mean-square aperiodic autocorrelation and average mean-square
aperiodic cross-correlation value of randomly initialized binary spreading code set.
302.
Keyword : Inter symbol interference (ISI), multiple access interference (MAI), code division multiple access 1744-
(CDMA), Non-dominated Sorting Genetic Algorithm-II (NSGA-II) 1749
References:
1. Kohno, R., Meidan, R., & Milstein, L. B. (1995). Spread spectrum access methods for wireless communications .IEEE
Communications Magazine, 33(1), 58–67.
2. Amayreh, A. I., and Farraj, A. K. (2007), Minimum autocorrelation spreading codes,Springer Wireless Personal Communications,
vol. 40, no. 1, pp. 107–115.
3. Farraj, A. K., and Amayreh, A. I. (2009), Minimum Cross Correlation Spreading Codes, Springer Wireless Personal
Communications, vol. 48, no. 3,pp. 385–394.
4. Zitzler, E., and Thiele, L. (1999), Multiobjective evolutionary algorithms: A comparative case study and the strength Pareto approach,
IEEE Transaction on Evolutionary Computation, vol. 3, no. 4, pp. 257-271.
5. Boyd, S., Vandenberghe, L. (2004), Convex Optimization, Cambridge University Press.
6. Natarajan, B., Das, S., and Stevens, D. (2005), An Evolutionary Approach to designing Complex Spreading Codes for DS-CDMA,
IEEE Transaction on Wireless Communications, vol. 4, no. 5.
7. Oppermann and Vucetic, B. S. (1997), Complex spreading sequences with wide range of correction properties, IEEE Transaction on
Communication, vol. 45, no. 3, pp. 365–375.
8. Oppenheim, A. V., Schafer, R. W., & Buck, J. R. (1999). Discrete-time signal processing (2nd Ed.).Prentice Hall.
9. Proakis, J. G., and Manolakis, D. G. (1996), Digital Signal Processing:
10. Principles, Algorithms, and Applications, 3rd Edition, Prentice Hall.
11. Pratap, R. (2006), Getting Started with MATLAB 7: A Quick Introduction for Scientists and Engineers, Indian Edition, Oxford
University Press.
Keyword : Mammograms, Content Based Image Retrieval (CBIR), Support Vector Machine(SVM),
Segmentation.
References:
1. P. Autier, M. Boniol , "Mammography screening: A major issue in Medicine," Procedia - European Journal of Cancer , vol. 90, 2018
pp. 34-62. doi.org/10.1016/j.ejca.2017.11.002
2. W. Galit, M. S. Green , K. B. Lital , "Routine screening mammography in women older than 74 years: A review of available data,"
Maturitas, vol. 57, 2007, pp. 109-119. doi.org/10.1016/j.maturitas.2007.01.010
3. K. Akila, L. S. Jayashree, A. Vasuki, "Mammogram image enhancement using indirect contrast enhancement techniques – A
comparative study," Procedia - Procedia Comput. Sci. , vol. 47, 2015, pp. 255–261. doi:10.1016/j.procs.2015.03.205
4. J. Scharcanski, C. R. Jung, "Denoising and enhancing digital mammographic images for visual screening,", Comput. Med. Imagin g
Graph., vol. 30, 2006. pp. 243–254. doi:10.1016/j.compmedimag.2006.05.002
5. A. Oliver, J. Freixenet, J. Marti, E. Perez , J. Pont, E.R.E. Denton, R. Zwiggelaar, "A review of automatic mass detection and
segmentation in mammographic images," Med. Image Anal., vol. 14,2009. pp. 87–110. doi:10.1016/j.media.2009.12.005
6. J. Padayachee, M. J. Alport, W.I.D. Rae , "Identification of the breast edge using areas enclosed by iso-intensity contours," Comput.
Med. Imaging Graph., vol. 31, 2007. pp. 390–400. doi:10.1016/j.compmedimag.2007.02.019
7. C. Varela, P.G. Tahoces, A. J. Méndez, M. Souto, J.J. Vidal, "Computerized detection of breast masses in digitized mammograms,",
Comput. Biol. Med., vol. 37, 2007. pp. 214–226. doi:10.1016/j.compbiomed.2005.12.006
303. 8. A. R. Domínguez, A.K. Nandi, "Detection of masses in mammograms via statistically based enhancement, multilevel-thresholding
segmentation, and region selection,", Comput. Med. Imaging Graph., vol. 32, 2008. pp. 304–315.
doi:10.1016/j.compmedimag.2008.01.006 1750-
9. J. E. E. D. Oliveira, A. M. C. Machado , G. C. Chavez , A. Paula, B. Lopes, T. M. Deserno, A. D. A. Araújo , "MammoSys : A 1758
content-based image retrieval system using breast density patterns," Computer methods and programs in biomedicine , vol. 99, 2010.
pp.289–297. doi:10.1016/j.cmpb.2010.01.005
10. T. S. Subashini, V. Ramalingam, S. Palanivel, "Automated assessment of breast tissue density in digital mammograms,", Comput. Vis.
Image Underst., vol. 114, 2010. pp. 33–43. doi:10.1016/j.cviu.2009.09.009
11. M. A. Mazurowski, J. Y. Lo, B. P. Harrawood, G. D. Tourassi, "Mutual information-based template matching scheme for detection of
breast masses : From mammography to digital breast tomosynthesis," J. Biomed. Inform., vol. 44, 2011 pp. 815–823.
doi:10.1016/j.jbi.2011.04.008
12. C. Wei, Y. Li, P. Jung, "Mammogram retrieval through machine learning within BI-RADS standards,", Jour. of Biomedical
Informatics, vol. 44, 2011, pp. 607–614. doi:10.1016/j.jbi.2011.01.012
13. 13. C. Wei, S. Y. Chen, X. Liu, "Mammogram retrieval on similar mass lesions,", Comput Methods Programs Biomed., vol. 6,
2010. pp. 234–248. doi:10.1016/j.cmpb.2010.09.002
14. J. Dheeba, N. Albert Singh, S. Tamil Selvi, "Computer-aided detection of breast cancer on mammograms: A swarm intelligence
optimized wavelet neural network approach," J. Biomed. Inform., vol. 49, 2014 pp. 45–52. doi:10.1016/j.jbi.2014.01.010
15. Y. Hsieh , M. Su, P. Wang, " A PSO-based rule extractor for medical diagnosis," J. Biomed. Inform., vol. 49, 2014 pp. 53–60.
doi:10.1016/j.jbi.2014.05.001
16. C. C. Liu, C. Y. Tsai , J. Liu , C. Y. Yu, S. S. Yu, "A pectoral muscle segmentation algorithm for digital mammograms using Otsu
thresholding and multiple regression analysis," Comput. Math. with Appl., vol. 64, 2012 pp. 1100 –1107.
doi:10.1016/j.camwa.2012.03.028
17. K. Seetharaman, S. Sathiamoorthy, "A unified learning framework for content based medical image retrieval using a statistical model,",
J. King Saud Univ. - Comput. Inf. Sci., vol. 28, 2016. pp. 110–124. doi:10.1016/j.jksuci.2014.10.006
18. S.S. d. Oliveira F., O. d. C. Filho A., C. Silvia A. , C. Silvia A., C.d. Paiva A. , Gattass ,M., "Classification of breast regions as mass
and non-mass based on digital mammograms using taxonomic indexes and SVM," Comput. Biol. Med., vol. 57, 2015. pp. 42 –53.
doi:10.1016/j.compbiomed.2014.11.016
19. M. M. Pawar, S. N. Talbar, "Genetic Fuzzy System (GFS) based wavelet co-occurrence feature selection in mammogram classification
for breast cancer diagnosis,", Perspect. Sci., vol. 8, 2016.. pp. 247–250. doi:10.1016/j.pisc.2016.04.042
20. F. J. P. Richard, "Analysis of Anisotropic Brownian Textures and Application to Lesion Detection in Mammograms,", Procedia
Environ. Sci., vol. 27, 2015. pp. 16–20. doi:10.1016/j.proenv.2015.07.100
21. D. Rodrigues, A. Corrêa, A. Cardoso, D. Paiva, M. Gattass, "Detection of masses based on asymmetric regions of digital bila teral
mammograms using spatial description with variogram and cross-variogram functions,",Comput. Biol. Med., vol. 43, 2013. pp. 987–
999. doi:10.1016/j.compbiomed.2013.04.019
22. W. Borges , E. Moraes, A. C. De, Paiva, M. Gattass, "Detection of masses in mammogram images using CNN , geostatistic functions
and SVM," Comp. Biol. Med. , vol. 41, Aug, 2011 pp. 653–664. doi:10.1016/j.compbiomed.2011.05.017
304. Paper Title: Towords Secure Data Management using Blockchain in Iot Enabled Environment.
Abstract: The Internet of Things (IoT) is continuously a reality nowadays. By and by, some key difficulties 1759-
still must be constrained to run express consideration all together that IoT arrangements extra help the 1763
developing interest for associated gadgets and furthermore the administrations advertised. Because of the
potential importance and affectability of administrations, IoT arrangements should address the security and
protection issues enveloping these gadgets and furthermore the data they gather, create, and process. As of late,
the Blockchain innovation has increased much consideration in IoT arrangements. Its essential utilization
circumstances ar inside the cash space, where Blockchain makes a promising applications world and may be
utilized to tackle security and protection issues. Be that as it may, this developing innovation has an incredible
potential inside the most various mechanical territories and may impressively encourage achieve the Internet of
Things read in a few angles, expanding the limit of decentralization, encouraging connections, empowering new
exchange models, and permitting self-sufficient coordination of the gadgets. The paper aims to provide ideas
about Blockchain’s structure and activity and, for the most part, to examine how this innovation is used to
provide security and protection in IoT
Keyword : Minimal Exposure Problem (MEP), Wireless Sensor Network (WSN), Semi Hidden Markov
Model, Prims Algorithm, and Improved Artificial Bee Colony (IABC).
References:
1. Wang, B. Coverage Problems in Sensor Networks: a Survey. ACM Computing Surveys October 2011; 43(4), pp.1-53.
2. Feng, H., Luo, L., Wang, Y., Ye, M. and Dong, R., 2016. A novel minimal exposure path problem in wireless sensor networks and its
solution algorithm. International Journal of Distributed Sensor Networks, 12(8), p.1550147716664245.
3. Ye, M., Wang, Y., Dai, C. and Wang, X., 2015. A hybrid genetic algorithm for the minimum exposure path problem of wireless se nsor
networks based on a numerical functional extreme model. IEEE Transactions on Vehicular Technology, 65(10), pp.8644-8657.
4. Binh, H.T.T., Binh, N.T.M., Ngoc, N.H., Ly, D.T.H. and Nghia, N.D., 2019. Efficient approximation approaches to minimal expos ure
path problem in probabilistic coverage model for wireless sensor networks. Applied Soft Computing, 76, pp.726-743.
5. Yang, T., Jiang, D., Fang, H., Tan, M., Xie, L. and Zhao, J., 2018. Target guiding self-avoiding random walk with intersection 1764-
algorithm for minimum exposure path problem in wireless sensor networks. EURASIP Journal on Wireless Communications and
Networking, 2018(1), pp.1-14.
1771
6. Miao, Y., Wang, Y. and Jing–Xuan, W., 2015. Hybrid particle swarm algorithm for minimum exposure path problem in heterogeneous
wireless sensor network. International Journal of Wireless and Mobile Computing, 8(1), pp.74-81.
7. Song, Y., Liu, L. and Ma, H., 2012, “A physarum-inspired algorithm for minimal exposure problem in wireless sensor networks”,
In IEEE Wireless Communications and Networking Conference (WCNC) ,pp. 2151-2156.
8. Liu, L., Song, Y., Ma, H. and Zhang, X., 2012, Physarum optimization: A biology-inspired algorithm for minimal exposure path
problem in wireless sensor networks. In 2012 Proceedings IEEE INFOCOM , pp. 1296-1304.
9. Song, Y., Liu, L., Ma, H. and Vasilakos, A.V., 2014. A biology-based algorithm to minimal exposure problem of wireless sensor
networks. IEEE Transactions on Network and Service Management, 11(3), pp.417-430.
10. Liu, L., Han, G., Wang, H. and Wan, J., 2017. Obstacle-avoidance minimal exposure path for heterogeneous wireless sensor
networks. Ad Hoc Networks, 55, pp.50-61.
11. Liu, L., Zhang, X. and Ma, H., 2014. Minimal exposure path algorithms for directional sensor networks. Wireless Communications and
Mobile Computing, 14(10), pp.979-994.
12. Ferrari, S. and Foderaro, G., 2010, A potential field approach to finding minimum-exposure paths in wireless sensor networks. In 2010
IEEE International Conference on Robotics and Automation, pp. 335-341.
13. Djidjev, H.N., 2010. Approximation algorithms for computing minimum exposure paths in a sensor field. ACM Transactions on
Sensor Networks (TOSN), 7(3), pp.23.
14. Wang, R., Gao, Y., Wan, W. and Mao, S., 2010, Fuzzy information exposure paths analysis in wireless sensor networks.
In International Conference on Audio, Language and Image Processing , pp. 1619-1623.
15. Liu, L., Zhang, X. and Ma, H., 2013. Percolation theory-based exposure-path prevention for wireless sensor networks coverage in
internet of things. IEEE Sensors Journal, 13(10), pp.3625-3636.
16. Xia, Na, Khuong Vu, and Rong Zheng. "Sensor placement for minimum exposure in distributed active sensing networks." In 2010
IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1-6, 2010.
17. Liu, X., Kang, G. and Zhang, N., 2015. Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks
Coverage. KSII Transactions on Internet & Information Systems, 9(1), pp.126-148.
18. Ye, M., Zhao, M. and Cheng, X., 2015, A New Minimum Exposure Path Problem and Its Solving Algorithm. In 2015 11th International
Conference on Computational Intelligence and Security (CIS) , pp. 420-423.
19. Sudhakar T D, & Sakthivel, B & Hussain, N.S.N.. (2014). Loss minimization in distribution network using prim’s algorithm.
International Journal of Applied Engineering Research. 9. 24033-24046.
20. Yu, B., Zhu, H., Cai, W., Ma, N., Kuang, Q. and Yao, B., 2013. Two-phase optimization approach to transit hub location–the case of
Dalian. Journal of Transport Geography, 33, pp.62-71.
21. Yao, B., Hu, P., Zhang, M. and Wang, S., 2013. Artificial bee colony algorithm with scanning strategy for the periodic vehicle routing
problem. Simulation, 89(6), pp.762-770.
Paper Title: Multi Labeled Imbalanced Data Classification Based on Advanced Min-Max Machine Learning
Abstract: Some true applications, for example, content arrangement and sub-cell confinement of protein
successions, include multi-mark grouping with imbalanced information. Different types of traditional
approaches are introduced to describe the relation of hubristic and undertaking formations, classification of
different attributes with imbalanced for different uncertain data sets. Here this addresses the issues by utilizing
the min-max particular system. The min-max measured system can break down a multi-mark issue into a
progression of little two-class sub-issues, which would then be able to be consolidated by two straightforward
standards. Additionally present a few decay procedures to improve the presentation of min-max particular
systems. Trial results on sub-cellular restriction demonstrate that our strategy has preferable speculation
execution over customary SVMs in settling the multi-name and imbalanced information issues. In addition, it is
additionally a lot quicker than customary SVMs
307. Keyword : Data classification, Imbalanced data, Machine learning, min-max calculation and sub class
implementation.
1776-
References: 1778
1. V. Lopez, A. Fernandez, S. Garcia, V. Palade, F. Herrera, “An Insight into Classification with Imbalanced Data: Empirical Resu lts
and Current Trends on Using Data Intrinsic Characteristics,” Information Sciences, 2013.
2. S. Wang, Z. Li, W. Chao, and Q. Cao, “Applying Adaptive Oversampling Technique Based on Data Density and Cost-Sensitive SVM
to Imbalanced Learning,” IEEE Int’l Joint Conf. on Neural Networks IJCNN-2012, doi: 10.1109IJCNN.2012.6252696, 2012.
3. P. Yang, P. D. Yoo, J. Fernando, B. B. Zhou, Z. Zhang, and A. Y. Zomaya, “Sample Subset Optimization Techniques for Imbalanced
and Ensemble Learning Problems in Bioinformatics Applications,” IEEE Trans. on Cybernetics, 2014.
4. B. Das, N. C. Krishnan, and D. J. Cook, “RACOG and wRACOG: Two Probabilistic Oversampling Techniques,” IEEE Trans. On
Knowledge and Data Engineering, 2015.
5. C. L. Castro and A. P. Braga, “Novel Cost-Sensitive Approach to Improve the Multilayer Perceptron Performance on Imbalanced
Data,” IEEE Trans. on Neural Networks and Learning Systems, 2013.
6. B. Krawczyk, “Cost-Sensitive One-vs-One Ensemble for Multi- Class Imbalanced Data,” IEEE Int’l Joint Conf. on Neural Networks
IJCNN-2016, doi: 10.1109IJCNN.2016.7727503, 2016.
7. C. Zhang, K. C. Tan, and R. Ren, “Training Cost-sensitive Deep Belief Networks on Imbalance Data Problems,” IEEE Int’l Joint
Conf. on Neural Networks IJCNN-2016, doi:10.1109IJCNN.2016.7727769, 2016.
8. Y. Fong, S. Datta, I. S. Georgiev, P. D. Kwnong, and G. D. Tomaras, “Kernel-based Logistic Regression Model for Protein Sequence
without Vectorialization,” Biostatistics, 2015.
9. X. Wang, E. P. Xing, and D. J. Schaid, “Kernel Methods for Largescale Genomic Data Analysis,” Briefings in Bioinformatics, 20 15.
10. V. Balasubramanian, S. S. Ho, and V. Vovk, “Conformal Prediction for Reliable Machine Learning: Theory, Adaptations and
Applications,” Elsevier, 2014.
References:
1. M. N. Kamel Boulos and N. M. Al-Shorbaji, “On the Internet of Things, smart cities and the WHO Healthy Cities,” International
Journal of Health Geographics, 2014.
2. J. Jackisch, G. Zamaro, G. Green, and M. Huber, “Is a healthy city also an age-friendly city?,” in Health Promotion International,
2015.
3. J. K. Brueckner, “Slums in developing countries: New evidence for Indonesia,” J. Hous. Econ., 2013.
4. P. McCarthy, “Urban slums reports: the case of Jakarta, Indonesia,” Glob. Rep. Hum. Settlements 2003, Chall. Slums, 2003.
5. B. Supriyatno, “Role of Government in Jakarta Organize Slum Area,” Sci. Res. J., 2014.
6. J. Pratomo, M. Kuffer, J. Martinez, and D. Kohli, “Coupling uncertainties with accuracy assessment in object-based slum detections,
case study: Jakarta, Indonesia,” Remote Sens., 2017.
7. J. Minnery et al., “Slum upgrading and urban governance: Case studies in three South East Asian cities,” Habitat Int., 2013.
8. B. Surya, M. Ruslan, and H. Abubakar, “Inequility of space reproduction control and urban slum area management sustainability (Case
study: Slum area of Buloa Urban Village in Makassar City),” J. Eng. Appl. Sci., 2018.
9. D. Febrianty and F. H. Kusumartono, “Kemampuan Adaptasi Masyarakat di Permukiman Kumuh Terhadap Banjir Rob: Studi Kasus
Kelurahan Kemijen Kota Semarang,” J. Sosek Pekerj. Umum, 2011.
10. M. Irwansyah, I. Caisarina, and D. Solehati, “Model of slums rejuvenation in Telaga Tujuh village: The case of Langsa city, Aceh,
Indonesia,” in IOP Conference Series: Materials Science and Engineering, 2018.
11. G. Mavromatidis, K. Orehounig, and J. Carmeliet, “Evaluation of photovoltaic integration potential in a village,” Sol. Energy, 2015.
12. R. A. Dixon and J. S. Thompson, “Base-line village health profiles in the E.Y.N rural health programme area of north-east Nigeria.,”
Afr. J. Med. Med. Sci., 1993.
Paper Title: Flexural Strength Behavior of T-Shaped Beam-Column Joint with Varying Polypropylene Fibre
Abstract: In times like this earthquakes are most commonly occurring phenomenon in every part of the
world. It’s crucial to make sure ductility of the structure is high, which is it should seamlessly distort non-
elastically and diffuse forces with no major destruction. For any structural frames shear forces and bending
moments are concentrated at the intersecting area. One of such areas is beam-column (B-C) joint. These are the
most effected failure zones. The present work deals with experimental study of a T-shaped beam-column joint.
From the literature, Polypropylene fibre have improved many desired properties of concrete such as flexural
strength, breaking point etc. Therefore introduction of this fibre material into beam-column joint can improve
joint properties. Previous studies on this fibre do not convey any important work that has been done on beam-
column joint using this fibre, specifically pinned under axial force. In this study, 1/3rd scaled specimens of
reinforced concrete (plane RC and RC fibres) T-shaped beam-column joint casted and tested for incremental
loadings. All the specimens have been detailed by the provisions of IS: 13920, IS: 456. These specimens were
tested by applying sequentially incremented repeated loads using Universal Testing Machine (UTM) of 100kN
capacity. The results were correlated in different ways such as, flexural strength, hardness, force dissipation and
ductility. Hence, in the present research this fibre material is used in T-shaped B-C joint to see the changes
occurred in stiffness and flexural strength, of the joint.
313.
Keyword : Ductility, Beam-column joint, Polypropylene Fibre, Axial load, Failure zone. 1800-
1805
References:
1. Romanbabu M. Oinam, Choudhury.A.M, and Laskar A I, “Experimental Study on Beam-Column Joint with Fibres under Cyclic
Loading,” IOSR Journal of Engineering (IOSRJEN), vol. 3(7), 2013, pp. 13-23.
2. Milind V. Mohod, “Performance of Polypropylene Fibre Reinforced Concrete,” IOSR Journal of Mechanical and Civil Engineering
(IOSR-JMCE), vol. 12(1), 2015, pp. 28-36.
3. Divya Dharan, Aswathy Lal “Study the Effect of Polypropylene Fiber in Concrete” International Research Journal of Engineering and
Technology, vol. 3(6), 2016, pp.616-619.
4. Madhavi, Swamy Raju, Deepak Mathur “Polypropylene Fiber Reinforced Concrete-A Review” International Journal of Emerging
Technology and Advanced Engineering, vol. 4(4), 2014, pp.114-119.
5. Riley, V.R. and Reddaway, J.L., 1968, Tensile strength and failure mechanics of Fibre composites, J. Materials Science.
6. P. Rajaram, A. Murugesan and G. S. Thirugnanam, “Experimental Study on behavior of Interior RC Beam Column Joints
Subjected to Cyclic Loading,”International Journal of Applied Engineering Research, Dindigul, vol. 1(1), 2010, pp. 49-58.
7. G.A.Lakshmi, Anjan Dutta and S.K.Deb, “Numerical studies of strengthening of beam column joint under cyclic excitation using
FRP composites” Journals of structural Engineering, Vol 35,No 1, 2008, pp 59-65
8. K.R. Bindhu, P.M. Sukumar and K.P. Jaya, “Performance of Exterior Beam-Column Joints Under Seismic Type Loading,” ISET Journal
of Earthquake Technology, vol. 46,(2)
9. IS 12269:1987 Specification for OPC 53 Grade.
10. IS 383:1970, Specification for Coarse and Fine Aggregate from Natural Source for Concrete.
11. IS 456:2000, Plain and Reinforced Concrete-Code of Practice.
12. IS 516:1959, Method of Tests for Strength of Concrete.
13. IS 10262:2009, Concrete Mix Proportioning.
Paper Title: An Efficient Technique for Minimizing Localization Errors in Wireless Sensor Networks
Abstract: Wireless Sensor Networks (WSNs) has become one of the huge research topics and numerous
researchers are working on numerous areas encircling WSNs. Wireless sensor networks comprise of low-cost
sensors that are deployed in the network for transmission of messages within the network. Though the use of
wireless sensor networks has gained an intensive response in the digital environment, there still exists some sorts
of issues that need to be improvised. One such problem that affects most of the transmissions in a WSN is
localization error. Finding the exact location of a particular sensor in a wireless network is one of the major
issues. In this paper, we propose a technique for minimizing the localization error by making use of the Time of
Arrival (TOA) technique. The proposed technique is efficiently compared with the existing techniques and the
performance analysis is done. The experimental setup was done by making use of Matlab 2018b and the same
was used to obtain efficient results. Some of the parameters used for finding the efficiency of the system was
the calculation of the distance error between the proposed and the existing technique. The analysis shows the
accuracy rate of finding the location of the sensors and also portrays the minimization of localization error in a
given WSN.
Keyword : Grade card; Score card; Water Quality; Water Quality Index; Ground Water Quality.
References:
1. Sajal Singh & Athar Hussian, “Water quality index development for groundwater quality assessment of Greater Noida sub-basin, Uttar
Pradesh, India”, Cogent Engineering, Vol.3, (2016), available online:
https://www.cogentoa.com/article/10.1080/23311916.2016.1177155.pdf
2. Ramakrishnaiah, C. R., Sadashivaiah, C., &Ranganna, G,” Assessment of water quality index for the groundwater in Tumkur Taluk,
Karnataka State, India.”, E- Journal of Chemistry, Vol.VI, No.2, (2009), pp:523–530, online:
http://www.indiaenvironmentportal.org.in/files/water%20quality%20index.pdf
3. Indian Standard Drinking Water — Specification (Second Revision). New Delhi: Bureau of Indian Standards(2012)
4. Gupta, M., patil, J. P. & Goyal, V. C. (2017, December 11 – 13). Assessment of ground water quality for drinking purpose in a
watershed of Bundelkhand region. Paper presented at the 7th international ground water conference on groundwater vision 2030: water
security, challenges & climate change adaption, New Delhi.
5. K. Yogendra and E. T. Puttaiah (2008), “Determination of water quality index and suitability of an Urban waterbody in Shimoga town,
Karnataka.” Proceedings of Taal 2007: The 12th World Lake conference: 342-346.
6. Kosha A. Shah and Geeta S. Joshi (2015), “Evaluation of water quality index for river Sabarmati, Gujrat, India.” Appl Water Sci
(2017) vol.7:1349–1358
7. Krishan G, Singh S, Kumar CP, Gurjar S, Ghosh NC (2016) Assessment of Water Quality Index (WQI) of Groundwater in Rajkot
District, Gujarat, India. J Earth Sci Clim Change. 7: 341. doi:10.4172/2157-7617.1000341
Paper Title: Technology Adoption with respect to various Brands of Smart Phones
Abstract: The new technology has led the development of the economic growth of the nation. The
creators of the new technology keep in mind the need of the people and comes out with most reliable and
feasible technology which is mostly diffused and used by the new technology adopters. The technology
developed are innovative and user-friendly in the smart phone industry. Every aspect that is considered to build
and develop a smart phone are through the research and development. This study focuses on the audience who
adopt to use the new technology with respect to the smartphones. There are few studies to show the technology
adoption life cycle and its types of adopters. Various smartphone brands keep updating the technology to give its
users the best features, the technology adopters also keep up with the updated technology to adopt to the new
developments. The smartphones not only develop the hardware but also keep updating their software as well.
This study also concentrates and brings out the views about brands and technology adoption. The data collection
for this study was conducted in Chennai city. The sampling technique used was judgmental sampling. The
questionnaire was distributed to nearly 123 respondents. The study reveals that how the various technology
adopters have to be targeted and to market the brand strategically, so the consumers can purchase the
smartphones as per their requirement and social status.
317.
Keyword : Brand, Innovation, Technology Adoption, Marketing strategies, Smartphones, Brand Preference.
1822-
References: 1826
1. BHATTACHERJEE, A. and PREMKUMAR, G., 2004. Understanding changes in belief and attitude toward information technology
usage: a theoretical model and longitudinal test. MIS Quarterly, 28(2), pp. 229-254.
2. Flipkart.com, (2014). Mobiles Store Online - Buy Mobiles Products Online at Best Price in India - Flipkart.com. [online] Available at:
http://www.flipkart.com/mobiles?otracker=hp_nmenu_sub_electronics_0_Mobiles [Accessed 18 May. 2014].
3. Karjaluoto, H., Karvonen, J., Kesti, M., Koivum˜Aki, T., Manninen, M., Pakola, J., Ristola, A., & Salo, J. (2005). Factors af fecting
consumer choice of mobile phones: Two studies from Finland. Journal of Euro marketing 14(3) (2005).
4. Keller, K. L. (1993). Conceptualizing, measuring, and managing customer-based brand equity. Journal of Marketing, 57 (January), 1-
22.
5. Kim, E., Lin, J.-S., & Sung, Y. (2013). To App or Not to App: Engaging Consumers via Branded Mobile Apps. Journal of Interactive
Advertising, 13(1), 53-65
6. Kotler and Armstrong, 2010. Principle of marketing. 3th Edn., Pearson Education
7. Kotler, P. and Keller, K. (2009). Marketing management. 1st ed. Upper Saddle River, N.J.: Pearson Prentice Hall.
8. López-Nicolás, C., Molina-Castello, F. J. & Bouwman, H. (2008). An assessment of advanced mobile services acceptance:
Contributions from TAM and diffusion theory models. Information & Management 45(2008), 359-364.
9. Rogers, A., 2013. What is the difference? A new critique of adult learning and teaching, Leicester. s.l.:NIACE
10. Rogers, A., 2013. What is the difference? A new critique of adult learning and teaching, Leicester. s.l.:NIACE
11. Verkasalo, H. L., “Analysis of users and non-users of smartphone applications”, Telematics and Informatics, Vol. 27, No. 3,
November, 2010, pp. 242-255
12. VENKATESH, V., MORRIS, M.G., DAVIS, G.B., and DAVIS, F.D., 2003. User acceptance of information technology: toward a
unified view. MIS Quarterly 27(3), pp. 425-478
Keyword : cognitive maps, individual models of the world, patterns, personal development, self-evaluation.
References:
319. 1. G.N. Malyuchenko, and V.M. Smirnov, “Sotsialno-psikhologicheskii analiz tselostnykh predstavlenii o mire” [“Socio-psychological
analysis of comprehensive ideas of the world”]. Saratov, 2006.
2. P.D. Nikitenko, “Vzaimosvyaz sotsialnykh predstavlenii o mire i smyslozhiznennykh orientatsii v razlichnykh usloviyakh sotsializatsii 1834-
molodezhi” [“The interconnection between social ideas about the world and life-purpose orientations under different conditions of 1835
youth socialization”]. Izvestiya Saratovskogo universiteta, Novaya seriya. Seriya Akmeologiya obrazovaniya. Psikhologiya razvitiya,
vol. 2, 3(7), 2013, pp. 250–257.
3. I.B. Gaivoronskaya, V.A. Gubin, and D.Yu. Kanbolatov “Osobennosti motivatsionnoi napravlennosti na voenno-professionalnuyu
deyatelnost v protsesse obucheniya kursantov voennoi obrazovatelnoi organizatsii” [“Specific features of motivational activities in the
course of training of students of a military educational institution”]. Vestnik Sankt-Peterburgskogo universiteta MVD Rossii, vol. 1(73),
2017, pp. 210–213.
4. A.G. Maklakov, N.V. Goloveshkina, I.D. Goloveshkin, A.A. Sidorova, and E.N. Yakhudina, “Sovremennye zakonomernosti i
tendentsii psikhicheskogo razvitiya cheloveka v period shkolnogo obucheniya [“Modern trends in mental development of a person
throughout school education”]. Vestnik of Pushkin Leningrad State University, vol. 4-1, 2016, pp. 97–112.
5. A.A. Dyachkov, and L.V. Shabanov, “K voprosu ob otsenke voenno-professionalnoi napravlennosti voennosluzhashchikh po prizyvu”
[“To the question of assessment of military professional motivation of conscripts”]. Proceedings of the IX International research and
practice conference. Penza, MTSNS “Nauka i Prosveshchenie”, 2018.
6. A.G. Maklakov, and E.V. Pavlova, “Osobennosti formirovaniya professionalno-psikhologicheskikh kharakteristik u budushchikh
uchitelei-predmetnikov raznykh profilei obucheniya v kontekste kompetentnostnogo podkhoda” [“Specific features of development of
professional and psychological characteristics in subject teachers of various areas within the framework of competency -based
approach”]. Vestnik of Pushkin Leningrad State University, vol. 2, 2017, pp.84–95.
7. S.V. Marikhin, and L.V. Shabanov, “Aktualnye problemy organizatsii i razvitiya uchebnoi deyatelnosti slushatelei dopolnitelnykh
professionalnykh programm” [“Current issues of organization and development of the learning activity of students attending additional
professional programs”]. Volsk, vol. 12(7), 2018, pp. 86.
8. L.V. Shabanov, “Obshchaya konfliktologiya” [“General conflictology”]. St. Petersburg: NITS ART, 2017.
9. Е.A. Ivanov, and L.V. Shabanov, “Osobennosti formirovaniya konfliktologicheskoi kompetentnosti v usloviyakh vuza voisk
natsionalnoi gvardii” [“Specific features of develoing conflictological competencies in a national guard higher education institution”].
Konfliktologiya. Fond razvitiya konfliktologii, vol. 13(3), 2018, p. 234.
10. S.V. Marikhin, and L.V. Shabanov, “Dinamika smyslozhiznennykh orientatsii kursantov voennykh vuzov (I i V kursy obucheniya)”
[“Dynamics of life-purpose orientations of students of military higher education institutions (Ist and Vth years)”]. Collection of
scientific papers. Penza: MTSNS “Nauka i Prosveshchenie”, 2018.
Keyword : H-bridge hybrid modular converter (HBHMC) ,HVDC, matrix, secluded staggered converter ,
MATLAB programming.
References:
1. A. Lesnicar and R. Marquardt, "A dynamic geography of multinivel measured convertidor custom fitted to an amplia gama de
potencias", inProc. Power Tech Conf., 2003, vol. 3, p. 1-6.
2. S. Allebrod, R. Hamerski and R. Marquardt, "New convertible multi-arrange lifts and elevators for HVDC transmission", inProc. IEEE
Power Electron. Experts Conf., 2008, p. 174-179.
3. J. Dorn, H. Huang and D. Retzmann, "Nuevos de convertio de volta de voltae para aplicaciones y hechos HVDC", inProc. CIGRE,
Osaka, Japón, 2007.
4. R. Marquardt, "Secluded staggered converter: a typical idea for hvdc arranges and broadened ceaseless bundles", Proc. In t. Power
Electron Conf., 2010, p. 502-507. [5] L. X. Tang y B. T. Ooi, "Ubicación y aislamiento de defectos
de CC in multi-terminal CC sistemas", IEEE Trans. Power Del., Volumen 22, no. 3, páginas 1877-1884, julio of 2007
5. R. Marquardt, "Topologies of multinivel particular convertior con hindrance of cortocircuito corriente de CC", Proc. IEEE Powe r
Electron. Y ECCE Asia, 2011, p. 1425-1431.
6. J. Yang, J. Fletcher, J. Furthermore, O. Reilly, "Análisis y ubicación de cortocircuitos y fallas a tierra in CC redraded links in VSC",
IEEE Trans. Indiana Electron., Volumen fifty nine, no. 10, p. 3827-3837, octubre of 2012.
7. K. Friedrich, "Application moderne de VSC HVDC PLUS dans l. A. Topologie de convertisseur modulaire à plusieurs niveaux", dans
Proc. IEEE Int. Symp. Indiana Electron., 2010, pages 3807 à 3810
8. C. Franck, "Disjoncteurs CCHT: une dissect pour identifier les futurs besoins de recherche", IEEE Trans. Power Delivery, vol. 26, non.
2, pages 998-1007, avril 2011.
9. X. Li, Song Q, Liu W. H, Xao R, Xu X Li, "Protección de falla no everlasting en líneas aereas corriente persevered in MMC basado in
sistemas HVDC, "IEEE Trans. Entrega de Potencia, Vol. 28, no. 1, pp. 483-490, enero de 2013
10. Q. Tu, Z. Xu and L. Xu, "Decreased Switching Frequency Modulation and Circulation Suprasion for Modular Multilevel Converters",
IEEE Trans. Power Del., Volume 23, no. 3, pp. 2009-2017 2011.
11. R. Picas, J. Pou, S. Ceballos, VG Agelidis and M. Saeedifard, "Minimización de las fluctaciones de voltaje del condensador de a
secluded multinivel convertidor mediante el tráfico flujo de fluo", in proc. IEEE Industrial Elect. Conf. (IECON), Montreal, June 2012,
p. 25-28.
12. P. Josep, S. Ceballos, G. Konstantinou, V. Agelidis, R. Picas and J. aragoza, "Metodos of inyección de corriente circulante basados en
información instantánea para el convertidor measured multinivel", IEEE trans. In Indust. Choose., Volumen 2, páginas 777-788, 2015.
CH. Lokesh, Chandan Kumar. Patnaikuni, Balaji, K. V. G. D, Santhosh Kumar.B,
Authors:
E. V. Raghava Rao
Paper Title: Shear Wall Effect on G+9 and G+5 Storey Buildings in Hilly areas
Abstract: The design of building in hilly areas is a typical criteria since the base of the foundation levels
are varying due to availability of sloped terrain only. For better safety shear walls design can give the better
safety against the Earthquake damages. This paper elucidate the variation of internal parameters for G+9 and
G+5 storey buildings with shear walls on 30o sloping ground. Earthquake analysis was made in E- tabs 17.0.1
software with soft and hard soil strata. The analysis for comparing internal parameters. G+9 storey building with
core shear wall have higher story capacity while G+5 storey building have higher drift resistance.
Paper Title: Energy Saving in Split Air Conditioner using Evaporative Cooling Pad at the ODU
Abstract: The objective of the study is to investigate the performance improvement in a split air
conditioning system using evaporative cooling pads at ODU (outdoor unit) and to determine optimum thickness
323. and material of the cooling pad. For this purpose experiments were conducted on 0.8 TR capacity split air
conditioner charged with refrigerant R-22. For comparison experiments were performed with and without 1858-
evaporative cooling pad. The effect of the different cooling pad material and thickness on the overall 1862
performance of split air conditioner is experimentally found by measuring cooling capacity and the power
consumption of the system including water circulation pump. From the experimental work it is found that the
cellulose cooling pad gives the best results among the selected materials. Split air conditioner coupled with
cellulose cooling pad of 100 mm thickness at ODU results in to 13.8% increase in overall COP, 9.5 % reduction
in power consumption and 5.1 % increase in cooling capacity at 35°C DBT and 32% relative humidity outdoor
air condition.
Authors: Ikhlass Sydnaoui, Roslli Bin Noor Mohamed, Mariyana Aida Binti Ab.Kadir
Paper Title: The Thermal Response of Multi-Storeies Concrete Frame Building in the Arabic Area
Abstract: In this paper, there will be an analysis study to figure out the impact of the environment
thermal loads, shrinkage and creep at multi-storeies reinforced concrete frame buildings in the Arabic area.
Etabs models will be prepared considering time dependent properties of concrete and non-time dependent
properties, considering two columns heights as 3m and 6m, and two supports conditions as fixed and hinged to
define the major aspects affect the thermal response of multi-storey concrete frame buildings concentrating at
the thermal deformations and the columns reactions, then it will be compared with the thermal response of
existing concrete building considering both methodologies of time dependent properties and non-time dependent
properties of concrete to define the optimum methodology to be recommended and followed The generated
Etabs models confirmed that the time dependent properties method is the optimum with a clear conversion
between time dependent properties model and the existing parking thermal deformations. The increment in
324. horizontal reactions under thermal loads due to column support condition is accompanied with a reduction in
horizontal slabs deformations. Column height is inversely proportional to horizontal reaction values, finally, the 1863-
importance of analyzing thermal loads fluctuation at columns reactions for multi storeies buildings whereas the 1869
reactions of multi storeies cannot be predicted from single storey analysis.
Paper Title: Data Deduplication with Encrypted Parameters Using Big Data and Cloud
Abstract: Distributed computing empowers organizations to devour a figure asset, for example, a virtual
machine (VM), stockpiling or an application, as a utility simply like power as opposed to building and keep up
registering frameworks in house. In distributed computing, the most significant part is server farm, where
client's/client's information is put away. In server farms, the information may be transferred various time or
information can be hacked along these lines, while utilizing the cloud benefits the information should be
encoded and put away. With the consistent and exponential increment of the quantity of clients and the size of
their information, information deduplication turns out to be increasingly more a need for distributed storage
suppliers. By putting away a one of a kind duplicate of copy information, cloud suppliers significantly decrease
their stockpiling and information move costs. As a result of the approved information holders who get the
symmetric the encoded information can likewise be safely gotten to. Keys utilized for unscrambling of
information. The outcomes demonstrate the predominant productivity and viability of the plan for huge
information deduplication in distributed storage. Assess its exhibition dependent on broad examination and PC
re-enactments with the assistance of logs caught at the hour of deduplication.
327. Keyword : big information, distributed computing, information deduplication, intermediary re-encryption.
References: 1881-
1. Shobana, R., K. ShanthaShalini, S. Leelavathy V. Sridevi (2016), “De-Duplication Of Data In Cloud”, Int. J. Chem. Sci., ISSN: 0972- 1884
768X, Volume: 14, Issue: 4, PP: 2933-2938
2. Wu, T. Y (2015) J. S. Pan, and C. F. Lin, Improving accessing efficiency of cloud storage using deduplication and feedback schemes,
IEEE Syst. J., Volume: 8, Issue: 3, PP: 1-10
3. Shweta D. Pochhi, Prof.Pradnya V. Kasture (2014), “Encrypted Data Storage with De-Duplication Approach on Twin Cloud”,
International Journal of Innovative Research in Computer and Communication Engineering, Volume: 3, Issue: 2, PP: 22-31
4. Puzio.P., R. Molva, M. Onen, and S. Loureiro (2013), “ClouDedup: Secure deduplication with encrypted data for cloud storage,” in
Proc. IEEE Int. Cof. Cloud Comput. Technol. Sci., Volume: 5, Issue: 3, PP: 363–370.
5. Deepak Mishra, Dr. Sanjeev Sharma, “Comprehensive study of data de-duplication”, International Conference on Cloud, Big Data and
Trust, Nov 2013.
6. Zhang, D., Liao, C., Yan, W., Tao, R., & Zheng, W. (2017, August). Data Deduplication Based on Hadoop. In Advanced Cloud and
Big Data (CBD), 2017 Fifth International Conference, PP: 147-152.
7. Ajay Jangra, Vandna Bhatia, UpasanaLakhinazand, NiharikaSinghx (2015), “An Efficient Storage Framework design for Cloud
Computing: Deploying Compression on De-duplicated No-SQL DB using HDFS” 2015 1st International Conference on Next
Generation Computing Technologies, Dehradun, India, 4-5 September 2015
8. Wang, C., Z. Qin, J. Peng, and J. Wang (2010), “A novel encryption scheme for data deduplication system,” Proc. International
Conference on Communications, Circuits and Systems (ICCCAS), PP: 265–269.
9. YAN, Zheng; DING, Wenxiu; YU, Xixun; ZHU, Haiqi; and DENG, Robert H (2016), “Deduplication on encrypted big data in cloud”,
IEEE Transactions on Big Data, Volume: 2, Issue: 2, PP: 138-150.
10. Liu, C. Y., X. J. Liu, L. Wan (2013), “Policy-based deduplication insecure cloud storage,” in Proc. Trustworthy Comput. Serv.,
Volume: 8, Issue: 3, PP: 250–262.
Paper Title: E-Commerce Product Classification using Lexical Based Hybrid Feature Extraction and SVM
Abstract: At present, online shopping has become a growing process, in which the profit statistics are
posted by familiar e-commerce corporations like Amazon, Flipkart, Snapdeal, etc. However, this kind of online
shopping unkindly omits the touch and feel of the products that can be used to estimate the product quality as the
main factor while buying the commodities from the shops. The estimation of product quality is more significant
during the purchasing of online products. Therefore, many opinion mining and sentiment classification methods
were introduced to purchase the best products through online shopping. But, these classification methods
haven’t attained the effective product classification with best reviews and ratings. In this paper, we propose a
hybrid feature extraction method PCA (Principle Component Analysis) and t-SNE (t-Distributed Stochastic
328. Neighbor Embedding ) with SVM (Support Vector Machine) using lexicon-based method to classify and
separate the products from the large set of different products depending on their features, best product ratings 1885-
and positive reviews. In this process, the online products will be isolated and listed according to their high 1891
positive reviews. The data preprocessing is applied to the dataset to get the data accuracy before the execution
of feature extraction and classification. The dimensionality reduction and best visualization of large data set are
executed by applying the PCA and t-SNE method. The sentiments are also been extracted by this hybrid feature
extraction method to acquire the best neighboring product ratings. The polarity of words is discovered using a
lexical based approach to extract positive reviews for obtaining the best products. Finally, the SVM is exploited
to the classification of products. The performance of the proposed method is estimated with precision, recall,
accuracy and complexity that can provide the entire accurateness of the system.
Keyword : Product classification, Feature Extraction, Dimensionality reduction, PCA, t-SNE, Lexical based
approach
References:
1. Wei Zhao, Ziyu Guan, Long Chen, Xiaofei He, Deng Cai, Beidou Wang and Quan Wang, “Weakly-Supervised Deep Embedding for
Product Review Sentiment Analysis”, IEEE Transactions on Knowledge and Data Engineering”, vol.30, no.1, pp. 185 – 197, 2018.
2. Jingbo Zhu, Huizhen Wang, Muhua Zhu, Benjamin K. Tsou and Matthew Ma, “Aspect-Based Opinion Polling from Customer
Reviews”, IEEE Transactions on Affective Computing, vol.2, no.2, pp. 1211 – 1224, 2011.
3. Jia Chen and Gang Kou, “How Online Review Valance Affect on Consumer Opinion Evaluation?”, Procedia Computer Science,
vol.91, pp. 635-641, 2016.
4. Yuan Zuo, unjie Wu, Hui Zhang, Deqing Wang and Ke Xu, “Complementary Aspect-Based Opinion Mining”, IEEE Transactions on
Knowledge and Data Engineering, vol.30, no.2, pp. 249 – 262, 2018.
5. Wan-I. Lee, Shan-Yin Cheng and Yu-Ta Shih, “Effects among product attributes, involvement, word-of-mouth, and purchase
intention in online shopping”, Asia Pacific Management Review, vol.22, no.4, pp. 223-229, 2017.
6. Shenghua Liu, Xueqi Cheng, Fuxin Li and Fangtao Li, “TASC:Topic-Adaptive Sentiment Classification on Dynamic Tweets”, IEEE
Transactions on Knowledge and Data Engineering, vol.27, no.6, pp. 1696 – 1709, 2015.
7. Lin Sun, “Research on Product Attribute Extraction and Classification Method for Online Review”, International Conference on
Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII), pp.117-121,
2017.
8. Upma Kumari, Arvind K Sharma and Dinesh Soni, “Sentiment analysis of smart phone product review using SVM classification
technique”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017.
9. Tejasvini Patil and Sachin Patil, “Automatic generation of emotions for social networking websites using text mining”, Fourth
International Conference on Computing, Communications and Networking Technologies (ICCCNT), Vol.4, pp.1-6, 2013.
10. Doaa Mohey El-Din Mohamed Hussein, “A survey on sentiment analysis challenges”, Journal of King Saud University - Engineering
Sciences, vol.30, no.4, pp. 330-338, 2018.
11. Zhang, Z, Ye, Q, Zhang, Z and Li, Y (2011), “Sentiment classification of Internet restaurant reviews written in Cantonese,” Expert
Systems with Applications, vol. 38, no. 6, pp. 7674–7682,
12. Chen, J, Huang, H, Tian, S and Qu, Y (2009), “Feature selection for text classification with Naïve Bayes,” Expert Systems wi th
Applications, vol. 36, no. 3, pp. 5432–5435.
13. Dan Li, Jiang Qian (2016), “Text Sentiment Analysis Based on Long Short-Term Memory”, First IEEE International Conference on
Computer Communication and the Internet, pp. 471 – 475.
14. Zhang H, Yu Z, XU M and Shi Y (2011), “Feature-level Sentiment Analysis for Chinese Product Reviews”, IEEE International
Conference on Computer Research and Development, Vol.2, pp. 135 – 140.
15. Xing Mou and Yajun Du (2016), “Sentiment Classification of Chinese Movie Reviews in Micro-Blog Based on Context”, IEEE
International Conference on Cloud Computing and Big Data Analysis, pp.313-318.
Paper Title: Proactive Fault Tolerant Routing Protocol for Mobile WSN
Abstract: In Wireless Sensor Network when the sensory nodes are mobile, it is called Mobile WSN. Since
the sensors are on the move, the topology of a MWSN is perpetually dynamical. So, finding an optimal routing
path from the start node (where the event takes place) to the base station in Mobile WSN is highly complicated.
Recent research works have resulted in the design of many innovative protocols for MWSN, however there are
many unresolved issues like fault tolerance, connectivity, reducing the energy consumption, enhancing coverage,
improving security etc. This work aims at proposing a proactive FT routing scheme for Mobile WSN using a
dynamic routing table PFTP and then simulating in MATLAB for evaluating the various performance metrics.
Keyword : Mobile wireless sensor network; fault tolerance; proactive routing table; clustering.
References:
1. Shyamala C, Geetha Priya M and Sumithra Devi K A, Mobile Wireless Network: A Survey, Journal of Wireless Communication,
Network and Mobile Engineering Technology, Volume 3 Issue 2, 2018.
2. Arslan Munir et al, Modeling and Analysis of Fault Detection and Fault Tolerance in Wireless Sensor Networks, ACM Transactions on
Embedded Computing Systems (TECS), Vol 14, Issue 1, January 2015.
3. Rajeswari and Neduncheliyan, Genetic algorithm-based fault tolerant clustering in wireless sensor network, in IET Communications,
vol. 11, no. 12, pp. 1927-1932, 24 8 2017.
329. 4. Begum and Nandury, Interference-Fault Free Data Aggregation in Tree-Based WSNs, 2016 International Conference on Information
Technology (ICIT), Bhubaneswar, 2016, pp. 180-187. 1892-
5. P. Garg and M. Kaur, Improved Distributed Fault Tolerant Clustering Algorithm for Fault Tolerance in WSN, 2016 International
Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), Ghaziabad, 2016, pp. 197-201. 1896
6. Kakamanshadi et al, A survey on fault tolerance techniques in Wireless Sensor Networks, 2015 International Conference on Green
Computing and Internet of Things (ICGCIoT), Noida, 2015, pp. 168-173.
7. J. Lakhotia and R. Kumar, Fault tolerant and mobility aware routing protocol for mobile wireless sensor network, 2014 International
Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, 2014, pp. 584-
590.
8. XiongQi Zheng et al, Energy efficient and Fault Tolerant Routing Protocol for Mobile Wireless Sensor Networks, 2014 International
Conference on Information and Communications Technologies (ICT 2014), Nanjing, China, 2014, pp. 1-5.
9. R. R. Panda et al, Efficient fault node detection algorithm for wireless sensor networks, 2014 International Conference on High
Performance Computing and Applications (ICHPCA), Bhubaneswar, 2014, pp. 1-5.
10. S. Trab et al, Application of distributed fault detection in WSN to dangerous chemical products based on Bayesian approach, 2013
International Conference on Advanced Logistics and Transport, Sousse, 2013, pp. 129-134.
11. Pileggi, Palau and Esteve, Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless
Sensor Network, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks, Liverpool,
2010, pp. 112-117.
12. Alwan and Agarwal, A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks, 2009 Third International
Conference on Sensor Technologies and Applications, Athens, Glyfada, 2009, pp. 366-371.
13. Kumar Rout et al, SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET, International Journal of
Computer Applications, Vol. 64, issue 4, pp. 27-32.
14. A. J. Jara et al, HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance
Management, Computational Science and Engineering, 2009. International Conference, Vancouver, BC, 2009, pp. 879-884.
15. L. Karim and N. Nasser, Reliable location-aware routing protocol for Mobile Wireless Sensor Network, IET Communications, vol. 6,
no. 14, pp. 2149-2158, September 25 2012.
16. Karim and Nasser, Energy Efficient and Fault Tolerant Routing Protocol for Mobile Sensor Network, 2011, (ICC) IEEE International
Conference on Communications, Kyoto, 2011, pp. 1-5.
Paper Title: Performance Evaluation of Various Machine Learning Techniques Applied on UCI Data set
Abstract: Data mining techniques are used in vast fields one of them is healthcare analysis. The present
research is aimed to do the experimental analysis of multiple data mining classification /prediction techniques
using three different machine learning classification and prediction tools over the online healthcare datasets. In
this research, we have analyze different data mining classification and prediction techniques have been tested on
four different online healthcare datasets. The standards used are a percentage of accuracy and error rate of every
applied classifier technique. The experimental analysis are performed using the 10 fold cross-validation
technique. Best suitable classification technique for a particular online dataset is selected based on the highest
classification accuracy and the least error rate as performance measurement indicators.
330.
Keyword : Healthcare, Data Mining 10 fold Cross-validation, Classification techniques.
1897-
References: 1900
1. A Comparative Study of Supervised Machine Learning Algorithms for Stock Market Trend Prediction, Indu Kumar Etl, ICICCT,
IEEE, 2018.
2. Application of machine learning in recommendation systems, Agata Nawrocka etl, IEEE, 2018.
3. Comparative Performance Analysis Of Machine Learning Techniques For Software Bug Detection, Saiqa Aleem,Etl, Itcs, Cst,2015.
4. A Machine Learning Approach for the Classification of Cardiac Arrhythmia, Prajwal Shimpi etl, ICCMC,2017.
5. Performance Evaluation of the Machine Learning Algorithms Used in Inference Mechanism of a Medical Decision Support System,
Mert Bal etl, Scientific World Journal,2014.
6. Machine Learning Techniques for Data Mining: A Survey, Seema Sharma etl,IEEE,2013.
7. Performance Analysis of Machine Learning Algorithms for Gender Classification, Laxmi Narayana Pondhu etl, ICICCT ,IEEE,2018
8. A Framework For Decision Making & Quality Improvement By Data Aggregation Techniques On Private Hospitals Data, Syed
Ahmed Yasin, Dr.P.V.R.D.Prasad Rao,ARPN,July ,2018.
9. Analysis Of Single And Hybrid Data Mining Techniques For Prediction Of Heart Disease Using Real Time Dataset, Syed Ahmed
Yasin, Dr.P.V.R.D.Prasad Rao,IJET,2018.
Authors: Sharmila Agnal, Rakshit Baranwal, Sai Krishna Varun Kumar Rai, Aviraj Gupta
Keyword : Total Harmonic Distortion (THD), loss Minimization, Power quality and sizing , RMF- Rotating
Magnetic field , Load flow analysis -LFA , DG-Distribution Generation .
References:
333. 1. Oecd Environment Directorate International Energy Agency “International Energy Technology Collaboration And Climate Change
Mitigation,” Rue André Pascal. France, April 2016 . 1909-
2. D. Srinivas 1, M. Rama Sekhara Reddy , Power Quality Improvement in Grid Connected Wind Energy System Using Facts Device 1914
and PID Controller, vol. 2, issue 11 e-ISSN: 2250-3021,November 2012.
3. Vahid Helać, Selma Hanjalić, “Modeling and the Impact on Power Quality of Hybrid Solar,” 978-1-5090-6409-0/17, 2017
4. Mr.Ramesh Daravath and E.Deepika, “Power Quality Improvement In Grid Connected Wind Energy System,” Gitam University,
Hyderabad,India.
5. Rishabh Jain, Yingchen Zhang, “Investigating the Impact of Wind Turbines on Distribution System ,” National Renewable Energy
Laboratory Golden.2017.
6. Aleksandar Nikolic and Branka Kostic, “Influence of Wind Generator Different Operating Regimes to the Power Quality in Supply
Network,” 2nd International Symposium on Environment-Friendly Energies and Applications (EFEA), 2012.
7. GanesanRamua,b, Abraham Alem Kebedea and Tafera Mekonena , “Performance Analysis of Power Quality Impact of Adama-One
Wind Farm in Ethiopia ,”International Conference on Control, Instrumentation, Communication and Computational Technologies
(ICCICCT), 2016.
8. AH.Polinder, F. Vander Pijl and et al, “Comparison of Direct-Drive and Geared Generator Concepts for Wind Turbines,” Energy
Conversion, pp. 725-733, 2001.
9. J.Arrilaga, D.A.Bradley and et al, “Power System Harmonics,” John Willey and Sons, 1985.
10. A. A. P. Bíscaro ,R. A. F. Pereira and M. Kezunovic, “Integrated Fault Location and Power Quality Analysis in Electric Power
Distribution Systems,”2014].
Authors: Aviraj Patel, Navnit Kumar Jha, S.Muthamilselvan A.P, Diwakar Kumar Jha.
334. Abstract: The huge growth of the mobile industry leads to more efficient software to be developed in a
mobile phone or android platform. the mobile software and games are now powerful to compete with computer’s
1915-
software but as it seems the problems will also to be carried out from this enhancement.problems in the sense
1918
bug or misbehave of any software that can hang your device.so the Task manager would be needed for mobile
devices too, where we can monitor what are all the applications are running and the complete package of
informa- tion in one single Application. The Task Manager application shows all the device’s active
applications, along with information about:task manager will show how much processor power and cores the app
is consuming, and the RAM item shows how much memory of RAM the app occupies. You can use Task
Manager to end or turn off tasks that are taking too much CPU time or memory or that any bug containing app.
You can click applications you want to stop and then click End Apps button. This project will provide the Active
applications ( Applications that are currently running on the device), Installed (Applications that have been
installed from the Play Store or any third party provider) RAM manager (Random Access Memory), Storage
(Available memory storage), Network uses(Amount of internet data used), GPU ( graphics processing unit),
Screen time (time spend on app in day), Internet Speed(speed of connected in- ternet source) and
Temperature(temperature of the whole device).
Authors: Ikhlass Sydnaoui, Roslli Bin Noor Mohamed, Mariyana Aida Binti Ab.Kadir
Paper Title: The Effects of Seasonal Thermal Loads at Expansion Joints Locations in Arabic Area Buildings
Abstract: Concrete buildings are subjected to fluctuation in seasonal temperature loads between summer
and winter in the Arabic area. The long-term effects on buildings of such temperatures, along with the frequent
fluctuation in the seasonal temperatures impose overall structural deformation, displacements, and alteration of
stresses in concrete elements. The thermally induced deformations affect the serviceability conditions of
buildings with time. Concrete creep and shrinkage will increase the cracks widths and the imposed stresses too.
To eliminate this phenomenon effects, expansion joints should be provided. However, as per the buildings
functions and trend to develop unique buildings by designers, joint-less buildings are usually the preferred
option. When using this option, the structural engineer has to consider the effects of thermal loads changes in the
design. Clear rules and standards must be provided to define the maximum joints spacing’s allowed length in
addition to thermal study procedures. Different approaches are provided by researchers, each methodology
provide different value for required joints spacing considering different aspects in design. In this paper I shall try
to present three methods with comparison study for considered aspects and gaps for each method analysis to
propose the most appropriate methodology as a tool helps engineers in calculating the maximum allowed
spacing between expansion joints.
335.
Keyword : fluctuation, long-term; expansion joints; thermally
1919-
References: 1925
1. ACI Committee 209R. 1997. Prediction of creep, shrinkage, and temperature effects in concrete structures. 1-31.
2. Bazant, Z.1997. Prediction of concrete creep and shrinkage: past, present and future.
3. Nuclear engineering and design, Vol203: 27-38.
4. ACI Committee 224.3R. 2001. Joints in concrete construction. 1-43.
5. Zhao, C.,Yu,G.and Zhu,B. 2014. Analysis on mechanical characteristics of important components in our long frame structure under
over all cooling, , Vol123: 770-774.
6. Pfeiffer, M., and Darwin, D.1987. Joint design for reinforced concrete buildings, Structural engineering and engineering material, SM
report NO.20:1-73.
7. SCSE Committee, 2000. Expansion joints in buildings 1974, Technical report No 65: 1-43.
8. Liu, K. and Dang, Y.2013. Deformation of overlong isolated buildings caused by thermal and concrete shrinkage. Mathematical
problems in engineering, ID 139159:7p.
9. Badrah, M.,and Jadid,N. 2013. Investigation of developed thermal forces in long concrete frame structuresbenthamscience.net. Open
civil engineering journal: Vole 7:210-217.
10. Chiyun, Z., Yu, G. and Zhu, B.2014. Analysis on Mechanical Characteristics of Important Components in Overlong Frame Structure
under Overall Cooling Temperature. Advanced material research, vole 1020:270-274.
11. Aboumoussa, W., and Iskandar, M. Thermal movement in concrete: case study of multi- storey underground car park. Materials in
civil engineering, 2012. 109- M07: 63-70.
12. DAILY TEMPERTURE, https://weatherspark.com/history.
13. Comite Euro-INTERNATIONAL DU BETON. CEB-FIP MODEL CODE 1990, 1990 : 1-461.
14. ACI Committee 318. 2014. Buildings code requirements for structural concrete. 1-479.
Paper Title: Transmit Antenna Optimization in Massive MIMO Technology with EE, SE Trade off
Abstract: Massive MIMO Technology showed its unique characteristics and capabilities for future wireless
communications where high data transmission rates are desired for fast growing 5G applications. High data
336. transmission rates need more number of antennas at base station which comprised of increased system
complexity and hardware cost. A proven method for reducing number of RF (radio frequency) chains at base 1926-
station is Transmit Antenna Selection algorithm. In this paper an effective approach for TAS and optimizing the 1929
number of antennas at base station for desired data rates have been proposed and a Tradeoff between SE
(Spectral Efficiency), EE (energy Efficiency) are discussed. MVGSA (modified velocity Gravitational Search
algorithm) discussed for optimization of Transmit Antennas along with Improved SE and EE other effective
algorithms are compared with multi objectives and data transmission rates. MVGSA proved with Improved SE
and EE with Effective TAS.
Keyword : Massive MIMO, Transmit Antenna Selection, Energy Efficiency, Spectrum Efficiency, MVGSA
References:
1. I.V. Rao, “Optimal Transmit Antenna Selection Using Improved GSA in Massive MIMO Technology”, WPC
2. Aritra Konar “A Simple and Effective Approach for Transmit Antenna Selection in Multi-user Massive MIMO Leveraging Sub-
modularity”, IEEE Transactions on Signal Processing
3. Xian Gao, “Massive MIMO Performance Evaluation Based On Measured Propagation Data “, IEEE TRANSACTIONS ON
WIRELESS COMMUNICATIONS, VOL. 14, NO. 7.
4. Manish Mandloi, “Error Recovery Based Low-Complexity Detection for Uplink Massive MIMO systems”, IEEE Wireless
Communications Letters
5. Wan A.W.M. Mahyiddin, “Massive MIMO Systems in Time-Selective Channels”, IEEE Communications Letters
6. Said. E. Khamy, “Performance of Enhanced Massive Multiuser MIMO Systems Using Transmit Beam forming and Transmit Antenna
Selection Techniques”, Wireless Personal Communication
7. Huimin Zhao, Zujun Liu, Yongjun Sun, “Energy efficiency optimization for SWIPT in K-user MIMO interference channels”
,Physical Communication, vol. 27, pp. 197-202, April 2018.
8. Jiang Jing, Cheng Xiaoxue, Xie Yongbin, “Energy-efficiency based downlink multi-user hybrid beamforming for millimeter wave
massive MIMO system”, The Journal of China Universities of Posts and Telecommunications, vol. 23, no. 4, pp. 53 -62, August 2016.
9. Long Zhao, Ke Li, Kan Zheng, “ An Analysis of the Trade Off Between The Energy & Spectrum Effeciences in An Uplin k Massive
MIMO-OFDM System”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, VOL. 62, NO. 3, MARCH 2015.
10. Z. Liu, W. Du and D. Sun, "Energy and Spectral Efficiency Tradeoff for Massive MIMO Systems With Transmit Antenna Selection,"
IEEE Transactions on Vehicular Technology, vol. 66, no. 5, pp. 4453-4457, May 2017.
11. Y. Gao, H. Vinck and T. Kaiser, "Massive MIMO Antenna Selection: Switching Architectures, Capacity Bounds, and Optimal
Antenna Selection Algorithms," IEEE Transactions on Signal Processing, vol. 66, no. 5, pp. 1346-1360, March1, 1 2018.
12. Piya Patcharamaneepakorn, ShangbinWu, Cheng-XiangWang, “Spectral, Energy, and Economic Efficiency of 5G Multicell Massive
MIMO Systems With Generalized Spatial Modulation” IEEE
Keyword : Service Now, Portal, Client scripts, UI Policies, Workflow, Record, Analysis, Attendance.
337.
References:
1. J.selvakumar,A.Lakshmi,T.Arivoli. IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -
2012) March 30, 31, 2012 .“Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering and 1930-
Fuzzy C-Mean Algorithm” 1933
2. Vinay Parameshwarappa, Nandish S (2014) “A Segmented
3. Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
Software Engineering.vol 4.
4. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
5. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
6. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
7. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
8. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012”Brain
Tumors: An Engineering Perspective”.
9. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
10. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
11. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.
Authors: Pabitra Das Mohapatra, Siba Prasad Mishra, Sipalin Nayak, Mohammad Siddique
Optimized Structural Performance of Paver Blocks of Bajri Concrete: NRM Partly Substituting
Paper Title:
Cement
Abstract: The discarded object dart during alumina extraction from bauxite ores in Bayers process is Red
Mud. The solid/ liquid insoluble by-product dumped in exposed red mud ponds which are radioactive, highly
alkaline and environmental contaminant to soil, surface water and ground water and possess disposal threats.
Recent trend in increased urbanization and modernization has plenty of use of exterior flooring by concrete
pavers block depending upon traffic load and volume. Present work is to know whether this red mud can be
reused as a sustainable construction material to replace cement. The XRF spectroscopic advantage is taken to
determine the composition identities between red mud and OPC cement. The study reveals the optimized
percentage of red mud blend with cement after neutralization normalization. It cannot be disposed of easily.
Attempt has been made to use bajri as the coarse aggregate instead of 12mm chips. The crusher by-product is
having less use as construction materials. So the spare of cement by compensating with red mud and use of bajri
shall be cost effective, environmentally sustainable and convenient disposal of the harmful waste. The
mechanical characteristics like compressive, flexural, and split tensile strength etc., at 0%, 10%, 20%, 30% and
40% replacement of cement by red mud is found by using compressive testing machine (CTM) and universal
testing machine (UTM) adhering to IS : 15658 (2006) and amended in 2011. The 20% OPC cement substitution
by red mud is found to be adequate and will maintain sustainability.
339.
Keyword : Mechanical Strength, Concrete, Red mud; Bajri, Pavers block. 1938-
1949
References:
1. Sutar H. K., Mishra S. C., Sahoo S. K., Chakraverty A P., Maharana H. S., 2014, Progress of Red Mud Utilization: An Overview” ,
American Chemical Science Journal. Science domain international, Vol-4(3), 255-279, www.sciencedomain.org
2. Dodoo-Arhin D., Rania A., Nuamaha A., Agyei B., David T., Obadac O., Yayaa A., 2017, Awaso bauxite red mud -cement based
composites:
3. Characterisation for pavement applications,Case Studies in Construction Materials, Elsevier,Vol-7, PP- 45-55, https://doi.org/10.1016
/j.cscm .2017. 05.003
4. Wyatt Pontius, 2018, Environmental and Radiation Concerns of Red Mud, PH241, Stanford Univ., Winter 2018,
http://large.stanford.edu/courses/2018/ph 241/ pontius1/
5. Sawant R. A. B., Kumthekar M. B., Diwan V. V., Hiraskar K. G., 2012, Experimental Study on Partial Replacement of Cement by
Neutralized Red Mud in Concrete” , International Journal of Engineering and Advanced Technology (IJEAT).
6. Sarode D., Deshmukh M. P., Pendhari S. S., Alam I., 2015, Partial Replacement of Cement in Mortar with Red Mud and Ultra fines,
Conference: 2nd R N Raikar Memorial International Conference and Bantia- Basheer International Symposium on Advances in
Science and Technology of ConcreteAt: Mumbai, IndiaVolume: Volume II, ISBN No.81-86876-16-2
7. Gowsalya. R, Bhagyalakshmi. A, 2015, Experimental Study on Partial Replacement of Cement by Red Mud, International Journal of
Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol -3(4), pp-1-4
8. Bishetti P. N., Pammar L., (2014) “Experimental study on utilization of industrial aste in concrete”, Int. Jr. of Technical Research and
Applications, Vol-2(4), pp-49-52
9. Pujar S. M., Prakash K.B., 2014, Effect of Replacement of Cement by Red mud on the Properties of Concrete, Int. Jr of Sc. & E ng.
Research, Vol- 5 (9), pp- 805-814
10. Deepika K., Ananthakumar S., Mariadoss R, Nanthagopal J., Saravanakumar V., 2017, Experimental Investigation of Concrete by
Red Mud as Replacement of Cement and Using Strengthening Admixture, International Journal of Innovative Researc h in Science,
Vol-6 (3), pp- 3928-3933, DOI:10.15680/IJIRSET.2017.0603164
11. Varghese M., 2017, Partial Replacement of Cement using Red Mud in SCC, Int. Jr. of Innovative Research in Sc., Eng. and
Technology, Vol. 6 (5), pp- 8333-8338, http:/ /www.ijirset.com/upload/2017/may/175_Partial.pdf
12. Deelwal K., Dharavath K., Kulshreshtha M. (2014) “Evaluation of characteristic properties of red mud for possible use as a
geotechnical material in civil construction”, International Journal of Advances in Engineering & Technology, Vol-7(3), PP-1053-59.
13. Tauber, T., Hill, R. K., Crook, D. N. and Murray, M. J., 1971, Red mud residues from alumina production as a raw material for heavy
clay products. J. Austr. Ceram. Soc., 7 (1), pp. 12-17
14. Knight, J.C., Wagh A. S., Reid W.A., 1986, The Mechanical Properties of Ceramics from Bauxite Waste, Journal of Materials
Science, 21, pp. 2179-2184
15. Bhat P.N., Ghosh D.K., Desai M.M., 2002, Immobilisation of beryllium in solid waste (red-mud) by fixation and vitrification, Waste
Management, 22, pp. 549–556
16. Lima M. S. S., Thives L. P., Haritonovs V., Bajars K., 2017, Red mud application in construction industry:review of benefits and
possibilities, IOP Conf. Ser.: Mater. Sci. Eng. 251 012033, 251 PP- 1-10, doi:10.1088/1757-899X/251/1/012033
17. Prasad P. M., Kachawha J. S., Gupta R. C., Mankhand T. R., Sharma, J. M., 1985,Light metal science and technology, Switzerla nd:
Trans. Tech. Publication Ltd.; PP- 31,
18. Kumar R, Srivastava J. P., Prem Chand,1998, Utilisation of iron values of red mud for metallurgical application, Envir. waste
management in non-ferrous metallurgical industries, In: Bandopadhyay A, Goswami N. G., Rao R. P, editors. Jamshedpur: NML, PP-
108–19
19. DmitrievAndrey, 2018, The Comprehensive Utilisation of Red Mud Utilisation in Blast Furnace, Open access peer-reviewed chapter,
Open access peer-reviewed chapter, Intech open, pp-1-14 DOI: 10.5772/intechopen.80087
20. Kara M., Emrullahoglu, O. F., 1995, Study of Seydisehir red mud wastes as brick and rooing tiles. In Fourth Euroceramics , Vol. 12,
ed. I. Braga, S. Cavallini and G. F. Di Cesare, Faenza Editrice,, Italy, PP- 155-162,
21. Snigdha S.,.Batra V. S. 2008, Catalytic applications of red mud, an aluminium industry waste: A review, Elsevier, Applied Catalysis
22. B:Environmental,Vol-81(1–2),PP-64-77, https://www.sciencedirect.com/science/article/pi/S0926337307004468
23. Busto R. V., Gonçalves M., Coelho L. H., 2016, . Assessment of the use of red mud as a catalyst for photodegradation of bisph enol A
in wastewater treatment, Pubmed, Water Sci Technol. Vol-74(6), PP-1283-1295..
24. Velumani P., Senthil Kumar S., 2017, Production of sludge incorporated paver blocks for efficient waste management, Taylor an d
Francis, Journal of the Air & Waste Management, DOI: 10.1080/10962247.2017.1395373To link to this article:
25. BathamGeeta, 2018, Strength enhancement of paver block using red mud, International Research Journal of Engineering and
Technology (IRJET), Vol- 05(7), pp-585-589
26. Deshmukh M. P., Sarode D.D., Avijit C., 2014, Effect of Partial Replacement of Crushed Fine Aggregates with an Industrial Waste
(Red Mud) on Chloride Penetration of Concrete, Inpresco, International Journal of Current Engineering and Technology, Vol 4(6 ),
pp- 4026-4029
27. KulkarniSupriya, 2018, Experimental Study on Red Mud, Fly Ash and GGBFS based Geopolymer Concrete, A Green Substitute to
Conventional Concrete, International Journal of Engineering Research & Technology (IJERT), Vol-7 (2),pp- 107-111
28. IEA Green House gas R & D Programme, (IEA GHG), 2008, CO2 capture in cement Industry , 2008/3,
https://ieaghg.org/docs/General_Docs/Reports/2008-3.pdf
29. Power, G., Grafe, M., and Klauber, C., (2009), Review of Current Bauxite Residue Management, Disposal and Storage:Practices,
Eng. and Sc.. CSIRO Document DMR-3609
30. Venkatesh C.,Madduru S. Rama Chand, Nerella, Ruben, 2019, A State of the Art on Red Mud as a Substitu-tional Cementitious
Material, Annales de Chimie: Science des Materiaux, Vol. 43(2), April, 2019, pp. 99-106
31. Parekh, B. K., Goldberger W. M., 1976, An assessment of technology for possible utilization of Bayer process Muds, EPA 600/2-76-
301, Washington D.C. (1976),
32. Lakshmi T.D.V., Prasad DSV, M Anjan Kumar, Raju GVR Pr., 2015, Stabilization of Industrial Waste Red-Mud with Cement,
International Journal of Research and Innovations in Earth Science, Vol- 2 (1), pp- 5-9
33. Majumdar P. and Mishra S. P., 2017. “Management of Pumice Crete as LWC/LWA construction material with Fly Ash as part
cement substitute”, International Journal of Development Research, 7, (07), 13978-13984.
34. FengYanbo., Yang C., 2018, Analysis on Physical and Mechanical Properties of Red Mud Materials and Stockpile Stability after
Dilatation, Adv. In material S. and Eng, Vol-2018, Article ID 8784232, 14 pages, https://doi.org/10.1155/2018/8784232
35. Rathod R. R., Suryawanshi N. T., , Memade P. D.,2012, Evaluation of the properties of Red Mud Concrete, IOSR Journal of
Mechanical and Civil Engineering (IOSR-JMCE), PP: 31-34
36. Ashok P, Suresh kumar M. P., 2014, Experimental Studies On Concrete Utilising Red Mud As a Partial Replacement Of Cement With
Hydrated Lime, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE), PP- 01-10
37. Metilda D. L. Selvamony C., Anandakumar R., Seeni A., 2015, Investigations on optimum possibility of replacing cement partially by
red mud in concrete ,. Academic journals. Vol-10(4), PP.137-143.
38. Nayak S., Mishra S P., Panda S., 2017, Red Mud, the cutting edge of self-compacting concrete, INPRESSCO, International Journal of
Current Eng. and Technology, Vol 7(2), pp.390 -396
39. P. SyamSai and ChandanaSukesh, Strength Properties of Concrete By Using Red Mud as a Replacement of Cement with Hydrated
Lime. Int. Jr. of Civil Engineering and Technology, 8(3), 2017, pp. 38–49
40. Peter J. Ruksana C. M, Peter A., Mohan S., 2018, Strength Characteristics Study on Red Mud Concrete, International Journal of
Research in Engineering, Science and Management, Vol-1(9), PP – 259-263
41. Thangamani K, 2018, Constant replacement of cement with red mud and partial replacement of sand with m. sand in concrete, JETIR
May 2018, Vol 5 ( 5), PP- 1065-1070
42. Juned M. , Ahmad A., 2019, Experimental Study of Concrete Strength Properties Using Red Mud (bauxite residue) as a partial
replacement of binder content for M25 grade of Concrete Int. Jr. of Tech. Innovation in Modern Eng. & Sc. (IJTIMES), Vol-5 (4).
Paper Title: Imputation Methods for Missing Data for a Proposed VASA Dataset
Abstract: Preprocessing is the presentation of raw data before apply the actual statistical method. Data
preprocessing is one of the most vital steps in data mining process and it deals with the preparation and
transformation of the initial dataset. It is prominent because the investigating data which is not properly
340. preprocessed could lead to the result which is not accurate and meaningless. Almost every research have missing
data and introduce an element into data analysis using some method. To consider the missing values that need to
1950-
provide an efficient and valid analysis. Missing imputation is one of the process in data cleaning. Here, four
1953
different types of imputation methods are compared: Mean, Singular Value Decomposition (SVD), K-Nearest
Neighbors (KNN), Bayesian Principal Component Analysis (BPCA). Comparison was performed in the real
VASA dataset and based on performance evaluation criteria such as Mean Square Error (MSE) and Root Mean
Square Error (RMSE). BPCA is the best imputation method of interest which deserve further consideration in
practice.
Keyword : Data Preprocessing, Missing Data, Imputation Methods, BPCA, RMSE.
References:
1. K. Manimekalai and A. Kavitha, “Missing Value Imputation And Normalization Techniques in Myocardial Infarction”, ICTACT
Journal on Soft Computing,Vol.08 Issue:03,April 2018.
2. Peter Schmitt, J Biomet Biostat ,Jonas Mandel et al,”A Comparison of Six Methods for Missing Data Imputation”, in Journal of
Biometrics & Biostatistics, 2015.
3. V.B. Kambie and S.N. Deshmukh ,“Comparision between Accuracy and MSE, RMSE by using Proposed Method with Imputation
Technique”, Oriental Journal of Computer Science and Technology, ISSN: 0974-6471, Vol. 10, No. (4) 2017
4. Dr.Durairaj.M, Sivagowry.S , “A Pragmatic Approach of Preprocessing the Data Set for Heart Disease Prediction”, International
Journal of Innovative Research in Computer and Communication Engineering, ISSN(Online): 2320-9801, Vol. 2, Issue 11, November
2014
5. Qinbao Song, Martin Shepperd et al, “Can k-NN Imputation Improve the Performance of C4.5 With Small Software Project Data
Sets? A Comparative”, JSS ,December 2008.
6. Shigeyuki Oba, Masa-aki Sato, Ichiro Takemasa, MoritoMonden, Ken-ichi Matsubara and Shin Ishi, “A Bayesian missing value
estimation method for gene expression profile data”, Bioinformatics, Vol. 19 no. 16, pages 2088–2096,2003.
7. Gustavo E. A. P. A. Batista and Maria Carolina ,“An Analysis of Four Missing Data Treatment Methods for Supervised Learning”,
2014.
8. Bjorn Grung , Rolf Manne ,“Missing values in principal component analysis”, Chemometrics and Intelligent Laboratory
Systems,1998.
9. Julian Luengo, Salvador Garcia,Francisco ,“On the choice of the best imputation methods for missing values considering three groups
of classification methods”, KnowlInfSyst, 2012.
10. Folch-Fortuny, F.Arteaga et al, “PCA model building with missing data: new proposals and a comparative study”, Chemometrics and
Intelligent Laboratory Systems,2015.
11. Kristen A. Severson, Mark C. Molaro † and Richard D. Braatz,“Principal Component Analysis of Process Datasets with Missing
Values”,MDPI Processes,2017.
12. Arjun Puri, Dr. Manoj Gupta, “Review on Missing Value Imputation Techniques in Data Mining”, International Conference on
Machine Learning and Computational Intelligence-2017.
13. Dan Li, JitenderDeogun et al,“Towards Missing Data Imputation: A Study of Fuzzy K-means Clustering Method”, Springer-Verlag
Berlin Heidelberg 2004.
14. SowmyaChandrasekaran et al, ”Data Preprocessing: A New Algorithm for Univariate Imputation Designed Specifically for Industrial
Needs”, Technology Arts Science,Workshop Computational Intelligence, 2016.
15. Z. Mahesh Kumar , R. Manjula ,”Regression model approach to predict missing values in the Excel sheet databases”, Internation al
Journal of Computer Science & Engineering Technology (IJCSET), ISSN : 2229-3345, 2012.
16. Cosmin Lazar, Laurent Gatto, Myriam Ferro, Christophe Bruley and Thomas Burger, “Accounting for the Multiple Natures of
Missing Values in Label-Free Quantitative Proteomics Data Sets to Compare Imputation Strategies”,American Chemical Soceity
2016.
17. Min-Wei Huang,Wei-Chao Lin,Chih-Wen Chen,Shih-Wen Ke,Chih-Fong Tsai,WilliamEberie,“Data preprocessing issues for
incomplete medical datasets”,Wiley Online Library,2016.
18. R. Manimaran, Dr.M.Vanitha,”Novel Approach to Prediction of Diabetes using Classification Mining Algorithm “, International
Journal of Innovative Research in Science, Engineering and Technology,July 2017.
Keyword : Average filtering, Median flitering ,Sobel Edge detection, Canny Edge detection
References:
341. 1. J.selvakumar,A.Lakshmi,T.Arivoli. IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM
-2012) March 30, 31, 2012 .“Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering and
Fuzzy C-Mean Algorithm” 1954-
2. Vinay Parameshwarappa, Nandish S (2014) “A Segmented 1957
Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
Software Engineering.vol 4.
3. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
4. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
5. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
6. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
7. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July
2012”Brain Tumors: An Engineering Perspective”.
8. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
9. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
10. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.
Paper Title: Servicenow based Advanced and Robust Leave Management System
Abstract: Leave Management is an interface that makes it easier for faculty / staff to apply for leave at
universities or organizations. The application allows the registered user to log in and the new user is allowed to
register. The application makes it convenient for the user applying for leave. In today's time, we need to wait for
higher authorities to sanction leave. To order to reduce the period that we use this form, the status of approval or
denial of leave will be notified immediately by e-mail. This application also provides the flexibility to delegate
our duties to the other Staff on the date of leave.
Paper Title: Non-Linear Static Analysis of RCC Framed Structures with and Without Infill Walls
Abstract: The concept of an earthquake is becoming an exceptional study in our use because no longer a
particular area can be targeted as an earthquake-resistant area. So, the main motif of any structural engineer
during the design is to design a structure that could cope with seismic pressure successfully. On this note, non-
linear static pushover analysis has become a prominent tool for the structural design and evaluation of RC
elements. In this project G + 5, G + 9, G + 5 with infill walls and G + 9 with infill walls RCC framed structures
have been analyzed by the use of SAP 2000 v19. The structures are designed as in keeping with IS 1893(Part 1):
2002 for earthquake forces in seismic zone IV. The use of the equivalent strut approach for modeling the infill
walls is adopted and strut is designed in accordance with FEMA-356. Non-linear Static pushover analysis is
performed on the designed RCC framed structures with and without infill walls. And pushover results are used
to evaluate structural performance under design earthquake load, and code requirements are discussed.
Keyword : Structural Elements, Pushover Analysis, Infill Walls and Failure Mechanism.
References:
343. 1. Rajeshwari Patil, Shweta Anoor, Shweta Desai, Sudha, Gajendra, Mithun Kumar, “Analysis and design of residential building by using
sap-2000,” International Research Journal of Engineering and Technology (IRJET), vol. 4(5), 2017. 1962-
2. Vijay Namdev Khose, Analysis and Four storey RCC building using SAP2000 v12, Department of earthquake Engineering, IIT
Roorkee, 2008.
1967
3. M Sainath and Dr. J S R Prasad, “Analysis and Design of Low, Medium & High-rise RC buildings,” International Journal of Civil
Engineering and Technology (IJCIET),vol. 9(8), 2018.
4. Chung- Yue Wang and Shaing-Yung Ho. “Pushover Analysis for Structure Containing RC Walls,” The 2nd International Conference
on Urban Disaster Reduction, Taipei, Taiwan, pp. 27-29, 2007.
5. Eng Makar Nageh, - “How to Model and Design High rise Building using ETABS Program”.
6. Habibullah, Ashraf. and Stephen, Pyle, “Practical Three-Dimensional Nonlinear Static Pushover Analysis,” Structure Magazine,
U.S.A. , pp.1-2, 1998.
7. Kadid and A. Boumrkik, “Pushover Analysis of Reinforced Concrete Frame Structures”, Asian Journal of
Civil Engineering (Building and Housing) vol.9(1), pp. 75-83, 2008.
8. M.J.N Priestly, “Displacement Based Seismic Assessment of Reinforced Concrete Buildings”, Journal of earthquake engineering,
vol.1, pp.157-192, 1997.
9. R PARK, ISET Journal of Earthquake Technology, paper no. 444, vol.41,no.1,march 2004, pp.141-158.
10. Pankaj Agarwal, Manish Shrikhande, Earthquake Resistant Design of Structures.
11. IS 1893: Part 1 (2002); “Criteria for earthquake resistant design of structures”, Bureau of Indian Standards, New Delhi.
12. ATC 40, Volume 1 (1996) “Seismic evaluation and retrofit of concrete buildings”, Applied Technology Council, Seismic Safety
Commission, State of California.
13. Effect of Infill stiffness on Seismic Performance of Multi-Storey RC Framed Structures 13th World Conference on Earthquake
Engineering by Prof.Devdas Menon, Robin Davis, Meher Prasad.
14. IS 456:2000; “Plane and Reinforced Concrete-Code of Practice”, Bureau of Indian Standards, New Delhi.
15. FEMA 356, “Federal Agency Management Agency”, Pre standard and commentary for the Seismic rehabilitation of Buildings.
16. S.K. Duggal- Earthquake resistant design of Structures
17. W.F. Chen, E.M. Lui - Earthquake Engineering for Structural Design.
18. http://www.sefindia.org/, Structural Engineering Forum of India (SEFI).
19. Design aids (for Reinforced Concrete) to IS 456:1978, Special Publication SP:16, Bureau of Indian Standards, New Delhi, 1980.
Paper Title: IC Fabrication Process Steps Analysis using Fuzzy DEMATEL Method
Abstract: Semiconductor industry and the process involved in fabrication play a major role in a modern
technology whatever the field may be. In this paper, the study discusses about the complete process flow of the
IC fabrication and the interdependence of each steps involved. Seven important process flow steps have been
considered and explained throughout this study. In particular, the present work inspects comprehensively the
correlation between each process steps by using fuzzy DEMATEL technique. The fabrication steps have been
separated as cause and effect groups, for the readers to get a good understanding of a inter relationship between
the seven process steps. The result has proved that the market requirement (C1), the complexity of the
fabrication process (C3) and the streamline of supply chain and time to market (C7) fall under causal group and
cost to customer , design , customization , testing yield , packaging fall under effect group. The research analysis
by fuzzy DEMATEL method has been demonstrated as an efficient approach in the inter relationship studies.
Paper Title: A Novel Channel Access Mechanism for IEEE 802.15.4e to Promote Internet of Things
Abstract: IEEE 802.15.4e defines the specification of PHY layer and MAC layer. Although distinguished
by its popularity and strength for Wireless Sensor Networks (WSNs), it still suffers from several limitations that
deteriorates its performance. One such restriction is a high collision probability that degrades the performance of
a dense network. In this article, we develop a Slotted Access Window (SAW) mechanism, a medium access
technique to mitigate high collision probability and energy consumption in dense and battery constrained
networks. An accurate analytical model is presented to assess the effectiveness of SAW mechanism and
validated using the ns-3 simulator. Finally, results show that the SAW mechanism significantly improves the
throughput, energy efficiency, and delay in contrast to the default medium access mechanism.
345.
Keyword : Wireless Sensor Network, IEEE 802.15.4e, LLDN, Internet of Things, Slot Allocation Window, 1974-
MAC Layer. 1978
References:
1. D. De Guglielmo, G. Anastasi, and A. Seghetti, From IEEE 802.15.4 to IEEE 802.15.4e: A Step Towards the Internet of Things.
Cham: Springer International Publishing, 2014, pp. 135–152.
2. J. Y. X. G. C. L. S. U. Shuguang Chen, Tingting Sun and M. A. Alnuem, Performance Analysis of IEEE 802.15.4e Time Slotted
Channel Hopping for Low-Rate Wireless Networks. Cham: KSII Transactions on Internet and Information Systems, 2013, pp. 1–21.
3. A. Berger, A. Entinger, A. Po¨tsch, and A. Springer, “Improving ieee 802.15.4e lldn performance by relaying and extension of
combinatorial testing,” in Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Sept 2014, pp. 1 –4.
4. G. Patti, G. Alderisi, and L. L. Bello, “Introducing multi-level com- munication in the ieee 802.15.4e protocol: The multichannel-
lldn,” in Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Sept 2014, pp. 1–8
5. L. Dariz, M. Ruggeri, and G. Malaguti, “A proposal for enhancement towards bidirectional quasi-deterministic communications using
ieee 802.15.4,” in 2013 21st Telecommunications Forum Telfor (TELFOR), Nov 2013, pp. 353–356.
6. A. Berger, M. Pichler, W. Haselmayr, and A. Springer, “Energy- efficient and reliable wireless sensor networks - an extension to
ieee 802.15.4e,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, p. 126, Aug 2014. [Online].
Available: https://doi.org/10.1186/1687-1499-2014-126
7. G. Bianchi, “Performance analysis of the ieee 802.11 distributed coor- dination function,” IEEE Journal on Selected Areas in
Communications, vol. 18, no. 3, pp. 535–547, March 2000.
8. P. Chatzimisios, V. Vitsas, and A. C. Boucouvalas, “Throughput and delay analysis of ieee 802.11 protocol,” in Proceedings 3rd IEEE
International Workshop on System-on-Chip for Real-Time Applications, Oct 2002, pp. 168–174.
9. P. Chatzimisios, A. C. Boucouvalas, and V. Vitsas, “Ieee 802.11 packet delay-a finite retry limit analysis,” in GLOBECOM ’03. IEEE
Global Telecommunications Conference (IEEE Cat. No.03CH37489), vol. 2, Dec 2003, pp. 950–954 Vol.2.
10. M. Maadani, “Saturated distributed coordination function markov model for noisy soft-real-time industrial wireless networks,” IET
Communications, vol. 8, pp. 1724–1735(11), July 2014
11. M. Maadani and S. A. Motamedi, “A comprehensive dcf performance analysis in noisy industrial wireless networks,” International
Journal of Communication Systems, vol. 29, no. 11, pp. 1720–1739
12. P. Park, P. D. Marco, C. Fischione, and K. H. Johansson, “Modeling and optimization of the ieee 802.15.4 protocol for r eliable and
timely com- munications,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 3, pp. 550–564, March 2013.
13. P. Park, C. Fischione, and K. H. Johansson, “Modeling and stability analysis of hybrid multiple access in the ieee 802.15.4 protocol,”
ACM Trans. Sen. Netw., vol. 9, no. 2, pp. 13:1–13:55, Apr. 2013
14. P. D. Marco, C. Fischione, F. Santucci, and K. H. Johansson, “Modeling ieee 802.15.4 networks over fading channels,” IEEE
Transactions on Wireless Communications, vol. 13, no. 10, pp. 5366–5381, Oct 2014.
Authors: Gangu Naidu Mandala, Suguna Tentu, S.Anjani Devi, Venkata Ramakrishna Rao Gandreti
E-Banking in India: with Reference of Consumers Perception of Internet Banking in
Paper Title:
Visakhapatnam District.
Abstract: Objective: As of late, Internet Banking has turned into a useful stage to effectively get to banking
administrations. The banking business has experienced emotional changes utilizing the idea of internet banking.
Internet banking is characterized a technique for banking through internet entry in which clients can use various
types of banking administrations.
Methodology: The essential goal of this research is to recognize the central point that impact internet banking
discernment in Visakhapatnam District, Andhra Pradesh, India.
Result: In this paper we dissect the customers' attributes of internet banking utilizations in Visakhapatnam
District and likewise found that internet banking is impacted by its Perceived reliability, Perceived ease of use
and Perceived usefulness.
Conclusion: The discoveries checked the research theories and affirmed that perceived usefulness, Perceived
346. ease of use and Perceived Reliability, all effect mentality towards the goal of internet banking observation in
Visakhapatnam District. 1979-
1982
Keyword : Customers, Factors, Internet banking, Perception, Technology acceptance.
References:
1. Anouze, A.L.M., Alamro, A.S., Awwad, A.S., Customer satisfaction and its measurement in Islamic banking sector: a revisit and update,
Journal of Islamic Marketing, Volume 10, Issue 2, 10 June 2019, Pages 565-588.
2. Lakshman, K., Sulaiman, N., A study on dynamics and challenges on traditional banking and E-banking services among senior citizen's
at Bangalore city, International Journal of Advanced Trends in Computer Science and Engineering, Volume 8, Issue 3, May-June 2019,
Pages 931-935
3. Shankar, A, Jebarajakirthy, C, The influence of e-banking service quality on customer loyalty: A moderated mediation approach,
International Journal of Bank Marketing ,Volume 37, Issue 5, 1 July 2019, Pages 1119-1142.
4. Sobiya, S.L., Thangavel, N., An impact of technology on E-banking dimension in banking sector, International Journal of Recent
Technology and Engineering, Volume 8, Issue 1, May 2019, Pages 340-342.
348. References:
1. Jayshree Ghorpade, Anagha Wadkar, Janhvi Kamble, Utkarsha Bagade, Vijayendra Pagare, “Smart Dustbin: An Efficient Garbage
Management Approach for a Healthy Society”, International Conference on Information, Communication, Engineering and 1990-
Technology, 2018. 1993
2. Surendran D, “Rare Disease Detection and Alerting System to the Health Department”, International Journal of Advanced Research
Trends in Engineering and Technology, Vol.4, Specila Issue 7, Pg. 4-8.2017.
3. Aksan Surya Wijaya, Zahir Zainuddin, Muhammad Niswar, “Design a Smart Waste Bin for Smart Waste Management”, IEEE 2017.
4. Poonguzhali.A, Soundarya. R,Priyanka, Tejaswini.A, Pavithra.M, “Smart Garbage Detection System Using IOT Through Mobile
App”, Vol 5, Issue 5, 2018, International Journal of Engineering Research in Electronics and Communication Engineering.
5. Balamurugan S, Abhishek Ajith, Snehal Ratnakaran, S.Balaji, R.Marimuthu, “Design of Smart Waste Managemen t System”, IEEE
2017.
6. Vincenzo Catania, Daniela Ventura, “An Approach for Monitoring and Smart Planning of Urban Solid Waste Management Using
Smart-M3 Platform ”,15th Conference of Fruct Association.
7. Suresh Kumar A, Surendran D, Keerthana S, Kiruthika, “Inertial measurement sensor for accurate detection and notification using
internet of things”, Pakistan Journal of Biotechnology, Vol.13, Pg.375-378,2016.
8. Krishna Nirde, Prashant S. Mulay, Uttam M.Chaskar, “IOT Based Solid Waste Management System For Smart City”, ICICCS 2017.
9. Dr.N. SathishKumar, B.Vijayalaksmi, R. Jenifer Prarthana, A. Shankar,“IOT based Smart Garbage alert system using Arduino UNO” ,
IEEE, 2016.
10. Sateesh Reddy Avutu, Dinesh Bhatia, B. Venkateshwara Reddy, “Design of Touch Screen Based Robot with Obstacle Detection
Module for Autonomous Path Navigation”, 2017 IEEE Region 10 Conference.
References:
1. Srinivasa Rao M ” Sentiment trends on natural disasters using location based twitter opinion mining” In International Journal of Civil
Engineering and Technology,2017
2. Sai Prasad K. “Secure k-NN query on encrypted cloud data with multiple keys”In International Journal of Advanced Trends in
Computer Science and Engineering 2019.
3. Karthik R., Tetali D.R., Gogula S.V., Manisha G.” Enhancement of disciples cognition levels using bloom's taxonomy in data
mining”In Journal of Advanced Research in Dynamical and Control Systems 2018.
4. Geetanjali “A Survey Paper on Twitter Opinion Mining
5. J. I. Sheeba “A Fuzzy Logic Based On Sentiment Classification.
6. Usage of the piechart from the GitHub.
7. Wikipedia to learn about the importance of opinion of the people and the sentimental analysis.
8. Android studio developers website to understand various concepts used in the project.
Authors: N., Omar, Z. Jano, A. Ahamat, Samer Ali Al-shami, A., Mat Aris
Paper Title: Possibility on Contamination of Upper MUSI Ground Water for Flow Water at River End
Abstract: The musi river historically provided farmers downstream of hyderabad with irrigation water for
the cultivation of paddy for the duration of and after the monsoon rains. Through the construction of weirs, river
water is retained in large and small reservoirs on the river from wherein it is diverted thru irrigation canals to
village tanks and agricultural fields. This paper focuses on the sample description and corrective requirements
after the survey samples at unique black points alongside musi. The presence heavy metals and microbiological
pollutants have made the groundwater dangerous for consuming at diverse places in hyderabad. It has also
proved that there is large issue of city groundwater recharge in this region. The internet urban recharge factor of
groundwater in this region changed into anticipated to be about 567. 51 mm/a and natural recharge element
turned into observed to be 52. 78 mm/a. The combination of tools carried out, the outcomes received and the
recommendations provided in this have a look at will be helpful for neighborhood planners and selection makers
to shield and restore the water assets on this location. The existing work also makes a speciality of the scope of
infection by float water immersion at 2d part of musi river in ground as nicely agriculture. The consequences
taken into consideration from 2017 june to may additionally 2019 for the actual identifications, the parameters
are y18 and y19 for graphical enter.
Keyword : Digitalization, Euro-pay Master Visa, Electronic Fund Transfer, Point of Sale, Technology
Acceptance Model (TAM).
References:
1. Abdul. M., (2010), Transaction size effects on consumers’ retail payment mode choice, International Journal of Retail & Distribution
Management, 38(6), 460-478.
2. Bennett, B, Conover, D, O’Brien, S, & Ad vincula, R, (2014), Cash continues to play a key role in consumer spending: Evidence from
the diary of consumer payment choice, San-Francisco Board of Governors of the Federal Reserve System.
3. Browne, F., X., & Cronin, D., (1997), Payment technologies, financial innovation, and Laissez-Faire banking: A further discussion of
the issues, In: Dorn, J.A. The Future of Money in the Information Age, Washington: Cato Institute, 15-20.
4. Bachas, P., Gertler, P., Higgins, S., & Seira, E., (2016), banking on trust: How debit cards help the poor to save more, Conn ecticut:
Yale University, NBER Working Paper No. 22463.
5. Caskey, J., P., & Sellon, G., H., (2005), Is the Debit Card Revolution Finally Here? Economic Review: Federal Reserve Bank of
Kansas City, 79(4), 79-95.
6. Complementary Currency Resource Centre (2013), online database of complementary currencies worldwide: Public area,
http://www.complementarycurrency.org/ccDatabase/, accessed 7th January 2015.
7. Dewan, S., G., & Chen, L., (2005), Mobile payment adoption in the US: A cross industry cross-platform solution, Journal of
Information Privacy & Security, 1-26.
8. Economy Watch, (2010), Malaysia Debit Card, Consumer Base Expanding, http://www.economywatch.com/debit-
card/international/Malaysia-DebitCard.html, accessed 7th January 2015.
9. Giulio, D., & Milani, C., (2013), Plastic money diffusion and usage: An empirical analysis on Italian households, Economic Notes,
42(1), 47-74.
10. Hall, J., Kilbank, S., Barbeau, M., & Kranakis, E., (2001), WPP: A secure payment protocol for supporting credit- and debit-card
transactions over wireless networks, Proceedings of the IEEE International Conference on Telecommunications (ICT), June,
Bucharest, Hong Leong Bank (2013).
11. Jonker, N., (2005), Payment instruments as perceived by consumers – A public survey Netherlands, Netherlands Central Bank, DNB
No. 053.
12. Kim, W., & Kim, H., (2004), Smart cards: Status, issues, and US adoption, Journal of Object Technology 3(5), 25-30.
13. Klee, E., (2006), Paper or plastic? The effect of time on check and debit card use at grocery stores, Washington D.C.: Board of
Governors of the Federal Reserve System.
14. López, L., E., & Roberts, E., B., (2002), First-mover advantages in regimes of weak appropriability: The case of financial services
innovations, Journal of Business Research, 55, 997–1005.
15. Noorazam, N., (2012), Malaysia's debit card revolution, New Straits Times.
16. Rochet, J., C., & Tirole, J., (2008), Tying in two-sided markets and the honour all cards rule, International Journal of Industrial
Organization, 26, 1333-1347.
17. Scholnick, B., Massoud, N., Saunders, A., Carbo-Valverde, S., & RodríguezFernández, F., (2008), the economics of credit cards,
debit cards and ATMs: A survey and some new evidence, Journal of Banking & Finance, 32, 1468-1483.
18. VisaEurope,(2013),Ourfees.http://www.visaeurope.com/en/about_us/our_business/fees_and_interchang e.aspx.
19. Wenninger, J., & Laster, D., (1995), the electronic purse. Current Issues in Economics and Finance, 1(1), 1-5
20. Worthington, S., (1995), The cashless society, International Journal of Retail and Distribution Management, 23, 31-41,
21. Wright, J., (2003), optimal card payment systems, European Economic Review 47, 587-612.
Authors: N., Omar, A., Ahamat, S., Sidek, Samer Ali Al-shami, M. A. Aripin, A., Mat Aris
Paper Title: The Benefits and Challenges of Practicing Work-Life Balance Among Women Entrepreneurs
Abstract: In Today’s Fast Paced Business World, The Ability To Achieve Work Life Balance (WLB) Is
Becoming More And More Difficult As People Are Constantly Pushed To Work Faster To Cope With An
Increasing Workload. This Paper Presents A Review Of The Challenges And Contribution (Benefit) Of Practice
Work – Life Balance. Women Entrepreneurial Success In Their Life And Business Always Being Connected
With The Excellent Management Of WLB. An Overview Of The Issues Surrounding Women Entrepreneur
Development Draw To The Extension Of More Literature Reviews. Therefore, 34 Articles Have Been Selected
And Analysed. There Was Found That Applying Of Work – Life Balance Was Increase Dual Earner For Family
Economy And Improving Productivity In The Business. Meanwhile The Main Challenges Of WLB
354. Implementation Among Woman Entrepreneurs Has Always Related To Time Management And Busy Schedule
At Work Place. Based On The Issues Identified, Work – Life Balance Strategies Are Proposed To Increased 2028-
Malaysian Woman Entrepreneurial Potential, Enhance Their Wellbeing In Life And Encourage Them To Part In 2033
Business.
Abstract: V2O5 And Nd:V2O5 Nanorods Were Prepared By Using Low Cost Sol-Gel Method And The Synthesized
Samples Were Analyzed Through XRD, SEM And HRTEM Techniques. The Structural Analysis Of The Processed V 2O5
And Nd:V2O5 Samples Are Exhibited In The Form Of Orthorhombic V2O5 Phase. The SEM And HRTEM Images Of The
Nd:V2O5 Sample Are Shown That The V2O5 Nonoparticles Appeared As Nonorods With Smooth Surface In Which Nd
Spherical Particles Are Decorated.
Keyword : V2O5 And Nd:V2O5 Nanorods, Sol-Gel Method, XRD, SEM And HRTEM Techniques.
References:
1. Y. Zhao, Z. Zhang, H. Dang and W. Liu, Synthesis of tin sulfide nanoparticles by a modified solution dispersion method, Mater ials
Science and Engineering B, 113, 2004, 175-178.
2. A. Venkatesan, N. R. K. Chandar, A. Kandasamy, M. K. Chinnu, K. N. Marimuthu, R. M. Kumara and R. Jayavel, Luminescence and
Electrochemical Properties of Rare Earths (Gd, Nd) Doped V 2O5 Nanostructures Synthesized By Non-Aqueous Sol-Gel Route, RSC
Adv., 5, 2015, 21778-21785.
357. 3. S. Sohila, M. Rajalakshmi, C. Muthamizhchelvan, S. Kalavathi, C. Ghosh, R. Divakar, C.N. Venkiteswaran, N.G. Muralidharan, A. K.
Arora and E. Mohandas, Synthesis and characterization of SnS nanosheets through simple chemical route, Materials Letters, 65, 2011, 2050-
1148-1150.
2052
4. A. Liu, M. Ichihara, I. Honma and H. Zhou, Vanadium-oxide nanotubes: Synthesis and template-related electrochemical properties,
Electrochemistry Communications, 9, 2007, 1766-1771.
5. B. Li, Y. Xu, G. Rong, M. Jing and Y. Xie, Vanadium pentoxide nanobelts and nanorolls: from controllable synthesis to investigation
of their electrochemical properties and photocatalytic activities, Nanotechnology, 17, 2006, 2560-2566.
6. M. Li, G. Sun, P. Yin, C. Ruan and K. Ai, Controlling the Formation of Rodlike V2O5 Nanocrystals on Reduced Graphene Oxide for
High-Performance Supercapacitors, ACS Appl. Mater. Interfaces, 5, 2013, 11462-11470.
7. S. A. Hakim, Y. Liu, G. S. Zakharova and Chen, Wen, Synthesis of vanadium pentoxide nanoneedles by physic al vapour deposition
and their high sensitive behavior towards acetone at room temperature, RSC Adv, 5, 2015, 23489-23497.
8. J. Zhu, L. Cao, Y. Wu, Y. Gong, Z. Liu, H. E. Hoster, Y. Zhang, S. Zhang, S. Yang, Q. Yan, P. M. Ajayan and R. Vajtai, Building 3D
Structures of Vanadium Pentoxide Nanosheets and Application as Electrodes in Supercapacitors, Nano Lett., 13, 2013, 5408−5413.
9. G. Vijayaprasath, R. Murugan, S. Palanisamy, N. M. Prabhu, T. Mahalingam, Y. Hayakawa and G. Ravi, Structural, optical and
antibacterial activity studies of neodymium doped ZnO nanoparticles, Journal of Materials Science: Materials in Electronics, 26,
2015, 7564–7576.
10. S. B. Satpal and A. A. Athawale, Synthesis of ZnO and Nd Doped ZnO Polyscales for Removal of Rhodamine 6G Dye under UV
Light Irradiation, Mater. Res. Express, 5, 2018, 85501.
11. D. Govindarajan, V. Uma Shankar and R. Gopalakrishnan, Supercapacitor behavior and characterization of RGO anchored V 2O5
nanorods, Journal of Materials Science: Materials in Electronics, 30, 2019, 16142-16155.
Paper Title: SEM Analysis o Archaeological Pottery Samples from Karur, Tamilnadu, India
Abstract: The aim of the present study is to find out the presence of minerals, raw materials used and the
ceramic technology of the past in the selected pottery samples from the important archeological site Karur of
Karur district, Tamil Nadu, India. Two Pottery samples of the period 250BC are collected from different depths
of the excavated site are used for the present analysis. Scanning Electron Microscopy (SEM) has been used for
the analysis. Examination of pottery samples under SEM is an excellent micro analytical technique used for the
study of clay mineral configuration, fabric, texture and growth mechanisms. The presence of quartz, feldspar,
montmorillonite, kaolinite, mullite in the selected pottery samples has been identified. Firing the pottery samples
in the reducing atmosphere technique is also brought out.
359.
Keyword : SEM, mullite, feldspar, kaolinite, montmorillonite, quartz.
2060-
References: 2062
1. Adams, P.J., Geology and ceramics, London Her Majesty’s stationary office, (1961)
2. Gopal Renjan and Rao A.S.R. Basic and Applied Soil Mechanics.
3. Maniatis, Y., Tite, M.S., Thera and Aegean world I, London (1978).
4. Krishnamurthy, R.,”Sangam age Tamil Coins”, Garnet Publications, Madras (1977)
5. Karur Excavations-Report by State department of Archaeology, Government of Tamilnadu, Chennai, India.
6. Herbert Insley and Van Derck Frechette, Academic Press Inc., Publishers, NewYork (1955)
7. Tite, M.S., Maniatias, Y., Nature. 257 (5522), 122 (1975).
8. Wenk, H.R.,”Electromicroscopy in Mineralogy”, Springer-Verlog-Berlin-Heidelberg, New York (1976)
9. Maniatias,Y.,Tite,M.S.Thera and the Aegean World I, London(1978)
10. Cheettan, A.K; Peter Day, “Solid state Chemistry Techniques” 74(1987).
11. Banfield, F.Eggleton,A.,Clay and Clay minerals,38(1),77 (1990)
12. N. Ravishankar and C. Barry Carter Revista Latinoamericana de Metalurgia y Materiales, Vol 19, 1999, 7-12
13. M. Garcıa-Heras Journal of Archaeological Science 24, 1003–1014, (1997)
14. Luminita Moraru and Florica Szendrei European Journal of Science and Theology, June Vol.6, No.2, 69-78, 2010.
15. Mansour Shqiarat, Fawzi Abudanh, Hani Alnawafleh Mediterranean Archaeology and Archaeometry, Vol. 11, No. 2, pp. 99 -106, 2011
16. Gürsel Yanik, Rüstem Bozer, Muharrem Çeken, Fahri Esenli, Hasan Gocmez Ceramics – Silikáty 56 (3) 261-268 (2012)
17. F.Matau et al Journal of advanced research in Physics4 (1), 011304(2013).
Authors: Mayank Arya Chandra, S S Bedi, Shashank Chandra, Suhail Javed Quraishi
Paper Title: Phishing Website Classification using Least Square Twin Support Vector Machine
Abstract: Phishing is one among the luring procedures used by phishing attackers in the means to abuse the
personal details of clients. Phishing is earnest cyber security issue that includes facsimileing legitimate website
to apostatize online users so as to purloin their personal information. Phishing can be viewed as special type of
classification problem where the classifier is built from substantial number of website's features. It is required to
identify the best features for improving classifiers accuracy. This study, highlights on the important features of
websites that are used to classify the phishing website and form the legitimate ones by presenting a scheme
Decision Tree Least Square Twin Support Vector Machine (DT-LST-SVM) for the classification of phishing
website. UCI public domain benchmark website phishing dataset was used to conduct the experiment on the
proposed classifier with different kernel function and calculate the classification accuracy of the classifiers.
Computational results show that DT-LST-SVM scheme yield the better classification accuracy with phishing
websites classification dataset.
Keyword : Least square, SVM, Twin SVM, Phishing, kernel, Classification, Machine Learning.
References:
1. Z. Ramzan and C. Wuest, “Phishing Attacks: Analyzing Trends in 2006,” CEAS 2207- 4th Conference on Email and Anti-spam,
Mountain View, California USA, 2007.
2. H. Zuhir, A.Selmat and M. Salleh, “The Effect of Feature Selection on Phish Website Detection an Empirical Study on Robust Feature
Subset Selection for Effective Classification,” International Journal of Advanced Computer Science and Applications, vol.6, no.10, pp.
221-232, 2015.
3. N. Abdelhamid, A. Ayesh and F. Thabtah, “Phishing Detection based Associative Classification Data Mining,” Expert System with
Applications, vol.41(13), pp.5948-5959, 2014.
4. M. Al-diabat, “Detection and Prediction of Phishing Websites using Classification Mining Techniques,” International Journal of
Computer Applications, vol.147, no.5, pp.5-11, 2016.
5. A. A. Akinyelu and A. O. Adewumi, “Classification of Phishing Email Using Random Forest Machine Learning Technique,” Journal
of Applied Mathematics, vol.2014, pp.6, 2014.
6. M. A. Chandra and S. S. Bedi, “Survey on SVM and their application in image classification,” International Journal of Information
Technology, 2018. https://doi.org/10.1007/s41870-017-0080-1.
7. A. Jøsang, B. AlFayyadh, T. Grandison, M. AlZomai and J. McNamara, "Security Usability Principles for Vulnerability Analysis and
360. Risk Assessment," Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, pp. 269-278,
2007. 2063-
8. A. Hodzic, J. Kevric and A. Karadag, “Comparison of Machine Learning Technique in Phishing Website Classification,” International
Conference of Economic and Social Studies (ICESoS), pp.249-256, Sarajevo, 2016. 2068
9. Gartner, Incorporated. Available at, http://www.gartner.com/technology/home.jsp.
10. Lennon, M. Security Week. Available at, http://www.securityweek.com/cisco-targeted-attacks-cost-organizations-129-billion-annually,
2011.
11. "APWG Phishing Attack Trends Reports," 1st Quarter July 31, 2018.
12. "APWG Phishing Attack Trends Reports," 2 nd Quarter October 18, 2018.
13. "APWG Phishing Attack Trends Reports," 3 rd Quarter December 11, 2018.
14. "APWG Phishing Attack Trends Reports," 4 th Quarter Published March 4, 2019
15. "APWG Phishing Attack Trends Reports" 1st Quarter May 15, 2019.
16. "APWG Phishing Attack Trends Reports" 2nd Quarter Sept 12, 2019
17. C. Cortes and V. Vapnik, “Support Vector Network,” Machine Learning, vol. 20 (3), pp.273-297, 1995.
18. I. Guyon, J. Weston, S. Barnhill and V. Vapnik, “Gene Selection for Cancer Classification using Support Vector Machines,” Machine
Learning, vol. 46 (1-3), pp.389-422, 2002.
19. G. L. Prajapti and A. Patle, “On performing Classification using SVM with Radial Basis and Polynomial Kernel Functions,” 3rd
International Conference of Emerging Trends in Engineering and Technology, Goa, India, pp. 512-515, 2010.
20. J. A. K. Suykens and J. Vandewalle, “Least Square Support Vector Machine Classifiers,” Neural Processing Letters, vol. 9 (3), pp.
293-300, 1999.
21. J. A. K. Suykens, T. V. Gestel, J. D. Brabanter, B.D. Moor and J .Vandewalle, “ Least Square Support Vector Machines,” World
Scientific publishing Co., Singapore, ISBN 981-238-151-1, 2002.
22. G. Fung and O. L. Mangasarian, “Proximal Support Vector Machine Classifiers,” Proceedings KDD 01, 7th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, pp.77-86, San Francisco, California, 2001.
23. M. A. Kumar and M. Gopal, “Least Square Twin Support Vector Machines for Pattern Classification,” Expert Systems with
Applications, vol. 36 (4), pp. 7535-7543, 2009.
24. M. A. Kumar and M. Gopal, “Least Squares Twin Support Vector Machines for Text Categorization,” 2015 39th National Systems
Conference (NSC), pp.1-5, Noida, 2015.
25. M. A. Chandra and S. S. Bedi, “Survey on Support Vector Machine (SVM) and Their Application in Technical Diagnostics,” JUET
Research Journal of Science and Technology, vol.4, no.1, 2017.
26. M. A. Chandra and S. S. Bedi, “Benchmarking Tree based Least Squares Twin Support Vector Machine Classifiers” International
Journal of Business Intelligence and Data Mining, 2018, DOI: 10.1504/IJBIDM.2018.10009883.
27. M. A. Chandra and S. S. Bedi, “A Twin Support Vector Machine Based Approach to Classifying Human Skin,” 2018 4th International
Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2018, pp. 1-5.
28. UCI Machine Learning Repository: Phishing Websites Data Set, from https://archive.ics.uci.edu/ml/datasets/Phishing+Websites,
Retrieved May 9, 2019.
29. R. M. Mohammad, F. Thabtah and L. McCluskey, “Intelligence Rule Based Phishing Website Classification,” IET Information
Security, vol. 8, no. 3, pp. 153-160, 2014.
Keyword : device, a roller, the elastic plug, a polymeric composition, durability, the machine unit, the
movement law, parameters, full factor, rigidity, frequency, the expense.
References:
1. V.V.Veselov, I.D.Gorbunov, I.V.Molkova. The device for drawing liquid phase polymer on cuts of details of a cut. News of high
schools. Technology of the textile industry.- 2007, №3.
2. V.V.Veselov, G.V.Kolotilova. Chemicalixation of technological processes of the sewing enterprises: the Textbook / Under 2069-
V.V.Veselov's edition. - Ivanovo: ИГТА, 1999. 2074
3. Mansurov M. A, Djuraev А,Dj Miraminova Z. Comparative characteristics of seams of products from knitted materials. The
international scientific forum of "Progress-2013", Russia, Ivanovo. May, 27-29th 2013.
4. Mansurova M.А., Djapanpaizova V.M., Mamatova D.А., Maxmudova М.А., Toreboyev B.P. Reception of two threads of a chain stitch
of new type 401 with the help rotate a loop. Science and world International scientific journal № 3(19), 2015.
5. Behbudov S.H., Tashpulatov S.S., Djuraev А.Dj., Isroilova B. G. The device for drawing of a polymeric composition on ground o ff
details of clothes//R.Uzb's Patent. № FАР 00917.. №6. 5/21/2014
6. Mansurova M.A., Djurayev A. Dj., Behbudov Sh. H., Tashpulatov S.Sh. Mathematical model of dynamics of device for applying
polymer composition on grind parts of the clothes. European Sciences review Scientific journal № 11–12 2016 (January–February)
129-131
7. Baubekov S.D., Djurayev A.Dj Dynamics of cars and mechanisms. Almaty 2012.
8. Theory of machines. R.S. KYURMI., J.K.GURTA., NEWDEHLI-110055// Reprint-2011
9. Tikhomirov of Century B. Mathematical methods of planning of experiment [Text] / V.B.Tikhomirov. - TH.: the Easy industry, 1968.
10. Sebastiyanov A.G.method and research means mexanik technological processes. М: MGTU. 2007.
Keyword : Graph, Eigen Value, Spectrum, Laplacian, Normlized Laplacian, Social Network.
References:
1. I. Chavel, Isoperimetric inequalities, Differential geometric and analytic perspectives, Cambridge Tracts in Mathematics, vol. 145,
Cambridge University Press, Cambridge, 2001.
2. S.T. Yau and R.M. Schoen, Differential Geometry, International Press, Cambridge, Massachusetts, 1994.
3. P. Diaconis, “Group representations in probability and statistics”, Institute of Mathematical Statistics Lecture Notes — Monograph
Series, 11, Institute of Mathematical Statistics, Hayward, CA, 1988.
4. F. Kirchhoff, “Uber die Aufl¨osung der Gleichungen, auf welche man bei der Untersuchung der
linearenVerteilunggalvanischerStr¨omegef¨uhrtwird”, Ann. Phys. Chem., vol. 72, 1847, 497−508.
5. W.E. Donath and A.J. Hoffman, “Algorithms for Partitioning of Graphs and Computer Logic Based on Eigenvectors of Connection
Matrices”, IBM Technical Disclosure Bulletin, vol. 15(3), 1972, 938–944.
6. W.E. Donath and A.J. Hoffman, “Lower Bounds for the Partitioning of Graphs”, IBM Journal of Research and Development, vol.
17(5), 1973, 420–425.
362. 7. S.T. Barnard and H.D. Simon, “A Fast Multilevel Implementation of Recursive Spectral Bisection for Partitioning Unstructured
Problems”, In Proceedings of the 6th SIAM Conference on Parallel Processing for Scientific Computing, 1993, 711–718.
8. R.B. Boppana, “Eigenvalues and Graph Bisection: An Average-Case Analysis (Extended Abstract),” In Proceedings of the 28th 2075-
Symposium on Foundations of Computer Science, 1987, 280–285. 2081
9. M. Fiedler, “A Property of Eigenvectors of Nonnegative Symmetric Matrices and its Application to Graph Theory”, Czechoslovak
Mathematical Journal, vol. 25(4), 1975, 619–633.
10. B. Hendrickson and R. Leland, “An Improved Spectral Graph Partitioning Algorithm for Mapping Parallel Computations”, SIAM
Journal on Scientific Computing, vol. 16(2), 1995, 452–469.
11. A. Pothen, H.D. Simon and K.P. Liou, “Partitioning Sparse Matrices with EigenvectorsofGraphs”,
SIAMJournalonMatrixAnalysisandApplications, vol. 11(3), 1990, 430–452.
12. H.D. Simon, “Partitioning of Unstructured Problems for Parallel Processing”, Computing Systems in Engineering, vol. 2(2), 1991, 135–
148.
13. L.A.N. Amaral and J.M. Ottino, “Complex networks - augmenting the framework for the study of complex systems”, European
Physical Journal B, vol. 38(2), 2004, 147−162.
14. F.M. Atay and T. Biyikoglu, “Graph operations and synchronization of complex networks”, Physical Review E, vol. 72(1), 2005.
15. F.M. Atay, T. Biyikoglu and J. Jost, “Synchronization of networks with prescribed degree distributions”, IEEE Transactions On
Circuits and Systems I-Regular Papers, vol. 53(1), 2006, 92−98.
16. A. Banerjee and J. Jost, “Spectral plots and the representation and interpretation of biological data”, Theory in Biosciences, vol. 126(1),
2007, 15−21.
17. P.S. Bearman, J. Moody and K. Stovel, “Chains of affection: The structure of adolescent romantic and sexual networks”, American
Journal of Sociology, vol. 110(1), 2004, 44−91.
18. J. Berg, M. Lassig and A. Wagner, “Structure and evolution of protein interaction networks: a statistical model for link dyna mics and
gene duplications”, Bmc Evolutionary Biology, vol. 4(51), 2004.
19. G. Caldarelli, A. Erzan and A. Vespignani, Preface on “applications of networks”, European Physical Journal B, vol. 38(2), 2004, 141.
20. G. Chen, G. Davis, F. Hall, Z. Li, K. Patel and M. Stewart, “An interlacing result on normalized laplacians”, Journal on Discrete
Mathematics, vol. 18(2), 2005, 353−361.
21. F.R. Chung and L. Lu, Complex graphs and networks, Providence, RI: American Mathematical Society, 2006.
22. L.H. Greene and V.A. Higman, “Uncovering network systems within protein structures”, Journal of Molecular Biology, vol. 334(4),
2003, 781−791.
23. R. Guimera, S. Mossa, A. Turtschi and L.A.N. Amaral, “The worldwide air transportation network: Anomalous centrality, community
structure, and cities’ global roles”, Proceedings of the National Academy of Sciences of the United States of America, vol. 102(22),
2005, 7794−7799.
24. J. Jost, “Formal aspects of networks: what perspectives can mathematics offer to biology and neurobiology”, In J.F. Feng, J. J ost &
M.P. Qian (Eds.), Networks: from biology to theory, 2007, p. 37, Springer.
25. M.E.J. Newman, “Scientific collaboration networks. i. network construction and fundamental results”, Physical Review E, vol. 64(1),
2001a.
26. M.E.J. Newman, “Scientific collaboration networks. ii. shortest paths, weighted networks, and centrality”, Physical Review E, vol.
64(1), 2001b.
27. M.E.J. Newman, “The structure of scientific collaboration networks”, Proceedings of the National Academy of Sciences of the United
States of America, vol. 98(2), 2001c, 404−409.
28. M.E.J. Newman, “The structure and function of complex networks”, SIAM Review, vol. 45(2), 2003, 167−256.
29. M.E.J. Newman, “Coauthorship networks and patterns of scientific collaboration”, Proceedings of the National Academy of Sciences of
the United States of America, vol. 101, 2004, 5200−5205.
30. C. Song, S. Havlin and A.H. Makse, “Self-similarity of complex networks”, Nature, vol. 433(27), 2005, 392−395.
31. T. Bıyıkoglu, Leydold and P. Stadler, “Laplacian eigenvectors of graphs”, Lecture Notes in Mathematics, vol. 1915, 2007, Springer,
Library of Congress Control Number: 2007929852, Springer Berlin Heidelberg New York.
32. P. Zhu and R. Wilson, “A study of graph spectra for comparing graphs”, In P. T. William Clocksin Andrew Fitzgib bon (Ed.),
Proceedings of the british machine vision conference, 2005, Oxford, U.K.
33. M. Ipsen and A.S. Mikhailov, “Evolutionary reconstruction of networks”, Physical Review E, vol. 66(4), 2002.
34. H. Liu, S.K. Al-Khafaji and A.E. Smith, “Prediction of wireless network connectivity using a Taylor Kriging approach”, International
Journal of Advanced Intelligence Paradigms, vol. 3(2), 2011, 112–121.
35. V.K. Murthy and E.V. Krishnamurthy, “Learning to capture the functions of genetic regulatory networks using graph mo tifs”,
International Journal of Advanced Intelligence Paradigms, vol. 4(2), 2012, 185–197.
36. V. Yegnanarayanan and G.K. Umamaheswari, “On Rolf Nevalinna Prize winners collaboration graph”, Proceedings of International
Conference on Mathematics and Computer Science, Loyola College, Chennai, 2010, 42–50.
37. V. Yegnanarayanan and G.K. Umamaheswari, “On Rolf Nevanlinna Prize winners collaboration graph”, The Journal of Combinatorial
Mathematics and Combinatorial Computing, JCMCC, vol. 79, 2011, 43–58.
38. V. Yegnanarayanan and G.K. Umamaheswari, “On Rolf Nevanlinna Prize winners collaboration graph II”, International Journal of
Scientific and Research, India Publications, vol. 2(4), 2012, 354–367.
39. V. Yegnannarayanan, E.B. Valentina and G. Chitra, “On certain graph domination numbers and applications”, International Journal of
Advanced Intelligence Paradigms, vol. 6(2), 2014, 122–135.
40. V. Yegnanarayanan, A. Renuka Lakshmi and Valentina E. Balas, “On domination and total domination number of a collaboration
graph”, Int. J. Advanced Intelligence Paradigms, vol. 9(5/6), 2017.
Keyword : Toll Expressways; Public-Private Partnership (PPP); Critical Success Factors (CSFs); Trust;
Governmental Influence; Project Viability.
References:
1. Abawi, K. (2013). Data collection instruments (questionnaire & interview). Geneva: Geneva Foundation for Medical Education and
Research.
2. Aerts, G., Grage, T., Dooms, M., & Haeendonck, E. (2014). Public Private Paertnership for the provision of port Infrast ructure: An
Explorative Multi-Actor Perspective on Critical Success Factors. Asian Journal of Shipping and Logistic,, 273-298.
3. Akhtar, M. I. (2016). Research in Social Science: Interdisciplinary Perspectives. Research Design.
4. Akintola Akintoye, Matthias Beck & Cliff Hardcastle (2003). Public Private Partnership: Managing Risks and Opportunities.
Blackwell Publishing Ltd.
5. Akintola, A., Matthias, B., & Cliff, H. (2003). Public Private Partnership: Managing Risks and Opportunities. Blackwell Publishing.
6. Alaaraj, S., Mohamed, Z. A., & Ahmad Bustamam, U. S. (2018). External Growth Strategies and Organizational Performance in
Emerging Markets: The Mediating Role of Inter-Organizational Trust. Review of International Business and Strategy, 28(2), 206–222.
https://doi.org/10.1108/RIBS-09-2017-0079
7. Alaarj, S., Abidin-Mohamed, Z., & Bustamam, U. S. B. A. (2016). Mediating Role of Trust on the Effects of Knowledge Management
Capabilities on Organizational Performance. Procedia - Social and Behavioral Sciences, 235(2016), 729–738.
https://doi.org/10.1016/j.sbspro.2016.11.074
8. Ameyaw, E. E., & PC, C. A. (2016). Critical success factors for public-private partnership in water supply projects. . Facilities, 34(3/4),
124-160.
9. Babatunde , S. O., Perera, S., Zhou, L., & Udeaja, C. (2016). Stakeholder perceptions on Critical Success Factors For Public-Private
Partnership Projects In Nigeria. Built Environment Project and Asset Management, 74-91.
10. Bernardino, Joao, Z., & Carlos, M. (2010). Applying Social Marginal cost pricing in rail PPPs:Present state, drawbacks and ways
forward. Research in Transportation economics 30, 59-73.
11. Burns, N., & Grove, S. K. (2003). The Practice of Nursing Reseaarch: Conduct, critique and utilization. Toronto: WB Saunders.
12. Chua, Y. P. (2006). Research Statistic. Shah Alam: McGraw-Hill Education.
13. Creswell, J. W. (2012). Educational research: planning. Conducting, and Evaluating.
14. Fahim, Thaheem , M. J., & Ullah. (2016). Six Sigma in construction: a review of critical success factors. International Journal of Lean
Six Sigma, 171-186.
15. Hashim, H. A., Low, S. T., & Sapri, M. (2016). Public private partnership (PPP) facilities management for healthcare services in
Malaysia: the challenges of implementation. Journal of Facilities Managemen, 350-362.
16. Hwang, B. G., & NG, H. B. (2016). Project network management: risks and contributors from the viewpoint of contractors and sub -
contractors. Technological and Economic Development of Economy, 631-648.
17. Ismail, S. (2013). Critical Success Factor of Public Private Partnership (PPP) Implementation In Malaysia. Asian-Pacific Journal of
Business Administration, 6-19.
18. J, L., TingTing, Wang, Y., & Wilkinson, S. (2016). Identifying critical factors affecting the effectiveness and efficiency of tendering
processes in Public–Private Partnerships (PPPs): A comparative analysis of Australia and China. . International Journal of Project
management, 701-716.
19. Jin, X. H. (2012). Factor analysis of partners' commitment to risk management in public-private partnership projects. Construction
Innovation, 297-316.
20. Mota , J., & Moreira, A. C. (2015). The Importance of Non-Financial Determinants on Public-Private Partnerships in Europe.
International Journal of Project Management, 33(7), 1563-1575.
21. OECD. (2010). Dedicated Public Private Partnership UUnits: A Survey of Institutional and Governance Structure. Organization for
Economic Co-operation and Development.
22. Osei-Kyei, R., & Chan A, P. C. (2015). Review of Studies On The Critical Success Factors For Public-Private Partnership (PPP)
Projects from 1990 to 2013. Science Direct JPMA, 1335-1346.
23. Alaarj, S., Mohamed, Z. A., & Bustamam, U. S. A. (2017b). The Effect of Knowledge Management Capabilities on Performance of
Companies : A Study of Service Sector. International Journal of Economic Research, 14(15), 457–470.
24. Osei-Kyei, R., Chan A, P. C., & Ameyaw, E. E. (2017). A Fuzzy Synthetic Evaluation Analysis of Operational Management Critical
Success Factors For Public-Private Partnership Infratructure Projects. Bencmarking: An International Journal 24(7), 2092-2112.
25. Alaarj, S., Zainal, A. M., & Bustamam, U. (2015). The Effect of Knowledge Management Capabilities on the Performance of
Malaysian Large-Scale Organizations: An Empirical Study. Advances in Global Business Research, 12(1), 1024–1038.
26. Panayides, P. M., Parola, F., & Lam J, S. L. (2015). The Effect ofInstitutional Factors on Public-Private Partnership Success in Ports.
Transportation Research Part A: Policy and Practice , 71, 110-127.
27. Perić Hadžić, A., Jugović, A., & Perić, M. (2015). Criteria for the management partnership model in Croatian seaports. Economic
research-Ekonomska istraživanja,, 226-242.
28. Sarvari, H., Valipour, A., Nordin, Y., & Norhazilan , M. N. (2014). Risk ranking of Malaysian public private partnership projects. .
Applied Mechanics and Materials (Vol. 567, pp. 613-618) In Trans Tech Publications., 613-618.
29. Sinisammal, J., Leviakangas, P., Autio, T., & Hyrkas, E. (2016). Entrepreneurs Perspectives on Public-Private Partnership in Health
Care and Social Services. J Health Organ Manag, , 174-191.
30. Squires, D., & Tabor, S. (1991). Technical Efficiency and Future Production. The developing economies 29, 3.
31. Alaarj, S., Mohamed, Z. A., & Bustamam, U. S. A. (2017a). Do Knowledge Management Capabilities Reduce the Negative effect of
Environment Uncertainties on Organizational Performance? A Study of Public Listed Companies in Malaysia. International Journal of
Economic Research, 14(15), 443–456.
32. The World Bank. (2006). India: "Building Capacities for Public Private Partnership",Energy and Infrastructure Unit and Financ e and
Private Sector DevelopmentUnit South Asia Region.
33. Trangkanont, S., & Charoenngam, C. (2014). Critical failure factors of public-private partnership low-cost housing program in
Thailand. Engineering, Construction and Architectural Management, 421-443
34. Warsen, R., Nederhand, J., Klijin, E. H., Grotenberg, S., & Koppenjan , J. (2018). What makes public-private partnerships work?
Survey research into the outcomes and the quality of cooperation in PPPs. Public Management Review, 20(8), 1165-1185.
35. Zhang, S., Chan, A. P., Feng, Y., Duan, H., & Ke, Y. (2016). Critical review on PPP research - A search from the chinese and
International Journals. International Journal of Project Management, 597-612.
36. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)
Paper Title: Breaking The Silence to Accentuate Ostracism: an Audacious Response of Anupama
Abstract: Contemporary Indian English fiction has occupied the dynamic place in modern times. Indian
English fiction blossomed rapidly due to the emergence of women writers. These women writers tried to express
the abhorrent facets of human life. The twenty first century women writers try to awaken the readers about the
existing realities of contemporary social values. Sudha Murty is one such proficient writer, who tries to instill
many social values of life through her writings. Mahashweta is one such noteworthy novel by Mrs. Murty. It is
an inspiring tale about a courageous woman, Anupama, who travels in the world of marriage which is full of
illusions, betrayals and the social stigma. This paper analyses the hidden veracities behind Anupama’s fairy-tale
365.
marriage, and her hardships in facing the society because of leukoderma. Murty explored the outrageous effects
of ostracism - the existing social exploitation- in this novel so diligently through her protagonist Anupama and 2098-
her daring revolt in overcoming the atrocities of mankind in order to survive in this world as a mere human 2100
being.
Authors: Garina E.P., Garin A.P., Romanovskaya E.V., Andryashina N.S., Chelnokova E.A.
368. Authors: Kuruvilla John, Saiju Paulose, Priya. M. Tony, Aleena Thomas, Lija Rachel Mathew
Paper Title: Design of Precrash System for Smart Cars by using Li-Fi
Abstract: In this paper we proposed a system to avoid collision between vehicles by using light fidelity (Li-
Fi) technology. The data transmission from one vehicle to another is facilitate with the help of car to car
communication (C2C). The model consists of Li-Fi circuit, Arduino UNO, Ultrasonic Range Sensor, Servo
Motor. The transmitter section will be placed on the rear light of the leading car and the receiver section will be
placed on the front of the following car. The transmitter section placed on the leading car will sent the calculated
speed to the receiver section placed on the following car and according to the data received the speed of the
following car will change such that it avoids collision. The system makes use of the visible light spectrum for
communication between vehicles. Hence the collision detection system become cheaper.
Keyword : Collision, Detection, Li-Fi, Car to Car Communication, Visible Light Spectrum.
References:
1. Chnusheng Zhu., Victor C.M. Leung, Lei Shu Edith C.-H. Ngai., “Green Internet of Things for Smart World.”, IEEE. Access, Special
Section On Challenges for Smart Worlds.”, vol.3, pp.2151-2162., November .2015.
2. Mahadevappa Harish., “A study on air pollution by automobiles in Bangalore city”, Management Research and practice, vol.4., issue
3, pp.25-36., 2012.
3. Tao Jiang., Uma Ayyer., Anand Tolani,, Sajid Hussain., “Self-driving Cars: disruptive or incremental.?”, Applied Innovation Review.,
Issue 1., June 2015. 2110-
4. Harald Haas, Liang Yin., Yunlu Wang and Cheng Chen, “What is Li-Fi?”, Journal of Lightwave Technology.”, vol.34, Issue. 6, pp. 2114
1533-1544, 2016.
5. Pooja Bhately and Ratul Mohindra., “Smart vehicular communication system using Li Fi Technology.”, in proc. International
Conference on Computation of Power, Energy Information and Communication(ICCPEIC.),.2016.
6. Rahul Sharma, Raunak and Akshay Sanganal, “Li-Fi Technology Transmission of data through light,”, Int.J.Computer Technology.&
Applications, vol.5,pp. 150-154, 2014.
7. M.A Berlin and S. Muthusundari, “Safety Distance Calculation for Collision Avoidance in Vehicular ad hoc-Networks.”, .Scholars
Journal of Engineering and Technology.(SJET)., Volume 4,Issue. 1,pp.63-69,2016.
8. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “A Novel Design of Synchronous Counter for Low Power and High-Speed
Applications,” International Journal of Engineering and Advanced Technology, vol. 8, issue. 4, pp. 779-783, 2019.
9. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Effect of clock gating in conditional pulse enhancement flip-flop for low power
applications,” International Journal of Electrical Engineering and Informatics, vol. 7. No. 2, pp. 357-365, 2019.
10. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “ Design of conditional pulse enhancement flip-flop embedded with clock gating
and signal feed-through mechanism,” Journal of Engineering Science and Technology, vol. 14, no. 4, pp. 2000-2012, 2019.
11. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Impact of Pulse-Triggered Flip-Flops in Low Power Applications,” Journal of
Advance Research in Dynamical and Control Systems, vol. 10, issue. 1, pp. 298-306, 2018.
12. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Design of low power and high speed implicit pulse flip-flop and its application,”
International Journal of Engineering and Technology, vol. 7, no. 3, pp. 1893-1898, 2018.
13. Kuruvilla John, Vinod Kumar R.S., and Kumar S.S., “Performance Comparison of Explicit Pulsed Flip-Flops in Low Power and High-
Speed Application,” Proceedings of International Conference on Circuits and Systems in Digital Enterprise Technology, Kerala, India,
Dec. 2018.
369.
Keyword : Fiber Glass, Epoxy resin LY-556, Hardener HY-55, Teflon sheets
2115-
References: 2118
1. .S.K.Prasad, “Hardy Composites’’ publication and information direct irate (CSIR) New Delhi, 5(1992).
2. J.Varma, and L.A.Berguland, “Mechanics of Fiber composite materials”, 1996.
3. K.Guduri, A.Varadarajula and A.S.Luyt, “Effect of alkali treatment on the flexural properties of Hildegardia fabric composite s”,
Journal of Applied Polymer Science, Vol.102, PP 1297-1302 (2006).
4. G. Sebe, N.S. Cetin, C.A.S. Hill, and M. Hughes, “RTM hemp fiber-reinforced polyester”, Appl. Compos. Mater., 7: 341- 349 (2000).
5. W. Thielemans, E. Can, S.S. Morye, and R.P. Wool, “Novel applications of lignin in composite materials”, J. Appl. Polym. Sci., 83:
323-331 (2002).
6. Annual Book of ASTM Standards (ASTM Publishers, Philadelphia), 8: D3039, PP. 59 (1993).
7. M.V.D. Sousa, S. N. Monteiro, and J.R.M.D. Almeida, “Evaluation of pre- treatment, size and molding pressure on flexural
mechanical behavior of chopped bagasse–polyester composites”, Polym. Test., 23: 253–258 (2004).
8. R.V. Silva, E.M.F. Aquino, L.P.S. Rodrigues and A.R.F. Barros, “Curaua/glass hybrid composite: The effect of water aging on the
mechanical properties, J. Reinf. Plast. Compos., 28: 1857-1868 (2009).
9. J.C. Lynn, “Polymer composite characterization for automotive structural applications”, J. Comp. Tech. Rese., 12: 229–231(1990).
10. E. Habak, “Mechanical behaviour of woven glass fiber reinforced composites under impact compression load”, Composites, 22:129–
134 (1991).
2119-
Keyword : Renewable energy, Flapping Panel, Permanent Magnet Generator, 2122
References:
1. Dag Herman Zeiner-Gundersen, “A novel flexible foil vertical axis turbine for river, ocean, and tidal applications”, Applied
Energy, Volume 151, 1 August 2015, Pages 60-66
2. Fons Huijs, Rogier de Bruijn, Feike Savenije, “Concept Design Verification of a Semi-submersible Floating Wind Turbine Using
Coupled Simulations”, Energy Procedia, Volume 53, 2014, Pages 2-12
3. D. J. Willis, C. Niezrecki, D. Kuchma, E. Hines, M. Rotea, “Wind energy research: State-of-the-art and future research directions”
Renewable Energy, Volume 125, September 2018, Pages 133-154
4. Wei Li, Hongbin Zhou, Hongwei Liu, Yonggang Lin, Quankun Xu, “Review on the blade design technologies of tidal current turbine
Renewable and Sustainable Energy Reviews”, Volume 63, September 2016, Pages 414-422
5. Pongpak Lap-Arparat, Thananchai Leephakpreeda “Real-time maximized power generation of vertical axis wind turbines based on
characteristic curves of power coefficients via fuzzy pulse width modulation load regulation” Energy, Volume 182, 1 September
2019, Pages 975-987
6. Arian Hosseini, Navid Goudarzi “Design and CFD study of a hybrid vertical-axis wind turbine by employing a combined Bach-type
and H-Darrieus rotor systems” Energy Conversion and Management, Volume 189, 1 June 2019, Pages 49-59
7. Sahishnu R. Shah, Rakesh Kumar, Kaamran Raahemifar, Alan S. Fung “Design, modeling and economic performance of
a vertical axis wind turbine” Energy Reports, Volume 4, November 2018, Pages 619-623
8. Jia Guo, Pan Zeng, Liping Lei “Performance of a straight-bladed vertical axis wind turbine with inclined pitch axes by wind tunnel
experiments” Energy, Volume 174, 1 May 2019, Pages 553-561
Paper Title: Sentimental Analysis and Detection of Rumours for Social Media Data using Logistic Regression
Abstract: Over the last decade ,the Internet has become an ubiquitous and enormous suffuse medium of
the user generated content and self-opinionated knowledge. Users currently have the facility to specify their
views, opinions and ideas publically. Victimizing social media platform is a place where people can express
their mindsets and feelings in a well associated manner and hence is productive and economical . These ever-
growing subjective knowledge are doubtless, an especially made for supply of data of any reasonably method
process. The Sentiment Analysis aims at distinctive self-opinionated knowledge during an Internet and
classifying them in line with their polarity whether or not they contain positive ,negative or neutralizing
references. Sentiment Analysis could be a drawback of text based mostly analysis however there are difficulties
which are needed to be pondered upon that would create a tough parameter as compared to ancient text based
analysis. It depicts the state where it has a desire of trial to figure out these issues and it's spread out many
371. chances for further analysis for handling negative sentences, hidden emotions , slangs and sentence sarcasm.
The project also proposes additional features compared to other previous model projects by enabling the 2123-
detection of rumor , identifying and analyzing whether message given via user belongs to rumor category or not 2126
using Logistic Regression process in Machine Learning domain.
Keyword : Machine Learning , Sentiment Analysis , Rumor Detection, Slang , Social Media Data
References:
1. Rehana Moin ,Zahoor- ur- Rehman, Khalid Mahmood,”Framework for Rumors Detection in Social Data”,[2018]
2. Walaa Mehdat, Ahmed Hasan ,Hoda Korashy “Sentimental Analysis algorithms and applications”,[2014] .
3. Oscar Araque,Ignacio Corcuera-Platas, ”Enhancing Deep Learning Sentimental Analysis with ensemble techniques in social
applications” ,[2012].
4. Z, “Enquiring Minds: Early Detection of Rumors in Social Media from Enquiry Posts,” [2015].
5. Liu B. Sentiment Analysis and Opinion mining. Synth Lect Human Lang Technology [2012].
6. Tao Chen, Improving Sentimental Analysis via Sentence Classification”.[2017].
Authors: J Caroline El Fiorenza, Revanth Kumar Lokku, Kirthika Sivakumar, M Reene Stephanie
Versatile Exploitation Techniques: Drone Hacking and Jamming with Raspberry-Pi and Wi-Fi
372. Paper Title:
Pineapple
Abstract: The utilization of Internet-of-Things (IoT) innovation is developing exponentially as more 2127-
shoppers and organizations recognize the benefits offered by the savvy and shrewd gadgets. The major purpose 2134
of this paper arose due to the reason that since drone innovation is a quickly rising segment inside the IoT and
the danger of hacking couldn't just purpose an information break, it could likewise represent a noteworthy
hazard to the open well-being. On account of their flexible applications and access to ongoing data, commercial
drones are used across a wide variety of smart city applications. However, with many IoT devices, security is
frequently an untimely idea, leaving numerous drones helpless against programmers. What is being done in this
paper is that this paper examines the present condition of automation security and exhibits a lot of Wi-Fi
empowered drone vulnerabilities. Five distinct sorts of assaults, together with the capability of robotization of
assaults, were identified and connected to two unique kinds of scientifically accessible drones. For the execution,
the methodologies and techniques used are the correspondence connections that are researched for the assaults,
for example Disavowal of Service, De-authentication Methods, Man-in-the-Middle, Unauthorized Root Access
and Packet Spoofing. Ultimately, the unapproved root access was computerized using a Raspberry-Pi 3 and Wi-
Fi Pineapple. Besides, the strategy for each assault is laid out, also the test part diagrams the findings and
procedures of the assaults. The Basic Intrusion Detection Systems and Intrusion Protection System so as to avoid
the UAV (unmanned aerial vehicles) from entering the confined airspace are discussed. At long last, the paper
tends to the present condition of automaton security, the executives, control, flexibility, protection concerns by
using GPS spoofing as a method to secure the target which is the drone from being vulnerable to the attacker.
373.
Keyword : GEBCO, Bathymetric data, Hydrographic survey
2135-
References: 2137
1. Rifaat Abdalla and Salim Al-Harbi (December 27th 2018). Lessons Learned from the Establishments of the First Hydrographic
Surveying Program in the Middle East, Trends in Geomatics - An Earth Science Perspective
2. Smith, W. H. F., and D. T. Sandwell, Global seafloor topography from satellite altimetry and ship depth soundings, Science, v . 277, p.
1957-1962, 26 Sept. 1997
3. Sandwell, D. T., W. H. F. Smith, Marine gravity anomaly from Geosat and ERS 1 satellite altimetry, Journal of Geophysical Research,
v. 102 , No. B5, p. 10039-10054, 1997.
4. Smith WHF (1993) On the accuracy of digital bathymetric data. J Gephys Res 98(B6):9591–9603. doi:10.1029/93JB00716
5. Marks, K. & Smith, Walter & Sandwell, David. (2010). Evolution of errors in the altimetric bathymetry model used by Google Ea rth
and GEBCO. Mar. Geophys. Res.. 31. 223-238. 10.1007/s11001-010-9102-0.
6. Jakobsson M, Macnab R, Mayer L, Anderson R, Edwards M, Hatzky J, Schenke H-W, Johnson P (2008) An improved bathymetric
portrayal of the Arctic Ocean: implications for ocean modeling and geological, geophysical and oceanographic analysis. Geophy s Res
Lett 35:L07602. doi:10.1029/2008GL033520
7. Shamji V. R. , and T.C. Vineesh, 2016. Shallow-water tidal analysis at Sharm Obhur, Jeddah, Red Sea, Arabian Journal of Geosciences
10(3).
8. GEBCO data accessed on October 20, 2016, www.gebco.net/data_and_products.
Keyword : wheeled mobile robot, Lyapunov stability, indirect neural adaptive control, tracking error,
approximation error
References:
1. Vu Thi Yen, Wang Yao Nan, Pham Van Cuong, Robust Adaptive Sliding Mode Neural Networks Control for Industrial Robot
Manipulators, Int. J. of Control, Automation and Systems March 2019.
2. Francisco G., Rossomando Carlos Soria, Ricardo Carelli, Sliding Mode Neuro Adaptive Control in Trajectory Tracking for Mobile
Robots, J. Intell Robot Syst., June 2014.
3. Anh Tuan Vo, Hee-Jun Kang, An adaptive Neural Non-Singular Fast-Terminal Sliding – Mode Control for Industrial Robotic
Manipulators, Applied Sciences, Decembre 2018.
4. H. Huang, J. Zhou, Q. Di, J. Zhou, J. Li, Robust Neural Network-Based Tracking Control and Stabilization of a Wheeled mobile Robot
with Inputs Saturation, Int. J. of Robust and Nonlinear Control, 31 October 2018.
5. Ching-Long Shih, Li-Chen Li, Trajectory and Tracking Control of a Differential-Drive Mobile Robot in a Picture Drawing Application,
Robotics, 2017.
6. S. Karakaya, G. Kucukyildiz, H. Ocak, A New Mobile Robot Toolbox for Matlab, J. of Intelligence and Robotic Systems, July 201 7.
2138-
7. Luis J. Ricale, Edgar N. Sanchez, R. Langari, D. Shahmirzadi, Rollover Control Heavy Vehicles via Recurrent High Order Neural 2145
Networks, Recurrent Neural Networks, September 2008.
8. Sanchez, E.N., Ricalde, L. J., Trajectory Tracking via adaptative recurrent control with input saturation, Proceedings of the
International Joint Conference on Neural Networks, July 2003.
9. Sanchez, E.N., RPezez, J. P. Ricalde, L. J., Guanrong Chen, Trajectory Tracking via adaptative dynamic neural control, Proceedings of
IEEE Int. Sumposium on Intelligent Control, 2001.
10. Yen, V. T., Nan, W. Y., & Van Cuong, P., Recurrent fuzzy wavelet neural networks based on robust adaptive sliding mode control for
industrial robot manipulators, Neural Computing and Applications, May 2018.
11. Wu, H.-M., & Karkoub, M., Hierarchical Fuzzy Sliding-Mode Adaptive Control for the Trajectory Tracking of Differential-Driven
Mobile Robots. Int. J. of Fuzzy Systems, October 2018.
12. G., Mao, J., Wang, Y., Guo, S., & Miao, Z., Adaptive Tracking Control of Nonholonomic Mobile Manipulators Using Recurrent
Neural Networks. Int. J. of Control, Automation and Systems, June 2018.
13. Y. Hu, H. Su, L. Zhang, S. Miao, G. Chen, A. Knoll, Nonlinear Model Predictive Control for Mobile Robot Using Varying -Parameter
Convergent Differential Neural Network, Robotics and Automation Engineering, July 2019.
14. Tresna Dewi, Pola Risma, Yurni Oktarina, and M. Taufik Roseno, Neural Network Controller Design for a Mobile Robot Navigation ;
A case study, 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2017.
15. Pandey, A., Kumar, S., Pandey, K. K., & Parhi, D. R., Mobile robot navigation in unknown static environments using ANFIS
controller. Perspectives in Science, 2016.
16. Huang, H., Zhou, J., Di, Q., Zhou, J., & Li, J., Robust neural network-based tracking control and stabilization of a wheeled mobile
robot with input saturation, International Journal of Robust and Nonlinear,2018.
17. Zhu, Q., Han, Y., Liu, P., Xiao, Y., Lu, P., & Cai, C., Motion Planning of Autonomous Mobile Robot Using Recurrent Fuzzy Neural
Network Trained by Extended Kalman Filter, Computational Intelligence and Neuroscience, 2019.
18. Hu, Y., Su, H., Zhang, L., Miao, S., Chen, G., & Knoll, A., Nonlinear Model Predictive Control for Mobile Robot Using Varying-
Parameter Convergent Differential Neural Network. Robotics, 2019.
19. Gao, X., & Zhang, T., Unsupervised learning to detect loops using deep neural networks for visual SLAM system, Autonomous
Robots, 2015.
20. M. Boukens, A. Noukabou, M. Chadli, Robust adaptive neural network-based trajectory tracking control approach for nonholonomic
electrically driven mobile robots, Robotics and Autonomous Systems, June 2017.
Paper Title: Joint Action of Binary Factors in the Sufficient Causes Theory and Its Classification
Abstract: We consider a problem of formal definition of joint action in the binary sufficient causes
framework based on the theory of Boolean algebras. This theory is one of the general causality concepts in
epidemiology, environmental sciences, medicine and biology. Its correct mathematical form allows us to regard
the binary version of this theory as a specific application of Boolean functions theory. Within the formalism of
Boolean functions, a strict definition of the joint action is given and various criteria for the presence of joint
action of factors in a Boolean function are obtained. The methods previously developed for analyzing joint
action in binary sufficient causes framework allows us to split all the Boolean functions into disjoint equivalence
375. classes. The relationships among these classes however remain uncertain. In the present paper, an integer
invariant is introduced which allows one to order joint action types in a certain way. We consider examples of 2146-
two- and three-factor theories of sufficient causes with the ordinary epidemiological symmetry group. 2153
Estimation of the time complexity of determining the type of joint action are considered as well.
Keyword : Boolean algebra, Boolean function, joint action, group action on a set, integer-valued invariant,
sufficient causes theory, time complexity.
References:
1. M. L. Brusseau, I. L. Pepper, Ch. P. Gerba, Environmental and Pollution Science. 3rd ed. Academic Press, Elsevier, 2019.
2. F. R. Spellman, The Science of Environmental Pollution. CRC Press, 2017.
3. J. Peterson, Environmental Pollution Caused by Factories. https://sciencing.com/environmental-pollution-caused-by-factories-
12071269.html.
4. Taxonomy of Environmental Pollution. https://www.reference.com/science/explore/pollution?qo=categoryTaxonomyLeft.
5. E. J. Calabrese, Multiple Chemical Interactions (Toxicology and Environmental Health Series). CRC Press, 1991.
6. M. A. Subramanian, Toxicology: Principles and Methods. 2nd ed. MJP Publishers, 2015.
7. W. B. Pratt, P. Taylor, Principles of Drug Action: The Basis of Pharmacology. 3rd ed. Churchill Livingstone, 1990.
8. G. Pöch, Combined Effects of Drugs and Toxic Agents. Modern Evaluation in Theory and Practice. Vienna: Springer, 1993.
9. W. R. Greco, G. Bravo, J. C. Parsons, “The Search for Synergy: A Critical Review from a Response Surface Perspective”.
Pharmacological Review. Vol. 47 (2), pp. 331–385.
10. Combined Actions and Interactions of Chemicals in Mixtures The Toxicological Effects of Exposure to Mixtures of In dustrial and
Environmental Chemicals. Danish State Information Centre. Danish Veterinary and Food Administration. Federal Report. 2003.
11. Assessment of Combined Exposures to Multiple Chemicals: Report of a WHO/IPCS International Workshop on Aggregate/Cumulative
Risk Assessment. WHO, 2009.
12. M. Doble, A. Kumar, Biotreatment of Industrial Effluents. Elsevier Inc., 2005.
13. Edetate calcium disodium. Cerner Multum, Inc. 2018. Available: https://www.drugs.com/mtm/edetate-calcium-disodium.html.
14. K. J. Rothman. “Causes”. Am. J. of Epidemiology, 1976, vol. 104(6), pp. 587–592.
15. O. S. Miettinen. “Causal and preventive interdependence: Elementary principles”. Scand. J. Work. Environ. Health, 1982, vol. 8, pp.
159–168.
16. O. S. Miettinen. Theoretical Epidemiology. John Wiley & Sons Inc., 1985.
17. S. Greenland, C. Poole. “Invariants and noninvariants in the concept of interdependent effects”. Scand. J. Work. Environ. Health, 1988,
vol. 14, pp. 125–129.
18. S. Greenland, B. Brumback. “An overview of relations among causal modelling methods”. Int. J. Epidemiol., 2002, vol. 31, pp. 1030–
1037.
19. T. J. VanderWeele. “Sufficient cause interactions and statistical interactions”. Epidemiology. 2009, vol. 20(1), pp. 6–13.
20. T. J. VanderWeele, T. S. Richardson. “General theory for interactions in sufficient cause models with dichotomous exposures”. Ann.
Statistics. 2012, vol. 40, pp. 2128–2161.
21. T. J. VanderWeele, J. M. Robins. “The identification of synergism in the sufficient-component-cause framework”. Epidemiology.
2007, vol. 18(3), pp. 329–339.
22. V. G. Panov, J. V. Nagrebetskaya. “An algebraic treatment of two-factor binary sufficient causes theory”. Proceed. SPIIRAN. 2013,
vol. 26, pp. 277–296. (in Russian).
23. V. G. Panov, J. V. Nagrebetskaya. “Boolean algebras and classification of interactions in sufficient-component cause model”. Int. J.
Pure Appl. Math. 2015, vol. 98(2), pp. 239–259.
24. V. G. Panov, J. V. Nagrebetskaya. “Classification of combined action of binary factors and Coxeter groups”. J. Discrete Math. Sci. &
Crypt. 2018, vol. 21(3), pp. 661–677.
25. S. L. Morgan, Ch. Winship. Counterfactuals and Causal Inference. Cambridge University Press, 2007.
26. “Handbook of Boolean algebras”. Vols 1–3. J. D. Monk, R. Bonnet, Eds. Amsterdam: Elsevier, 1989.
27. Y. Crama, P. L. Hammer. “Boolean functions. Theory, Algorithms, and Applications”. Cambridge: Cambridge University Press, 2011.
28. R. Lidl, G. Pilz. “Applied abstract algebra”. 2nd ed. New York: Springer, 1998.
29. N. Christofides. Graph Theory. An Algorithmic Approach. 3rd ed. London: Academic Press, 1978.
30. T. J. VanderWeele, J. Robins. (2006). A Theory of Sufficient Cause Interactions. COBRA Preprint Series, Article 13, Available:
http://biostats.bepress.com/cobra/ps/art13.
31. T. J. VanderWeele, J. Robins. “Empirical and counterfactual conditions for sufficient cause interactions”. Biometrika, 2008, vol. 95,
pp. 49–61.
32. B. Steinbach, Ch. Posthoff. “Boolean Differential Calculus”. Synthesis Lectures on Digital Circuits and Systems. Morgan&Clayp ool
Publishers. 2017.
33. G. J. Howard, T. Webster. “Contrasting Theories of Interaction in Epidemiology and Toxicology”. Environ. Health Perspect., 2013,
vol. 121, 1–6.
34. U.S. EPA (U.S. Environmental Protection Agency). Supplementary Guidance for Conducting Health Risk Assessment of Chemical
Mixtures. Washington, DC: U.S. EPA, 2000. Available: http://cfpub.epa.gov/ncea/cfm/recordisplay.cfm?deid=20533#Download.
35. M. C. Berenbaum. “What is synergy?” Pharmacol. Rev., 1989, vol. 41(2), pp. 93–141.
Paper Title: Color Channel CAPTCHA: A Secure Scheme for Cloud Environment
Abstract: Abuse of cloud services consequently unauthorized access to cloud data by malicious software
automation is prevented by CAPTCHA. The secure usable mechanism is mandatory for resilience to automate
attacks accordingly to create pleasant challenges. In this paper, we propose a novel image-based graphical Color
Channel CAPTCHA scheme to distinguish between malware and humans for data security in the cloud
environment. This color channel CAPTCHA is designed with 2 X 2 grids of different color channels with micro
invisible circles or less visible moving circles. This simple challenge is completed by click on the specified
circles in the given order with very less solving time, while compared to the state of the art. The experimental
study has been conducted among 41 participants on both usability and performance of color channel CAPTCHA.
Keyword : machine learning, digital library, knowledge base, citation network analysis(CNA).
References:
1. X. Lin, Y. Xiong, "Detection and analysis of table of contents based on content association", International Journal of
Document Analysis, vol. 8, no. 2, pp. 132-143, 2006. DOI 10.1007/s10032-005-0149-4
2. R. Fox, "Digital libraries: the systems analysis perspective machine erudition", Digital Library Perspectives, vol. 32,
no. 2, pp.62-67, 2016. http. s://doi.org/10.1108/DLP-02-2016-0006
3. Y. B. Wu, Q. Li, R. S. Bot and X. Chen, "Finding Nuggets in Documents: A Machine Learning Approach",
Journal of the American Society For Information Science And Technology, vol. 57, no. 6, pp. 740–752, 2006.
4. S. A. Babar and P. D. Patil, "Improving Performance of Text Summarization", Procedia Computer Science, vol. 46 no.
2015, pp. 354 – 363, International Conference on Information and Communication
Technologies(ICICT2014), doi: 10.1016/j.procs.2015.02.031.
5. F. Ciravegna, S. Chapman, A. Dingli, Y. Wilks , "Learning to Harvest Information for the Semantic Web", pp. 312-326, 2004, doi:
10.1007/978-3-540-25956-5_22.
6. S. Mukherjee, I.V. Ramakrishnan and A. Singh, "Bootstrapping Semantic Annotation for Content-Rich HTML Documents,
Proceedings of the 21st International Conference on Data Engineering (ICDE 2005). 1084-4627/05.
7. Y.L. Chi, T.Y. Hsu and W.P. Yang, "Building Ontological Knowledge Bases For Sharing Knowledge In Digital Archive",
Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August
2005, IEEE. 0-7803-9091-1/05
8. S. Wang, J. Wang, B. Wang and X. Z. Wang, "Study On The Content- Based Image Retrieval System By Unsupervised Learning",
Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009
378. . IEEE. 978-1-4244-3703-0/09/
9. I. H. Witten, "Learning Structure from Sequences, with Applications in a Digital Library", in ALT 2002, LNAI 2533 N. C. 2165-
Bianchi, Ed. Heidelberg: Springer-Verlag, 2002, pp. 42–56.
10. X. Xu, K. Wang, Y. Deng, T. Li, "REPDL: Research-oriented e-learning platform based on digital library", 2017 IEEE
2168
International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 12-14 December 2017, The
Education University of Hong Kong, pp. 139-142. 978-1-5386-0900-2/17
11. P. Xiu and H. S, Baird, "Whole-Book Recognition", IEEE Transactions on Pattern Analysis and Machine Intelligence", vol. 34, no.
12, pp. 2467-2480, 2012.
12. B. Zhu, L. Yang, X. Wu and T. Guo, "Automatic Recognition of Books Based on Machine Learning", 3rd International Symposium
on Computational and Business Intelligence, IEEE 978-1-4673-8501-5/15, 2015. DOI 10.1109/ISCBI.2015.20
13. X. Zhang, “The statistical learning theory and support vector machine,” Acta Automatica Sinical, vol.26, no.1, pp.32-42, 2000.
14. F. Tang, Z. Wang and M. Chen, “The study of multi-class classification based on support vector machine algorithm,” Control and
Decision, vol.20, no.7, pp.746-754, 2005.
15. S. Mitchell, "Machine Assistance in Collection Building: New Tools, Research, Issues, and Reflections", Information Technology
And Libraries, pp. 190-216, Dec 2006.
16. M. Krapivin, M. Marchese, A. Yadrantsau and Y. Liang, "Unsupervised Key-Phrases Extraction from Scientific Papers Using Domain
and Linguistic Knowledge", 2008 Third International Conference on Digital Information Management, London, 2008, pp. 105-112,
IEEE 978-1-4244-2917-2/08,2008,doi: 10.1109/ICDIM.2008.4746749.
17. G. Pant, K. Tsioutsiouliklis, J. Johnson and C. L. Giles, "Panorama: Extending Digital Libraries with Topical Crawlers",
Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries (JCDL’04), ACM, 1-58113-832-6/04,
2004.
18. S. Ferilli, M. Biba, T. M. A. Basile, and F. Esposito, "Incremental Machine Learning Techniques for Document Layout
Understanding", IEEE. 978-1-4244-2175-6/08, 2008.
19. Y. Hu, H. Li, Y. Cao, D. Meyerzon, Q, Zheng "Automatic Extraction of Titles from General Documents using Machine Learning",
Information Processing and Management, vol.42, no. 5, pp. 1276-1293 doi: 10.1016/j.ipm.2005.12.001.
20. X. Lu, P.Mitra, J. Z. Wang, C. L. Giles, "Automatic Categorization of Figures in Scientific Documents" JCDL ’06 June 11–15,
2006, Chapel Hill, North Carolina, USA, pp. 129-138.
21. I. G. Councill, H. Li, Z. Zhuang amd S. Debnath, "Learning Metadata from the Evidence in an On-Line Citation Matching Scheme",
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. 2006. pp. 276 - 285, doi: 10.1145/1141753.1141817.
22. S. Kim, and Y. Liu, "Functional-based Table Category Identification in Digital Library", IEEE Computer Society, pp. 1364-1368,
2011 International Conference on Document Analysis and Recognition. IEEE 1520-5363/11, DOI:
10.1109/ICDAR.2011.274
23. F. Esposito, D.Malerba, G.Semeraro, S.Ferilli, O. Altamura, T. M. A. Basile, M. Berardi, M. Ceci, and N.
D Mauro, "Machine Learning methods for automatically processing historical documents:from paper acquisition to XML
transformation, Proceedings of the First International Workshop on Document Image Analysis for Libraries
DIAL’04) IEEE 0-7695-2088-X/04. IEEE Computer Society
24. S. B. Shirude and S. R. Kolhe, "Classifying library resources in Library Recommender Agent using PU learning approach," 2016
International Conference on Data Mining and Advanced Computing (SAPIENCE), Ernakulam, 2016, pp. 79-83.
25. V. Mahesh, and K. A. Sumithra Devi, "Spyware Detection and Prevention using Deep Learning AI for user applications",
International Journal of Recent Technology and Engineering, pp. 345-349, vol. 7, no. 5, 2019.
26. P. Bradley, Risk management standards and the active management of malicious intent in artificial superintelligence. AI & Society,
Springer, DOI: https://doi.org/10.1007/s00146-019-00890-2
27. N. Nissim, A. Cohen, J. Wu, A. Lanzi, L. Rokach, Y. Elovaci, L. Giles, "Sec-Lib: Protecting Scholarly Digital Libraries
From Infected Papers Using Active Machine Learning Framework," in IEEE Access, vol. 7,
pp.110050-110073, 2019. doi: 10.1109/ACCESS.2019.2933197
Keyword : By analyzing our previous expenses, we can predict our upcoming expenses.
References:
1. V. Singh, L. Freeman, B. Lepri, and A. Pentland, “Predicting spending behavior using socio-mobile features,”.
2. KIM Zi Won Comparison between different reinforcement learning algorithms on open AI Gym environment (Cart-Pole v0) 2017.
3. 3.Ankit Choudhary A Hands-On Introduction to Deep Q-Learning using Open AI Gym in Python IIT Bombay EEE.
4. Andrew NG Machine Learning Course Coursera. Available: https://www.coursera.org/learn/machine-learning
5. J. Filliben et al., “Introduction to time series analysis,” in NIST/SEMTECH Handbook of Statistical Methods, National Institute of
Standards and Technology, 2003
Authors: Cmak Zeelan Basha, Sofia Tasneem, Preethi Miriyala, Syed Saleem Basha
381. Paper Title: Enhanced Technique For Placement Monitoring using Servicenow Portal
Abstract: Placement Monitoring System is a part University placement cell which plays a crucial role in 2178-
providing job opportunities to the under graduated and post graduates passing out from the college by having 2181
collaboration with many reputed industries and firms. The opportunities for the students being ready to be placed
are increasing continuously. There is a lot to monitor for the placement cell authorities where they need to
manage the student profile and documents related for their training and placement. They also need to collect the
information about various companies that are ready to recruit students and notify the students time to time about
them.[1] The background work that the placement cell needs to monitor is more. They need to maintain various
platforms, large data and also they need to modify and update the data who are yet too placed and who are to be
placed. And for this the updating and modification need to be done manually which is a time taking process.
This project facilitates the placement monitoring system to communicate with the students and give a clear list
of students who are placed and who are not. And the students who are not placed can only receive about the
campus recruitment drives and the students who are placed need not receive these notifications. ServiceNow is
one such platform which provides a single system/platform where every detail of the student can be monitored
and send the notification emails to the students who are to be placed making the management cell their work
easier. The total data can be monitored with the artifacts present in the ServiceNow itself, which includes client
scripts, UI policies, notifications, workflows and service portal.
Keyword : UI policies, Roles, Access controls, Notifications, workflow and service portal.
References:
1. Vinay Parameshwarappa, Nandish S (2014) “A Segmented
2. Morphological Approach to Detect Tumour in Brain Images“ International Journal of Advanced Research in Computer Science and
Software Engineering.vol 4.
3. Jay Patel and Kaushal Doshi. Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 3 (2014),“A Study
of Segmentation Methods for Detection of Tumor in Brain MRI”.
4. Vishal B. Padole, D. S. Chaudhari, International Journal of Electronics, Communication & Soft Computing Science and Engineering
(IJECSCSE) Volume 1, “A Review of Segmentation Methods for Detection of Brain Tumor in MRI”.
5. Sudipta Roy,Sanjay Nag,Indra Kanta Maitra, International Journal of Electronics, Communication & Soft Computing Science and
Engineering (IJECSCSE) Volume 3, Issue 6.
6. Rohan Kandwal, Ashok Kumar( 2014) “An Automated System for Brain Tumor Detection and Segmentation”
7. Jobin Christ M.C. 1, Dr. Parvathi R.M.S. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July
2012”Brain Tumors: An Engineering Perspective”.
8. C M A K. Zeelan Basha, Maruthi Padmaja, and G.N.Balaji,“Computer Aided Fracture Detection System” Journal of Medical Imaging
and Health Informatics Vol. 8, 526–531, 2018.
9. Azmira Krishna, CMAK Zeelan Basha, Pradeep Raj Savarapu, Soumya Ranjan Nayak, S. Sivakumar ” Multi Target Tracking Access
with Data Association in Distributed Camera Networks”, International Journal of Recent Technology and Engineering
(IJRTE),vol.8,412-417.
10. Cmak Zeelan basha, Azmira Krishna, Pradeep Raj Savarapu “Automatic Detection of Lung Infection”, International Journal of Recent
Technology and Engineering (IJRTE), Volume-8,200-203.
Authors: Syed Riyaz Ahammed, Bachina Harish Babu, Saam Prasanth Dheeraj, Aleligne Yohannes Shiferaw
382.
Keyword : 3D printing, Sensors
2182-
References: 2185
1. KV Wong, Hernandez, Aldo, “A Review of Additive Manufacturing”, ISRN Mechanical Engineering, 2012, p1-10.10p
2. David Espalin, Danny W. Muse, Eric MacDonald, Ryan B. Wicker, “3D Printing multifunctionality: structures with electronics”, The
International Journal of Advanced Manufacturing Technology, May 2014, Volume 72, Issue 5–8, pp 963–978
3. Morteza Amjaadi et al. “Stretchable, skin mountable, and wearable strain sensors and their potential applications: A Review”,
Advanced functional materials, 2016, Vol.26, 1678-1698.
4. Alpuim, P.; Correia, V.; Marins, E.S.; Rocha, J.; Trindade, I.; Lanceros-Mendez, S. Piezoresistive silicon thin film sensor array for
biomedical applications. Thin Solid Films 2011, 519, 4574–4577.
5. Su Ryon Shin et al. “A Bioactive Carbon Nanotube‐Based Ink for Printing 2D and 3D Flexible Electronics”, Advanced materials, 24
February 2016|
https://doi.org/10.1002/adma.201506420|
6. Kevin Chen et al. “Printed carbon nano tube electronics and sensor systems”, advanced materials, 16 February 2016,
ttps://doi.org/10.1002/adma.201504958
7. Esther Garcia et al. “Printing in Three Dimensions with Graphene”, advanced materials, 21 January 2015.
8. Minpyo Kang et al. “Graphene-Based Three-Dimensional Capacitive Touch Sensor for Wearable Electronics”, ACS publications, Vol.
8, issue 7, July 2017
9. SorooshDerakhshanfar, “3D bioprinting for biomedical devices and tissue engineering: A review of recent trends and advances”,
Science Direct, Bioactive Materials, Volume 3, Issue 2, June 2018, Pages 144-156
10. Tao Han et al. “3D Printed Sensors for Biomedical Applications: A Review”, sensors,MPDI, Published online 2019 April 10.
11. Yuanyuan Xu, “The Boom in 3D-Printed Sensor Technology”, sensors,MPDI, Published online 2017 May 19. doi:
10.3390/s17051166.
12. Sen Wai Kwok et al. “Electrically conductive filament for 3D-printed circuits and sensors”, Applied Materials Today, Elsevier, Vol. 9,
July 2017, 167-175
Keyword : Environmental Psychology; Sports facility design; Human comfort; Motivational Climate.
References:
1. Sallis J., “Measuring physical Activity Environments”, American Journal of Preventive Medicine, Elsevier, Volume 36,, Numbe r 4S,
p. 86-92, 2009.
383. 2. Janetius, S.T. , “Architectural Psychology”, Art, Culture & Gender: The Indian Psyche, , Mishil & Js Publishers, Thrissur, p 67- 73,
2016. 2186-
3. Biscaia et al, “The effect of emotions on football spectators’ satisfaction and behavioral intentions”, European Sports management 2193
quarterly, 12(3):227-242, 2012.
4. Uphill et al, “The influence of in-game emotions on basketball performance”, European Journal of Sport science, 2012.
5. CollishawM. Et al, “The authenticity of Positive Emotional Displays: Client Responses to Leisure Service Employees”, Journal of
Leisure Research, 40(1): 23-46, 2008.
6. Sabiston C., “The Role of body-related self-conscious emotions in motivating women’s physical activity”, Journal of sport and exercise
psychology, 32(4): 417-437, 2010.
7. Kang et al., “Semantic analysis does not occur in the absence of awareness induced by interocular suppression”, The journal of
Neuroscience , 31:13535–13545, 2011.
8. Roessler K., “Healthy Architecture: Can environments evoke emotional responses?”, Global Journal of Health Science, Volume 4, p.
83-89, 2012.
9. Rossler K. et al, “Arkitektur, Kvinder Og Idraet”,2007.
10. Roessler K., “Environmental Psychology , The interaction between movement and Environment- Environmental Psychology and the
Sporting Space”, 2007.
11. Yalom I., “Existential Psychotherapy”, Basic Books, 1980.
12. Rossler et al, “Riding the wave of an expert: A Successful Talent Environment in Kayaking”, Sport Psychologist 25(3):341 -362, 2011.
13. Sibley B. et al., “What Keeps athletes in the gym?, Goals, Psychological needs, and motivation of crossfit participants”, Internationa
joutrnal of sport and exercise psychology”, p.1-20, , 2017.
14. Ryan et al, “ Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being”, American
Psychologist, 55, 68-78, 2000.
15. Ryan et al, “Active human nature: Self-determination theory and the promotion and maintenance of sport, exercise, and health”,
Intrinsic motivation and self-determination in exercise and sport (pp. 1-19). Champaign, IL: Human Kinetics, 2007.
16. Gunnel et al, “Psychological Needs as Mediators? The relationship between leisure time physical activity and well being in people
diagnosed with osteoporosis”, Research quarterly for exercise and sport , 82:4, 794-798 , 2011.
17. Gunnel et al, “Psychological need satisfaction and thwarting : A test of basic Psychological Needs Theory in physical activity
contexts”, Psychology of Sport and Exercise 14 :599-607, 2013.
18. Edmunds et al, “Examining Exercise Dependence Symptomatology from a Self-determination Perspective”, Journal of Health
Psychology, 11(6), 887-903, 2006.
19. Sebire et al.,” Examining Intrinsic versus Extrinsic Exercise Goals: Cognitive, Affective, and Behavioral Outcomes”, Journal of Sport
& Exercise Psychology 31(2):189-210, 2009.
Paper Title: Boron Carbide (B4C) Reinforced Aluminum Matrix Composites (AMCs)
Abstract: Aluminum matrix composites (AMCs) demonstrating a good combination of properties that are
hard to acquire by a monolithic aluminum material. Since the last few decades, investigators have shown their
384. keen interest to advance these materials for complex applications. Homogeneous reinforcement distribution,
defect-free microstructure, and improved resultant properties depends on the fabrication method along with 2194-
matrix and reinforcement materials and size. Two-step melt stirring technique and K2TiF6 flux enhanced the 2203
wettability and improve the particle distribution of boron carbide (B4C) in AMCs. The mechanical properties of
the AMCs were enriched by either extrusion process or thermal treatment. Hybrid composites exhibited better
characteristics than mono composites. Surface composites manufactured by incorporation of reinforcement in
the surface layer; offer good surface properties without losing toughness and ductility. The B4C-Al interfacial
reactions produce different precipitates in AMCs and damaged the composite's age-hardening ability. B4C
reinforced friction stir processed surface composites exhibits refined structure and better properties compared to
the aluminum matrix. The strength, hardness, and wear resistance of AMCs increased with rising fraction and
reducing the size of B4C up to a certain level. Wear rate increases with rising applied load, sliding time and
speed. A review of effect of B4C reinforcement on different properties of mono and hybrid AMCs with
summarized results attained and concluded by different investigators is presented in this paper to help
researchers in the field. At the end of this paper a position given to conclusions and future directions.
Authors: CMAK Zeelan Basha, Chandra Sekhar Maganty, G Deva Raju, Y Divya, Y Spoorthy
Authors: Badal Soni, Anji Reddy. V, Naresh Babu Muppalaneni, Candy Lalrempuii
Paper Title: Image Forgery Detection using AKAZE Keypoint Feature Extraction and Trie Matching
Abstract: Image Forgery is an illegal activity in the society as per cyber laws. There are various types of
forgeries in which forgery on images is considered as an illegal activity. Image forgery may take place in
different ways. One way for doing forgery on images is copy and move forgery which may result in loss of
image integrity or authenticity. There are number of popular detection techniques exist such as SIFT, SURF etc.,
386. but have high complexity in detection of forgery. Here we have proposed a method to detect the forgery on
images which results in loss of integrity or authenticity. In our proposed method we have used descriptor 2208-
matching using Trie Data Structure The descriptor matching method of implementation using Trie data structure 2213
made the complexity of the problem to reduce to O (n log n). Using Key points approach we can verify the
integrity of the image. Extracting the features with key points approach is computational expensive task. But
there is KAZE method which overcomes this situation. KAZE’s method of using non-linear diffusion filtering
requires it to solve a series of PDEs. This cannot be done analytically forcing KAZE to use a numerical method
called an AOS scheme to solve the PDEs. However, this process is computationally costly and therefore an
accelerated version of KAZE was created. The Accelerated KAZE or AKAZE which creates non-linear scale
space through Fast Explicit Diffusion for reduce the complexity in extracting the features.
Paper Title: Effect of Profitability, Leverage, Audit Opinion and Firm Reputation toward Audit Report Lag
Abstract: audit report lag has become a phenomenon that cannot be denied is one of the problems that is
quite disturbing. Audit report lag is detrimental to users of financial statements. Users of financial statements
take longer to receive financial statements, even though they want to use the financial statements as a decision-
making tool. This study aims to provide empirical evidence of the influence of profitability, leverage, audit
opinion, and reputation of public accounting firms on audit delay in listed manufacturing companies in the
Indonesia Stock Exchange. This research is quantitative, using secondary data. The population of this study is
the food and beverage sub-sector manufacturing companies listed on the Indonesia Stock Exchange in 2014-
2017. The testing of the hypothesis used in this study is multiple linear regression analysis. After passing the
data processing process that is processed in SPSS, the results of the study show that leverage affects audit delay,
while profitability, audit opinion, and the reputation of public accounting firms do not significantly influence
audit delay. In this study, the authors did not test together the effect of all variables on audit delay.
Paper Title: Design of Microcontroller Based Cost Effective Portable Detection Circuit for Pesticide Recognition
Abstract: Excessive use of pesticides for better agricultural productivity poses serious threats to human
health. Depending upon the duration and dose of exposure, deleterious effects may be intense or moderate,
which may be one of the root causes of several diseases such as diabetes, asthma, cancer, cardiac attack, fertility
defects etc. Inhibition of an acetylcholinesterase enzyme activity is commonly associated with pesticide
exposure and as a result acetylcholine levels are elevated in blood of an exposed person. Common tools for
detection of pesticide exposure measure an enzyme activity for acetylcholinesterase (ACHE), an important
enzyme that regulates the neuro transmission functions in the human body. Proposed work includes an electronic
design and simulation of microcontroller based portable detection circuit using electrochemical amperometric
instrumentation for measurement of an acetylcholinesterase concentration in human blood. Handheld detection
circuit consists of AT89C51 microcontroller, Analog to digital converter ADC0804 and Liquid Crystal Display
Module LM016L.To program the microcontroller, Embedded C is used, due to their inherent characteristics of
adaptability and portability across a wide assortment of hardware platforms. The developed detection circuit for
biomonitoring of pesticides is cheap, flexible and covers wide range as compared to commercially available
ones.
Keyword : Amperometric, Analog to digital converter, Biosensor, Liquid Crystal Display, Pesticides.
References:
1. Hayo M.G.van der Werf, “Assessing the impacts of pesticides on the environment”, Agr. Ecosyst. Environ., vol. 60, no. (2-3), 1996,
pp. 81-96.
2. Md.W. Akhtar, D. Sengupta and A. Chowdhury, “Impact of pesticides use in agriculture: their benefits and hazards”, Interdiscip.
Toxicol., vol. 2, Issue 1, 2009, pp.1-12.
3. E. Selcen Darcin and Murat Darcin, “Health effects of agricultural pesticides”, Biomed Res-2017 Complex World of Neuroscience.
389. 4. V. Dhananjayan and B. Ravichandran, “Occupational health risk of farmers exposed to pesticides in agricultural activities”, Current
Opinion in Environmental Science & Health, vol. 4, 2018, pp.31-37.
5. A. Samsidar, S. Siddiquee and S. Md. Shaarani, “A review of extraction, analytical and advanced methods for determination of
2228-
pesticides in environment and foodstuffs”, Trends Food Sci. Technol., vol. 71, 2018, pp.188–201. 2232
6. R. Monosik, M. Stredansky and E. Sturdik, “Biosensors - classification, characterization and new trends”, Acta Chimica Slovaca, vol.
5, no. 1, 2012, pp. 109-120.
7. F. Faridbod, V.K. Gupta and H.A. Zamani, “Electrochemical Sensors and Biosensors”, Int. J. Electrochem., vol. 2011, 2011.
8. Niina J. Ronkainen, H. Brain Halsall and William R. Heineman, Electrochemical Biosensors, Chem. Soc. Rev., vol. 39, Issue 5, 2010,
pp. 1747-1763.
9. C. Ionescu, P. Svasta, C. Tamaş, C. Bala and L. Rotariu, “Portable measuring and display unit for Electrochemical Sensors, In : 2010
16th International Symposium for Design and Technology in Electronic Packaging (SIITME), IEEE, 2010, pp. 215-218.
10. Mirjana B Colovic, Danijela Z Krstic, Tamara D Lazarevic-Pasti, Aleksandra M Bondzic and Vesna M Vasic, “Acetylcholinesterase
Inhibitors: Pharmacology and Toxicology”, Curr Neuropharmacol, vol. 11, Issue 3, 2013, pp. 315-335.
11. S. Stepankova and K. Vorcakova, “Cholinesterase based biosensors”, J. Enzym. Inhib. Med. Che., vol. 31, 2016, pp. 180-193.
12. X. Sun and X. Wang, “Organophosphorus pesticides detection system based on amperometric enzyme biosensor”, In: 2nd Internatio nal
conference on Information Science and Engineering (ICISE), 2010, pp. 391-394.
13. D. Semenova, A. Zubov, Yuliya E. Silina, L. Micheli, M. Koch, Ana C. Fernandes and Krist V. Gernaey, “ Mechanistic modeling o f
cyclic voltammetry: A helpful tool for understanding biosensor principles and supporting design optimization”, Sens. Actuators B
Chem., vol. 259, 2018, pp. 945-955.
14. Binu B. Narakathua, W. Guob, Sherine O. Obareb and M. Atashbar, “Novel approach for detection of toxic organophosphorus
compounds”, Sens. Actuators B Chem., vol. 158, Issue 1, 2011, pp. 69-74.
15. A. Chen, D. Du, and Y. Lin, “Highly sensitive and selective immuno-capture/electrochemical assay of acetylcholinesterase activity in
red blood cells: a biomarker of exposure to organophosphorus pesticides and nerve agents”, Environ. Sci. Technol, vol. 46, 2012,
pp.1828-1833.
16. V. Perumal and U. Hashim, “Advances in biosensors: principle, architecture and applications”, J. Appl. Biomed., vol. 12, no.1 , 2014,
pp.1-15.
17. S.P. Mohanty and E. Kougianos, “Biosensors-a tutorial review”,
18. IEEE Potentials, vol. 25, Issue 2, 2006, pp. 35-40.
19. Kenneth J. Ayala, The 8051 Microcontroller, CENGAGE Learning, third ed., 2004.
http//www.keil.com/dd/docs/datashts/atmel///at89c51_ds.pdf.
20. Muhammad Ali Mazidi and Janice Gillispie Mazidi, The 8051 Microcontroller and Embedded Systems, Pearson education, Prentice
Hall, 1999.
21. E. Balguruswamy, Programming in ANSI C, TATA McGraw-Hill Education, 7th ed., 2017
Keyword : Improvised Low-cost Wiimote IWB, Educational Technology, Chinese Language, Motivation.
References:
1. Boyce, C. J., Mishra, C., Halverson, K. L., & Thomas, A. K. (2014). Getting students outside: Using technology as a way to stimulate
engagement. Journal of Science Education and Technology, 23(6), 815-826.
2. Dell, A. G., Newton, D. A., & Petroff, J. G. (2016). Assistive technology in the classroom: Enhancing the school experiences of
students with disabilities. Pearson.
3. Rosen, L., Carrier, L. M., & Cheever, N. A. (2010). Rewired. Understanding the i Generation an the Way They Learn, Nowy Jork.
4. Ting, K. Y. (2014). Multimodal Resources to Facilitate Language Learning for Students with Special Needs. International Education
Studies, 7(8), 85.
5. Eriksson, T., & Axelsson, M. (2014). Implementing interactive whiteboards into teaching practice at University of Gothenb urg.
6. Xu, H.L. and Moloney, R. (2011). Perceptions of interactive whiteboard pedagogy in the teaching of Chinese language. Australa sian
Journal of Educational Technology, 27(2), 307-325.
7. Levy, P. (2002). Interactive whiteboards in learning and teaching in two Sheffield schools: a developmental study. University of
Sheffield.
8. BECTA (British Educational Communications and Technology Agency). (2004). Getting the most from your interactive whiteboard: A
guide for primary schools. Coventry: BECTA.
9. Smith, S. M., & Chen, C. (2015). MSLQ: Instrument Validation of Motivation And Learning Strategies For Acquiring Computer
Software Application Skills. Issues in Information Systems, 16(3).
10. Al-Faki, I. M., & Khamis, A. H. A. (2014). Difficulties Facing Teachers in Using Interactive Whiteboards in Their Classes. American
International Journal of Social Science, 3(2), 136–158.
11. Blau, I. (2011). Teachers for" Smart Classrooms": The Extent of Implementation of an Interactive Whiteboard -based Professional
Development Program on Elementary Teachers' Instructional Practices. Interdisciplinary Journal Of E-Learning & Learning Objects, 7.
12. Türel, Y. K., & Johnson, T. E. (2012). Teachers' belief and use of interactive whiteboards for teaching and learning. Educational
Technology & Society, 15(1), 381-394.
13. Hennessy, S., Deaney, R., Ruthven, K. & Winterbottom, M. (2007). Pedagogical strategies for using the interactive whiteboard to
foster learner participation in school science. Learning, Media and Technology, 3(32), 283-301.
14. Pintrich, P. R., Smith, D. A., & McKeachie, W. J. (1989). A manual for the use of the motivated strategies for learning questionnaire
(MSLQ). Ann Arbor, Michigan: The University of Michigan, National Center for Research to Improve Postsecondary Teaching and
Learning.
15. Bybee, R. W., Taylor, J. A, Gardner, A., Van, P., Powell, J. C., Westbrook, A., Landes, N. (2006). The BSCS 5E Instructional Model:
Origins, Effectiveness, and Applications. Bscs, 1–19.
16. Eccles, J. S. (1983). Expectancies, values, and academic behaviors.
17. Schunk, D. H., Meece, J. R., & Pintrich, P. R. (2012). Motivation in education: Theory, research, and applications. Pearson Higher Ed.
18. Liebert, R. M., & Morris, L. W. (1967). Cognitive and emotional components of test anxiety: A distinction and some initial data.
Psychological reports, 20(3), 975-978.
19. Wong, K., Teo, T., Swee, P., & Goh, C. (2014). Development of the Interactive Whiteboard Acceptance Scale (IWBAS): An Initial
Study. Educational Technology & Society, 17(4), 268–277.
20. Wong, K.-T., Russo, S., & McDowall, J. (2013). Understanding early childhood student teachers’ acceptance and use of interactive
whiteboard. Campus-Wide Information Systems, 30(1), 4-16.
21. Wong, K. T., Teo, T., & Russo, S. (2013). Interactive Whiteboard Acceptance: Applicability of the UTAUT Model to Student
Teachers. Asia-Pacific Education Researcher, 22(1), 1-10.
22. Wong, K.T., Rosma Osman, Goh, S. C., Mohd Khairezan Rahmat. (2013). Understanding Student Teachers’ Behavioural Intention to
Use Technology: Technology Acceptance Model (TAM) Validation and Testing. International Journal of Instruction, 6(1), 90-102.
Keyword : Adaptive unified differential evolution, power system transient stability, power system operation,
power system security, optimal power flow
References:
1. Carpentier J., “Optimal power flows”, Int J Electr Power Energy Syst ;1 (1):3–15, 1979.
2. Dommel HW, and Tinney WF., “Optimal power flow solutions”, IEEE Trans Power Apparat Syst PAS-87(10):1866–76,1968.
3. Xue Y, Pavella M., “Extended equal-area criterion: an analytical ultra-fast method for transient stability assessment and preventive
control of power systems”, Int J Electr Power Energy Syst 11(2):131–49,1989.
4. Alejandro Pizano-Martínez, Claudio R. Fuerte-Esquivel, and Daniel Ruiz-Vega, “Global transient stability-constrained optimal power
flow using an OMIB reference trajectory,” IEEE Trans. Power Syst, vol. 25, no. 1, pp.392-403, Feb. 2010.
5. Y. Sun, Y. Xinlin, and H. F. Wang, “Approach for optimal power flow with transient stability constraints,” Proc. Inst. Elect. Eng.,
Gen., Transm., Distrib., vol. 151, no. 1, pp. 8–18, Jan. 2004.
6. D. Ruiz-Vega and M. Pavella, “A comprehensive approach to transient stability control. I. Near optimal preventive control,” IEEE
Trans. Power Syst., vol. 18, no. 4, pp. 1446–1453, Nov. 2003.
7. K.karoui, L.platbrood, H. Crisciu, and R. A. Waltz, “new large-scale security constrained optimal power flow program using a new
interior point algorithm,” 5 th international conference, European electricity Market, pp.1-6, 28-30 May 2008.
8. A A. Fouad and T. Jianzhong, “Stability constrained optimal rescheduling of generation,” IEEE Trans. Power Syst., vol. 8, no. 1, pp.
105–112, Feb. 1993.
9. A. L. Bettiol, L. Wehenkel, and M. Pavella, “Transient stability-constrained maximum allowable transfer,” IEEE Trans. Power Syst.,
vol. 14, no. 2, pp. 654–659, May 1999.
10. Yan Sun and Thomas J. Overbye “Visualization for power system Contingency analysis data,” IEEE transactions on power systems,
Vol.19, No. 4, pp.1859-1866, November 2004.
11. Xia Y, Chan KW, Liu M., “Direct nonlinear primal-dual interior-point method for transient stability constrained optimal power flow,”
IEE Proc Gener Transm Distrib 152(1):11–6, 2005.
12. Jiang Q, Geng G., “A reduced-space interior point method for transient stability constrained optimal power flow,” IEEE Trans Power
Syst 25(3):1232–40, 2010.
13. Jiang Q, Huang Z., “An enhanced numerical discretization method for transient stability constrained optimal power flow,” IEEE Trans
Power Syst 25 (4):1790–7, 2010.
14. Pizano-Martinez A, Fuerte-Esquivel CR, Ruiz-Vega D., “A new practical approach to transient stability-constrained optimal power
flow,” IEEE Trans Power Syst 2011;26(3):1686–96, 2011.
15. Xu Y, Dong ZY, Meng K, et al., “A hybrid method for transient stability constrained optimal power flow computation ,” IEEE Trans
Power Syst 27 (4):1769–77, 2012.
16. Geng G, Jiang Q., “A two-level parallel decomposition approach for transient stability constrained optimal power flow,” IEEE Trans
Power Syst 27(4):2063–73, 2012.
17. Tangpatiphan K, Yokoyama A., “Adaptive evolutionary programming with neural network for transient stability constrained optim al
power flow,” Proc 15th int conf on intelligent system applications to power systems (ISAP ’09), Curitiba, November 8–12. p. 1–6, 2009.
18. Aparajita Mukherjee, Provas Kumar Roy, and V. Mukherjee, “Transient stability constrained optimal power flow using opposition al
krill herd algorithm”, Electrical Power and Energy Systems,83 283–297, (2016). .
19. Rautray SK, Choudhury S, Mishra S, et al., “A particle swarm optimization based approach for power system transient stability
enhancement with TCSC”, Procedia Technol 6:31–8,2012.
20. Joel R Sutter , John N Nderu and Christopher M Muriithi, “Power system oscillations damping and transient stability enhancement with
application of SSSC FACTS devices “, European Journal of Advances in Engineering and Technology, 2(11): 73-79, 2015..
21. Chan KY, Ling SH, Chan KW, Iu HHC, and Pong GTY., “Solving multi-contingency transient stability constrained optimal power
flow problems with an improved GA,” IEEE congress on evolutionary computation; p. 2901–8,2007.
22. Mo N, Zou ZY, Chan KW, and Pong TYG., “Transient stability constrained optimal power flow using particle swarm optimization,”
IET Proc Gener Transm Distrib 1(3):476–83,2007.
23. Cai HR, Chung CY, Wong KP. Application of differential evolution algorithm for transient stability constrained optimal power flow.
IEEE Trans Power Syst ;23(2):719–28, 2008.
24. Rainer Storn and Kenneth Price, “Differential evolution – a simple and efficient heuristic for global optimization over continuous
spaces,” Journal of Global Optimization 11: 341–359, 1997
25. J. Vesterstrom ; R. Thomsen, A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms
on numerical benchmark problems,” Proceedings of the Congress on Evolutionary Computation (IEEE Cat. No.04TH8753), 19-23 June
2004.
26. F. Neri and V. Tirronen, “Recent advances in differential evolution: a survey 285 and experimental analysis,” Artif. Intell. Rev. 33, p.
61, 2010.
27. K. Price and R. Storn, “Minimizeing the real functions of the ICEC’96 contest by differential evolution,” IEEE International
Conference on Evolutionary Computation, 1996, pp.842-844..
28. P. Kessel, and H. Glavitsch, “Estimating the voltage stability of a power system,” IEEE Transactions on Power Delivery PER-6(3):346
– 354, August 1986
29. N. Yorino, E. E. El-Araby, H. Sasaki, and S. Harada, “A new formulation for FACTS allocation for security enhancement against
voltage collapse,” IEEE Trans. Power Syst., vol. 18, no. 1, pp. 3–10, Feb. 2003.
30. M. Eghbal, N. Yorino, E. E. El-Araby, and Y. Zoka, “Multi load level reactive power planning considering slow and fast VAR devices
by means of particle swarm optimization,” IET Trans. Gen., Transm., Distrib., vol. 2, no. 5, pp. 743–751, 2008.
31. R. Zárate-Miñano, A. J. Conejo, and F. Milano, “OPF-Based security re-dispatching including FACTS devices,” IET Trans. Gen.,
Transm., Distrib., vol. 2, no. 6, pp. 821–833, 2008.
32. G. N. Taranto, L. M. V. G. Pinto, and M. V. F. Pereira, “Representation of FACTS devices in power system economic dispatch,” IEEE
Trans. Power Syst., vol. 7, no. 2, pp. 572–576, May 1992.
33. X.P.Zhang, ‘Advanced modelling of multi-control functional static synchronous series compensator (SSSC) in Newton-Raphson power
flow’, IEEE Trans.Power Syst.18(4), 1410-1416, 2003.
34. Ghadir Radman, Reshma S. Raje, ‘Power flow model/calculation for power systems with multiple FACTS controllers’, Electric Power
Systems Research 77, 1521-1531, 2007.
35. Enrique Acha, Claudio R. Fuerte-Esquivel , Hugo Ambriz-Pérez , César Angeles-Camacho, “FACTS: Modelling and Simulation in
Power Networks ,” Wiley, ISBN: 978-0-470-85271-2, pages.420 February 2004.
36. Thukaram Dhadbanjan, Lawrence Jenkins, H.P. Khincha, B. Ravikumar and K.Visakha”, Fuzzy logic application for network
contingency ranking using composite criteria”, International journal of engineering intelligent systems for electrical engineering and
communications 15(4):205-212
37. Storn R (1996b), “On the usage of differential evolution for function optimization”, Proceedings of the IEEE biennial conference of the
North American fuzzy information processing society, pp 519-523.
38. E. Mezura-Montes, J. Velazquez-Reyes, and C. A. Coello Coello, “A comparative study of differential evolution variants for global
optimization,” pp. 485- 492.1996
39. K. Price and R. Storn, “Minimizing the real functions of the ICEC’96 contest by differential evolution,” IEEE International Conference
on Evolutionary Computation, pp.842-844,1996.
40. Q. K. Pan, P. N. Suganthan, L. Wang, L. Gao, and R. Mallipeddi, “A 315 differential evolution algorithm with self-adapting strategy
and control parameters,” Computers & Operations Research, vol. 38, no. 1, pp. 394-408, 2011.
41. A. K. Qin, V. L. Huang, and P. N. Suganthan, “Differential evolution algorithm with strategy adaptation for global numerical
optimization,” IEEE Transactions on Evolutionary Computation, vol. 13, no. 2, pp. 398-417, 2009.
42. Y. Wang, Z. Cai, Q. Zhang, “Differential evolution with composite trial vector generation strategies and control parameters,” IEEE
transactions on Evolutionary Computation, vol. 15, no.1, p. 55, 2011.
43. K. V. Price, ”An introduction to differential evolution,” New Ideas in Optimization, D. Corne, M. Dorigo, and V. Glover, Eds. London,
U.K.: McGraw-Hill, pp. 79-108. 305, 1999.
44. M. M. Ali and A. Torn, “Population set based global optimization algorithms: Some modifications and numerical studies,” Comput.
Oper. Res., vol. 31, no. 10, pp. 1703-1725, 2004.
45. J. Brest, S. Greiner, B. Bovskovic, M. Mernik, and V. Zumer, “Self adapting control parameters in differential evolution: A comparative
study on numerical benchmark problems,” IEEE Transactions on Evolutionary Computation, vol. 10, no. 6, pp. 646-657, 2006.
46. J. Zhang and A. C. Sanderson, “JADE: adaptive differential evolution with optional external archive,” IEEE Transactions on
Evolutionary Computation, vol. 13, no. 5, pp. 945-958, 2009.
47. J. Liu and J. Lampinen, “A fuzzy adaptive differential evolution algorithm,” Soft Computing, A Fusion of Foundations, Methodologies
and Applications, vol. 9, no. 6, pp. 448-642, 2005.
48. W. Gong, Z. Cai, C. X. Ling, and H. Li, “Enhanced differential evolution with adaptive strategies for numerical optimization,” IEEE
Transactions on Systems, Man, and Cybernetics - Part B, vol. 41, no. 2, pp. 397-413, 2011.
49. D. Corne, M. Dorigo, and F. Glover, New ideas in optimization, London, U.K.:McGraw-Hill Education, 102,1999.
50. Giovanni Iacca, Ferrante Neri, and Ernesto Mininno, “Opposition-Based Learning in Compact Differential Evolution”, European
Conference on the Applications of Evolutionary Computation Evo Applications 2011: Applications of Evolutionary
Computation pp 264-273.
51. O. Alsac and B.Stott “Optimal load flow with steady state security”, IEEE PES Summer Meeting and EHV/UHV Conference,
Vancouver, Canada, T73 484-3.
52. S. Kalyani and K. Shanti Swarup, “ Study of neural network models for security assessment in power systems”, International Journal of
Research and Reviews in Applied Sciences, Vol. 1, Issue 2, , pp. 104-117, November 2009.
53. R. D. Zimmerman and D. Gan, “MATPOWER, a MATLAB power system simulation package,” Power System Engineering Research
Center, Cornell Univ., Ithaca, NY, 1997. [Online]. Available: http://www.pserc.cornell.edu/Matpower.
54. A. A. Fouad and V. Vittal, “Power system transient stability analysis using the transient energy function method”, Englewood Cliffs,
NJ: Prentice-Hall, 1992.
55. T. Nguyen and M. A. Pai, “Dynamic security-constrained rescheduling of power systems using trajectory sensitivities,” IEEE Trans.
Power Syst., vol. 18, no. 2, pp. 848–854, May 2003.
Authors: Eduard Zhalnin, Alexander Orlyansky, Sultan Kapov, Irina Orlyanskaya, Alexey Bobryshov
Paper Title: Development of Parameters for the Use of Rotary and Wheel-Finger Rakes for Grass Harvesting
Abstract: This article presents the results of the development of the operation parameters of the rotor and
wheel-finger rakes of different designs and working widths. To select efficient machine units for raking grasses,
field studies and computer experiments on computers with simulation models of the processes of harvesting hay
and haylage were performed. The results of studies of the specific total and energy costs made it possible to
establish that of all the compared models, the most effective in raking grasses are the wheel-finger rake with a
working width of 6.5-7.5 m.
Keyword : rotary rake, wheel-rake, efficiency, productivity, total costs, specific energy consumption.
References:
1. V.I. Trukhachev, A.V. Orlyansky, I.A. Orlyanskaya. Justification of rational parameters of the process of harvesting haylage in rolls
using simulation. Stavropol: AGRUS, 2018.176 p.
2. A.V. Orlyansky, A.N. Petenev, I.A. Orlyanskaya, A.A. Magpie. To the selection of a rake when harvesting grass feeds. Actual
392. problems of scientific and technological progress in the agricultural sector. Stavropol, 2013. p. 308-313.
3. A.V. Orlyansky, A.N. Petenev, I.A. Orlyanskaya. The dynamics of grass drying in modeling the process of harvesting haylage. A ctual 2254-
problems of the scientific and technological process in the agricultural sector. Stavropol, 2018, p. 254-257. 2257
4. A.V. Orlyansky. Approaches to the simulation of technological operations of the forage harvesting process. Bulletin of the ag ricultural
industry of Stavropol, 2016; # 2 (22): 24-27.
5. A.V. Orlyansky, I.A. Orlyanskaya. Generalized simulation model of the process of harvesting haylage. Proceedings of the Kuban State
Agrarian University. Krasnodar, 2008: # 8: 75-79.
6. A.V. Orlyansky. Designing resource-saving forage harvesting systems using simulation modeling. Modernization of agricultural
production based on innovative machine technologies and automated systems. Moscow: VIM, 2012, p. 779-786.
7. S.N. Kapov, A.V. Orlyansky, I.A. Orlyanskaya, A.A. Kojukhov, V.A. Bogomyagkih. Analysis of the structure the technological
process of harvesting haylage in rolls, packed in film. Research Journal of Pharmaceutical, Biological and Chemical Sciences Journal,
2018; # 9 (6): 1779-1788.
8. A.V. Orlyansky, I.A. Orlyanskaya, S.N. Kapov, A.N. Petenev, N.I. Shabanov Choice Of Transport Units For The Transportation Of
Haylage In Rolls. Research Journal of Pharmaceutical, Biological and Chemical Sciences Journal, 2018; # 9 (6): 1839-1844.
9. A.V. Orlyansky, E.V. Kulaev, I.A. Orlyanskaya, A.N. Petenev. AgroProfi - A program for calculating the efficiency of forage
harvesting equipment based on simulation. Certificate of state registration of computer programs No. 2008610015. No. 2007614054;
stated on 10/16/07; registered 01.01.08.
10. V.I. Trukhachev, A.V. Orlyansky, E.V. Zhalnin, E.V. Kulaev, A.N. Petenev, I.A. Orlyanskaya. A simulation program for the selection,
loading, and transportation of ground grass feeds. Certificate of official registration of the computer program No. 2019619390.
Application No. 2019618141 of July 3, 2019. Registered on July 16, 2019.
Keyword : Email phishing detection, Vietnamese language, feature selection, machine learning .
References:
1. Mahmoud Khonji, Youssef Iraqi.: Phishing Detection: A Literature Survey. IEEE Communications Surveys & Tutorials 15 (4), 2091 -
2121 (Fourth Quarter 2013).
2. Ammar Almomani, B. B. Gupta, Samer Atawneh, A. Meulenberg, and Eman Almomani.: A Survey of Phishing Email Filtering
Techniques. IEEE communications surveys & tutorials 15 (4), 2070 – 2090 (fourth quarter 2013).
3. APWG Phishing Activity Trends Report, 1st 2rd Quarters 2019. https://docs.apwg.org/reports/apwg_trends_report_q2_2019.pdf. Last
accessed 26 Oct 2019
4. Spam and phishing in Q2 2019. https://securelist.com/spam-and-phishing-in-q2-2019/92379/. Last accessed 26 Oct 2019.
5. Việt Nam among top targets for phishing in Southeast Asia, https://vietnamnews.vn/society/535097/viet-nam-among-top-targets-for-
phishing-in-southeast-asia.html#3obGRzMAbOJfEPDv.97. Last accessed 26 Oct 2019.
6. A Vietnamese Text Processing Toolkit. https://github.com/phuonglh/vn.vitk. Last accessed 26 Oct 2019.
7. Chandrasekaran, M., Narayanan, K., Upadhyaya.: Phishing email detection based on structural properties. 9th Annual NYS Cyber
Security Conference, pp 1-7, Albany, (14 June 2006).
8. Fergus Toolan, Joe Carthy.: Phishing detection using classifier ensembles. eCrime Researchers Summit, pp. 1-9, USA (21 Oct. 2009).
9. Noor Ghazi Mohammed Jameel, Loay Edwar George.: Detection of phishing emails using feed forward neural network. International
Journal of Computer Applications 77 (7), 10- 16, (2013).
10. Sarwat Nizamani, Nasrullah Memon, Mathies Glasdam;, Dong Duong Nguyen.: Detection of fraudulent emails by employ ing
advanced feature abundance, Egyptian Informatics Journal 15 (3), 169-174, (2014).
11. T. Kathirvalavakumar, K. R. Kavitha, Rathinasamy Palaniappan.: Efficient Harmful Email Identification Using Neural Network,
British Journal of Mathematics & Computer Science 7 (1), 58- 67, (2015).
12. Mahmoud Khonji, Youssef Iraqi, Andrew Jones.: Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach,
International Journal for Information Security Research 2 (1), 236- 245, 2012.
13. Detecting Phishing Emails Using Machine Learning Techniques. https://www.meu.edu.jo/libraryTheses/590422b4d5dd8_1.pdf.
https://monkey.org/~jose/phishing/. Last accessed 26 Oct 2019.
14. Leo Breiman.: Random Forests. Machine Learning 45 (1), pp. 5- 32, (2001).
15. Thomas G. Dietterich. Ensemble Methods in Machine Learning. International Workshop on Multiple Classifier Systems, pp 1-15,
Cagliari, Italy, 2000.
16. Index of /~jose/phishing. https://monkey.org/~jose/phishing/. Last accessed 26 Oct 2019.
17. Enterprise Open-Source Spam Filter. http://spamassassin.apache.org/publiccorpus/. Last accessed 26 Oct 2019.
394. Keyword : Heart beat Sensor, Arduino Uno, Raspberry Pi, Heart Rhythm, Python.
References: 2265-
1. W.H.Organization, “Global status report on non communication diseases”, by WHO [Online; accessed 19-July-2013] Avaliable:, 2268
http://www.who.int/nmh/publications/ncd_report2010/en/
2. Drawn ,Sri hartai, Retantyo wardoyo, Budi vuli setianto , “The Feature Extraction to Determine the Wave ‘s Peaks in the
Electrocardiogram graphic image”, ISSN: 2074-9074 (Print), ISSN: 2074-9082 (Online)
3. Published By: MECS Press IJIGSP Vol.9, No.6, Jun. 2017
4. (Computer’s in Biology and Medicine ), Author's Accepted Manuscript Heart monitoring systems Puneet Kumar Jain, Anil Kumar
Tiwari Nov 24 volume 54. Available: https:// www.science direct .com // science / article/pii/S0010482514002169?vi a%3Dihub
5. Hussian A,Jaber. AL-Ziarjawey, and Ilas Cankaya, “Heart Rate Monitoring and PQRST Detection Based on Graphical User Interface
with Matlab” – Journal Volume .5,No.4, 2015
6. Muhammad Umer, Bilal Ahmed Bhatti, Muhammad Hammad Tariq,Muhammad Zia-ul-Hassan, Muhammad Yaqub Khan, Tahir Zaidi,
“Electrocardiogram Feature Extraction and Pattern Recognition Using a Novel Windowing Algorithm”, Centre for Advanced Research
in Engineering (CARE), Islamabad, Pakistan
7. Mehak Chhabra,Manik Kalsi ,” Real Time ECG monitoring system based on Internet of Things (IoT)”, Volume 7, Issue 8, ISSN 2250-
3153,2017
8. Jasti Sowmya Sree, Mohammed Ali Hussain (2019)” An Efficient Body Line Health Monitoring System with Alerts Triggered Through
Predictive Data Analytics’ Journal ISSN: 2278-3075, Volume-8 Issue-6, April 2019
9. Deepshikha Goyal, Jai Bhaskar, Parvinder Singh, "Designing the Low Cost Patient Monitoring Device (LCPMD) & Ubiquitous Based
Remote Health Monitoring and Health Management System Using Tablet Pc”, 2012 2 nd IEEE International Conference on Parallel
Distribution And Grid Computing.
Authors: Kiran Arora, Savina Bansal, Rakesh Kumar Bansal
Fault-Tolerant Energy-Aware Task Scheduling on Multiprocessor System for Fixed-Priority Real-
Paper Title:
Time Tasks
Abstract: Energy-aware real-time scheduling is gaining attention in recent years owing to environmental
concerns and applications in numerous fields. System reliability also gets affected adversely with increasing
energy dissipations posing serious challenges before the researchers. Keeping these in view, in recent times
researchers have diverted to combining issues of fault-tolerance and energy efficiency. In literature, DVFS and
DPM, most commonly used techniques for power management in task scheduling, are often combined with
Primary/Backup technique to achieve fault tolerance against transient and permanent faults. Optimal algorithms,
Earliest deadline first (EDF) and Rate-Monotonic (RM), meant for scheduling dynamic and fixed priority tasks
respectively, have mainly been analyzed using a dual-processor approach for fault-tolerance and energy
efficiency. In this paper, to handle higher workload of fixed-priority real-time tasks, energy-aware fault-tolerant
scheduling algorithms are proposed for multiprocessor systems with balanced and unbalanced number of main
and auxiliary processors. Simulations over extensive task-sets indicate that balanced approach is more energy-
efficient than the unbalanced one.
Paper Title: The Integrity of the Territorial Identification of a Person in the Russian Social Space
Abstract: Purpose of the study: To investigate the sociological dimension of social space structuring under
the influence of territorial movements in the era of globalization based on the example of modern Russia.
As the methodology for the study, the synthesis of E. Giddens’ theory was structured, its provisions on the
topography of social space in the geographical plane. The paradigm of structuralist constructivism of P.
Bourdieu was used as well, in which it was relevant for us to analyze habitus as a socio-geographical
environment for the formation of institutional strategies of agents of social relationship. Factors that contribute
to and hinder the adaptation of personality in the new social environment, were examined based on works by O.
Toffler, U. Beck, V.I. Chuprov and Yu.A. Zubok. To determine the mechanism of the genesis and functioning of
meanings in the new communicative environment, the authors relied on N. Luman's approach to self-
identification and self-conference. In the process of analyzing the nature of trust in the institutional order in the
context of globalization, the authors used works by A.V. Ivanov and S.A. Danilova who analyze the mechanisms
of formation. The empirical basis for the article was a sociological study conducted on the basis of the
Sociological Center of Kutafin Moscow State Law University.
The article reveals the features of personality identification in a dynamic environment of interethnic and
cross-cultural interactions, structured under the influence of territorial factors. The degree of conformity of the
scale, the nature and depth of self-identification in various territorial planes of the social space are determined by
the example of modern Russian society. Factors of social integration in the process of the formation of territorial
identity both at the institutional level and in everyday life when constructing informal social ties are disclosed.
396. The restrictions of social identification in the regions of Russia are found that prevent the formation of civic
identity and responsibility for the reproduction of the social order. The values that determine social integration in
cross-cultural interaction are revealed. 2276-
2286
The results of the study make a significant contribution to the development of methods for determining the
causes of the genesis of separatist sentiments and the conditions for designing constructive social participation in
various regions. The article is relevant for undergraduate and graduate students, as well as lecturers, involved in
the problems of the sociological study of globalization, social space and group identity.
The work uses an integral methodology for measuring social processes from the perspective of the subject of
action, constructing strategies in the new social environment, and from the perspective of a system that ensures
the reproduction of the institutional order.
Keyword : personal self-identification, structuring of social space, interethnic interaction, regional policy,
territorial identity, socialization of an individual, values.
References:
1. P.A. Sorokin, “Moya filosofiya – integralism” [My philosophy is integralism]. Sotsiologicheskie issledovaniya. [Sociological research],
10, 1992, pp. 134-139.
2. B. Latour, “Peresborka sotsial'nogo: vvedenie v aktorno-setevuyu teoriyu” [Reassembling the Social. An Introduction to Actor-Network-
Theory]. Moscow, Izd. dom Vysshei shkoly ekonomiki, 2014.
3. E. Giddens, “Ustroenie obshchestva: ocherk teorii strukturatsii” [The organization of society: an essay on the theory of structuration].
Moscow, Akademicheskii Proekt, 2003.
4. P. Bourdieu, “Sotsiologiya politiki” [Sociology of politics]. Moscow, Socio-Logos, 1993.
5. Social analysis of Pierre Bourdieu. Almanakh Rossiisko-frantsuzskogo tsentra sotsiologii i filosofii Instituta sotsiologii Rossiiskoi
Akademii nauk. [Almanac of the Russian-French Center for Sociology and Philosophy of the Institute of Sociology of the Russian
Academy of Sciences]. Moscow, Institut eksperimentalnoi sotsiologii, 2001.
Paper Title: Readiness of Senior Preschool Children to Adapt to Social and Everyday Conditions
Abstract: Based on the analysis of the relevant psychological and pedagogical literature, the article defines
the concept of "one's readiness to adapt to social and everyday conditions" and substantiates its structural
components, including personal, cognitive and activity-based. The authors of the article have described each
component with due regard to the distinctive features of senior preschool children: personal (values-based
397. orientations, motivation, emotional well-being, integrative qualities of an individual); cognitive (basic ideas
about oneself and the world around them, basic socio-cultural ideas, basic ideas about social and everyday 2287-
activities, basic ideas about the norms and rules of social behavior); activity-based (general thinking, general 2297
labor, social and everyday, communication skills). The article presents methods for studying the readiness of
senior preschool children to adapt to social and everyday conditions. The authors have developed a diagnostic
tool to determine the formation of the above-mentioned readiness: high, average, low and unformed. To
determine the formation of readiness components, the authors have distinguished criteria and indicators for
evaluation and selected the following methods: the method of case problems (for studying the personal
component), a survey (for studying the cognitive component) and practice-oriented tasks (for studying the
activity-based component). Using the above-mentioned methods, the authors have conducted an ascertaining
experiment aimed at studying the readiness of senior preschool children to adapt to social and everyday
conditions. The experiment was carried out in institutions of additional education in the city of Saransk, the
Republic of Mordovia. The authors have described the results obtained after studying the readiness of senior
preschool children to adapt to social and everyday conditions. They have revealed that components common to
the readiness of senior preschool children are undeveloped, which proves that it is necessary to organize specific
activities in the system of additional education to form the readiness of senior preschool children to adapt to
social and everyday conditions. This article studying the readiness of senior preschool children to adapt to social
and everyday conditions is relevant since its results can be used for the formation of the above-mentioned
readiness in the system of additional education, which will contribute to the social adaptation of these children.
Keyword : Readiness of senior preschool children to adapt to social and everyday conditions; structure of
readiness to adapt to social and everyday conditions; personal, cognitive and activity-based components of
readiness; constituent parts of readiness components; research methods and methodology; criteria and indicators
to evaluate one's readiness; development levels of the readiness of senior preschool children to adapt to social
and everyday conditions.
References:
1. Federalnyi gosudarstvennyi obrazovatelnyi standart doshkolnogo obrazovaniya № 1155 [The Federal State Educational Standard of
Preschool Education № 1155]. (2013). Available: http://www.rg.ru/2013/11/25/doshk-standart-dok.html
2. L.S. Vygotsky, Pedagogicheskaya psikhologiya [Pedagogical psychology]. Moscow: Pedagogika, 1991.
3. M.I. Lisina, Formirovanie lichnosti rebenka v obshchenii [Forming the child's personality in communication]. Saint Petersburg: Piter,
2008.
4. V.S. Mukhina, Vozrastnaya psikhologiya. Fenomenologiya razvitiya [Developmental psychology. The phenomenology of development],
12th ed. Moscow: Akademiya, 2012.
5. D.B. Elkonin, Psikhicheskoe razvitie v detskikh vozrastakh [The mental development of children]. Moscow: In-t prakt. Psikhologii,
1995.
6. N. Veraksa, “Development of cognitive capacities in preschool age”, International Journal of Early Years Education, 1, 2011, pp. 79-
88.
7. E. Bespanskaya. (2007). Regulation of behavior and formation of leading psychic functions in preschool age. ECP2007 (10th Eur opean
Congress of Psychology). Prague: List of Abstracts. Available:
http://www.ordinepsicologi.piemonte.it/DocsImgs/docs/Congresso%20Praga/files/abstract-2184.html
8. J. Haynes, “Children's readiness for school: perspectives and evidence”, Community practitioner: the journal of the Community
Practitioners' & Health Visitors' Association, 1, 2013, p. 12.
9. H. Lenira, “An Integrated Approach to Early Childhood Education and Care”, UNESCO Early Childhood and Family Policy, 3, 2002, p.
67.
10. S. Schoonmaker, “Kids in Context: The Sociological Study of Children and Childhoods”, Contemporary Sociology, 35(6), 2006, pp.
579-580.
11. N.V. Ryabova, Didakticheskaya sistema formirovaniya deyatelnosti pedagoga po sotsialnobytovoi orientatsii uchashchikhsya [The
didactical system of forming the teacher's activity aimed at developing social and everyday skills of pupils]. Saransk: Mordovian State
Pedagogical Institute named after M. E. Evseveva, 2008.
12. T.A. Parfenova, Formirovanie gotovnosti k sotsialno-bytovoi orientatsii mladshikh shkolnikov [Forming the readiness of junior pupils
to adapt to social and everyday conditions]. (PhD Thesis). Saransk: Mordovian State Pedagogical Institute named after M. E. Evseveva,
2016.
13. N.V. Ryabova, & T.A. Parfyonova, “Study of personal and social adjustment ability of the disabled pupils”, International Education
Studies, 8, 2015, p. 5.
14. E.V. Bartsaeva, “Gotovnost k sotsialno-bytovoi orientatsii: sushchnost ponyatiya [Readiness to adapt to social and everyday
conditions”], in Sotsialnoe partnerstvo v obrazovanii: tendentsii, praktiki [Social partnership in education: trends, practices]: the
proceedings of the 11th International scientific conference dedicated to the memory of N.V. Goryunov, in three parts, part 2. Saransk:
GBPOU RM "Saranskii gosudarstvennyi promyshlenno-ekonomicheskii kolledzh", 2018, pp. 42-45.
15. E.V. Bartsaeva, “Teoreticheskie osnovy struktury gotovnosti k sotsialno-bytovoi orientatsii doshkolnikov [Theoretical foundations of
the readiness of preschool children to adapt to social and everyday conditions]”, Samarskii nauchnyi vestnik, 7(3(24)), 2018, pp. 299-
302.
16. E.V. Bartsaeva, “Sushchnost lichnostnogo komponenta gotovnosti k sotsialno-bytovoi orientatsii doshkolnikov [The personal
component of the readiness of preschool children to adapt to social and everyday conditions]”, in Problemy sovremennogo
pedagogicheskogo obrazovaniya [Problems of modern teacher education]. The collection of scientific works. Yalta: RIO GPA, 2018.
17. C.R. Rogers, Freedom to learn: a view of what education might become, C.E. Merrill Pub. Co., 1969.
18. M. Rokeach, The Nature of Human Values. Free Press, 1973.
19. G.W. Allport, Becoming: Basic Considerations for a Psychology of Personality. New Haven: Yale University Press, 1955.
20. E. Fromm, The Forgotten Language: An Introduction to the Understanding of Dreams, Fairy Tales, and Myths. New York: Grove
Press, 1957.
21. M.S. Komarov, Vvedenie v sotsiologiyu [Introduction into sociology]. Moscow: Nauka, 1994.
22. L.I. Bozhovich, Izbrannye psikhologicheskie trudy: Problemy formirovaniya lichnosti [Selected psychological works: the personality's
formation]. Moscow: Mezhdunarodnaya pedagogicheskaya akademiya, 1995.
23. A.N. Leontev, Deyatelnost. Soznanie. Lichnost [Activity. Consciousness. Personality]. Moscow: Politizdat, 1975.
24. V.D. Shadrikov, Psikhologiya deyatelnosti i sposobnosti cheloveka [The psychology of the person's activity and skills], 2nd ed.
Moscow: Logos, 1996.
25. K.A. Vologdina, “Razvitie mezhlichnostnykh otnoshenii detei kak uslovie formirovaniya emotsionalnogo blagopoluchiya
doshkolnikov” [“The development of the child's interpersonal relationships as a condition for forming the emotional well-being of
preschoolers”], in Sovremennye problemy i usloviya sotsializatsii lichnosti [Modern problems and conditions of personality
socialization], A.M. Skotnikova, S.A. Minyurova, Eds. Yekaterinburg: Ural State Pedagogical University, 2012, pp. 37-41.
26. G.A. Uruntaeva, Doshkolnaya psikhologiya [Preschool psychology]. Moscow: Akademiya, 2001.
27. E.V. Bartsaeva, “Soderzhanie kognitivnogo komponenta gotovnosti k sotsialno-bytovoi orientatsii doshkolnikov [The cognitive
component of the readiness of preschool children to adapt to social and everyday conditions]”, in Sovremennye nauchnye issledovaniya
[Modern scientific research], issue 9, the collection of articles written by participants of the All-Russian scientific competition
"Luchshaya molodezhnaya nauchnaya statya – 2018" held by ANO DPO "MTsITO", Kirov (August 2017 – May 2018, Kirov: Izd-vo
MTsITO, 2018.
28. S.A. Kozlova, & T.A. Kulikova, Doshkolnaya pedagogika [Preschool pedagogy], 3rd ed. Moscow: Akademiya, 2001.
29. L.A. Golovchits, Doshkolnaya surdopedagogika: Vospitanie i obuchenie doshkolnikov s narusheniyami slukha [Preschool
surdopedagogy: the upbringing and education of hearing-impaired children]. Moscow: Vlados, 2001.
30. E. A. Ekzhanova, & E.A. Strebeleva, Korrektsionno-razvivayushchee obuchenie i vospitanie [Special education and upbringing].
Moscow: Prosveshchenie, 2005.
31. T.I. Babaeva, & L. Rimashevskaya, Kak razvivat vzaimootnosheniya i sotrudnichestvo doshkolnikov v detskom sadu [How to develop
the relationship and cooperation of preschool children in kindergartens?]. Saint Petersburg: DETSTVO-PRESS, 2012.
32. E.O. Smirnova, & V.M. Kholmogorova, Mezhlichnostnye otnosheniya doshkolnikov: diagnostika, problemy, korrektsiya [Interpersonal
relationships of preschool children: diagnostics, problems and reformation]. Moscow: Vlados, 2005.
33. I.N. Kurochkina, “Etiket v sotsiokulturnom prostranstve detstva [Etiquette in the socio-cultural context of childhood]”, Detskii sad ot A
do Ya. 5(71), 2014, pp. 48-53.
34. E.V. Bartsaeva, M.A. Demina, A.S. Kharlampova, “K probleme soderzhaniya deyatelnostnogo komponenta gotovnosti k sotsialno -
bytovoi orientatsii doshkolnikov [The activity-based component of the readiness of preschool children to adapt to social and everyday
conditions]”, Vestnik obrazovatelnogo konsortsiuma Srednerusskii universitet. Seriya: Gumanitarnye nauki, 11, 2018, pp. 12-14.
35. L.F. Fatikhova, Metodika formirovaniya obshcheintellektualnykh umenii u doshkolnikov s narusheniem intellekta [Methods for forming
general thinking skills of mentally challenged preschool children]. Ufa: Vagan, 2007.
36. B.I. Pinskii, Korrektsionno-vospitatelnoe znachenie truda dlya psikhicheskogo razvitiya uchashchikhsya vspomogatelnoi shkoly [The
disciplinary and educational meaning of labor for the mental development of children in the framework of additional education ].
Moscow: Pedagogika, 1985.
37. E.A.Mileryan, Psikhologiya formirovaniya obshchetrudovykh politekhnicheskikh umenii [The psychology of forming general labor and
polytechnic skills]. Moscow: Pedagogika, 1973.
38. N.F. Golovanova, Sotsializatsiya i vospitanie rebenka [The socialization and upbringing of children]. Saint Petersburg: Rech, 2004.
39. S.V. Pronyaeva, Formirovanie kommunikativnykh umenii u detei doshkolnogo vozrasta [Forming communicative skills of preschool
children]. (PhD Thesis). Yekaterinburg, 1999.
40. Е.V. Barcaeva, & N.V. Ryabova, The components of successfully adapting child with health limitations. Biology and Medicine
(Aligarh), 7(4), 2015, p. 5.
41. E.V. Barcaeva, N.V. Ryabova, E.V. Zolotkova, “Scientific and Methodological Basics of Formation of Preschoolers' Readiness fo r
Social and Personal Orientation”. International Journal of Engineering & Technology, 7(4.38), 2018, pp. 54-59 Available:
https://www.sciencepubco.com/index.php/ijet/article/view/24320
42. E.V. Ezhovkina, & N.V. Ryabova, “Psychological and pedagogic support of children with health limitations”, International Education
Studies, 8, 2015, p. 4.
43. Bartsaeva, E.V. “Issledovanie gotovnosti k sotsialno-bytovoi orientatsii detei doshkolnogo vozrasta” [“Studying the readiness of
preschool children to adapt to social and everyday conditions”], in Teoriya i praktika obrazovaniya doshkolnikov s ogranichennymi
vozmozhnostyami zdorovya [Theory and practice of education for preschool children with disabilities]. Saransk: Mordovian State
Pedagogical Institute named after M. E. Evseveva, 2018, pp. 28-50.
Keyword : Advanced Encryption Standard, Blockchain, Cloud, Digital files, Medico Record Department.
401. References:
1. C. Esposito, A. De Santis, G. Tortora, H. Chang, and K.-K. R. Choo, ‘‘Blockchain: A panacea for healthcare cloud-based data security
and privacy?’’ IEEE Cloud Comput., vol. 5, no. 1, pp. 31–37, Jan./Feb. 2018. 2316-
2. Hao Jin, Yan Luo, Peilong Li and Jomol Mathew, “A Review of Secure and Privacy-Preserving Medical Data Sharing” IEEE, p. May 2319
14, 2019.]
3. Nikita Sanghi, Rupali Bhatnagar, Gaganjot Kaur and Vinay Jain, “BlockCloud: Blockchain with Cloud Computing”, International
Conference on Advances in Computing, Communication Control and Networking, p. 2018.
4. Asaph Azaria, Ariel Ekblaw, Thiago Vieira, Andrew Lippman, “MedRec: Using Blockchain for Medical Data Access and Permission
Management”2016 2nd International Conference on Open and Big Data (OBD), p.25-30, 2016.
5. Navya M S, A Nihitha, Anjan K Koundinya, “Cloud Based Application for Health Monitoring System Using Wearable Sensors, 2016
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016.
6. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, Wenjing Lou, “Scalable and Secure of Personal Health Records in Cloud Computing
Using Attribute Based Encryption”, IEEE Transactions on Parallel and Distributed Systems, vol.24, 2013.
7. Valentina Casola, Aniello Castiglione, Kim-Kwang Raymond Choo, Christian Esposito,“Healthcare-Related Data in the Cloud:
Challenges and Opportunities”, IEEE Cloud Computing, vol. 3, 2016
8. Quratulain Alam, Saif U. R. Malik, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saher Tabbasum, Masoom Alam, “A Cross Tenant
Access Control Model for Cloud Computing: A Formal Specification and Verification”, IEEE Transactions on Information Forensics
and Security, vol. 12, 2017.
9. (2016). General Data Protection Regulation. [Online]. Available: https://eugdpr.org/the-regulation/
10. W. Raghupathi and V. Raghupathi, ‘‘Big data analytics in healthcare: Promise and potential,’’ Health Inf. Sci. Syst., vol. 2, no. 1, p. 3,
2014.
11. BlockChain, https://en.wikipedia.org/wiki/Blockchain
12. (2018). Healthcare Industry Ranks 8th for Cybersecurity but Poor DNS Health and Endpoint Security of Concern. [Online]. Available:
https://www.hipaajournal.com/healthcare-data-breach-statistics/
13. (2017). Summary of the HIPAA Security Rule. [Online]. Available: https://www.hhs.gov/hipaa/for-professionals/security/laws-
regulations/
14. Coindesk,‖What is BlockChain Technology‖,
https://www.coindesk.com/information/what-is-blockchain-technology
15. Advanced Encryption Standard. [Online]. Available:https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm
16. Erl-Huei Lu, Kuo -Tsang Huang and Jung-Hui, “Word-Based AES Encryption Without Data Expansion” Journal of information science
and engineering 32, p. 2016.
Mikhail Mikhailovich Turkin, Maria Aleksandrovna Volkova, Pavel Valerievich Zhesterov, Georgij
Authors:
Nikolaevich Kuleshov
Paper Title: Civil Action as One of The Ways of Damage Compensation
Abstract: This article is devoted to damage compensation, as exemplified by administrative law through
the filing of a civil lawsuit. The paper attempts to conduct a comprehensive analysis of ways to compensate for
damages caused by unlawful conduct during an administrative offense. For example, a certain parallel has been
drawn between the sources of criminal procedural law and administrative law in filing a civil lawsuit for damage
reparation. In addition, the norms of the current legislation of the Russian Federation governing the filing of a
civil lawsuit in the framework of proceedings on administrative offenses are analyzed. As an example, petty
hooliganism was chosen as one of the most common offenses in Russia. The article also reflects the existence of
differences in the concepts of “harm”, “loss” and “damage”. At the same time, loss is considered to be a more
common form of expression of property (material) harm in civil law relations.
Authors: Kiefer Stefano Ranti, Kelvin Salim, Andary Dadang Yuliyono, Abba Suganda Girsang
Paper Title: Clustering Behavioral Data for Advertising Purposes using K-Prototypes Algorithm
Abstract: Understanding the customer sentiment is very important when it comes to advertising. To appeal to
their current and potential customers, a company must understand the market interests. Companies can segment
their customers by using surveys and telemetry data to get to know the customer’s interests. One way of segmenting
the customer is by grouping or clustering them according to their interests and behaviors. In this study, the k-
prototypes clustering algorithm, which is an improved combination of k-means and k-modes algorithm, will be used
to cluster a behavioral data that contains both numerical and categorical attribute, obtained from a survey conducted
on teenagers into clusters of 4, 5, and 6. Each cluster will contain teenagers with certain behavior different from other
clusters. And then by analyzing the results, advertisers will be able to define a profile that indicates their interests
regarding the internet, social media and text messaging, effectively revealing the kind of ad that would be relatable
for them.
References:
1. A. Lenhart, “Mobile access shifts social media use and other online activities,” Teens, Social Media & Technology Overview, 2015.
[Online]. Available: http://www.pewinternet.org/2015/04/09/mobile-access-shifts-social-media-use-and-other-online-activities/.
2. E. Wright, N. M. Khanfar, C. Harrington, and L. E. Kizer, “The Lasting Effects Of Social Media Trends On Advertising,” J. Bus.
Econ. Res., vol. 14, no. 3, pp. 75–82, 2016.
3. A. Farahat, “How effective is targeted advertising?,” Proc. Am. Control Conf., pp. 6014–6021, 2013.
404. 4. Y. K. Dwivedi, K. K. Kapoor, and H. Chen, “Social media marketing and advertising,” Mark. Rev., vol. 15, no. 3, pp. 289–309, Oct.
2015. 2329-
5. D. S. Rajagopal, “Customer Data Clustering using Data Mining Technique,” Int. J. Database Manag. Syst., vol. 3, no. 4, Dec. 2011. 2334
6. C. A. Summers, R. W. Smith, and R. W. Reczek, “An audience of one: Behaviorally targeted ads as implied social labels,” J. Consum.
Res., vol. 43, no. 1, pp. 156–178, 2016.
7. J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang, and Z. Chen, “How much can Behavioral Targeting help online advertising?,” WWW’09
- Proc. 18th Int. World Wide Web Conf., pp. 261–270, 2009.
8. B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy: Perceptions of online behavioral advertising,”
SOUPS 2012 - Proc. 8th Symp. Usable Priv. Secur., vol. 2012, 2012.
9. G. Chicco, R. Napoli, and F. Piglione, “Comparisons among clustering techniques for electricity customer classification,” IEEE Trans.
Power Syst., vol. 21, no. 2, pp. 933–940, 2006.
10. D. Zakrzewska and J. Murlewski, “Clustering algorithms for bank customer segmentation,” Proc. - 5th Int. Conf. Intell. Syst. Des.
Appl. 2005, ISDA ’05, vol. 2005, pp. 197–202, 2005.
11. R. Sifa, A. Drachen, and C. Bauckhage, “Large-scale cross-game player behavior analysis on steam,” Proc. 11th AAAI Conf. Artif.
Intell. Interact. Digit. Entertain. AIIDE 2015, vol. 2015-Novem, pp. 198–204, 2015.
12. Z. Huang, “Extensions to the k-means algorithm for clustering large data sets with categorical values,” Data Min. Knowl. Discov., vol.
2, no. 3, pp. 283–304, 1998.
13. P. Awasthi, M. Charikar, R. Krishnaswamy, and A. K. Sinop, “The Hardness of Approximation of Euclidean κ -Means,” Leibniz Int.
Proc. Informatics, LIPIcs, vol. 34, pp. 754–767, 2015.
14. A. K. Jain, “Data clustering: 50 years beyond K-means,” Pattern Recognit. Lett., vol. 31, no. 8, pp. 651–666, 2010.
15. C. Slamet, A. Rahman, M. A. Ramdhani, and W. Dharmalaksana, “Clustering the verses of the holy qur’an using K-means algorithm,”
Asian J. Inf. Technol., vol. 15, no. 24, pp. 5159–5162, 2016.
16. G. Gan and M. K. P. Ng, “K-Means Clustering With Outlier Removal,” Pattern Recognit. Lett., vol. 90, pp. 8–14, 2017.
17. F. Jiang, G. Liu, J. Du, and Y. Sui, “Initialization of K-modes clustering using outlier detection techniques,” Inf. Sci. (Ny)., vol. 332,
pp. 167–183, 2016.
18. Y. Qian, F. Li, J. Liang, B. Liu, and C. Dang, “Space Structure and Clustering of Categorical Data,” IEEE Trans. Neural Networks
Learn. Syst., vol. 27, no. 10, pp. 2047–2059, 2016.
19. Q. Duan, Y. L. Yang, and Y. Li, “Rough K-modes clustering algorithm based on entropy,” IAENG Int. J. Comput. Sci., vol. 44, no. 1,
pp. 13–18, 2017.
20. R. S. Sangam and H. Om, “An equi-biased k-prototypes algorithm for clustering mixed-type data,” Sadhana - Acad. Proc. Eng. Sci.,
vol. 43, no. 3, pp. 1–12, 2018.
21. J. Li, X. Gao, and L. C. Jiao, “A GA-based clustering algorithm for large data sets with mixed and categorical values,” Proc. - 5th Int.
Conf. Comput. Intell. Multimed. Appl. ICCIMA 2003, pp. 102–107, 2003.
22. J. Ji, T. Bai, C. Zhou, C. Ma, and Z. Wang, “An improved k-prototypes clustering algorithm for mixed numeric and categorical data,”
Neurocomputing, vol. 120, pp. 590–596, 2013.
23. P. Arora, Deepali, and S. Varshney, “Analysis of K-Means and K-Medoids Algorithm for Big Data,” Phys. Procedia, vol. 78, no.
December 2015, pp. 507–512, 2016.
Paper Title: Characterizing Traffic Context-based User Experience for Public Safety
Abstract: The modern interconnected digital world is a result of the rapid growth of information and
communication technology (ICT.) A smart city aims to provide a single technological platform through
integrating all its services, devices, interfaces, and infrastructure, allowing the city to operate in an intelligent
way that can support social and benefit from the user experience. In this context, one of the critical issues
associated with fast urbanization is traffic management, which needs intelligent infrastructures. In this paper,
aiming to enhance public security, improve user experience, and ensure smooth traffic flow, a road traffic signal
control mechanism is proposed to automatically control the duration of a green light signal at the signalized road
intersections by using an intelligent fuzzy rule-based system (FRBS). This can assist traffic signal plan, which
dynamically adjusts the time required for switching between green and red lights. For this purpose, the concept
of traffic context based on user experience is proposed to define the context in terms of the number of vehicles,
the number of pedestrians, time of day, and the weather conditions as the inputs for the fuzzy control system.
The proposed system was designed keeping in view the busy junctions joining important and busy areas; the
system is effective for traffic congestion control, energy saving, and enhancing public security and comfort.
Also, the FRBS-assisted system is very flexible and not limited to the defined antecedents; consequently, it can
be easily extended to accommodate other variables on demand, making it adaptive to any road intersection
scenario.
Keyword : Fuzzy Rule-Based System, Intelligent Transportation Systems, Traffic Context, User Experience.
References:
1. Fend, S.; Setoodeh, P.; Haykin, S. Smart Home: Cognitive Interactive People-Centric Internet-of-Things. IEEE Communications
Magazine, 2017, 55, 34-39.
2. Weng. T.; Agarwal, Y. From Buildings to Smart Buildings-Sensing and Actuation to Improve Energy Efficiency. IEEE Design and
Test of Computers, 2012, 29, 36-44.
3. Chiwewe, T.M.; Mbuya, C.F.; Hancke, G.P. Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks:
An Overview. IEEE Transactions on Industrial Informatics, 2015, 11, 1466-1481.
4. Vlacheas, P.; Glaffreda, R.; Stavroulakl, V.; Kelaidonis, D.; Foteinos, V.; Poulios, G.; Demestichas, P. Enabling Smart Cities through
405. a Cognitive Management Framework for the Internet of Things. IEEE Communication Magazine, 2013, 51, 102-111.
5. Foschini, L.; Taleb, T.; Corradi, A.; Bottazzi, D. M2M based Metropolitan Platform for IMS-enabled Road Traffic Management in 2335-
IoT. IEEE Communications Magazine, 2011, 49, 50-57.
6. Amendola, S.; Lodato, R.; Manzari, S.; Occhiuzzi, C.; Marrocco, G. RFID technology for IoT-based Personal Healthcare in Smart
2343
spaces. IEEE Internet of Things Journal, 2014, 1, 144-152.
7. Fonesca, L.M. Industry 4.0 and the Digital Society: Concepts, Dimensions and Envisioned Benefits. Proceedings of the 12th Int.
Conf. on Business Excellence, Sciendo, 2018, 12, 386-397.
8. Sultan, K. Fuzzy Rule Based System (FRBS) assisted Energy Efficient Controller for Smart Streetlights: An Approach Towards
Internet-of-Things (IoT). Journal of Communications, 2018, 13, 518-523.
9. Patil, R.; Srinivasaraghavan, A. Smart Traffic Controller Using Fuzzy Inference System (STCFIS), in Proceedings of the 2nd
International Conference on Next Generation Computing Technologies, Dehradun, India, Oct. 14-16, 2016.
10. ISO. Road Vehicles – Transportation information and control system – Detection Response Task (DRT) for assessing attentional
effects of cognitive load in driving. International Standard, ISO 17488, 2016.
11. Perrin, J.; Martin, P; Hansen, B. Modifying Signal Timing during Inclement Weather, in Proceedings of the ITE Annual Meeting and
Exhibit, Philadelphia, PA, USA, 2002.
12. Pisano, P.; Goodwin, L. Surface Transportation Weather Applications, in Proceedings of the ITE Annual Meeting and Exhibit,
Philadelphia, PA, USA, 2002.
13. Bhanja, U.; Kumar, R.; Routroy, A.; Behura, S.; Mahapatra, S. Dynamic Traffic Congestion Detection in VANETS using a Fuzzy
Rule-Based System and K-means Clustering, in Proceedings of the IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS), Bhubaneswar, India, Dec. 17-20, 2017, 1-6.
14. Zaid, A.; Suhweil, Y.; Yaman, M. Smart Controlling for Traffic Light Time, in Proceedings of the IEEE Jordan Conference on
Applied Electrical Engineering and Computing Technologies (AEECT), Aqaba, Jordan, Oct. 11-13, 2017, 1-5.
15. Cueva-Fernandez, G.; Pascual Espada, J.; García-Díaz, V.; Gonzalez-Crespo, R. Fuzzy Decision Method to Improve the Information
Exchange in a Vehicle Sensor Tracking System. Appl. Soft Comput. 2015, 35, 708-716.
16. Blond, S.L.; Aggarwal, R. A Review of Artificial Intelligence Techniques as Applied to Adaptive Autoreclosure, with Particula r
Reference to Deployment with Wind Generation, in Proceedings of the Universities Power Engg. Conference, 2009.
17. Jiang, J.; Syue, C.; Wang, C.; Wang, J.; Shieh, J. An Interval Type-2 Fuzzy Control System for Stock Index Forecasting based on
Fuzzy Time Series and A Fuzzy Logical Relationship Map. IEEE Access, 2018, 6, 69107-69119.
18. Yang, C.; Jiang, Y.; Na, J.; Li, Z.; Cheng, L.; Su, C. Finite-time Convergence Adaptive Fuzzy Control for Dual-Arm Robot with
Unknown Kinematics and Dynamics. IEEE Trans. Fuzzy Systems, 2019, 27, 574-588.
19. Qinghua, H.; Minghai, P.; Wucai, Z.; Zhiheng, L. Time Resource Management of OAR Based on Fuzzy Logic Priority for Multiple
Target Tracking. J. Systems Engineering and Electronics, 2018, 29 (4), 742-755.
20. Sultan, K.; Qureshi, I.M.; Atta-ur-Rahman, Zafar, B.A.; Zaheer, M. CSI Based Multiple Relay Selection and Transmit Power Saving
Scheme for Underlay CRNs Using FRBS and Swarm Intelligence. Int. J. Applied Metaheuristic Computing, 2019, 10, 2.
21. Soleymani, S.A.; Abdhullah, A.H.; Zareeri, M.; Anisi, M.H.; Rosales, C.V.; Khan, M.K.; Goudarzi, S.A. Secure Trust Model based
on Fuzzy Logic in Vehicular Ad Hoc Networks with Fog Computing. IEEE Access, 2017, 5, 15619-15629.
22. Horng, G.J.; Li, J.P.; Cheng, S.T. Traffic Congestion Reduce Mechanism by Adaptive Road Routing Recommendation in Sm art City,
in Proceedings of the 3rd Int. Conf. on Consumer Electronics, Communications and Networks, Xianning, China, Nov. 20 -22, 2013.
23. Dhajel, S.; Smith, N.; Wang, S.; Murphy, J. Reducing Emergency Services Response Time in Smart Cities: An Advanced Adaptive
and Fuzzy Approach, in Proceedings of the IEEE 1st Int. Smart Cities Conference, Guadalajara, Mexico, Oct. 25-28, 2015.
24. Pau, G.; Campisi, T.; Canale, A.; Severino, A.; Collotta, M.; Tesoriere, G. Smart Pedestrian Crossing Management at Traffic Light
Junctions through a Fuzzy-Based Approach. Future Internet, 2018, 10, 1-19.
25. Alkestrup, R. Smart City Traffic Management. Department of Applied Mathematics and Computer Science, 2017.
26. Kumar, T.; Gupta, S.; Kushwaha, D.S. An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images,
in Proceedings of the 5th Int. Conference on Network, Communication and Computing, Kyoto, Japan, Dec. 17-21, 2016.
27. Muralidharan, A.; Coogan, S.; Flores, C.; Varaiya, P. Management of Intersections with Multi-modal High-Resolution Data. Transp.
Res. Part C Emerg. Technol., 2016, 68, 101-112.
28. Wadi, M.; Shobole, A.; Tur, M.; Baysal, M. Smart Hybrid Wind-Solar Street Lighting System Fuzzy Based Approach: Case Study
Istanbul-Turkey, in Proceedings of the 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey,
April 25-26, 2018.
29. Giuffre, T.; Campisi, T.; Tesoriere, G. Implications of Adaptive Traffic Light Operations on Pedestrian Safety. IOSR J. Mech. Civ.
Eng., 2017, 13, 58-63.
30. Fang, G. A Survey on Analysis and Design of Model-based Fuzzy Control Systems. IEEE Trans. Fuzzy Systems, 2006, 14, 676-697.
31. Mamdani, E.H. Application of Fuzzy Logic to Approximate Reasoning using Linguistic Synthesis. IEEE Transactions on Computers,
C-26, 1977, 1182-1191.
32. Keneni, B.M.; Kaur, D.; Bataineh, A.; Devabhaktuni, V.K.; Javaid, A.Y.; Zaientz, J.D.; Marinier, R.P. Evolving Rule -Based
Explainable Artificial Intelligence for Unmanned Aerial Vehicles. IEEE Access, 2019, 7, 17001-17016.
Keyword : wheeled tractor, modeling, optimal control, wheel adhesion, lateral slip.
References:
1. B.M. Azimov, Sh.A. Akhmedov, A.R. Ruzikulov, M.B. Azimov, “Modeling and optimal control of the movement of a four-wheel
406. universal tractor with a continuously adjustable ground clearance”, Journal Computational and Applied Mathematics, Vol. 6. Tashkent,
2018, pp.22-35. 2344-
2. B.M. Azimov, D.K. Yakubjanova, “Imitation modeling and calculation of the parameters of Lateral forces components of guide wheels
of Cotton-picker MH-1.8”, International journal of advanced research in science, engineering and technology, vol.5, Issue 1, 2018, 2351
pp.5024-5032.
3. V.V. Guskov and others, Tractors: Theory, Moskow: Mashinostroenie, 1988, pp.33−35.
4. G.A. Smirnov, Theory of the movement of wheeled vehicles, Moskow: Mashinostroenie, 1990, pp.145-230.
5. Mc.L. John Bennett, Nathan P. Woodhouse, Thomas Keller, Troy A. Jensen, and L. Diogenes, “Advances in Cotton Harvesting
Technology: a Review and Implications for the John Deere Round Baler Cotton Picker”, Journal of Cotton Science, vol.19, 2015,
pp.225-249. http://journal.cotton.org,
6. Z. L. Zhou, J.Q. Ding, L.Y. Xu, M.X. Xing, Y.T. Liu, “ Optimal Control for Tractor Automatic Transmission Shift Process”, Advanced
Materials Research, vol. 468-471, pp. 2241-2247, 2012. https://www.scientific.net/AMR.468-471.2241.
7. Fl. Loghin, T.A. Ene, V. Mocanu, I.Capatîna, “Dynamic modeling of technical system tractor - seed drill. Bulletin of the Transilvania
University of Brasov”, Series II: Forestry • Wood Industry • Agricultural Food Engineering , Vol. 5 (54) , No. 1, 2012, pp. 155-160.
8. Marco Bietresato, Dario Friso, Luigi Sartori, “Assessment of the efficiency of tractor transmissions using acceleration tests”,
Biosystems Engineering, vol. 112(3), pp. 171–180, July 2012.
9. C.G. Masi, “Simulation Software in Motion Control”, Control Engineering, 2010. https://www.controleng.com/search/search-single-
display/simulation-software-in-motion-control/5bfbdfb975.html
10. V.M. Sharipov, M.I. Dmitriev, A.S. Zenin, “The Mathematical Model of Gear Shifting in a Tractor Gearbox” SCIENCE &
EDUCATION, Bauman Moscow State Technical University, 2014. http://technomag.bmstu.ru/en/doc/711329.html
11. V.N. Afanasyev, V.B. Kolmanovsky, V.R. Nosov, Mathematical theory of designing control systems. Moscow: Higher school, 1989,
pp. 162−163.
12. K.A. Babashev, M.B. Azimov, “Mathematical modeling and process control of wheeled vehicles” Proceedings of the XVIII
International Scientific and Methodological Conference "Informatics: problems, methodology, technology". Vol. 5, pp. 108-113,
Voronezh, Publishing House: Scientific Research Publications, LLC Velborn, 2018.
13. F.P. Vasiliev, Numerical methods for solving extremal problems, Moscow: Nauka, 1988, pp. 421−485.
14. A.N. Belyaev, T.V. “Trishina Study of the kinematics of the rotation of the wheeled tractor”, vol. 1 (48), Bulletin of the Voronezh State
Agrarian University, 2016, pp.115-120.
15. S.A. Dudnikov, S.V. Shchitov, “Investigation of the kinematics of turning a class 1.4 tractor”/ Vestnik KrasGAU, vol. 211(1), pp.1 58-
163.
Authors: Kanga Idé Soumaila, Naimi Mustapha, Chikhaoui Mohamed, Ada Aya Laouali
Paper Title: Development of a Computer Application for the Calculation of Water Quality Index in Morocco
Abstract: Water quality indices are generally a combination of biological, chemical, physical parameters
to form a numerical composite index that can be easily interpreted and shared. Their efficiency and usefulness in
managing and monitoring water quality have been appreciated by management organizations around the world.
The integration of these tools into computer applications can be a major asset. The main purpose of this article is
to present a computer application that integrates a water quality index developed in Morocco to facilitate its use
and avoid manual errors related to users. The application entirely developed in python language under PyCharm
(Integrated Development Environment) is executable on a computer and is presented as a GUI (Graphical User
Interface) containing two sub-interfaces to calculate the surface and groundwater quality index according to the
408. type of water analyzed.
2358-
Keyword : Computer application, Water quality index, Water quality parameters, Development, Morocco. 2362
References:
1. Abbasi T and Abbasi SA, 2012. Water Quality Indices. Elsevier. Amsterdam, Netherlands.
2. Gitau MW, Chen J and Ma Z, 2016. “Water Quality Indices as Tools for Decision Making and Management” Water Resour. Manag. 30
(8): 2591-610
3. Swamee P K and Tyagi A, 2007. “Improved Method for Aggregation of Water Quality Subindices.” J. Environ Eng -ASCE. 133:220–
225.
4. Brown RM, McClelland NI, Deininger RA and Tozer RG, 1970. “A Water Quality Index- Do We Dare?” Water & Sew. Works.
117:339–343.
5. Nabizadeh R, Amin MV, Alimohammadi M, Naddafi K, Mahvi AH and Yousefzadeh S, 2013. Development of innovative computer
software to facilitate the setup and computation of water quality index. J. Environ. Health. Sci. Eng.11:1
6. (CCME) Canadian Council of Ministers of the Environment, 2001. CCME Water Quality Index. 1.0 Technical Report. CCME,
Winnipeg, MB.
7. Dinius SH, 1987. “Design of an Index of Water Quality.” Water Resour. Bull. 23(5):833-843.
8. Said A, Stevens DK and Sehlke G, 2004. “An Innovative Index for Evaluating Water Quality in Streams.”Environ. Manage. 34:406 –
414.
9. Cude CG, 2001. “Oregon Water Quality Index: A Tool for Evaluating Water Quality Management Effectiveness.” J. Am. Water
Resour. As. 37(1):125–137.
10. Walski TM and Parker FL, 1974. “Consumers Water Quality Index” J. Environ. Eng-ASCE 100(3):593-611.
11. Smith D, 1990. “A Better Water Quality Indexing System for Rivers and Streams.” Water Res. 24(10):1237–1244.
12. Sargoankar A and Deshpande V, 2003. “Development of an Overall Index of Pollution for Surface Water Based on a General
Classification Scheme in Indian Context.” Environ. Monit. Assess.
13. Kanga IS, Niandou AS, Naimi M, Chikhaoui M, Schimmel K and Luster-Teasley S, 2019a. A Systematic Review and Meta-Analysis
of Water Quality Indices. JAST-B. 9 (2):1-14.89(1):43–67.
14. Sarkar C and Abbasi S A, 2006. Qualidex – a new software for generating water quality indice. Environ. Monit. Assess. (2006) 119:
201–231
15. Sharma A, Naidu M and Sargaonkar A, 2013.Development of computer automated decision support system for surface water quality
assessment. Comput. Geosci-UK. 51 (2013):129-134
16. Moeseneder C, Dutra M, Thebaud O, Ellis N, Boschetti F, Tickell S, Dichmont C, Mare W, Pascual R and Cannard T, 2015. A
simulation interface designed for improved user interaction and learning in water quality modelling software. Environ. Modell.
Softw. 70(2015):86-96.
17. Ewaid SH, Kadhum SA, Abed AS and Salih RM, 2018. Development and evaluation of irrigation water quality guide using IWQGV.1
software: A case study of Al-Gharraf Canal, Southern Iraq. Environ. Technol. Inno.13:224-232.
18. Brown LC and Barnwell TO, 1987. The Enhanced Stream Water Quality Models QUAL2E and QUAL2E-UNCAS (EPA/600/3-87-
007). US Environmental Protection Agency, Athens.
19. Kanga IS, Chikhaoui M and Naimi M, 2019b.Water Quality Assessment Using a New Proposed Water Quality Index: A Case Study
from Morocco. J. Environ. Agric. Biotech. 4(4):957-792.
20. Horton RK, 1965. “An Index Number System for Rating Water Quality.” J. Water Pollu. Cont. Fed. 37:300–306.
21. Lumb A, Sharma TC and Bibeault JF, 2011. “A Review of Genesis and Evolution of Water Quality Index (WQI) and Some Future
Directions.” Water Qual. Expos. Hea.3:11–24.
22. Terrado M, Borrell E, de Campos S, Barcelo D and Tauler R, 2010. Surface-water-quality indices for the analysis of data generated by
automated sampling networks. Trends Anal. Chem. 29(1):40-52.
23. Kralev VS and Kraleva RS, 2017. Methods and tools for rapid application development. In Proceedings, 3th International Scientific
and Practical Conference "Methodology of Modern Research", 21-24. March 2017. Abu-Dhabi, UAE. World Science, Vancouver,
Canada.
Paper Title: Line Segmentation Challenges in Tamil Language Palm Leaf Manuscripts
Abstract: The process of an Optical Character Recognition (OCR) for ancient hand written documents or
palm leaf manuscripts is done by means of four phases. The four phases are ‘line segmentation’, ‘word
segmentation’, ‘character segmentation’, and ‘character recognition’. The colour image of palm leaf manuscripts
are changed into binary images by using various pre-processing methods. The first phase of an OCR might break
through the hurdles of touching lines and overlapping lines. The character recognition becomes futile when the
line segmentation is erroneous. In Tamil language palm leaf manuscript recognition, there are only a handful of
line segmentation methods. Moreover, the available methods are not viable to meet the required standards. This
article is proposed to fill the lacuna in terms of the methods necessary for line segmentation in Tamil language
document analysis. The method proposed compares its efficiency with the line segmentation algorithms work on
binary images such as the Adaptive Partial Projection (APP) and A* Path Planning (A*PP). The tools and
criteria of evaluation metrics are measured from ICDAR 2013 Handwriting Segmentation Contest.
Keyword : line segmentation, Tamil palm leaf manuscripts, connected component, historical documents,
Tamil character recognition.
References:
1. Ines Ben Messaoud, Hamid Amiri, Haikal El Abed, Volker Margner "A Multilevel Text line Segmentation Framework for Handwritten
409. Historical Documents", ICFHR, IEEE, pp. 515-520, 2012.
2. Xi Zhang, Chew Lim Tan "Text Line Segmentation for Handwritten Documents Using Constrained Seam Carving", ICFHR, IEEE, pp. 2363-
98-103, 2014.
3. MadeWindu Antara Kesiman, Dona Valy, Jean-Christophe Burie, Erick Paulus, Mira Suryani, Setiawan Hadi, Michel Verleysen,
2367
Sophea Chhun and Jean-Marc Ogier, "Benchmarking of Document Image Analysis Tasks for Palm Leaf Manuscripts from Southeast
Asia" J.Imaging, pp. 1- 27, 2018.
4. Papangkorn Inkeaw, Atcharin Klomsae, Sanparith Marukatat, "Lanna Dharma Handwritten Character Recognition on Palm Leaves
Manuscript based on Wavelet Transform", ICSIPA, IEEE, pp. 253-258, 2015.
5. Nagendra Panini Challa, R.Vasanth Kumar Mehta, "Applications of Image Processing Techniques on Palm Leaf Manuscripts - A
Survey", Helix, pp. 2013-2017, 2017.
6. Ge Peng, Pengfei Yu, Haiyan Li and Lesheng He, "Text Line Segmentation Using Viterbi Algorithm For The Palm Leaf Manuscripts of
Dai", ICALIP, IEEE, pp. 336-340, 2016.
7. Ge Peng, PengFei Yu, HaiYan Li, HongSong Li, XuDong Zhu, "A Character Segmentation Algorithm for the Palm Leaf Manuscripts",
ICCIA, IEEE, pp. 354-358, 2017.
8. Dona Valy, Michel Verleysen, and Kimheng Sok, "Line Segmentation Approach for Ancient Palm Leaf Manuscripts using Competitive
Learning Algorithm", ICFHR, IEEE, pp. 108-113, 2016.
9. Jija Das Gupta, Bhabatosh Chanda, "A Model Based Text Line Segmentation Method for Off-line Handwritten Documents", ICFHR,
IEEE, pp.125-129, 2010.
10. Vijaya Kumar Koppula, Atul Negi, "Fringe Map Based Text Line Segmentation of Printed Telugu Document Images", ICDAR, IEEE,
pp. 1294-1298, 2011.
11. N. Tripathy and U. Pal, "Handwriting Segmentation of Unconstrained Oriya Text", Sadhana, Springer, pp.755-769, 2006.
12. Rapeeporn Chamchong, Chun Che Fung, "Text Line Extraction Using Adaptive Partial Projection for Palm Leaf Manuscripts from
Thailand", ICFHR, IEEE, pp. 586-591, 2012.
13. Olarik Surinta, Michiel Holtkamp, Faik Karabaa, Jean-Paul van Oosten, Lambert Schomaker and Marco Wiering, "A* Path Planning for
Line Segmentation of Handwritten Documents", ICFHR, IEEE, pp.175-180, 2014.
14. Alexander Berennolts, Michael Lindenbaum, "On The Performance of Connected Components Grouping", IEEE, pp.189-192, 2000.
15. R.Spurgen Ratheash, and M. Mohamed Sathik, “A Detailed Survey of Text Line Segmentation Methods in Handwritten Historical
Documents and Palm Leaf Manuscripts”, IJCSE, pp 99-103 , 2019.
Keyword : FEA, Epoxy glass fiber composite material, tensile load, ANSYS.
References:
22. Potter K. D., Davies R., Barrett M., Godbehere A., Bateup L., Wisnom M., and Mills A., “Heavily loaded bonded composite
structure: design, manufacture and test of `I' beam specimens” Composite Structures, 2001, 51, 389-399.
23. Khalid Y. A., Sahari B. B., Ali F. A. and Saad E. M. A., “Performance of composite I-beams under axial compression and bending
load modes” Materials and Design, 2005, 26, 127-135.
24. Hadi N.S., Yuan J. S., “Experimental investigation of composite beams reinforced with GFRP I-beam and steel bars” Construction and
Building Materials, 2017, 144, 462-474.
25. Noor A. E., Al-Moubaraki A. H., “Corrosion Behavior of Mild Steel in Hydrochloric Acid Solutions”, Int. J. Electrochem. Sci., 2014,
3, 806-818.
26. Gagani A. I., Emeric P.V. M. and Echtermeyer A. T., “Immersed interlaminar fatigue of glass fiber epoxy composites using the I-beam
method”, JIJF, 2018, 4875.
27. Mariama M., Afendi M., Majid M.S.A, Ridzuan M.J.M., Azmi A.I. and Sultan M.T.H., “Influence of hydrothermal ageing on the
mechanical properties of an adhesively bonded joint with different adherends”, Composite: Part B, 2019, 165, 572-585.
References:
1. Artobolevsky I.I. Theory of mechanisms and machines.- M .: Nauka, 1988. pp-640.
2. Frolov K.V. Theory of mechanisms and machines. -M .: Higher school, 1987. pp -496.
3. A.Jurayev, R.Kh. Maksudov Machine va mekhanlar nazariyashi 1-қism (Machine va mekhanlar tuzilish asoslari va kinematikashi) Kuv
Ullanma ISBN 978-9943-11-945-1 “Fan va tehnologiya” nashirieti Toshkent 2019. pp -408.
4. A.Dzhuraev, Sh. Kenzhaboev Development of constructive schemes and the scientific basis for the analysis and synthesis of lin k
mechanisms with elastic elements and flexible links of the drives of technological machines. Monograph Ed. Namangan 2019 p.267.
ISBN 978-9943-5645-8-9.
5. A.Dzhuraev, Davidbaev B., Zulpiev S.M. Structural analysis of the lever-articulated coupling J. "FerPI ilmiy technique magazines",
Fergana, 2009, No. 2, S.30-32.
6. A.S. 1370348 USSR, MKI F16H 21/00. Rocker mechanism / Magdiev M.A., Juraev A., Kuzibaev G.S., Mukhamedov D., Alimov
P.T., Shukurov S.Z. IM and SS AN RU // B.I.-1988. Number 4.
7. A.S. 905549 USSR, MKI F16H 21/00. Rocker mechanism / Usmankhodzhaev Kh.Kh., Kuzibaev G.S., Malikov R.Kh., Magdiev M.A.
IM and SS AN RU. // B.I. -1982. No. 6.
8. A.S. 1504430 USSR, MKI F16Н 21/00, Rocker mechanism / Magdiev M.A. IM and SS AN RU // B.I.-1989. №32.
9. A.S. 1270462 USSR, MKI F16H 21/00. 06/19. Drawstring reversing mechanism / Magdiev M.A., Yuldashbekov S.A. IM and SS AN
RU // B.I.-1986. №42.
10. A.S. 1379529 USSR, MKI F16H 21/00. Rocker mechanism / Magdiev M.A., Juraev A., Kuzibaev G.S., Malikov R.Kh. IM and SS AN
RU // B.I. –1988. №9.
11. А.Djuraev, J.Kh.Beknazarov. Development of designs and methods for calculating gears with variable parameters and elastic elements.
International journal of advanced research in science, engineering and technology Vol. 5, issue 5 , may 2018
12. O. O.Sayfidinov, J.Kh. Beknazarov. New prototype theory for cear transmission. Open Access Peer-Revieweed Journal 2(9) vol I
February 2018.
Paper Title: Classifying the Category of Workers using Crowd-sourced Job Seekers Data
Abstract: Crowdsourcing refers to decomposing complex jobs to multiple tasks and solve those task with
multiple workers through open call in distributed networking environment. The recruitment of employees for
organization has undergone transformation from traditional method to digital domain. Online recruitment
facilitates just-in-time hiring to requesters and enables the workers to compete in the global market. This paper
proposed an Efficient Machine Learning Crowdsourced(EMLC) method for E-recruitment which uses
Crowdsourcing method to collect resumes from the workers and details of work from the requesters. The data is
collected from a private job agency through an online recruitment portal which consist of recruiters from
companies and job seekers based on qualifications and experience related to their field. The data collected from
recruitment portal is analyzed with Machine Learning Approach with decision tree algorithms like ID3, CART
and C4.5 for better selection of efficient person to complete the job. Various performance metrics such as
Accuracy, Error rate, Recall etc were used to the Crowdsourced Database to categorize the job seekers
efficiently. The proposed method gives better result for online recruiting through Crowdsourcing.
Keyword : online review surveys, supervised learning, unlabeled data, Naïve bayes algorithm, classifiers, EM
algorithm, Bag of Words, Stop word Filtering, Support Vector Machine classifier.
References:
1. J.K Rout et al, A.Dalmia, Kim-Kwang Raymond Choo,(Senior member ,IEEE),Sambit Bakshi,(Member,IEEE),Sanjay Kumar (Senior
Member,IEEE),”Revisiting Semi-Supervised Learning for Online Deceptive Review Detection”, in Proc.special section on security
and privacy in applications and services for future internet of things, vol 5 2017.pp.Jan 18 2017,doi:10.1109/Access.2017.265503.
2. Shafi’I Muhammad Abdulhamid,Muhammad Shafie abd latiff, Haruna chiroma, Gaddafi Abdul-Salaam (Member,IEEE), “A Review
on Mobile SMS Spam Filtering Techniques” in Proc.pp:Feb13,2017,doi:10.1109/ACCESS.2017.2666785.
3. Xin Ruan Zhenyu Wu, Member IEEE,Haining Wang, Senior Member, IEEE,and Sushil Jajodia, Fellow, IEEE, “Profiling Online
Social Behaviors for Compromised Account Detection”, in Proc. IEEE Transactions on Information Forensics and Security, DOI
10.1109/TIFS.2015.2482465.
4. Mohd Fazil and Muhammad Abulaish, Senior Member, IEEE “A Hybrid Approach for detecting Automated Spammers in Twitter” in
Proc. Transactions on Information Forensics and Security, 1556-6013© 2018 IEEE,doi:10.1109/TIFS.2018.2825958,IEEE.
5. Vedat Coskun, Member, IEEE, Erdal Cayirci, Senior Member, IEEE, Albert Levi, Member, IEEE, and Serdar Sancak “Qurantine
Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks” in Proc.IEEE Transactions on Mobile Computing, Vol 5, No.
8, August 2006,doi: 1536-1233/06/$20.00 © 2006 IEEE.
6. [6]Lourdes Araujo and Juan Martinez-Romo, IEEE,”Web Spam Detection: New Classification Features based on Qualified Link
Analysis and Language Models” in Proc.IEEE Transactions on information forensics and security, vol 5, No.3, September 2010, doi:
10.1109/TIFS.2010.2050767,IEEE.
7. [7] Fei Zhang, Student Member, IEEE, “Adversarial Feature Selection Against Evasion Attacks” in Proc.IEEE Transactions on
Cybernetics, pp 2015 IEEE.doi:10.1109/TYCB.2015.2415032.
8. [8]seGaradi, IEEE,”Email Classification Research Trends: Review and Open Issues” in Proc. IEEE, pp: Jun 18,2017, doi:
101109/ACCESS.2017.2702187
9. [9]Chao Chen, Yu Wang, Jun Zhang Senior Member IEEE,”Statistical Features-Based Real Time Detection of Drifted Twitter Spam”
in Proc. IEEE Transactions on Information Forensics and Security, vol 12, No.4 ,Apr 2017 doi: 10.1109/TIFS.2016.2621888.
10. S.Khattak,N.R. Ramay, K.Riyaz Khan, “A Taxonomy of botnet behavior, Detection, and defense” in Proc. IEEE Communications
surveys and Tutorials,Vol 16, No.2,Second Quarter 2014,doi:10.1109/SURv.2013.091213.00134.
11. Jian Zhang, Lian-Han Si-Ma, Bin-Qiang Wang, Jian-Kang Zhang and Yan-Yu Zhang, “Low-Complexity Receivers and Energy-
Efficient Constellations for SPAD VLC Systems” in Proc. IEEE Photonics and Technology Letters, 2016 IEEE,
doi:10.1109/LPT.2016.2572300.
12. Peng Zhang, Chuan Zhou, Peng Wang, Byron J.Gao,”E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams”
in Proc.IEEE Transactions on knowledge and Data Engineering, 1041-4347©2013,doi-10.1109/TKDE.2014.2298018.
13. Kentaroh Toyoda, (Member, IEEE), Mirang Park, Tomoaki Ohtsuki(IEEE), “Novel Unsupervised SPIters Detection Scheme by
Automatically Solving Unbalanced Situation” in Proc.IEEE, pp. June 7,2017.doi:10.1109/ACCESS.2016.2642978.
14. Bartosz Kurlej and Michal Wozniak,”Active Learning Approach to concept drift problem” in Proc. Oxford University Press © The
author 2011 doi:10.1093/jigpal/jzr011.
15. Zhizhou Yin, Fei Wang, Wei Liu, Member, IEEE,” Sparse Feature Attacks in Adversarial Learning” in Proc. Transactions on
Knowledge and Data Engineering © 2017 doi:10.1109/TKDE.2018.2790928.
16. Stavros Papadopoulos, Anastasios Drosou, Senior Member, IEEE, “A Novel graph Descriptor for the Detection of Biling-related
Anomalies in Cellular mobile Networks” in Proc. IEEE Transactions on Mobile Computing,doi:10.1109/TMC.2016.2518668.
17. Chao Chen, Yu Wang, Jun Zhang, Senior Member, IEEE, “Statistical Features-Based Real-Time Detection of Drifted Twitter Spam” in
Proc.IEEE Transactions on Information Forensics and Security, vol 12, No.4, Apr 2017, doi:10.1109/TIFS.2016.2621888.
18. Yafeng Ren and Donghong ji,”Learning to Detect Deceptive Opinion Spam: A Survey” in Proc.IEEE April 13, 2019,
doi:10.1109/ACCESS.2109.2908495.
19. Adrian Lara, Byrav Ramamurthy,”OpenSec: Policy-based Security using Software-defined Netwrking” in Proc.IEEE Transactions on
Network and Service Management,© 2015 doi:10.1109/TNSM.2016.2517407.
20. Kuan Zhang, Student Member, IEEE, Xiaohui Liang, Member,IEEE, “PIF:A Personalized Fine Grained Spam Filtering Scheme With
Privacy Preservation in Mobile Social Networks” in Proc. IEEE Transactions on computational Social Systems, vol 2,No.3 Sep
2015,doi: 10.1109/TCSS.2016.2519819.
Paper Title: Authentication of an Image with Sha-1 and Invariant Vector Distances
Abstract: The two primary objectives of image authentication are Discrimination and Robustness. The
SHA-1 algorithm, invariant vector distance and ring division are implemented to authenticate the image by using
hash value to enhance discriminative capability and rotation robustness. The statistical features like central
moments of the picture which contains rings in homogenous CIE L*a*b* model are unwavering because the
image rotation is not linked to the ring division. Specifically, the digital operations of an image are not changed
with respect to Euclidean distance and feature vectors. This makes message digest discriminative and dense.
Several tests conducted with more than 200 color images and reveals that for common image digital operations
this algorithm for image authentication is strong to estimate the efficiency. Among all the existing hashing
algorithms, the projected technique for image authentication is demonstrated as superior.
416.
Keyword : CIE L*a*b* mode Image authentication ring partition.
2401-
References: 2408
1. Mintzer F, Braudaway G, Yeung M (1998) Effective and ineffective digital watermarks. In:Proceedings of the ICIP’97, Santa Barbara,
CA, USA
2. Yeung MM (1998) Digital watermarking introduction. Commun ACM 41(7):31–33.
3. Memon N, Poorvi V, Boon-Lock Y, Yeung M (2000) Distortion bounded authentication techniques In: Proceedings of the SPIE
international conference on security and watermarking of multimedia contents II, vol 3971, pp 164–174
4. R. Venkatesan, S.-M. Koon, M. H. Jakubowski, and P. Moulin, “Robust image hashing,” in Proc.IEEE Int. Conf. Image Process., Sep.
2000, pp. 664–666.
5. Z. Tang, X. Zhang, and S. Zhang, “Robust perceptual image hashing based on ring partition and NMF,” IEEE Trans. Knowl. Data
Eng., vol. 26, no. 3, pp. 711–724, Mar. 2014.
6. F. Ahmed, M. Y. Siyal, and V. U. Abbas, “A secure and robust hash based scheme for image authentication,” Signal Process., vol. 90,
no. 5, pp. 1456–1470, 2010.
7. Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, “Robust image hashing for tamper detection using non-negative matrix factorization,”
J. Ubiquitous Converg. Technol., vol. 2, no. 1, pp. 18–26, 2008.
8. J. Fridrich and M. Goljan, “Robust hash functions for digital watermarking,” in Proc. IEEE Int. Conf. Inf. Technol., Coding Comput.,
Mar. 2000, pp. 178–183.
9. C.-Y. Lin and S.-F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,”
IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153–168, Feb. 2001.
10. Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, “Lexicographical framework for image hashing with implementation ba sed
on DCT and NMF,” Multimedia Tools Appl., vol. 52, nos. 2–3, pp. 325– 345, 2011.
11. S. S. Kozat, R. Venkatesan, and M. K. Mihcak, “Robust perceptual image hashing via matrix invariants,” in Proc. IEEE Int. Conf.
Image Process., Oct. 2004, pp. 3443–3446.
12. F. Lefebvre,B. Macq, and J.-D. Legat, “RASH: Radon soft hash algorithm,” in Proc. 11th Eur. Signal Process. Conf., Sep. 2002,
pp. 299–302.Y. Ou and K. H. Rhee, “A key-dependent secure image hashing scheme by using Radon transform,” in Proc. IEEE Int.
Symp. Intell. Signal Process. Commun. Syst., jan. 2009, pp. 595–598.
13. Y. Li, Z. Lu, C. Zhu, and X. Niu, “Robust image hashing based on random Gabor filtering and dithered lattice vector quantization,”
IEEE Trans. Image Process., vol. 21, no. 4, pp. 1963–1980, Apr. 2012.
14. Z. Tang, X. Zhang, L. Huang, and Y. Dai, “Robust image hashing using ring-based entropies,” Signal Process., vol. 93, no. 7, pp.
2061–2069, 2013.
15. F.Lefebvre, B. Macq, and J.-D. Legat, “RASH: Radon soft hash algorithm,” in Proc. 11th Eur. Signal Process. Conf., Sep. 2002, pp.
299–302.
16. J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, “A robust image fingerprinting system using the Radon transform,” Signal
Process.,Image Commun., vol. 19, no. 4, pp. 325–339, 2004.
17. C. De Roover, C. De Vleeschouwer, F. Lefebvre, and B. Macq, “Robust video hashing based on radial projections of key frames,”
IEEE Trans.Signal Process., vol. 53, no. 10, pp. 4020–4037, Oct. 2005.
18. D. Wu, X. Zhou, and X. Niu, “A novel image hash algorithm resistant to print–scan,” Signal Process., vol. 89, no. 12, pp. 2415–2424,
2009.
19. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 215–
230, Jun. 2006.
20. V. Monga and B. L. Evans, “Perceptual image hashing via feature points: Performance evaluation and tradeoffs,” IEEE Trans. Image
Process., vol. 15, no. 11, pp. 3452–3465, Nov. 2006.
21. V. Monga, A. Banerjee, and B. L. Evans, “A clustering based approach to perceptual image hashing,” IEEE Trans. Inf. Forensics
Security, vol. 1, no. 1, pp. 68–79, Mar. 2006.
22. V. Monga and M. K. Mihçak, “Robust and secure image hashing via non-negative matrix factorizations,” IEEE Trans. Inf. Forensics
Security, vol. 2, no. 3, pp. 376–390, Sep. 2007.
418. Paper Title: From 2D Sketches to Photo-Realistic Images using Generative Adversarial Networks
Abstract: With increasing technological advancements, there is a need for automation in this ever- 2414-
evolving world. This may result in improved efficiency, faster work and enhanced capabilities. Sketch-to-image 2417
translation is an image processing application that can be used as a helping hand in a variety of fields. One of
these is the utilization of Generative Adversarial Networks to guide edges to photographs, with the assistance of
image generators and discriminators who work connected to produce realistic images. We have also
incorporated Histogram of Oriented Gradients (HOG) as a feature/image descriptor. The HOG technique counts
the gradient orientations to differentiate the target and the background. Support Vector Machine (SVM) is the
classifier used for classification. This HOG and SVM model can be improved, altered and executed as multi-
program software.
Keyword : sketch, photo realistic image, Generative Adversarial Network, Histogram of Oriented Gradients
References:
1. Creswell, A. et al. “Generative Adversarial Networks: An Overview” IEEE Signal Processing Magazine, 35(1), pp.53—65, 2018.
2. H. Kazemi, F. Taherkhani, N. M. Nasrabadi,“Unsupervised Facial Geometry Learning for Sketch to Photo Synthesis,” in
International Conference of the Biometrics Special Interest Group (BIOSIG), 2018, 10.23919/BIOSIG.2018.8552937, IEEE.
3. Isola, Phillip, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros, "Image-to-image translation with conditional adversarial networks." In
Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pp. 1125-1134. 2017.
4. Galea, Christian, and Reuben A. Farrugia, "Matching software-generated sketches to face photographs with a very deep CNN, morphed
faces, and transfer learning." IEEE Transactions on Information Forensics and Security, vol 13, no. 6, pp: 1421-1431, 2017.
5. Kokila, R., M. S. Sannidhan, and Abhir Bhandary, "A study and analysis of various techniques to match sketches to Mugshot photos."
In 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 41-44. IEEE, 2017.
6. Wu, Xian, Kun Xu, and Peter Hall, "A survey of image synthesis and editing with generative adversarial networks." Tsinghua Science
and Technology, vol 22, no. pp: 660-674, 2017.
7. Dalal, Navneet, Bill Triggs, and Cordelia Schmid, "Human detection using oriented histograms of flow and appearance." In Eu ropean
Conference on Computer Vision, pp. 428-441. Springer, Berlin, Heidelberg, 2006.
8. Xu, Fen, and Ming Gao, "Human detection and tracking based on HOG and particle filter." In 2010 3rd International Congress on
Image and Signal Processing, vol. 3, pp. 1503-1507. IEEE, 2010.
9. Li, Yi, Timothy M. Hospedales, Yi-Zhe Song, and Shaogang Gong, "Free-hand sketch recognition by multi-kernel feature learning."
Computer Vision and Image Understanding, vol 137, pp: 1-11, 2017.
10. Ian J. Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , Yoshua
Bengio, “Generative adversarial nets” Proceedings of the 27th International Conference on Neural Information Processing Syste ms,
p.2672-2680, December 08-13, 2014, Montreal, Canada.
11. Ronneberger O., Fischer P., Brox T, “ U-Net: Convolutional Networks for Biomedical Image Segmentation” In Medical Image
Computing and Computer-Assisted Intervention -- MICCAI 2015, Lecture Notes in Computer Science, vol 9351. Springer, Cham.
12. Tao, L. et al., “LLCNN: A convolutional neural network for low-light image enhancement”, 2017 IEEE Visual Communications and
Image Processing (VCIP).
13. Kazemi, Hadi, Mehdi Iranmanesh, Ali Dabouei, Sobhan Soleymani, and Nasser M. Nasrabadi. "Facial attributes guided deep sketch-to-
photo synthesis." In 2018 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 1-8. IEEE, 2018.
Authors: Robin Thakur, Sunil Kumar, Kamal Kashyap, Ashwani Kumar, Sorabh Aggarwal
Selection of Erosive Wear Rate Parameters of Pelton Turbine Buckets using PSI and TOPSIS
Paper Title:
Techniques
Abstract: Hydro turbine machineries erosion due to silt is a complex issue for the effective practice of
hydropower plants. Erosion caused by silt of the Pelton turbine buckets is a compound phenomenon that
depends on size of silt particles , silt particles concentration , velocity of jet , and working time . This paper deals
with the influence of silt erosion for various silt loaded factors and effective parameters. The preference
selection index (PSI) and technique for order of preference by similarity to ideal solution (TOPSIS) approaches
has been adopted to find optimal set of parameters which offers the highest performance for the Pelton turbine.
Based up on the results obtained from both PSI and TOPSIS approaches it is found that optimal performance has
been provided by A-1 alternate with geometric and flow parameters as , 𝑺𝒑 = 𝟗𝟎 𝝁, 𝑪𝒔 = 𝟐𝟎𝟎𝟎 𝒑𝒑𝒎, 𝑽𝒋 =
𝟐𝟕. 𝟑𝟎𝟗 𝒎/𝒔 and 𝒕𝒘 = 𝟑 𝒉𝒓𝒔 , and respectively.
Paper Title: Effect of Steel Bracings on RC Building by Aligning Them at Different Positions
Abstract: Earthquake is an unexpected and expensive disaster for both livelihood and economy. In the
modern day construction there has been a lot of importance to make the structure resistive against the laterally
acting loads. Bracings are an option for lateral load resisting system in tall buildings. The concept of bracings is
420. to add more stiffness and strength to the adequate strength of the structure. Members in a braced frame are
generally made of structural steel which can work effectively both in strain and pressure.
2429-
In the present work 13 story irregular building is considered with and without bracings to evaluate the optimum 2432
bracing pattern for the structure. By changing the position of the bracings alternately in both horizontal and
vertical direction the analysis is carried out. These are the different models analyzed by pushover analysis (a)
Building with no bracing, (b) Building with alternate vertical bracing starting from bay-1, (c) Building with
alternate vertical bracing starting from bay-2, (d) Building with alternate vertical bracing starting from story-1,
(e) Building with alternate vertical bracing starting from story-1. The non linear static results were compared.
The various parameters like story drift, shear, time period, stiffness, moment, torsion, performance points are
obtained by the analysis for all the models.
Keyword : Seismic Action, pushover analysis, drifts, time period, performance points.
References:
1. Ms. Pallavi B. Gadge, Mr. Gajanan D. Dhawale, Miss. Rutuja K. Kakpure, et al., (2018), “Study of Behaviour of Steel Structure by
Push Over Analysis”, International Advanced Research Journal in Science, Engineering and Technology ISO 3297:2007 Certified Vol.
5, Issue 5, May 2018.
2. Kadidand A. Boumrkik, (2008), “Pushover analysis of reinforced concrete frame structures”, at Department of Civil Engineering, Uni-
versity of Banta, Algeria, Asian journal of civil engineering (building and housing) vol. 9, No. 1 pp 75-83.
3. ASCE, (2002), “Standard Methodology for Seismic Evaluation of Buildings”, Standard No. ASCE-31. American Society of Civil
Engineers, Reston, Virginia.
4. Ashraf Habibullah and Stephen Pyle, (1998), “Practical three dimensional non-linear static pushover analysis”, Structures Magazine,
winter.
5. Swetha Sunil, Sujith P.S, “Seismic Study of Multistory RC Building With Different Bracings”, International Journal of Innovative
Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Website: www.ijirset.com Vol. 6, Issue
5, May 2017.
6. Miss. Sayli S Kamble, Prof. Dr. D. N. Shinde, “Performance of RC Frame With and Without Bracing Pushover Analysis”,
International Journal for Research in Applied Science & Engineering Technology (IJRASET), Volume 4 Issue IX, September 2016 IC
Value: 13.98 ISSN: 2321-9653.
7. Mrugesh D. Shah, Atul N. Desai, Sumant B Patel, Performance based analysis of R.C.C. frames National Conference on Recent Tre nds
in Engineering & Technology.
8. ETABS User’s Manual, “Integrated Building Design Software”, Computer and Structure Inc. Berkeley, USA..
Thariq Khan Azizuddin Khan, Nor Fazila Abd Malek, Asmadi Ishak, Nur Haziyanti Mohamad
Authors:
Khalid & Ali Md Nadzalan
Paper Title: Effects of Imagery and Video Modelling on Self-Efficacy during Resistance Exercise
Abstract: The purpose of this study is to examine the effects of audio imagery with video modelling on
participants’ self-efficacy during resistance exercise. Forty five individuals volunteered as research participant
and were divided homogenously into imagery with modelling end instruction (EIM) or initial instruction (IIM)
groups and a modelling only (M) as control group. During the pre-test all participants employed self-efficacy
(SE) of lunges exercise. All participants were provided with the interventions (EIM, IIM, & M) during 10
minutes rest before the first post-test which, all measurements were conducted to look at the acute effects of
interventions employed. Participants’ android phones were downloaded with specific intervention according to
their group and they were advised to employ the intervention once a day for seven days. The second post-test
was conducted consist of all measurements after seven days of intervention duration. For self-efficacy,
significant results were recorded on pre-test and post-test within participants in EIM and IIM (p < 0.05),
moreover, results for post-test comparing data between groups indicates significant between EIM and M groups,
IIM and M groups (p < 0.05). No significant different results found comparing EIM with IIM groups. Results
from this study indicate that there are psychological performances improvement among participant who
employed imagery and modelling comparing to modelling alone.
Paper Title: GDP and Outward Foreign Direct Investment from India: Co-Integration and Causality Test
Abstract: India’s outward foreign direct investment has experienced a Dynamic change over last decade
after the liberalisation and globalisation of Indian economy that further achieves economic expansion and
development in recent years. Approximately seven percent growth rate is witness by India from 1993-2011.This
period also witnessed upward trend of outbound investment from India. UNCTAD (2015) has also nailed India
as one of the leading outward investing economies. But a very few works have been done for exploring the long
run relationship between outward FDI and GDP in context of the emerging economies like India. With this
backdrop, the present study empirically investigates the long run and short run co –integrating relationship
between India’s GDP and OFDI. For empirical analysis various econometric tools like test of stationarity, Engle
granger co-integration ( as we have consider only two macro variables) and ECM model is used to test the
causal association between the selected variables. It is found that there is long run causal relationship among
OFDI and India’s Growth rate. The results found that no short term causal association among India’s OFDI and
GDP by reflecting the fact that there are other factors which have influence on OFDI flows.
422.
Keyword : GDP, outward FDI, Growth. 2436-
2439
References:
1. Dunning, J. H. (1981). Explaining the international investment position of countries: towards a Dynamic or Development approach.
Weltwirtschaftliches Archive , 117 (209), 30-64.
2. Dunning, j. H. (1986). The Investment Development Cycle Revisited. Weltwirtschaftliches
3. Kakoti, D. (2019). An Empirical Investigation of India’s Outward Foreign Direct Investment: A Macro Perspective. Emerging
Economy Studies 1–10 DOI: 10.1177/2394901519870764
4. Herzer, D. (2010). Outward FDI and economic growth. Journal of Economic Studies , 37 (5), 476-494.
5. Wong, N. and Goh, S. (2011). Malaysia’s outward FDI: The effects of market size and government policy. journal of policy modeling ,
33, 497-510.
6. Lee, C. G. (2010). The nexus of outward foreign direct investment and income: Evidence from Singapore. Applied Econometrics and
International Development , 10 (1)
7. Yalcinkaya, O., & Aydin, H. I. (2017). The Effects of Inward and Outward Foreign Direct Investments on Economic Growth: Evide nce
from the G-7 and Selected Emerging Market Economies (194-2015). Research in Applied Economics , ix (1), 26-41.
8. Singh, S. (2017). The Relationship between FDI outflows, Exports and GDP in India: An Application of the Autoregressive Distributed
Lag model. Economic Affairs, , 62 (3), 471-481.
9. Gujarati, D. N. (1995). Basic econometrics: Third edition. Mc-grew-Hills.
423. Paper Title: Improvement of Long Distance Transmission by Using TCSC Fact Device
Abstract: The prudent point of view of Flexible AC Transmission System (FACTS) establishment and 2440-
execution has been an essential issue since origin and expanding each day because of vital, specialized and 2444
showcase requirements. The advancement of these issues assumes a significant job in the achievement of any
utility and at last minimal effort accessibility of intensity at the client end. This paper exhibits the ideal area of
Thyristor Controlled Series Capacitor (TCSC) in control framework to limit the transmission misfortune
utilizing Particle Swarm Optimization procedure. The reenactments are performed on the IEEE-14 transport
framework, IEEE 30 transport framework and Indian 75 transport framework with Newton Raphson load flow
calculation including TCSC.
Keyword : machine learning, data mining, solar energy, water distillation, performance prediction and
monitoring.
References:
1. H. Turral, J. Burke, J. M. Faurès, “Climate change, water and food security”, Food and Agriculture Organization of the United Nations,
Viale delle Terme di Caracalla, 00100 Rome, Italy
2. Erach Bharucha, “Textbook for Environmental Studies”, University Grants Commission, New Delhi. 2004
3. T. Kjellstrom, M. Lodh, T. McMichael, G. Ranmuthugala, R. Shrestha, S. Kingsland, “Chapter 43: Air and Water Pollution: Burden
and Strategies for Control”, Disease Control Priorities in Developing Countries. 2nd edition.
424. 4. M. Chandrashekara, A. Yadav, “Water desalination system using solar heat: A review”, Renewable and Sustainable Energy Reviews
67 (2017) 1308–1330
5. M. T. Chaichan, H. A. Kazem, “Water solar distiller productivity enhancement using concentrating solar water heater and phase 2445-
change material (PCM)”, Case Studies in Thermal Engineering 5 (2015) 151–159 2451
6. D.B. Singh, J.K. Yadav, V.K. Dwivedi, S. Kumar, G.N. Tiwari, I.M. Al-Helal, “Experimental studies of active solar still integrated
with two hybrid PVT collectors”, Solar Energy 130 (2016) 207–223
7. A. M. Manokar, D. P. Winston, A. E. Kabeel, R. Sathyamurthy, “Sustainable fresh water and power production by integrating PV
panel in inclined solar still”, Journal of Cleaner Production 172 (2018) 2711e2719
8. F. Suarez, R. Urtubia, “Tackling the water-energy nexus: an assessment of membrane distillation driven by salt-gradient solar ponds”,
Clean Techn Environ Policy, DOI 10.1007/s10098-016-1210-3
9. R. S. Hansen, C. S. Narayanan, K. K. Murugavel, “Performance analysis on inclined solar still with different new wick materia ls and
wire mesh”, Desalination 358 (2015) 1–8
10. R. Sathyamurthy, D. G. Harris Samuel, P. K. Nagarajan, T. Arunkumar, “Geometrical variations in solar stills for improving the fresh
water yield—A review”, Desalination and Water Treatment (2016) 1–15, doi: 10.1080/19443994.2015.1136241
11. B. Gupta, R. Sharma, P. Shankar, P. Baredar, “Performance enhancement of modified solar still using water sprinkler: An experimental
approach”, Perspectives in Science (2016) 8, 191—194
12. K. H. Nayi, Kalpesh V. Modi, “Pyramid solar still: A comprehensive review”, Renewable and Sustainable Energy Reviews 81 (2018)
136–148
13. G. Xue, Q. Chen, S. Lin, J. Duan, P. Yang, K. Liu, J. Li, J. Zhou, “Highly Efficient Water Harvesting with Optimized Solar Th ermal
Membrane Distillation Device”, Global Challenges 2018, 2, 1800001, © 2018 The Authors. Published by WILEY-VCH Verlag GmbH
& Co. KGaA, Weinheim
14. H. A. Madhhachi, G. Min, “Key factors affecting the water production in a thermoelectric distillation system”, Energy Conversion and
Management 165 (2018) 459–464
15. R. Ullah, M. Khraisheh, R. J. Esteves, J. T. McLeskey Jr, M. AlGhouti, M. Gad-el-Hak, H. V. Tafreshi, “Energy efficiency of direct
contact membrane distillation”, Desalination 433 (2018) 56–67
16. L. Zhu, M. Gao, C. K. N. Peh, G. W. Ho, “Recent progress in solar-driven interfacial water evaporation: Advanced designs and
applications”, Nano Energy 57 (2019) 507–518
17. L. Zhu, M. Gao, C. K. N. Peh, X. Wang, G. W. Ho, “Self-Contained Monolithic Carbon Sponges for Solar-Driven Interfacial Water
Evaporation Distillation and Electricity Generation”, Adv. Energy Mater. 2018, 8, 1702149
18. Z. M. Omara, A. E. Kabeel, A. S. Abdullah, F. A. Essa, “Experimental investigation of corrugated absorber solar still with wick and
reflectors”, Desalination 381 (2016) 111–116
19. A. Ghosh, “Comparative study of Financial Time Series Prediction By Artificial Neural Network with Gradient Descent Learning”,
https://arxiv.org/pdf/1111.4930.pdf (URL)
20. “Chapter 4. Regression and Prediction”, O’Reilly, https://www.oreilly.com/library/view/practical-statistics-
for/9781491952955/ch04.html.(URL)
Authors: Tatyana Lenkova, Ilya Nikonov, Yuri Kuznetsov, Larisa Karpenko, Anna Balykina
Development of the Probiotic Feed Supplement Based on Lactobacillus Plantarum to Increase the
Paper Title:
Broiler Productivity
Abstract: This article reflects the results of the development of a method for testing a promising feed
supplement based on the Lactobacillus plantarum strain, with a high antagonistic activity to campylobacter. To
determine the digestibility and use of food nutrients by broilers, a physiological (balance experiment) was
conducted on three males from each group at the age of 28 days.
By the end of the growing period, there was a clear tendency to increase the live weight of 36-day-old
chickens compared with the control group in experimental group 2, which received a feed supplement, including
bacteria Lactobacillus plantarum. She was 4.0% higher.
As a result of scientific work, it was shown that feeding broiler chickens with a probiotic feed additive based on
Lactobacillus plantarum helps to increase their productivity during the entire growing cycle.
Keyword : Narrow band internet of things, NB-IoT, multi-band microstrip patch antenna, planar structure
426. antenna, simulation using HFSS, triple band antenna.
2455-
References: 2457
1. C. A. Balanis, Antenna Theory: Analysis and Design. Hoboken, NJ,USA: Wiley, 2005.
2. I. Dioum, A. Diallo, S. M. Farssi, and C. Luxey, A novel compact dual-band LTE antenna-system for MIMO operation, IEEE Trans.
Antennas Propag., vol. 62, no. 4, pp. 22912296, Apr. 2014.
3. M. Li, X. Q. Lin, J. Y. Chin, R. Liu, and T. J. Cui, A novel miniatur-ized printed planar antenna using split-ring resonator, IEEE
Antennas Wireless Propag. Lett., vol. 7, pp. 629631, 2008.
4. J. Pei, A.-G. Wang, S. Gao, and W. Leng, Miniaturized triple-band antenna with a defected ground plane for WLAN/WiMAX applica-
tions, IEEE Antennas Wireless Propag. Lett., vol. 10, pp. 298301, 2011.
5. S. Chamaani and A. Akbarpour, Miniaturized dual-band omnidirec-tional antenna for body area network basestations, IEEE Antennas
Wireless Propag. Lett., vol. 14, pp. 17221725, 2015.
6. [6] Y. Dong, H. Toyao, and T. Itoh, Design and characterization of miniatur- ized patch antennas loaded with complementary split-ring
res- onators, IEEE Trans. Antennas Propag., vol. 60, no. 2, pp. 772785, Feb. 2012.
7. Ansoft High Frequency Structure Simulator (HFSS). ver. 13, Ansoft Corporation, 2010.
8. Stutzman, W.L., and Thiele, G.A., Antenna Theory and Design, JohnWiley & Sons, Inc, 1998.
9. Lo, Y. T., and Lee S. W., Antenna handbook: Antenna theory, Vol.2, International Thompson Publishing, Inc, 1993.
10. M. Borhani, P. Rezaei, and A. Valizade, ”Design of a Reconfig- urable Miniaturized Microstrip Antenna for Switchable Multiband
Systems” IEEE Antennas and Wireless Propagation Letters, Vol. 15, 2016.
Keyword : Cold formed steel, Channel sections, Flange stiffeners, Load deformation curve.
References:
1. E. Pieciorak et al., “Buckling and optimal design of cold-formed thin-walled beams: Review of selected problems” in Thin-Walled 2458-
Structures 49, 2007, pp. 554–561. 2463
2. Haiming Wang et al., “Experimental and numerical investigation on cold-formed steel C-section flexural members” in Journal of
Constructional Steel Research 65, 2009, pp. 1225 – 1235.
3. Cao Hung Pham et al., “Numerical simulation of high strength cold-formed purlins in combined bending and shear” in Journal of
Constructional Steel Research 66, 2010, pp. 1205-1217.
4. Mohammad Reza Haidarali et al., “Local and distortional buckling of cold-formed steel beams with edge-stiffened flanges” in Journal
of Constructional Steel esearch 73, 2012, pp. 31–42.
5. M.Macdonald et al., “Web crippling behaviour of thin-walled lipped channel beams,” in Thin-Walled Structures 49, 2011, pp. 682–
690.
6. Asraf Uzzaman James B.P. et al., “Cold formed steel sections with web openings subjected to web crippling und er to flange loading
conditions - Part II: Parametric study and proposed design equations” in Thin walled structures 56, 2012, pp. 79-87.
7. Mohamed Salah Al-Din Soliman, Anwar Badawy Badawy Abu-Sena, Emad Emam Hassan Darwish, Mohamed Saeed Refaee Saleh,
“Resistance of cold-formed steel sections to combined bending and web crippling,” in Ain Shams Engineering Journal, 2013, pp. 435–
453.
8. P. Natário, N. Silvestre, D. Camotimaa, “Web crippling failure using quasi-static FE models” in Thin-Walled Structures 84, 2014, pp.
34–49.
9. Poologanathan Keerthan, Mahen Mahendran, Edward Steau, ”Experimental study of web crippling behaviour of hollow flange channel
beams under two flange load cases” in Thin-Walled Structures 85, 2014, pp-207–219.
10. Yu Chen et al. “Experimental and finite element analysis research on cold-formed steel lipped channel beams under web crippling” in
Thin-Walled Structures 87, 205, pp. 41–52.
11. IS : 811-1987 Specification for cold formed light gauge structural steel sections.
12. IS: 801 – 1975 Code of practice for use of Cold-formed light gauge steel Structural members in general Building construction.
13. ANSYS WORKBENCH 14.0 - User’s manual, ANSYS Inc.
Paper Title: Solar Variation and Super Geomagnetic Storm Event during March 10-31, 2015
Abstract: CMEs and solar flares are important solar ejections which are the cause of storm in Heliosphere.
These ejections are producing a change in Earth magnetic field. In this paper we have studied heliospheric
disturbance of solar cycle 24 during period from 10 March to 31 March 2015. We observed that a huge
explosion of magnetic field and plasma from the Sun’s corona on 15 March 2015 and associated solar flares
have disturbed space weather towards earth causes strongest geomagnetic storm on 17 March 2015. We found
that Dst value reached to its minimum is -223 nT and a FDs during the period on 17 March 2015.
Keyword : Coronal mass ejection, Solar cycle, Forbush decrease and Geomagnetic storm.
References:
1. Borgazzi A., Lara A., Echer E. and Alves M.V. “Dynamics of coronal mass ejections in the interplanetary medium”, Astro. and
Astrophys., pp. 885-889, 2009.
429.
2. Byrne J.P., Maloney S.A., McAteer T.J., Refojo J.M. and Gallagher P.T. “Propagation of Earth- directed coronal mass ejections in
three dimensions”, Nature Communications, 1, 74, 2010. 2469-
3. Colonnino R.C., Vourlidas A. and Wu, C.C. “Quantitative comparison of methods for predicting the arrival of coronal mass ejections 2472
at Earth based on multi view imaging”, J. Geophys. Res., pp. 6866-6879, 2013.
4. Gopalswamy N., Lara A., Lepping R.P., Kaiser M.L., Berdichevsky D. and St. Cyr O.C. “Interplanetary acceleration of coronal mass
ejections”, J. Geophys. Res., Lett., pp. 145-148, 2001.
5. Gopalswamy N., Lara A., Yashiro S., Kaiser R.P. and Howard R.A., 2001. “Predicting the 1-AU arrival times of coronal mass
ejections”, J. Geophys. Res., pp. 29207-29218, 2001.
6. Gosling J.T., Bame S.J., Mc Comas D.J. and Philips J.L. “Coronal mass ejections and geomagnetic storm”, Geophys. Res. Lett., pp.
901-904, 1990.
7. Hess P. and Zhang J. “Predicting CMEs ejecta and sheath front arrival at L1 with a Data-Constrained physical model”, J.Astrophys.,
pp. 144, 2015.
8. Mostl C., Amla K., Hall J.R., Liewer P.C., De Jong E.M., Colonnino R.C., Veronig A.M., Rollett T., Temmer M., Peinhart V., Da vies
J.A., Lugaz N., Liu Y.D., Farrugia C.J., Luhmann J.G., Vrsnak B., Harrison R.A. and Galvin A.B. “Connecting speeds, Directions and
arrival times of 22 coronal mass ejections from the Sun the Sun to 1 AU”, J. Astrophys., pp. 119, 2014.
9. Owens M. and Cargill P. “Predictions of the arrival times of coronal mass ejections at 1AU: an analysis of the causes of the errors”,
Ann. Geophys., 22, pp. 661-671, 2004.
10. Vrsnak B. and Gopalswamy N. “Influence aerodynamic drag on the motion of interplanetary ejecta”, J. Geophys. Res., pp. 1019, 2002.
Paper Title: Developing Internet of Things Maturity Model (IoT-MM) for Manufacturing
Abstract: The Manufacturing sector in India is still not globally competitive (Deloitte, 2018) due to over
emphasis on labour based production, lesser automation, legacy manufacturing assets and production plants,
energy inefficient systems, usage of Information Technology to integrate the physical and cyber world for
potential benefits which other countries have adopted (Rockstorm, 2018) is almost non-existent. According to
430. sources adoption of IoT enabled Industry 4.0 can lead to decrease of production costs by up to 30%, logistics
costs by 30% and quality management costs by up to 20% (Thomas, 2016).
2473-
This study starts with a literature review of the factors that determine the manufacturing competitiveness 2479
index of India and how other developed countries are proceeding in these as compared to India. The study
proceeds with identification of key determinants or constructs (abstract dimensions) of measuring the IoT
maturity of any organization along with their relative weights and then identify the key factors (measurable)
inside each construct. These constructs are hypothesized to be the building blocks of any IoT strategy to be
adopted by Indian manufacturing concerns. By using these constructs definition, along with factors and possible
measurable states, in which the factors can exist, an excel based IoT Maturity Self-Assessment tool has been
developed which can be used by target Indian manufacturing organizations to identify their current state of
preparedness.
The objective of this study is to define an Internet of Things Maturity Model (IoT-MM) which can be used by
organizations to assess their current status. Indian manufacturing has started adopting IoT but in a disoriented
manner, with adoption being guided more by technology consideration than a holistic business drive and
consideration encompassing the benefits of productivity, energy conservation and environmental management.
Keyword : Internet of Things, Internet of Things Maturity Model, IoT, Manufacturing, Industry 4.0
References:
1. DUCKER Worldwide. (2014). India: A compelling alternate in advanced manufacturing.
2. Academic Foundation. (January 2008). Report On Conditions Of Work And Promotion Of Livelihoods In The Unorganized Sector.
Academic Foundation.
3. Al-Fuqaha, A. M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications
Surveys & Tutorials, 17(4): 2347–2376.
4. Atzori L, I. A. (2010). The Internet of Things- A Survey. Computer Networks, 54(15):2787-805.
5. Becker. (2009). Developing Maturity Models for IT Management – A Procedure Model and its Application. Business & Information
Systems Engineering. doi:10.1007/s12599-009-0044-5
6. Bedekar, A. (2017 , October 12). Opportunities& challenges for IoT in India. Retrieved from http://www.startupcity.com/ leaders-talk/-
opportunitieschallenges-for-iot-in-india-nid-3444.html
7. Berhert, V. R. (2016). Annual Report 2016. UNIDO.
8. Botta, A. W. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer System, 684-700.
9. Christiane, G. v. (May 2010). Systematic Literature Review of Software Process Capability/Maturity Models. International Conference
on Software Process. Improvement And Capability dEtermination (SPICE). Pisa, Italy.
10. Christopher, M. (. (1998). Logistics and Supply Chain Management: Strategies for Reducing Costs and Improving Services. (2nd, Ed.)
London: Pitman.
11. Deloitte. (2018). Manufacturing Sector in India. India Brand Equity Foundation.
12. G. Lanza, P. N. (2016). Befähigungs- und Einführungsstrategien für Industrie 4.0. Karlsruhe / Hannover. Retrieved 02 01, 2016
13. Granjal, J. E. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications
Surveys & Tutorials, 1294-1312.
14. Grant Thornton and CII. (2017). Networked Readiness Index 2016. Delhi: Grant Thornton. Retrieved from http://www.grantthornto n.in
15. Gubbi, J. R. (2014). “Internet of Things (IoT): a vision, architectural elements, and future directions. Future Generation Computer
Systems, 29(7): 1645–1660.
16. Haller, W. T. (1996). Expert choice - User Manual. PA: Expert Choice. Pittsburgh.
17. Henderson JC, V. N. (1993). Strategic alignment: leveraging information technology for transforming organizations. IBM Systems
Journal, 38(2-3), 472-484.
18. Hung, M. (2017). Leading the IoT: Gartner Insights. US: Gartner.
19. Jian Qina, Y. L. (2016). A catergorical framework of Manufacturing for Industry 4.0 and Beyond. www.sciencedirect.com. Retrieved
from https://ac.els-cdn.com/S221282711630854X/1-s2.0-S221282711630854X-main.pdf?_tid=1d8c8876-d0fc-11e7-
20. Jiří, F. A. (2014). Judgment scales and consistency measure in AHP. Enterprise and the Competitive Environment 2014 conference,
ECE, (pp. 164 – 173). Brno, Czech Republic.
21. K. Lichtblau, V. S. ( 2015). IMPULS - Industrie 4.0 Readiness Impuls-Stiftung des VDMA. Aachen-Köln.
22. Kumaran, V. (2015). IoT Challenges and Opportunities in Indian Market. COMSNETS. Bangalore, India.
23. Luthra, S. G. (2018). Analysing Challenges to Internet of Things adoption and diffusion: An Indian context. 6th Internation Conf on
Smart Computing (pp. 733-739). Kurukshetra: ScienceDirect.
24. Miorandi D, S. S. (2012). Internet of Things: vision, applications and research challenges, . Ad Hoc Netw, 10(7):1497-516.
25. Ōno, T. (1988). Toyota production system: Beyond largescale production. Cambridge, Mass: Productivity Press.
26. Pettersson, A. (2008). Measurements of efficiency in supply chain. Journal of Supply Chain Management.
27. Pušnik, M. (2007). Extending Information System Integrability Index with CMM Model. A Preliminary Proposal. 29th Int. Confere nce
on Information Technology Interfaces, (pp. 145-150).
28. Reinhard, G. (2017). Astrological Guide to Industry 4.0. EPS.
29. Rockstorm, J. (2018). The Fourth Industrial revolution: What is Means, how to respond. World Economic Forum.
30. Saaty, .. T. (2008). Decision making with the analytic hierarchy process. Int J Serv Sci, 83-98.
31. Salviano, C. F. (2008). Unified Basic Concepts for Process Capability Models. Int Conf on Sw. Eng. and Knowledge Eng. SEKE, (pp.
173-178).
32. Sheard, A. S. (Sep 1997). The Frameworks Quagmire. Crosstalk: The Journal of Defense Software Engineering, 10(3).
33. T.Stock, G. (2016). Opportunities of Sustainable Manufacturing in Industry 4.0. Science Direct. Retrieved from
https://www.sciencedirect.com/science/article/pii/S221282711600144X
34. Thomas, B. J. (2016). Wgp-Standpunkt Industrie 4.0. Wissenschaftliche Gesellschaft für Produktionstechnik .
35. Whitmore, A. A. (2015). The Internet of things—a survey of topics and trends. Information Systems Frontiers, 261-274.
36. Womack, J. P. (2007). The machine that changed the world: The story of lean production - Toyota's secret weapon in the global car
wars that is revolutionizing world industry. New York: Free Press.
Keyword : entrepreneurial activity, organic agriculture, "green" economy, government regulation, incentive
mechanisms
References:
1. Altukhov A.I. 2008. Food security - an important factor in the stability of Russia. Economics of agriculture of Russia, 12, 13-16.
2. Akhmetshin, E. M., Pavlyuk, A. V., Hasanov, E. L., Sverdlikova, E. A., & Kadyrov, M. A. (2018 a). Institutional mechanisms for
implementation of entrepreneurial potential of the population of the region. Journal of Applied Economic Sciences, 13(7), 2052-2075.
3. Akhmetshin, E. M., Kovalenko, K. E., Ling, V. V., Erzinkyan, E. A., Murzagalina, G. M., & Kolomeytseva, A. A. (2018 b). Individual
entrepreneurship in russia and abroad: Social and legal aspects. Journal of Entrepreneurship Education, 21(Special Issue 2)
4. Arniati, T., Puspita, D. A., Amin, A., & Pirzada, K. (2019). The implementation of good corporate governance model and audito r
433. independence in earnings' quality improvement. Entrepreneurship and Sustainability Issues, 7(1), 188-200.
doi:10.9770/jesi.2019.7.1(15)
5. Bozhkova, G. N., Shastina, E. M., Kalimullina, O. V., & Shatunova, O. V. (2019). Study of literary images of gifted characters in 2492-
optional activities as a means to develop capable and talented youth. Space and Culture, India, 7(1), 264 -273. 2496
doi:10.20896/saci.v7i1.463
6. Boutelier, S. (2019). Limiting Learning Environments through Domestication. Journal of Culture and Values in Education, 2 (1), 45-55.
Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/29
7. Baharuddin, B., & Dalle, J. (2019). Transforming learning spaces for elementary school children with special needs. Journal of Social
Studies Education Research, 10(2), 344-365.
8. Bužavaitė, M., Ščeulovs, D., & Korsakienė, R. (2019). Theoretical approach to the internationalization of SMEs: Future research
prospects based on bibliometric analysis. Entrepreneurship and Sustainability Issues, 6(3), 1497-1511. doi:10.9770/jesi.2019.6.3(31)
9. Bure, M., & Tengeh, R. K. (2019). Implementation of internal controls and the sustainability of SMEs in harare in zimbabwe.
Entrepreneurship and Sustainability Issues, 7(1), 201-218. doi:10.9770/jesi.2019.7.1(16)
10. Chitsaz, E., Tajpour, M., Hosseini, E., Khorram, H., & Zorrieh, S. (2019). The effect of human and social capital on entrepreneurial
activities: A case study of iran and implications. Entrepreneurship and Sustainability Issues, 6(3), 1393-1403.
doi:10.9770/jesi.2019.6.3(24)
11. Danilov-Danilian, V.I. 2003. Sustainable development. Theoretical and methodological analysis. Economics and Mathematical
Methods, 8(24), 123-135.
12. Dalevska, N., Khobta, V., Kwilinski, A., Kravchenko, S. 2019. A model for estimating social and economic indicators of sustai nable
development. Entrepreneurship and Sustainability Issues, 6(4), 1839-1860. http://doi.org/10.9770/jesi.2019.6.4(21).
13. Debbarma, R., & Purkayasthaî, S. (2019). Expansion of area under rubber plantation and its distribution in tripura, india. Sp ace and
Culture, India, 6(5), 56-70. doi:10.20896/SACI.V6I5.344
14. Dzhavatov, D.K., Sverdlikova, E.A., Sokolov, M.S., Avdeeva, O.A. & Yavkin, G.P. 2018. The influence of innovation on social a nd
economic development of the Russian regions. European Research Studies Journal, 21(S2), 767-776.
15. Dharmawan, R., Nababan, M. R., Tarjana, M. S. S., & Djatmika. (2019). Mistranslation and maltranslation in a medical website:
Evidences from dorland’s medical dictionary. Journal of Social Studies Education Research, 10(1), 219-240.
16. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019a). Spatial tourism planning:
Using the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
17. Dunets, A. N., Ivanova, V. N., & Poltarykhin, A. L. (2019b). Cross-border tourism cooperation as a basis for sustainable development:
A case study. Entrepreneurship and Sustainability Issues, 6(4), 2207-2215. doi:10.9770/jesi.2019.6.4(45)
18. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of so ciety.
Journal of Social Studies Education Research, 10(3), 118-135.
19. Frolova, I., Voronkova, O., Islamutdinova, D., Gordeyeva, O., Fedulova, I., & Zhminko, A. (2019a). Ecologization of agroindustrial
production: Organizational and economic transformations. Journal of Environmental Management and Tourism, 10(3), 622 -630.
doi:10.14505/jemt.v10.3(35).16
20. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019b). Corruption as an obstacle to
sustainable development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
21. Gabidullina, F. I., Korganbekov, B. S., Makarova, V. F., Zakirov, R. A., & Kayumova, G. F. (2019). Concept «teacher» in language
consciousness of students of philological faculty. XLinguae, 12(3), 45-54. doi:10.18355/XL.2019.12.03.04
22. Goryushkina, N. E., Gaifutdinova, T. V., Logvina, E. V., Redkin, A. G., Kudryavtsev, V. V., & Shol, Y. N. (2019). Basic principles of
tourist services market segmentation. International Journal of Economics and Business Administration, 7(2), 139-150.
23. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagogical and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219.
24. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of
loss of profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
25. Ivanova, V., Poltarykhin, A., Szromnik, A., & Anichkina, O. (2019). Economic policy for country's digitalization: A case stud y.
Entrepreneurship and Sustainability Issues, 7(1), 649-661. doi:10.9770/jesi.2019.7.1(46)
26. Jones, A. (2019). Parallel Oppressions. Journal of Culture and Values in Education, 2(1), 18-33. Retrieved from
http://cultureandvalues.org/index.php/JCV/article/view/31
27. Johnson, C., & Hinton, H. (2019). Toward a Brillant Diversity. Journal of Culture and Values in Education, 2(1), 56 -70. Retrieved
from http://cultureandvalues.org/index.php/JCV/article/view/27
28. Khalikov, M. A., Maximov, D. A., & Shabalina, U. M. (2018). Risk indicators and risk management models for an integrated grou p of
enterprises. Journal of Applied Economic Sciences, 13(1), 52-64.
29. Kayumova, G., Sheymardanov, S., Akhtarieva, R., & Zhundibayeva, A. (2019). Developing creative potential of a schoolchild by
means of native language. Journal of Social Studies Education Research, 10(1), 81-92.
30. Kaluge, D. (2019). Multifactor on macroeconomic fundamentals to explain the behavior of sectoral indices in the indonesian stock
exchange. Entrepreneurship and Sustainability Issues, 7(1), 44-51. doi:10.9770/jesi.2019.7.1(4)
31. Kashirskaya, L., Voronkova, O., Sitnov, A., Shichiyakh, R., Kudinova, M., & Sycheva, I. (2019). Rural development through the
formation of zonal agro-ecological clusters. Journal of Environmental Management and Tourism, 10(3), 651-659.
doi:10.14505/jemt.v10.3(35).19
32. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment.
Journal of Social Studies Education Research, 10(3), 387-403.
33. Korableva, O.N., Kalimullina, O.V., Mityakova, V.N. (2019) Designing a System for Integration of Macroeconomic and Statistica l
Data Based on Ontology. Advances in Intelligent Systems and Computing, 998, p. 157-165
34. Kolesova, Yu.N. 2015. Strategy of sustainable development of rural areas. Young scientist, 8, 392-394.
35. Kovaltchuk, A. P., Dedusenko, E. A., Blinova, E. A., & Miloradov, K. A. (2016). Concept and procedures of crisis management in
russian hotel enterprises. Journal of Environmental Management and Tourism, 7(3), 473-480. doi:10.14505/jemt.v7.3(15).13
36. Kryukov, V.A. 2018. The study of the economy of Siberia: continuity and complexity. Region: Economics and sociology, 2(98), 3-32.
37. Kuznetsova, I.G., Surikov, Y.N., Votchel, L. M., Aleynikova, M.Y., Voronkova, O.Y. & Shichiyakh, R.A. 2019. The methodologica l
aspect of human capital formation in the digital economy. International Journal of Mechanical Engineering and Technology, 10(2),
1020-1030.
38. Kuznetsova, I. G., Voronkova, O. Y., Nimatulaev, M. M., Ruiga, I. R., Zhuruli, G. N., & Levichev, V. E. (2019). Ensuring the national
security of agriculture in the digital era through the formation of human capital. International Journal of Economics and Business
Administration, 7, 558-569.
39. Kustati, M., & Al-Azmi, H. (2018). Pre-Service Teachers’ Attitude on ELT Research. Research in Social Sciences and Technology,
3(2), 1-13. Retrieved from http://ressat.org/index.php/ressat/article/view/47
40. Magsumov, T.A. (2019). Gender Re(e)volution of commercial schools in Russia in the early XX century. Woman in Russian Society ,
1, 133-144. doi: 10.21064/WinRS.2019.1.12
41. Melgui, A.E., Kuznetsova, O.N., Butler, Yu.A. 2018. Stimulation of socio-economic development of agriculture in Russia.
Agribusiness: Economics, management, 8, 19-26. Miloserdov, V.V. 2014. Causes of food dependence in Russia. Economy of
agricultural and processing enterprises, 3, 6-11.
42. Meier, L. (2019). Questioning the Problematic Nature of School Culture in Elementary Teacher Education. Journal of Culture an d
Values in Education, 2(1), 34-44. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/30
43. Movchan, I. B., Yakovleva, A. A., & Daniliev, S. M. (2019). Parametric decoding and approximated estimations in engineering
geophysics with the localization of seismic risk zones on the example of northern part of kola peninsula. Paper presented at the 15th
Conference and Exhibition Engineering and Mining Geophysics 2019, Gelendzhik 2019, 188-198.
44. Paptsov, A., & Nechaev, V. (2019). Towards to a single innovation space in the agrarian sector of the member states of the eurasian
economic union: A case study. Entrepreneurship and Sustainability Issues, 7(1), 637-648. doi:10.9770/jesi.2019.7.1(45)
45. Podprugin, M.O. 2012. Sustainable development of the region: the concept, the basic approaches and the factors. Journal of Russian
entrepreneurship, 24, 214-221.
46. Poltarykhin, A.L., Alekseev, А.E., Kudryavtsev, V.V., Makhanova, T.A., Voronkova, O.Yu., Aydinov, H.T. 2018. Prospects for th e
Development of the Green Economy of Russian Federation. European Research Studies Journal, 21(4), 470-479.
47. Popova, L. I., Demina, I. D., Stepanenko, Y. S., Tran, Q. N., Meshkova, G. V., & Afonasova, M. A. (2019). Regional aspects of
sectoral digitalization: Problems and prospects. International Journal of Economics and Business Administration, 7(2), 176-188.
48. Polushkina, T.M. 2012. Formation of a rational system of state regulation of agrarian sector of economy meeting the requireme nts of
cost-effective agricultural policy. Basic research, 9-4, 976-980.
49. Plaskova, N. S., Prodanova, N. A., Zatsarinnaya, Е. I., Korshunova, L. N., & Chumakova, N. V. (2017). Methodological support of
organizations implementing innovative activities investment attractiveness estimation. Journal of Advanced Research in Law and
Economics, 8(8), 2533-2539. doi:10.14505/jarle.v8.8(30).25
50. Prodanova, N., Plaskova, N., Popova, L., Maslova, I., Dmitrieva, I., Sitnikova, V., & Kharakoz, J. (2019 a). The role of IT tools when
introducing integrated reporting in corporate communication. Journal of Advanced Research in Dynamical and Control Systems, 11(8
Special Issue), 411-415.
51. Prodanova, N., Trofimova, L., Pozdeeva, S., Melekhina, T., Rustanov, A., & Guryanova, I. (2019b). Perspective of developing
software for financial reporting under IFRS in the system of national governance. Journal of Advanced Research in Dynamical a nd
Control Systems, 11(8 Special Issue), 406-410.
52. Prodanova, N. A., Trofimova, L. B., Adamenko, A. A., Erzinkyan, E. A., Savina, N. V., & Korshunova, L. N. (2019c). Methodology
for assessing control in the formation of financial statements of a consolidated business. International Journal of Recent Te chnology
and Engineering, 8(1), 2696-2702.
53. Puryaev, A. S., Puryaeva, Z. A., Kharisova, A. R., & Puryaev, A. A. (2019). Investigation and explanation of mathematical tooling for
accounting non-economic characteristics during the investment project effectiveness’ assessing process. IOP Conference Series:
Materials Science and Engineering, 570, 012074. https://doi.org/10.1088/1757-899X/570/1/012074
54. Raba’, A., & Harzallah, H. (2018). Palestinian Teachers’ Views on the Factors That Limit Students’ Creativity and Some Possib le
Strategies to Overcome Them. Research in Social Sciences and Technology, 3(2), 40-57. Retrieved from
http://ressat.org/index.php/ressat/article/view/330
55. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosophical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
56. Sagdieva, R., Husnutdinov, D., Mirzagitov, R., & Galiullin, R. (2019). Kinship terms as proof of genetic relationship. Journa l of Social
Studies Education Research, 10(3), 103-117.
57. Shatunova O., Anisimova T., Sabirova F., Kalimullina O. (2019) STEAM as an Innovative Educational Technology. Journal of Social
Studies Education Research. Vol. 10 (2), 131-144.
58. Sycheva, I., Voronkova, O., Vorozheykina, T., Yusupova, G., Semenova, A., & Ilyin, A. (2019a). The main directions of improving
the environmental and economic efficiency of regional production. Journal of Environmental Management and Tourism, 10(3), 631 -
639. doi:10.14505/jemt.v10.3(35).17
59. Sycheva, I. N., Voronkova, O. Y., Kovaleva, I. V., Kuzina, A. F., Bannikov, S. A., & Titova, S. V. (2019 b). Motivation in personnel
management of a trading enterprise. International Journal of Economics and Business Administration, 7, 570-582.
60. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issu e),
416-424.
61. Titova, S. V., Surikov, Y. N., Voronkova, O. Y., Skoblikova, T. V., Safonova, I. V., & Shichiyakh, R. A. (2019). Formation,
accumulation and development of human capital in the modern conditions. International Journal of Economics and Business
Administration, 7(2), 223-230.
62. Vasilev, B. (2019). Analysis and improvement of the efficiency of frequency converters with pulse width modulation. International
Journal of Electrical and Computer Engineering, 9(4), 2314-2320. http://doi:10.11591/ijece.v9i4.pp2314-2320
63. Vedenin, Yu.A. 1980. Processes of development of territorial recreational systems. Socioeconomic and geographical aspects of the
study of territorial recreational systems. - M., IG Academy of Sciences of the USSR, 16-30.
64. Voronkova, O.; Yankovskaya, V.; Kovaleva, I.; Epishkin, I.; Iusupova, I.; Berdova, Y. 2019. Sustainable territorial development based
on the effective use of resource potential, Entrepreneurship and Sustainability Issues 7(1): 662-673.
https://doi.org/10.9770/jesi.2019.7.1(47)
65. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019). Sustainable
development of territories based on the integrated use of industry, resource and environmental potential. International Journ al of
Economics and Business Administration, 7(2), 151-163.
66. Yarlykapov, A.D. 2013. Assessment of regional development forecasting options. Regional economy, 2(34), 23-31.
67. Yehya, F. Y., Barbar, A., & Abou Rjeily, S. (2018). Diagnosing the barriers for integrating Educational Technology in Physics courses
in Lebanese secondary schools. Research in Social Sciences and Technology, 3(2), 14-39. Retrieved from
http://ressat.org/index.php/ressat/article/view/337
68. Ziuzya, E.V., Voronkova, O.Y., Umirzakova, D.K., Rakovskiy, V.I., Qurbanov, P.A. & Kazakov, A.V. 2019. A methodological
approach to assessing the efficiency of the economic mechanism for formation and development of intersectoral linkages. International
Journal of Civil Engineering and Technology, 10(2), 920-929
Authors: Deepanshu
437.
Keyword : Mollugo pentaphylla,sodium chloride,inhibitor,open circuit potential test.
2511-
References: 2513
1. Abd El-Aziz S. Fouda, Ahmed Abdel Nazeer, Mohamed Ibrahim, and Mohamed Fakih,” Ginger Extract as Green Corrosion
Inhibitor for steel in Sulfide Polluted Salt Water”, Journal of the Korean Chemical Society, 2013, Vol 57,No 2.
2. Abdul Rahman.A.S,Mohammad Ismail,”Green plant as a Passivation- Promoting Inhibitor for Reinforced concrete,”International
Journal of Engineering Science & Technology,Aug 2011, Vol 3, No 8 .
3. K. Dahmani, M. Galai, M. Cherkaoui, A. El Hasnaoui, A. El Hessni,” Cinnamon essential oil as a novel eco-friendly corrosion
inhibitor of Copper in 0.5 M Sulfuric Acid medium”,Journal of Materials and Environmental science,2017,Vol 8,Issue 5,pp1676 -1689.
4. A.M. Al-Fakih1, M. Aziz1, H.M. Sirat1,” Turmeric and ginger as green inhibitors of mild steel corrosion in acidic medium, Journal of
Material Environmental Science,6,(5),2015,1480-1487.
5. C.A. Loto, O. O. Joseph, R.T. Loto, A.P.I. Popoola,”Inhibition Effect of Vernonia amygdalina Extract on the Corrosion of Mild
Steel Reinforcement in Concrete in 3.5 M NaCl Environment”, International Journal of Electrochemical. Science, 8 (2013) 11087 –
11100.
6. Yuli Panca Asmara, Tedi Kurniawan, Agus Geter Edy Sutjipto, Jamiluddin Jafar ,”Application of Plants Extracts as Green
Corrosion Inhibitors for Steel in Concrete -A review”,Indonesian journal of Science and Technology, 3 (2), 2018 pp 158-170.
Authors: S.Usha Kiruthika, S. Kanaga Suba Raja, V. Balaji, C.J.Raman, S. S. L. Durai Arumugam
438. Keyword : Autism, Generative adversarial network, Convolutional Neural Networks, Artificial Neural
Network, Tuberculosis, Computer Aided Diagnosis. 2514-
2519
References:
1. World Health Organization. Global tuberculosis control: epidemiology, strategy, financing: WHO report 2009. World Health
Organization, 2009.
2. Jankharia, Govindji R. "Commentary-radiology in India: the next decade." The Indian journal of radiology & imaging 18, no. 3 (2008):
189.
3. Jaeger, Stefan, Alexandros Karargyris, Sema Candemir, Les Folio, Jenifer Siegelman, Fiona Callaghan, Zhiyun Xue et al. "Autom atic
tuberculosis screening using chest radiographs." IEEE transactions on medical imaging 33, no. 2 (2013): 233-245.
4. Dye, Christopher. "Global epidemiology of tuberculosis." The Lancet 367, no. 9514 (2006): 938-940.
5. Doi, Kunio. "Computer-aided diagnosis in medical imaging: historical review, current status and future potential." Computerized
medical imaging and graphics 31, no. 4-5 (2007): 198-211.
6. Xu, Yan, Tao Mo, Qiwei Feng, Peilin Zhong, Maode Lai, I. Eric, and Chao Chang. "Deep learning of feature representation with
multiple instance learning for medical image analysis." In 2014 IEEE international conference on acoustics, speech and signal
processing (ICASSP), pp. 1626-1630. IEEE, 2014.
7. Tan, Jen Hong, U. Rajendra Acharya, Collin Tan, K. Thomas Abraham, and Choo Min Lim. "Computer-assisted diagnosis of
tuberculosis: a first order statistical approach to chest radiograph." Journal of medical systems 36, no. 5 (2012): 2751-2759.
8. Badrinarayanan, Vijay, Alex Kendall, and Roberto Cipolla. "Segnet: A deep convolutional encoder-decoder architecture for image
segmentation." IEEE transactions on pattern analysis and machine intelligence 39, no. 12 (2017): 2481-2495.
9. Litjens, Geert, Thijs Kooi, Babak Ehteshami Bejnordi, Arnaud Arindra Adiyoso Setio, Francesco Ciompi, Mohsen Ghafoo rian, Jeroen
Awm Van Der Laak, Bram Van Ginneken, and Clara I. Sánchez. "A survey on deep learning in medical image analysis." Medical image
analysis 42 (2017): 60-88.
10. Cao, Yu, Chang Liu, Benyuan Liu, Maria J. Brunette, Ning Zhang, Tong Sun, Peifeng Zhang et al. "Improving tuberculosis diagnostics
using deep learning and mobile health technologies among resource-poor and marginalized communities." In 2016 IEEE First
International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp. 274-281. IEEE,
2016.
11. Ronneberger, Olaf, Philipp Fischer, and Thomas Brox. "U-net: Convolutional networks for biomedical image segmentation."
In International Conference on Medical image computing and computer-assisted intervention, pp. 234-241. Springer, Cham, 2015.
Keyword : Discrete Markov Chain, Ergodic Markov Chain , Limiting distribution, Mean recurrence time,
Return time probability, Transition probability matrix.
439. References:
1. S.P. Meyn and R.L. Tweedie, Markov Chains and Stochastic Stability, London: Springer Verlag. 1993. 2520-
2. Kishore S. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Applications, John Wiley & Sons, Inc, 2522
Second Edition, 2008.
3. Yajun Zhou, Lilei Wang, Rong Zhong, and Yulong Tan, A Markov Chain Based Demand Prediction Model for Stations in Bike
Sharing Systems, Mathematical Problems in Engineering, Volume 2018, https://doi.org/10.1155/2018/8028714.
4. E. Omey, J. Santos and S. VanGulck, “A Markov Binomial distribution”, Journal of Applicable Analysis and Discrete Mathematics,
Vol. 2, 2008.
5. Y.H. Wang, “On the limit of Markov Binomial Distribution”, Journal of Applied Probability, Vol. 18 no. 4 pp. 937-942, 1981.
6. P. Bertail and S. Clemencon, “Regenerative Block Bootstrap for Markov Chains”, Bernoulli, Vol. 12 no. 4 pp. 689-712, 2006.
7. Alexander Karalis Isaac, “The Markov Binomial Distribution : an Explicit Solution by a Regenerative Approach”, Proceedings of
World Congress on Engineering 2013, London Vol. 1.
8. Kallepalli, Chaitanya and Tian Jeff, “Measuring and modeling usage and reliability for statistical web testing”, IEEE Transac tions on
Software Engineering, Vol.27,pp.1023-1036, 2001.
9. B. Praba and R. Sujatha, “A Fuzzy Markov Model for Web Testing”, Ganita Sandesh, Vol.21, No.2, pp.111-120, 2007.
Paper Title: An Enhanced Generalized Sequential Pattern Classification for Sequence Datasets
Abstract: A Niche approach for classifying sequence Datasets is achieved by the use of EGSP (Enhanced
Generalized sequential pattern) algorithm. The EGSP brings out a prediction model for working with the
Sequence Datasets in the domain of Gene and Protein datasets. The Method proceeds by the way of generalizing
the datasets of both the supervised and Semi-supervised data. The generalization brings out the candidate
sequences which paves path for a distinct component extraction. The sequences are generated based on the
threshold value which is then followed by applying the EGSP algorithm which brings out the sequential pattern
from the pruned sequences. The extracted sequential pattern is then clustered using a gene clustering algorithm.
The algorithm (MNBC) Modified Naïve Bayes Classification computes the probabilistic components for each
class. The accuracy obtained is far better than the traditional classification algorithms. The resultant
classification provides a solution for prediction methods for the selected domain and its applications. The
algorithm used gives an upper hand over the computational costs which have been drastically minimized over
the existing methods.
Keyword : hybrid laminates, basalt fibers, kevlar fibers, thermal conductivity, coefficient of thermal
expansion.
441.
References:
1. S. Bard, F. Schönl, M. Demleitner, and V. Altstädt, “Influence of fiber volume content on thermal conductivity in transverse and fiber 2530-
direction of carbon fiber-reinforced epoxy laminates,” Materials (Basel)., vol. 12, no. 7, pp. 1–10, 2019. 2532
2. T. Behzad and M. Sain, “Measurement and Prediction of Thermal Conductivity for Hemp Fiber Reinforced Composites,” Polym. Eng.
Sci., vol. 12, pp. 977–983, 2007.
3. A. Sayyidmousavi, H. Bougherara, S. R. Falahatgar, and Z. Fawaz, “Prediction of the Effective Thermal Conductivity of Fiber
Reinforced Composites Using a Micromechanical Approach,” J. Mech., vol. 35, no. 2, pp. 179–185, 2019.
4. P. Hartlieb, M. Toifl, F. Kuchar, R. Meisels, and T. Antretter, “Thermo-physical properties of selected hard rocks and their relation to
microwave-assisted comminution,” Miner. Eng., vol. 91, pp. 34–41, 2016.
5. M. R. Islam and A. Pramila, “Thermal Conductivity of Fiber Reinforced Composites by the FEM,” J. Compos. Mater., vol. 33, no. 18,
pp. 1699–1715, 1999.
6. R. D. Sweeting and X. L. Liu, “Measurement of thermal conductivity for fibre-reinforced composites,” Compos. Part A Appl. Sci.
Manuf., vol. 35, no. 7–8, pp. 933–938, 2004.
7. Z. Javanbakht, W. Hall, and A. Ochsner, “Effective Thermal Conductivity of Fiber Reinforced Composites Under Orientation
Clustering,” Adv. Struct. Mater., vol. 92, pp. 507–519, 2019.
8. R. Osugi, H. Takagi, K. Liu, and Y. Gennai, “Thermal Conductivity Behavior of Natural Fiber-Reinforced Composites,” in Asian
Pacific Conference for Materials and Mechanics, Yokohama, Japan, November, 2009, pp. 13–16.
9. Y. K. Sahu, “Study on the Effective Thermal Conductivity of Fiber Reinforced Epoxy Composites,” 2014.
10. S. Ravichandran, “Thermal alnalysis of fiber reinforced low density poly-ethylene composites,” Int. J. ChemTech Res., vol. 9, no. 1,
pp. 308–312, 2016.
11. E. Vilchevskaya and I. Sevostianov, “Overall thermal conductivity of a fiber reinforced composite with partially debonded
inhomogeneities,” Int. J. Eng. Sci., vol. 98, pp. 99–109, 2016.
12. S. L. Chung and J. S. Lin, “Thermal conductivity of epoxy resin composites filled with combustion synthesized h -BN particles,”
Molecules, vol. 21, no. 670, pp. 1–11, 2016.
13. Z. Li, J. Ma, H. Ma, and X. Xu, “Properties and Applications of Basalt Fiber and Its Composites,” IOP Conf. Ser. Earth Environ. Sci.,
vol. 186, no. 2, pp. 1–6, 2018.
14. G. Ventura and V. Martelli, “Thermal conductivity of Kevlar 49 between 7 and 290 K,” Cryogenics (Guildf)., vol. 49, no. 12, pp. 735–
737, 2009.
Paper Title: Design and Evaluation of Solar Powered Dryer System with Integrated Thermal Energy Storage
Abstract: Drying of food products in open air under sun is the most common and easiest way of drying.
However, it cannot assure the hygiene of the dried product because of the involvement of wind-borne dust, rain,
insects, rodents and birds. This will affects the quality of the product and hence may have contrary economic
effects on domestics and global markets. Some of the problems associated with open-air sun drying can be
solved through the use of a cabinet type or indirect type solar dryer. The major drawback of all these types of
442. conventional solar dryers is that they cannot be used in cloudy weather or during night time. By incorporating
Thermal Energy Storage (TES) we can make use of the dryer throughout the day or at least during late evenings.
Water is one of the best sensible TES medium within its operating range. Solar water heater is a device used to 2533-
2539
collect solar energy and heat up water without any electrical or fossil fuel aid. So the idea of this project is to
incorporate solar dryer with solar water heater so that the dryer can be used even at late evenings or in cloudy
weather, and also it can be used as water heater for hot water consumption.
Keyword : Solar Energy, Thermal Energy Storage, Solar Dryer, Design and Fabrication.
References:
1. S. H. Sengar , A. G. Mohod , Y. P. Khandetod “Experimental evaluation of solar dryer for kokam fruit” , College of Agricultural
Engineering and Technology, Global Journals Inc. (USA) 2012.
2. Mahendra S. Seveda “Performance analysis of solar water heater in NEH region of India” Central Agricultural University, India ,
Science Publishing Group, 2013.
3. Lalit M. Bal *, Santosh Satya, S.N. Naik “Solar dryer with thermal energy storage systems for drying agricultural food produc ts: A
review” Indian Institute of Technology, Science Direct, 2010.
4. R. Vidya Sagar Raju, R. Meenakshi Reddy, E. Siva Reddy “Design and Fabrication of Efficient Solar Dryer” Int. Journal of
Engineering Research and Applications, 2013.
5. Chandrakumar B Pardhi and Jiwanlal L Bhagoria “Development and performance evaluation of mixed-mode solar dryer with forced
convection”,India, Int. Journal for Energy and Environmental Engineering, 2013.
6. Alireza Mohajer a, Omid Nematollahi a, Mahmood Mastani Joybari b, Seyed Ahmad Hashemi, Mohammad Reza Assari “Experimental
investigation of a Hybrid Solar Drier and Water Heater System”, Isfahan University of Technology, Iran, Science direct, 2013.
7. Ekechukwu, O.V., 1999, Review of solar-energy drying systems I: an overview of drying principles and theory, Energy Conversion and
Management, 40, pp. 593–613.
8. Lindley, A. and H. Whitaker, 1996. Agricultural Buildings and Structures. Revised Edn., ASAE, 17:357-375.
9. H. S. Abdel-Galil, “Solar system with energy storage for drying poultry manure” Fayoum University-Egypt; 2007.
10. C.L. Hii, S.V. Jangam, S.P. Ong and A.S. Mujumdar; “Solar Drying: Fundamentals, Applications and Innovations” 2012.
11. V.V. Tyagia, N.L. Panwar, N.A. Rahima, Richa Kothari; “Review on solar air heating system with and without thermal energy sto rage
system”; University of Malaya, Kuala Lumpur 50603, Malaysia; Science Direct, 2012.
12. Drew Frank Schiavone “Development and evaluation of a natural-convection solar dryer for mango in rural Haitian communities”;
University of Florida; 2011.
13. Werner Weiss, Josef Buchinger “Solar drying” Austrian development corporation, AEE INTEC.
14. Bennamoun, L., 2011, Reviewing the experience of solar drying in Algeria with presentation of the different aspects of solar dryers,
Renewable and Sustainable Energy Reviews, 15 (7), 3371-3379.
15. Eckchukwu, O. V., Norton, B., 1999, Review of solar-energy drying systems II: an overview of solar drying technology, Energy
Conversion & Management, 40 (6), 615-655.
16. Ekechukwu, O.V., 1999, Review of solar-energy drying systems I: an overview of drying principles and theory, Energy Conversion and
Management, 40, pp. 593–613.
17. B. K. Bala, Serm Janjai “ Solar drying of fruits, vegetables, spices, medicinal plants and fish: Developments and Potentials”
International Solar Food Processing Conference 2009.
18. Mujumdar, A.S., 2007, Handbook of Industrial drying, Taylor and Francis group, U.K.
19. Sharma VK, Colangelo A, Spagna G. “Experimental investigation of different solar dryers suitable for fruit and vegetable drying.”
Department Enerzia, Divisione Ingegneria Sperimentale, Italy.
Paper Title: Optimal Search Parameters for A Random Pulsed-Point Source with the Required Accuracy
Abstract: The questions of creating high-speed algorithms for detecting and localizing point sources
having a random distribution and manifesting themselves by generating instantaneous delta pulses at random
times are described. The search is carried out by a system including one or more receiving devices, and is
performed taking into account the requirements for localization accuracy. It is assumed that all receivers have
freely tunable viewing windows. The optimal procedure is one that minimizes (in a statistical sense) the average
localization time. It is established that even with relatively low requirements for localization accuracy, the
optimal procedure consists of several stages (each such stage ends at the moment of the next pulse registration).
In this case, it is possible receiving system to miss some pulses generated by the source during the optimal
search. In the work, the optimal search parameters are calculated depending on the number of receiving devices
and the required localization accuracy. The possibility of using the results in a multidimensional case is shown.
443.
2540-
Keyword : search, optimal algorithms, pulsed-point source, localization. 2544
References:
1. X. Zhu, L. Wen, G. Hobbs and oth. “Detection and localization of single-source gravitational waves with pulsar timing arrays,”
Monthly
Notices of the Royal Astronomical Society, Oxford Academic Press, V. 449 (2), 2015, p.1650–1663.
2. Steven Weinberg. Cosmology. New York: Oxford University Press, 2008, 593 p.
3. R. Dorf, R. Bishop. Modern Control Systems (12th Edition), UK: Pearson, 2010, 1104 p.
4. V. S. Kirichuk, K. Y. Mokin, and A. L. Reznik. “Algorithms for Processing of Series of Digital Aerospace Images Based on Automatic
Search for the Conjugate Points,” Pattern Recognition and Image Analysis, V. 11(1), 2001, p. 192-194.
5. A. L. Reznik, V. M. Efimov, A. A. Solov'ev, A. V. Torgov. “Errorless readout of random discrete-point fields ,” Optoelectronics,
Instrumentation and Data Processing, V.48(5), 2012, p. 506-514.
6. H. Wei, Z. Cai, B. Tang, Z. Yu. “Review of the algorithms for radar single target tracking,” IOP Conference, Series Earth an d
Environmental Science, 69(1):012073, 2017
7. D. Bertsekas. Constrained optimization and Lagrange multiplier methods. New York: Academic Press, 1982. 412 p.
Networks,7:247-261, 1977.
3. P.Erdos,J.Gimbel & H.J.Straight, Cohromatic Number versus Cochromatic number in Graphs with Bounded Clique Number,
Europ.J.Combinatorics (1990) 11,235-240.
4. L. Lesniak Foster & H. J. Straight, The co-chromatic number of a graph, Arc Combi. 3(1977),39-46.
5. O. Ore, Theory of Graphs. Amer. Math. Soc. Colloq. Publ., 38 (Amer. Math. Soc., Providence,RI), 1962.
6. A. M. Yaglom and I. M. Yaglom. Challenging mathematical problems with elementary solutions. Volume 1: Combinatorial Analysis
and Probability Theory, 1964
Paper Title: Predicting Click-Through Rates using Data Mining Technique on Digital Advertisements
448. Abstract: In times of increasingly busy use of social media, placing advertisements on social media such as
Facebook is an attractive alternative. With the various advantages of advertising on social media, making it very 2570-
suitable for MSMEs. The use of video as a format for delivering advertising messages is also rife because of the 2574
faster internet speed. However, the cost of making ads in the form of videos is relatively more expensive so it
needs a lot of consideration when making it be efficient. One thing that advertisers often pay attention to on
social media is the click-through rate. This variable becomes one of the measures of the effectiveness of an
advertisement. Hence predicting click-through rate is become important nowadays for advertisers, especially to
those who have budget constraints. This research tries to predict the click-through rate using data mining
techniques. This paper use CRISP method. The dataset was taken from a Facebook advertisement from a small-
medium enterprise in Indonesia. Video watches at 25%, 50%, 75%,95% and 100% is use as predictors. The
results show that data mining can be used to predict the click-through rate using video watches percentage. Deep
learning is the most suitable model for this prediction. The interpretation of the results from data mining is done
and managed to find the variables that support the predictions and contradict the predictions.
Keyword : data mining, advertising, click-through rate, social media, deep learning
References:
1. “Indonesia: social media penetration,” Statista. [Online]. Available: https://www.statista.com/statistics/284437/indonesia-social-
network-penetration/. [Accessed: 29-Oct-2019].
2. “Facebook users by country 2019,” Statista. [Online]. Available: https://www.statista.com/statistics/268136/top-15-countries-based-on-
number-of-facebook-users/. [Accessed: 29-Oct-2019].
3. Tikno, “Measuring performance of facebook advertising based on media used: a case study on online shops in indonesia,” Procedia
Comput. Sci., vol. 111, pp. 105–112, 2017.
4. “CTR (link click-through rate),” Facebook Ads Help Centre. [Online]. Available: https://en-
gb.facebook.com/business/help/877711998984611. [Accessed: 31-Oct-2019].
5. F. Wang, P. Zhang, Y. Shang, and Y. Shi, “The Application of Multiple Criteria Linear Programming in Advertisement Clicking
Events Prediction,” Procedia Comput. Sci., vol. 18, pp. 1720–1729, 2013.
6. M. Mahdian and K. Tomak, “Pay-Per-Action Model for On-line Advertising,” Int. J. Electron. Commer., vol. 13, no. 2, pp. 113–128,
Dec. 2008.
7. “Moran & Hunt, Search Engine Marketing, Inc.: Driving Search Traffic to Your Company’s Website, 3rd Edition | Pearson.” [Online].
Available: https://www.pearson.com/us/higher-education/program/Moran-Search-Engine-Marketing-Inc-Driving-Search-Traffic-to-
Your-Company-s-Website-3rd-Edition/PGM50706.html. [Accessed: 31-Oct-2019].
8. H. Li and H.-Y. Lo, “Do You Recognize Its Brand? The Effectiveness of Online In-Stream Video Advertisements,” J. Advert., vol. 44,
no. 3, pp. 208–218, Jul. 2015.
9. Z. Gao and Q. Gao, “Ad-centric Model Discovery for Prediciting Ads’s Click-through Rate,” Procedia Comput. Sci., vol. 19, pp. 155–
162, 2013.
10. M. Richardson, E. Dominowska, and R. Ragno, “Predicting Clicks: Estimating the Click-through Rate for New Ads,” in Proceedings
of the 16th International Conference on World Wide Web, New York, NY, USA, 2007, pp. 521–530.
11. C. Gauzente and Y. Roy, “Message content in keyword campaigns, click behavior, and price-consciousness: A study of millennial
consumers,” J. Retail. Consum. Serv., vol. 19, no. 1, pp. 78–87, Jan. 2012.
12. E. Van den Broeck, K. Poels, and M. Walrave, “An experimental study on the effect of ad placement, product involvement and mo tives
on Facebook ad avoidance,” Telemat. Inform., vol. 35, no. 2, pp. 470–479, May 2018.
13. Shearer, Colin, “The CRISP-DM Model: The New Blueprint for Data Mining,” J. Data Warehous., vol. 5, no. 4, pp. 13–22, 2000.
14. R.-C. Härting and A. Sprengel, “Cost-benefit considerations for Data Analytics - An SME-Oriented Framework enhanced by a
Management Perspective and the Process of Idea Generation,” Procedia Comput. Sci., vol. 159, pp. 1537–1546, 2019.
15. Aryanto, R and Mulyani, “Website User Interface of Marine Bio-Tourism Destination for Today Digital Environment,” Int. J. Innov.
Technol. Explor. Eng., vol. 8, no. 12, pp. 2064–2067, Oct. 2019.
Paper Title: Control of BLDC Motor using PV fed Bridgeless Single Switch SEPIC Converter
Abstract: Brushless DC (BLDC) motors are now widely used in many industrial and domestic applications
due to their significant advantages in terms of size, weight, torque and efficiency against any other type of
motor. Most of the domestic appliances including refrigerators, fans and washing machines use BLDC motors in
them. Moreover, photovoltaic (PV) inverters are being installed in more houses than ever which in-turn make
BLDC motors more suitable in home appliances and can be seen as imminent future. However, PV due to its
inherent nature is intermittent in its operation and requires an efficient DC-DC converter to control its output for
its smooth operation. This papers proposes a bridgeless single switch single ended primary inductance converter
(SEPIC) converter which serves as a better alternative to Buck-Boost and Cuk converter as it eliminates use of
diode bridge rectifier at front end and thus lowers the conduction loss. A closed loop speed control technique is
also introduced for control of BLDC motor to make it more practical for various applications and is verified
using MATLAB/Simulink and a hardware prototype using Arduino. Results obtained from software and
449. hardware prove the usefulness of the proposed scheme.
2575-
Keyword : BLDC Motor, MATLAB/Simulink, PV System, SEPIC Converter 2580
References:
1. M. R. M. Ebadpour, S. A. KH. Mozaffari Niapour, Arshya Feizi, R. Mousavi Aghdam, “A New Single Current Strategy for High
Performance Brushless DC Motor Drives”, International Conference on Electrical and Computer Engineering, IEEE CCECE 2011, pp
419 – 424.
2. Derek Liu, “Brushless DC Motors Made Easy,” Freescale, 2008.
3. Hossam-Eldin, A. & Refaey, Mostafa & Farghly, Abdelrahman, “A review on Photovoltaic Solar Energy Technology and its
Efficiency”, 2015.
4. Y. S. Jeon, H.S.Mok, G.H.Choe, D.K.Kim and J.S. Ryu, “A New Simulation Model of BLDC Motor with Real Back EMF
waveforms”, IEEE Conference On computers in Power Electronics (COMPEL), July 2000, pp. 217- 220.
5. Q. Li, H. Huang, B. Yin, “The study of PWM methods in permanent magnet brushless DC motor speed control system,” International
conference on Electrical Machines and Systems ICEMS 2008, Oct. 2008, pp. 3897-3900.
6. M. F. Rahman, K. S. Low, and K. W. Lim, “Approaches to the control of torque and current in a brushless DC drive,” in Interna tional
Conference on Electrical Machines and Drives, 1993, pp. 594-599.
7. C. Xia, Z. Li, T. Shi, “A control strategy for four-switch three-phase brushless DC motor using single current sensor,” IEEE Trans. In
Industrial Electronics, vol. 56, no. 6, June 2009, pp. 2058-2066.
8. ;“Sensorless BLDC Motor Control and BEMF Sampling Methods with ST7MC,” ST AN1946, July, 2007.
9. Padmaraja Yedamale, “Brushless DC (BLDC) Motor Fundamentals”, Microchip Technology Inc. 2003.
10. Domenico Arrigo, “L6234 Three Phase Motor Driver,” ST AN1088, 2001.
11. K. Dubey and M. T. Shah, “Design and simulation of Solar PV system”, International Conference on Automatic Control and Dynamic
Optimization Techniques, ICACDOT, Pune 2016, pp. 568-573.
12. Ankit Varshney and Abu Tariq, “Simulink Model of Solar Array for Photovoltaic Power Generation System”, International Journal of
Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 2 (2014), pp. 115-122.
13. D. Sera, R. Teodorescu, J. Hantschel and M. Knoll, “Optimized Maximum Power Point Tracker for Fast-Changing Environmental
Conditions”, in IEEE Transactions on Industrial Electronics, vol. 55, no. 7, July 2008, pp. 2629-2637.
14. Bhubaneswari Parida, S. Iniyan, Ranko Goic, “A review of solar photovoltaic technologies”, Renewable and Sustainable Energy
Reviews, Volume 15, Issue 3, 2011, Pages 1625-1636.
15. Mohamed A. Eltawil, Zhengming Zhao, “MPPT techniques for photovoltaic applications”, Renewable and Sustainable Energy
Reviews, Volume 25, 2013, pp. 793-813.
16. Y. Jang and M. M. Jovanovi, “Bridgeless High-Power-Factor Buck Converter,” IEEE Trans. Power Elect., vol.26, no.2, Feb. 2011,
pp.602-611.
17. Y. Jang and M. M. Jovanovic, “A Bridgeless PFC Boost Rectifier with Optimized Magnetic Utilization,” IEEE Trans. Power Electron.,
vol.24, no.1, Jan. 2009, pp. 85-93.
18. V. Bist and B. Singh, “An Adjustable Speed PFC Bridgeless Buck-Boost Converter Fed BLDC Motor Drive”, IEEE Tran. Ind.
Electron., vol.61, no.6, June 2014, pp.2665-2677.
19. V. Bist and B. Singh, “A Reduced Sensor PFC BL-Zeta Converter Based VSI Fed BLDC Motor Drive”, Electric Power System
Research, vol. 98, pp. 11–18, May 2013.
20. B. Singh, B. N. Singh, A. Chandra, K. Al-Haddad, A. Pandey, and D. P. Kothari, “A review of single –phase improved power quality
ac dc converters,” IEEE Trans. Ind. Electron., vol. 50, no. 5, Oct. 2003, pp. 962–981.
21. Vashist Bist, Bhim Singh, Ambrish Chandra, Kamal Al-Haddad, “An adjustable speed PFC SEPIC fed brushless DC motor drive,”
IEEE Energy Conversion Congress and Exposition (ECCE), Canada, 20-24 Sept. 2015, pp. 4886 - 4893.
22. E. H. Ismail, “Bridgeless SEPIC Rectifier with Unity Power Factor and Reduced Conduction Losses”, IEEE Trans. Ind. Electron.,
vol.56, no.4, April 2009, pp.1147-1157.
23. M. Mahdavi and H. Farzanehfard, “Bridgeless SEPIC PFC Rectifier with Reduced Components and Conduction Losses,” IEEE Trans .
Ind. Electron, vol.58, no.9, Sept. 2011.
24. A. A. Fardoun, E. H. Ismail, A. J. Sabzali, M. A. Al-Saffar, “New Efficient Bridgeless Cuk Rectifiers for PFC Applications,” IEEE
Trans. Power Electron., vol.27, no.7, pp.3292-3301, July 2012.
25. M. R. Sahid, A. H. M. Yatim and T. Taufik, “A new AC-DC converter using bridgeless SEPIC,” Proc. of 36th IEEE Annual Conf. of
Ind. Electron. Society (IECON), 7-10 Nov. 2010, pp.286-290.
26. J. W. Yang and H. L. Do, “Bridgeless SEPIC Converter with a Ripple-Free Input Current,” IEEE Trans. Power Elect., vol.28, no.7,
July 2013, pp. 3388-3394.
27. B. Singh and V. Bist, “Power Quality Improvement in PFC Bridgeless SEPIC Fed BLDC Motor Drive”, Int. Jr. Emer. Electr. Power
Sys. (IJEEPS), vol.14, no. 3, pp. 285–296, June 2013.
28. D. S. L. Simonetti, J. Sebastian and J. Uceda, “The discontinuous conduction mode SEPIC and Cuk power actor pre -regulators:
analysis and design,” IEEE Trans. Ind. Electron, vol. 44, no. 5, Oct. 1997, pp. 630-637.
29. C. Umayal, D.Saranya Devi, “Modeling and Simulation of PFC SEPIC Converter fed PMBLDC Drive for Mining Application,”
International Journal of Advanced Trends in Computer Science and Engineering, Vol.2, year: 2013, pp: 203- 208.
30. Shiny K George, Tintu Rani Joy, “An Adjustable-Speed PFC Bridgeless Single Switch SEPIC Converter-Fed BLDC Motor,”
International Journal of Engineering Technology, Management and Applied Sciences, year: August 2015, Volume 3, pp: 2349 -4476.
31. Anju Rajan P, Divya Subramanian, “Analysis of a Sensor Based BLDC Motor with SEPIC Converter for PFC and Speed Control,”
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, year: October 2015
32. R. Carlson, M. Lajoie -Mazenc, and C.D.S. Fagundes, “Analysis of torque ripple due to phase commutation in brushless DC
machines,” IEEE Trans. On Industry Applications 28, pp: 632–638, year: 1992.
33. M. Mahdavi and H. Farzanehfard, “Bridgeless SEPIC PFC rectifier with reduced components and conduction losses,” IEEE Trans. Ind.
Electron., vol. 58, no. 9, Sep. 2011, pp. 4153–4160.
34. A. Barkley, D.Michaud, E.Santi, A. Monti and D. Patterson , “Single stage brushless DC motor drive with high input power factor for
single phase applications”, IEEE trans on Power Electronics Specialists Conference, PESC, 2006, pp.1-10.
Paper Title: An Insight of Script Text Extraction Performance using Machine Learning Techniques
Abstract: With the evolution of huge amount of ancient and modern text available in digital format, it is
ascertain to mine for researchers, government, tourist and travelers visiting all over the world. However, it is
very challenging and costly. Further, it takes a lot of effort and time for script text mining. Therefore, the study
investigates various techniques for script text mining viz supervised and unsupervised techniques. Firstly, the
study presents a survey for various kinds of techniques adopted by the users for extraction of text from image. It
also delivers information about gaps involved in the various approaches. Furthermore, it incorporate the
quantitative comparisons based among the study of various approaches and techniques for text extraction as well
as script level comparison. The result inferred on the basis of the script comparison indicates that, the accuracy
level of ancient script was found to be 5% lesser than modern script. Again, furthermore comparison has been
450. done on standalone and hybrid machine (Combination of CNN and KNN) / deep learning techniques. The
accuracy has been found to be lower(4%) in case of standalone techniques. 2581-
2588
Keyword : Text Mining, Machine Learning, Deep Learning, Script, Image scene extraction, Convolutional
Neural Network, K-Nearest Neighbors.
References:
1. A. A. Shah and K. Rana, “A Review on Supervised Machine Learning Text Categorization Approaches,” 2018 Int. Conf. Circuits Sy st.
Digit.Enterp. Technol., pp. 1–6, 2019.
2. A. Ray, S. Rajeswar, and S. Chaudhury, “Text recognition using deep BLSTM networks,” ICAPR 2015 - 2015 8th Int. Conf. Adv.
Pattern Recognit., 2015.
3. Ȧ P. U., Ȧ U. C. J., and Ȧ K. A., “TranSish : Translator from Sanskrit toEnglish-A Rule based Machine Translation,” vol. 4, no. 5, pp.
3463–3466, 2014.
4. A. S. Kavitha, P. Shivakumara, G. H. Kumar, and T. Lu, “Text segmentation in degraded historical document images,” Egypt.
Informatics J., vol. 17, no. 2, pp. 189–197, 2016.
5. B. Trstenjak, S. Mikac, and D. Donko, “KNN with TF-IDF based framework for text categorization,” Procedia Eng., vol. 69, pp. 1356–
1364, 2014.
6. B. Su and S. Lu, “Accurate recognition of words in scenes without character segmentation using recurrent neural network,” Pattern
Recognit., vol. 63, no. June 2016, pp. 397–405, 2017.
7. B. Su, S. Lu, and C. L. Tan, “Robust document image binarization technique for degraded document images,” IEEE Trans. Image
Process., vol. 22, no. 4, pp. 1408–1417, 2013.
8. C. L. Cameras, O. Enqvist, and F. Kahl, “An End-to-End Trainable Neural Network for Image-Based Sequence Recognition and Its
Application to Scene Text Recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 7, pp. 1455–1461, 2017.
9. C. Wick and F. Puppe, “Fully convolutional neural networks for page segmentation of historical document images,” Proc. - 13th IAPR
Int. Work. Doc. Anal. Syst. DAS 2018, pp. 287–292, 2018
10. D. Sen Maitra, U. Bhattacharya, and S. K. Parui, “CNN based common approach to handwritten character recognition of multiple
scripts,” Proc. Int. Conf. Doc. Anal. Recognition, ICDAR, vol. 2015-Novem, pp. 1021–1025, 2015.
11. D . M. E. D. M. Hussein, “A survey on sentiment analysis challenges,” J. King Saud Univ. - Eng. Sci., vol. 30, no. 4, pp. 330–338,
2018.
12. D. Valy, M. Verleysen, and K. Sok, “Line segmentation approach for ancient palm leaf manuscripts using competitive learning
algorithm,” Proc. Int. Conf. Front. Handwrit. Recognition, ICFHR, pp. 108–113, 2017.
13. F. Patel and N. Soni, “Text mining: A Brief survey,” Int. J. Adv. Comput. Res., vol. 2, no. 4, pp. 243–248, 2012.
14. G. Katiyar and S. Mehfuz, “MLPNN based handwritten character recognition using combined feature extraction,” Int. Conf. Compu t.
Commun. Autom. ICCCA 2015, pp. 1155–1159, 2015.
15. Joan Pastor-Pellicer, Muhammad Zeshan Afzal, Marcus Liwicki‡ & Mar´ıa Jose Castro-Bleda “Complete Text Line Extraction with
Convolutional Neural Networks and Watershed Transform”, p.p 30-35, 2016.
16. J. Richarz, S. Vajda, R. Grzeszick, and G. A. Fink, “Semi-supervised learning for character recognition in historical archive
documents,” Pattern Recognit., vol. 47, no. 3, pp. 1011–1020, 2014.
17. I. J. Kim and X. Xie, “Handwritten Hangul recognition using deep convolutional neural networks,” Int. J. Doc. Anal. Recognit. , vol.
18, no. 1, pp. 1–13, 2014.
18. K. U. Sharma and A. A. Ugwekar, “English transcription of sanskrit characters using predefined templates,” Proc. 2017 2nd IEEE Int.
Conf. Electr. Comput. Commun. Technol. ICECCT 2017, pp. 0–3, 2017.
19. K. Chen, M. Seuret, M. Liwicki, J. Hennebert, and R. Ingold, “Page segmentation of historical document images with convolutional
autoencoders,” Proc. Int. Conf. Doc. Anal. Recognition, ICDAR, vol. 2015-Novem, pp. 1011–1015, 2015.
20. K. Indhuja, M. Indu, C. Sreejith, and P. C. R. Raj, “Text Based Language Identification System for Indian Languages Following
Devanagiri Script,” vol. 3, no. 4, pp. 327–331, 2014.
21. M. Morita, R. Sabourin, F. Bortolozzi, and C. Y. Suen, “Unsupervised feature selection using multi-objective genetic algorithms for
handwritten word recognition,” Proc. Int. Conf. Doc. Anal. Recognition, ICDAR, vol. 2003-Janua, pp. 666–670, 2003.
22. M. W. A. Kesiman, J. C. Burie, and J. M. Ogier, “A new scheme for text line and character segmentation from gray scale images of
palm leaf manuscript,” Proc. Int. Conf. Front. Handwrit. Recognition, ICFHR, pp. 325–330, 2017.
23. M. Avadesh and N. Goyal, “Optical character recognition for sanskrit using convolution neural networks,” Proc. - 13th IAPR Int.
Work. Doc. Anal. Syst. DAS 2018, pp. 447–452, 2018.
24. M. Yousefi-Azar and L. Hamey, “Text summarization using unsupervised deep learning,” Expert Syst. Appl., vol. 68, pp. 93–105,
2017
25. N. Kindo, G. Bhuyan, and R. Padhy, Computing and Network Sustainability, vol. 75. Springer Singapore, 2019.
26. N. Sridevi and P. Subashini, “Combining Zernike moments with regional features for classification of handwritten ancient tamil scripts
using extreme learning machine,” 2013 IEEE Int. Conf. Emerg. Trends Comput. Commun. Nanotechnology, ICE-CCN 2013, no.
Iceccn, pp. 158–162, 2013.
27. N. Shafiabady, L. H. Lee, R. Rajkumar, V. P. Kallimani, N. A. Akram, and D. Isa, “Using unsupervised clustering approach to train the
Support Vector Machine for text classification,” Neurocomputing, vol. 211, pp. 4–10, 2016.
28. N. S. Panyam, V. L. Vijaya, R. K. Krishnan, and K. R. Koteswara, “Modeling of palm leaf character recognition system using
transform based techniques,” Pattern Recognit. Lett., vol. 84, pp. 29–34, 2016.
29. P. Mittal, V. Singhal, and P. S. S. Jain, “ICT Enabled Vehicular Safe Distance Modeling at Indian Unmanned Railway Level
Crossings,” SSRN Electron. J., 2019.
30. R. Kumar, P. Kumar, and V. Singhal, “A Survey: Review of Cloud IoT Security Techniques, Issues, and Challenges,” SSRN Electro n.
J., 2019.
31. S. Daggumati and P. Z. Revesz, “Data mining ancient script image data using convolutional neural networks,” ACM Int. Conf.
Proceeding Ser., pp. 267–272, 2018.
32. S. Gopal and S. Raghav, “Automatic document retrieval using SVM machine learning,” Proc. 2017 Int. Conf. Smart Technol. Smart
Nation, SmartTechCon 2017, pp. 896–901, 2018.
33. S. Lu, T. Chen, S. Tian, J. H. Lim, and C. L. Tan, “Scene text extraction based on edges and support vector regression,” Int. J. Doc .
Anal. Recognit., vol. 18, no. 2, pp. 125–135, 2015.
34. S. Mirza, “Design and Implementation of Predictive Model for Prognosis of Diabetes Using Data Mining Techniques,” Int. J. Adv. Res.
Comput. Sci., vol. 9, no. 2, pp. 393–398, 2018.
35. S. Sudholt and G. A. Fink, “PHOCNet: A deep convolutional neural network for word spotting in handwritten d ocuments,” Proc. Int.
Conf. Front. Handwrit. Recognition, ICFHR, pp. 277–282, 2017.
36. S. Zhu and R. Zanibbi, “A text detection system for natural scenes with convolutional feature learning and cascaded classific ation,”
Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 2016-Decem, pp. 625–632, 2016.
37. V. Singhal, S. S. Jain, and M. Parida, “Train sound level detection system at unmanned railway level crossings,” Eur. Transp. - Trasp.
Eur., no. 68, 2018.
38. V. Singhal and S. Jain, “Safety Information System of Indian Unmanned Railway Level Crossings,” IOSR J. Mech. Civ. Eng. Ver. III,
vol. 12, no. 4, pp. 2278–1684, 2015.
39. V. Bijalwan, V. Kumar, P. Kumari, and J. Pascual, “KNN based machine learning approach for text and document mining,” Int. J.
Database Theory Appl., vol. 7, no. 1, pp. 61–70, 2014.
40. V. Singhal and S. S. Jain, “Road driver behaviour evaluation at unmanned railway level crossings,” Eur. Transp. - Trasp. Eur., 2017.
41. W. Huang, Y. Qiao, and X. Tang, “Robust scene text detection with convolution neural network induced MSER trees,” Lect. Notes
Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8692 LNCS, no. PART 4, pp. 497 –511,
2014.
42. X. C. Yin, W. Y. Pei, J. Zhang, and H. W. Hao, “Multi-Orientation Scene Text Detection with Adaptive Clustering,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 37, no. 9, pp. 1930–1937, 2015.
43. X. Zhang, L. Duan, L. Ma, and J. Wu, “Text extraction for historical tibetan document images based on connected component ana lysis
and corner point detection,” Commun. Comput. Inf. Sci., vol. 772, pp. 545–555, 2017.
44. Z. Lei, S. Zhao, H. Song, and J. Shen, “Scene text recognition using residual convolutional recurrent neural network,” Mach. Vis.
Appl., vol. 29, no. 5, pp. 861–871, 2018.
Authors: Md. Jueal Mia, Al Amin Biswas, Abdus Sattar, Md. Tarek Habib
Registration Status Prediction of Students using Machine Learning in the Context of Private
Paper Title:
University of Bangladesh
Abstract: Bangladesh is a densely populated country where a large portion of citizens is living under poverty.
In Bangladesh, a significant portion of higher education is accomplished at private universities. In this twenty-first
century, these students of higher education are highly mobile and different from earlier generations. Thus, retaining
existing students has become a great challenge for many private universities in Bangladesh. Early prediction of the
total number of registered students in a semester can help in this regard. This can have a direct impact on a private
university in terms of budget, marketing strategy, and sustainability. In this paper, we have predicted the number of
registered students in a semester in the context of a private university by following several machine learning
approaches. We have applied seven prominent classifiers, namely SVM, Naive Bayes, Logistic, JRip, J48, Multilayer
452. Perceptron, and Random Forest on a data set of more than a thousand students of a private university in Bangladesh,
where each record contains five attributes. First, all data are preprocessed. Then preprocessed data are separated
into the training and testing set. Then, all these classifiers are trained and tested. Since a suitable classifier is 2594-
required to solve the problem, the performances of all seven classifiers need to be thoroughly assessed. So, we have 2600
computed six performance metrics, i.e. accuracy, sensitivity, specificity, precision, false positive rate (FPR) and false
negative rate (FNR) for each of the seven classifiers and compare them. We have found that SVM outperforms all
other classifiers achieving 85.76% accuracy, whereas Random Forest achieved the lowest accuracy which is 79.65%.
Keyword : Private University, Machine Learning, Registration Status, Prominent Classifier, Performance Evaluation
Metrics.
References:
1. "Private University," Available online: http://www.ugc-universities.gov.bd/home/university/private/75 [Last Accessed 01 October
2019]
2. "Public University," Available online: http://www.ugc-universities.gov.bd/home/university/public/120 [Last Accessed 01 October
2019]
3. E. Yukselturk, S. Ozekes, and Y. K. Türel, "Predicting dropout student: an application of data mining methods in an online education
program," European Journal of Open, Distance and e-learning, vol. 17, no. 1, pp. 118-133, 2014.
4. M. Tan and P. Shao, "Prediction of student dropout in e-learning program through the use of machine learning method," International
Journal of Emerging Technologies in Learning (iJET), vol. 10, no. 1, pp. 11-17, 2015.
5. J. Liang, C. Li, and L. Zheng, "Machine learning application in MOOCs: Dropout prediction," In 2016 11th Intern ational Conference
on Computer Science & Education (ICCSE), pp. 52-57. IEEE, 2016.
6. D. Mulyani, "Prediction of new student numbers using least square method," International Journal of Advanced Research in Artificial
Intelligence, vol. 4, no. 11, pp. 30-35, 2015.
7. A. Slim, D. Hush, T. Ojah, and T. Babbitt, "Predicting student enrollment based on student and college characteristics," Proceedings of
the 11th International Conference on Educational Data Mining, 2018.
8. J. Abelt et al. , "Predicting likelihood of enrollment among applicants to the UVa undergraduate program," In 2015 Systems and
Information Engineering Design Symposium, pp. 194-199, IEEE, 2015.
9. A. A. Biswas, A. Majumder, M. J. Mia, I. Nowrin, and N. A. Ritu, "Predicting the Enrollment and Dropout of Students in the Post-
Graduation Degree using Machine Learning Classifier," International Journal of Innovative Technology and Exploring Engineerin g
(IJITEE), vol. 8 no. 11, pp. 3083-3088, September 2019.
10. C. Burgos, "Data mining for modeling students’ performance: A tutoring action plan to prevent academic dropout," Computers &
Electrical Engineering, vol. 66, pp. 541-556, February 2018.
11. P. A. Willging and S. D. Johnson, "Factors that influence students' decision to dropout of online courses," Journal of Asynchronous
Learning Networks, vol. 13, no. 3, pp. 115-127, 2009.
12. S. K. Wanjau and G. M. Muketha, "Improving student enrollment prediction using ensemble classifiers," International Journal of
Computer Applications Technology and Research, vol. 07, no. 03, pp. 122-128, 2018.
13. M. Lestari, A Darmawan, N. W. P. Septiani, and A. Trihapsari, "Non-written enrolment system using classification methods," In
Journal of Physics: Conference Series, vol. 1175, no. 1, p. 012055, IOP Publishing, 2019.
14. B. Pérez, C. Castellanos, and D. Correal, "Predicting student drop-out rates using data mining techniques: A case study," In IEEE
Colombian Conference on Applications in Computational Intelligence, pp. 111-125, Springer, 2018.
15. M. Koutina and K. L. Kermanidis, "Predicting postgraduate students’ performance using machine learning techniques," Artificial
Intelligence Applications and Innovations, Springer, Berlin, Heidelberg, pp. 159-168, 2011.
16. L. Aulck, N. Velagapudi, J. Blumenstock, and J. West, "Predicting student dropout in higher education," arXiv preprint
arXiv:1606.06364, 2016.
17. F. Mi and D. Yeung, "Temporal models for predicting student dropout in massive open online courses," In 2015 IEEE International
Conference on Data Mining Workshop (ICDMW), pp. 256-263, IEEE, 2015.
18. S. S. Aksenova, D. Zhang, and M. Lu, "Enrollment prediction through data mining," In 2006 IEEE International Conference on
Information Reuse & Integration, pp. 510-515, IEEE, 2006.
19. J. Han, M. Kamber, and J. Pei, "Data Mining Concepts and Techniques," Elsevier, 2012.
20. "Confusion Matrix," Available online: https://www.analyticsvidhya.com/blog/2019/08/11-important-model-evaluation-error-metrics/
[Last Accessed 01 October 2019]
21. "Confusion Matrix," Available online: https://en.wikipedia.org/wiki/Confusion_matrix [Last Accessed 01 October 2019]
Mohamad Syafiq Bin Che Musa, Mohd Faizal Mat Tahir, Mohd Rasidi Mohd Rasani,
Authors:
Meor Iqram Meor Ahmad
Paper Title: Determination of Natural Frequency and Mode Shape for Hollow Thin Plates
Abstract: The determination of natural frequency and the mode shape of structures are important in
characterizing the properties or behavior of the structures. The existing hollow in solid thin plate will change the
vibration behavior in term of resonance frequency and mode behavior. A lot of structure consists of hollow
space such as inner panel of car hood and bonnet. However, simplifying the model from hollow structure with
solid thin plates only will resulting some difference in their vibration performance. This study begins with
conducting modal analysis experiment using solid thin plate under free-free boundary condition. Next, the finite
element methods were performing to compare with the experimental results. The average error of 3.96% was
obtain when compared which provide a good confident level with the simulation result. Next, the study
continued by finding the natural frequency and the mode shape for the thin plate under various position of hole,
number of holes and shape of hole by using FEM software. Finally, finite element was also being carried out on
the simplified design model of the inner panel car hood based from the real product and compared the resonance
frequency from the model with some vibration reference sources. Through this study, it is found that the
diversity of the hole position, the increasing number of holes and the change of the hole shape play a role in
changing the natural frequencies of a thin plate. Since there is a lot of hollow thin plates in the car part,
453. designing every parts are important to make sure the NVH quality is improve and not opposite of it.
2601-
2606
Keyword : natural frequency, mode shape, Modal Analysis, finite element method
References:
1. N.V.Divya & Rizman, S. 2016. Analysis of plates by using ansys. International Journal of Innovative Research in
Science,Engineering and Technology 5(12): 21211-21255.
2. Sadananda, N. 2016. Experimental study of low-mid frequency interior noise of an suv. Master’s thesis in the Master’s programme
in Sound and Vibration, Department of Applied Mechanics
3. Wellmann, T., Govindswamy, K., Braun, E. & Wolff, K. 2007. Aspects of driveline integration for optimized vehicle NVH
characteristics. SAE Technical Paper.
4. Zhang, J., Shen, G., Du, Y. & Hu, P. 2013. Modal analysis of a lightweight engine hood design considering stamping effects.
Applied Mechanics and Materials 281(2013): 364-369.
5. NC Hao, A As'arry, KAM Rezali, MZ Nuawi, 2018, Journal of Mechanical Engineering, Effect of Disc Brake Squeal with Respect to
Thickness Variation: Experimental Modal Analysis, Journal of Mechanical Engineering, Special Issue, (6) ;33-44.
6. NA Ngatiman, MZ Nuawi, S Abdullah, 2018, Z-Freq: Signal Analysis-Based Gasoline Engine Monitoring Technique using Piezo-Film
Sensor, International Journal of Mechanical Engineering and Technology, 9(5);897-910
7. MFM Tahir, MZ Nuawi, R Zulkifli, S Abdullah, MAM Sabri, 2012, Study on correlation of sound absorption coefficient for
automotive noise absorption panel material by using sabine method and Z -octave method, International Review of Mechanical
Engineering, 6 (3) ;640-643.
8. Nesaragi, V. V., Maruthi, B. H., Chandru , B. T. & Kumar, D. 2014. Design and noise, vibration, harshness analysis of engine
bonnet of the car. International Journal of Engineering Research and Applications 4(7): 05-11.
9. Owunna Ikechukwu, Ikpe Aniekan, Satope Pau & Ikpe, E. 2016. Experimental modal analysis of a flat plate subjected to vibr ation.
American Journal of Engineering Research 5(6): 30-37.
10. M.F. Mat Tahir, Stephen J. Walsh, Daniel J. O`Boy. (2015). Evaluation of The Digital Image Correlation Method for The
Measurement of Vibration Mode Shapes. - The 44th International Congress and Exposition On Noise Control Engineering Inter-Noise
2015.
11. Mohd Hilton Ahmad. 2008. Analisis Struktur Menggunakan Kaedah Unsur Terhingga. Seminar Kebangsaan Matematik &
Masyarakat 2008, hlm. 118-126.
12. František Klimenda*, Josef Soukup, 2017, Modal analysis of thin aluminium plate, XXI International Polish–Slovak Conference
"Machine Modeling and Simulations 16, Procedia Engineering 177(2017)11– 16.
13. Mohd Irman Ramli, Mohd Zaki Nuawi, Shahrum Abdullah, Mohammad Rasidi Mohammad Rasani, Hambali Boejang, Mohd Farriz
Basar, Kho Ko Seng, 2018, Comparison study on light structure modal parameter using experimental modal analysis method via
PIEZOFILM sensor, Jurnal Teknologi, 80-3.
14. Puranik, K. A., Tharewal, S. R. & Mhetre, M. S. 2017. Eigen Frequency Vibration Analysis for Thin Plate. International Journal of
Engineering Science & Research Technology 6(3): 253-257.
15. Steven Ashley, Lightweight carbon-fiber and SMC body panels under development, Technology Report, MOBILITY
ENGINEERING, AUTOMOTIVE, AEROSPACE, OFF-HIGHWAY, December 2013.
16. Sadananda, N. 2016. Experimental study of low-mid frequency interior noise of an SUV. Master’s thesis in the Master’s programme
in Sound and Vibration, Department of Applied Mechanics Division of Vehicle Engineering Autonomous Systems, Gothenburg,
Sweden. R Samin,
Paper Title: Stereotyped Media Images as a Method of Forming Delusions of Ordinary Consciousness
Abstract: The article reveals the psychological foundations of the manipulative influence of the media on
the ordinary consciousness of the information consumer, analyzes the methods of manipulative influence. The
survey of respondents has determined the activity rate of information consumption, the level of interest in
various media formats, the respondent’s degree of awareness of the specificity regarding influence on their
consciousness.
Methods of media influence on ordinary consciousness include various types of fragmentation of information,
game by facts and figures, logic violations, semantics (use of metaphors, emotionally evaluated vocabulary,
language of symbols, archetypes, antitheses) of stereotypical images for attaching certain connotative
stereotypes to the consciousness in order to strengthen influence, and others. Consequently, the technologies of
influence determine the need for psychosemantic analysis to study stereotypical, mythological and archetypal
images of ordinary consciousness. The research demonstrates the relevance of the psychosemantic approach to
the study of ordinary consciousness in the modern information society, the impact of crisis processes in the
society development on the changes in certain levels of ordinary consciousness and the main tendencies of its
transformation; as well as the empirical research of the formation of the ordinary consciousness by mass media
has been demonstrated.
454.
Keyword : ordinary consciousness, mass media, manipulation, stereotype, technology. 2607-
2612
References:
1. Freeman M., Brockmeier J. “Narrative Integrity: Autobiographical Identity and the Meaning of the «Good life»”. In J. Brockme ier, D.
Carbaugh, “Narrative and Identity: Studies in Autobiography, Self and Culture,” Amsterdam; Philadelphia, 2001, pp. 75-100.
2. Kara-Murza S.G. “Manipulations by consciousness. Century XXI,” Moscow:Algoritm, 2015. (Russian)
3. Lippman, U. “Obshchestvennoe mnenie” [Public Opinion]. Moscow.: Instiut fonda “Obshchestvennoe mnenie” [Public Opinion], 2004.
(Russian)
4. McLuhan M. “Understanding me. Lectures and interviews,” Cambridge: MA: Mit press, 2003.
5. Popova V.O., & Balezina E.A. “Rol' sredstv massovoy informatsii v formirovanii stereotipov massovogo soznaniya” [The Role of
Mass Media in Formation of Mass Media Stereotypes]. Filosofiya. Psikhologiya. Sotsiologiya [Philosophy. Psychology.Sociology], no.
2, pp. 88-94, 2015. (Russian)
6. Sladkova O.B. Manipulirovanie obshchestvennym soznaniem v informatsionnom obshchestve [Manipulation of public consciousness
in the information society]. Observatoriya kul'tury [Observatory of culture], no. 6, pp. 4-12, 2006. [Online]. Available:
http://ifapcom.ru/files/Monitoring/sladkova_manipul_obsch_sozn.pdf (accessed 25 October 2019). ( Russian)
7. Tkachenko O. Ukrajina na mentaljnij mapi centaljno-skhidnoji Jevropy poshuky identychnosti [Ukraine on Mental Map of Central
Eastern Europe. Searching for Identity]. Visnyk Ljvivsjkogho universytetu [Bulletin of the University of Lviv], no. 35, pp. 277-287,
2011. [Online]. Available: http://journ.lnu.edu.ua/publications/visnyk35/Visnyk35_P3_09_Tkachenko.pdf (accessed 10 October
2019). ( Russian)
8. Čyževsʹka M. “Čy budutʹ u Lʹovi «Donbasʹki ghetto»” [Will there be “Donbas ghettoes” in Lviv]. Vgolos [Aloud], 30.01.2017.
[Online]. Available: https://vgolos.com.ua/articles/chy-budut-u-lvovi-donbaski-getto_248303.html (accessed 02 February 2019).
(Ukrainian)
Paper Title: Multimedia Signal Processing in Cloud using Content Based Copy Detection
Abstract: Nowadays making multimedia and multimedia altering has gotten simple because of effectively
accessible handling instruments. Progressively over facilitating sites are unreservedly accessible. So clearly we
455. experience circumstances wherein numerous recordings and pictures that are copyrighted are getting copied
effectively. Such duplication isn't just unlawful yet in addition it makes an enormous misfortune unique content
2613-
holder. On the off chance that at all we attempt to distinguish such copied content, process gets extremely mind
2615
boggling in light of enormous sizes and huge amount of multimedia documents present on web. So this
procedure gets perplexing and computationally costly. Content based multimedia copy detection gives a
powerful and improved instrument which can distinguish coordinating rate among tremendous multimedia
duplicates from the content itself without having any reliance on any product. In the system of content based
copy detection, marks are made from content itself before transferring on cloud like Picasa. In the proposed
framework at whatever point new Multimedia article is transferred on the cloud initially its mark is made and on
the off chance that the mark matches with put away database signature, at that point this will trap the site which
copies copyrighted copy with no rights.
Keyword : Cloud Computing, Multimedia, Content Based Copy Detection and Cryptosteganography.
References:
1. Vaishali Dewar, Priya Pise, “Content Based Multimedia Copy Protection System for the Cloud”, International Journal of Innovative
Research in Computer and Communication Engineering, Vol. 4, Issue 10, October 2016, pp.17203-17211.
2. H Mohamed , Tarek ElGamal, C Kiana A Ahmed, "Cloud-based Multimedia Content Protection System". IEEE, 1520-9210,
2015.
3. L Hong, L Hong, XiangyangXue,"A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection".
IEEE, 2250-1706, Volume 25, No. 8, August 2013.
4. G Vishwa, D Parisa, Langis Gagnon, B Gilles, "Content-Based Video Copy Detection using Nearest- Neighbor Mapping". 4673-
0382, Vol.1 (6), 2013.
5. Mani MalekEsmaeili, F Mehrdad, K W Rabab,"A Robust and Fast Video Copy Detection System Using Content-Based Finger
printing". Vol. 6, No. 1, March 2011.
Paper Title: Accomplishment of New Protocol for Stupendous Security in Cloud Environment
Abstract: Cloud is that the rising and thirst area of analysis and advantageous in all the fields. However
security is the main disquiet for not espouse cloud for each application. Mainly of the security crisis are
connected by authentication with data protection by the respect to cloud security alliance (CSA). The projected
New (Biometric encoding and Biometric authentication) protocol can conquer every safety crisis in cloud
adjacent. In NEW protocol biometric encryption has been provided for the cloud consumer’s valuable
information and identity verification has been utilized in a unique way to scale back the problems associated
with authentication and authorization. In NEW protocol Identity verification in cloud environment has been joint
by pattern security in coincidence with four entirely dissimilar and influential encryption algorithms for
accumulated safety. This protocol improves biometric template protection by the combination of RSA and AES
encryption algorithms in proper locations and 3DES, Blowfish has been utilized in information security and
solution safety supervision. By implementing such technique can vanish out the un trustiness of adopting cloud,
specifically public and hybrid clouds. Since all the users information are hold on in off premise. Adopting this
456. protocol has given nice results when examining with existing work and all the vulnerable places has been
considered for improved security. 2616-
2619
Keyword : Cloud, Biometric Encryption, Cryptography, Authentication Protocol, Protocol, Identity
Verification.
References:
1. Lee, S., Ong, I., Lim, H. T., & Lee, H. J. (2010). Two factor authentication for cloud computing. Journal of information and
communication convergence engineering, 8(4), 427-432.
2. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. Circuits and Systems for Video Technology,
IEEE Transactions on, 14(1), 4-20.
3. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM
systems Journal,40(3), 614-634.
4. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An Innovative Proposal for Secure Cloud Authentication using Encrypted Biometric
Authentication Scheme. Indian Journal of Science and Technology, 8(35).
5. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key
cryptosystems. Communications of the ACM,21(2), 120-126.
6. Balaji S, S. Saravanakumar., ”Performance Evaluation of Security and Privacy Challenges in Cloud Computing Services”-JARDCS
ISSN 1943-023X issue 12-2017.
Paper Title: Cloud Data Security Protection Technique using Internet on Things
Abstract: The internet of things is turning into an appealing framework worldview to acknowledge inter-
connections throughout corporeal, digital as well as communal gaps. Through the connections amid the IoT,
safety concerns befall important, along with it is huge to set up improved resolutions for safety protections. The
IoT apparition of unlock data sharing is expert through using cloud registering concepts. Since IoT is depends on
the web, safety concerns of internet will similarly emerge in IoT as well as IoT enclose three layers for example
457. perception, transportation and application layers. The safety concerns, modernism along with solution
recognized by the application layer are conversed about in this Paper. The principle focal point of this 2620-
examination work is on Data Security Protection procedure for application layer. 2623
Keyword : Photovoltaic power systems, PV balancers, Module Integrated Converters, Maximum Power
Point Tracking.
References:
458. 1. R. Alonso, E. Roman, A. Sanz, V. Santos, and P. Ibanez, “Analysis of inverter-voltage influence on distributed MPPT architecture
performance”, IEEE Trans. Ind. Electron., vol. 59, no. 10, 2012, pp. 3900–3907.
2. Dezso Sera, L. Mathe, T. Kerekes, S. V. Spataru, R. Teodorescu, “On the Perturb-and-Observe and Incremental Conductance MPPT 2624-
Methods for PV Systems”, IEEE Journal of Photovoltaic, vol. 3, no. 3, 2013. 2628
3. Huimin Zhou, Junjian Zhao, Yehui Han, “PV balancers: Concept, architectures and realization”, in Proc. IEEE Energy Convers. Co ngr.
Expo., pp.3479-3487, 2012.
4. J. Huusari, and T. Suntio, “Dynamic properties of current-fed quadratic full-bridge buck converter for distributed photovoltaic MPP
tracking systems”, IEEE Trans. Power Electron., vol. 27, no. 11, 2012, pp. 4681–4689.
5. M. Kasper, D. Bortis, and J. W. Kolar, “Classification and comparative evaluation of the PV panel-integrated dc-dc converter concept”,
IEEE Trans. Power Electron., vol. 29, no. 5, 2014, pp. 2511–252.
6. Nicola Femia, Giovanni Petrone, “Optimization of perturb and observe maximum power point tracking method”, IEEE Trans. Power
Electron., vol. 20, no. 4, 2005, pp. 963–973.
7. C. Olalla, D. Clement, M. Rodriguez, and D. Maksimovic, “Architectures and control of sub module integrated dc–dc converters for
photovoltaic applications”, IEEE Trans. Power Electron., vol. 28, no. 6, 2013. pp. 2980–2997.
8. Omar Abdel-Rahim, HamdyRadwan, Mahrous Ahmed, “Two Stages Maximum Power Point Tracking Algorithm for PV Systems
Operating under Partially Shaded Conditions”, IEEE Trans. Power Electron., vol.25, no.5, 2010.
9. S. Ravivarman, and T. Samydurai, “Optimized Grid Power Injection with Maximum Power Point Tracking Using Cascaded SEPIC
Converter and Three Phase Inverter”, International Journal, Vol. 4, Issue 1, 2015.
10. P. S. Shenoy, K. A. Kim, B. B. Johnson, and P. T. Krein, “Differential power processing for increased energy production and reliability
of photovoltaic systems”, IEEE Trans. Power Electron., vol. 28, no. 6, 2013, pp. 2968–2979.
Paper Title: Efficient Communication in Cloud using High Performance Computing System
Abstract: To build the productivity of every errand, we necessitate a framework that should furnish high
performance alongside adaptabilities and price effectiveness for client. Cloud computing, since we are for the
most part mindful, has turned out to be well known over the previous decade. So as to build up a high
performance disseminated framework, we have to use the cloud computing. In this paper, we will initially have a
presentation of high performance computing framework. Thusly inspecting them we will investigate inclines in
compute and emerald feasible computing to upgrade the routine of a cloud framework. At long last introducing
the future degree, we finish up the paper recommending a way to accomplish a emerald high performance cloud
459. framework.
2629-
Keyword : Cloud Computing, High Performance Computing, IaaS, PaaS and SaaS. 2632
References:
1. D Sasikumar, S Saravanakumar, T Saravanan, “Analysis of Security Issues and Safety Measurements in High Performance Cloud
Computing Systems”, Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 14-Special Issue, 2018, pp.1688-1693.
2. D Sasikumar, S Saravanakumar, “Cozy and Safety Developments Up to Date in High Overall Performance Computing the Use of
Cloud Computing”, Journal of Computational and Theoretical Nanoscience, Vol. 16, 709–714, 2019.
3. Miettinen AP, Nurminen JK, “Energy efficiency of mobile clients in cloud computing”, ACM HotCloud'10 Proceedings of the 2nd
USENIX conference on Hot topics in cloud computing, pp 4-11,2010.
4. V Christian, P Suraj, B Rajkumar, “High-Performance Cloud Computing: A view of Scientific Applications”, Int. Sym. on Pervasive
Systems, Algorithms, and Networks, IEEE Computer Society, pp 4- 16,2009.
5. Ye Xiaotao, LvAili, Zhao Lin, “Research of High Performance Computing with Clouds”, ISBN 978-952-5726-10-7, pp 567-577, 2010.
Authors: F X Edwin Deepak, L Sahaya Senthamil, S Umamaheswari, J Punitha Nicholine, R Joseph Rathish
Paper Title: Fuzzy Logic Controlled PV Based Quasi Impedance Source Inverter for Charge Balancing
460.
Abstract: A photovoltaic power generation system based on battery-energy quasi impedance source
2633-
cascaded multi-level inverter incorporates the advantages of a quasi-impedance source inverter, a CMI, and a
2638
battery-energy storage unit. Unbalanced battery charging between cascaded H-bridge inverter modules will
degrade the efficiency of an entire system and reduce the lifetime of the battery. This paper proposed a control
method for tracking the maximum power point and balancing the SOC of the battery under the large variation of
solar input. A fuzzy based optimized linearizer for the battery charge and maximum power point tracking are
proposed. The fuzzy controller is proposed to enhance the battery state of charge regulation takes as a individual
modules as a loop to reduce over charge condition. The Proposed method validation is done by comparing it
with base work control by PI and P&O with the performance parameters. The base work and proposed work are
designed and simulated in the Matlab Simulink software.
Keyword : multilevel inverter, quasi impedance source inverter, shoots through state, solar PV panel.
References:
1. Huang, W. and Abu Qahouq, J.A., (2015), ‘Energy sharing control scheme for state-of-charge balancing of distributed battery energy
storage system,’ IEEE Trans. Ind. Electron., vol.62, no.5, pp.2764-2776.
2. Kandasamy, K., Vilathgamuwa, M. and Tseng, K.J., (2015), ‘Inter-module state of charge balancing and fault-tolerant operation of
cascaded H-bridge converter using multi-dimensional modulation for electric vehicle application’ IET Power Electron., vol. 8, no. 10,
pp.1912-1919.
3. Lu, X., Sun, K., Guerrero, J.M et al., (2015), ‘Double-quadrant state of charge-based droop control method for distributed energy
storage systems in autonomous DC microgrids,’ IEEE Trans. Smart Grid, vol.6, no.1, pp.147-157.
4. Nguyen, M.K. and Tran, T.T., (2017), ‘Quasi cascaded H-bridge five level boost inverter,’ IEEE Trans. Ind. Electron.,
doi:10.1109/TIE.2017.2701770, to be published.
5. Sun, D., Ge, B., Liang, W., Abu-Rub, H. and peng, F., (2015), ‘An energy stored Quasi-Z source cascaded multilevel inverter based
photovoltaic power generation system,’ IEEE Trans. Ind. Electron., vol.62, no.9, pp.5458-5467.
Authors: Ruby Mishra, Manoranjan Mohapatra*, Shubham Kamlesh Shah, Taniya Ghosh
Keyword : Connected component, PixelSegmentation, Image morphology, Brain tumor, Brain cancer,
462. Medical images, MRI images
References: 2642-
1. Chaddad, A., Zinn, P.O. and Colen, R.R., "Brain tumour identification using Gaussian Mixture Model features and Decision Tree s 2645
classifier.,"Information Sciences and Systems (CISS), 2014 48th Annual Conference on, vol., no., pp.1,4, 19-21 March 2014.
2. Ray, N., Saha, B.N. and Brown, M.R.G., "Locating Brain Tumours from MR Imagery Using Symmetry,"Signals, Systems and
Computers, 2007. ACSSC 2007. Conference Record of the Forty-First Asilomar Conference on, vol., no., pp.224, 228, 4-7 Nov. 2007.
3. Rajesh, T. and Malar, R.S.M., "Rough set theory and feed forward neural network based brain tumour detection in magnetic reso nance
images,"Advanced Nano materials and Emerging Engineering Technologies (ICANMEET), 2013 International Conference on , vol.,
no., pp.240,244, 24-26 July 2013.
4. Sangewar, S., Peshattiwar, A.A., Alagdeve, V. and Balpande, R., "Liver segmentation of CT scan images using K means
algorithm,"Advanced Electronic Systems (ICAES), 2013 International Conference on , vol., no., pp.6,9, 21-23 Sept. 2013.
5. Rajikha Raja, Neelam Sinha and Jitender Saini, “Characterization of White and Gray Matters in healthy brain: An in-vivo Diffusion
Kurtosis Imaging study”,IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT),
Bangalore, India, Jan.2014.
6. Zou, K.H., Wells, W.M., Kaus, M.R., Kikinis, R., Jolesz, F.A. and Warfield, S.K., Statistical validation of automated probabilistic
fractional segmentation against composite latent expert gold standard in MR imaging of brain tumours. In: Proceedings of 5th
International Conference on Medical Imaging Computing and Computer Assisted Interventions, Sept 25–28, 2002, Tokyo, Japan.
Berlin: Springer-Verilog, 315–322.
7. Zou, K.H., Wells, W.M., Kaus, M.R., Kikinis, R., Jolesz, F.A. and Warfield, S.K., Validation of partial tissue segmentation of single-
channel magnetic resonance images of the brain Nero image. 2000;12:640 –656.
8. Tao Song, Mo M. Jamshidi, Roland R. Lee and Mingxiong Huang, “A Modified Probabilistic Neural Network for Partial Volume
Segmentation in Brain MR Image”IEEE Transactions on Neural Networks,vol.18, no.5, pp.1424-1432, Sept.2007
9. Kao, Y.H., Sorenson, J.A., Bahn, M.M. and Winkler, S.S., Dual-echo MRI segmentation using vector decomposition and probability
technique: a two-tissue model. Magnetic resonance in medicine 1994; 32:342–357
10. Wenchao Lv, Yahui PengChao Yang and Xinchun Li, Reconstruction of brain tissue surface based on three-dimensional Tl-weighted
MRI images”, 8th International Congress on Image and Signal Processing (CISP), Feb.2016.
11. Smitha Sunil Kumaran Nair and K. Revathy, “Quantitative Analysis of Brain Tissues from Magnetic Resonance Images”, IEEE
international Conference on Digital Image Processing, Bangkok, Thailand, Mar.2009.
12. Warfield, S.K., Zou, K.H., Kaus, M.R. and Wells, W.M.,Simultaneous validation of image segmentation and assessment of expert
quality. International Symposium on Biomedical Imaging, July 7–10, 2002 IEEE.2002; 1494:1–4.
13. Bharatha, A., Hirose, M., Hata, N., Warfield, S.K., Ferrant, M., Zou, K.H., Suarez‐Santana, E., Ruiz‐Alzola, J., D'amico, A., Cormack,
R.A. and Kikinis, R., Evaluation of three-dimensional finite element-based deformable registration of pre- and intraoperative prostate
imaging. Med Phys. 2001; 28:2551–2560. [PubMed]
14. Jaccard, P., The distribution of the flora in the alpine zone. 1. New physiologist, 11(2), pp.37-50.
15. Russo, D., Merolla, F., Mascolo, M., Ilardi, G., Romano, S., Varricchio, S., Napolitano, V., Celetti, A., Postiglione, L., Di Lorenzo, P.
and Califano, L., 2017. A new prognostic biomarker for OSCC.International journal of molecular sciences, 18(2), p.443.
16. Zou, K.H., Warfield, S.K., Fielding, J.R., Tempany, C.M., Wells III, W.M., Kaus, M.R., Jolesz, F.A. and Kikinis, R., 2003. Statistical
validation based on parametric receiver operating characteristic analysis of continuous classification data1. Academic radiology,
10(12), pp.1359-1368.
17. Zou, K.H., Wells III, W.M., Kikinis, R. and Warfield, S.K., 2004. Three validation metrics for automated probabilistic image
segmentation of brain tumours. Statistics in medicine, 23(8), pp.1259-1282.
18. Gerig, G., Jomier, M. and Chakos, M., 2001, October. Valmet: A new validation tool for assessing and improving 3D objects
segmentation. In International Conference on Medical Image Computing and Computer-Assisted Intervention (pp. 516-523). Springer,
Berlin, Heidelberg.
19. Huttenlocher, D.P., Rucklidge, W.J. and Klanderman, G.A., 1992, June. Comparing images using the Hausdorff distance under
translation. In Proceedings 1992 IEEE Computer Society Conference on Computer Vision and PatternRecognition (pp. 654-656).
Keyword : River sediments, mechanical and chemical composition, irrigated fields, mineral fertilizers, water
consumption, canals, turbidity.
463. References:
1. Arifzhanov A.M., Fathullaev A.M., Samiev L.N. Process in channels and river sediments. T.: Monograph. Noshirlik Yodusi, 2017. - 2646-
191p.
2. Mirzajonov KM, Rakhmonov R.U. Irrigation soil erosion and elements of the fight against it.-Т .: “Navruz”, 2016, -252 c. 2649
3. Аrifdjanov A.M., Samiev L.N., Hydraulic calculation of changeable irrigation sediment reservoir // European Science Review, Austria,
Vienna, 2016, November-December.-124-126r.
4. Rozanov A.N. The value of irrigation sediment for the genesis, fertility and land reclamation of irrigated soils // Soil Science.-M,
1959.- No. 2.- 8-18 c.
5. Arifzhanov A.M., Fathullaev A.M., Samiev L.N. Sediment transportation possibilities of main channels.// Irrigation and melioration
journal. 2015. No2. 41-45 p.
6. Molodtsov L.Ya. Irrigation deposits of oases of the river valley Zeravshan and river deltas Murghab. Sat The effect of irriga tion on the
soil of oases Asia, Publishing.-1963.S.-46
7. Arifzhanov A.M., Fathulloev A.M. Turbulent motion of a suspension flow in open channels // Irrigation and Land Reclamation -
Toshkent, 2017. - No. 01 (7), - 32-35 s.
8. Kovda V.A., 3akharyina G.V., Shelyakina O.A. The value of the irrigation sediments of the Amu Darya in the fertility of irrig ated soils
// Soil Science.-M, 1959. No. 4 - P. 25-35.
9. Harten A. On a class of high resolution total-variation stable finite-difference schemes // SIAM J. of Numerical Analysis. 2002. V.21.
No. 1. P.1-23.
Paper Title: Utilization Iof Irecycled Iaggregate Iin Iwet Imix Imacadam I(Wmm)
Abstract: his istudy iplanned ito ibuild iup ia isystem ifor iappropriate iuse iof irecycled iaggregate iin
iwet imix imacadam i(WMM) icourse igot ifrom iconstruction iwaste iof ihighway iduring ithe iroad
464. imaintenance iand iconstruction iThis iwill ihelp iin iaccomplishing ieconomy iin idevelopment iof iroads ijust
ias isaving imoney ion icondition idebasement iin iterm iof idiminished imining iand iless ipollution. iDifferent 2650-
ilab itests iwere iled ito idiscover ithe ilikelihood iof iutilizing irecycled iaggregate ifrom ivarious isources iin 2653
iIndia, ias ithe isubstitution iof ifresh iaggregate. iVarious itests iwas idone ito idecide ithe iproperties iof ithe
ifresh iand irecycled iaggregate. iThe itest ioutcomes idemonstrated ithat ithe ispecific igravity iof ithe irecycled
iaggregate iis i2.53 iand ielongation iindex irecord ias i12.5 i% iwhich iis iclose ito ifresh iaggregate. iThe
imaximum idry idensity i(MDD) iand ioptimum imoisture icontent i(OMC) iof irecycled iaggregate iis i2.06
iand i9% iand ifor ifresh iaggregate iit iis i2.04 iand i8 i%. iThe ipermeability ifor ithe imaterial iutilized iin
ipresent iresearch iis i3-6 iminute ifor i1 ito i10 icm idepth iand i3-7 iminute ifor i1 ito i10 icm idepth. iFrom
ithe itest iit iconclude ithat ithe irecycled iaggregate iis ialso iusable iin ivarious iapplication iof ithe iroads,
iwhere ithere iis ia irepetation iof iloads iis ilow ias icompared ito iroads iwith ihigh irepetation iof iloads ivalue.
Keyword : iRecycled iaggregate, iWet imix imacadam, iRoad iconstruction, iEconomy, iFresh iaggregate
References:
1. Limbachiya, iM. iC., iLeelawat, iT. iand iDhir, iR. iK., i“Use iof iRecycled iConcrete iAggregate iin iHigh-Strength iConcrete,”
iMaterial iand iStructure, iVol. i33, i2000, ipp. i574-580.
2. Saroj iMandal, iS.Chakrborty iLimbachiya, i“Some iStudy iOn iDurability iOf iRecycled iAggregate iConcrete” iThe iIndian iConcrete
iJournal iJune i2002.
3. Limbachiya iand iLeelawat i, i“Use iof iRecycled i iConcrete iAggregate iin iHigh iStrength iConcrete” iMaterial iand iStructure
iJournal i, iNovember i2000,
https://doi.org/10.1007/BF02480538, iISSN: i1359-5997 i(Print) i1871-6873 i(Online) i i
4. Mandal, iChakaborty iand iGupta, i“ iSome iStudy ion iDurability iof iRecycled iAggregate iConcrete i“ iResearch iGate, iJune i2002. i
5. M. iTavakoli, iP. iSoroushian, iStrengths iof irecycled iaggregate iconcrete imade iusing ifield-demolished iconcrete ias iaggregate,
iACI iMater. iJ. i93 i(2) i(1996) i182 i– i190.
6. Ahmed iIbrahim iAbu, iBehiry i“Utilization iof iCement iTreated iRecycled iConcrete iAggregate ias iBase ior iSub iBase iLaye r i“
iScience iDirect i, iVolume i4, iIssue i4 iDecember i2013, ipp. i661-673.
7. Rifat i iRustom, i iSalah i iTaha, i iAli i iBadarnah i iand i iHani i iBarahma, i“ iProperties i iof i iRecycled i iAggregate i iIn i
iConcrete i iAnd iRoad i iPavement i iApplications, i iThe i iIslamic i iUniversity iJournal i i(Series i iof i iNatural i iStudies i iand i
iEngineering) i iVol.15, i iNo. i i2, i ipp i i247-264, i2007, iISSN i1726-6807, ihttp://www.iugaza.edu.ps/ara/research.
8. Method iof itest ifor iaggregate ifor iconcrete, iIS i2386 ipart iIV i i,Aggregate iimpact ivalue itest, iBureau iof iIndian iStandards
i(BIS), iGovt. iof iIndia i,Eight ireprint iMarch i1997, iUDC i691.322 i: i531.75
9. Method iof itest ifor isoil, iIS i2720 i i(part i8), iDetermination iof iwater icontent i-Dry idensity irelation iusing iheavy icompaction,
iBureau iof iIndian iStandards i(BIS), iGovt. iof iIndia i,Second ireprint iSeptember i1994, iUDC i624.131.431.3.624.131.431.5
10. Standard itest imethod ifor iquantitative iextraction iof ibitumen ifrom ibituminous ipaving imix, iDetermination iof iBitumen iContent,
iASTM iD2172/D2172M i(American isociety ifor itesting iand imachine) istandard iand ipublication.
11. IS i2386(Part i3):1963 iMethods iof itest ifor iaggregates ifor iconcrete: iPart i3 iSpecific igravity, idensity, ivoids, iabsorption iand
ibulking.
12. S i2386(Part i1):1963 iMethods iof itest ifor iaggregates ifor iconcrete: iPart i1 iParticle isize iand ishape.
13. iIS: i2720(part-16)-1979,”Method ito itest ifor isoils: iLaboratory idetermination iof iCBR”
14. iIS: i i i2720(part-17)-1986,”Method i i ito i i itest i i ifor i i isoils: i i iLaboratory i i idetermination i i iof i ipermeability”
Keyword : concept, efficiency, internet marketing, market, marketing elements, marketing mix, marketing
strategy, product, price, risk.
References:
1. P. F. Drucker, Management: Tasks, Responsibilities Practices. New York: Truman Talley Books, 1986.
2. J. Alleman, and P. Rappoport, The future of communications in Next Generation Networks. The unsustainability of access competition.
Document: FoV/02. Geneva: ITU, 2007.
3. D. L. Hoffman, and T. P. Novak, “Marketing in Hypermedia Computer-Mediated Environments: Conceptual Foundations,” in Journal
of Marketing, vol. 60, 1996, pp. 50-68.
4. F. Kotler, Marketing Management. St. Petersburg: PITER Publ., 2011.
5. Y. Chen, D. Hui, and J. Seong, Click by click: How consumers are changing China’s e-commerce land-scape. Available:
https://cbsobserver.dk/sites/default/files/mckinsey-china-ecommerce-trends.pdf
6. K. H. Mentzel, and J. Hesse, “The Marketing-Information System as a Decision-Making Basis for Marketing Management,” in
Management International Review, vol. 12, no. 4/5, 1972, pp. 69-72.
7. M. Isoraite, “Marketing mix theoretical aspects,” in International Journal of Research – Grantha-alayah, vol. 4, no 6, 2016, pp. 25-27.
8. D. J. Luck, H. G. Wales, and D. A. Taylor, Marketing Research. Englewood: Prentice Hall, 1961.
9. L. V. Kuznetsova, and B. F. I. Alakidy, “Electronics marketing and its impact on the quality of banking services in Iraqi com mercial
banks,” in Bulletin of Sumy National Agrarian University, vol. 4, 2012, pp. 183-189.
10. K. J. Arrow, “The Economic Implications of Learning by Doing,” in The Review of Economic Studies, vol. 29, no 3, 1962, pp. 155-
173.
11. D. Chaffey, R. Mayer, K. Johnston, and F. Ellis-Chadwick, Internet Marketing, Strategy, Implementation and Practice. Upper Saddle
River, NJ: FT/Prentice Hall, 2000.
12. O. U. Yuldasheva, “Cognitive Marketing: from the Promotion of Products to the Promotion of Consumption Technology. Part 1, 2,” in
Market Communications, no. 5(23), 2004, pp. 36-40; no. 6(24), pp. 11-18.
13. J. F. Angel, R. D. Blackwell, and P. U. Miniard, Consumer behavior. St. Petersburg: Piter-Kom, 1999.
14. K. Anderson, and K. Kerr, Consumer-oriented management. Moscow: Fair-Press, 2003.
15. I. P. Berdnikov, PR - communications. Moscow: Dashkov i Ko, 2017.
16. S. N. Berdyshev, Information marketing. Moscow: Dashkov i Ko, 2017.
17. E. I. Mazilkina, Marketing in industries and fields of activity. Moscow: Dashkov i Ko, 2017.
18. S. L. Orlov, “Internet marketing as an element of banking business under the competitive environment,” in Actual problems of
economics and law, no. 3, 2012, pp. 136-140.
19. A. P. Kovaltchuk, E. A. Blinova, and K. A. Miloradov, “Increasing the competitiveness of the russian hotel enterprises under modern
conditions,” in Journal of Environmental Management and Tourism, vol. VIII, no. 2(18), 2017, pp. 407 - 416.
20. I. A. Krymsky, Problems and prospects for the development of the electronic economy in Russia. Murmansk: Kolskogo NTS RAN
Publ., 2007.
21. A. E. Kalinina, Internet business and e-commerce. Volgograd: VolGU Publ., 2004.
22. F. Yu. Virin, Internet-marketing. Moscow: Eksmo Publ., 2010.
23. A. F. Mukhtasarov, “Classification and promotion of various types of information product by Internet marketing methods in sma ll and
medium-sized businesses,” in MFUA bulletin, vol. 2, 2017, pp. 112-127.
24. L. Vella, and J. Kester, Handbook on E-marketing for tourism destination. Madrid: World Tourism Organization and the European
Travel commission, 2009.
25. M. A. Oklander, and T. O. Oklander, “Evolution of the marketing theory: genesis, conception, periodization,” in Marketing and
management, no. 4, 2016, pp. 92-105.
26. E. Balyberdin, Modern forms of organizing electronic commerce in Russia. PhD abstract thesis. Moscow, 2003.
27. A. Vekshinsky, “Internet marketing as a new direction in the modern concept of relationship marketing,” in Technical and
technological problems of service, vol. 2, no. 20, 2012, pp. 102-108.
28. M. Yu. Ryumin, Communication marketing concept as the basis for organizing entrepreneurial activity in the information society.
Available: http://www.p-marketing.ru/publications/applied-marketing/research-methods/.
29. N. B. Kurshakova, “Relationship marketing: the formation of demand for banking services,” in Banking services, no. 6, 2001, pp. 75-
82.
30. V. S. Golik, and S. I. Golik, “The use of Internet technology in international marketing,” in Marketing in Russia and abroad, no. 3,
2011, pp. 113-116.
31. I. V. Rozhkov, Information Systems and Technologies in Marketing. Moscow: Ru-science, 2014.
32. T. N. Chernyakhovskaya, Marketing activities of the enterprise: theory and practice. Moscow: Vysshee obrazovanie, 2008.
33. G. A. Savchuk, Enterprise Marketing Management. Moscow: FLES, 2014.
34. A. Smirnov, and Yu. Suzdal, The Battle on the Ice. Marketing Tools for Promoting an Online Business. St. Peterburg: IG Publ., 2015.
35. F. Nacgira, A. Nicolai, and P. Dini. Digital business ecosystem. Luxemburg: Office for Official Publications of the European
Communities, 2007.
36. S. Hollensen, Marketing Management: A Relationship Approach. London: Financial Times Prentice Hall, 2010.
37. D. S. Tull, Marketing Research. Measurement and Method: A Text with Cases, 3-rd ed. New York: MacMillan, 1984.
38. J. R. Evans, and B. Berman, Marketing. Moscow: Economics, 1990.
39. F. Kotler, G. Armstrong, J. Saunders, and V. Wong. Principles of marketing. Moscow: St. Petersburg; Kyiv: Williams Publ., 2001.
40. F. Kotler, Marketing-management. St. Petersburg: Piter-Kom, 1998.
41. F. Kotler, Principles of marketing: Translation from English. Moscow: Business-book; IMA-Kross. Plus, 1995.
42. Internet World Stats. Internet usage statistics. The Internet Big Picture. Available: https://www.internetworldstats.com/stats.htm
43. L. Grokhovsky, I. Sevost’yanov, and D. Ivanov, Promotion of portals and online stores. St. Petersburg: Piter, 2015.
44. A. Babaev, N. Evdokimov, M. Bode, and E. Kostin, Promotion. Secrets of effective website promotion. St. Petersburg: Piter, 2013.
45. Central Bank of Jordan. Official data on the banking system of Jordan. Available:
http://www.cbj.gov.jo/Pages/viewpage.aspx?pageID=68.
Paper Title: Political Ideologies Language from the Perspective of Modern Western Society
Abstract: The research is aimed at revealing the linguo-discursive features of political interaction within
the framework of liberal-democratic ideological communication in the modern perspective. The task of
substantiating the key foundations for the perception of language of political ideology as a linguo-discursive
process of mutual adaptation of the state and civil society as subjects of political communication is addressed.
The study is anchored in the neoclassical scientific paradigm, within which framework critical rethinking of the
political discourse-analysis methodology is carried out. We proceed from the fact that ideology is a
representation of a certain set of language elements, so the study of the ideology language serves to reconstruct
the discursive base of ideology and the imperatives underlying it. It is shown that the study of language of
political ideologies engenders the emergence of parallel centers of power in the sphere of statehood. The growth
466. of destructive elements of communicative interactions in liberal democratic society is revealed, in particular an
increase in the discursive means that serve an effective tool of denying the democratic process is identified. his 2662-
study can be useful in the area of political science, namely in the political practice of liberal-democratic society. 2668
The findings are applicable in establishing the factors of destruction of social and political dialogue. In this
context, the research can offer solutions, provide resources for politicians and organizations in optimizing the
dialogue of political communication subjects. Drawing from Freeden’s morphological approach of studying the
ideological discourse, as well as critical discourse studies of van Dijk, the research bridges the gap between the
studies of the classical philosophical thought and neoclassical scientific paradigm in comprehending the role of
political ideologies language. The current study urges a critical rethinking of methodology of political discourse
analysis.
Keyword : civil society, liberal democracy, political communication, political ideology, political science.
References:
1. M. Freeden, “Ideology and political theory,” in Journal of Political Ideologies, vol. 11, no. 1, 2006, pp. 3 -22.
DOI: 10.1080/13569310500395834.
2. T. A. van Dijk, “Ideology and discourse analysis,” in Journal of Political Ideologies, vol. 11, no. 2, 2006, pp. 115 -140.
DOI: 10.1080/13569310600687908.
3. R. Bart, “Myth Today,” in Selected Works: Semiotics. Poetics. Moscow: Progress, 1994, pp. 72-130.
4. P. Bourdieu, Le Sens pratique. Paris: Minuit, 1980.
5. H. Marcuse, Heideggerian Marxism. Lincoln, Nebraska: University of Nebraska Press, 2005.
6. F. Skinner, Cumulative Record. New York: Appleton-Century-Crofts, 1959.
7. M. Foucault, Intellectuals and power: selected political articles, speeches and interviews: in 3 Vols. Vol. 2. Moscow: Praksis, 2005.
8. Heywood, Political Ideologies. An Introduction. Basingstoke: Palgrave Publishers, 2017.
9. L. Wati, Analyzing of political Ideologies and discourse analysis. Ideology and Discourse Analysis. INA-Rxiv, 2018. Available:
https://osf.io/preprints/inarxiv/c5dhj/
10. A. Ivin, New philosophy of history: monograph. Berlin: Direct Media, 2016.
11. Kologrivova, The language of political ideology: development trajectories. Moscow: LAP Lambert Academic Publishing, 2011.
12. L. Drotianko, and S. Yahodzinskyi, “Information environment as the intercultural communication space,” in Matec Web of
Conferences, vol. 106, 2017, 01006. doi:10.1051/matecconf/201710601006.
13. A. Tretyak, “The public sphere of politics: the anthropological dimension in contemporary communicative theory,” in Anthropological
measurements of philosophical research, vol. 12, 2017, pp. 62-71.
14. R. H. Kochesokov, L. M. Ashnokova, K. Kh. Unezhev, and B. M. Zumakulov, “Posthistorical factor in the failure of the politic of
multiculturalism,” in Humanities of the south of Russia, vol. 6, no. 4, 2017, pp. 135-146.
15. J. Skidmore, “Political language and political ideology,” in History of European Ideas, vol. 19, 1994, pp. 715-720.
16. J. Clarke, and J. Newman, “People in this country have had enough of experts’: Brexit and the paradoxes of populism,” in Critical
Policy Studies, vol. 11, no. 1, 2017, pp. 101-116. DOI: 10.1080/19460171.2017.1282376.
17. M. Freeden, “The morphological analysis of ideology,” in Oxford handbook of political ideologies. Oxford: Oxford Univ. Press, 2013,
pp. 115-137.
18. M. Freeden, “After the Brexit referendum: revisiting populism as an ideology,” in Journal of Political Ideologies, vol. 22, n o. 1, 2017,
pp. 1-11. DOI: 10.1080/13569317.2016.1260813.
19. T. A. van Dijk, Discourse, racism and ideology. La Laguna (Spain): RCEI Ediciones, 1996.
20. T. A. van Dijk, Ideology: a multidisciplinary approach. London: SAGE, 1998.
21. R. Wodak, and M. Meyer, Methods of critical discourse analysis. London: SAGE, 2001.
22. W. B. Gallie, “Essentially contested concepts,” in Proceedings of the Aristotelian Society, vol. 56, 1956, pp. 167-98.
23. M. Freeden, Ideologies and political theory: a conceptual approach. Oxford: Clarendon Press, 1996.
24. S. Ivanova, “The Elements of "Ideology": Antoine Destutt de Tracy and his Science of Ideas,” in Voprosy filosofii, vol. 8, 20 13, pp.
146-148.
25. Marx, and F. Engels, Criticizing Hegel's philosophy of law. Moscow: Politizdat, 1957.
26. Marx, and F. Engels, The German Ideology. London: Lawrence and Wishart, 1974.
27. J. Kin, Democracy and civil society. Moscow: Progress-Traditsiya, 2001.
28. K. D. Bracher, The Age of Ideologies: A History of Political Thought in the Twentieth Century. London: Methuen, 1984.
29. Manheim, Favorites. The diagnosis of our time. Moscow: Yurist, 1994.
30. M. Lerner, Ideas are Weapons: The History and Use of Ideas. New York: Viking Press, 1943.
31. D. Bell, The End of Ideology: On the Exhaustion of Political Ideas in the Fifties. New York: Free Press, 1965.
32. F. Fukuyama, “The End of History?” in The National Interest, 1989. Available:
https://www.embl.de/aboutus/science_society/discussion/discussion_2006/ref1-22june06.pdf
33. D. Shvartsmantel, Ideology and politics. Kharkiv: Gumanitarny tsentr, 2009.
34. A. Zinovev, Logical sociology. Moscow: Sotsium, 2002.
35. Aristotle, Works in 4 vols. (Series “Philosophical Heritage”). Moscow: Mysl, 1975-1983.
36. Urbinati, Distorted democracy. Opinion, truth and people. Moscow: Izd-vo Instituta Gaydara, 2016.
37. V. Glukhova, “Populism as a political phenomena and the challenge of the modern democracy,” in Polis. Political Studies, 4, 2 011, pp.
49-68.
38. F. Fukuyama, “American Political Decay or Renewal? The Meaning of the 2016 Election,” in Russia in Global Affairs, vol. 5, 20 16.
Available: https://www.foreignaffairs.eom/articles/united-states/2016-06-13/amerlcan-political-decay-or-renewal
39. S. V. Beloshitsky, Liberal democracy in the XXI century: resources, challenges, prospects. Khmelnitsky: PE Melnyk A. A., 2012 .
40. F. Fukuyama, Strong state. Governance and world order in the 21st century. Moscow: AST, 2007.
Keyword : Image Feature Selection; Feature Extraction; Ant Colony Optimization; MATLAB; Grey Level
Co-occurrence Matrix.
References:
1. Isabelle Guyon, Andre Elisseeff, “An Introduction to Variable and Feature Selection”, Journal of Machine Learning Research 3, 2003,
1157-1182.
2. Jović, K. Brkić and N. Bogunovic, ”A review of feature selection methods with applications” 38th International Convention on
Information and Communication Technology, Electronics and Microelectronics (MIPRO, 2015).
3. Marco Dorigo1 and Krzysztof Socha2,” An Introduction to Ant Colony Optimization”,:IRIDIA April 2006 ,Published as a chapter i n
Approximation Algorithms and Metaheuristics, a book edited by T. F. Gonzalez.
4. Ahmed Al-Ani, “Feature Subset Selection Using Ant Colony Optimization”, World Academy of Science, Engineering and Technology
17, 2008.
5. Anam Naseer, Waseem Shahzad, Arslan Ellahi, “A Hybrid Approach for Feature Subset Selection using Ant Colony Optimization and
Multi-Classifier Ensemble”. (IJACSA) International Journal of Advanced Computer Science and Applications, 2018,Vol. 9, No. 1.
6. Avrim L. Bluma “Artificial Intelligence Selection of relevant features and examples in machine learning”. Amficial Intelligence 97
School of Computer Science, Carnegie Mellon University Pittsburgh, 1997, pp. 15213-3891.
7. Bolun Chen,Ling Chen and Yixin Chen, ”Efficient ant colony optimization for image feature selection” Signal Processing 93, 20 13,
Vol. 93, Issue 6, pp. 1566-1576.
8. Farhad Samadzadegan and Tahmineh Partovi, ”Feature selection based on ant colony algorithm for hyperspectral remote sensing
images” workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing, IEEE, 2010.
9. David Martens, Manu De Backer, Raf Haesen,” Classification With Ant Colony Optimization”,IEEE Transactions on evolutionary
computation, 2007, Vol. 11, No. 5, 651.
10. Rafael S. Parpinelli, Heitor S. Lopes, “Data Mining With an Ant Colony Optimization Algorithm” IEEE Transactions on Evolutionary
Computing, Vol. 6, No. 4, August 2002 321, Member, IEEE.
11. Xu Sun, Lina Yang, Qian Shen and Bing Zhang, “A new ant colony optimization algorithm based band selection method”,
Hyperspectral Image and Signal Processing: (WHISPERS) Lausanne, Switzerland, 2014.
12. Andrea Paoli, Farid Melgani, Edoardo Pasolli, “Swarm Intelligence for Unsupervised Classification of Hyperspectral Images”, IEEE
International Geoscience and Remote Sensing Symposium 12-17 July 2009.
13. Mohammad-Reza Feizi-Derakhshi, and Manizheh Ghaemi, “Classifying Different Feature Selection Algorithms Based on the Search
Strategies”, in International Conference on Machine Learning, Electrical and Mechanical Engineering (ICMLEME'2014) Jan. 8 -9,
2014 Dubai (UAE).
14. D. Asir, S. Appavu alias balamurugan, E. Jebamalar leavline, “A novel feature selection method for image classification”,
Optoelectronics And Advanced Materials – Rapid Communications Vol. 9, No. 11-12, Nov. – Dec. 2015,pp. 1362 – 1368.
15. Kamilia Menghour and Labiba Souici-Meslati, “Hybrid ACO-PSO Based Approaches for Feature Selection”, International Journal of
Intelligent Engineering and Systems, Vol.9, No.3, 2016.
16. Adegoke and Omotayo, ”Review of Feature Selection Methods in Medical Image Processing”, IOSR Journal of Engineering
(IOSRJEN), 2014, Vol. 04, Issue 01, pp. 2278-8719.
17. Anuradha Purohit, NS Chaudhari, A Tiwari, “Construction of classifier with feature selection based on genetic programming”, IEEE
Congress on Evolutionary Computation, 2010, pp.1-5.
18. Khushboo Jain, Anuradha Purohit ,” Feature selection using modified particle swarm optimization”, International Journal of Computer
Applications, 2017, Vol. 161, Issue 7, pp.8-12.
19. Anuradha Purohit, Priyansh Jain,” Feature Subset Selection Using Agglomerative Clustering”, International Journal of Research in
Electronics and Computer Engineering, 2018, Vol. 6, Issue 2, pp. 726-729.
20. Aruna Tiwari Swati Jain, Anuradha Purohit,” Multiclass Classifier with Feature Selection using Genetic Programming”, International
Journal on Computer Engineering and Information Technology (IJCEIT), 2010, Vol. 8, Issue 13, pp.26-30.
469. Abstract: This paper focuses on autism people who need smart assistance for their everyday survival. One
of the most common Autism categories is Asperger syndrome. The motive of this project is to promulgate their
2680-
tasks efficiently by detecting and recognizing their faces which will be stored in the database using Raspberry
2683
Pi.The “Smart Assistant for Asperger Syndrome using Raspberry Pi” involves IoT (Internet of Things) and
Robotics. This mirror not only allows the users to plan their daily schedules, but also helps them to be updated
with the environment such as weather conditions.
Paper Title: Lateral Crushing and Energy Absorption Behavior of Multicellular Tube Structures
Abstract: Thin-walled metallic tubular elements are extensively employed as an impact energy attenuator in
modern vehicles owing to light weight, easy fabrication and average cost. Besides, the novel multi-cell tubular
structures have superior energy absorption characteristics related to a conventional simple cell tube. In this
research article, the finite element simulation of thin-walled aluminium alloy extruded multicellular structure
under lateral impact loading is investigated. Nonlinear impact simulations were performed on multicellular tubes
of various configurations using finite element ABAQUS/CAE explicit code. From the outcomes attained, the
energy absorption capability of various multicellular tube structures were compared and it shows that
multicellular tubes have more remarkable than that of traditional simple cell tubes. Moreover, square shaped
multicellular structure tube were retained as most prominent for higher energy absorption. This type of
multicellular tubes was found to be effective one to improve the lateral crashworthiness performance.
470. Keyword : Lateral load, multi-cell tube, crashworthiness, collision, Computation, Simulation.
2684-
References: 2687
1. A. Praveen Kumar, 2019. Experimental analysis on the axial crushing and energy absorption characteristics of novel hybrid
aluminium/composite-capped cylindrical tubular structures, Proceedings of the Institution of Mechanical Engineers, Part L: Journal of
Materials: Design and Applications; 233 (11):2234-2252.
2. Lu, G., & Yu, T. X. (2003). Energy absorption of structures and materials. Elsevier.
3. A. Praveen Kumar, S. Shrivaathsav, 2019. Influence of forming parameters on the crash performance of capped cylind rical tubes using
LS‑DYNA follow‑on simulations. International Journal on Interactive Design and Manufacturing, 13(3): pp. 1215–1232.
4. Hundley, J. M., Schaedler, T. A., Yang, S. S., & Jacobsen, A. J. (2019). U.S. Patent Application No. 16/425,566
5. A. Praveen Kumar (2019). Influence of plain end-cap on the energy absorption characteristics of cylindrical tubular structures for
lateral impact vehicle collisions. Thin-Walled Structures, 138 (C), pp. 32-45.
6. Jin, N., Wang, F., Wang, Y., Zhang, B., Cheng, H., & Zhang, H. (2019). Failure and energy absorption characteristics of four lattice
structures under dynamic loading. Materials & Design, 169, 107655.
7. A. Praveen Kumar and D. Manieah, Deformation Studies on the Significance of Combined Geometry Tubes as Energy Absorbing
Structures, International Journal of Civil Engineering and Technology 10(1), 2019, pp. 2812–2820.
8. Zheng, M., Yin, Z., Teng, H., Liu, J., & Wang, Y. (2019). Energy Absorption of Highly Ductile Materials. In Elastoplastic Beh avior of
Highly Ductile Materials (pp. 155-173). Springer, Singapore.
9. Zhang Zong-hua, LIU Shu-tian. Crashworthiness of dynamical axial crushing of polygonal thin-walled tubes SAE-C2007. Tianjin,
China, 2007: 437−443.
10. Yin, H., et al. (2019). Multi-Objective Optimization Design of Functionally Graded Foam-Filled Graded-Thickness Tube Under
Lateral Impact. International Journal of Computational Methods, 16(01), 1850088.
Authors: Abdulrahman Mohammed Hussein Obaid, Santyyosh Kumar Pani, Prasant Kumar Pattnaik
An improved PBMM Algorithm by Reduce Cloud Data Traffic and Transfer Costs in Cloud of
Paper Title:
Things
Abstract: Cloud computing has been widely studied over the recent years. Researchers have developed
different algorithms for improving the performance and minimizing the cost. This paper proposes a new
algorithm to improve and enhance the PBMM algorithm (Priority Based on Min-Min Algorithm). The proposed
algorithm works with the aid of one of the Cloud of Things (CoT) services; this service is Sensing and Actuation
as a Service (SAaaS). The proposed Algorithm works on third-party broker. However, it has two-phase: the first
phase is Sensing: in this phase, the sensor observes the throughput for all tasks and compares it with the link
capacity. The Second phase is Actuation: depending on the comparison in the first phase, the priority of all the
takes will change depending on the link capacity, all tasks will have the same priority if the throughput is low
(Green throughput). All tasks will have two priority levels (high, low) if the throughput medium (Yellow
throughput), and finally, if the throughput is high (red throughput) all tasks will have a default priority which
assigned to them when they are created. However, the efficiency and performance of the IPBMM algorithm
depend on the capacity of the link. If capacity is high (traffic in the network is high), the performance is very
good and the costly, but if the capacity is medium (traffic in the network is medium), the performance is good as
well as the cost. While if the capacity is low (traffic in the network is low), the performance is good and the cost
is free. Therefore, the outcomes of the proposed algorithm experiment given 30% better results than the PBMM
algorithm and other state-of-the-art algorithms.
Keyword : Cloud Computing, Cloud of Things, Cloud Task Scheduling, PBMM algorithm, User-Priority.
References:
1. M. Aazam, I. Khan, A. A. Alsaffar, and E.-N. Huh, "Cloud of Things: Integrating Internet of Things and cloud computing and the
issues involved," in Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST)
Islamabad, Pakistan, 14th-18th January, 2014, 2014, pp. 414-419.
2. S. Abdelwahab, B. Hamdaoui, M. Guizani, and T. Znati, "Cloud of things for sensing as a service: sensing resource discovery and
virtualization," in 2015 IEEE Global Communications Conference (GLOBECOM), 2015, pp. 1-7.
3. S. Abrishami, M. Naghibzadeh, and D. H. Epema, "Deadline-constrained workflow scheduling algorithms for infrastructure as a
service clouds," Future Generation Computer Systems, vol. 29, pp. 158-169, 2013.
471. 4. Botta, W. De Donato, V. Persico, and A. Pescapé, "On the integration of cloud computing and internet of things," in 2014 Inte rnational
Conference on Future Internet of Things and Cloud, 2014, pp. 23-30.
5. Botta, W. De Donato, V. Persico, and A. Pescapé, "Integration of cloud computing and internet of things: a survey," Future ge neration 2688-
computer systems, vol. 56, pp. 684-700, 2016. 2699
6. E.-K. Byun, Y.-S. Kee, J.-S. Kim, and S. Maeng, "Cost optimized provisioning of elastic resources for application workflows," Future
Generation Computer Systems, vol. 27, pp. 1011-1026, 2011.
7. R. N. Calheiros and R. Buyya, "Meeting deadlines of scientific workflows in public clouds with tasks replication," IEEE Transactions
on Parallel and Distributed Systems, vol. 25, pp. 1787-1796, 2013.
8. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of c loud
computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, pp. 2 3-50,
2011.
9. S. S. Chauhan, E. S. Pilli, R. Joshi, G. Singh, and M. Govil, "Brokering in interconnected cloud computing environmen ts: A survey,"
Journal of Parallel and Distributed Computing, 2018.
10. M. Díaz, C. Martín, and B. Rubio, "State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud
computing," Journal of Network and Computer applications, vol. 67, pp. 99-117, 2016.
11. S. H. H. Madni, M. S. A. Latiff, M. Abdullahi, and M. J. Usman, "Performance comparison of heuristic algorithms for task sche duling
in IaaS cloud computing environment," PloS one, vol. 12, p. e0176321, 2017.
12. Mohammed, H. Obaid, P. K. Pattnaik, and S. K. Pani, "Towards on Cloud of Things: Survey, Challenges, Open Research Issues, and
Tools," in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, pp.
1458-1463.
13. M. H. Obaid, S. K. Pani, and P. K. Pattnaik, "A priority based on min-min algorithm for reducing make span task scheduling in cloud
computing," 2018, vol. 7, p. 5, 2018-09-07 2018.
14. G. Patel, R. Mehta, and U. Bhoi, "Enhanced load balanced min-min algorithm for static meta task scheduling in cloud computing,"
Procedia Computer Science, vol. 57, pp. 545-553, 2015.
15. R. K. Raju, P. S. Varma, M. Sundari, and G. J. Moses, "Deadline aware two stage scheduling algorithm in cloud computing," Ind ian
Journal of Science and Technology, vol. 9, pp. 1-10, 2016.
16. R. Ramakrishnan and L. Gaur, "Smart electricity distribution in residential areas: Internet of Things (IoT) based advanced metering
infrastructure and cloud analytics," in 2016 International Conference on Internet of Things and Applications (IOTA), 2016, pp. 46-51.
17. R. Ranjan, L. Wang, P. P. Jayaraman, K. Mitra, and D. Georgakopoulos, "Special issue on Big Data and Cloud of Things (CoT),"
Software: Practice and Experience, vol. 47, pp. 345-347, 2017.
18. Shanthan, A. D. V. Kumar, E. Govindrajan, and L. Arockian, "Scheduling for Internet of Things Applications on Cloud: A Review,"
Imperial Journal of Interdisciplinary Research, vol. 3, 2017.
19. M.-A. Vasile, F. Pop, R.-I. Tutueanu, V. Cristea, and J. Kołodziej, "Resource-aware hybrid scheduling algorithm in heterogeneous
distributed computing," Future Generation Computer Systems, vol. 51, pp. 61-71, 2015.
20. L. Zeng, B. Veeravalli, and X. Li, "SABA: A security-aware and budget-aware workflow scheduling strategy in clouds," Journal of
parallel and Distributed computing, vol. 75, pp. 141-151, 2015.
21. A. C. Zhou, B. He, and C. Liu, "Monetary cost optimizations for hosting workflow-as-a-service in IaaS clouds," IEEE Transactions on
Cloud Computing, vol. 4, pp. 34-48, 2015.
472. Paper Title: New Meeting Form in the Digital Working Environment Era
Abstract: Digital progress has had an impact on almost every aspect of human life, including the work 2700-
environment. The digital era gave birth to an all-digital work environment, which gave birth to new forms of 2705
work, one of which was teamwork that could be carried out without the limitation of distance that is commonly
called a virtual team through virtual meeting. This research using qualitative research method to collect data
from respondents through deep interview. Respondent are selected by purposive sampling method with several
consideration such as their engagement in virtual meeting process. The result of our study shows that quality of
communication tools really influences the quality of virtual meeting and influence all the aspect of virtual
meeting effectiveness. Our research also found that training not become significant needs because they quite
familiar with the technology and they have IT division to prepare all supporting tools to prepare all tools for
virtual meeting needs. Significant thing that must well prepare to make every virtual meeting effectively is
quality of internet connection.
Keyword : Team virtual, virtual meeting, digital work environment, human computer interaction, digital
teamwork
References:
1. F. M. Horwitz, D. Bravington, and U. Silvis, “The promise of virtual teams : identifying key factors in effectiveness and failure.”
2. W. F. Cascio, “Managing a Virtual Workplace,” Acad. Manag. Exec., vol. 14, no. 3, 2001.
3. L. Arnison and Pe. Miller, “Forum Virtual teams : a virtue for the conventional team,” J. Work. Learn., vol. 14, no. 4, pp. 166–
173, 2002.
4. B. J. Bergiel, E. B. Bergiel, W. Georgia, and P. W. Balsmeier, “Nature of virtual teams : a summary of their advantages and
disadvantages,” vol. 31, no. 2, pp. 99–110, 2008.
5. T. Succeed, D. L. Duarte, and N. T. Snyder, “Mastering Virtual Teams.”
6. L. Kimball et al., “Managing Virtual Teams,” 1997.
7. R. De Jong, “Virtual communicating , conflicts and performance in teams,” 2008.
8. L. J. Gressga, “Virtual team collaboration and innovation in organizations,” 2009.
9. P. M. Beranek and B. Martz, “Making virtual teams more effective : improving relational links,” 1998.
10. N. A. Ebrahim, S. Ahmed, and Z. Taha, “Virtual Teams : a Literature Review,” vol. 3, no. 3, pp. 2653–2669, 2009.
11. L. Delgado Piña, M., María Romero Martínez, A. and Gómez Martínez, “Teams in organizations : a review on team
effectiveness,” Team Perform. Manag., vol. 14, no. 1/2, pp. 7–21, 2008.
12. K. Prasad and K. B. Akhilesh, “Global virtual teams : what impacts their design and performance ?,” pp. 102–112.
13. A. Powell, J. Galvin, and G. Piccoli, “Antecedents to team member commitment from near and far virtual teams,” vol. 19, no. 4 ,
pp. 299–322.
14. K. Lahenius and E. Jarvenpaa, “Managing a virtual team of newspaper journalists : a case study,” Team Perform. Manag., vol.
10, no. 7, pp. 173–177, 2004.
15. M. Indiramma and K. R. Anandakumar, “Behavioral Analysis of Team Members in Virtual Organization based on Trust
Dimension and Learning,” pp. 14–19, 2010.
16. L. Lee-kelley, A. Crossman, and A. Cannings, “A social interaction approach to managing the ‘ invisibles ’ of virtual teams,” no.
June 2003, pp. 650–657, 2004.
17. A. Kankali and B. C. . Tan, “Conflict and Performance in Global Virtual Teams Atreyi Kankanhalli Forthcoming : Journal of
Management Information Systems,” J. Manag. Inf. Syst., no. 65.
18. P. L. Hunsaker and J. S. Hunsaker, “Virtual teams : a leader ’ s guide,” vol. 14, no. 1, pp. 86–101, 2008.
19. A. Gaudes, B. Hamilton-bogart, and S. Marsh, “A Framework for Constructing Effective Virtual Teams,” vol. 1, no. December,
pp. 83–97, 2007.
20. [K. M. Chudoba, M. Lu, and M. B. Watson-manheim, “How virtual are we ? Measuring Virtuality and Understanding Its Impact
in a Global Organization How virtual are we ? Measuring Virtuality and Understanding Its Impact in a Global Organization,” no.
July, pp. 1–37, 2004.
21. V. Ratcheva and S. Vyakarnam, “Exploring team formation processes in virtual partnerships,” Integr. Manuf. Syst., vol. 12, no. 7,
pp. 512–523, 2001.
22. P. L. Curseu, R. Schalk, and I. Wessel, “How do virtual teams process information ? A literature review and implications for
management,” J. Mangerial Psychol., vol. 23, no. 6, pp. 628–652, 2008.
23. P. Kenny and I. G. Johnson, “Social media use, attitudes, behaviours and perceptions of online professionalism amongst dental
students,” Br. Dent. J., 2016.
24. G. Piccoli, A. Powell, and B. Ives, “Virtual teams : team control structure , work processes , and team effectiveness,” vol. 17, no.
4, pp. 359–379.
25. F. W. Dulle and M. K. Minishi-Majanja, “The suitability of the unified theory of acceptance and use of technology (utaut) model
in open access adoption studies,” Inf. Dev., vol. 27, no. 1, pp. 32–45, 2011.
26. P. Johnson, V. Heimann, K. O. Neill, P. Johnson, V. Heimann, and K. O. Neill, “Forum The `` wonderland ’ ’ of virtual teams,”
vol. 13, no. 1, 2001.
27. J. Kratzler, R. T. A. . Leenders, and J. M. . Engelen, “Keeping Virtual R&D Teams Creative,” Res. Manag., vol. 48, no. 2, pp.
13–16, 2005.
28. Z. Jin, “innovation and virtual institutes,” vol. 3, no. 1, pp. 75–83, 1999.
29. L. M. Peters and C. C. Manz, “Identifying antecedents of virtual team collaboration,” vol. 13, no. 3, pp. 117–129, 2007.
30. A. Malhotra and A. Majchrzak, “Enabling knowledge creation in far- ¯ ung teams : best practices for IT support and knowledge
sharing,” vol. 8, no. 4, pp. 75–88, 2004.
Paper Title: Exploring the Machine Learning Algorithm for Prediction the Loan Sanctioning Process
Abstract: Extending credits to corporates and individuals for the smooth functioning of growing
economies like India is inevitable. As increasing number of customers apply for loans in the banks and non-
banking financial companies (NBFC), it is really challenging for banks and NBFCs with limited capital to
device a standard resolution and safe procedure to lend money to its borrowers for their financial needs. In
475. addition, in recent times NBFC inventories have suffered a significant downfall in terms of the stock price. It has
contributed to a contagion that has also spread to other financial stocks, adversely affecting the benchmark in
2714-
recent times. In this paper, an attempt is made to condense the risk involved in selecting the suitable person who
2719
could repay the loan on time thereby keeping the bank’s non-performing assets (NPA) on the hold. This is
achieved by feeding the past records of the customer who acquired loans from the bank into a trained machine
learning model which could yield an accurate result. The prime focus of the paper is to determine whether or not
it will be safe to allocate the loan to a particular person. This paper has the following sections (i) Collection of
Data, (ii) Data Cleaning and (iii) Performance Evaluation. Experimental tests found that the Naïve Bayes model
has better performance than other models in terms of loan forecasting.
Keyword : Loan Prediction, Big data, Machine Learning, Logistic Regression, SVM, Decision Tree, Naïve
Bayes.
References:
1. Aboobyda Jafar Hamid and Tarig Mohammed Ahmed, “Developing Prediction Model of Loan Risk in Banks using Data Mining”,
Machine Learning and Applications: An International Journal (MLAIJ), Vol.3, No.1, pp. 1-9, March 2016.
2. S. Vimala, K.C. Sharmili, “Prediction of Loan Risk using NB and Support Vector Machine”, International Conference on
Advancements in Computing Technologies (ICACT 2018), vol. 4, no. 2, pp. 110-113, 2018.
3. Aditi Kacheria, Nidhi Shivakumar, Shreya Sawkar, Archana Gupta, “Loan Sanctioning Prediction System”, International Journal of
Soft Computing and Engineering (IJSCE), vol. 6, no. 4, pp. 50-53, 2016.
4. X. Francis Jency, V.P.Sumathi, Janani Shiva Sri, “An Exploratory Data Analysis for Loan Prediction Based on Nature of the Clients”,
International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, No. 48, pp. 176-179, 2018.
5. Anchal Goyal, Ranpreet Kaur, “Loan Prediction Using Ensemble Technique”, International Journal of Advanced Research in Computer
and Communication Engineering, Vol. 5, Issue 3, pp. 523 – 526, March 2016.
6. Anchal Goyal, Ranpreet Kaur, “Accuracy Prediction for Loan Risk using Machine Learning Models”, International Journal of
Computer Science Trends and Technology (I JCST), Vol. 4, Issue 1, pp. 52-57, Jan - Feb 2016
7. Sudhamathy, “Credit Risk Analysis and Prediction Modelling of Bank Loans using R”, International Journal of Engineering and
Technology (IJET), Vol. 8, No. 5, pp. 1954-1966, Oct-Nov 2016.
8. Pidikiti Supriya, Myneedi Pavani, Nagarapu Saisushma, Namburi Vimala Kumari, K. Vikas, “Loan Prediction by using Machine
Learning Models”, International Journal of Engineering and Techniques, Vol. 5, Issue 2, pp. 144-148, Mar-Apr 2019.
9. Kumar Arun, Garg Ishan, Kaur Sanmeet, “Loan Approval Prediction based on Machine Learning Approach”, IOSR Journal of
Computer Engineering (IOSR-JCE), Vol. 18, Issue 3, pp. 79-81, Ver. I (May-Jun. 2016).
10. How Decision tree algorithm works, https://dataaspirant.com/2017/01/30/how-decision-tree-algorithm-works/
11. Naive Bayes — Probabilistic Algorithm, https://medium.com/datadriveninvestor/naive-bayes-probabilistic-algorithm-68d5a6647738
12. Loan Prediction Dataset Source, https://www.kaggle.com/uttam96/ loanpred.
13. Supervised Learning with Python, https://www.datascience.com/blog/ supervised-learning-python.
14. K. Kavitha, “Clustering Loan Applicants based on Risk Percentage using K-Means Clustering Techniques”, International Journal of
Advanced Research in Computer Science and Software Engineering, vol. 6(2), pp.162–166, 2016.
Keyword : Smart Parking, Smart Cities, Computer Vision, Raspberry Pi, Python, Open CV
478.
References: 2727-
1. D. Sikora, “The Concept Of Smart City in the Theory and Practice of Urban Development Management”, Romanian Journal of
Regional Science, http://rjrs.ase.ro, Vol. 10, No. 1, Summer 2016, ISSN 18423-8520 2733
2. M. Kola-Bezka, M. Czupich, A. Ignasiak-Szulc, “Smart Cities in Central and Eastern Europe: viable future or unfulfilled
dream?”, Journal of International Studies, 2016, Vol. 9, No 1, pp. 76-87. DOI: 10.14254/2071-8330.2016/9-1/6
3. J-P. Exner, “Smart Cities - Field of application for Planning Support Systems in the 21st Century?”, Proceedings of CUPUM, The
14th International Conference on Computers in Urban Planning and Urban Management, 2015, ISBN: 978-0-692-47434-1
4. N. Bawany & S. Jawwad, “Smart City Architecture: Vision and Challenges”, International Journal of Advanced Computer
Science and Applications, 2015, Vol. 6, No. 11, DOI: 10.14569/IJACSA.2015.061132
5. S.D. Prakash, A. Kumar, S. Shekhar, A. Khant, “Understanding the Concept Of Smart Cities”, Scientific Journal of Impact Factor
(SJIF): 4.14, 2016, Volume 3, Issue 3, March, e-ISSN (O): 2348-4470, p-ISSN (P): 2348-6406
6. C. Vrabie and A.M. Tirziu, “Top ten smart cities in the world. What do they have in common and how can Eastern European
cities use that?” Munich Personal RePEc Archive, Online at https://mpra.ub.uni-muenchen.de/88291/, MPRA Paper No. 88291,
posted 8 August 2018, accessed 20.08.2019
7. L. Garfield, “These 10 cities are the most prepared for the future”, https://www.businessinsider.com/smart-cities-ranking-
easypark-group-2017-11/#10-%20melbourne-australia-received-a-perfect-score-on-its-4g-connectivity-1, accessed 20.07.2019
8. A. Ahad & Z. Khan, “Intelligent Parking System”, Scientific Research Publishing Inc., World Journal of Engineering and
Technology, 2016, 4, 160-167, http://dx.doi.org/10.4236/wjet.2016.42014
9. P. Kharde, S. Pal, S. Kawle, “Smart Parking System”, International Journal of Scientific Research in Computer Science,
Engineering and Information Technology, 2018, IJSRCSEIT, Volume 3, Issue 1, ISSN : 2456-3307
10. M. Fraifer and M. Fernström, “Investigation of Smart Parking Systems and their technologies”, Thirty Seventh International
Conference on Information Systems, Dublin 2016, Volume: “IoT & Smart City Challenges and Applications” - ISCA 2016,
http://iot-smartcities.lero.ie/wp-content/uploads/2016/12/Investigation-of-Smart-Parking-Systems-and-their-technologies.pdf,
accessed 17.09.2019
11. A. Šarić and B. Mihaljević, “Smart Parking System in the City of Dubrovnik”, RIThink Multidisciplinary Online Journal,
Volume 6, 2017, http://www.rithink.hr, accessed 07.09.2018
12. G. Anusooya, C. Jackson, K. Sathyarajasekaran and K. Kumar, “RFID Based Smart Car Parking System”, Research India
Publications, International Journal of Applied Engineering Research, 2017, Volume 12, Number 17, pp. 6559 -6563, ISSN 0973-
4562
13. A. Vimal, R. Yashvanth, J. Seetha, “Smart Parking Bay Based on Image processing and Internet of Things”, Research India
Publications, http://www.ripublication.com, International Journal of Applied Engineering Research, Volume 13, Number 6
(2018), pp. 4423-4427, ISSN 0973-4562
14. A. Gupta, S. Kulkarni, V. Jathar, V. Sharma, N. Jain, “Smart Car Parking Management System Using IoT”, American Journal of
Science, Engineering and Technology, 2017; 2(4): 112-119, doi: 10.11648/j.ajset.20170204.13
15. B. Sabbea, M. Irfan, S. Karama ALtamimi, S. Mabkhot, A. H. M. Almawgani and H. Alghamdi, “Design and Development of a
Smart Parking System”, Journal of Automation and Control Engineering Vol. 6, No. 2, December 2018, doi:
10.18178/joace.6.2.66-69
16. I. D. Dhaou, A. Kondoro, A. Hamad Alsabhawi, O. Guedhami and H. Tenhunen, “A Smart Parking Management System Using
IoT Technology”, Proceeding of The 22nd Conference Of Fruct Association, 2018, pp. 309-312, ISSN 2305-7254
17. P. Kamble1, S.Chandgude, K. Deshpande, C. Kumari and K. M. Gaikwad, “Smart parking system”, International Journal of
Advance Research and Development, 2018, Volume 3, Issue 4, pp.183-186, https://www.ijarnd.com/editions/volume-3-issue-4/,
accessed 17.09.2019
18. S. D. Marcu and A. Florea, “Smart parking system - another way of sharing economy provided by private institutions”,
Proceedings of Thirteenth International Conference on Digital Information Management, 2018, ICDIM, pp. 18-23, 2018, Berlin,
Germany, ISBN 978-1-5386-5244-2
19. MagPi Magazine, “Introducing Raspberry Pi Zero W”, written in 2017 https://www.raspberrypi.org/magpi/pi-zero-w/, accessed
10.09.2019
20. W. Harrington, “Learning Raspbian”, Published by Packt Publishing Ltd., 2015, ISBN 978-1-78439-219-2
21. S. Monk, “Raspberry Pi Cookbook”, Published by O’Reilly Media, 2016, ISBN 978-1-491-93910-9, 2016
22. Raspberry Documentation, “Camera Module v1 vs. Camera Module v2”,
https://www.raspberrypi.org/documentation/hardware/camera/, accessed 05.09.2019
23. OpenCV Documentation, “API Reference”
https://docs.opencv.org/2.4/modules/refman.html, accessed in 10.09.2019
24. O. D. Suarez, “OpenCV Essentials”, Publisher: Packt Publishing, 2014, ASIN: B00N1X693A, ISBN: 978-1783984244
Paper Title: Development of A Risk Assessment System for The Creation of Space Rocket Technology
Abstract: During the production and purchase of electronic component base (ECB) in the course of
experimental design work (EDW), various risks arise that arise due to internal and external process failures. As
practice shows, systematic breakdowns of EDW began to occur due to failure of ECB supplies by domestic and
foreign manufacturers. In the framework of this issue, the authors developed methodological approaches to
increasing the likelihood of a successful completion of the production process based on the use of preventive
management in the form of a risk-based approach. The essence of this approach includes the use of the PDCA
Deming cycle (“Plan-Do-Check-Act”), which is a cyclically repeating decision-making process used in quality
management. Regulatory and technical documentation for assessing risks in the production and procurement of
ECB will allow you to determine the level of risk in achieving the required efficiency in meeting the specified
terms for the development of RST products (component parts - CP of RST products). This study substantiates
the need to use a risk-based approach in the production and procurement of ECB in the course of development
work (hereinafter EDW) in the development of space rocket technology (RST). This study presents a
methodology for assessing risks in the production and purchase of ECBs during the implementation of EDW,
based on the consideration of possible risks based on the stages of the production life cycle and delivery of
foreign-made ECBs. The question has been raised about the need to develop regulatory and technical
documentation for assessing risks in the production and purchase of ECBs during the implementation of EDW.
Keyword : risks, life cycle, space rocket technology, electronic component base.
References:
1. Risk Management Standards of the Federation of European Risk Managers Associations (FERMA).
482. 2. COSO document (concept) “Guidelines for Monitoring the Internal Control System” (2009).
3. ISO 22000: 2018 (second edition of ISO 50001, edition 2018-08). Energy management systems
4. Zubova L.V. Definition of risk tolerance, level of risks, effect and effectiveness of their consequences, taking into account ensuring 2745-
maximum risk tolerance and necessary competitiveness. Actual issues of modern economic science. III internationa l correspondence 2750
conference: Lipetsk: "De facto", 2011. S. 109-111.
5. Zubova L.V. Methodology for substantiating entrepreneurial decisions of defense enterprises in the face of uncertainty about the
consequences of risks: a monograph. Military Space Academy named after A.F. Mozhaysky, St. Petersburg: Publishing House of St.
Petersburg State University of Economics. 2018.192 p.
6. Zubova L.V., Gotskaya N.R., Davydyants D.E., Karlik A. E., Petrov D.M. Comprehensive value of enterprise solutions and algorithm
of risk level assessment / technical sciences. Science and Society, 2018; # 3: 111-121.
7. Zubova L.V., Kolesnik A.V., Nikolaev S.P. Features of scientific and technical risks in the development of rocket and space
technology.Science and Society, 2018: 37-45.
8. Zubova L.V., Kuzmin V.N., Sherstyuk A.V. Model of administration of managerial decisions based on estimation of risk -stability of
enterprises, 2018.
9. Zubova L.V. The scheme of the model of managerial decision making based on the assessment of the risk tolerance of business entities.
Proceedings of St. Petersburg State University of Economics, 2018: 161.
10. Zubova L.V., Nikolaev S.P., Kolesnik A.V., Peculiarities of scientific and technical risks in the development of rocket and s pace
technology. Science and Society, 2018; # 3: 111-121.
11. Korovin E.V. Comprehensive assessment of the effectiveness of industrial enterprise development projects. Economics of Education,
2012; # 2: 117-122.
12. Nikitin Yu.A., Korovin E.V., Kruglov D.V. Management of assortments of services for material support of state power structures.
Monograph. SPb .: WATT. 2009.116 p.
13. Orlov A.I., Tsisarsky A.D. Features of risk assessment when creating space rocket technology. National interests: priorities and
security, 2018; 43 (232): 114-118.
14. Charushnikov A.V., Kuzmin V.N., Dreshchinsky V.A. An innovative methodological approach to modeling and evaluating the
effectiveness of space systems. Innovation, 2015; # 9 (205): 7-11.
15. Zubova L.V., Gotskaya N.R., Davydyants D.E., Karlik A. E., Petrov D.M. Comprehensive value of enterprise solutions and algorithm
of risk level assessment. Science and Society, 2018; # 3: 111-121.
16. Kolesnik A.V., Zubova L.V., Nikolaev S.P. Features of scientific and technical risks in the development of rocket and space
technology. Science and Society, 2018. # 2: 37-45.
17. Kuzmin V.N., Sherstyuk A.V. Zubova L.V., Model of administration managerial decisions based on assessment of risk -stability of
enterprises. 8th The International Conference “Social Science and Humanity”. London, 2018: 29-36.
Paper Title: Preventing Car Damage using CNN and Computer Vision
Abstract: This research contain convolutional neural network are used to recognize whether a car on a
given image is damage or not, from where it is damage and severity of the damage. Using transfer learning to
take advantage of available models that are trained on a more general object recognition task, very satisfactory
performance has been achieved, which indicate great opportunities of this approach. Car accidents are stressful
483. and the auto claims process is ripe for disruption. Using computer vision to accurately classify vehicle damage
and facilitate claims triage.
2751-
2755
Keyword : car damage, convolutional neural network, neural network
References:
1. B. Y. Lecun Y., Bottou L. and H. P., “Gradient-based learning applied to document recognition,” Proceedings of IEEE, vol. 86, no. 11,
1998.
2. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in
Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, Eds. Curran Associate s, Inc.,
2012, pp. 1097–1105.
3. M. G. M. R. G. Soumalya Sarkar, Kishore K. Reddy, “Deep learning for structural health monitoring: A damage characterization
application,” in Annual Conference of the Prognostics and Health Management Society,2016.
4. Patil, Kalpesh & Kulkarni, Mandar & Sriraman, Anand & Karande, Shirish. (2017). Deep Learning Based Car Damage Classification.
50-54. 10.1109/ICMLA.2017.0-179.
5. “http://www.tractable.io/.”
6. http://www.ey.com/publication/vwluassets/ey-does-your-firm-needa-claims-leakage-study/ey-does-your-firm-need-a-claims-
leakagestudy.pdf.
7. C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the inception architecture for computer vision,” arX iv
preprintarXiv:1512.00567, 2015.
8. L. Yang, P. Luo, C. Change Loy, and X. Tang, “A large-scale car dataset for fine-grained categorization and verification,” in
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3973–3981
9. J. Masci, U. Meier, D. Cires¸an, and J. Schmidhuber, “Stacked convolutional auto-encoders for hierarchical feature extraction,” in
International Conference on Artificial Neural Networks. Springer, 2011, pp. 52–59.
10. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint
arXiv:1409.1556, 2014
11. C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the inception architecture for computer vision,” arX iv
preprint arXiv:1512.00567, 2015.
12. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” arXiv preprint arXiv:1512.03385, 2015.
Keyword : Demand, Essential and Non-essential loads, Load Management, Peak Hour .
References:
1. S. Ashok and Rangan Banerjee "An optimization mode for industrial load management," IEEE Transactions on Power Systems
Vol.16, No.4, November 2001
2. R. Rajarajeswari, D. Suchitra, J. Vijay Krishna and Joydeep Das Gupta "Priority based Scheduling of Residential Users Device s in
Smart Grid Including Waiting Time", International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878,
Volume-8, Issue-1S4, June 2019
3. Onur Ayan and Belgin Turkay "Domestic Electrical Load Management in Smart Grids and Classification of Residential Loads", 5th
National Conference on Electrical and Electronics Engineering, 2018
4. Amir-Hamed Mohsenian-Rad, and Alberto Leon-Garcia., "Optimal residential load control with price prediction in real-time electricity
pricing environments", IEEE Transactions on Smart Grid, Vol 1, No.2, 2010
5. Goran Strbac,"Demand side management Benefits and challenges Energy Policy", vol. 36, issue 12, 2008, pp.4419-4426
6. Mohammed Albadi and Ehab El-Saadany," A summary of demand response in electricity markets", Electric Power Systems Research
78(11):1989-1996,November 2008
7. Alpana Sinha and Mala De, "Load shifting technique for reduction of peak generation capacity requirement in smart grid", IEEE 1st
International Conference on Power Electronics, Intelligent Control and Energy Systems, 2016
8. Babu C.A and Ashok.S, "Optimal Load shifting for Peak demand management", National power systems conference, NPSC 2004.
Paper Title: Experimental analysis on Generic principles for developing Robust Designs against Casting Defects
Abstract: The world is running around invention and advancements in the existing products or components,
and this wasn’t be easy without design concepts and its principles. This paper is conferring on this facet, how the
design can be made robust against manufacturing flaws by varying the parameters such as material properties,
dimensions, shapes etc. If a design engineer compels a mistake while designing a product, results in the
following aspects: confidence, business, customers, sales, servicers, repute etc. If we modify the design, and
make it robust, some or all of these losses will be recouped., It is not an easy task to discuss all manufacturing
capabilities in one go , to have a lucidity in the concept the flaws of manufacturing during casting were focused
in this paper. Based on the theoretical study and experiment analysis conducted on a casting “+” model the
results are outlined. Based on the output, a list of generic design principles was defined, which can be considered
by a design engineer during casting design process. The paper starts with a brief introduction to robust design,
followed by a literature review, then design solutions, computer simulation analysis of a casting component
(using Solid Works) and finally the conclusions made from the results.
Keyword : casting defects, Design considerations, Generic Principles, improper design, Manufacturing
defects, reliability, Robust design.
References:
1. Serope Kalpakjian, Steven R. Schmid, Manufacturing process for Engineering Materials, fourth edition, Prentice Hall 1928,pg 4,5,
2. Benjamin W.Niebel, Alan B. Draper, Product Design and process engineering, McGraw –Hill, 1974
3. Rob Thompson, Manufacturing processes for design professionals, Thames &Hudson Ltd., 2007
486. 4. Mikel P.Groover, Automation, production systems, and computer integrated Manufacturing, 3rd Edition, Pearson Education Inc., 2008
5. Michel T. Todinov, Risk-Based Reliability Analysis and Generic Principles for Risk Reduction, First edition, Elsvier, 2007
6. Mahmoud M.Farag, Materials and Process selection for Engineering Design, CRC press, 2008 2764-
7. Nair VN. Taguchi’s parameter design: A panel discussion. Technometrics 1992; 34:127–161. 2769
8. Robinson TJ, Borror CM, Myers RH. Robust parameter design: A review. Quality and Reliability Engineering Internation al 2003;
20:81–101.
9. Park G, Lee T, Lee K, Hwang K. Robust design: An overview. AIAA Journal 2006; 10. Gunter B. A perspective on the Taguchi
methods. Quality Progress 1987; June:44–52.
10. Taguchi G, Wu Y. Introduction to Off-Line Quality Control. Central Japan Quality Control Association: Nagoya, Japan, 1979.
11. Taguchi G. Introduction to Quality Engineering—Designing Quality into Products and Processes. Asian Productivity Organization:
Tokyo, 1986.
12. Phadke MS. Quality Engineering using Robust Design. Prentice-Hall: Englewood Cliffs, NJ, 1989.
13. Taguchi G, Chowdhury S, Taguchi S. Robust Engineering—Learn How to Boost Quality While Reducing Costs and Time to Market.
McGraw-Hill: New York, 2000.
14. Hunter JS. Statistical design applied to product design. Journal of Quality Technology 1985
15. Kackar RN. Off-line quality control, parameter design, and the Taguchi method (with discussion). Journal of Quality Technology
1985;
16. Le´on RV, Shoemaker AC, Kacker RN. Performance measures independent of adjustment. Technometrics 1987; 29: 253–285.
17. Box GEP, Bisgaard S, Fung C. An explanation and critique of Taguchi’s contributions to quality engineering. Quality and Relia bility
Engineering International 1988;
18. k Raghunadh, Yakkala M., Robera DabaBededa, Basam Koteswararao, K. Ramachandra Manohar, A. Naresh, and K. Srinivas. "A
Review on the Renewable hybrid power supply for rural areas by the grouping of wind power, photo voltaic and conventional
generator." (2018): 733-738.
19. Ravi, D., B. Somanath, L. Ranganath, and B. Koteswararao. "Experimental testing of thermal house for different weather conditions in
Bale robe." Materials Today: Proceedings 5, no. 9 (2018): 18245-18250.
20. Koteswararao, B., Y. Suresh, and D. Ravi. "Analysis of Quality in Solid State Welding (Copper-Copper) by Using NDT And DT by
Altering Physical Properties at Constant Time." Materials Today: Proceedings 4.8 (2017): 7351-7356.
21. Koteswararao, B., et al. "Designing of a Coconut Chopping Machine and Making Fuel from Tender Coconut." Indian Journal of
Science and Technology 9 (2016): 34.
22. Koteswararao, B., et al. "Investigation of Machining Parameter in EDM of High Carbon Steel Alloy (EN31)." Materials Today:
Proceedings 4.2 (2017): 1375-1384.
23. Ravi, D., Koteswararao, B., & Satish, K. (2018). Structural Analysis Of Down The Hole Button Bit With Different Materials. Materials
Today: Proceedings, 5(2), 4711-4719.
Authors: Nor Haslinayati Abdul Ghafar, Muslich Hartadi Sutanto, Saeed Modibbo Saeed, Sri Sunarjono
Keyword : Signalised Intersection, Safe Braking Distance, Yellow Light, Dilemma Zone.
References:
1. 1arber, N.J. and L.A. Hoel, Traffic and highway engineering. 2014: Cengage Learning.
2. Wu, Y., et al., Comparison of proposed countermeasures for dilemma zone at signalized intersections based on cellular automata
simulations. 2018. 116: p. 69-78.
3. Mannering, F., W. Kilareski, and S. Washburn, Principles of highway engineering and traffic analysis. 2007: John Wiley & Sons.
4. Ibrahim, M., M. Karim, and F.J.A.J.o.A.S. Kidwai, The effect of digital count-down display on signalized junction performance. 2008.
5(5): p. 479-482.
5. Devalla, J., S. Biswas, and I.J.P.C.S. Ghosh, The effect of countdown timer on the approach speed at signalised intersections. 2015. 52:
p. 920-925.
6. Wu, M., et al., Characterize dilemma zone and minimize its effect at coordinated signalized intersections. 2013. 96: p. 766-778.
7. Pathivada, B.K. and V.J.T.r.p. Perumal, Modeling driver behavior in dilemma zone under mixed traffic conditions. 2017. 27: p. 961-968.
8. Lu, G., et al., Analysis of yellow-light running at signalized intersections using high-resolution traffic data. 2015. 73: p. 39-52.
9. Zhang, Y., et al., Yellow light dilemma zone researches: a review. 2014. 1(5): p. 338-352.
10. Gazis, D., R. Herman, and A.J.O.R. Maradudin, The problem of the amber signal light in traffic flow. 1960. 8(1): p. 112-132.
11. Papaioannou, P.J.A.A. and Prevention, Driver behaviour, dilemma zone and safety effects at urban signalised intersections in Greece.
2007. 39(1): p. 147-158.
12. Hurwitz, D.S., et al., Fuzzy sets to describe driver behavior in the dilemma zone of high-speed signalized intersections. 2012. 15(2): p.
132-143.
13. Sharma, A., D. Bullock, and S.J.T.r.p.C.e.t. Peeta, Estimating dilemma zone hazard function at high speed isolated intersection. 2011.
19(3): p. 400-412.
14. Roess, R.P., Prassas, E.S and McShane, W.R., Traffic Engineering, ed. r. Ed. 2004, Upper Saddle River, NJ: Peaerson Prentice-Hall.
15. Fu, C., et al., Comparative analysis of driver’s brake perception-reaction time at signalized intersections with and without countdown
timer using parametric duration models. 2016. 95: p. 448-460.
16. Taoka, G.T.J.I.j., Brake reaction times of unalerted drivers. 1989. 59(3): p. 19-21.
17. Gates, T.J., et al., Analysis of driver behavior in dilemma zones at signalized intersections. 2007. 2030(1): p. 29-39.
18. El-Shawarby, I., A.-S.G. Abdel-Salam, and H.J.T.r.r. Rakha, Evaluation of Driver Perception–Reaction Time Under Rainy or Wet Roadway
Conditions at Onset of Yellow Indication. 2013. 2384(1): p. 18-24.
19. Li, Z., et al., Measurement and comparative analysis of driver’s perception–reaction time to green phase at the intersections with and
without a countdown timer. 2014. 22: p. 50-62.
20. Highway, A.A.o.S. and T. Officials, A policy on geometric design of highways and streets. 2011.
21. Mannering, F. and W. Kilareski, Principles of Highway Engineering and Traffic Analysis. Second. John Wiley & Sons.
22. Currin, T.R., Introduction to traffic engineering: a manual for data collection and analysis. 2012: Cengage Learning.
23. Falcocchio, J.C. and H.S. Levinson, Concentration of travel demand in space and time, in Road Traffic Congestion: A Concise Guide.
2015, Springer. p. 39-51.
Paper Title: An Innovative Model for both Cloud Security and Privacy in Provision of Secure Cloud Services
Abstract: Because of diverse benefits such as counting services on demand, decreasing costs, computing
resources configuration, flexibility, services scalability, etc. over internet, Cloud Computing has become and is
becoming widely and hugely accepted technology to provide services. On the other hand, privacy and security of
a cloud has become an issue as this technology is tremendously emerging in the world. Many researches are
being done and even some proposed various models to identify and overcome the privacy and security issues. In
this review, for the cloud providers to use during different stages of cloud services, a layered cloud security and
490. privacy model (CSPM) will be provided. The CSPM model allows to overcome cloud security issues and thus,
providing safe and protected services. Lastly, countermeasures and security threats will be presented.
2785-
2791
Keyword : Privacy, Cloud Provider, Cloud Security and Privacy Model (CSPM), Cloud Service, Data, Cloud
Consumer, Security, Cloud Computing.
References:
1. P. Mell, T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, U. S. Departme nt of
Commerce, September 2011.
2. A. RajaniKanth, M. Lakshmi, "A Survey on Access Control Models in Cloud Computing," Emerging ICT for Bridging the Future.
Advances in Intelligent Systems and Computing, Vol. 337. Springer International Publishing, Switzerland, pp. 653-664, 2015.
3. M. Kandias, N. Virvilis, D. Gritzalis, 'The Insider Threat in Cloud Computing," Critical Information Infrastructure Security. Lecture
Notes in Computer Science, Vol. 6983. Springer-Verlag, Berlin Heidelberg, pp. 93-103,2013.
4. Issa M. Khalil, A. Khreishah, M. Azeem, "Cloud Computing Security: A Survey," Computers, Vol, 3, pp. 1-35,2014.
5. The Cloud Services Measurement Initiative Consortium (CSMIC): Service Measurement Index Framework Version 2.1. Carnegie
Mellon University Silicon Valley Moflett Field, CA USA, July 2014.
6. K. EL MAKKAOUI, A. EZZATI, A. BENI-HSSANE, C. MOTAMED, "Data confidentiality in the word of c1oud," Journal of
Theoretical and Applied Information Technology, Vo1.84. No.3, 2016.
7. S. Sengupta, V. Kaulgud, V.S. Sharma, "Cloud computing security Trends and research directions," In Proceedings of the 2011 I EEE
World Congress on Services, Washington, DC, USA, pp.524-531, 2011.
8. S. Kamara, K. Lauter, "Cryptographic Cloud Storage," Financial Cryptography and Data Security. Lecture Notes in Computer Science,
Vol. 6054. Springer-Verlag, Berlin Heidelberg, pp. 136-149,2010.
9. N. Gruschka, M. Jensen, "Attack surfaces: A taxonomy for attacks on c10ud services," In Proceedings of the 2010 IEEE 3rd
International Conference on Cloud Computing, Miami, FL, USA, pp. 276-279, 2010.
10. O. Cangea, G. Moise, "A New Approach of the Cryptographic Attacks," Digital Information and Communication Technology and Its
Applications. Communications in Computer and Information Science, Vol. 166. Springer-Verlag, GmbH Berlin Heidelberg, pp.521-
534, 2011.
11. K. HyunHo, B. Ndibanje, L. Hoon-Jae, C. YongJe, C. Dooho, "Side Channel Attacks on Cryptographic Module: EM and PA Attacks
Accuracy Analysis," Information Science and Applications. Lecture Notes in Electrical Engineering, Vol. 339. Springer-Verlag, Berlin
Heidelberg, pp. 509-516,2015.
12. CLOUD SECURITY ALLIANCE: The Notorious Nine: Cloud Computing Top Threats m 2013.
https://c1oudsecurityalliance.org/group/top-threats.
13. M. Ogburn, C. Turner, P. Dahal, "Homomorphic Encryption," Procedia Computer Science 20, Elsevier, pp. 502 - 509, 2013.
14. Tian Xia1, Hironori Washizaki2, "Cloud Security and Privacy Metamodel Metamodel for Security and Privacy Knowledge in Cloud
Services," (MODELSWARD 2018), pages 379-386, ISBN: 978-989-758-283-7.
Authors: Nikolai Vorobyov, Ivan Kochish, Ilya Nikonov, Yuri Kuznetsov, Marina Selina
Method Development to Determine the Fractal Structures Index into the Broiler Chickens’
Paper Title:
Intestines
Abstract: Microbial communities in the intestines of birds self-organize to carry out joint biochemical
actions and extract nutrients from plant substrates. Depending on the feed entering the intestine, the
configuration of the microbial biosystem is regularly reconstructed, evenly distributing the enzymatic load
between the microbial components. To assess the qualitative and quantitative indicators of these processes, it is
proposed to calculate the index of fractal structures of microbial communities existing in the intestines of birds.
The technique is based on a fractal analysis of the frequency spectrum of operational taxonomic units (OTU) of
microbial communities obtained by the molecular genetic method. Initially, the initial OTU spectrum is
converted into an abbreviated spectrum of OTU groups, in which each group combines OTE that are similar in
frequency of occurrence. Next, a two-dimensional fractal portrait of the microbial community is constructed, on
which each OTU group is represented by a point with coordinates that depend on the frequencies of these
groups. A fractal portrait is necessary for conducting a topological analysis of the location of points on it and
isolating fractal structures in the microbial community. As a fractal measure, the analysis uses triangles with
vertices at the points of the OTU groups. At the same time, the smallest heights of the triangles are selected with
the scale of the fractal measure. The construction of triangles and their arrangement in increasing order of scale
of the fractal measure allows us to select the first triangles in a row, since they are triangles degenerate into a
segment by a straight line. OTU groups included in degenerate triangles are the sought-after determined OTU
groups belonging to fractal structures in the microbial community. Their share in the microbial community
determines the index of fractal structures (IFS), which also takes into account the uniform distribution of the
enzymatic load between OTU.
491. In the experiment, the molecular genetic method of NGS was used to study microbial communities in the
intestines of broilers of NGS using two types of probiotics. The obtained frequency-taxonomic spectra were used
2792-
to calculate the IFS. An analysis of the results showed that probiotics affect the self-organization of microbial
2795
communities.
Keyword : frequency-taxonomic spectrum, operatively taxonomic units, fractal portrait, microbial community.
References:
1. G. Abramson, H. A. Cerdeira, C. Bruschi, Fractal properties of DNA walks. Biosystems, 1999. 49: 63–70.
2. D. Stanley, R. J. Hughes, R. J. Moore Microbiota of the chicken gastrointestinal tract: influence on health, productivityand disease.
Appl. Microbiol. Biotechnol. 2014. 98. pp. 4301–4309.
3. Y. Yang, P. A. Iji, M. Choct Dietary modulation of gut microflora in broiler chickens: a review of the role of six kinds of a lternatives
to in-feed antibiotics. World’s Poult. Sci. J. 2009. 65(1) pp. 97–114.
4. J. I. R. Castanon, History of the use of antibiotics as growth promoters in European poultry feeds. Poult. Sci. 2007. 86. pp. 2466–2471.
5. N. T. Hnung, N. Chansiripornchai, J. J. Carrique-Mas, Antimicrobial resistance in bacterial poultry pathogens: A review. Front. Vet.
Sci. 2017. 4. pp. 126.
6. P. Biggs, C. M. Parsons, G. C. Fahey, The effects of several oligosaccharides on growth performance, nutrient digestibilities, and Cecal
microbial Populations in young chicks. Poultry science, 2007. 86(11), pp. 2327–2336.
7. M. Chichlowski, J. Croom, B. W. McBride, Direct-fed microbial PrimaLac and salinomycin modulate whole-body and intestinal
oxygen consumption and intestinal mucosal cytokine production in the broiler chick. POULTRY SCIENCE, 2007. 86(6), pp. 1100–
1106
8. Stanley, Dragana, Hughes, J. Robert, Moore, Microbiota of the chicken gastrointestinal tract: influence on health, productivity and
disease. Applied microbiology and biotechnology, 2014. 98(10), pp. 4301–4310.
9. E. Amit-Romach, D. Sklan, Z. Uni, Microflora ecology of the chicken intestine using 16S ribosomal DNA primers. POULTRY
SCIENCE, 2004. 83(7). pp. 1093–1098.
10. J. Apajalahti, A. Kettunen, H. Graham, Characteristics of the gastrointestinal microbial communities, with special reference to the
chicken. Конференция: 14th European Symposium on Poultry Nutrition, Lillehammer, Norway. Worlds poultry science journal,
2004. 60(2). pp. 223–232.
B. Keerthi Samhitha, Suja Cherukullapurath Mana, Jithina Jose, M. Mohith, L. Siva Chandhrahasa
Authors:
Reddy
An Efficient Implementation of a Method to Detect Sybil Attacks in Vehicular Ad hoc Networks
Paper Title:
using Received Signal Strength Indicator
Abstract: Vehicular Ad Hoc Networks (VANET) are useful in implementing a smart transportation system
by enabling ad hoc vehicle to vehicle communication. Sybil attack is considered to be one of the most
dangerous threats to VANET. Sybil aggressor can produce different phony personalities with false messages to
extremely hinder the ordinary elements of wellbeing related applications. In this paper, we are presenting an
implementation of a method to detect Sybil attack using received signal strength indicator.
493. Paper Title: Classification of Pap smear images for Cervical cancer using Convolutional Neural Network
Abstract: Classification of Pap smear images for cervical cancer consists of two types namely, normal 2801-
and abnormal cancerous cells. The dataset involves 7 sets of classes of cancerous images which have 3 sets of 2807
normal cancerous images and 4 sets of abnormal cancerous images. The proposed work performs two stages of
classification. The first stage of the work is classifying the data as normal or abnormal cancerous cells. In the
second stage of the work, the class of the cancer as normal columnar, normal intermediate, normal superficial,
light dysplasia, moderate dysplasia, severe dysplasia and carcinoma_in_situ are classified. The proposed work
gives good results for classifying images for 3 sets of classes and 4 sets of classes for normal cells and is able
to classify and detect normal and abnormal cell accurately.
Keyword : Deep Learning, Convolutional Neural Network, Cervical Cancer, Pap smear images.
References:
1. Ayaka Iwai, Toshiyuki Tanaka, “Automatic Diagnosis Supporting System for Cervical Cancer using Image processing”, Proceeding of
the SICE Annual Conference 2017,Sept 19-22,Kanazawa University, Kanazawa, Japan.
2. A. Jemal, F. Bray, M.M. Center, J. Ferlay, E. Ward, D. Forman, Global cancer statistics, CA: A Cancer Journal for Clinicians 61 (2)
(2011) 69–90.
3. Pabitra Mitra, Sushmita Mitra,” Staging of Cervical Cancer using Soft Computing”, IEEE TRANSACTIONS ON BIOMEDICAL
ENGINEERING, VOL. 47, NO. 7, JULY 2000.
4. E. Bengtsson and P. Malm, “Screening for cervical cancer using automated analysis of PAP-smears,” Computational and Mathematical
Methods in Medicine, vol. 2014, 2014.
5. Rikiya Yamashita, Mizuho Nishio ,Richard Kinh Gian Do, Kaori Togashi,” Convolutional neural networks: an overview and
application in radiology”, 611, Springer Berlin Heidelberg Insights Imaging (2018) 9.
6. Erick Njoroge, Stephen R. Alty, “Classification of Cervical Cancer Cells using FITR data”, Proceedings of the 28th IEEE on EMBS
Annual Conference ,New York City, USA, Aug 30-Sept 3 2006.
7. T. Chankong, N. Theera-Umpon, and S. Auephanwiriyakul, “Automatic cervical cell segmentation and classification in pap smears,”
Computer Methods And Programs In Biomedicine, vol. 113, no. 2, pp. 539–556, 2014.
8. Miao Wu, Chuanbo Yan, Huiquiang Liu, Qian Liu, Yi Yin, “ Automatic Classification of Cervical Cancer from Cytological Images by
using Convolutional Neural Network”, Bioscience reports, Nov 2018.
9. Wasswa WILLIAM1, Annabelle Habinka BASAZA-EJIRI2, Johnes OBUNGOLOCH1,Andrew WARE,“A Review of Applications of
Image Analysis and Machine Learning Techniques in Automated Diagnosis and Classification of Cervical Cancer from Pap-Smear
images”, , IST-Africa 2018 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information
Management Corporation, 2018.
10. C. H. Lin, Y. K. Chan, and C. C. Chen, “Detection and segmentation of cervical cell cytoplast and nucleus,” Int. J. Imaging Syst.
Technol., vol. 19, no. 3, pp. 260–270, 2016.
11. Debashree Kashyap, Abhishek Somani, Jatin Shekhar, Anupama Bhan, Malay Kishore Dutta, Radin Burget, Kamil Riha, “Cervical
Cancer Detection and Classification using Independent Level Sets And Multi SVMs” , 2016, IEEE, 39 th International Conference on
Telecommunications and Signal Processing(TSP), 27-29June 2016.
12. Kasemsit Teeyapan, Nipon Theeraa-Umpon, Sansanee Auephanwiriyakul, “Application of Support Vector based Methods for Cervical
Cancer cell Classification “, 2015 IEEE International Conference on Control System, Computing and Engineering.
Paper Title: An Optimized FPGA Based System Design for the Arrhythmia Detection using ECG
Abstract: Electrocardiogram signals are highly susceptible to interferences caused due to various kinds of
noises including artefacts’, disruptions in power lines attained from the human interferences and device
disturbances. These noise signals tend to lower the quality of signals that result in crucial environment for
detecting and diagnosing different types of arrhythmia. In order to avoid this issue, multiple filtering techniques
are being incorporated out of all Gaussian filters with Haar DWT portray better outcomes in noise elimination
and smoothening of signal. The process of ECG signal filtering allows performing the testing and validation of
in the actual world emulation. Enhancement in PSNR ratio is observed by using the ECG signal filters along the
reconstructed signal. For a given input ECG signal, the levels of the signal peak decide if the patient is suffering
from arrhythmia or not. If peak is low, patient is detected with the arrhythmia disease, if high patient is normal.
The results can be observed in simulation. FPGA prototyping of the design is carried out along the hardware
debugging in chip scope pro tool. The design is realized using Verilog coding with the technique of
morphological filtering. For the purpose of debugging the hardware device used is Artix-7. The FPGA
methodology is success full in a position to detect arrhythmia. The framework based on FPGA is structured and
executed in the paper which can detect a type of arrhythmia which indicates Atrio Ventricular block along with
494.
all the noises removed. The simulation results are obtained by taking ECG signals from MIT-BIH arrhythmia
database. The proposed FPGA based system design is proven to be optimized as it showed very less utilization 2808-
of resources when compared to previous arrhythmia detection system designs. 2818
Paper Title: Optimizing Stock market prediction using Long Short Term Memory
Abstract: Stock market prediction has been an important issue in the field of finance, engineering and
mathematics due to its potential financial gain. Stock market prediction is a process of predicting the future
value of a company stock or other financial instrument traded in financial market. Stock market prediction
brings with it the challenge of proving whether the financial market is predictable or not, since stock market data
is of high velocity. This project proposes a machine learning model to predict stock market price based on the
data set available by using LSTM model for performing prediction by de-noising the data using wavelet
transform and performing auto-encoding on the data. The process includes removal of noise, preprocessing,
feature selection, data mining, analysis and derivations. This project focuses mainly on the use of LSTM
algorithm along with a layer of neural network to forecast stock prices and allocate stocks to maximize the profit
within the risk factor range of the stock buyers and sellers.
Keyword : prediction; LSTM; de-noise; auto encoders; feature selection
References:
1. G Applying LSTM neural network for predicting stock closingprice, tingwei gao,yieting chai,yi lie, Journal of science and technology
volume 68,jan8
2. Applied attention based LSTM neural networkin stock predictors, li chen cheng,yu hsing huang, mu enwu, Ieee explorer,10.01.11,jan14
495. 3. Stock transaction prediction Modelling and Analysis based on LSTM, siyauan liu,guangz hong,yiftan ding, hubey laboratory of
intelligent information processing and real time industrial system, Wuhan, China.
4. Prediction of Stock Market Price using Hybrid of Wavelet Transform and artificial Neural network, S.kumar, M.sumathi, 2819-
S.N.sivananda,chennai. 2823
5. Feature selection,rajajiram,Computer Science magazine,chapter .
6. Stock prediction using twitter sntiment analysis,Anshul Mittal,Arpit Goel,International conference on sience and technology,standford
university,2012.
7. Predicting stock prices using data mining techniques,qasem a. al. radaideh,adel abu assaf,eman alnagi,the internatiomal arab conference
on international technology,Dec 2013
8. Stock market prediction using artificial neural network,Bigul kutlun,Meltez Ozuran ,Bestan badus,white paper,istanbul,turkey
9. Stock market forecasting technique literature survey, international journal of computer science and mobile computing ,vol5,isue
6,june2016.
10. Using ai to make predictions on stock market ,alice zheng,jack jin,jornal of co,mputer science,2015,june.
11. Machine learning techniques and use of event information for stock market prediction: a survey and evaluation by Paul D. Yoo, Maria H.
Kim,
12. Tony Jan 2007
13. A Multi agent approach to Q-learning for daily stock trading by Jae Won Lee, Jonghun Park, Member, IEEE, Jangmin O, Jongwoo
Lee, and Euyseok Hong 2007
14. Intelligent Stock Trading System based on SVM Algorithm and Oscillation Box Prediction by Qinghua Wen, Zehong Yang, Yixu
Song,
15. Peifa Jia
16. Forecasting Intraday Stock Price Trends with Text Mining Techniques by Mittermayer, University of Bern, Institute of Information
Systems 2004.
17. Yin Hongcai, Zhao Chunyan. "Research on Stock Forecasting Based on Neural Network." Natural science journal of Harbin Normal
University 23.3(2007):47-49.
18. Fenu, Gianni, and S. Surcis. "A Cloud Computing Based Real Time Financial System. " ACM Symposium on Applied Computing
ACM, 2009:1219-1220.
19. Colah. Understanding LSTM Networks. http://colah.github.io/posts/ 2015- 08-Understanding- LSTMs/. 27.8(2015).
20. Gers F., A., J. Schmidhuber, and F. Cummins. "Learning to Forget: Continual Prediction with LSTM." Neural Computation
2.10(1999): 2451-71.
21. Sundermeyer, Martin, R. Schlüter, and H. Ney. "LSTM Neural Networks for Language Modeling." Interspeech 2012:601-608.
Paper Title: Design and Development of Miniaturized Planar Array Antenna for Multi Functional Radar
Abstract: Miniaturized multi functional planner array antennas are presented for both L and S bands in this
paper. A 3x8 array is proposed and the distance between antenna elements is only λ/2 so that size reduced
significantly. The two dielectric substrates FR4 and RT duriod 6010 are used for different antennas. The antenna
with FR4 substrate is fabricated and compared the results with simulated values. Coaxial feeding technique is
adopted. Dual frequency multi functional array is simulated .Better gains, return losses and radiation patterns are
obtained .The circular polarization is obtained by truncating the elements and it is useful for navigation. The
results are compared with existing multi object tracking radar (MOTR).
496. References:
1. Fu, Shiqiang, et al. "Broadband circularly polarized slot antenna array fed by asymmetric CPW for L-band applications." IEEE
Antennas and wireless propagation letters 8 (2009): 1014-1016. 2824-
2. Chauloux, Antoine, et al. "High power pattern reconfigurable phased antenna array based on a GaN HEMT." 2016 IEEE Conference 2828
on Antenna Measurements & Applications (CAMA). IEEE, 2016..
3. Fu Shi-Qiang “Broadband Circularly Polarized Slot Antenna Array Fed by Asymmetric CPW for L-Band Application,” Fu ShiQiang:
.IEEE Antennas and Wireless Propagation Letters, vol. 8, 2010, pp.1014-1016, 2009.
4. Sekhar, M., E. Kusuma Kumari, and ANV Ravi Kumar. "Wideband High-Gain Circularly Polarized Planar Antenna Array for L Band
Radar." 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2017.
5. Ge, Lei, and Kwai Man Luk. "A three-element linear magneto-electric dipole array with beamwidth reconfiguration." IEEE Antennas
and Wireless Propagation Letters 14 (2014): 28-31.
6. Brookner, Eli. "Phased-array and radar breakthroughs." 2007 IEEE Radar Conference. IEEE, 2007.
7. S. Clauzier, S. M. Mikki and Y. M. M. Antar, "Design of Near-Field Synthesis Arrays Through Global Optimization," in IEEE
Transactions on Antennas and Propagation, vol. 63, no. 1, pp. 151-165, Jan. 2015.
8. Hassan Elesawy, W. Swelam, Abdalmonem Fouda, Ismail M. Hafez “Design of Microstrip Array Antenna for Wireless
Communication Application” IOSR Journal of Engineering, Vol. 3, Issue 12, December 2013.
9. Zandikiya, F., & Asadpor, L. (2017). Broadband Circularly Polarized Slot Antenna Array Fed by Asymmetric CPW for C-Band
Applications. IETE Journal of Research, 1–6.
Paper Title: Optimization-based Offloading Method for Mobile Cloud Computing Environment
Abstract: Mobile cloud computing (MCC) is a program that should be applied to defeat the hurdles of
computing in the mobile environment. Though developing data-intensive purposes, such as Natural Language
Processing (NLP) and face recognition, takes more difficulties on mobile cloud computing stages because of
data location and high bandwidth cost issues. To overcome these issues, this paper proposes a dynamic task
(resources) allocation model to schedule data-intensive applications on mixed resources (public cloud, cloudlets,
and mobile devices) computing environments. Efficient task allocation strategy requires to develop by
estimating the number of intentions while performing the decisions of allocation, such as fast response and
reduced consumption of energy, to obtain the most reliable task allocation providing the requirements of cloud
users and increasing the MCC environment performance. In this paper, Cultural Algorithm (CA) based
offloading strategy is proposed for obtaining the minimized task execution time by causing smart decisions for
allocation. This proposed algorithm has been implemented using a cloudsim toolkit, and the performance is
497. estimated by analyzing with Genetic and greedy algorithm allocation techniques on a collection of parameters
like throughput and makespan for scheduling the resource. 2829-
2833
Keyword : Mobile Cloud Computing, Cloudlets, Resource Allocation, Genetic Algorithm, Cultural
Algorithm, Greedy Method.
References:
1. Miettinen, Antti P., and Jukka K. Nurminen. "Energy efficiency of mobile clients in cloud computing." HotCloud 10.4-4 (2010): 19.
2. Wen, Yonggang, Weiwen Zhang, and Haiyun Luo. "Energy-optimal mobile application execution: Taming resource-poor mobile
devices with cloud clones." 2012 Proceedings Ieee Infocom. IEEE, 2012.
3. Park, JiSu, HeonChang Yu, and EunYoung Lee. "Resource allocation techniques based on availability and movement reliability for
mobile cloud computing." International Conference on Distributed Computing and Internet Technology. Springer, Berlin, Heidelberg,
263-264, 2012.
4. Chen, Min, et al. "Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G
technologies." Mobile Networks and Applications 20.6 (2015): 704-712.
5. Wan, Jiafu, et al. "VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing." Mobile
Networks and Applications 19.2 (2014): 153-160.
6. Wen, Yonggang, Weiwen Zhang, and Haiyun Luo. "Energy-optimal mobile application execution: Taming resource-poor mobile
devices with cloud clones." 2012 Proceedings Ieee Infocom. IEEE, 2716-2720, 2012.
7. Cardellini, Valeria, et al. "A game-theoretic approach to computation offloading in mobile cloud computing." Mathematical
Programming 157.2 (2016): 421-449.
8. Srirama, Satish Narayana, Eero Vainikko, and Matthias Jarke. "Supporting mobile web service provisioning with cloud computing."
(2010).
9. Khan, Zaheer, Saad Liaquat Kiani, and Kamran Soomro. "A framework for cloud-based context-aware information services for citizens
in smart cities." Journal of Cloud Computing 3.1 (2014): 14.
10. Wu, Huaming, et al. "An optimal offloading partitioning algorithm in mobile cloud computing." International Conference on
Quantitative Evaluation of Systems. Springer, Cham, 2016.
11. Nandi, Enakshmi, et al. "Improved Cost-Effective Technique for Resource Allocation in Mobile Cloud Computing." Progress in
Computing, Analytics, and Networking. Springer, Singapore, 2018. 551-558.
12. Latiff, Muhammad Shafie Abd, Syed Hamid Hussain Madni, and Mohammed Abdullahi. "Fault tolerance aware scheduling technique
for cloud computing environment using dynamic clustering algorithm." Neural Computing and Applications 29.1 (2018): 279-293.
13. Tang, Chaogang, et al. "Energy-aware task scheduling in mobile cloud computing." Distributed and Parallel Databases36.3 (2018):
529-553.
14. Durga, S., S. Mohan, and J. Dinesh Peter. "A Two-Stage Queue Model for Context-Aware Task Scheduling in Mobile Multimedia
Cloud Environments." Advances in Big Data and Cloud Computing. Springer, Singapore, 2018. 287-297.
15. Fang, Weiwei, et al. "OKRA: optimal task and resource allocation for energy minimization in mobile edge computing
systems." Wireless Networks 25.5 (2019): 2851-2867.
Paper Title: Ensembled Adaboost Learning with Id3 Algorithm for Energy Aware Data Gathering in WSN
Abstract: In this paper, data collection is the operation of gathering a lot of details from the sensor nodes
and shipping it to the sink node. The use of Network is increasingly required to perform these processes, so,
increases energy consumption. A lot of WSN architectures are designed to solve this complex problem. By using
a technique called Decision Tree Classifier using Adaboost (DTCA) algorithm, can extension that data
collection efficiency, as well as reducing the delay and Power consumption. In the proposed methodology, the
power of each sensor node should be estimated at the outset. Then the mobile sink node receives the information
from the high power sensor nodes with minimal delay. The mobile sink node classifies the data pockets using
the Decision Tree Classifier. This classifies based on the relationship between the sensor nodes in WSN. That
relationship is measure using the method of population Pearson product moment correlation coefficient.
Adaboost algorithm is a combination of several weak non-linear classifiers to create a higher classification. Then
finally, it sends classified particulars to Base Station. The operation of the DTCA system is convey out with
divergent parameters such as classification time, EC, (Network Lifetime) NL, data collection capability,
Classification Accuracy (CA), (FPR) false positive rate and delay.
Keyword : Data Collection, WSN, Classification, Energy Consumption, DTCA, Pearson Product-Moment
Correlation Coefficient
References:
1. Yongmin Zhang, Shibo He and Jiming Chen, “Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink”,
IEEE Transactions on Mobile Computing, Volume 16, Issue 6, June 2017, Pages 1718-1729
2. Cong Wang, SongtaoGuo, and Yuanyuan Yang, “An Optimization Framework for Mobile Data Collection in Energy-Harvesting
Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Volume 15, Issue 12, December 2016, Pages 2969 -2986
498. 3. Chih-Min Chao and Tzu-YingHsiao, “Design of structure-free and energy-balanced data aggregation in wireless sensor networks”,
Journal of Network and Computer Applications, Elsevier, Volume 37, January 2014, Pages 229-239
4. Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, Yan-Jie Wei, “An Energy Efficient Clustering Scheme for Data Aggregation in 2834-
Wireless Sensor Networks”, Journal of Computer Science and Technology, Springer, Volume 28, Issue 3, 2013, Pages 564 –57 2840
5. Shusen Yang, Usman Adeel, Yad Tahir, and Julie A. McCann, “Practical Opportunistic Data Collection in Wireless Sensor Networks
with Mobile Sinks”, IEEE Transactions on Mobile Computing, Volume 16, Issue 5, May 2017, Pages 1420 – 1433
6. Chuan Zhu , Shuai Wu , Guangjie Han, Lei Shu , Hongyi Wu, “A Tree-Cluster-Based Data-Gathering Algorithm for Industrial WSNs
With a Mobile Sink”, IEEE Access , Volume 3.
7. Ping Zhong, Ya-Ting Li, Wei-RongLiu ,Gui-Hua Duan, Ying-Wen Chen, and Neal Xiong, “Joint Mobile Data Collection and Wireless
Energy Transfer in Wireless Rechargeable Sensor Networks”, Sensors, Volume 17, Issue 8, 2017, Pages 1-23
8. PrabhuduttaMohanty andManasRanjanKabat, “Energy efficient structure-free data aggregation and delivery in WSN”, Egyptian
Informatics Journal, Elsevier, Volume 17, Issue 3, 2016, Pages 273-284
9. Soobin Lee and Howon Lee, “Energy-Efficient Data Gathering Scheme Based on Broadcast Transmissions in Wireless Sensor
Networks”, the ScientificWorld Journal, Hindawi Publishing Corporation, Volume 2013, July 2013, Pages 1-7
10. Shouling Ji, Raheem Beyah, and ZhipengCai, “Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks”,
IEEE Transactions on Mobile Computing, Volume 13, Issue 3, 2014, Pages 626-637
11. Ngoc-TuNguyena, Bing-Hong Liu, Van-Trung Pham, Yi-Sheng Luo, “On maximizing the lifetime for data aggregation in wireless
sensor networks using virtual data aggregation trees”, Computer Networks, Elsevier, Volume 105, 2016, Pages 99-110
12. Liang He, Jianping Pan, and Jingdong Xu, “A Progressive Approach to Reducing Data Collection Latency in Wireless Sensor
Networks with Mobile Elements”, IEEE Transactions on Mobile Computing, Volume 12, Issue 7, 2013, Pages 1308 – 1320
13. Soo-HoonMoona, Sunju Park, Seung-jae Han, “Energy efficient data collection in sink-centric wireless sensor networks: A cluster-ring
approach”, Computer Communications, Elsevier, Volume 101, 2017, Pages 12-25
14. Ilkyu Ha, MamurjonDjuraev, and ByoungchulAhn, “An Energy-Efficient Data Collection Method for Wireless Multimedia Sensor
Networks”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Volume 2014, September 2014,
Pages 1-8
15. Liangshan Jiang, Anfeng Liu, Yanling Hu, Zhigang Chen, “Lifetime maximization through dynamic ring-based routing scheme for
correlated data collecting in WSNs”, Computers & Electrical Engineering, Elsevier, Volume 41, 2015, Pages 191-215
16. Leandro Aparecido Villas, AzzedineBoukerche, HeitorSoares Ramos, Horacio A.B. Fernandes de Oliveira, Regina Borges de Araujo,
and Antonio Alfredo Ferreira Loureiro, “ DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in
Wireless Sensor Networks”, IEEE Transactions on Computers Volume 62, Issue 4, April 2013, Pages 676–689
17. MouloodHeidari, Akbar Nooriemamzade, Hamid Reza Naji, “Effect of using mobile sink and clustering on energy consumption in
wireless sensor networks”, Turkish Journal of Electrical Engineering & Computer Sciences, 2015, Pages 1-16
18. Weigang Wu, Jiannong Cao, HejunWu ,Jingjing Li, “Robust and dynamic data aggregation in wireless sensor networks: A cross-layer
approach”, Computer Networks , Elsevier, Volume 57, 2013, Pages 3929–3940
19. MihaelaMitici, Jasper Goseling, Maurits de Graaf, Richard J. Boucherie, “Energy-efficient data collection in wireless sensor networks
with time constraints”, Performance Evaluation, Elsevier, Volume 102, August 2016, Pages 34–52
20. Yu Lasheng, Li Jie , Liu Renjie, “An effective data collection algorithm for wireless sensor network”, Computing, Springer, Volume
95, Issue 9, 2013, Pages 723–738
21. Wei Wang, Dan Wang , Yu Jiang, “Energy efficient distributed compressed data gathering for senso
499. References:
1 Z. Guo, et al, “Indirect Field Oriented Control of Three-Phase Induction Motor Based on Current-Source Inverter,” Procedia
Engineering, vol. 174, pp. 588-594, 2017.
2 H. Khelif, et al, “Direct Rotor Field-Oriented Control of a dual star Induction Machine”, 2017 IEEE International Conference on Green
2841-
Energy Conversion Systems, 2017. 2847
3 C. Laoufi, A Abbou and M. Akherraz, “Comparative study between different speed controller techniques applied to the indirect field-
oriented control of an induction machine-performances and limits,” WSEAS TRANSACTIONS on SYSTEMS and CONTROL, vol 10,
pp. 360-372, 2015
4 G. Singh and G. Singh, “A fuzzy pre-compensated-PI controller for indirect field oriented controlled induction motor drive”, 2014
Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), p p.
257-261, 2014.
5 C. Laoufi, A Abbou and M. Akherraz, “Real time comparative analysis of several intelligent speed controllers applied to the direct
torque control of asynchronous machine,” Advances in Intelligent Systems and Computing, vol 10, pp. 360-372, 2015
6 C. Laoufi, A. Abbou and M. Akherraz, “Improvement of Direct Torque Control Performance of Induction Machine by using Self Tuning
Fuzzy Logic Controller for Elimination of Stator Resistance Variation Effect,” 2016 IEEE International Renewable and Sustainable
Energy Conference (IRSEC), 2016.
7 M. Masiala, and A. Knight, “Self-tuning speed controller of indirect field-oriented induction machine drives,” 17th International
Conference on Electrical Machines, pp. 563-568, 2006.
8 C. Laoufi, A. Abbou, Y. Sayouti, and M. Akherraz, “Self tuning fuzzy logic speed controller for performance improvement of an indirect
field-oriented control of induction machine,” International Review of Automatic Control, Vol. 6, pp. 464-471, 2013.
9 C. Laoufi, A. Abbou and M. Akherraz,“Real Time Comparative Analysis of Several Intelligent Speed Controllers Applied to the Direct
Torque Control of Asynchronous Machine,” Proceeding of the Future Technologies Conference (FTC) 2018, Advances in Intelligent
Systems and Computing 881, edited by Kohei Arai, Rahul Bhatia and Supriya Kapoor, Springer Nature Switzerland AG 2019, Vol 2, pp.
797-826, 2019.
Paper Title: Implementation of Link Fingerprint Verification and Data Provenance using RSSI
Abstract: Due to constrained assets and adaptability, security protocol for Internet of Things (IoT) should
be light-weighted. The cryptographic solutions are not possible to apply on little and low-power devices of IoT
in view of their power and space impediments. In this paper, a light-weight protocol to verify the information
and accomplishing information provenance is introduced for multi-hop IoT arrange. The Received Signal
Strength Indicator (RSSI) of conveying IoT nodes are utilized to produce the connection fingerprints. The
connection fingerprints are coordinated at the server to process the relationship coefficient. Higher the
estimation of connection coefficient, higher the rates of verified information move. Lower worth gives the
recognition of ill-disposed node in the middle of a particular connection. Information provenance has
500.
additionally been accomplished by examination of pocket header with all the accessible connection fingerprints
at the server. The time unpredictability is processed at the node and server level, which is O(1). The power 2848-
scattering is determined for IoT nodes and overall network. The outcomes demonstrate that the power utilization 2854
of the framework and time complexity. Exploratory outcomes show that up to 97% connection is accomplished
when no attacker node is available in the IoT network.
Paper Title: Harmonic Mitigation of PV Based Grid-Connected Hybrid System using ANFIS
Abstract: Deriving quality power is the vital problem in power system network. The main focus of the
paper is to reduce the power quality issues mainly the reduction of harmonics using source compensation
technique. This paper proposes a grid integrated hybrid system with ANFIS. This hybrid system mainly consists
of PV panel, inverters, fuel cell, batteries and filters. Based on working principle and characteristics of the
proposed hybrid system, the composite control strategy about active power, reactive power and harmonic
suppression is proposed. The composite control strategy are of two loops ie., a single closed-loop control
response active power and reactive power, double closed-loop control responses harmonics. Both balanced
source condition and unbalanced source condition for three phase system are developed by Simulink model. The
balanced and unbalanced source performance is done by using ANFIS. PI controller and ANFIS are compared
with their Simulink results. Simulation results shows the performance of ANFIS is better than PI controller.
Authors: Iswanto, Nanik Prasetyoningsih, Gendroyono, Guntur Nugroho, Meiyanto Eko Sulistyo
Paper Title: Building The Village of People Become a Healthy and Productive Community
Abstract: Dusun Penggung is one of the Dusun (sub-village) located in Giripurwo village, Girimulyo
district, Kulonprogo regency. The geographical condition, dry soil nd far distance from the city are the main
factors of underdeveloped village. Most of the people work as rice and corn farmers. During the dry season,
there is a decline in agricultural activities because lack of water so that the people leave the farmer works to
raising livestock and cultivating fish. The problem that occurs is the lack of skill in utilizating cattle dung to be
used as soil fertilizer, in fish farming which has a great potential to increase income, in the health sector where
the majority of Dusun Penggung residents work from morning to evening, which should require special attention
on the health. Based on these potentials and problems, building village society to be a healthy and productive
society program was conducted. The objectives of the program are to increase the knowledge and insight on the
use of animal manure as fertilizer, increase understanding of fish farming procedures and productivity by
making proper constructed fish ponds, provide information about various plants that are beneficial to health, and
502. provide knowledge about telang flowers tea and natural dyes to maintain health. The main programs carried out
included the utilization of animal manure, counseling and training on fish farming, counseling and training on 2861-
planting, and utilization of telang flowers tea for health.
2865
Keyword : About four key words or phrases in alphabetical order, separated by commas.
References:
1. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
2. J. Syaftriadi, A. Nur, N. Chamim, R. O. Wiyagi, and R. Syahputra, “LED and Servo Motor Control Via Bluetooth Based on Android
Applications,” Int. J. Recent Technol. Eng., vol. 8, no. 2, pp. 6227–6231, Jul. 2019.
3. A. N. N. Chamim, M. E. Fawzi, R. O. Wiyagi, I. Iswanto, and R. Syahputra, “Control of Wheeled Robots with Bluetooth-Based
Smartphones,” Int. J. Recent Technol. Eng., vol. 8, no. 2, pp. 6244–6247, Jul. 2019.
4. K. Purwanto, I. Iswanto, T. Khristanto, and M. Yusvin, “Microcontroller-based RFID, GSM and GPS for Motorcycle Security
System,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 3, pp. 447–451, 2019.
5. A. N. N. Chamim, M. Heru Gustaman, N. M. Raharja, and I. Iswanto, “Uninterruptable Power Supply based on Switching Regulator
and Modified Sine Wave,” Int. J. Electr. Comput. Eng., vol. 7, no. 3, p. 1161, Jun. 2017.
6. A. N. N. Chamim, D. Ahmadi, and Iswanto, “Atmega16 implementation as indicators of maximum
References:
1. Bahadure NB, Ray AK, Thethi HP (2017) photograph exam for MRI primarily based mind tumor place and highlight extraction using
organically encouraged BWT and SVM. Int J Biomed Imaging 2017, Article identification 9749108, 12 pages
2. Joseph RP, Singh CS, Manikandan M (2014) thoughts tumor MRI picture department and recognition in photo getting prepared. Int J
Res EngTechnol 3, eISSN: 2319-1163, pISSN: 2321-7308
3. Alfonse M, Salem M (2016) A programmed order of cerebrum tumors via MRI the use of bolster vector device. Egypt ComputSci J
40:11–21
4. Coatrieux G, Huang H, Shu H, Luo L, Roux C (2013) A watermarking-based totally completely medicinal picture honesty manage
framework and a photo minute mark for converting portrayal. IEEE J Biomed health inform 17(6):1057–1067
5. Zanaty EA (2012) willpower of darkish problem (GM) and white hassle (WM) quantity in cerebrum attractive reverberation
pics(MRI). Int J ComputAppl 45:16–22
6. Yao J, Chen J, Chow C (2009) Breast tumor exam mainly difference upgraded MRI utilising floor highlights and wavelet exchange.
IEEE J Sel pinnacle signal system 3(1):ninety 4–one hundred
7. Kumar P, Vijayakumar B (2015) thoughts tumor MR image department and affiliation utilizing by way of manner of using PCA and
RBF bit based totally completely help vector device. center East J Sci Res 23(nine):2106–2116
8. Sharma N, Ray A, Sharma S, Shukla adequate, Pradhan S, Aggarwal L (2008) Segmentation and characterization of recuperation snap
shots using ground crude highlights: usage of BAM-kind counterfeit neural device. J Med Phys 33(3):119–126
9. Cui W, Wang Y, Fan Y, Feng Y, Lei T (2013) Localized FCM grouping with spatial information for restorative photo division and
predisposition area estimation. Int J Biomed Imaging 2013, Article identity 930301,eight pages
10. Chaddad A (2015) computerized detail extraction in mind tumor with the aid of attractive reverberation imaging the use of Gau ssian
combination fashions. Int J Biomed Imaging 2015, Article ID868031, 11 pages 11. Sachdeva J, Kumar V, Gupta I, Khandelwal N,
Ahuja CK (2013) Segmentation, highlight extraction, and multi beauty thoughts tumor order. J Digit Imaging 26(6):1141–1150
11. KailashD.Kharat, PradyumnaP.Kulkarni and M.B.Nagori "mind Tumor magnificence using Neural network primarily based
completely definitely strategies" global magazine ofComputerScienceandInformatics, Vol-1, no.4, 2012
12. PankajSapra, Rupinderpal Singh and ShivaniKhurana , "thoughts Tumor Detection the usage of Neural community" ,worldwide
JournalofScienceandModern Engineering, vol.1, no.9, 2013.
13. A.P. Nanthagopal and R.Sukanesh, "Wavelet measurable floor highlights based absolutely branch and order of thoughts figured
tomography images", picture Processing, IET, vol.7, no.1 pp.25 - 32, 2013 [20] .
14. Shaik Salma Begum, Dr.D.Rajya Lakshmi "becoming a member of Wavelet actual floor and intermittent neural device for tumor
identity and order over MRI, international mag of Engineering and superior technology (IJEAT) ISSN: 2249 – 8958, quantity-8,
hassle-6, August 2019. internet page no: 3769-3778. DOI : 10.35940/ijeat.F9388.088619.
Paper Title: A Novel Based Algorithm for the Extraction of Blood Vessels Present In Retina
Abstract: The purpose of tagging and describe about individuals, using the uniqueness and measurable
characteristics of Biometric identifiers. These characteristics are classified as Behavioral versus Physiological.
Information related to shape of body is presented in the characteristics of Physiological biometric identifiers
with example of DNA, iris recognition, hand geometry, palm print, retina, face and fingerprint. Reliable and
stable authentication is providing by the Human retina, so it is also consider as biometric system. In this paper
we proposing a modified algorithm for the measurement and detecting of blood vessels in the retina with the
uses of KNNRF classifier. Extracting the features of input retinal images are matching with the trained features
are classified byusing the KNNRF classifier. For the purpose of classifying clustered blood vessels with high
accuracy, KNNRF method is used.
Keyword : Blood Vessel Identification, Retinal Images, Biometric Authentication, Identification Methods.
References:
1. Sukhpreet Kaur, Kulwinder Singh Mann, “Optimized Technique for Detection of Diabetic Retinopathy using Segmented Retinal
505. Blood Vessels”, 2019 International Conference on Automation, Computational and Technology Management (ICACTM) Amity
University, 2878-
2. Jyotiprava Dash , Nilamani Bhoi , “ Retinal Blood Vessels Extraction from Fundus Images Using an Automated Method”, 4th Int’l
2883
Conf. on Recent Advances in Information Technology | RAIT-2018 |, 978-1-5386-3039 -6/18/$31.00 © 2018 IEEE.
3. Zahra Waheed, M. Usman Akram, Amna Waheed, Arslan Shaukat , “Robust Extraction of Blood Vessels for Retinal Recognition”,
ISBN: 978-1-4673-6988-6 ©2015 IEEE.
4. Saumitra Kumar Kuri, Md. Rabiul Hossain, “Automated Retinal Blood Vessels Extraction Using Optimized Gabor Filter”, 978 -1-
4799-5180-2/14/$31.00 ©2014 IEEE.
5. Murat Ceylan and Hüseyin Yaar , “Blood Vessel Extraction From Retinal Images Using Complex Wavelet Transform and Complex -
Valued Artificial Neural Network”, 978-1-4799-0404-4/13/$31.00 ©2013 IEEE.
6. Guedri Hichem, Jihen Malek , “Generation of New Blood Vessels in the Human Retina with L-System Fractal Construction”, 6th
International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 978-1-4673-
1658-3/12/$31.00 ©2012 IEEE.
7. Chien-Cheng Lee and Shih-Che Ku, “Blood Vessel Segmentation in Retinal Images Based on the Nonsubsampled Contourlet
Transform”, 978-1-4673-2588-2/12/$31.00 ©2012 IEEE.
8. Emine Doğanay 1 , Sadık Kara1,2, Onur Toker1 , Aysegül Güven3 , Ayse Öztürk Öner4, “Extraction of Blood Vessel Centerlines On
Retinal Images”, 978-1-4244-6328-3/10/$26.00 ©2010 IEEE.
9. Haishun Wang, Limin Chen, “A New Approach to Extracting Boundary of Retina Blood Vessel”, 978 -1-4244-1748-3/08/$25.00 ©
2008 IEEE.
10. A. V. Kupriyanov, N. Yu. Ilyasova, M. A. Ananin , “Geometrical Parameters Estimation Of The Retina Images For Blood Vessels
Pathology Diagnostics”, 15th European Signal Processing Conference (EUSIPCO 2007), Poznan, Poland, September 3 -7, 2007,
copyright by EURASIP.
Paper Title: Powering the Next Billion Devices with Iot Security
Abstract: The Internet of Thing (IoT) is the connection of computing devices embedded in everyday
devices to enable them to send and retrieve data. The Internet of Things (IoT) Is an ongoing sample that
broadens the restriction of the internet to comprise a huge collection of processing devices. Associating many
unbiased IoT frameworks via the internet offers severa troubles, with safety being up the the front due to the
truth a massive part of the accrued data might be furnished to a big and regularly hard to apprehend corporation
of spectators. that allows you to make the net of things attainable, the reconciliation of numerous advances is
essential, as an instance, tool-to-tool and virtual bodily frameworks. The manner inside the direction of finding
out IoT programs gives new troubles because it does not actually incorporates ordinary take a look at systems
and strategies. attempting out an IoT framework is based totally upon its the specific setup, and it likewise needs
to think about the system diploma and the system state of affairs. At present, organisation and institute
endeavors are focusing on convenience and network tests, for example, mimicking the earth wherein the device
is to be implemented, and ensuring records is traded in a comfortable manner. in this paper, we make use of the
triumphing model of our IoT degree to perform pressure sorting out of our IoT degree below severa conditions.
507.
Keyword : IoT frameworks via the internet offers severa troubles, 2893-
2900
References:
1 WhatIs.Com, "net of factors (IoT)," IoT time desk, july sixteen. [Online]. accessible:
http://internetofthingsagenda.Techtarget.Com/definition/internet-of-subjects-IoT. [Accessed: 23-Apr-2017].
2 J. Guth, U. Breitenbucher, M. Falkenthal, F. Leymann, and L. Reinfurt, "exam of IoT level models: A subject pay intere st relying on a
reference engineering," 2016, pp. 1–6.
3 P. Scully, "IoT Analytics five topics To recognize approximately The IoT Platform environment," 26-Jan-2016. [Online]. accessible:
https://iot-analytics.Com/five-topics-knowabout-iot-diploma/. [Accessed: 09-May-2017].
4 Hong Kong Polytechnic university, "person and get admission to control (IAM)." [Online]. to be had: https://www.Polyu.Edu.Hk/ags/e-
e-e-newsletter/news0911/I AM_details.Html. [Accessed: 23-Apr-2017].
5 Symantec safety response, "IoT gadgets being gradually implemented for DDoS attacks," Symantec safety response, 22-Sep-2016.
[Online]. on hand: http://www.Symantec.Com/associate/web journals/iot-devicesbeing-progressively carried out ddos-assaults.
[Accessed: 09-May-2017].
6 Gartner Says the net of factors installed Base Will growth to 26 Billion gadgets through 2020; Gartner Inc.: Stamford, CT, americaA.,
2013.
7 MobilityFirst future net shape. to be had at the internet: http://mobilityfirst.Winlab.Rutgers.Edu/(had been given to on 19 June 2017).
8 EXpressive net shape. available at the internet: https://www.Cs.Cmu.Edu/~xia/(were given to on 19 June 2017).
9 Named statistics Networking. available at the net: http://named-facts.net/(were given to on 19 June 2017).
10 Cloud destiny net shape project. available on the internet: http://cloud fia.Org (had been given to on 19 June 2017).
Keyword : Peer teaching, peer to peer learning, teaching by simulation models, peer group learning, peer
teaching for higher education
509.
References: 2907-
1. Bulte, C., Betts, A., Garner, K. & During, S. (2007), “Student teaching: views of student near-peer teachers and learners”. Medical 2913
Teacher. Vol.29, No.6, pp. 583-590.
2. Gunderson.DE, and Moore. J. D (2008), “Group Learning Pedagogy and Group Selection”, International Journal of Construction
Education and Research, Vol.4, No.1, pp. 34-45
3. West, J. (2017), “Becomming an Effective Peer Assisted Learning (PAL) Leader”. Journal of Geography in Higher Education, Vol.3,
pp. 459-465.
4. Bradford-Watts, K. (2011), “Students teaching students? Peer teaching in the EFL classroom in Japan” THE LANGUAGE
TEACHER: Vol.35, No.5, September / October issue, pp. 31-35
5. Cherif. HA. (1993), “Peer Teaching in Small Group Setting” Forward to Excellence, Vol.1, pp.5-6
6. Goldschmid, Barbara, and Goldschmid, Marcel L. (1976), "Peer Teaching in Higher Education: A Review." Higher Education, Vol. 5,
No.1, pp. 9-33.
7. Elise J. Dallimore, P. J. (2017, March 27), Faculty Focus. Retrieved from https://www.facultyfocus.com/articles/effective-teaching-
strategies/students-learn-participation-class-discussion/
8. Samantha, W. (2011), “Reflections on Experiencial Teaching Methods: Linking the class room to practice”. Journal of Teaching in
Social Work,Vol. 31, No.5, pp. 493-504
9. Hall S, Stephens J, Andrade T, Davids J, Powell M, Border S. (2014), “Perceptions of junior doctors and undergraduate medical
students as anatomy teachers: investigating distance along the near-peer teaching spectrum” Anat Sci Educ, Vol 7, pp. 242-247.
10. Lockspeiser T, O’Sullivan P, Teherani A, Muller J. (2008), “Understanding the experience of being taught by peers: the value of
social and cognitive congruence”. Adv Health Sci Educ Vol.13, No.3, pp.361–372.
11. Erie A, Starkman. S, Pawlina W, Lachman N. (2013), “Developing medical students as teachers: an anatomy-based student-as-teacher
program with emphasis on core teaching competencies”. Anat Sci Educ, Vol.6, No.6, pp.385–392.
12. Davis, B. (2009). Tools for teaching. (2nd ed.) CA: Jossey-Bass.
13. Bargh, John A., and Schul, Yaakov. (1980), "On the Cognitive Benefits of Teaching." Journal of Educational Psychology, Vol. 7 2,
No. 5, pp.593 -604.
14. Benware, Carl A., and Deci, Edward L. (1984), "Quality of Learning with an Active Versus Passive Motivation Set." American
Educational Research Journal, Vol 21, No. 4, pp. 755-66.
15. Rajkumar Pillay, S. (2017), “Orchestrating Teaching Business Statistics: A Methodology for Chi-square Test”. International Journal
of Applied Business and Economics Research,Vol.15
Paper Title: Technology for Sustainable HRM: An Empirical Research of Health Care Sector
Abstract: In a highly competitive world of today characterised by VUCA (Volatility Uncertainty
Complexity and Ambiguity) environment organizations are striving to achieve excellence with standard business
practices. Given the international mantra of cost quality & service companies need to adopt technology in a
proactive manner by collaborating with IT department. Traditionally HR and IT have operated as distinct units.
But with the changing times there is an urgent need to adopt technology for improving the productivity of human
resources thereby contributing to the sustainable organizational development. So a close collaboration between
these two departments is called for.
Some of the HR professionals assume that technology will fix all their problems i.e. By moving to cloud the
outdated HR operating model and disconnected data sourcing issues will get resolved. But HR professionals will
be committing a grave mistake if they think that the technology will be a panacea to all HR problems. In other
words, the key is about how the technology is applied and not the acquisition of technology.
In the prevailing competitive environment there is every need to understand appreciate the behaviour of the
employees so that required initiatives could be taken for obtaining outstanding performance from these valuable
human resources. In this regard technological tools like HR Analytics(HRA) Artificial Intelligence (AI) come
very handy for getting valuable insights into human behaviour. Further application of these tools helps in
effective decision making thereby contributing to the accomplishment of organization goals. Application of
HRA and AI apart from facilitating decision making also helps in integrating Human Resource with other
business activities.
The paper focusses on understanding how HR analytics helps in sustainable human resource management by
511. providing insights into elementary HR processes and behaviours. It also correlates well with current HRA/AI
trends in general and health care sector in particular. Needless to say this will be a ready reference for any future 2919-
study into role of data analytics/Artificial intelligence in Human Resource Management. 2924
Keyword : Sustainability HR Analytics Health Care Sector Data Management Artificial Intelligence
Algorithms Technology for Sustainable HRM: An Empirical Study of Healthcare Sector.
References:
1. Boudreau J.W. Ramstad P.M. (2005) Talentship talent segmentation and sustainability: a new HR decision science paradigm for a new
strategy definition. Human Resource Management 44(2):129–136
2. Marler, J. H., & Boudreau, J. W. (2017). An evidence-based review of HR Analytics. The International Journal of Human Resource
Management, 28(1), 3-26.
3. Fitz-Enz J. The new HR analytics – Predicting the economic value of your company’s human capital investments American
Management Association 2010
4. Fitz-Enz J. The ROI of Human Capital – Measuring the economic value of employee performance Amacom New York 2000
5. Davenport, T. H., & Dyché, J. (2013). Big data in big companies. International Institute for Analytics, 3.
6. https://blog.riverlogic.com/prescriptive-analytics-22-things-the-experts-are-saying-about-analytics-rising-star,Accessed on 18 October:
Time- 5:30 PM
7. https://www.dezyre.com/article/types-of-analytics-descriptive-predictive-prescriptive-analytics/209,Accessed on 18 October,2019:
Time 5:30 PM
8. Hora, M. T., Bouwma-Gearhart, J., & Park, H. J. (2017). Data driven decision-making in the era of accountability: Fostering faculty
data cultures for learning. The Review of Higher Education, 40(3), 391-426.
9. https://www.persolkelly.com/page/resources-news-platform/2019-apac-workforce-insights/Accessed on 18.9.2019 4:30 PM
10. Brewster C. (2002) Human resource practices in multinational companies. In: Martin J.G. Karen L.N. (eds) The Blackwell handbook of
cross-cultural management. Blackwell Oxford pp. 126–141
11. Gobble Mary Anne M. Research Technology Management. Sep2017 Vol. 60 Issue 5 p59-61. 3p. DOI:
10.1080/08956308.2017.1348143. Database: Entrepreneurial Studies Source
12. Kramar Robin. International Journal of Human Resource Management. 2014 Vol. 25 Issue 8 p1069-1089. 21p. 2
13. Marler Janet H. Fisher Sandra L. Human Resource Management Review. Mar2013 Vol. 23 Issue 1 p18-36. 19p. DOI:
10.1016/j.hrmr.2012.06.002
14. Robert J. Zaugg Adrian Blum Norbert Thom. Berne: Sustainability in Human Resource Management IOP-Press 2001 ISBN 3-906471-
48-9
Paper Title: M-Denclue for Effective Data Clustering in High Dimensional Non-Linear Data
Abstract: Clustering is a data mining task devoted to the automatic grouping of data based on mutual
similarity. Clustering in high-dimensional spaces is a recurrent problem in many domains. It affects time
complexity, space complexity, scalability and accuracy of clustering methods. High-dimensional non-linear
datausually live in different low dimensional subspaces hidden in the original space. As high‐dimensional
objects appear almost alike, new approaches for clustering are required. This research has focused on developing
Mathematical models, techniques and clustering algorithms specifically for high‐dimensional data. The innocent
growth in the fields of communication and technology, there is tremendous growth in high dimensional data
spaces. As the variant of dimensions on high dimensional non-linear data increases, many clustering techniques
begin to suffer from the curse of dimensionality, de-grading the quality of the results. In high dimensional non-
512. linear data, the data becomes very sparse and distance measures become increasingly meaningless. The principal
challenge for clustering high dimensional data is to overcome the “curse of dimensionality”. This research work 2925-
concentrates on devising an enhanced algorithm for clustering high dimensional non-linear data. 2927
Keyword : Clustering, High Dimensional Non Linear Data, curse of dimensionality, Mathematical models.
References:
1. A. Hinneburg and D. A. Keim, “Optimal grid clustering: Towards breaking the curse of dimensionality in high dimensional clustering,”
In Proceedings of 25th International Conference on Very Large Data Bases (VLDB-1999), pp. 506-517.
2. Charles Bouveyron, Stephane Girard, et al., “High Dimensional Data Clustering”, Computational Statistics and Data Analysis 52, 1
(2007) 502-519.
3. E. Müller, S. Günnemann, I. Assent and T. Seidl (2009), “Evaluating clustering in subspace projections of high dimensional data”, In
Proc. of the Very Large Data Bases Endowment, Volume 2 issue 1, pp. 1270-1281.
4. P. Lance, E. Haque, and H. Liu (2004), “Subspace clustering for high dimensional data: A review”, ACM SIGKDD Explorations
Newsletter, Vol. 6 Issue 1, pp 90–105.
Authors: S.China Venkateswarlu, N.Uday Kumar, N.Sandeep Kumar, Aannam Karthik, V.Vijay
Paper Title: Implementation of Area optimized Low power Multiplication and Accumulation
Abstract: There is number of computations involved at every stage in Digital Signal Processing (DSP). At
every stage of computation we have addition and multiplication of the terms derived from previous and presents
stages. The general computation incorporates the use of normal multiplication and addition, but the circuitry of
normal multiplication and addition is lethargic i.e., it consumes more space on chip, consumes more power and
the speed of computation is also low.These drawbacks can be avoided by switching to proposed method called
Multiplication and Accumulation (MAC). Aim of this project is to develop an Area optimized Low power digital
circuit for MAC (Multiply and Accumulate) operation. We develop the Verilog Hardware Description Language
code for the various implementations of the MAC (Multiply and Accumulate) that is we try to avoid using
multipliers and prefer to use the combinational circuits like multiplexers. These Verilog HDL codes will be
simulated to check the functionality. Once we get the expected results we go for the implementation of the
digital circuits. We analyze all the MAC digital circuits to find out the best digital circuit which consumes
minimum area and power. The importance of MAC in FPGA designs is explained by some filter designs. We
also give some suggestions on the system level solutions based on the MAC.
513.
Keyword : Multiplier Accumulator Unit, Digital Signal Processing, Embedded Systems Algorithmic Noise 2928-
Tolerant , Replica Redundancy Block 2932
References:
1 Pratap Kumar Dakua, Anamika Sinha, Shivdhari&Gourab,“Hardware Implementation of MAC unit,” International Journal of
Electronics Communication and Computer Engineer ing, vol. 3, 2012.
2 M.Jeevitha, R.Muthaiah, P.Swaminathan, “Review Article: Efficient Multiplier Architecure in VLSI Design,” Journal of Theoretical and
Applied Information Technology, vol. 38, no. 2, April 2012.
3 Ravi Shankar Mishra, PuranGour, Braj Bihari Soni, “Design and Implements of Booth and Robertson’s multipliers algorithm on
FPGA,” International Journal of EngineeringResearch and Applications, Vol. 1, Issue 3, pp. 905-910, 2011.
4 Tung Thanh Hoang, Magnus Själander, Per LarssonEdefors, “A High-Speed, Energy-Efficient Two-Cycle Multiply-Accumulate (MAC)
Architecture and Its Application to aDouble-Throughput MAC Unit,” IEEE transactions on Circuits & Systems, vol. 57, no. 12, pp.
3073-3081, Dec. 2010.
5 A. Abdelgawad, MagdyBayoumi, “High Speed andArea-Efficient Multiply Ac cumulate (MAC) Unit for DigitalSignal Prossing
Applications,” IEEE International Symposium on Circuits &Systems , pp. 3199 – 3202, 2007.
6 Berkeley Design Technology, Inc., “Choosing a DSP Processor,” World Wide Web, http://www.bdti.com/articles/choose_2000.pdf,
2000.
7 Jennifer Eyre and Jeff Bier, “The Evolution of DSP Processors”, Berkeley Design Technol
ogy,Inc.,http://www.bdti.com/articles/evolution.pdf, 2000.
Keyword : Programmable Interface Controller, Arduino AT mega board, IV drip bottles; 2933-
2936
References:
1 Pradeep kumar k,”Autonomous intravenous infusion system & health monitoring “published in asar international conference,may -2014.
2 Paul Bustamante,” A new wireless sensor for intravenous dripping detection”Publised in International Journal on Advances in Networks
and Services (IJANS), vol.3, 2010.
3 Ram kumar.S,”Remote monitoring the glucose bottle level in hospitals” Published in International Conference on Emerging Trends in
Application of Computing (ICETAC), 2017.
4 C.S.Sundar Ganesh, “automatic indication system of glucose level in glucose trip bottle ”Published in International Journal Of
Multidisciplinary Research and Modern Education(IJMRME) vol.3,2017.
5 Arjun udayan,”A survey on automatic flow control in drip “Published in International Journal OF Advanced Research in Electrical,
Electronics and Instrumentation Engineering (IJAREEIE), vol.5, March 2016.
6 Bailey Flynn, Matthew Matthew Nojoomi, Michael Pan, Kamal Shah, Erica Skerrett, “IV DRIP: Intravenous Dehydration Relief in
Pediatrics”, instituteof global health technology.
7 K.J. K.J. Ayala, “The 8051 Microcontroller “, 3rd Edition, Microcontrollers Pros Corporation, 2004. 5. simon monk, “programming
arduino”.
8 www.circuitstoday.com
Paper Title: A Research on an Efficient Cloud Scheduling with a Geo Microarray Data Set
Abstract: Investigations on micro-array organisms for various researches have made a non discrete dealing
of thousands of gene expressions achievable. For any applications, the results would be more accurate only when
maximum count is analyzed within a predictable time and it is one of the unseen challenges in the field of bio
medicine. The purpose of this data analysis is to regulate and control the activities of thousands of genes in our
body. This paper develops a scheduling analysis of how effectively gene molecular patterns are taken into
experimentation. This motivated our investigation in a new dimension for a cloud environment. This paper is
about applying our previous works such as Workflow Shuffling and Hole Filling Algorithm (WSHF) [13],
Agent Centric Enhanced Reinforcement learning algorithm (AGERL) [14], Heuristic Flow Equilibrium based
Load Balancing (HFEL) [15] and Dynamic Resource Provisioning and Load Balancing (DRBLHS) [16]
algorithms collaboratively for a Gene Express Omnibus dataset as a case study. The gene data’s plays an
important role in monitoring the human activities and how well, the data has been processed in the cloud with
minimum budget, time and minimum virtual machines. Finally, the efficiency of the system is analyzed in terms
of resource utilization, completion time, response time, throughput and VM Migration time.
Keyword : Cloud Provider, Execution Process, WSHF, AGERL, HFEL, DRBLHS, Gene Expression
Omnibus Dataset, Resource Utilization, Workflow Completion Time, Response Time, Throughput and VM
Migration Time
References:
1. James Broberg, Rajkumar Buyya & Zahir Tari, (2009) “MetaCDN: Harnessing ‘Storage Clouds’ for high performance content delivery”,
Journal of Network and Computer Applications, Vol. 32, No. 5, pp 1012-1022.
516. 2. Kapil Kumar Gupta, Baikunth Nath & Ramamohanarao Kotagiri, (2010) “Layered Approach using Conditional Random Fields for
Intrusion Detection”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, pp 35-49. 2946-
3. Gengbin Zheng, Esteban Meneses, Abhinav Bhatele & Laxmikant V Kale, (2010) “Hierarchical Load Balancing for Charm++
Applications on Large Supercomputers”, In Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, 2952
San Diego, CA, USA, pp. 436-444.
4. Ioan Raicu, Ian Foster & Yong Zhao, (2008) “Many-Task Computing for Grids and Supercomputers”, In proceedings of 2008 Workshop
on Many-Task Computing on Grids and Supercomputers, Austin, TX, USA.
5. Ewa Deelman, Gurmeet Singh, Miron Livny, Bruce Berriman & John Good, (2008) “The Cost of Doing Science on the Cloud: The
Montage Example”, In Proceedings of the 2008 ACM/IEEE conference on Supercomputing, Austin, TX, USA, pp 1-12.
6. James Dinan, Brian Larkins D, Sadayappan P, Sriram Krishnamoorthy & Jarek Nieplocha, (2009) “Scalable Work Stealing”, In
Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, Portland, Oregon.
7. ]Ioan Raicu, (2009) “Many-Task Computing: Bridging the Gap between High Throughput Computing and High Performance
Computing”, Computer Science
Department, University of Chicago, Doctorate Dissertation.
8. Laxmikant V Kalé, (1988) “Comparing the Performance of Two Dynamic Load Distribution Methods”, In Proceedings of the 1988
International Conference on Parallel Processing, pp 8-11.
9. National Center for Biotechnology Information, U.S. National Library of Medicine 8600 Rockville Pike, Bethesda MD, 20894 USA.
10. https://www.ncbi.nlm.nih.gov/geo/info/datasets.html.
11. Suraj Pandey, William Voorsluys, Mustafizur Rahman, Rajkumar Buyya, J Dobson & Kenneth Chiu, (2009) “A Grid Workflow
Environment for Brain Imaging Analysis on Distributed Systems”, Concurrency and Computation Practice and Experience, Vol. 21, No.
16, pp 2118-2139.
12. Lavanya Ramakrishnan, Shane Canon, Krishna Muriki, Iwona Sakrejda, & Wright N J, (2011) “Evaluating Interconnect and
Virtualization Performance for High Performance Computing”, ACM SIGMETRICS Performance Evaluation Review, Vol. 40, No. 2.
13. Selvi S & Kalaavathi B, (2017) “Reducing Rejected Workflows using WSHF Algorithm in Cloud”, Asian Journal of Research in Social
Sciences and Humanities, Vol. 7, No. 3. pp 397-405.
14. Selvi S & Kalaavathi B, (2016) “AGERL Based Enhanced Map Reduce Technique in Cloud Scheduling”, SSRG International Journal of
Computer Science and Engineering (IJCSE), Vol. 3, No. 10, pp 60-65.
15. Selvi S & Kalaavathi B, (2016) “Enhanced Scheduling Approach Using Heuristics Flow Equilibrium Based Load Balancing Algorithm
in Cloud”, International Journal of Control Theory and Applications (IJCTA), Vol. 9, No. 2, pp 1023-1034.
16. Selvi S & Kalaavathi B, (2016) “Mutlilayer Intensive Resource Allocation in Cloud Using Leftist Heaps with VM Migration”,
International Journal of Printing, Packaging & Allied Sciences, Vol. 4, No. 4, pp 2763-2775.
517. Paper Title: Research on Power Efficient Clock Distribution Schemes for Switching Converters
Abstract: Trends in VLSI technology represents bottleneck for the future high performance computing 2953-
architectures as the ratio of the power pins to the total package pins keeps on increasing. A viable solution to this 2957
is bottleneck is to have final power consumption on-chip. Switched Capacitor DC-DC Converters are the most
preferred for on-chip power conversion. However, as the number of power conversion modules increases and
they get distributed across the chip area, clock distribution for the switched capacitor converters becomes a non-
trivial task and the increased interconnect lengths cause clock degradation and power dissipation. This paper
presents a power efficient signaling topology for driving the clocks to higher interconnect lengths.
Keyword : System Spam, online informal organizations, online web based life.
References:
1. Piera. E.-P. Lim, V.-A.Nguyen, N. Jindal, B. Liu, and H, W. Lauw.Detecting product review spammers using rating behaviors.In ACM
521. CIKM, 2010.
2. A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral
footprints.In ACM KDD, 2013. 2971-
3. S. Xie, G. Wang, S. Lin, and P. S. Yu. Review spam detection via temporal pattern discovery. In ACM KDD, 2012. 2975
4. G. Wang, S. Xie, B. Liu, and P. S. Yu. Review graph based online store review spammer detection. IEEE ICDM, 2011.
5. Y. Sun and J. Han. Mining Heterogeneous Information Networks; Principles and Methodologies, In ICCCE, 2012.
6. A. Mukerjee, V. Venkataraman, B. Liu, and N. Glance. What Yelp Fake Review Filter Might Be Doing?, In ICWSM, 2013.
7. S. Feng, L. Xing, A. Gogar, and Y. Choi.Distributional footprints of deceptive product reviews.In ICWSM, 2012.
8. A. j. Minnich, N. Chavoshi, A. Mueen, S. Luan, and M. Faloutsos. Trueview: Harnessing the power of multiple review sites. In ACM
WWW, 2015.
9. B. Viswanath, M. Ahmad Bashir, M. Crovella, S. Guah, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Towards detecting
anomalous user behavior in online social networks.In USENIX, 2014.
10. H. Li, Z. Chen, B. Liu, X. Wei, and J. Shao. Spotting fake reviews via collective PU learning.In ICDM, 2014.
11. Kayiram Kavitha, Polsani Rajashree Rao, Sreeja Tummala, Gajarla Vasavi, and Dr.R.Gururaj, Dual Tree Data Routing Scheme for
Wireless Sensor Networks, Third International Conference on Advances in Information Technology and Mobile Communication, AIM
-2013, 26-27, April 2013, Bangalore, India.
12. Kayiram Kavitha, Vinod Pachipulusu, Sreeja Thummala, R.Gururaj. Article: Energy Efficient Query Processing for WSN based on
Data Caching and Query Containment, in International Journal of Computer Applications, Vol. 89, no. 19, Page no. 4 -8, March 2014,
Published by Foundation of Computer Science, New York, USA.
13. Sharma D, Kavitha K, Gururaj R. Article: Estimating Node Density for Redundant Sensors in Wireless Sensor Network, in
International Journal of Sensor Networks and Data Communications, Vol.4, Issue 2 no.127, November 2015, Published by OMICS
International.
14. R.V.S.Lalitha, K.Kavitha, N.V.Krishna Rao, G.Rama Mounika, V.Sandhya, Smart surveillance using Smart doorbell, International
Journal of Innovative Technology and Exploring Engineering, Volume-8, Issue-8 June, 2019.
Keyword : Read aloud strategies, reading comprehension, inferential reading skills, text difficulties .
References:
1. Al-Mansour, N. S., & Al-Shorman, R. e. A. (2011). The effect of teacher’s storytelling aloud on the reading comprehension of Saudi
elementary stage students. Journal of King Saud University - Languages and Translation, 23(2), 69-76.
doi:10.1016/j.jksult.2011.04.001
2. Al-Nujaidi, A. H. (2003). Relationship Between Vocabulary Size, Reading Strategies, and Reading Comprehension of Efl Learners in
Saudi Arabia. Oklahoma State University,
3. Alsamadani, H. A. (2008). The relationship between Saudi EFL college-level students' use of reading strategies and their EFL reading
comprehension. Ohio University,
4. Alshehri, M. (2014). Improving reading comprehension for Saudi Students by using the Reading Aloud Strategy.
5. Andersson, B. V., & Barnitz, J. G. J. J. o. r. (1984). Cross-cultural schemata and reading comprehension instruction. 28(2), 102-108.
523.
6. Berardo, S. A. J. T. r. m. (2006). The use of authentic materials in the teaching of reading. 6(2).
7. Birch, B. M. (2014). English L2 reading: Getting to the bottom: Routledge. 2983-
8. Bolos, N. J. M. S. J. (2012). Successful strategies for teaching reading to middle grades English language learners: teachers can employ 2989
a variety of classroom-tested strategies to teach reading to English language learners. 44(2), 14-20.
9. Brantmeier, C. J. T. R. M. (2002). Second language reading strategy research at the secondary and university levels: Variatio ns,
disparities, and generalizability. 2(3).
10. Eason, S. H., Goldberg, L. F., Young, K. M., Geist, M. C., & Cutting, L. E. (2012). Reader–text interactions: How differential text and
question types influence cognitive skills needed for reading comprehension. Journal of educational psychology, 104(3), 515.
11. Fareed, M., Ashraf, A., Bilal, M. J. J. o. E., & Sciences, S. (2016). ESL learners’ writing skills: Problems, factors and sug gestions. 4(2),
81-92.
12. Gibson, S. J. E. j. (2008). Reading aloud: a useful learning tool? , 62(1), 29-36.
13. Hall, C. S. J. E. P. R. (2016). Inference instruction for struggling readers: A synthesis of intervention research. 28(1), 1-22.
14. Hamouda, A. J. I. J. o. A. R. i. P. E., & Development. (2013). An investigation of listening comprehension problems encounter ed by
Saudi students in the EL listening classroom. 2(2), 113-155.
15. Hansen, J. J. T. R. T. (1981). An inferential comprehension strategy for use with primary grade children. 34(6), 665 -669.
16. Hartati, S. (2017). Self-Concept of Kindergarten Teachers about Implementation of Classroom Action Research. Paper presented at the
International Conference of Early Childhood Education (ICECE 2017).
17. Ionkov, G. M., Harding, D. H., Dykstra, A. J., Grit, L. E., Petts, J. C., Minter, S. A., . . . Xi, Y. (2014). Reading materia l suggestions
based on reading behavior. In: Google Patents.
18. Ionkov, G. M., Harding, D. H., Dykstra, A. J., Grit, L. E., Petts, J. C., Minter, S. A., . . . Xi, Y. (2019). Reading materia l suggestions
based on reading behavior. In: Google Patents.
19. Johnston, V. J. T. O. C. J. (2015). The power of the read aloud in the age of the common core. 9(1).
20. Kaliyadan, F., Thalamkandathil, N., Parupalli, S. R., Amin, T. T., Balaha, M. H., & Ali, W. H. A. B. J. A. j. o. m. (2015). E nglish
language proficiency and academic performance: A study of a medical preparatory year program in Saudi Arabia. 5(4), 140.
21. Kispal, A. (2008). Effective Teaching of Inference Skills for Reading. Literature Review. Research Report DCSF-RR031: ERIC.
22. Lane, H. B., & Wright, T. L. J. T. R. T. (2007). Maximizing the effectiveness of reading aloud. 60(7), 668-675.
23. Lotfipour-Saedi, K. J. I. J. o. L. T. R. (2015). Suggestions toward Some Discourse-Analytic Approaches to Text Difficulty: With
Special Reference to" T-Unit Configuration" in the Textual Unfolding. 3(1), 1-18.
24. Minskoff, E. (2005). Teaching Reading to Struggling Learners: ERIC.
25. Morgan, P. L., & Fuchs, D. J. E. c. (2007). Is there a bidirectional relationship between children's reading skills and reading
motivation? , 73(2), 165-183.
26. Ness, M. K. J. R. H. (2016). Reading comprehension strategies in secondary content area classrooms: Teacher use of and attitudes
towards reading comprehension instruction. 49(2), 5.
27. Pearson, P. D. J. T. R. T. (1985). Changing the face of reading comprehension instruction. 38(8), 724-738.
28. Teo, A., Jen, F. J. L. L., & Technology. (2012). Promoting EFL students’ inferential reading skills through computerized dynamic
assessment. 16(3), 10-20.
29. Trelease, J. (2013). The read-aloud handbook: Penguin.
30. Van den Broek, P., Lorch, R. F., Linderholm, T., Gustafson, M. J. M., & Cognition. (2001). The effects of readers’ goals on inference
generation and memory for texts. 29(8), 1081-1087.
31. Walczyk, J. J., Marsiglia, C. S., Bryan, K. S., & Naquin, P. J. J. J. o. E. P. (2001). Overcoming inefficient reading skills. 93(4), 750.
32. Wixson, K. K., & Valencia, S. W. J. T. R. T. (2014). CCSS‐ELA suggestions and cautions for addressing text complexity. 67(6), 430-
434.
33. Zieffler, A., Garfield, J., Delmas, R., & Reading, C. J. S. E. R. J. (2008). A framework to support research on informal infe rential
reasoning. 7(2).
Paper Title: Implementation of GUI for Class Attendance Using Face Detection and Recognition System
Abstract: In present years, improvements are made in teaching learning process by using digital systems.
Class attendance is a indicator of student attentiveness, participation in academics and the interest the teacher
creates in a particular subject. Quantitative analysis are carried out worldwide to understand the drop out
percentage. Manual attendance may be a erroneous, time consuming process in which favour can also be done to
a certain extent marking fake attendance. In this paper we propose a cost effective method to understand the
attendance pattern of a student by use of face detection and recognition system where many features like lips,
nose, iris etc. are distinct and data captured needs good computational analysis for recognition. In this paper we
525. propose an automated class attendance system by creating a simple and user friendly GUI using LabVIEW
software. The usefulness of this system will ensure error free attendance and will improve the teaching learning 2993-
process by increase in lecture time and monitoring class attendance efficiently. 2996
526. Keyword : Encryption; Decryption; Industrial IoT; Embedded Systems; Wastewater Treatment.
References: 2997-
1. Hess T.G.D., Hornberger, G.M., and Worland, S. (2019) ‘Water Security in Practice: The quantity-quality-society nexus’, Water 3002
Security, Vol. 6, pp. 1-6.
2. Hellaoui, H., Koudil M., and Bouabdallah, A. (2017) ‘Energy-Efficient mechanisms in security of the Internet of Things: A Survey’,
Computer Networks, Vol. 127, pp. 173-189.
3. Zarpelao, B.B., Miani, R.S., Kawakani C.T., and Carlisto de Alvarenga, S. (2017) ‘A Survey of Intrusion detection in Internet of
Things’, Journal of Network and Computer Applications, Vol. 84, pp. 25-37.
4. Usman, M., Ahmed, I., Aslam, M.I., Khan S., and Shah, U.A. (2017) ‘SIT: A Lightweight Encryption Algorithm for Secure Interne t of
Things’, International Journal of Advanced Computer Science and Applications, Vol. 8, pp. 1-10.
5. Ouaddah, A., Mousannif, H., Elkalama A.A., and Ouahman, A.A. (2017) ‘Access control in the Internet of Things: Big challenges and
new opportunities’, Computer Networks, Vol. 112, pp. 237-262.
6. D. Aakash and P. Shanthi, (2016) ‘Lightweight Security Algorithm for Wireless Node Connected with IoT’, Indian Journal of Science
and Technology, Vol. 9, pp. 1-8.
7. Airehrour, D., Gutierrez J., and Ray, S.K. (2016) ‘Secure routing for Internet of Things: A Survey’, Journal of Network and C omputer
Applications, Vol. 66, pp. 198-213.
8. Malina, L., Hajny, J., Fujdiak R., and Hosek, J. (2016) ‘On perspective of Security and Privacy-preserving Solutions in the Internet of
Things’, Computer Networks, Vol. 102, pp. 83-95.
9. Alcaraz, C., Roman, R., Najera P., and Lopez, J. (2013) ‘Security of Industrial Sensor Network-based remote substations in the context
of the Internet of Things’, Ad-Hoc Networks, Vol. 11, pp. 1091-1104.
10. Roman, R., Zhou J., and Lopez, J. (2013) ‘On the features and challenges of Security and Privacy in distributed Internet of T hings’,
Computer Networks, Vol. 57, pp. 2266-2279.
11. Zohraa, H.F., Mahmouda, B.,and Luc, D. (2012) ‘Vulnerability Assessment of Water Supply Network’, Energy Procedia, Vol. 18, p p.
772-783.
12. Jin-cui, Y.,and Bin-xing, F. (2011) ‘Security model and Key technologies for the Internet of Things’, The Journal of China Universities
of Posts and Telecommunications, Vol. 18, pp. 109-112.
Paper Title: Content Based Image Retrieval Using Transform Domain Features and Algorithms
Abstract: In this paper, Content Based Image Retrieval using Transform domain features and algorithms
has been implemented. The image can be decomposed by Discrete Wavelet Transform (DWT) to extract the
features based on DC coefficients. Each sub-image is calculated by mean, variance and standard deviation to get
more efficient recognition. The database image also applied in the domain of Stationary Wavelet Transform
(SWT) and Integer Wavelet Transform (IWT) by using different distance measures. The proposed algorithm is
the combination of DWT, SWT and IWT has been implemented using COREL database. This proposed method
has more efficient recognition and less computational time over existing methods
Keyword : Content Based Image Retrieval, Discrete Wavelet Transform, Stationary Wavelet Transform and
Integer Wavelet Transform.
References:
528. 1. Mohd. Aquid Ansari, Manish Dixit. "An enhanced CBIR using HSV quantization, discrete wavelet transform and edge histogram
descriptor", 2017 International Conference on Computing, Communication and Automation (ICCCA), 2017S. 3008-
2. Yogita Mistry, D.T. Ingole, M.D. Ingole. "Content based image retrieval using hybrid features and various distance metric",
Journal of Electrical Systems and Information Technology, 2017.
3011
3. "CBIR system using color moment and color auto-correlogram with Block Truncation coding". Vandana Vinayak, Sonika Jindal,
Computer Science & Engineering, SBSSTC, Ferozepur D975-8887 Volume 161, March 2017.
4. N. S. Vhang and K. S. Fu, "Query by pictorial example, "IEEE Trans. On Software Engineering, Vol. 6, November, PP 519 -524,
1980.
5. Sumaira Muhammad Hayat Khan, Ayyaz Hussain, Imad Fakhri Taha Alshaikhli. "Comparative Study on Content-Based Image
Retrieval (CBIR)", 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2012.
6. Amit Singla, Meenakshi Garg, "CBIR Approach Based On Combined HSV, Auto Correlogram, Color Moments an d Gabor
Wavelet", International Journal Of Engineering And Computer Science, 2014.
7. Bin Wang, Sheng Tang, Ruizhen Zhao, Wu Liu, Yigang Cen. "Pedestrian detection based on Region Proposal Fusion", 2015
IEEE 17th International Workshop on Multimedia Signal Processing (MMSP), 2015
8. Madhav, B.T.P, M. Venu Gopal Rao, and V.G.K.M Pisipati. "Multispectral correlations technique for finding phase transition
temperatures in 7O.Om series", Liquid Crystals Today, 2015.
9. Vipin Tyagi. "Content-Based Image Retrieval", Springer Nature, 2017.
10. Kusetogullari, Huseyin, Mark S. Leeson, Burak Kole, and Evor L. Hines. "Meta-heuristic algorithms for optimized network flow
wavelet based image coding", Applied Soft Computing, 2013.
Paper Title: Research of Channel Capacity of Acoustic Communication Network for Oceanographic Applications
Abstract: In comparison with terrestrial wireless network, underwater communication network for any
oceanographic applications have only a few tens of communication nodes. Researchers recently discussed
elaborately on network parameters like SNR, throughput, Power optimization etc. However, the variation in
finding the optimal frequencies and related bandwidth and its channel capacity with different modelling
technique needs specific attention. From the detailed analysis, the optimization of system model also depends on
location & distance. Therefore, the research aims to realize a research model in line with the above challenges.
Summary relieves that results are very encouraging for any underwater acoustic applications.
Authors: Varsha Prem, B.Gurugnanam, Sulochana Shekhar and Sorna Chandra Devadass C
Spectral Library Creation of Garnet in Kadavur Basin, Karur District, Tamil Nadu, India – A Lab-
Paper Title:
Based Spectral Library Creation
Abstract: The significance of the study is to create a spectral library for the mineral Garnet. The spectra for
Garnet created in the darkroom environment for the study. The laboratory spectra created matched with the
USGS spectral library and made confirmation for the spectra. For the spectral resampling and spectral matching,
ASTER data used as the reflectance file. The wavelength of the laboratory spectra is between 0.556 to 2.4
micrometres. The highest reflectance spectral curve of the laboratory spectra shows 1.00 reflectance value and
the wavelength is 0.807 μm. The USGS spectra also indicate the same value and wavelength. The absorption
value changes in lab spectra at 0.57 reflectance value at the wavelength of 1.65 μm. The USGS spectra display
0.506 absorption value at the same wavelength of the laboratory spectra. The USGS spectra of the Garnet shows
that the Garnet collected from the study area is Spessartine garnet. The laboratory spectral library thus created
can be used for the mineral identification and also the spectral library thus created can use for further studies.
Keyword : Garnet, USGS Spectral Library, Laboratory spectral library, spectral library, spectral resampling.
532.
References:
1. Kumara Ganesh, U & Thamarai Kannan, S. 2017, "Creation of hyperspectral library and lithological discrimination of granite rocks
using SVCHR - 1024: lab-based approach", Journal of Hyperspectral Remote Sensing, vol.7, no.3 (2017), pp, 168-177. 3027-
2. Aarthy, R.S., and Sanjeevi, S. 2008, "Relating VNIR spectra and mineralogy of anorthosites", 29th Asian Conference on Remote 3030
Sensing 2008, ACRS 2008. 2. 8181-823.
3. Rajasimman Balasubramanian, U.A.B., Saravanavel, J., and Gunasekaran, S. 2013, "Ore mineral discrimination using hyperspectra l
remote sensing - a field-based spectral analysis", Arabian Journal of Geoscience, vol.6, pp.4709-4716.
4. Enton Bedini. 2018, "Application of Advanced Spaceborne Thermal Emission and reflectance Radiometer (ASTER) multispectral
imagery to mineral and lithological mapping in Southern West Greenland", Journal of Remote Sensing, vol.8, no.2, pp. 47-59.
5. Bhadra, B.K., Suparn Pathak, Karunakar, G. & Sharma, J.R. 2013, "ASTER Data Analysis for Mineral Potential Mapping Around
Sawar-Malpura Area, Central Rajasthan", Journal of Indian Society of Remote Sensing, vol. 41, no.2, pp. 391-404.
6. Feizollah Masoumi, Taymour Eslamkish, Mehdi Honarmand & Ali Akbar Abkar. 2017, "Utilization of ASTER Data and Spectral
Analysis to Discriminate Hydrothermally Altered Areas over Rabor, South of Kerman, Iran", Journal of Indian Society of Remote
Sensing, vol. 45, no. 6, pp. 1039-1055.
7. William E. Ford. 2002, "Dana's Textbook of Mineralogy" Fourth Edition, CBS Publishers, ISBN: 81-239-0809-1.
8. Subramanian, A.P., 1956, "Petrology of the Anorthosite - Gabbro mass at Kadavur, Madras, India", Geol.mag, 93, pp. 287-30.
9. Vinoth Kumar, M., Kumar, R.S., Rajaprian, K. & Singh Kuldeep. 2013, "Petrography and Major Geochemical Studies of Anorthosite ,
Kadavur and Adjoining Area, Tamilnadu, India", International Research Journal of Earth Science, vol. 1, no. 5, pp. 15-22.
10. (Vinoth Kumar, M., Kumar, R.S., Rajaprian, K. & Kuldeep Singh. 2014, "Mineralogical studies of Plagioclase Feldspar in Kadavu r
Anorthosite Complex, Tamilnadu", International Journal of Advanced Geoscience, vol.2, no. 2, pp. 31-37.
11. Vinod Kumar, M., Kumar, R.S., Rajaprian, K. & Kuldeep Singh. 2013, "Geological and Petrological Studies of Pegmatites Rocks o f in
and around Kadavur Area, Karur District, Tamilnadu", vol. 2, no. 3, pp. 182-191.
12. Ravi Gupta, P. 2002, "Remote Sensing Geology" Second Edition, Springer, ISBN: 3-540-43185-3.
Keyword : Otherwise called progressed biofuels, the second-age biofuels are still in the advancement
arrangement.
References:
1. Banapurmath NR, , Chandrashekar TK, Khandal SV, Swamy RL(2015) ‗Impact of Diesel-butanol Blends on Performance and
Emission of Diesel Engine. Oil Gas Res 1: 101‘.
2. Banapurnath NR & Khandal SV(2009) ‗Impact of diesel-butanol blends on performance and emission of diesel engine‘ Simulation"
International Journal of Mechanical and Materials Engineering (IJMME), Vol. 2 (2007), No. 1, 1-7.
3. Andrei Kolesnikov, Akos Bereczky, CS Kristo, Lennox Siwale , Luka and Makame Mbarawa (2013) ‗Normal Butanol Additive in
Methanol-Gasoline Blends Fired in a Spark Ignition Single Cylinder Engine: Effects on Combustion and Emission Characteristics‘.
4. Gottekere KN, Lamani VT, Yadav AK (2017) ‗Performance, emission, and combustion characteristics of twin-cylinder common rail
diesel engine fuelled with butanol-diesel blends‘.
5. Angel Ramos, Octavio Armas, Reyes Garcia, (2012) ‗Pollutant emissions from engine starting with ethanol and butanol blends fr om
fuel processing technology‘.
B.Abhishek Reddy, Kayiram Kavitha, Ashoka Deepthi Manukonda, R.V.S.Lalitha, N.V.Krishna
Authors:
Rao
Paper Title: Semi-Equalizing Load in Multi-hop Wireless Networks
Abstract: Scheduling transmissions in a well-organized and fair manner in multi hop wireless network
[MWN] is very crucial and challenging .For semi equalizing the load a distributed node scheduling algorithm is
used through slot reallocation based on local information swap . The algorithm helps to find the delay or
shortest delivery time is achieved when the load is semi-equalized throughout the network. We have simulated
the Local voting algorithm and found that the system converges asymptotically toward the optimal schedule. In
this paper we propose a congestion free scheme to schedule the node transmissions conflict free. The proposed
algorithm achieves better performance than the other distributed algorithms in terms of fairness, average delay,
and maximum delay in simulation results.
Keyword : Multi-hop wireless networks, node scheduling algorithm, wireless mesh networks, load balancing.
References:
1. C. Bettstetter and C. Hartmann, “Connectivity of wireless multihop networks in a shadow fading environment,” Wireless Netw., vol.
11, no. 5, pp. 571–579, 2005.
2. Tian, Di, and Nicolas D. Georganas. "A coverage-preserving node scheduling scheme for large wireless sensor networks." In
Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pp. 32-41. ACM, 2002.
535. 3. Rhee, Injong, Ajit Warrier, Jeongki Min, and Lisong Xu. "DRAND: Distributed randomized TDMA scheduling for wireless ad hoc
networks." IEEE Transactions on Mobile Computing 8, no. 10 (2009): 1384-1396.
4. Hammond, Joseph L., and Harlan B. Russell. "Properties of a transmission assignment algorithm for multiple-hop packet radio 3047-
networks." IEEE Transactions on Wireless Communications 3, no. 4 (2004): 1048-1052. 3051
5. B. J. Wolf, J. L. Hammond, and H. B. Russell, “A distributed load-based transmission scheduling protocol for wireless ad hoc
networks,” in Proc.of Int. Conf. on Wireless Comm. and Mobile Comp., 2006, pp. 437–442.
6. Dimakis and J. Walrand, “Sufficient conditions for stability of longest-queue-first scheduling: Second-order properties using fluid
limits,” Ad-vances in Applied probability, pp. 505–521, 2006.orks,” in Proc.of Int. Conf. on Wireless Comm. and Mobile Comp.,
2006, pp. 437–442.
7. Vergados, Dimitrios J., Natalia Amelina, Yuming Jiang, Katina Kralevska, and Oleg Granichin. "Toward optimal distributed node
scheduling in a multihop wireless network through local voting." IEEE Transactions on Wireless Communications 17, no. 1 (2017):
400-414.
8. C.-T. Chiang, H.-C. Chen, W.-H. Liao, and K.-P. Shih, “A decentralized minislot scheduling protocol (DMSP) in TDMA-based
wireless mesh networks,” J. Netw. Comput. Appl., vol. 37, pp. 206–215, Jan. 2014
9. Kayiram Kavitha, Polsani Rajashree Rao, Sreeja Tummala, Gajarla Vasavi, and Dr.R.Gururaj, Dual Tree Data Routing Scheme for
Wireless Sensor Networks, Third International Conference on Advances in Information Technology and Mobile Communication,
AIM -2013, 26-27, April 2013, Bangalore, India.
10. Kayiram Kavitha, Vinod Pachipulusu, Sreeja Thummala, R.Gururaj. Article: Energy Efficient Query Processing for WSN based on
Data Caching and Query Containment, in International Journal of Computer Applications, Vol. 89, no. 19, Page no. 4-8, March 2014,
Published by Foundation of Computer Science, New York, USA.
11. Sharma D, Kavitha K, Gururaj R. Article: Estimating Node Density for Redundant Sensors in Wireless Sensor Network, in
International Journal of Sensor Networks and Data Communications, Vol.4, Issue 2 no.127, November 2015, Published by OMICS
International.
12. R.V.S.Lalitha, K.Kavitha, N.V.Krishna Rao, G.Rama Mounika, V.Sandhya, Smart surveillance using Smart doorbell, International
Journal of Innovative Technology and Exploring Engineering, Volume-8, Issue-8 June, 2019.
Keyword : Glaucoma detection, Deep Learning, Transferable Convolutional Neural Network, GalucoNet+,
Computer Aided Diagnosis System.
538. References:
1. Y.-C. Tham, X. Li, T. Y. Wong, H. A. Quigley, T. Aung, and C.-Y. Cheng, “Global prevalence of glaucoma and projections of
glaucoma burden through 2040: A systematic review and meta-analysis,” Ophthalmology, vol. 121, no. 11, pp. 2081–2090, 2014. 3060-
2. S. Y. Shen, T. Y. Wong, P. J. Foster, J.-L. Loo, M. Rosman, S.-C. Loon, W. L. Wong, S.-M. Saw, and T. Aung, “The prevalence and 3072
types of glaucoma in malay people: The singaporemalay eye study,” Investigative Ophthalmology and Visual Science, vol. 49, no . 9, p.
3846, 2008.
3. Pederson JE and Anderson DR, “The mode of progressive disc cupping in ocular hypertension and glauco ma,” Archives of
Ophthalmology, vol. 98, no. 3, pp. 490–495, 1980.
4. H. Fu et al., "Disc-Aware Ensemble Network for Glaucoma Screening From Fundus Image," in IEEE Transactions on Medical
Imaging, vol. 37, no. 11, pp. 2493-2501, Nov. 2018.
5. J. Jonas, W. Budde, and S. Panda-Jonas, “Ophthalmoscopic evaluation of the optic nerve head,” Survey of Ophthalmology, vol. 43, no.
4, pp. 293–320, 1999.
6. J. E. Morgan, N. J. L. Sheen, R. V. North, Y. Choong, and E. Ansari, “Digital imaging of the optic nerve head: monoscopic and
stereoscopic analysis,” British Journal of Ophthalmology, vol. 89, no. 7, pp. 879–884, 2005.
7. H. Fu, Y. Xu, S. Lin, X. Zhang, D. Wong, J. Liu, and A. Frangi, “Segmentation and Quantification for Angle -Closure Glaucoma
Assessment in Anterior Segment OCT,” IEEE Trans. Med. Imag., vol. 36, no. 9, pp. 1930–1938, 2017.
8. J. B. Jonas, A. Bergua, P. SchmitzValckenberg, K. I. Papastathopoulos, and W. M. Budde, “Ranking of optic disc variables for
detection of glaucomatous optic nerve damage,” Invest. Ophthalmol. Vis. Sci., vol. 41, no. 7, pp. 1764–1773, 2000.
9. M. D. HancoxO.D., “Optic disc size, an important consideration in the glaucoma evaluation,” Clinical Eye and Vision Care, vol. 11,
no. 2, pp. 59 – 62, 1999.
10. G. D. Joshi, J. Sivaswamy, and S. R. Krishnadas, “Optic Disk and Cup Segmentation from Monocular Colour Retinal Images for
Glaucoma Assessment,” IEEE Trans. Med. Imag., vol. 30, no. 6, pp. 1192–1205, 2011.
11. F. Yin, J. Liu, S. H. Ong, Y. Sun, D. W. K. Wong, N. M. Tan, C. Cheung, M. Baskaran, T. Aung, and T. Y. Wong, “Model-based optic
nerve head segmentation on retinal fundus images,” in Proc. EMBC, 2011, pp. 2626–2629.
12. J. Cheng, J. Liu, Y. Xu, F. Yin, D. Wong, N. Tan, D. Tao, C.-Y. Cheng, T. Aung, and T. Wong, “Superpixel classification based optic
disc and optic cup segmentation for glaucoma screening,” IEEE Trans. Med. Imag., vol. 32, no. 6, pp. 1019–1032, 2013.
13. J. Cheng, D. Tao, D. W. K. Wong, and J. Liu, “Quadratic divergence regularized SVM for optic disc segmentation,” Biomed. Opt.
Express, vol. 8, no. 5, pp. 2687–2696, 2017.
14. H. Fu, J. Cheng, Y. Xu, D. Wong, J. Liu, and X. Cao, “Joint Optic Disc and Cup Segmentation Based on Multi-label Deep Network
and Polar Transformation,” IEEE Trans. Med. Imag., 2018.
15. J. Cheng, F. Yin, D. W. K. Wong, D. Tao, and J. Liu, “Sparse dissimilarity-constrained coding for glaucoma screening,” vol. 62, no. 5,
pp. 1395–1403, 2015.
16. R. Bock, J. Meier, L. G. Nyul, J. Hornegger, and G. Michelson, “Glaucoma risk index: Automated glaucoma detection from color
fundus images,” Medical Image Analysis, vol. 14, no. 3, pp. 471–481, 2010.
17. S. Dua, U. RajendraAcharya, P. Chowriappa, and S. VinithaSree, “Wavelet-based energy features for glaucomatous image
classification,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 1, pp. 80–87, 2012.
18. K. P. Noronha, U. R. Acharya, K. P. Nayak, R. J. Martis, and S. V. Bhandary, “Automated classification of glaucoma stages usi ng
higher order cumulant features,” Biomedical Signal Processing and Control, vol. 10, no. 1, pp. 174–183, 2014.
19. U. R. Acharya, E. Ng, W. Eugene, Lim, K. Noronha, L. Min, K. Nayak, and S. Bhandary, “Decision support system for the glaucom a
using Gabor transformation,” Biomedical Signal Processing and Control, vol. 15, pp. 18–26, 2015.
20. A. Krizhevsky, I. Sutskever, and G. Hinton, “Imagenet classification with deep convolutional neural networks,” in Proc. NIPS, 2012,
pp. 1097–1105.
21. V. Gulshan, L. Peng, M. Coram, and et.al, “Development and Validation of a Deep Learning Algorithm for Detection of Diabetic
Retinopathy in Retinal Fundus Photographs,” Journal of the American Medical Association, vol. 304, no. 6, pp. 649–656, 2016.
22. A. Esteva, B. Kuprel, R. A. Novoa, J. Ko, S. M. Swetter, H. M. Blau, and S. Thrun, “Dermatologist-level classification of skin cancer
with deep neural networks,” Nature, vol. 542, no. 7639, pp. 115–118, 2017.
23. D. Shu Wei Ting and et al., “Development and Validation of a Deep Learning System for Diabetic Retinopathy and Related Eye
Diseases Using Retinal Images From Multiethnic Populations With Diabetes,” JAMA, vol. 318, no. 22, pp. 2211–2223, 2017.
24. Q. Li, B. Feng, L. Xie, P. Liang, H. Zhang, and T. Wang, “A Cross modality Learning Approach for Vessel Segmentation in Retin al
Images,” IEEE Trans. Med. Imag., vol. 35, no. 1, pp. 109–118, 2016.
25. H. Fu, Y. Xu, S. Lin, D. W. K. Wong, and J. Liu, “DeepVessel: Retinal Vessel Segmentation via Deep Learning and Conditional
Random Field,” in Proc. MICCAI, 2016, pp. 132–139.
26. X. Chen, Y. Xu, S. Yan, D. Wing, T. Wong, and J. Liu, “Automatic Feature Learning for Glaucoma Detection Based on Deep
Learning,” in Proc. MICCAI, 2015, pp. 669–677.
27. J. I. Orlando, E. Prokofyeva, M. Del Fresno, and M. B. Blaschko, “Convolutional neural network transfer for automated glaucom a
identification,” in Proc. SPIE, 12th International Symposium on Medical Information Processing and Analysis, 2016.
28. S. Yousefi et al., "Learning From Data: Recognizing Glaucomatous Defect Patterns and Detecting Progression From Visual Field
Measurements," in IEEE Trans. on Biomedical Engg., vol. 61, no. 7, pp. 2112-2124, July 2014.
29. R. Panda, N. B. Puhan, A. Rao, D. Padhy and G. Panda, "Recurrent neural network based retinal nerve fiber layer defect detect ion in
early glaucoma," 2017 IEEE 14th International Symposium on Biomedical Imaging (ISBI 2017), Melbourne, VIC, 2017, pp. 692-695.
30. M. E. Şahı̇ n and M. R. Bozkurt, "Retinal Nerve Fiber Layer detection at Optical Coherence Tomography image for the diagnosis of
glaucoma," 2015 Medical Technologies National Conference, Bodrum, 2015, pp. 1-3.
31. Aslan, Muhammet&Ceylan, Murat &Durdu, Akif. (2018). Segmentation of Retinal Blood Vessel Using Gabor Filter and Extreme
Learning Machines. 10.1109/IDAP.2018.8620890.
32. A. Gopalakrishnan, A. Almazroa, K. Raahemifar and V. Lakshminarayanan, "Optic disc segmentation using circular hough transform
and curve fitting," 2015 2nd International Conference on Opto-Electronics and Applied Optics, Vancouver, BC, 2015, pp. 1-4.
33. T. Khalil, M. UsmanAkram, S. Khalid and A. Jameel, "Improved automated detection of glaucoma from fundus im age using hybrid
structural and textural features," in IET Image Proc., vol. 11, no. 9, pp. 693-700, 9 2017.
34. N. Kavya and K. V. Padmaja, "Glaucoma detection using texture features extraction," 2017 51st Asilomar Conference on Signals,
Systems, and Computers, Pacific Grove, CA, 2017, pp. 1471-1475.
35. S. Omid, J. Shanbehzadeh, Z. Ghassabi and S. S. Ostadzadeh, "Optic disc detection in high-resolution retinal fundus images by region
growing," 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI), Shenyang, 2015, pp. 101-105.
36. M. Lotankar, K. Noronha and J. Koti, "Detection of optic disc and cup from color retinal images for automated diagnosis of glaucoma,"
2015 IEEE UP Section Conference on Electrical Computer and Electronics (UPCON), Allahabad, 2015, pp. 1-6.
37. G. Pavithra, A. Tugashetti, T. C. Manjunath and L. Dharmanna, "Investigation of primary glaucoma by CDR in fundus images," 20 17
2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT),
Bangalore, 2017, pp. 1841-1848.
38. W. Luangruangrong, K. Chinnasarn and A. Rodtook, "Polar Space Contour Detection for Automated Optic Cup Segmentation," 2018
10th International Conference on Knowledge and Smart Technology (KST), Chiang Mai, 2018, pp. 164-169.
39. P. Das, S. R. Nirmala and J. P. Medhi, "Detection of glaucoma using Neuroretinal Rim information," 2016 International Confere nce on
Accessibility to Digital World (ICADW), Guwahati, 2016, pp. 181-186.
40. H. Alghmdi, HongyingLilian Tang, M. Hansen, A. O'Shea, L. Al Turk and T. Peto, "Measurement of optical cup-to-disc ratio in fundus
images for glaucoma screening," 2015 International Workshop on Computational Intelligence for Multimedia Understanding
(IWCIM), Prague, 2015, pp. 1-5.
41. M. Aloudat and M. Faezipour, "Determination for Glaucoma disease based on red area percentage," 2016 IEEE Long Island Systems,
Applications and Technology Conference (LISAT), Farmingdale, NY, 2016, pp. 1-5.
42. M. Roslin and S. Sumathi, "Glaucoma screening by the detection of blood vessels and optic cup to disc ratio," 2016 International
Conference on Comm. and Signal Processing, Melmaruvathur, 2016, pp. 2210-2215.
43. S. M. Nikam and C. Y. Patil, "Glaucoma detection from fundus images using MATLAB GUI," 2017 3rd International Conference on
Advances in Comp. Comm. & Automation (ICACCA) (Fall), Dehradun, 2017, pp. 1-4.
44. H. Ahmad, A. Yamin, A. Shakeel, S. O. Gillani and U. Ansari, "Detection of glaucoma using retinal fundus images," 2014
International Conference on Robotics and Emerging Allied Technologies in Engineering (iCREATE), Islamabad, 2014, pp. 321-324.
45. E. Pinos-Velez, M. Flores-Rivera, W. Ipanque-Alama, D. Herrera-Alvarez, C. Chacon and L. Serpa-Andrade, "Implementation of
support tools for the presumptive diagnosis of Glaucoma through identification and processing of medical images of the human eye,"
2018 IEEE International Systems Engineering Symposium (ISSE), Rome, 2018, pp. 1-5.
46. Atheesan S. and Yashothara S., "Automatic glaucoma detection by using funduscopic images," 2016 International Conference on
Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, 2016, pp. 813-817.
47. J. K. Virk, M. Singh and M. Singh, "Cup-to-disk ratio (CDR) determination for glaucoma screening," 2015 1st International
Conference on Next Generation Computing Technologies, Dehradun, 2015, pp. 504-507.
48. D. D. Patil, R. R. Manza, G. C. Bedke and D. D. Rathod, "Development of primary glaucoma classification technique using optic cup
& disc ratio," 2015 International Conference on Pervasive Computing (ICPC), Pune, 2015, pp. 1-5.
49. D. E. Kusumandari, ArisMunandar and G. G. Redhyka, "The comparison of GVF Snake Active Contour method and Ellipse Fit in
optic disc detection for glaucoma diagnosis," 2015 International Conference on Automation, Cognitive Science, Optics, Micro Electro-
Mechanical System, and Information Technology (ICACOMIT), Bandung, 2015, pp. 123-126.
50. A. M. Jose and A. A. Balakrishnan, "A novel method for glaucoma detection using optic disc and cup segmentation in digit al retinal
fundus images," 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Nagercoil, 2015, pp.
1-5.
51. E. Deepika and S. Maheswari, "Earlier glaucoma detection using blood vessel segmentation and classification," 2018 2nd International
Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 484-490.
52. M. K. Dutta, A. K. Mourya, A. Singh, M. Parthasarathi, R. Burget and K. Riha, "Glaucoma detection by segmenting the super pix els
from fundus colour retinal images," 2014 International Conf. on Medical Imaging, m-Health and Emerging Comm. Systems, Greater
Noida, 2014, pp. 86-90.
53. K. Choudhary and S. Wadhwa, "Glaucoma Detection Using Cross Validation Algorithm," 2014 Fourth International Conference on
Advanced Computing & Communication Technologies, Rohtak, 2014, pp. 478-482.
54. L. Xiong, H. Li and Y. Zheng, "Automatic detection of glaucoma in retinal images," 2014 9th IEEE Conference on Industrial
Electronics and Applications, Hangzhou, 2014, pp. 1016-1019.
55. Harshvardhan G, Venkateswaran N and Padmapriya N, "Assessment of Glaucoma with ocular thermal images using GLCM techniques
and Logistic Regression classifier," 2016 International Conference on Wireless Communications, Signal Processing and Networking
(WiSPNET), Chennai, 2016, pp. 1534-1537.
56. S. Pathan, P. Kumar and R. M. Pai, "The Role of Color and Texture Features in Glaucoma Detection," 2018 International Confere nce
on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, 2018, pp. 526-530.
57. S. Simonthomas, N. Thulasi and P. Asharaf, "Automated diagnosis of glaucoma using Haralick texture features," International
Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, 2014, pp. 1-6.
58. Fu, Huazhu& Cheng, Jun &Xu, Yanwu& Zhang, Changqing& Wing Kee Wong, Damon & Liu, Jiang & Cao, Xiaochun. (2018). Disc-
Aware Ensemble Network for Glaucoma Screening From Fundus Image. IEEE Transactions on Medical Imaging. PP. 1-1.
10.1109/TMI.2018.2837012.
59. A. Pal, M. R. Moorthy and A. Shahina, "G-Eyenet: A Convolutional Autoencoding Classifier Framework for the Detection of
Glaucoma from Retinal Fundus Images," 2018 25th IEEE International Conference on Image Processing (ICIP), Athens, 2018, pp.
2775-2779.
60. X. Chen, Y. Xu, D. W. Kee Wong, T. Y. Wong and J. Liu, "Glaucoma detection based on deep convolutional neural network," 2015
37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Milan, 2015, pp. 715-718.
61. F. Calimeri, A. Marzullo, C. Stamile and G. Terracina, "Optic Disc Detection Using Fine Tuned Convolutional Neural Networks,"
2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Naples, 2016, pp. 69-75.
62. J. Kim, S. Candemir, E. Y. Chew and G. R. Thoma, "Region of Interest Detection in Fundus Images Using Deep Learning and Blood
Vessel Information," 2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS), Karlstad, 2018, pp.
357-362.
63. V. Nair and G. E. Hinton. Rectified linear units improve restricted boltzmann machines. In Proc. 27th International Conference on
Machine Learning, 2010.
64. A. John, A. Sharma, H. Singh and V. Rehani, "Fuzzy based decision making for detection of Glaucoma," 2017 8th International
Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, 2017, pp. 1-6.
65. C. Gisler, A. Ridi, M. Fauquex, D. Genoud and J. Hennebert, "Towards glaucoma detection using intraocular pressure monitoring ,"
2014 6th International Conference of Soft Computing and Pattern Recognition (SoCPaR), Tunis, 2014, pp. 255-260.
66. G. R., P. V. Rao and A. S., "Automated glaucoma detection system based on wavelet energy features and ANN," 2014 Internationa l
Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, 2014, pp. 2808-2812.
67. J. Ayub et al., "Glaucoma detection through optic disc and cup segmentation using K-mean clustering," 2016 International Conference
on Computing, Electronic and Electrical Engg., Quetta, 2016, pp. 143-147.
68. Y. Hatanaka et al., "Improved automated optic cup segmentation based on detection of blood vessel bends in retinal fundus images,"
2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, IL, 2014, pp. 126 -
129.
69. A. Chakravarty and J. Sivaswamy, "Glaucoma classification with a fusion of segmentation and image-based features," 2016 IEEE 13th
International Symposium on Biomedical Imaging (ISBI), Prague, 2016, pp. 689-692.
70. A. Ramzan, M. UsmanAkram, A. Shaukat, S. GulKhawaja, U. UllahYasin and W. Haider Butt, "Automated glaucoma detection using
retinal layers segmentation and optic cup-to-disc ratio in optical coherence tomography images," in IET Image Processing, vol. 13, no.
3, pp. 409-420, 28 2 2019.
71. A. Agarwal, A. Issac, A. Singh and M. K. Dutta, "Automatic imaging method for optic disc segmentation using morphological
techniques and active contour fitting," 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, 2016, pp. 1-5.
72. Harini R and Sheela N, "Feature extraction and classification of retinal images for automated detection of Diabetic Retinopathy," 2016
Second International Conference on Cognitive Computing and Information Processing, Mysore, 2016, pp. 1-4.
73. E. Santos, L. Santos, R. Veras, M. Frazao and D. Leite, "A Semiautomatic Superpixel Based Approach to Cup-to-Disc Ratio
Measurement," 2018 IEEE Symposium on Comp. and Comm., Natal, 2018, pp. 00621-00626.
74. S. A. Tuncer, T. Selçuk, M. Parlak and A. Alkan, "Hybrid approach optic disc segmentation for retinal images," 2017 International
Artificial Intelligence and Data Processing Symposium, Malatya, 2017, pp. 1-5.
75. A.Agarwal, S. Gulia, S. Chaudhary, M. K. Dutta, C. M. Travieso and J. B. Alonso-Hernández, "A novel approach to detect glaucoma
in retinal fundus images using cup-disk and rim-disk ratio," 2015 4th International Work Conference on Bioinspired Intelligence
(IWOBI), San Sebastian, 2015, pp. 139-144.
76. Y. Jia, et al., “Caffe: Convolutional architecture for fast feature embedding,” in Proceedings of the ACM International Conference on
Multimedia. ACM, pp. 675–678, 2014.
77. http://www.vlfeat.org/
Paper Title: Design and Implementation of Arduino based Riders Safe Guard 2.0
540.
Abstract: No matter how careful and attentive people are on road, accidents do happen. The only way to
3078-
have a safe journey is by following safety measures. To decrease the death rate of bike riders, this paper
3083
proposes a solution called Rider’s Safe Guard 2.0. Few incidents due to wrong decisions on road may cost our
precious life due to recklessness. This work automates the process and the responsibility of decision making is
given to the micro controller. Microcontroller makes sure whether the rider is wearing safety gear such as the
helmet and whether the ride is under any alcohol intake. By analyzing both these condition the motor starts
running and the circuit gets connected to the vehicle ignition switch. Micro controller Arduino Nano and Uno
based system insists the rider to wear helmet to ride the bike as long as the motor is on. As there is no
declination in road accidents, this system can be made mandatory in every two wheeler and the same can be
extended for fourwheelers for wearing seat belts and doesnot allow if the rider is alcoholic.
Keyword : This work automates the process and the responsibility of decision making is given to the micro
controller.
References:
1. NiravThakor , TanmayVyas , Divyang Shah “Automatic Vehicle Accident Detection System Based on ARM &GPS”, International
Journal for Research in Technological Studies, Vol-1, Issue - 1, pp :17-19, Dec 2013.
2. S.Sonika, Dr.K.Sathiyasekar, S.Jaishree “Intelligent accident identification system using GPS, GSM modem”, International Journal of
Advanced Research in Computer and Communication Engineering Vol.3,Issue-2,Feb 2014.
3. D. B. Tushara and P. A. H. Vardhini, "Wireless vehicle alert and collision prevention system design using Atmel
microcontroller," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016,
pp. 2784-2787.
4. K.Murali Chandra Babu, P.A.Harsha Vardhini, “Advanced Vehicle Security System with Spartan FPGA”, International Journal of
Engineering Research in Electronics and Communication Engineering (IJERECE), pp.86-88 ,Vol 5, Issue 4, April 2018.
Keyword : Calibration/Drift Measurement, Data-driven models, Data Collection, Data Mining, Data Pre-
processing, Knowledge Discovery in Database, Mahalanobis Distance, Summary Statistics ,Z-score
normalization, ,covariance matrix.
References:
1. IEC-61226 : International Standard, Edition 3.0, 2009-07, Nuclear Power Plants --- Instrumentation & Control Important to Safety ---
Classification of Instrumentation & Control Functions.
2. IAEA Safety Glossary, 2007.
3. IEC-61508 : Standard for Functional Safety of Electrical/ Electronic/ /Programmable Electronic Safety Related Systems.
4. Kadlec, P., Gabrys, B., & Strandt, S., Data-driven Soft Sensors in the Process Industry, Computers and Chemical Engineering (2008).
5. Optimal Calibration Parameters for Process Instrumentation, white paper on calibration, Beemex, www.beemex.com.
6. Ana Sofia Ramos Brásio,”Industrial process monitoring methodologies”, University of Coimbra, PhD thesis in Chemical
Engineering,2015.
7. Mahalanobis, Prasanta Chandra , "On the generalised distance in statistics". Proceedings of the National Institute of Sciences of India. 2
(1): 49–55,(2016).
8. Generic Qualification of the Rosemount 3051N Pressure Transmitter, EPRI, June 2001
9. Alexander Wiegand, WIKA Handbook : Pressure & Temperature Measurement, Wika Alexander Wiegand GmbH & Co., Caruna
Druck, Mittenberg, 1995
10. Douglus M. Considine, Process/Industrial Instruments & Controls Handbook, 4th Edition, McGraw Hill Inc. 1993
11. Ernest O. Doebelin, Measurement Systems, Applications & Design, McGraw Hill, 1990
12. IAEA. (2008). On-Line Monitoring for Improving Performance of Nuclear Power Plants Part 1: Instrument Channel Monitoring,
International Atomic Energy Agency, Vienna.
13. Hashemian, H.M. (2006). Maintenance of Process Instrumentation in Nuclear Powerplants, Chapter 6, Springer, Berlin.
14. Hashemian, H.M. (2011). Measurement of Dynamic Temperatures and Pressures in Nuclear Power Plants, the University of Western
Ontario, Ontario, Canada.
15. Wikipedia article on mahalanobis distance: https://en.wikipedia.org/wiki/Mahalanobis_distance
16. 16.Analytics India, Magazine https://www.analyticsindiamag.com/understanding-mahalanobis-distance-and-its-use-cases/,
ABHISHEK SHARMA, JUL 10, 2018
17. Jiawei Han and Micheline Kamber,”Data Mining: Concepts and Techniques,”
18. Juha Juselius, Lappeenranta University of Technology , LUT School of Energy Systems,”Advanced condition monitoring methods in
thermal power plants”, master’s thesis, 2018
19. D. Flynn, J. Ritchie and M. Cregan,”Data Mining Techniques Applied to Power Plant Performance Monitoring”, The Queen’s
University of Belfast, N. Ireland, 16th Triennial World Congress, Prague, Czech Republic,2005
20. Li J., Niu C., Liu J., Zhang L. “Research and Application of Data Mining in Power Plant Process Control and Optimization.” In: Yeung
D.S., Liu ZQ., Wang XZ., Yan H. (eds) Advances in Machine Learning and Cybernetics. Lecture Notes in Computer Science, vol
3930. Springer, Berlin, Heidelberg ,2006.
21. 21. Tony Ogilvie, B W Hogg, “Use of data mining techniques in the performance monitoring and optimization of a thermal power
plant”, IEEE Colloquium on Knowledge Discovery and Data Mining, 1998.
Paper Title: Rough Sets Base Associative Classification Rules Extraction from Big Data
Abstract: Big Data is a current burning challenge for the data analytics research community. Many
conventional data analytics techniques have been extended to the MapReduce framework to process Big Data.
But in our literature review, we find that for the MapReduce system there is an absolute lack of rough set-based
technique. To facilitate this and recognize the importance of the rule-based classification techniques, we suggest
a rough-set associative classification rules extraction process for the MapReduce framework. The
implementation and evaluation of the Big Data Standard data set demonstrated the efficiency of our suggested
approach.
Keyword : in our literature review, we find that for the MapReduce system
References:
1. PawlakZ, Rough Sets “Theoretical Aspects of Reasoning about Data”, Dordrecht Kluwer, 1991.
2. WangG,WuY,ChangL, “An approach for attribute reduction and rule generation based on rough set theory”, Journal of Software 10
(11) (1999) 1206–1211.
3. Z.Pawlak,Roughsets, International Journal of ComputerInfSci11(1982)341–356.
4. M.Kryszkiewicz,Roughsetapproachtoincompleteinformationsystems,Info.Science112(1998)39–49.
5. TsoukisA, StefanowskiJ, “On the extension of rough sets under in complete information, in: New Directions in rough sets ,Data Mining
543. , and Granular-Soft Com- puting,vol.1711,SpringerBerlinHeidelberg,1999,pp.73–81.
6. GrecoS, SlowinskiJ and BlaszczynskiJ, “Multi-criteria classification–a new scheme for application of dominance-based decision rules, 3096-
Eur.J.Oper.Res.181 (2007) 1030–1044.
7. ZhuW, Generalized rough sets based on relations,Info.Science177(2007)4997–5011.
3102
8. BryniarskiE, WybraniecU and Bonikowski Z, , -Skardowska, Extensions and intentions in the rough set
theory,Info.Science107(1998)149–167.
9. XWuC,HuHQ,YuDR&LiuJF, “Neighbor hood rough set based heterogeneous feature sub set
selection”,Info.Science178(18)(2008)3577–3594.
10. YaoYY “Decision-theoretic roughest models”, in Proceeding of the Second Int.Conf. on Rough Sets and Knowledge Technology,
2007, pp.1–12.
11. HerbertJ, YaoJT & AgameJ “theoretic perspective on roughest analysis”, JChongqing University Posts Telecommunications.20
(2008)291–298.
12. PradeH and DuboisD, “Rough fuzzy sets and fuzzy rough sets, International. J. General Syst.17 (1990)191–209.
13. ZhangWX, WuWZ and LeungY, “Knowledge acquisition in incomplete information systems: A rough set approach, Eur. Journal.
Oper. Res. 168 (2006)164–180.
14. WangXZ, He.Q and ChenDG, “FRSVMs:fuzzy rough set based support vector machines, Fuzzy Sets Systems.161(2010)596–607.
15. Wang WT, Dai JH, Tian HW, , Liu L,Decision rule mining using classification consistency rate,Knowl.BasedSyst.43(2013)95–102.
16. Skowron A and Swiniarski RW, “Rough set methods in feature selection and recognition, Pattern Recognition Lett.24 (2003)833–849.
17. ShenQ and JensenR, “New approaches to fuzzy-rough feature selection”, IEEETrans. Fuzzy Systems17(4)(2008)824–838.
18. Liao XW, Xu WH, Li Y, , “Approaches to attribute reductions based on rough set and matrix computation in inconsistent ordered
information systems”, Knowl.BasedSystems.27(2012)78–91.
19. QinYK and haoH.Z, , “Mixed feature selection in incomplete decision table”, Knowledge Based Systems57(2014)181–190.
20. MatarazzoB, Slowinski R,& Greco S, “Rough sets in decision making, Encycl.Com-plex.Syst.Sci.(2009)7753–7787.
21. Shen LX, Tay F, , “Fault diagnosis based on rough set theory”, Eng. Appl. Artif. Intelligence.16 (1)(2003)39–43.
22. WakulicA Deja and PaszekP, “Applying roughest theory to medical diagnosing, Rough Sets” Intelligent. Syst. Paradig.
4585(2007)427–435.
23. Cao CG Jiang F, Sui YF, “A rough set approach to outlier detection”, International J.Gen.Syst.37 (2008)519–536.
24. Chen YS, “Classifying credit ratings for Asian banks using integrating feature selection and the CPDA-based rough sets approach,
Knowledge Based Syst. 26(2012) 259–270.
25. ZPawlak, “Rough Sets” International J. Computer Information Science. 198211 (5), 341– 356.
26. Z.Pawlak, “Rough Sets: Theoretical Aspects of Reasoning about Data”, Kluwer Academic Publishing, Dordrecht, 1991.
27. PawlakZ, “Rough set approach to knowledge-based decision support”. Eur. J. Operation 1997 Res. 99, 48–57.
28. Busse Grazymala, ZPawlak SlowinskiJW and ZiarkoW “Rough sets”, Communications of the ACM, Vol. 38, pp.88–95, 1995.
29. Rybinski H. and KryszkiewiczM, (1996b). “Reducing information systems with uncertain real value attributes”. In 6th Internati onal
Conferences, Information Processing and Management of Uncertainty in Knowledge- Based Systems, Proceedings (IPMU’96), Vol. II.
July 1–5, Grenada. pp. 1165.
30. PawarBV and Dhande Varda C, “A Survey on Parallel Method for Rough Set using MapReduce Technique for Data Mining”,
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.
31. ImielinskiT, R Agrawal, & ASwami. “Mining association rules between sets of items in large databases”, Proceedings of 1993 AC M
SIGMOD, ACM, New York, NY, USA,1993, pp.207–216.
32. PK Reddy & RU Kiran, “Mining rare association rules in the datasets with widely varying items” frequencies Lecture Notes in
Computer Science, Vol. 5981, 2010,pp.49–62.
33. NCercone and J Li “A rough set based model to rank the importance of association rules”, Lecture Notes in Computer Sc ience,
2005,Vol. 3642, pp.109–118.
34. SOFalaki, AOAdetunmbi, OSAdewale, and BKAlese, ‘Network intrusion detection based on rough set and knearest neighbour’,
International Journal of Computing and ICT Research, 2008, Vol. 2, pp.60–66.
35. RamannaS, PetersJF, SurajZ, ShanS and N. Pizzi, “Classification of meteorological volumetric radar data using rough set methods”,
Pattern Recognition Letters 24 (6) (2003) 911–920.
36. Brodley CE and Dy J.G, “Feature selection for unsupervised learning”, The Journal of Machine Learning Research archive 5, 2004,
845–889.
37. KusiakA, “Decomposition in data mining: An industrial case study”, IEEE Transaction on Electronics Packaging Manufacturing 23
(4), 2000 345–353.
38. ChanCC, “A rough set approach to attribute generalization in data mining”, Information Sciences 107, 1998, 177–194.
39. Xu Y & T Li, “A generalization rough set approach to attribute generalization in data mining”, Journal of Southwest Jiaotong
University 8 (1), 2000 69–75.
40. KamberM & JHan “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, San Francisco, 2001,CA.
41. Huang J, Nie P, SaiY, and Xu R ‘A rough set approach to mining concise rules from inconsistent data’, Proceedings of IEEE GR C
2006, IEEE, Atlanta USA, pp.333–336.
42. R Brause and PaetzJ ‘Rule generation and model selection used for medical diagnosis’, Journal of Intelligent & Fuzzy Systems:
Applications in Engineering and Technology – Challenges for future intelligent systems in biomedicine, 2002 Vol. 12, No. 1, pp.69–
78.
43. AAbraham & C Grosan ‘Stock market modeling using genetic programming ensembles’, Genetic Systems Programming: Theory and
Experiences, 2006,Vol. 13, pp.133–148.
44. BT Nath & A Ghosh ‘Multi-objective rule mining using genetic algorithms’, Information Sciences: an International Journal, 2004, Vol.
163, pp.123–133.
45. Ma HF, ZhaoWZ and HeQ, “Parallel k-means clustering based on mapreduce,” in Proc. 1st Int. Conf. Cloud Comput., 2009, pp. 674–
679.
46. Wang GY, LiangZ,YangY and ChenRZ “Attribute reduction for massive data based on rough set theory and mapreduce ,” in Proc.
Rough Set Knowl. Technol., 2010, pp. 672–678.
47. ZhaoCB, ZhangBJ, RTLi, Ruan, and GaoZ, “A parallel method for computing rough set approximations,” Inf. Sci., vol. 194, pp. 2 09–
223, 2012.
48. GhemawatS and DeanJ “Mapreduce: simplified data processing on large clusters”, Commun. ACM 51 (1) 2008, 107–113.
49. Hadoop Apache-2013, “Hadoop Apache Project”, <http://hadoop.apache.org/> accessed December-2013.
50. Hadoop, WhiteT, “The Definitive Guide”, O’Reilly Media, Inc., 2012.
51. Apache Mahout-2013 “Apache Project Mahout”, <http://mahout.apache.org/> accessed December- 2013.
52. DunningT, OwenS, AnilR, FriedmanE, “Mahout in Action”, Manning Publications Company, 2012.
53. Spark-2013 <http://spark-project.org/> accessed December-2013.
54. Storm-2013 <http://storm-project.net/>accessed December-2013.
55. Romer.G, S.Melnik, J.Long,A.Gubarev, ShivakumarS, and Vassilakis DremelT, MTolton,: interactive analysis of web -scale datasets,
in: Proc. of the 36th International Conference on Very Large Data Bases, 2010, pp. 330–339.
56. Apache Drill-2013 <http://incubator.apache.org/drill/> accessed December-13.
57. Dean J, GSanjay, “MapReduce: Simple Data Processing on Large Clusters” Proceedings To appear in OSDI 2004.
58. Zdzisław Pawlak, Andrzej S “Rudiments of rough sets” Proc. Elsevier accepted in 7 June 2006.
59. T Li, Zhang J, pan Yi “Parallel Rough Set Based Knowledge Acquisition Using MapReduce from Big Data” Proceedings ACM Big
Mine, August 12th , 2012 Beijing, China.
60. J Zang, T Li, Da Rausan “A parallel method for rough set approximations” Proc. Elsevier accepted in 11 January 2012.
61. B.Raghuram, and Gyani J “Fuzzy Associative Classification Driven MapReduce Computing Solution for Effective Learning from
Uncertain and Dynamic Big Data” International Journal of Database Theory and Application, Vol. 11, No.1 2018.
62. Data Set (URL): https:/archive.ics.uci.edu/ml/datasets/census+income.
Authors: Shavkat Imomov, Nargiza Kholikova, Zebo Alimova, Ikrom Nuritov, Nargiza Temirkulova
Keyword : Technology, method, oils, environmental protection, regeneration, cleaning, problem, disposal,
membrane, filter, oil collection.
References:
1. Sh.Zh.Imomov. Engineering design calculation of a biogas unit recuperator. Applied Solar Energy, 2007, 43(3), pp. 196-197.
2. Sh.Zh.Imomov. Heat transfer process during phase back-and-forth motion with biomass pulse loading. Applied Solar Energy,
2009, 45(2), pp. 116-119.
3. Sh.Imomov Technological foundations of the recuperation of heat wastes in biogas installations. ?ashkent, 2011. 136 p.
4. K.A.Sharipov, N.A.Holikova. Optimization installation performance for nanofiltration technics. AGRO-ILM. Tashkent, 2009.
?3(10). pp.56.
5. P V.N.Rokopyev, R.I.Sinyanskaya, E.V. Mishchenko. The method of regeneration of used lubricating oil. Pat. 2076898 Russia,
MPK6S 10 M 175/02. 93026982/04.3.
6. A.E. Monastic. Regeneration, drying and degassing of transformer oil. St. Petersburg: PEIPK, 2002, 40 p.
7. A.IO.Evdokimov, A.Yu.Evdokimov, I.G.Fuchs, T.N.Shabalina, L.N.Bagdasarov. Lubricants and problems of chemotology.
Russia, 2000. 424 p.
8. M.V.Seleznev, A.A.Mainntsev. Dynamics of changes in the density of gear oils in the conditions of operation of KamAZ
automobiles. Theoretical and applied aspects of modern science. 2014, ?2-1. p.83-85.
9. L.R.Rudnik. Additives to lubricants. Properties and application: "Profession", 2013. 928 p
10. K.A.Sharipov, N.A.Halikova. Optimization Installation performance for nanofiltration technics. AGRO ILM. Tashkent, 2009,
?3(10), pp.56
11. N. Khalikova, O. Mukhiddinov. Membrane plants refined oil. Sustainable Agriculture ?1 (1) 2018 ???, 21-28 pages.
12. K.A.Sharipov, N.A.Halikova. Establishing patterns of flow of a viscous fluid on the lateral surface of the rotating cone. European
science review, ? 1-2 2018 ???, 260-262 pages.
Keyword : tax administration, quality of tax administration, assessment criteria of tax administration, tax
collection.
545.
References: 3108-
1. Textbook for students studying at the specialty "Finance and credit", "Taxes and taxation" Tax administration
2. Final Report of the OECD (2015) "Addressing Tax Problems of the Digital Economy", event. 3110
3. Eurodad (2015) Fifty shades of tax evasion: the role of the EU in supporting an unfair global tax system, p.58.
4. Register, French Minister: Hit Netflix, Google, Apple, etc. With capacity tax, 11 February 2015 (http://www.theregister.co.uk
/2015/02/11/french_minister_hit_google_facebook_apple_netflix_et_al_with_bandwidth_tax).
5. The term was first introduced by IBM CEO Luis Gerstner at a briefing by the Advertising Department in 1996.
6. Bolyshev M. Digitalization of the economy. // BIT. 26.06.2017. [Electronic resource] URL:http://bit.samag.ru/uart/more/67.
7. Kurnikova, L.P. Digital factor of optimization of the system of the customs and tax administration of foreign economic activity
(in Russian) // State and municipal administration. Scientific notes by SKAGS. 2014. https://cyberleninka.
ru/journal/n/gosudarstvennoe-i-munitsipalnoe-upravlenie-uchenye-zapiski-skags.
8. Resolution of the President of Uzbekistan No. PP-3832 dated July 3, 2018 "On measures to develop the digital economy in the
Republic of Uzbekistan".
9. Oxfam, SwissLeaks Scandal one year on: political response to tax dodging is sluggish, says Oxfam, 5 February 2016
(https://www.oxfam.org /en/pressroom / reactions/swissleaks-scandal-one-year-political-response-taxdodging -sluggish -sluggish
-says-oxfam).
Keyword : Uzbek Model, “Reformation and Bukhara", state ruled by law, Uzbekistan's latest history,
modernization, democratization, law policy, Strategy of Actions along Five Priority Directions of the
Development of the Republic of Uzbekistan in 2017-2021, national legislation, lawmaking.
References:
1. Juraev N. The concept of renewal: creation, evolution and practice. - Tashkent: Spirituality. 2002. P. 214
2. Zhakbarov M. Historical and philosophical foundations of the idea of a perfect human being. - Tashkent: Tafakkur. 2011. P. 256.
3. Kadyrov A. Traditional society and strategies for its modernization. - Tashkent: TSU. 2006.
547. 4. Azizkhodjaev A.A. Statehood and spirituality. -T .: "Sharq", 1997;
5. Nazarov K.N. Axiology. The philosophy of values. Tashkent. 2004; 3119-
6. Boboev H. About national statehood. Tashkent. 1999;
7. Jumaev R. The state and society: on the way to democratization. - Tashkent. East 1998;
3123
8. Musaev F.A. Philosophical and legal bases of building a democratic state. - Tashkent: Uzbekistan, 2007;
9. Otamurotov S.O., Spiritual and spiritual revival in Uzbekistan. - Tashkent: The New Generation, 2003;
10. Ergashev I. The philosophy of development. Tashkent: Academy, 2000;
11. Kyrgyzbaev M. Civil society: political parties, ideologies, cultures. Tashkent. East, 1998;
12. Abdullaeva M.N. Philosophical and methodological analysis of the process of modernization. Tashkent: Institute of Philosophy
and Law. 2010. - 169 p.
13. Omonov B. Models of political modernization and the experience of Uzbekistan. Monograph. Tashkent: Science and Technology.
2012. P-112.
14. Omonov B. Models of political modernization and the experience of Uzbekistan. Monograph. T: Science and Technology. 2012.
P-112.
15. Kokarev K. On the evolution of political reform in China / K. Kokarev // Problems of the Far East. - 2004. - No. 5. P. 91.
16. Balchindorzhieva O.B. Methodological features of the study of modernization // Bulletin of the East Siberian University of
Management and Technology. 2014, No. 1 (46). – P. 134.
17. Berger P. Facing upto Modernity - New York. - 1977 - P. 127- 128.
18. Berger P. Facing upto Modernity - New York. - 1977 - P. 128- 132.
19. Parsons T. System of modern societies. 1970. // Name of the resource: Digital Library on Philosophy. Access
mode:http://filosof.historic.ru/books/item/f00/s01/z0001064/st000.shtml
20. Berger P. Facing upto Modernity - New York. - 1977 - P. 128- 132.
21. Madaeva Sh.O. Features of formation of democratic thinking in the Uzbek mentality 09.00.11 - Social Philosophy Thesis for the
degree of Doctor of Philosophy. Tashkent. 2009. B-121.
22. Toyganbaeva Agina Erkinovna “Experience of modernization of the countries of Southeast Asia and its adaptation in the
conditions of modern Kazakhstan” The dissertation for the degree of Doctor of Philosophy (PhD). P-42.
23. The Authors Team. The modern history of Uzbekistan. T .: East NMK. 2000. B-440-441.
24. Authors' Team. The modern history of Uzbekistan. T .: East NMK. 2000. B-525-526.
Paper Title: The Need for the Factor Hermeticism in the Renaissance Thinking
Abstract: It is well known that after the collapse of the Soviet Union, the interest in studying the culture
548. and philosophy of the Renaissance in the post-Soviet area grew even more. This article discusses the
controversial aspects of the study of the Renessas era and shows the need for a hermetic tradition in 3124-
understanding it. This is because humanistic ideas of the Renaissance display many elements of esoteric 3130
traditions. With the collapse of the ideological monopoly of the former Soviet Union, a pluralistic principle from
the paradigmatic point of view in various fields of science, particularly in the social and humanitarian field,
began to dominate. In particular, the study of the Renaissance focused on the influence of various esoteric
traditions. Our aim is to identify the causes of the same relationship by analyzing two overlapping views on the
tradition of hermeticism in the Renaissance. At the same time, special attention is paid to the peculiarities of
hermetic ideas as a paradigm.
Keyword : "belief", "itaqada", "trust,", "belief", "faith", as “knowledge based on beliefs”, “beliefs that
regulate behavior”, “political beliefs”, “people's beliefs”, “personal beliefs,” “beliefs.”.
References:
1. Karimov I.A. High spirituality is an invincible force. - Tashkent: Spirituality, 2010. -P. 93.
2. V. Soloviev. Dispute about justice. -Moscow-Kharkov: “EXMO-PRESS”, “FOLIO”, 1999. -P. 807-808.
3. G. Skirbekk, N. Gile. History of Philosophy. -Moscow: “GIC Vlados”, 2000.
4. G. Skirbekk, N. Gile. History of Philosophy. -Moscow: “GIC Vlados”, 2000.
5. Anselm von Canterbury. Cur deus homo? Munchen, 1937.
6. Abelard P. The story of my disasters. -Moscow: 1959.
7. Kant I. Treatises and letters. -Moscow: 1980.
8. F. Schelling. Op. T. 1. -Moscow: Thought, 1987.
9. V.S. Soloviev. Dispute about justice. -Moscow - Kharkov: “EXMO-PRESS”, “FOLIO”, 1999.
10. Kimelev Yu.A. Modern Western philosophy of religion. -Moscow: 1989.
11. Fundamentals of religious studies. Edited by I.N. Yablokov. -Moscow: High School, 1998.
12. Abu Nasr Farabi The City of Virtuous People. - Tashkent: Heritage, 1993.
13. Beruni, Abu Rayhan. Monuments from ancient peoples // Beruni A.R. Selected works, Volume I, - Tashkent: 1968.
14. N. Siraisi. Avicenna in Renaissance Italy: The Canon and Medical Teaching in Italian Universities after 1500. -Prisenton, 1987.
15. Ibn Arabi. Gems of wisdom (chapters). Translation A.V. Smirnova. V.Kn. M. Stepanyants. Philosophical aspects of Sufism. –
Moscow: “Science”, 1987.
16. G.F.Hourani. Averroes on the Harmony of Religion and Philosophy. London, 1961.
17. Ghazali, Muhammad Abu Hamid. Ihyo-ul-ulum / Translation by A. Mansur from Arabic // Kamalak. Literary and Critical Annual
Collection. - Tashkent: Young Guard, 1990.
18. Muhammad ibn AbdulKareem ibn Ahmad Al-Shahrastani. Al-Milal va-Nihal. —Egypt: 1977.
19. Alikulov Ҳ.A. Ethical views of philosophers of Central Asia and Khorasan (XIV-XV centuries). –T.: Fan, 1992.
20. Mansurov A. Aqoid texts. - Tashkent: Publishing and Publishing Association "Tashkent Islamic University", 2006.
21. Sheikh Muhammad Sodiq Muhammad Yusuf. Sunni doctrines. - Tashkent: "Sharq", 2008.
22. Nizomiddinov N.G. Ancient history, religious beliefs, culture of the peoples of South, Southeast and East Asia. (Chrestomatia). -
Tashkent: 2010.
23. Abdusamedov A.E. Philosophy of Religions. - Tashkent: 2010.
24. Munavvarov Z. Secular state and religion. - Tashkent: 2003.
25. Shakhnoza Kakhharova. Global spirituality is the ideological basis of globalization. - Tashkent: Tafakkur, 2009.
26. Ahmedova M. Fundamentals of Philosophy - Tashkent: Uzbekistan, 2006.
27. Erkaev A. Spirituality and development. - Tashkent: “Spirituality”, 2009.
28. Karimov Ibrohim. Faith as a spiritual state. -Toshkent: “Fan”, 1991.
29. Khairullaev M.M. Renaissance and Eastern philosophers. - Tashkent: "Fan", 1971.
30. Yovkochev Sh. et al. History of religions of Central Asia. —Tashkent: Oriental Studies, 2006.
31. Choriev Anvar. From knowledge to idea, from idea to belief. // J. Communication. - Tashkent: 2002.
32. Achildiev A. National Ideas and Interethnic Relations. —Tashkent: Uzbekistan, 2004.
33. The World of Thought: Aphorisms and Wise Words of Our Motherland and Foreign Authors / Vorontsov Composition; Sh
Translate Abdurazzoqova. —Tashkent: Literature and Art Publishing House, 1981. —p. 126–128.
34. "Middle Ages" - medium aevum - the name is retrospectively given by those who have viewed the time period between the
Ancient ("ancient") and the Renaissance ("revival" of antique culture) as the Age of Ignorance. // Gunnar Skirbekk. Nils Gile.
History of Philosophy: A Handbook for Higher Education Institutions / Translation. A. Deletroz, Z. Tursunova and V. Kuznetsov .
-Tashkent: East, 2002. -P. 169.
35. Tertullian. Selected Works. -Moscow: 1994; History of Philosophy. -Moscow: “GIC Vlados”, 2000, p. 178.
36. Fundamentals of Philosophy. Text of lectures. - Tashkent: Publishing and Publishing Association "Tashkent Islamic University",
2005. pp. 89-91.
37. History of philosophy. –Moscow: 1941. Volume-1, pp. 427-429.
38. Abelard P. The story of my disasters. –Moscow: 1959. –P. 96-103.
39. History of philosophy. –Moscow: 1941. Volume – 1, p. 472.
40. The encyclopedic dictionary of philosophy. - Tashkent: "Sharq", 2004. -P. 309.
41. Philosophy: Textbook for universities / Ed. prof. V.N. Lavrinenko, prof. V.P. Ratnikova. –Moscow: UNITY, 2000, p. 286.
Keyword :PNS – paranasal sinuses, ENT – ear, nose and throat, CT – computed tomography, KFK – creatine
kinaseLDH – lactate deh, ydrogenase , CIC – circulating immunocomplex.
References:
1. Bachert C., Tomassen P. Endotype-Driven Approach for Chronic Rhinosinusitis //Implementing Precision Medicine in Best
Practices of Chronic Airway Diseases. - Academic Press, 2019. - ?. 51-57. https://doi.org/10.1016/B978-0-12-813471-9.00013-X
2. Bengtsson C. et al. Incident Chronic Rhinosinusitis Is Associated With Impaired Sleep Quality: Results of the RHINE Study
551. //Journal of Clinical Sleep Medicine. - 2019. - ?. 15. - ?. 06. - ?. 899-905. http://dx.doi.org/10.5664/jcsm.7846
3. Bergmark R.W., Pynnonen M. Diagnosis and First-Line Treatment of Chronic Sinusitis. JAMA. 2017 Dec 19;318(23):2344- 3144-
2345. https://doi:10.1001/jama.2017.18196
4. Buggey J., ElAmm C.A. Myocarditis and cardiomyopathy. Curr Opin Cardiol. 2018 May;33(3):341-346.
3151
https://doi.org/10.1097/HCO.0000000000000514
5. Calus L. et al. Twelve-year follow-up study after endoscopic sinus surgery in patients with chronic rhinosinusitis with nasal
polyposis //Clinical and Translational Allergy. - 2019. - ?. 9. - ?. 1. - ?. 30. https://doi.org/10.1186/s13601-019-0269-4
6. Carter A., Dattani N., Hannan S. A. Chronic rhinosinusitis //BMJ. - 2019. - ?. 364. - ?. l131. https://doi.org/10.1136/bmj.l131
7. Cattano D., Citardi M. J. Chronic rhinosinusitis with nasal polyps //Journal of Head and Neck Anesthesia. - 2019. - ?. 3. - ?. 3. - ?.
e20. https://doi:10.1097/HN9.0000000000000020
8. Chandy Z., Ference E., Lee J. T. Clinical Guidelines on Chronic Rhinosinusitis in Children //Current allergy and asthma reports. -
2019. - ?. 19. - ?. 2. - ?. 14. https://doi.org/10.1007/s11882-019-0845-7
9. Deosthale N.V., Khadakkar S.P., Harkare V.V., Dhoke P.R., Dhote K.S., Soni A.J., Katke A.B. Diagnostic Accuracy of Nasal
Endoscopy as Compared to Computed Tomography in Chronic Rhinosinusitis. Indian J Otolaryngol Head Neck Surg. 2017
Dec;69(4):494-499. https://doi.org/10.1007/s12070-017-1232-0
10. Drago L., Pignataro L., Torretta S. Microbiological aspects of acute and chronic pediatric rhinosinusitis //Journal of clinic al
medicine. - 2019. - ?. 8. - ?. 2. - ?. 149. https://doi.org/10.3390/jcm8020149
11. Ghogomu N., Kern R. Chronic rhinosinusitis: the rationale for current treatments. Expert Rev Clin Immunol. 2017
Mar;13(3):259-270. https://doi.org/10.1080/1744666X.2016.1220833
12. Grayson J. W., Harvey R. J. Topical corticosteroid irrigations in chronic rhinosinusitis //International forum of allergy &
rhinology. - 2019. - ?. 9. - ?. S1. - ?. S9-S15. https://doi.org/10.1002/alr.22331
13. Ho J. et al. Atopy in chronic rhinosinusitis: impact on quality of life outcomes //International forum of allergy & rhinology. -
2019. - ?. 9. - ?. 5. - ?. 501-507. https://doi.org/10.1002/alr.22272
14. Hong P., Pereyra C.A., Guo U., Breslin A., Melville L. Evaluating Complications of Chronic Sinusitis. Case Rep Emerg Med.
2017; 8743828. https://doi.org/10.1155/2017/8743828
15. Hopkins C. Chronic rhinosinusitis with nasal polyps //New England Journal of Medicine. - 2019. - ?. 381. - ?. 1. - ?. 55-63.
https://doi/full/10.1056/NEJMcp1800215
16. Kristjansson R. P. et al. A loss-of-function variant in ALOX15 protects against nasal polyps and chronic rhinosinusitis //Nature
genetics. - 2019. - ?. 51. - ?. 2. - ?. 267. https://doi.org/10.1038/s41588-018-0314-6
17. Marcus S. et al. The relationship between allergy and chronic rhinosinusitis //Laryngoscope Investigative Otolaryngology. - 2019.
- ?. 4. - ?. 1. - ?. 13-17. https://doi.org/10.1002/lio2.236
18. Mertz L. E., Divekar R., Rank M. A. Managing Frontal Sinusitis from Systemic Inflammatory Disease //Frontal Sinus Surgery. -
Springer, Cham, 2019. - ?. 273-310. https://doi.org/10.1007/978-3-319-97022-6_19
19. Pandrangi V., Reiter E. R. Impact of Sinus Surgery on Hospital Utilization for Complications of Sinusitis //Ear, Nose & Throa t
Journal. - 2019. - ?. 0145561319853786. https://doi.org/10.1177%2F0145561319853786
20. Raheja A. Endoscopic sinus surgery in sinusitis-induced intracranial abscess: concepts and controversies //Neurosurgical focus. -
2019. - ?. 47. - ?. 2. - ?. E13. https://doi.org/10.3171/2019.5.FOCUS19374
21. Rom D. et al. The Association Between Disease Severity and Microbiome in Chronic Rhinosinusitis //The Laryngoscope. - 2019.
- ?. 129. - ?. 6. - ?. 1265-1273. https://doi.org/10.1002/lary.27726
22. Seo M. Y. et al. Clinical pattern of fungal balls in the paranasal sinuses: our experience with 70 patients //European Archives of
Oto-Rhino-Laryngology. - 2019. - ?. 276. - ?. 4. - ?. 1035-1038. https://doi.org/10.1007/s00405-018-5258-z
23. Wu J., Jain R., Douglas R. Effect of paranasal anatomical variants on outcomes in patients with limited and diffuse chronic
rhinosinusitis. Auris Nasus Larynx. 2017 Aug;44(4):417-421. https://doi.org/10.1016/j.anl.2016.08.009
24. Yang S. F., Patel C. R., Stankiewicz J. A. Complications of Frontal Sinusitis //Frontal Sinus Surgery. - Springer, Cham, 2019. - ?.
329-338. https://doi.org/10.1007/978-3-319-97022-6_22
25. Zhang L., Zhang L.H. Comparison of different endoscopic scoring systems in patients with chronic rhinosinusitis: reliability,
validity, responsiveness and correlation. Rhinology. 2017 Dec 1;55(4):363-368. https://doi.org/10.4193/Rhin17.109.
Keyword : Legal democratic state, civil society, Political party, party concept, multiparty system, Communist
party.
References:
1. Constitutional Law of the Republic of Uzbekistan. Authors' Team. - T .: Finance, 2002 -p.643
2. Civil Society Fundamentals / A. Jalilov, U.Muhammadiev, K.Juraev and others. - Tashkent, Baktria Press, 2015 -p.199.
3. https://www.cia.gov/library/publications/the-world-factbook. US National Database.
4. Kyrgyzbaev M Civil society: Political parties, ideologies, cultures. - Tashkent: East, 1998. - p. 90.
5. Program of the Democratic Party of Uzbekistan National Revival. - Tashkent. 2008.
6. Charter and Program of the National Democratic Party of Uzbekistan. - Tashkent: Gafur Gulom, 2004. - B. 32-33.
7. Charter "Movement of Entrepreneurs and Businessmen - Liberal Democratic Party of Uzbekistan" - Tashkent, 2006. - p.4-5.
8. National Database Database, No. 06/19/5635/2502 dated 18.01.2019.
9. Bekov I.R. Legislative Chamber of Oliy Majlis of the Republic of Uzbekistan and political parties: Monograph. - T .: Publishing
house TSIU, 2010. - p. 6.
10. Mahmudov AA Improving the oversight activities of local representative bodies in the Republic of Uzbekistan: Jurid. science. ...
fal. doc. diss. autoref. - Tashkent: 2019 - p. 16.
11. Yuldashev A. Some theoretical and legal issues of strengthening deputy control in Uzbekistan // Society and Management, 2014.
- ?2. -p. 48.
12. Rajabova M. Constitution of the Republic of Uzbekistan - the legal basis of building a civil society // Materials of the round table
on the theme: "The Constitution of the Republic of Uzbekistan - the basis of legal reform". - T., 2007. -p.9.
Mazlitdinova Dilnoza, Suyunova Maftuna, Khaydarova Guzalkhon, Saibnazarova Makhliyo,
Authors:
Kodirova Maftuna
Paper Title: Modular Training System as a Factor of Improving Educational Process
Abstract: At present, a new concept of industrial production is being implemented in Uzbekistan. The
continuous process of updating equipment and technology places high demands on the training of specialists in
the field of preparing future foreign language teachers. In modern scientific, technical and socio-economic
conditions, the main requirement for professional training of a specialist is the guarantee of the formation of a
clearly defined level of professional competence. This inevitably entails a change in traditional educational
technologies, in which it is impossible to assess the potential learning outcome. As a fundamental one, we accept
the provision that the main, achievable goal of the functioning of the professional education system is to build
the competence of a specialist, which also includes the development of professional qualities of his personality.
Thus, the formulated goal of vocational training, in our opinion, is more consistent with the real requirements
and conditions of production. The universally noted goal-setting as an orientation to the training of highly
qualified specialists who are fluent in their chosen profession remains at the level of declarations, without
changing the real situation in practice.
The article on modular training analyzes the integration of the principles of modularity, self-organization and
context that can guarantee the formation of a certain level of professional competence of future specialists,
which determines the relevance of the chosen scientific direction of research.
Keyword : The module; the principle of activity; the principle of listening and equality; the principle of
problem; the principle of cognitive visualization; the principle of reliance; the principle of motivation; the
principle of modularity; technology; modular training; module training program.
References:
554. 1. Bespalko A.P. Programmed Learning: Didactic Fundamentals. M., 1970, p. 300.
2. Gareev V.M., Kulikov S.I., Durko E.M. Principles of modular education // Bulletin of higher education. 1987. No. 8. P. 9 17.
3. General course of higher mathematics for economists: a textbook / Ed. IN AND. Ermakova. M., 2007. P.656 3160-
4. Kupisevich Ch. Fundamentals of general didactics // Transl. from Polish, M., 1986. p. 367 3166
5. Landshaer V. The concept of "minimum competence" // Prospects: educational issues. 1988, No. 1. - P. 27 - 34.
6. Lapchinskaya V.P. Secondary school of modern England, M., 1977-216 p.
7. Lavrentiev G.V., Lavrentiev N.B. Components of modular learning technology Barnaul Publishing House of Altai University,
1994. p. 128.
8. Lavrentieva N.B. On the introduction of modular education in the university pedagogical system // Abstracts of reports of the
interuniversity conference "Modern problems of activating creative abilities in the process of training engineers." Barnaul, 1993 .-
- P. 34 - 42.
9. Lavrentieva NB From the experience of introducing a modular training system at the faculty of engineering // Bulletin of the
UNMO of Russian universities in engineering and pedagogical education. Yekaterinburg, 1993.P. 34-48.
10. Lavrentieva NB The pedagogical foundations of the development of modular training technology. Barnaul, Alt.GTU Publishing
House, AltAEP, 1998 .-- 252 p.
11. Mamrak A.V. Programmed teaching in the Russian language classes in the context of the restructuring of higher education //
Republican Interdepartmental Scientific Collection. Programmed training. Issue No. 27.1. Kiev, 1990. P. 7.-12.
12. Martsinkovsky I.B. University education in capitalist countries. Tashkent, 1981. 190 p.
13. Mikhailova I.G. Mathematical training of an engineer in a professional orientation of intersubject communications: Diss. . Ph.D.
Tobolsk, 1998. P.221
14. Moroz O.V. Professionally oriented design of didactic support of a mathematics course for the specialty "Regional Studies": D iss.
. Ph.D. Krasnodar, 2007. P.235
15. Nemov P.C. Practical Psychology: Knowing Yourself: Influencing People: A Manual for Students. M., 2001. P.320
16. Nikandrov N.D. Modern higher school of the capitalist countries. The main issues of didactics M., 1978. 279 p.
17. Pedagogy. Study Guide for Stud. ped universities and ped. colleges / Ed. P.I. Fagot. M., 2004. P. 608
18. Pidkasisty P.I. Independent cognitive activity of schoolchildren in learning. M., 1980.240s.
19. Prigogine I. Nature, science and new rationality. M., 1983 p. 243.
20. Theory and practice of pedagogical experiment / Ed. A.I. Piskuno-va, G.V. Vorobyov. M .: Pedagogy, 1979.- 208 p.
21. Vazina K.Ya. Human self-development and modular support. N. Novgorod, 1991. -174 p.
22. Woolridge D. Mechanisms of the brain. M .: Mir, 1965. P.148.
23. Yub. Sennovsky I.B. Modular pedagogical technology at school: analysis of the conditions and results of development, M., 1995 .
P.123.
Keyword : lifestyle, customs, culture, spirituality, identity, traditions, values, self-consciousness, historical
memory, mentality, historical monuments, spiritual heritage, historical monuments, national consciousness,
thought.
References: 3167-
1. From national revival to national development "Youth Publishing House". Tashkent -2019. [1.p, 144], [5.B, 146], [1.p, 144], [5.p, 3171
146]
2. Kurbanov T.H. The role of cultural heritage in the formation of national pride in young people. Philosophy Science. Candidate
diss. NUU. Tashkent. 2005. p.139
3. Madaeva Sh. Anthropology of Identity. - Tashkent,
Publishing House, 2015. p.154
4. Tulenov J. The philosophy of values. -Tashkent. Uzbekistan, 1998. [4.p, 61], [11.p, 235].
5. Idirov U., Tashkhodjaev S. Deepening internationalization globalization.-T: Journal of Society and Governance, 2007, No.2
6. Otamuratov S. Globalization and the nation. Tashkent., "New Generation Generation", 2008., p-137
7. Mirziyoev Sh.M. We will continue with determination and take to a new level. - Tashkent.: Uzbekistan, No. 1, 2017. [8.p, 298],
[12.p, 94], [13.p, 124].
8. Ubaidullaeva R., Ota-Mirzaev. Uzbekistan in the mirror of public opinion. Tashkent: Iqtisod-Moliya, 2016.-P.98
9. Karimov I.A. High spirituality is an invincible force. Spirituality, Tashkent: -2010. p.-90.
Paper Title: Ferghana in the Period of Amir Timur's Struggle for Power (1360-1370)
Abstract: The article analyzes the political processes that occurred in the Ferghana Valley during the years
of the struggle for the power of Amir Temur. During the analysis, by comparative and critical study of the
information available in historical sources, the role and importance of the Ferghana Valley in the political life of
Maverannakhr were highlighted. As for the studied period of the history of the Ferghana Valley, sources only
contain information on Khojend, the analysis was carried out using the example of this property. Attention is
drawn to the fact that the neighborhood with the nomadic state Mogolistan had a great influence on the political
reality of the Ferghana Valley. Also, on the basis of a critical review of the historical and political events
described in the sources, the author provides new conclusions.
Keyword : Maverannakhr, Mogolistan, Ferghana, Khojend, Amir Temur, Bayazid Jalayir, Zafarname.
References:
1. Amir Timur in the world history. Ed. Editor: H. Karamatov. Authors: S. Saidkosimov (leader), A. Akhmedov, B. Akhmedov and
others. Enhanced and revised second ed. Tashkent, 2001.
558. 2. Aҳmedov B. Tarihdan saboqlar. - T .: Kituvchi, 1994.
3. Aҳmedov B. Amir Temurni yod etib. - T .: Uzbekistan. 1996.
4. Bartold V.V. Compositions. T. 2. Part 2. M., 1964. [Bartold V.V. Sochineniya (Writings). Vol.2. P.2. Moscow, 1964. 3180-
5. Yazdi, Sharafiddin Ali. Zafarname. Authors of the preface, comments and indexes A. Ahmad and H. Bobobekov. Tashkent, 1997 3187
6. Mirkhond. Ravzat al-safo fi siyrat al-anbiyo val mulk val hulofo. Electronic version of the manuscript from the library of the
University of Michigan.
7. Natanzi, Muiniddin. Muntakhab ut-tavorikhi Muiny. Author of trans. from Persian, preface and comments Ghulam Karimi.
Tashkent, 2011.
8. Samarkandi, Abdurazzak. Matla as-sadayn va majma al-bakhrain. Electronic version of the manuscript from the library of the
University of Michigan].
9. Khavafi, Fasikh. Mudjmal-I Fasikhi. Trans., preface, notes and indexes by D. Yu. Yusupova. Tashkent, 1980.
10. Khaydar Mirzo, Mukhammed. Tarikh-i Rashidi. Preface, translation from Persian by A. Urunbayev, R.P. Djalilova, L. M.
Yepifanova, comments and indexes by R.P. Djalilova and L. M. Yepifanova. Tashkent, 1996.
11. Khaydar Mirzo, Mukhammed. Tarikh-i Rashidi. Preface, translation from Persian by V.Rakhmanov and Ya.Egamova. Tashkent,
2010.
12. Khondamir, Giyasiddin. Khabib us-siyar fi akhbori afrodi bashar. Preface, translation from Persian by Jalil Khazratkulov, Ismail
Bekjonov, comments by Ashraf Akhmedov, Ismoil Bekjonov. Tashkent, 2013.
13. Shami, Nizamiddin. Zafarname. Trans. from Persian by Y. Khakimjonov, processing and preparing the translation for publication
and the responsible editor A.Urinbaev, compiler of comments and vocabulary H.Karamatov (comments to geographical names O.
Buriev), trans. from the Persian “Zail” (“Appendix”) of Khafiz Abru to “Zafarname” by A. Buriev. Tashkent, 1996.
14. Yazdi, Sharafuddin Ali. Zafarname (Events in Maverannakhr (1360-1370). Released. Ed., preface and preparation for publication
by A. Urunbaev, translated by O. Buriev. Tashkent, 1994.
15. Yakubovsky A.Yu. Timur (Experience of brief characteristics). // Voprosy istorii (Issues of history). 1946. No. 8-9. P. 42-74.
Paper Title: Judicial System in the Criminal Proceedings in Some CIS Countries
Abstract: This article examines the system of review of court decisions in criminal proceedings in some
CIS (Commonwealth of Independent States) countries. The peculiarities of the verification of legality, validity
and fairness of court decisions and the procedure for organizing the activities of higher courts are analyzed. The
author also draws attention to recent changes in the criminal procedure legislation of such countries as Ukraine,
Kazakhstan and Kyrgyzstan. Based on the results of the analysis of the system of methods of revision of court
decisions functioning in foreign countries, the author makes conclusions about the similarities and distinctive
features of the institute of revision of court decisions and puts forward proposals to improve the system.
Keyword : criminal proceedings, review of court decisions, cassation proceedings, appeal proceedings,
supervisory proceedings, resumption of criminal proceedings in view of new or newly discovered circumstances,
courts of higher instances, appeal of decisions, miscarriage of justice.
References:
1. Исаева К.А., Абдукаримова Н.Э., Воронцова И.Н. — К вопросу об отдельных тенденциях и реформирования уголовно-
процессуального законодательства в странах СНГ // Полицейская и следственная деятельность. – 2018. – № 2. – С. 9 - 15. –
С.9. Ibid.
2. Апелляция, кассация, надзор: новеллы ГПК РФ, УПК РФ. Первый опыт критического осмысления / под ред.Н.А.Колоколова.
– М.: Юрист, 2011; Головко Л.В. Новеллы УПК РФ (закон от 29 октября 2010 года): прогресс или институционный хаос? //
Апелляция, кассация, надзор: новеллы ГПК РФ, УПК РФ. Первые результаты применения. В 2 ч. Ч.1. / под
общ.ред.Н.А.Колоколова. – М.: Юрлитинформ, 2015. – С. 487-503; Колоколов Н.А. Апелляция: лиха беда начало! //
Юридическая газета. – 2011. - № 10. – С.12-13. и др.
3. This is also evidenced by Kolokolov's observation that the analysis of appeals (representations) filed with the courts shows that the
participants of the process, first of all, lawyers and prosecutors, are not able to write them // См. об этом: Апелляция, кассация,
надзор: применение УПК РФ: монография / под общ.ред. докт.юрид.наук Н.А.Колоколова. – М.: Юрлитинформ, 2018. – 464 с.
– С. 6.
4. Победкин А.В. ibid – С. 46-50.
5. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.19.
560. 6. Указ. работа. – С.431.
7. For information, in the criminal procedure legislation of the Kyrgyz Republic and the Republic of Kazakhstan these decisions are 3193-
called "judicial acts", and in Ukraine - "judicial decisions". 3208
8. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.439.
9. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.439.
10. Романова А.А. Современное апелляционное производство в уголовном процессе России: диссертация ... кандидата
юридических наук: 12.00.09 / Романова Анастасия Андреевна; [Место защиты: ФГКОУВО Нижегородская академия
Министерства внутренних дел Российской Федерации], 2017. // http://www.dslib.net/kriminal-process/sovremennoe-
apelljacionnoe-proizvodstvo-v-ugolovnom-processe-rossii.html
11. The data obtained during the interviews with judges of the courts of the constituent entities of the Russian Federation indicate that
judges simply cannot physically reconsider the volume of criminal cases that come to the appeal instance. Most of the judges
interviewed agreed with the maintenance of a kind of "procedural filter" that would allow them to select those criminal cases in which
a full-fledged appeal procedure should actually be conducted. // Романова Анастасия Андреевна. Современное апелляционное
производство в уголовном процессе России: диссертация ... кандидата юридических наук: 12.00.09 / Романова Анастасия
Андреевна; [Место защиты: ФГКОУВО Нижегородская академия Министерства внутренних дел Российской Федерации],
2017. // http://www.dslib.net/kriminal-process/sovremennoe-apelljacionnoe-proizvodstvo-v-ugolovnom-processe-rossii.html
12. They are limited by both the available staff capacity and the budget ceiling for resources // Скляренко М.В. Система
правоохранительных органов, адвокатуры и судов, гарантирующих деятельность механизма обжалования, проверки и
пересмотра судебных решений в уголовном процессе // См. об этом: Апелляция, кассация, надзор: применение УПК РФ:
монография / под общ.ред. докт.юрид.наук Н.А.Колоколова. – М.: Юрлитинформ, 2018. – 464 с. – С. 17.
13. Апелляция, кассация, надзор: применение УПК РФ: монография / под общ.ред. докт.юрид.наук Н.А.Колоколова. – М.:
Юрлитинформ, 2018. – 464 с. – С. 17-18.
14. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.469.
15. Свиридов М.К. Вопросы совершенствования кассационного производства в российском уголовном процессе // Вестник
Томского государственного университета. Право. – 2017. - № 23.- С. 73. // https://cyberleninka.ru/article; Червоткин А.С.
Апелляция и кассация: пособие для судей. – М.: Проспект, 2010. – 336 с. – С. 30-31.
16. Червоткин А.С. Апелляция и кассация: пособие для судей. – М.: Проспект, 2010. – 336 с. – С. 32.
17. Уголовный процесс: учебник / С.В.Зуев, К.И.Сутягин. - Челябинск: Издательский центр ЮУрГУ, 2016. – 563 с. – С.469.
18. Свиридов М.К. Вопросы совершенствования кассационного производства в российском уголовном процессе // Вестник
Томского государственного университета. Право. – 2017. - № 23. – С. 73. // https://cyberleninka.ru/article.
19. 1Дикарев И.С. Надзорно-кассационная форма пересмотра судебных решений в уголовном процессе. -Волгоград: Изд-во
Keyword : humanism; the quality of higher education; humanization of education; humanity; personality.
References:
1. Berdyaev N. Soul of Russia / N. Berdyaev .- M .: T8RUGRAM, 2018.-140p.
2. Bryzgalina E.V. Humanization and humanitarization of education: from school to university [Electronic resource] / Е.V.
Bryzgalina. - Access mode http://lib.teacher.msu.ru/pub/2303.
3. Wissema, Johan G. University of the third generation. - M.: Olympus - Business, 2016 .- 432 p.
4. Gordashnikov V.A., Osin A.Ya. Education and health of students of a medical college.- M .: Academy, 2009.- 395 p.
5. 5.Gorshkov M.K. Russian society in the conditions of transformation (sociological analysis). - M.: “Russian Political
Encyclopedia” (ROSSPEN), 2000. - 384 p.
6. Dobruskin M.E. Humanization as a strategy of higher education. - Journal: Philosophy and Society. Issue No. 3 (40) / 2005.
[Electronic resource] / E.M. Dobruskin. - Access mode https: // www. socionauki. com / journal / articles / 126657.
7. Ivanko V.Yu. Problems of humanization of vocational education [Electronic resource] / V.Yu. Ivanko.- Access mode
https://nsportal.ru/npo-spo/sotsialnye-nauki/library/2016/02/12.
8. Karavanov A.A., Ustinov I.Yu. Actual problems of humanization and humanization of military engineering education // Scientific
Review. Pedagogical sciences. - 2016. - No. 3. - P. 57-85.
9. Kravets, A.S. Humanization and humanitarization of higher education. [Electronic resource] / A.S. Kravets // Voronezh State
University. - Access mode: http://www.rciabc.vsu.ru/irex/pubs/kravets2.htm.
10. Kravchenko S.A. The formation of a complex society: for a humanist turn // Humanitarian of the South of Russia .2013. V. 0. No.
3. P. 141-146.
11. Culture as the basis of the content of education // Site of Academician RAO Novikov AM [Electronic resource]. - Access mode:
http: // anovikov. com / artikle / kult_osn.htm
12. Likhachev D. S. Book of worries / Articles, conversations, memories /. - M.: Publishing house "News", 1991. [Electronic
resource] / D.S. Likhachev. - Access mode: http://svitk.ru/004_book_book/ 16b / 3559.
13. Lopatin A.R. The formation of social maturity among schoolchildren in the context of a humanistic approach // Bulletin of
Kostroma State University. ON. Nekrasov. - 2013. - V. 19. - No. 4. P.7-9.
14. Marshak A.L. Cultural identity as a factor in strengthening the integrity of Russia // Humanitarian of the South of Russia. 2014.
No. 4. P. 50-54.
15. Naletova I.V. Research analytics of higher education as a culture-forming constant of our time Specialty 24.00.01 - Theory and
history of culture: abstract of a dissertation for the degree of Doctor of Philosophy. - Tambov.-2005. 44p.
16. Problems and prospects of spiritual and moral education of adolescents and youth in the context of the introduction of federa l
state education: materials of the All-Russian scientific and practical conference (March 18, 2011). - Tambov: TOGAU DPO
“Tambov Regional Institute for Advanced Training of Education Workers”, 2011.– 187 p.
17. Problems of modern teacher education. - Collection of scientific papers: - Yalta: RIO GPA, 2018. - Issue. 61. - Part 4. - 334 p.
18. Romanyuk L.V. Humanistic pedagogy. [Electronic resource] / L.V. Romanyuk. - Access mode file: / C: / Users / user /
Downloads. /pdf.
19. GEF // Official site of the National Association for the Development of Education and Science. [Electronic resource]. - Access
mode: https: //fgos.ru/.
20. Chernitskaya A.L. Humanization of higher education: the nature and prospects of development: an abstract of a dissertation for
the degree of candidate of Philosophical sciences: 09.00.11 / Chernitskaya Anna Leonidovna; [Place of protection: Moscow State
reg. Un-t]. - Moscow, 2008 .- 23 p.
Paper Title: Method for Calculating the Injection Effect to Create Air Circulation Inside Containers
Abstract: The paper investigates the process of air circulation inside the container due to the effect of
injection by an external stream. It is shown in the paper that injection can be created using the open hatch of the
container, which is fixed at a certain angle. To calculate the emerging turbulent flow, a new effective
mathematical model is used. The obtained numerical results of the hydrodynamic equations show that by a
simple structural change in a simple container, air circulation inside the container can be significantly improved.
This phenomenon gives a good perspective for the use of containers in the transportation of food.
Keyword : air circulation, container, injection, mathematical model, air flow, air injection
563.
References:
1. Dzyuba I.S. transportation of perishable goods./P.1., Gomel 1999.
3222-
2. Malikov Z.M., Khadjimukhmaetova М.А. Methods for modifying simple containers for the transport of perishable goods . №1, 2017, 3224
page.58.
3. Abramovich G.N. Theory of turbulent jets/Moscow «Scienсe», 1984.
4. Spalart P. R., Allmaras S. R. “A one-equation turbulence model for aerodynamic flows”// AIAA Paper 1992-0439.
5. Menter F. R. “Zonal two-equation k-ω turbulence models for aerodynamic flows”// AIAAPaper 1993- 2906.
6. Menter F. R., Kuntz M., and Langtry R. “TenYears of Industrial Experience with the SST Turbulence Model”// Turbulence, Heat and
Mass Transfer 4, ed: K. Hanjalic, Y. Nagano, and M. Tummers, Begell House, Inc., 2003, pp. 625 - 632.
7. Anderson D., Tannehill J., Pletcher R. Computational fluid mechanics and heat transfer. -Moscow: Mir, 1990, Vol.1
8. Patankar S. Numerical heat transfer and fluid flow./Hemiphere Publishing Corporation, New York, 1980.
9. Merganov A. M. Model of search for the placement of warehouses of tarnet-and-string cargo depending on the cargo //Journal of
TIRE. – 2018. – Т. 14. – №. 2. – С. 129-133.
10. Avaz M. Merganov, Daurenbek I. Ilesaliev , Alexander A. Svetashev, Method of accommodation of tarned-piece cargoes in auto-
vehicle // Innotrans. 2019, #3 (33), 32-37 pp. DOI:10.20291/2311-164X-2019-3-32-36
Authors: Aziz Zikriyoev, Sokhibmalik Khomidov, Ravshan Nurimbetov, Tokhir Khasanov, Zebo Abdullayeva
Improving the School Quality Through Winning Education Turbulence in Uzbekistan
Paper Title:
(Evidence from the Ministry of Secondary Education Uzbekistan, Gijduvan Region 65 Schools)
Abstract: This research discusses current status of secondary education quality and prospective
development outcomes from the testable research area in 65 school quality parameters of Gijduvan district
Bukhara region in Uzbekistan. The authors try to discover the problem in which relating improvement of
education system at schools far from the capital. By sorting out 60 variables authors come across final decision
and demonstrate the feasibility of economic and social effectiveness of each school. Current article opens up a
new field in preconditions, causes and consequences of influenced education quality variables in which selected
secondary schools. Authors excluded 10 variables from the research analyses of major schools due to collected
data are the same results. Specific area of interest in cases of Gijduvan are distributed and analyzed in Eviews
9.0. Perhaps, paper work offers a solution for the of relationship of school quality by winning turbulence
education via empirical analyses. Main findings have been distributed in forms of the least square method. An
objectivity of discussion is concentrating on turbulence trajectory as a total loses of quality at schools and
winning it’s directions by conceptual figure which offered by authors. The authors also made an attempt to
provide reasons for raising visibility of schools through quality education by calculating efficiency in three
ways. Finally, conclusion of paper suggests that each selected variable efficiency calculated in detail coefficients
564. and presented marble model of obtained results for testing secondary school quality of other regions in
Uzbekistan. 3225-
3231
Keyword : Gijduvan, secondary education, education quality, turbulence education, pupil, reforms.
References:
1. Angrist, J.D., Lavy, V., 1999.Using Maimonides' rule to estimate the effect of class size on scholastic achievement. Q. J. Econ.
114, 533–575.
2. Australian Principals Associations Professional Development Office (APAPDC) (2000).
3. Chetty, R., Friedman, J.N., Rockoff, J.E., 2014.Measuring the impacts of teachers I: Evaluating bias in teacher value-added
estimates. Am. Econ. Rev. 104 (9), 2593–2632.
4. Christopher Day and Pamela Sammon, Successful school leadership, 1999, p48.
5. Clark, D., 2010.Selective schools and academic achievement. BE J. Econ. Anal. Policy 10 (1935–1682).
6. Coleman, J.S., Campbell, E.Q., Hobson, C.J., Mc. Partland, J., Mood, A.M., Weinfeld, F.D., York, R.L., 1966.Equality of
Educational Opportunity. U.S. Government Printing Office, Washington, D.C.
7. Cullen, J.B., Jacob, B.A., Levitt, S.D., 2005.The impact of school choice on student outcomes: an analysis of the Chicago public
schools. J. Public Econ. 89 (5),
8. Currie, J., Thomas, D., 1999.Early Test Scores, Socioeconomic Status, and Future Out-comes. NBER Working Paper No. 6943.
9. Dynarski, S., Hyman, J.M., Schanzenbach, D.W., 2013.Experimental evidence on the effect of childhood
investments on postsecondary attainment and degree completion.
10. European ideas for better learning: the governance of school education systems Produced by the ET 2020 Working Group
Schools The final report and thematic outputs of the ET2020 Working Group Schools, 2018, p 4.
11. Goldhaber, D.D., Brewer, D.J., 2000.Does teacher certification matter? High school teacher certification status and student
achievement. Educ. Eval. Policy Anal. 22 (2), 129–145.
12. Hanushek, E.A., Rivkin, S., 2006.Teacher Quality. In: Hanushek, E., Welch, F. (Eds.), Hand-book of the Economics of Education
Volume 2. Elsevier North Holland, Oxford, pp. 1051–1078.
13. Hastings, J.S., Weinstein, J.M., 2007.No Child Left Behind: Estimating the Impact on Choices and Student Outcomes. NBER
Working Paper No. 13009.
14. Jackson, C. Kirabo, 2013.Match quality, worker productivity, and worker mobility: Direct evidence from teachers. Rev. Econ.
Stat. 95 (4), 1096–1116.
15. Pop-Eleches, C., Urquiola, M., 2013.Going to a better school: Effects and behavioral responses. Am. Econ. Rev. 103 (4), 1289–
1324.
16. Quality assurance for school development Guiding principles for policy development on quality assurance in schoo l education
Produced by the ET 2020 Working Groups, EUROPEAN COMMISSION, 2017, p3.
17. Rivkin, Steven G., Hanushek, Eric A., Kain, John F., 2005.Teachers, schools and academic achievement. Econometrica 73 (2),
417–458.
18. Rockoff, Jonah E., 2004.The impact of individual teachers on student achievement: Evidence from panel data. Am. Econ. Rev. 94
(2), 247–252
19. Rockoff, Jonah E., Jacob, Brian A., Kane, Thomas J., Staiger, Douglas O., 2011.Can you recognize an effective teacher when you
recruit one? Education. Finance. Policy 6 (1), 43–74.
20. Successful school leadership, copyright education development trust 2016. the views and opinions expressed in this publicatio n
are those of the authors and do not necessarily represent the views of education development trust, 2014 report 978-1-909437-76-
0, p7.
Keyword : labor contract, on the initiative of an employee, termination of labor contract, amending
employment contracts, foreign experience, employee rights, employer obligations, employer rights, electronic
labor contracts, automated system.
References:
1. 1.Abaeva T.V. Legal regulation of termination of an employment contract by agreement of the parties and at the initiative of the
employee: the dissertation ... PhD of legal sciences: 12.00.05 / Abaeva Tatyana Viktorovna; [Place of defence: Moscow State
Law Academy named after O.E. Kutafina] .- Vladikavkaz, 2011.- 152 p.
2. International Labor Organization’s major conventions and recommendations. // The editor in charge of the Uzbek edition -
A.Saidov. - T .: National Center for Human Rights of the Republic of Uzbekistan, 2008. p. 12.
3. 3.Pirmatov O. Aspects of development of general principles of labor relations in international private law. Labor Code of the
Republic of Uzbekistan: Achievements and Prospects // Collection of Materials of the Republican Scientific and Practical
Conference. –T .: TSUL, 2016. – p. 89.
565. 4. International Labor Organization Convention 158 “On Termination of an Employment Agreement at the Employer’s Initiative”//
www.ilo.org сайти манбаси. http://www.ilo.org/dyn/normlex.
5. Alimov N. In the conditions of a market economy, it is necessary to protect employees. The newspaper is a Norma consultant. 3232-
2013. https://gazeta.norma.uz/publish/doc/text91917. 3238
6. M.Mahamatov. International Labor Organization and Uzbekistan // Executive Editor: A.Kh.Saidov.-T .: National Center for
Human Rights of the Republic of Uzbekistan,
2011. – p. 46.
7. Dorokhina J.Yu. An employment contract under the laws of the Russian Federation and individual CIS member states: for
example, the Republic of Belarus and the Republic of Kazakhstan: dis. ... PhD of legal sciences. - M., 2009.
8. Tomashevsky K.L. Codification of legislation on changes to an employment contract in Belarus, Kyrgyzstan and Russia / K.L.
Tomashevsky // Man and Labor. - 2000. - No. 4.
9. Sannikova L.V. Employment agreement in Russia. / L.V. Sannikova. - M.: MT-Press, 1999.
10. Chikanova L.A. Labor contract / L.A. Chikanova // Labor law. - 2004. - No. 4 - 5.
11. Stephan Hardly, Mark Butler. Europan Employment Laws: A comprative guide
(3rd edition). Great Britain. Ltd by: Short Run Press, 2016. – P. 133.
12. Treu T. Labour Law in Italy. Alphen aan Den Rijn, 2011. P. 110.
13. Jacobs A. Labour and the Law in Europe. Nijmegen, 2011. P. 92
14. Filipova I.A. Features of the legal regulation of labor under the laws of Russia and France. Reasonable matters. Monograph. - M.,
2016. - P. 12.
15. Filipova I.A. Features of the legal regulation of labor under the laws of Russia and France. Reasonable matters. Monograph. - M.,
2016. - P. 8.
16. Employment law overview Germany 2019-2020 Pusch Wahlig Workplace Law / Proud Member of L&E Global. P 18.
https://knowledge.leglobal.org/wp-content/uploads/sites/2/LEGlobal_Memo_Germany.pdf
17. “Labor law: the experience of comparative legal research: Monograph. (Lebedev V.M., Melnikova V.G., Nazmetdinov R.R.
Norma, Infra-M, 2018. 294 p.
18. Rakhimov M.A. Labor law is an example of Germany. Law and Duty // # 1/2018. P.35.
19. Giving Notice and Notice Pay // The Official Web-Site of Advisory, Conciliation and Arbitration Service (ACAS). URL
http://www.acas.org.uk/index.aspx?articleid=4095.
20. Atsushi Tsuneki and Manabu Matsunaka. Labor relations and labor law in Japan. Compilation © 2011 Pacific Rim Law & Policy
Journal Association. http://workspace.unpan.org/sites/Internet/Documents/UNPAN93857.pdf
21. Rakhimov M.A. Comparative overview of ways to protect workers' labor rights in Uzbekistan, Germany and the United States of
America. 4 (75) -2017. p. 59.
22. K. Lucassen, S. Sluter, M. Shul, M. Wang. Corporate Law. Employment Law in Switserland // Journal of the International
Institute for Law and Medicine. Editor Dennis Campbell. Р. 172.
23. M.Yu.Gasanov. Prospects for the development of labor legislation in market relations. Materials of the roundtable. TSUL, 2015. -
p. 6.
24. https://mehnat.uz/statistika/view/8.
25. www.pravo.ru.
26. Matrasulov DR Dynamics of Labor Code of the Republic of Uzbekistan. // Prospects for the development of labor legislation in
market relations. Materials of the roundtable. TSUL, 2015. - p. 22.
27. M.Yu.Gasanov. Bridging the gaps in the legal regulation of public relations in the field of wage labor and further improving the
Labor Code of the Republic of Uzbekistan. TSUL, 2016. - p. 18.
28. Pantyukhina A.P. Termination of the employment contract at the initiative of the employer on the grounds associated with the
guilty behavior of the employee (theoretical and practical problems). Abstract of diss. PhD of legal sciences. M., 2013 .- p. 6-7.
Keyword : railway transport, railway section, carrying capacity, cargo transportation, stage of development
566.
References:
1 Park, B., & Kim, C. On the Railway Line Planning Models Considering the Various Halting Patterns. Proceedings of the 3239-
International MultiConference of Engineers and Computer Scientists, 2010, pp.2146–2151. 3245
2 Goossens J, van Hoesel CPM, Kroon LG On solving multi-type railway line planning problems. Eur J Oper Res 168(2): 2006,
pp.403–424
3 Chuang, M. Y. and Johnson, W. H. A. Hop on board: the importation and future development of high -speed rail (HSR) in China,
Journal of Technology Management in China, 6 (3), 2011, pp.232 – 241.
4 Gercek, H., Karpak, B., Kilncaslan, A multiple criteria approach for the evaluation of the rail transit networks in Istanbul.
Transportation 31, T., 2004, pp.203–228.
5 Kuby, M. J., Xu, Z., & Xie, X. Railway network design with multiple project stages and time sequencing. Journal of Geographical
Systems, 3, 2001. pp.25–47
6 M.R. Bussieck, P. Kreuzer, and U.T. Zimmermann. Optimal lines for railway systems. Technical report, TU Braunschweig, 1995. to
appear in European J. Oper. Res
7 S. Lepreux, M. Abed and C. Kolski, “A human-centred methodology applied to decision support system design and evaluation in a
railway network context,” Cogn Tech Work, 2003 (5), pp.248-271
8 8. Cervero, R., & Murakami, J. (2010). Rail and property development in Hong Kong: Experiences and extensions. Urban Studies,
46, pp.2019–2043.
Keyword : Autonomous driving, camera, convolution neural network, deep neural network, machine
learning.
References:
1 D., Ling H., Kar A., Fidler S. Efficient Interactive Annotation of Segmentation Datasets with Polygon-RNN++; Proceedings of the
2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June 2018; pp. 859–868
2 Aggarwal C.C. Neural Networks and Deep Learning. Springer International Publishing; Cham, Switzerland: 2018.
3 Amodei D., Ananthanarayanan S., Anubhai R., Bai J., Battenberg E., Case C., Chen J. Deep speech 2: End-to-end speech recognition
in English and Mandarin; Proceedings of the 33rd International Conference on Machine Learning; New York, NY, USA. 19 –24 June
2016; pp. 173–182.
4 Bojarski M., Del Testa D., Dworakowski D., Firner B., Flepp B., Goyal P., Jackel L., Monfort M., Muller U., Zhang J., et al. End to
end learning for self-driving cars. arXiv. 2016. 1604.07316
568. 5 Bojarski M., Yeres P., Choromanska A., Choromanski K., Firner B., Jackel L., Muller U. Explaining how a deep neural network
trained with end-to-end learning steers a car. arXiv. 2017. 1704.07911
6 Buehler M., Iagnemma K., Singh S. Springer Tracts in Advanced Robotics. Springer; Berlin/Heidelberg, Germany: 2009. The 3252-
DARPA Urban Challenge: Autonomous Vehicles in City Traffic. 3259
7 Chen Y., Wang J., Li J., Lu C., Luo Z., Xue H., Wang C. LiDAR-Video Driving Dataset: Learning Driving Policies Effectively;
Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June
2018; pp. 5870–5878.
8 Chen Z., Zhang T., Ouyang C. End-to-End Airplane Detection Using Transfer Learning in Remote Sensing Images. Remote
Sens. 2018;10:139. doi: 10.3390/rs10010139
9 Chollet F. Deep Learning with Python. Manning Publications; Shelter Island, NY, USA: 2018.
10 He K., Zhang X., Ren S., Sun J. Deep residual learning for image recognition; Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition; Las Vegas, NV, USA. 27–30 June 2016; pp. 770–778
11 Kocić J., Jovičić N., Drndarević V. Driver behavioral cloning using deep learning; Proceedings of the 17th International Symp osium
INFOTEH-JAHORINA (INFOTEH); East Sarajevo, Republika Srpska. 21–23 March 2018; pp. 1–5
12 Krizhevsky A., Sutskever I., Hinton G.E. Imagenet classification with deep convolutional neural networks. In: Pereira F., Burges
C.J.C., Bottou L., Weinberger K.Q., editors. Advances in Neural Information Processing Systems. Neural Information Processing
Systems Foundation, Inc.; Vancouver, BC, Canada: 2012. pp. 1097–1105.
13 LeCun Y., Bottou L., Bengio Y., Haffner P. Gradient-Based Learning Applied to Document Recognition. ; Available
online: http://yann.lecun.org/exdb/publis/pdf/lecun-01a.pdf.
14 Mehta A., Adithya S., Anbumani S. Learning end-to-end autonomous driving using guided auxiliary supervision. arXiv. 2018.
1808.10393
15 Orponen P. Computational complexity of neural networks: A survey. Nord. J. Comput. 1994;1994:94–110
16 Raghu M., Poole B., Kleinberg J., Ganguli S., Sohl Dickstein J. On the expressive power of deep neural networks; Proceedings of the
34th International Conference on Machine Learning; Sydney, Australia. 6–11 August 2017; pp. 2847–2854.
17 Ravankar A., Ravankar A.A., Kobayashi Y., Hoshino Y., Peng C.-C. Path Smoothing Techniques in Robot Navigation: State-of-the-
Art, Current and Future Challenges. Sensors. 2018;18:3170. doi: 10.3390/s18093170.
18 Russakovsky O., Deng J., Su H., Krause J., Satheesh S., Ma S., Berg A.C. Imagenet large scale visual recognition challenge. Int. J.
Comput. Vis. 2015;115:211–252. doi: 10.1007/s11263-015-0816-y.
19 Shalev-Shwartz S., Shammah S., Shashua A. Safe, multi-agent, reinforcement learning for autonomous driving. arXiv. 2016.
1610.03295
20 Silver D., Hubert T., Schrittwieser J., Antonoglou I., Lai M., Guez A., Lillicrap T. Mastering chess and shogi by self-play with a
general reinforcement learning algorithm. arXiv. 2017. 1712.01815.
21 Silver D., Schrittwieser J., Simonyan K., Antonoglou J., Huang A., Guez A., Hubert T., Baker L., Lai M., Bolton A. Mastering the
game of go without human knowledge. Nature. 2017;550:354. doi: 10.1038/nature24270.
22 Simard D., Steinkraus P.Y., Platt J.C. Best practices for convolutional neural networks applied to visual document analysis;
Proceedings of the Seventh International Conference on Document Analysis and Recognition; Edinburgh, UK. 6 August 2003; pp.
958–963.
23 Simonyan K., Zisserman A. Very deep convolutional networks for large-scale image recognition. arXiv. 2004. 1409.1556
24 Sung Y., Jin Y., Kwak J., Lee S.-G., Cho K. Advanced Camera Image Cropping Approach for CNN-Based End-to-End Controls on
Sustainable Computing. Sustainability. 2018;10:816. doi: 10.3390/su10030816.
25 Sutton R.S., Barto A.G. Reinforcement Learning. 2nd ed. The MIT Press; Cambridge, MA, USA: 2018. p. 552.
26 Sze V., Chen Y., Yang T., Emer J.S. Efficient Processing of Deep Neural Networks: A Tutorial and Survey. Proc.
IEEE. 2017;105:2295–2329. doi: 10.1109/JPROC.2017.2761740.
27 Szegedy C., Liu W., Jia Y., Sermanet P., Reed S., Anguelov D., Erhan D., Vanhoucke V., Rabinovich A. Going deeper with
convolutions; Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition; Boston, MA, USA. 7–12 June 2015;
pp. 1–9.
28 Teti M., Barenholtz E., Martin S., Hahn W. A Systematic Comparison of Deep Learning Architectures in an Autonomous
Vehicle. arXiv. 2018. 1803.09386
29 Thrun S., Montemerlo M., Dahlkamp H., Stavens D., Aron A., Diebel J., Fong P., Gale J., Halpenny M., Hoffmann G., et al. Stanley:
The Robot That Won the DARPA Grand Challenge. J. Field Robot. 2006;23:661–692. doi: 10.1002/rob.20147
30 Udacity, Inc. Self-Driving Car Simulator. [(accessed on 5 November 2018)]; Available online: https://github.com/udacity/self-
driving-car-sim.
31 Visin F., Kastner K., Cho K., Matteucci M., Courville A., Bengio Y. Renet: A recurrent neural network based alternative to
convolutional networks. arXiv. 2015. 1505.00393
32 Wang T.C., Liu M.Y., Zhu J.Y., Liu G., Tao A., Kautz J., Catanzaro B. Video-to-video synthesis; Proceedings of the 32nd
International Conference on Neural Information Processing Systems; Montreal, QC, Canada. 3–8 December 2018; pp. 1152–1164.
33 Xu D., Jain A., Anguelov D. PointFusion: Deep Sensor Fusion for 3D Bounding Box Estimation; Proceedings of the 2018 IEEE/CVF
Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June 2018; pp. 244–253.
34 Yao Y., Wang H., Li S., Liu Z., Gui G., Dan Y., Hu J. End-To-End Convolutional Neural Network Model for Gear Fault Diagnosis
Based on Sound Signals. Appl. Sci. 2018;8:1584.
35 Zoph B., Vasudevan V., Shlens J., Le Q.V. Learning Transferable Architectures for Scalable Image Recognition; Proceedings of the
2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition; Salt Lake City, UT, USA. 18–23 June 2018; pp. 8697–
8710.
Keyword : M/M/1 queue – Steady State Probabilities – Matrix Geometric method – Call centre with
invisible queue and virtual queue.
Mathematics subject Classification (2010) Primary 60K25, 90C40 – Secondary 68M20
References:
1 Aguir M. S, Aksin .O. Z, Karaesmen. F and Dallery. Y, “On the interaction between retrials and sizing of call centres”, European
569. Journal of Operational Research 191, issue 2, 398-408, 2008.
2 Arul Freeda Vinodhini. G and Vidhya. V.,(2014), Transient solution of multi-server queue with catastrophes and Impatient customers 3260-
when system is down, Applied Mathematical Sciences, 8:92, 4585- 4592.
3 Chakravarthy. S. R, Krishnamoorthy. A and Joshua V. C, “Analysis of a multiserver retrial queue with search of customers from the
3262
orbit, Performance Evaluation, 63, 776- 798, 2006.
4 Choi B. D, Han D. H and Falin G. I, “On the virtual waiting time for an M/G/1 retrial queue with two types of calls”, Journal of applied
mathematics and Stochastic analysis, 6, 11-23, 1993.
5 Gomez- Corral. A, “A matrix geometric approximation for tandem queues with blocking and repeated attempts”, Operations research
letters 30, 360-374, 2002.
6 Han D. H and Lee Y. W, “MMPP, M/G/1 retrial queue with two class of customers”, Communication of the Korean Mathematical
Society, 11, 481-493, 1996.
7 Lee Y. W, “The M/G/1 feedback retrial queue with two types of customers”, Bulletin of Korean Mathematical society, 42, 875- 887,
2005.
8 Neuts M.F, “Matrix Geometric solutions in Stochastic models: An algorithmic Approach”, The Johns Hopkins University Press,
Baltimore (1981).
9 Renganathan. N, Kalyanaraman. R and Srinivasan. B, “A finite capacity single server retrial queue with two types of calls”,
International Journal of Information and Mathematical Sciences, 13, No. 3, 47-56, 2002.
10 Vidhya.V, (2013), Disasters and Customer Impatience In Bulk Queueing Systems, Asia Pacific Journal of Research, Volume: I, Issue:
VIII, 78-83.
Paper Title: Efficient Eye Detection and Tracking Using Smart Sensors
Abstract: Smart sensing enables applications with lots of computer-based techniques and algorithms to
work in a finer way. We are in era with intelligent machines around us and there sometimes provides a situation
of spending of large amount of time due to lack of understanding of those devices. In this paper, we attempt on
to find a new interaction method which ease the use of computers or increase interaction efficiency. The most
interesting approach that enhances the best way of to find communication between machines and human beings.
570. This enhances the way of communication with the digital devices. Our project enables to have communication
using our eye in the desktop environment. This study focus on using eye gazing techniques that allows user to 3263-
move the mouse cursor using his eye with interpretation of control commands. The desktop environment which 3267
has the inbuilt camera enables to achieve the goal in simple and efficient way. The study includes analysis of
features using face detection and template matching which have presented promising results.
Keyword : Detection, Eye Tracking, Scrolling, Smart sensing, Sensors, Human Computer Interaction.
References:
1 Starner, T., Weaver, J., Pentland, A.: A wearable computer based American sign language recognizer. Assist. Technol. Artif.
Intell. 84–96 ,1998.
2 F. Lu, T. Okabe, Y. Sugano, and Y. Sato, “A head pose-free approach for appearance-based gaze estimation,” in Proc. Brit.
Mach. Vis. Conf., pp. 1–11,2011.
3 Ghaoui, C “Encyclopedia of Human Computer Interaction” Idea Group Reference, 2006.
4 Thoumies, P., Charlier, J.R., Alecki, M., d’Erceville, D., Heurtin, A., Mathe, J.F., Nadeau, G., Wiart, “Clinical and functional
evaluation of a gaze controlled system for the severely handicapped Spinal Cord “. 36, 104–109, 1998.
5 Gips, J., DiMattia, P., Curran, F., Olivieri, P. ”Using Eagle Eyes an electrodes based device for controlling the computer with
your eyes-to help people with special needs”. In: Proceedings of the 5th International Conference on Computers Helping People
with Special Needs, vol. 1, pp. 77–83, 1996.
6 Kocejko, T., Bujnowski, A., Wtorek, J.: “Eye mouse for disabled. Conference on Human System Interactions”, p p. 199–202,
2008.
7 Magee, J.J., Scott, M.R., Waber, B.N., Betke, “A real-time vision interface based on gaze detection from a lowgrade video
camera. Conference on Computer Vision and Pattern Recognition Workshop”, pp. 159–159, 2004.
8 Yuille, A.L., Cohen, D.S., Hallinan, P.W “Feature extraction from faces using deformable template” In: Proceedings of IEEE
Conference on Computer Vision and Pattern Recognition, pp. 104–109, 1989.
9 Bradski, G., Keahler, A., Pisarevsky, V.: Learning-based computer vision with intel’s open source computer vision library. Intel
Technol. J. 9(2), 119–130, 2005.
10 J. Zhu and J. Yang, “Subpixel eye gaze tracking,” in Proc. 5th IEEE Int. Conf. Autom. Face Gesture Recog., pp. 124 –129, 2002.
11 R.Valenti,N.Sebe,andT.Gevers,“Combining head pose and eye location information for gaze estimation,” IEEE Trans. Image
Process., vol. 21, no. 2, pp. 802–815, 2012.
12 D. Torricelli, S. Conforto, M. Schmid, and T. DAlessio, “A neural-based remote eye gaze tracker under natural head motion,”
Comput. Methods Programs Biomed., vol. 92, no. 1, pp. 66–78, 2008.
13 I. F. Ince and J. W. Kim, “A 2D eye gaze estimation system with low resolution webcam images,” EURASIP J. Adv. Signal
Process., vol. no. 1, pp. 1–11, 2011.
14 Y.Sugano,Y.Matsushita,Y.Sato,andH.Koike,“Anincrementallearning method for unconstrained gaze estimation,” in Proc.
Comput. Vis., pp. 656–667, 2008.
15 F. Lu, T. Okabe, Y. Sugano, and Y. Sato, “Learning gaze biases with head motion for head pose-free gaze estimation,” Image
Vis. Comput., vol. 32, no. 3, pp. 169–179, 2014.
16 B. L. Nguyen, “Eye gaze tracking,” in Proc. Int. Conf. Comput. Commun. Technol., pp. 1–4, 2009.
17 O.Williams,A.Blake,andR.Cipolla,“Sparseandsemi-supervised visual mapping with the S3GP,” in Proc. IEEE Int. Conf. Comput.
Vis. Pattern Recog.,pp. 230–237,2006.
18 H.-C. Lu, G.-L. Fang, C. Wang, and Y.-W. Chen, “A novel method for gaze tracking by local pattern model and support vector
regressor, ”Signal Process., vol. 90, no. 4, pp. 1290–1299, 2010.
19 F. Lu, Y. Sugano, T. Okabe, and Y. Sato, “Adaptive linear regression for appearance-based gaze estimation,” IEEE Trans. Pattern
Anal. Mach. Intell., vol. 36, no. 10, pp. 2033–2046, Oct. 2014.
Keyword : Pseudo algorithm (false name), time based One Time Password algorithm (TOTP), Security
algorithm (RSA).
571. References:
1. Himanshu Agarwal, G.N.Pandey “Online Voting System for India Based on AADHAAR ID” Indian Institute of Information 3268-
Technology.
2. Smitha B. Khairnar, P. Sanyasi Naidu, Reena Kharat “Secure Authentication for Online Voting System” Pimpri Chinchwad College
3270
of Engineering, Pune.
3. Himanshu Vinod Purandre, Akash Ramswaroop Saini, Freddy Donald Pereira “Application For Online Voting System Using Android
Device “ St.John College of engineering and Management,Palghar.
4. Hayam, Ketal “The Patchwork of Internet Voting in Canada”.
5. B. Rashidi, C. Fung, and E. Bertino, ‘‘Android resource usage risk assessment using hidden Markov model and online learning,’’
Comput. Secure., vol. 65, pp. 90–107, Mar. 2017.
6. M. Gregory. (2016). Electronic Voting May be Faster but Carries Security Risks. [Online].
7. J. Lavelle and D. Kozaki. (2016). Electronic Voting has Advantages but Remains Vulnerable to Security, Software Problems.
[Online]. Available: http://www.abc.net.au/news/2016-07-11/electronic-voting-hassupport-but-security-fears-remain/7587366
8. S.J.BramsandP.C.Fishburn,‘‘Goingfromtheorytopractice:Themixed success of approval voting,’’ in Handbook on Approval Voting
(Studies in Choice and Welfare). Springer-Verlag, 2005, pp. 19–37
9. T. ElGamal, ‘‘A public key cryptosystem and a signature scheme based on discrete logarithms,’’ IEEE
10. K. E. Lauter, ‘‘Practical applications of homomorphic encryption,’’ in Proc. ACM Workshop Cloud Comput. Secure., 2012, pp. 57–
58.
11. X. Yang et al., ‘‘A verifiable ranked choice Internet voting system,’’ in Proc. Int. Conf. Web Inf. Syst. Eng. (WISE), 2017, p p. 490–
501.
12. M. Hirt and K. Sako, ‘‘Efficient receipt-free voting based on homomorphic encryption,’’ in Advances in Cryptology—EUROCRYPT.
Bruges, Belgium: Springer, 2000, pp. 539–556. [Online]. Available: http://www.springer.com/us/book/9783540675174Trans. Inf.
Theory, vol. IT-31, no. 4, pp. 469–472, Jul. 1985.
13. X. Yi and E. Okamoto, ‘‘Practical remote end-to-end voting scheme,’’ in Electronic Government and the Information Systems
Perspective. Toulouse, France: Springer, 2011, pp. 386–400. [Online]. Available: http://www.springer.com/us/book/9783642229602
14. B.Adida,‘‘Helios:Web-basedopen-auditvoting,’’inProc.USENIXSecur. Symp., vol. 17. 2008, pp. 335–348.
Paper Title: Smart Home: Security and Acuteness in Automation of IOT Sensors
Abstract: Smart home provides a well secured surroundings and a quality by utilizing the energy resources
in an efficient manner. Looking at the worldwide energy crisis, home automation should be made common
globally as aquintes sential element in overcoming loss of energy and using renewable resources. One of the
basic problems in home automation is the amount of costit demands to get operated. Hence reducing the cost of
automation is a factor to be concerned in the world. In this research study, an affordable home automation
system based on Arduino microcontroller has been launched that operates with Modbus protocol. A Bluetooth
module has been interfaced with Arduino, thus weeding out the deployment of desktops and laptops. The whole
system has been tested and observed to run favourably and perform the desired functions like switching
ON/OFF, speed regulation of fan, temperature control of AC and light acuteness management (Via Voltage
Regulation). A computer-programmed app is designed in the proposedsetup which enables the operators to
manage up to 20 devices incorporating various electrical appliances and sensors via Bluetooth technology. In the
present world, a majority of home automation systems are designed for specific purposes while proposed system
is built to fulfil typical objectives which can be operated in a home without much difficulty. The recommended
apparatus exhibits more characteristics than the usual home automation systems as it incorporates an ultrasonic
sensor and soil moisture sensor for water table detection and automatic plant irrigation system respectively. The
recommended model of this automation system is applied and examined on gadgets and it produced desired
results.
572.
3271-
Keyword : Security, Sensor, Bluetooth, complexity.
3274
References:
1. M. Asadullah and K. Ullah, “Smart Home Automation using Bluetooth Technology”, in Innovations in Electrical Engineering and
Computational Technologies (ICIEECT), International Conference on 2017, pp. 1-6.
2. S. Das, S. Ganguly, S. Ghosh, R.Sarker and D. Sengupta ,“A Bluetooth-based sophisticated Home Automation System using
Smartphone” , in Intelligent Control Power and Instrumentation (ICICPI), International Conference on 2016, pp. 236-240.
3. K. Baraka, M. Ghobril, S. Malek, R. Kanj and A. Kayssi ,”Low cost Arduino/Arduino-based Energy-efficient Smart Home
Automation System with Smart Task Scheduling”, in Computational Intelligence, Communication Systems and Networks (CICSyN),
Fifth International Conference on 2016, pp. 296-301.
4. K. Mandula, R. Parupalli, C.A.Murty, E.Magesh and R. Lunagariya ,“Mobile-based Home Automation using Internet Of Things
(IoT)”, in Control, Instrumentation, Communication and Computational Technologies (ICCICCT), International Conference on 2015 ,
pp. 340-343.
5. V. Hassanpour, S. Rajabi, Z. Shayan, Z. Hafezi and M. M. Arefi ,”Low-cost Home Automation using Arduino and Modbus
protocol”, in Control, Instrumentation and Automation (ICCIA), Fifth International Conference on 2017, pp. 284-289.
6. A. R. Behera, J. Devi and D. S. Mishra ,”A Comparative Study And Implementation of Real-time Home Automation System “, in
Energy Systems and Applications, International Conference on 2015, pp. 28-33.
7. S. Gunputh, A. Prakash Murdanand V.Oree ,”Design and Implementation of a Low-Cost Arduino-based Smart Home System”, in
Communication Software and Networks (ICCSN), IEEE 9 th International Conference on 2017, pp. 1491-1495.
8. S. S. Harsha and S Chakrapani Reddy,”Enhanced Home Automation System using Internet of Things (IOT)”, in I-SMAC (IoT in
Social, Mobile, Analytics and Cloud), International Conference on 2018, pp. 89-83.
9. M. N. N. A. Asghar, M.H., “Principle application and vision in internet of things (iot),” in Communication Technologies (GCCT),
2015 Global Conference on, may 2015.
10. A. R. . C. Y. . O. K. Withanage, C., “A comparison of the popular home automation technologies,” pp. 1 – 11, may 2014.
Omar Md Salleh, Nor Fazila Abd Malek, Azali Rahmat, Nur Ikhwan Mohamad, Zulakbal Abd
Authors:
Karim, Ali Md Nadzalan
Repeated Sprint Ability with Ball Performance among University Soccer Players:
Paper Title:
The Influence of Direction
Abstract: The aim of this study was to determine and compare the effects of directions on the repeated sprint
ability (RSA) with ball performance among university soccer players. Twenty soccer players representing a
public university team compete in Malaysian Intervarsity tournament was recruited as study participants.
Participants were assigned to two RSA tests with two different directions; i) Right-left-right (RLR) and ii) Left-
right-left (LRL). Sprints time, fatigue index and strength of decrement score (Sdec) were compared between the
two drills. Repeated measure analysis of variances (ANOVA) was conducted to determine the differences.
Results showed no significant differences of were found for each sprints time and total time. However, FI and
Sdec were found to be significantly lower during LRL. Future research is suggested to stress on the influences of
573. ball controlling during the slides and turns at the markers on RSA performance.
3275-
3278
Keyword : RSA, agility, soccer, specificity
References:
1. Bloomfield, J., R. Polman, and P. O'Donoghue, Physical demands of different positions in FA Premier League soccer. Journal of sports
science & medicine, 2007. 6(1): p. 63.
2. Doncaster, G., et al., Analysis of physical demands during youth soccer match-play: Considerations of sampling method and epoch
length. Research Quarterly for Exercise and Sport, 2019.
3. Datson, N., et al., Match physical performance of elite female soccer players during international competition. The Journal of Strength
& Conditioning Research, 2017. 31(9): p. 2379-2387.
4. Stølen, T., et al., Physiology of soccer. Sports medicine, 2005. 35(6): p. 501-536.
5. Little, T. and A. Williams, Specificity of acceleration, maximum speed and agility in professional soccer players . 2003: Routledge
London, UK:.
6. Salleh, O.M., et al. Repeated sprint ability with inclusion of changing direction among veteran soccer players . in Journal of Physics:
Conference Series. 2018. IOP Publishing.
7. Gambetta, V., In a blur: How to develop sport-specific speed. Sports Coach, 1996. 19: p. 22-24.
8. Chapman, S., E. Derse, and J. Hansen, Soccer coaching manual. Los Angeles: LA84 Foundation, 2008.
9. Pearson, A., Soccer fitness: more than 100 drills for speed, agility, and quickness. 2001: Contemporay Books.
10. Dahlan, N.D. and T.A. Muhamad, Mental toughness and academic achievement among footballers at National University of Malaysia
Jurnal Sains Sukan dan Pendidikan Jasmani, 2017. 6(1): p. 21-35.
11. Yusoff, N.H., Motivation and women involvement as football supporter in Malaysia. Jurnal Sains Sukan dan Pendidikan Jasmani,
2017. 6(1): p. 36-44.
12. Yusoff, N.H., Kepentingan kawalan sosial dalam menangani salah laku membabitkan penyokong bola sepak di Malaysia. Jurnal
Sains Sukan dan Pendidikan Jasmani, 2018. 7(1): p. 34-45.
13. Yusof, Z.M., S.A.E. bin Syed Ambon, and J. bin Mohamad, Physical fitness assessment of MSKPPM Kedah veteran football
players. Jurnal Sains Sukan dan Pendidikan Jasmani, 2016. 5(1): p. 49-64.
14. Pavlova, E. and G. Uzunova, A comparison of the PWC170 between volleyball and soccer players from adapted Margaria aerobic step
test. Jurnal Sains Sukan dan Pendidikan Jasmani, 2014. 3(1): p. 34-44.
15. Salleh, O.M., et al., Repeated sprint ability depending on the level of condition among university soccer players. International Journal
of Academic Research in Business and Social Sciences, 2017. 7(6): p. 506-514.
Keyword : Online Shopping, Shopping cart abandonment, Online Behaviour, perceived waiting time,
Hedonic motives, Utilitarian motives.
References:
1. Arulkumar, S., & Kannaiah, D. (2015). Predicting purchase intention of online consumers using discriminant analysis approach.
European Journal of Business and Management, 7(4).
2. Arnold, M. J., & Reynolds, K. E. (2003). Hedonic shopping motivations. Journal of retailing, 79(2), 77-95.
3. Balabanis, G., & Vassileiou, S. (1999). Some attitudinal predictors of home-shopping through the Internet. Journal of Marketing
management, 15(5), 361-385.
4. Babin, B. J., Darden, W. R., & Griffin, M. (1994). Work and/or fun: measuring hedonic and Utilitarian shopping value. Journal of
consumer research, 20(4), 644-656.
574. 5. Childers, J. B., & Tomasello, M. (2001). The role of pronouns in young children's acquisition of the English transitive
construction. Developmental psychology, 37(6), 739. 3279-
6. Close, A. G., & Kukar-Kinney, M. (2010). Beyond buying: Motivations behind consumers' online shopping cart use. Journal of
3284
Business Research, 63(9), 986-992.
7. Davis, M. M., & Heineke, J. (1998). How disconfirmation, perception and actual waiting times impact customer
satisfaction. international Journal of Service industry Management, 9(1), 64-73.
8. Davis, M. M., & Vollmann, T. E. (1990). A framework for relating waiting time and customer satisfaction in a service
operation. Journal of Services Marketing, 4(1), 61-69.
9. Davis, M. M., & Heineke, J. (1998). How disconfirmation, perception and actual waiting times impact customer
satisfaction. international Journal of Service industry Management, 9(1), 64-73.
10. Maister, D. (1985). The one-firm firm. Sloan Management Review, 27(1), 3-13.
11. Kuhlmann-Wilsdorf, D. (1989). Theory of plastic deformation:-properties of low energy dislocation structures. Materials Science
and Engineering: A, 113, 1-41.
12. Overby, J. W., & Lee, E. J. (2006). The effects of Utilitarian and hedonic online shopping value on consumer preference and
intentions. Journal of Business research, 59(10), 1160-1166.
13. Pruyn, A., & Smidts, A. (1998). Effects of waiting on the satisfaction with the service: Beyond objective time
measures. International journal of research in marketing, 15(4), 321-334.
14. Rigby, D., & Bilodeau, B. (2011). Management tools & trends 2011. London: Bain & Company.
15. Rajamma, R., Ball, R. J., Tarelho, L. A., Allen, G. C., Labrincha, J. A., & Ferreira, V. M. (2009). Characterisation and use of biomass
fly ash in cement-based materials. Journal of hazardous materials, 172(2), 1049-1060.
16. Rajini, G., & Krithika, M. (2017). Risk Factors Discriminating Online Metropolitan Women Shoppers: A Behavioural
Analysis. International Journal of Cyber Behaviour, Psychology and Learning (IJCBPL), 7(1), 52-64.
17. Selvidge, P. R., Chaparro, B. S., & Bender, G. T. (2002). The world wide wait: effects of delays on user performance. International
Journal of Industrial Ergonomics, 29(1), 15-20.
18. Su, K. P., Chiu, T. H., Huang, C. L., Ho, M., Lee, C. C., Wu, P. L.,... & Pariante, C. M. (2007). Different cutoff points for different
trimesters? The use of Edinburgh Postnatal Depression Scale and Beck Depression Inventory to screen for depression in
pregnant Taiwanese women. General Hospital Psychiatry, 29(5), 436-441.
19. Tielsch, J. M., Sommer, A., Katz, J., Royall, R. M., Quigley, H. A., & Javitt, J. (1991). Racial variations in the prevalence of primary
open-angle glaucoma: the Baltimore Eye Survey. Jama, 266(3), 369-374.
20. Wolfinbarger, M., & Gilly, M. C. (2001). Shopping online for freedom, control, and fun. California Management Review, 43(2),
34-55.
21. Wildeboer, D., & Donkers, S. (2014). The Consumers Behind Online.
22. Wolfinbarger, M., & Gilly, M. C. (2001). Shopping online for freedom, control, and fun. California Management Review, 43(2),
34-55.
Paper Title: Effect of Beryl Addition on Mechanical Properties of Al7075 Using a Stir Casting Technique
Abstract: In present study, Al7075-Beryl synthesized by using a stir casting technique. The different
weight percentage of Beryl incorporated are 2Wt.% to 8 Wt.% in steps of 2 Wt.%. The effect of Beryl particles
integration on hardness and tensile strength response on Al7075 were investigated. It is demonstrated that Beryl
particles distributed homogeneously in the Al7075 matrix acts as effective reinforcement to enhance the
mechanical properites. Compared to base Al7075 matrix, Al7075- 6 wt.% Beryl composites exhibited higher
yield strength of 47.42%, ultimate tensile strength of 44.08% and Al7075-8Wt.% enhancement in hardness of
27.71% when compared to momlithic Al7075. As cast Al7075 alloy and Al7075-Beryl composites were
microstructurally characterized with scanning electron microscopy (SEM), Energy dispersive spectrum (EDS)
and X-ray diffraction (XRD). Microstructure study through scanning electron microscope study reveals that the
uniform distribution reinforcement Beryl into Al7075 matrix. The Al7075-Beryl.
Keyword : Logistics, Security, Storage Facilities, logistics services, Warehousing Management, Warehouse
operations.
References:
1. Augusto da Cunha Reis(2017) , distribution center plan, an orderly writing survey, Brazilian Journal of Operations and Produc tion
Management 14 (2017), pp 542-555, ABEPRO DOI: 10.14488/BJOPM.2017.v14.n4.a10
2. Knight Frank (2014), India Logistics and Warehousing Report, http://content.knightfrank.com/inquire about/677/archives/en/india-
579. warehousing-and-coordinations report2326.pdf
3. Jan Kara's (2013), An Overview of Warehouse Optimization, International Journal of Advances in Telecommunication Electro
methods, Signals and Systems, Volume No.2, issue No.3.
3304-
4. Felix T.S. Chan, H.K. Chan (2011), Improving the efficiency of request picking of a manual-pick and staggered rack dissemination 3308
distribution center through the execution of class-based stockpiling, Expert Systems with Applications, Volume No. 38, Issue No.3,
PP. 2686–2700
5. Jochem Springer's (2010), Planning and control in stockroom frameworks, Bachelor Thesis Organization and Strategy, Premaster
Operations the executives and Logistics. ANR: 860755, http://arno.uvt.nl/show.cgi?fid=121828
6. Sahar Elbarky (2016) , Warehousing Risk Management in Different Industrial sixth International Conference on Information
Systems, Logistics and Supply Chain (ILSInternational Conference)
7. Augusto da Cunha Reis(2017) WAREHOUSE DESIGN: A SYSTEMATIC LITERATURE REVIEW Brazilian Journal of
Operations and Production Management 14 (2017), pp 542-555 , DOI: 10.14488/BJOPM.2017.v14.n4.a10
8. Juri Kondratjev (2015) Logistics. Transportation and distribution center in store network
9. Baker, P. (2004), "Adjusting Distribution Center Operations to Supply Chain Strategy", The International Journal of Logistics
Management, Vol. 15, No. 1, pp. 111-123.
10. Chow, H. K. H. et al. (2005), "Structure of an information based coordinations procedure framework", Expert Systems with
Applications, Vol. 29, No. 2, pp. 272-290.
11. Gill, A. (2009), "Deciding stacking dock prerequisites underway conveyance offices under vulnerability", Computers and Industrial
Engineering, Vol. 57, No. 1, pp. 161-168.
12. Koster, R. et al. (2007), "Structure and Control of Warehouse Order Picking: A Literature Review", European Journal of Operational
Research, Vol. 182, No. 2, pp. 481-501.
13. Tompkins, J. A. et al. (1996), Facilities Planning, 2th ed., Jonh Willey, New York.
14. Cordeau, J. F. et al. (2006), A coordinated model for coordinations arrange structure, Annals of Operations Research, Vol. 144, No.
1, pp. 59-82
15. Demirel, T. et al. (2010), "Multi-criteria distribution center area choice utilizing Choquet fundamental", Expert Systems with
Applications, Vol. 37, No. 5, pp. 3943-3952.
16. http://iosrjournals.org/iosr-jbm/papers/Vol15-issue6/I01566066.pdf
17. https://www.researchgate.net/production/50946316_UNDERSTANDING_OF_SUPPLY_CHAIN_A_LITERATURE_REVIEW
18. https://www.academia.edu/27435107/Supply_Chain_Management_Literature_Review_and_Some_Issues
19. https://www.researchgate.net/production/322820208_A_Literature_Review_on_Performance_Measures_of_Logistics_Management
_An_Intellectual_Capital_Perspective
Paper Title: A Research on Profitability and Dividend using Arima Model with Reference to Steel Sector
Abstract: In India Indian, Iron and Steel Industry plays significantly for the overall growth and
580. development of the country. Based on the budget of Ministry of Steel declares that steel industry contributes 2%
of the Indias GDP, and its weight is 6.2% in the Index of Industrial Production(IPP). The sector able to grow by
3309-
itself globally. In India steel production in one Million Tones in 1947, now its become the world's 2nd largest
3313
producer next to China. India's GDP declines 5% in 2019 on account of rising Inflation, GST and strict monetary
control. This medium made the domestic demand weeker which grew 3.3% in 2019, Despite the rise in last
Quater.
Keyword : Steel, Production, Inflation, Demand....etc.,
References:
1. Venkatesh.P (2017) An Evaluation of Liquidity and Profitability of Selected Pharmaceutical Companies in India, Journal of Advanced
Research in Dynamical & Control Systems ISSN: 1943-023X, 07-Special issue on Management Studies.
2. Venkatesh.P (2017) “A Descriptive Analysis of Short Term Solvency and Profitability of Selected Pharmaceutical Companies in India”
Journal of Advance Research in Dynamical & Control Systems, ISSN: 1943-023X, 07-Special issue on Management Studies.
3. Venkatesh.P (2018) “A Study on Impact of Profit, Earning Per Share And Dividend On Equity Performance On Select Steel Sector
Using Discriminant Function Analysis” International Journal of Mechanical and Production Engineering Research and Development
(IJMPERD),, ISSN (P): 2249-6890; ISSN (E): 2249-8001 Vol. 8, Special Issue 3, PP: 998-1007
4. Venkatesh.P (2018) “A Study On Customer Perception Towards Mugi Ultra Liquid Detergent” International Journal of Mechanical a nd
Production Engineering Research and Development (IJMPERD), ISSN (P): 2249-6890; ISSN (E): 2249-8001 Vol. 8, Special Issue 3,
PP: 978-984.
5. Venkatesh.P (2018) “Saving Habit And Investment Preference Of Government School Teachers In Vellore District” International
Journal of Mechanical and Production Engineering Research and Development (IJMPERD), ISSN (P): 2249-6890; ISSN (E): 2249-
8001 Vol. 8, Special Issue 3, PP: 922-926.
584. Authors: Fathullayeva Zilola, Usmonova Shakhodat, Aripova Mavjuda, Alimov Maruf
Paper Title: Geological and Structural Positions of Ore Fields and Deposits of Ore Area Auminzatau-Beltau
Abstract: Review the examination geologic-structural position gold mine location of Auminzatau-Beltau is
mine of district Central of Kizilkum. Everybody location placement in seven structural of position formations
north-lasterly, north-westerly, full-scale systems fractures and theirs is combine Find inosreslarch recommended
using how criterion search gold mines manifestation.
Keyword : Useful fossil the golden, region, golden, structural position, textbook, arrangement mountain the
gold.
References:
1. Korolev А.V., Shekhtman P.A. “Structural conditions of positioning after magmatic ores” M; Nedra.,1965, p.506.
2. Korolev V.A. “Structural types of ore fields and deposits of Central Asia” M; Nedra. 1983. p.215. 3331-
3. Akbarov Kh.А. and others “Theoretical and methodological aspects of local forecasting of endogenous mineralization” Tashkent,
TashSTU, 2011, p.455.
3338
4. Akbarov Kh.А., and others. Geological and structural types of polymetallic ore fields and deposits in Central Asia and some issues of
their search and exploration. – Tashkent: The science, 1975. p.200.
5. Akbarov Kh.А. Structural typification of polymetallic ore fields and deposits of various genesis for the development of initial models
in experiments // Experiment and modeling in structure-forming processes of ore genesis // Тр. Institute of Geol. and geophysis. SB
USSR Academy of Sciences. - Novosibirsk; The science, 1976. – Rele. 293. pp.178-189.
6. Golovanov I.M. Ore deposits of Uzbekistan. Tashkent, IMR, 2001.
7. I.T.Toshpulatov, M.N. Yuldashev, T.Sh.Shayakubov. (1987). Atlas of ore fields and deposits of western Uzbekistan (gold -silver).
8. Turapov М.К.(1990). and others. Modelling structures of one of objects of Eastern Kurama. Naukovadumka, p.89.
9. Janibekov B.О. (2017) and others. Structural positions and geodynamical conditions of gold mineralization occurrence in
Auminzatau-Beltau ore region. Gorniy vestnik No.3, 80.
10. Dulapova N.Yu. (2010) “Patterns of gold mineralization positioning in mountain structures of Bukantau and estimation of
perspectives of surrounding closed territories” Abstract of dissertation for candidate degree, 24.
Keyword : law, appeals, organizational and legal framework, repeated appeal, duplicate appeal.
References:
1. Vasilyeva C.B. The right of citizens and organizations to appeal: standard model and practice of realization // Law and Econo mics,
2005, number 5.
2. Lyskova E.I. "Formation and development of the institute of citizens' // Law and Policy, 2007, № 3.
3. Shtyrov E.P. The constitutional right of man and citizen to apply to international bodies for the protection of human rights and
freedoms: Cand. dis ... cand. jurid. Sciences. - Saratov 2007;
4. Polievktov A.M. Problems of protection of citizens' rights lawyer when applying to the Constitutional Court: Cand. dis ... cand. jurid.
Sciences. -M., 2007;
5. Kharajiev M. F. Constitutional and legal support of the Head of State Administration of the President of the Russian Federation in the
field of accounting and analysis of citizens' complaints: dis ... cand. jurid. – М., 2008
6. A. Dvorak The implementation of the constitutional right of citizens to appeal to the Russian Federation: Cand. dis ... cand. jurid.
Sciences. – М., 2003;
7. Mironov M.A. Circulation of citizens as an element of the protection of human rights and fundamental freedoms in law and practice.
М., 2002;
8. Rudakova N.A. The constitutional right of citizens to appeal to the state bodies and local self-government: Author. dis ... cand. jurid.
Sciences. – М., 2002;
9. D.V. Zamyshlyaev Implementation of the citizens' right to appeal to the state authorities and local self-government // The state power
and local self-government. - 2003. - № 4. - P. 43-47.
10. Chashykov A.V. Subjects of the right to petition the Constitutional Court of the Russian Federation: problems of theory and practice. -
Tomsk, 2007;
Paper Title: A Research on International Commercial Arbitration with reference to the Brexit
Abstract: International commercial arbitration is an alternative method of dispute resolution. It is
regarding disputes arising out of commercial transactions conducted across national boundaries and it allows the
parties to bypass litigation in their national courts. The aim of the researcher is to understand how the position of
London as the favoured seat of Arbitration will change after Brexit. Secondly, the paper also focuses on the use
of international arbitration as a tool to solve investor-state disputes.
The present paper was analysed through the non-doctrinal research methodology and empirical and
descriptive method of research was used. The present analysis was made through random sampling method
where the survey was taken from common public, professionals, etc through a structured questionnaire. The
sample size in the present analysis is 1669 samples. The research tools used in the present paper are cross
tabulation, chi-square and frequency.
It can be concluded that the position of London as the popular seat of arbitration will not be affected as the
English Law is generally considered as the immediate choice of law for around most of the commercial
586. contracts. Secondly, as far as investor-state dispute resolution is considered, arbitration can become a popular
choice in future after the amendments were made in 2017 to make it more transparent and cost efficient. 3344-
3347
Keyword : Arbitration, Brexit, Confidentiality, Investor-State Disputes, Jurisdiction, Settlement
References:
1. Al-Nuemat, Ahmed, and Abdullah Nawafleh. “Brexit, Arbitration and Private International Law.” Journal of Politics and Law, vol.
10, no. 5, 2017, p. 116, doi:10.5539/jpl.v10n5p116.
2. Born, Gary. International Commercial Arbitration: Commentary and Materials. Transnational Pub Incorporated, 2001.
3. “Contracts: Validity of Arbitration Agreement.” Michigan Law Review, vol. 23, no. 8, 1925, p. 911, doi:10.2307/1278877.
4. Friedland, P. D. “The Law and Practice of International Commercial Arbitration by Alan Redfern and Martin Hunter.” Arbitration
International, vol. 4, no. 1, 1988, pp. 76–79, doi:10.1093/arbitration/4.1.76.
5. “London Will Remain Seat of Arbitration, despite Brexit.” The Peninsula Qatar, 3 Apr. 2019,
https://thepeninsulaqatar.com/article/03/04/2019/London-will-remain-seat-of-arbitration,-despite-Brexit.
6. Noussia, Kyriaki. Confidentiality in International Commercial Arbitration. 2010, doi:10.1007/978-3-642-10224-0.
7. The Economist. “The Arbitration Game.” The Economist, The Economist, 2014, https://www.economist.com/finance-and-
economics/2014/10/11/the-arbitration-game.
8. Unctad-Ictsd, and UNCTAD-ICTSD. “Dispute Settlement.” Resource Book on TRIPS and Development, pp. 651–704,
doi:10.1017/cbo9780511511363.034.
588.
Keyword : Women Empowerment, Entrepreneurs, Education Awareness, Government Schemes, Challenges.
3351-
References: 3354
1. Arma?an, Fulya Öner, ?afak Uluç?nar Sa??r, and Ay?e Yalç?n Çelik. 2009. "The Effects of Students' Problem Solving Skills on
Their Understanding of Chemical Rate and Their Achievement on This Issue." Procedia - Social and Behavioral Sciences 1 (1):
2678-84.
2. Baird, Leonard L. 1982. "Review of Problem Solving Skills," November. https://onlinelibrary.wiley.com/doi/pdf/10.1002/j.2330-
8516.1983.tb00016.x.
3. Bernik, Mojca, and Jasmina Žnidarši?. 2012. "Solving Complex Problems with Help of Experiential Learning." Organizacija 45
(3): 117-24.
4. Brockman, Julie l. 2003. "The Problem with Problem-Solving Training in Industry."
https://core.ac.uk/download/pdf/46954952.pdf.
5. Hämäläinen, Raija, Bram De Wever, Kari Nissinen, and Sebastiano Cincinnato. n.d. "Understanding Adults' Strong Problem -
Solving Skills Based on PIAAC." Journal of Workplace Behavioral Health, 537-53.
6. Heppner, P. Paul, and P. Paul Heppner. 1978. "A Review of the Problem-Solving Literature and Its Relationship to the
Counseling Process." Journal of Counseling Psychology 25 (5): 366-75.
7. Ji Young Kim , Dae Soo Choi, Chang-Soo Sung and Joo Y. Park. n.d. "The Role of Problem Solving Ability on Innovative
Behavior and Opportunity Recognition in University Students." Journal of Open innovation:Technology,Market and Complexity.
https://doi.org/10.1186/s40852-018-0085-4.
8. Karakaya, Abdullah, and Kasim Y?lmaz. 2013. "Problem Solving Approach at Organizational Development Activities: A
Research at Karabuk University." Procedia - Social and Behavioral Sciences 99 (November): 322-31.
9. Knippen, Jay T., and Thad B. Green. 1997. "Problem Solving." Journal of Workplace Learning 9 (3): 98-99.
10. Lisa Gueldenzoph Snyder Mark. 2008. "Teaching Critical Thinking and Problem Solving Skills." The Delta Pi Epsilon Journal.
https://www.google.co.in/url?sa=t&source=web&rct=j&url=http://reforma.fen.uchile.cl/Pape.
11. Marquardt, Michael, and Roland K. Yeo. 2012. Breakthrough Problem Solving with Action Learning: Concepts and Cases.
Stanford University Press.
Paper Title: Public Awareness on Cyber Crime with Special Reference to Chennai
Abstract: With the rapid advancements in technology, our lives have become completely digitalised. We sit
in the comfort of our home, and carry out our day-to-day activities like grocery shopping, education, banking,
through the Internet. However, this has given rise to several threats to our security, called the cyber-crime which
has become a global concern. Cybercrimes affect the lives of millions of people all around the world, including
businesses, organisations and governments of different nations. This paper aims to determine the association
between cybercrime awareness and the age, and to identify the difference between main cause of cybercrime and
the gender. Descriptive research has been carried out which helps us to understand the characteristics of an
individual or a group. The sampling method used here is convenient sampling where the samples have been
chosen based on ease of access of availability. The sample size is 1540. Age, Gender and Occupation are the
independent variables. Cyber-crime awareness, the main cause of cybercrime and the most popular cyber-crime
are the dependent variables used here. The tools used here are Chi-Square, Independent Sample t test and
ANOVA. It was found that there is a significant association between the cyber-crime awareness and the age of
the respondent and that there is no significant difference between the main cause of cyber-crime and gender.
With the rapid rise in the rate of cyber-crimes, it is imperative that the government provide the people with more
effective ways of cyber security in order to protect the society.
Keyword : Cyber-crime, Cyber terrorism, Cyber Security, Cyber Laws, Public awareness.
References:
591. 1. Hannarae Lee, Hyeyoung Lim, Awareness and Perception of Cyber Crimes and Cyber Criminals, International Journal of
Cybersecurity Intelligence & Cybercrime, 2019, Vol 2, Issue 1, Page 1-3 (Hannarae Lee 2019) 3362-
2. Er. Navneet Kaur, Introduction of Cyber Crime and its Type, International Research Journal of Computer Science, ISSN: 2393 -
9842, 2018, Vol 5, Issue 8, Page 435- 439(Kaur 2018) 3364
3. Muhammad Dharma Tuah Putra Nasution, Andysah Putera Utama Siahann, Yossie Rossanty, Solly Aryza, The Phenomenon of
Cyber Crime and Fraud Victimisation In Online Shop, International Journal of Civil Engineering and Technology, ISSN: 0976-
6316, 2018, Vol 9, Issue 6, Page 1583- 1592 (Siahaan and Muhammad Dharma Tuah, n.d.)
4. Kyung-Shick Choi, Claire Seunguen Lee, The Present and Future of Cybercrime, Cyberterrorism and Cybersecurity, International
Journal of Cybersecurity Intelligence & Cybercrime, 2018, Vol 1, Issue 1, Page 1-4(Kyung-Shick Choi 2018)
5. K. Jaishankar, Cyber Criminology as an Academic Discipline: History, Contribution and Impact, International Journal of Cyber
Criminology, ISSN: 0973-5089, 2018, Vol 12, Issue 1, Page 1-8(Jahankhani 2018)
6. Juneed Iqbal, Bilal Maqbool Beigh, Cybercrime in India: Trends and Challenges, International Journal of Innovation &
Advancement in Computer Science, ISSN: 2347-8616, 2017, Vol 6, Issue 12, Page 187- 196(Juneed Iqbal 2018)
7. Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy, Cyber Space Technology: Cyber Crime, Cyber Security and Models
of Cyber Solution, a Case Study of Nigeria, International Journal of Computer Science and Mobile Computing, ISSN: 2320 -
088X, 2017, Vol 6, Issue 11, Page 94- 113(Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy 2017)
8. Johannes Xingan Li, Cyber Crime and Legal Countermeasures: A Historical Analysis, Official Journal of the South Asian Society
of Criminology and Victimology, ISSN: 0973- 5089, 2017, Vol 12, Issue 2, Page 196- 207(Li 2017)
9. Animesh Sarmah, Roshmi Sarmah, Amlan Jyothi Baruah, A brief study on Cyber Crime and Cyber Laws of India, International
Research Journal of Engineering and Technology, ISSN: 2395- 0056, 2017, Vol 4, Issue 6, Page 1633- 1641(Animesh Sarmah,
Roshmi Sarmah, Amlan Jyothi Baruah 2017)
10. Michael L. Gross, Daphna Canetti, Dana R. Vashdi, Cyber Terrorism: It's Effects on Psychological Well- Being, Public
Confidence and Political Attitude, Journal of Cyber Security, DOI: 10.1093, 2017, Vol 3, Issue 1, Page 49-58(Gross, n.d.)
11. Aparna Srivastava, Analyzing Cyber Crime & Cyber Laws in India, VSRD International Journal of Technical & Non- Technical
Research, ISSN: 0976- 7967, 2017, Vol 3, Issue 2, Page 44- 46(Srivastava 2017)
12. Anuraj Singh, Studies Report on Cyber Law in India & Cybercrime Security, International Journal of Innovative Research in
Computer and Communication Engineering, ISSN: 2320- 9801, 2017, Vol 5, Issue 6, Page 11273- 11279(Singh 2017)
13. Jitender Kumar, Cyber Crime in India: An Overview, Imperial Journal of Interdisciplinary Research, ISSN: 2454? 1362, 2017,
Vol 3, Issue 4, Page a963- 967(Kumar 2017).
Paper Title: Research on Causes of Job Stress for Workers of Non-Public Sector Banks
Abstract: The most important and critical organizational factor that affects the performance of workers of
banking business is Job stress. The role conflict, role ambiguity, role overload, job difficulty, role stagnation
and lack of group cohesiveness are significantly and moderately correlated with the level of job stress of workers
in non-public sector banks. Hence, the non-public sector banks should provide needed information to their
workers to carry out their responsibilities and workers must prioritize their role. The non-public sector banks
should clearly define the role of each and every employee and must make interactions among roles of all the
workers and the work load of workers should be reduced through additional recruitment of workers or sharing
workload among bank workers.
594. References:
1 Vishal Samartha, Vidyavathi, and Mustiary Begum, (2013), “Regression Analysis of Stress - A eomparative Study of Workers in
Public and Non-public sector Banks”, EXCEL International Journal of Multidisciplinary Management Studies, 3(7):pp.68-76. 3375-
2 Sharmin Akther, Silvia Akter, and Md. Kafil Uddin,(2017), “Factors Influencing Job Stress in Privatized Banks of Bangladesh”, 3379
Sona Global Management Review, 11(1):pp. 1-17.
3 Shavita Dhankar,(2015), “Job stress in Banking Sector”, International Journal of Applied Research, 1(8): pp. 132-135.
4 Sharmila, A., and Poornima, J.,(2012), “A Study on Employee Stress Management in Selected Private Banks in Salem”, Elixir
International Journal of Business Management, 42(1): pp. 6555-6558.
5 Rajeshwari, T.R., (1992), “Employee Stress: A Study with Reference to Bank Workers”, Indian Journal of Industrial Relations,
27(4): pp. 419-429.
6 Niharika, and Kiran, U.V.,(2014), “Job stress among Bank Workers”, European Academic Research, 2(4):pp.5404 -5411.
7 Manshor, A. T., Fontaine, R., and Choy Chong Siong,(2003), “Job stress among Managers: A Malaysian Survey”, Journal of
Managerial Psychology, 18(6): pp 622-628.
8 Khan, A., Ramzan, M., and Butt, M.S.,(2013), “Is Job Satisfaction of Islamic Banks Operational Staff Determined through
Organizational Climate, Job stress, Age and Gender”, Journal of Business Studies Quarterly,4(3):pp.14-36.
9 Crandall, R., and Perrewe, P. L., (1995), “Job stress: A Handbook”, CRC Press, New York, pp. 19-21.
10 Bano, B., and Jha, R., (2012), “Organizational Role Stress among Public and Private sector Workers”, The Lahore journal of
business, 12(1):pp. 23-26.
11 Anamika, (2016), “Stress and Job Satisfaction level among Government and Non-public sector Bank Workers: a Study on Urban
Area in Patna India”, The International Journal of Indian Psychology, 4(1):pp. 120-127.
Keyword : DSTATCOM, Optimization Data Driven Control, Linear and Non-linear Loads.
3380-
References: 3381
1. Yuvaraj, T., K. Ravi, and K. R. Devabalaji. “DSTATCOM allocation in distribution networks considering load variations using
bat algorithm”, Ain Shams Engineering Journal 8.3 (2017): 391-403.
2. Yuvaraj, T., K. R. Devabalaji, and K. Ravi “Optimal placement and sizing of DSTATCOM using harmony search algorithm”,
Energy Procedia 79 (2015): 759-765.
3. N. N. V. Surendra Babu, and B.G. Fernandes, " Cascaded Two Level Inverter- Based Multilevel ST ATCOM for High-Power
Applications," IEEEE Trans. Power Delivery., vol. 29, no. 3, pp. 993-1001, June. 2014.
4. Hirofumi Akagi, Shigenori Inoue and Tsurugi Yoshii, "Control and Performance of a Transformerless Cascade PWM STATCOM
With Star Contiguration," IEEE Trans. Ind. Appl., vol. 43, no. 4, pp. 1041-1049, July/ August 2007.
5. Devabalaji, K. R., et al. “Power loss minimization in radial distribution system”, Energy Procedia 79 (2015): 917-923.
Paper Title: Stability, Bifurcation, Chaos : Discrete Prey Predator Model with Step Size
Abstract: In this work titled Stability, Bifurcation, Chaos: Discrete prey predator model with step size, by
Forward Euler Scheme method the discrete form is obtained. Equilibrium states are calculated and the stability
of the equilibrium states and dynamical nature of the model are examined in the closed first quadrant with the
help of variation matrix. It is observed that the system is sensitive to the initial conditions and also to parameter
values. The dynamical nature of the model is investigated with the assistance of Lyapunov Exponent, bifurcation
diagrams, phase portraits and chaotic behavior of the system is identified. Numerical simulations validate the
theoretical observations.
Keyword : Population Dynamics, Discrete Time, Fixed points, Stability, Bifurcation theory, Lyapunov
Exponent, Chaos.
References:
1. T.Agrawal, M.Saleem, “Complex dynamics in a ratio-dependent two-predator one-prey model,” Comput. Appl. Math., vol.34, 2015,
596. pp.265-274.
2. H. Baek, “Complex Dynamics of a Discrete-Time Predator-Prey system with Ivlev Functional Response,” Mathematical Problems in
Engineering, vol.2018, Article ID 8635937, 2018, 15 pages. 3382-
3. E. A. Bender, “An Introduction to Mathematical Modeling.” University of California, San Diego. 3387
4. Carmen Chicone, “An invitation to Applied Mathematics: Differential Equations, Modeling, and Computation,” Academic Press,
London, UK.
5. J. David Logan, “A First Course in Differential Equations,” Second Edition, Springer, New York, 2011.
6. Q. Din, “Complexity and chaos control in a discrete-time preypredator model,” Communications in Nonlinear Science and Numerical
Simulation, vol. 49, 2017, pp. 113–134.
7. S. Elaydi, “An Introduction to Difference Equations,” Third Edition, Springer International Edition, First Indian Reprint, 2008.
8. A. Elsadany, “Dynamical complexities in a discrete-time food chain,” Computational Ecology and Software, vol.2, no. 2, 2012,
pp.124-139.
9. A. Elsadany, H. A. EL-Metwally, E. M. Elabbasy, H. N. Agiza, “Chaos and bifurcation of a nonlinear discrete prey-predator system,”
Computational Ecology and Software, vol. 2, no.3, 2012, pp.169-180.
10. George Maria Selvam, R. Janagaraj and P. Rathinavel, “A Discrete Model of Three Species Prey – Predator System,” International
Journal of Innovative Research in Science, Engineering and Technology(IJIRSET), Vol.4, no.1, 2015, pp.18576 – 18584.
11. X. Liu, D. Xiao, “Complex dynamic behaviors of a discrete-time predator - prey system,” Chaos, Solitons and Fractals, vol.32, 2007,
pp.80 – 94.
12. J. D. Murray, “Mathematical Biology I: An Introduction,” 3-e, Springer International Edition, 2004.
13. M. Reni Sagaya Raj, A. George Maria Selvam and R. Janagaraj, “Stability in a Discrete Prey - Predator Model,” International Journal
of Latest Research in Science and Technology, vol. 2, no.1, 2013, pp.482-485.
14. B.D.Zheng, L.J.Liang, C.R.Zhang, “Extended Jurt criterion,” Science China Math., vol.53, no.4, 2010, pp.1133-1150.
Keyword : Internet of Things (IoT); Near Field Communication (NFC); Radio-frequency Identification
(RFID); Automatic Identification and Data Capture (AIDC); Biometrics; Virtual Reality (VR); Internet Protocol
version 6 (IPv6)
References:
1. Augello, A., Pilato, G., Vassallo, G., & Gaglio, S. (2014). Chatbots as Interface to Ontologies. Advances in Intelligent Systems And
Computing, 285-299. doi: 10.1007/978-3-319-03992-3_20.
2. Bricken, M., & Byrne, C. (1993). Summer Students in Virtual Reality. Virtual Reality, 199-217. doi: 10.1016/b978-0-12-745045-
2.50019-2.
3. Finkenzeller, K. (2003). RFID Handbook (3rd ed.). Newark: Wiley.
4. Gopikrishnan, M., & Santhanam, T. (2012). Improved Biometric Recognition and Identification of Human Iris Patterns Using
Neural Networks. Journal of Algorithms & Computational Technology, 6, 411-420. doi: 10.1260/1748-3018.6.3.411.
5. Government of India. (2017). All India Survey on Higher Education 2016-17, 1-45. New Delhi, Ministry of Human Resource
Development.
6. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future
directions. Future Generation Computer Systems, 29(7), 1645-1660. doi: 10.1016/j.future.2013.01.010.
7. Jain, A., Bolle, R., & Pankanti, S. (2006). Biometrics. New York: Springer.
8. Madakam, S., Ramaswamy, R., & Tripathi, S. (2015). Internet of Things (IoT): A Literature Nigam, S., Shukla, R., & Pratap Singh,
A. (2016). Introduction and need of IPv6. International Journal of Innovative Computer Science & Engineering, 3(2), 35-37.
9. Review. Journal of Computer and Communications, 03(05), 164-173. doi: 10.4236/jcc.2015.35021.
10. Pradhan, A., B. Nanjappa, S., K. Nallasamy, S., & Esakimuthu, V. (2010). Raising Enterprise Applications: A Software Engineering
Perspective (1st edn.). Wiley India Pvt. Ltd.
11. Reddy, V. P., P., Mohammed Imran Ali, K., Sandeep, B., & Ravi, T. (2012). Importance and Benefits of IPV6 over IPV4: A Study.
International Journal of Scientific and Research Publications, 2(12), 517-518.
12. Reitmayr, G., & Schmalstieg, D. (2001). An open software architecture for virtual reality interaction. In ACM symposium on virtual
reality software and technology (pp. 47-54). Banff: ACM. Retrieved from https://dl.acm.org/citation.cfm?id=505018
13. Liang, J., Doermann, D., & Li, H. (2005). Camera-based analysis of text and documents: a survey. International Journal of
Document Analysis and Recognition (IJDAR), 7(2-3), 84-104. doi: 10.1007/s10032-004-0138-z
14. Manwatkar, P., & Yadav, S. (2015). Text recognition from images. 2015 International Conference on Innovations in Information,
Embedded and Communication Systems (ICIIECS). doi: 10.1109/iciiecs.2015.7193210
15. Su, X., Chu, C., Prabhu, B., & Gadh, R. (2007). On The Creation of Automatic Identification and Data Capture Infrastructure v ia
RFID. The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems, 1-19. Retrieved from
https://pdfs.semanticscholar.org/4551/8902ca4e297e3aa96310c353caf2e5b5403e.pdf.
16. Turcu, C., & Turcu, C. (2012). RFID-based Solutions for Smarter Healthcare. International Workshop Fostering Innovation in
Healthcare Services, 1-4.
17. Want, R. (2011). Near Field Communication. IEEE Pervasive Computing, 10(3), 4-7. doi: 10.1109/mprv.2011.55.
18. Wexelblat, A. (2015). Virtual Reality. Saint Louis: Elsevier Science.
Authors: Garina E.P., Garin A.P., Romanovskaya E.V., Andryashina N.S., Smirnova Z.V., Mizikovsky I.E.
Development Practice of Production Systems — Systems of Product Creation in Domestic
599. Paper Title:
Production (On the Example of Reference Areas)
Abstract: The article considers modern approaches to improvement of production processes at the 3398-
enterprise, practical application of production development methods, issues of realization of production 3401
technologies in industry. A necessary condition for development of production is disclosed - increasing the
efficiency of using technological potential through realization of the potential for strengthening its control
systems. The article is devoted to studying the variability of application of adaptive methods for improvement of
processes, technologies, and systems. Also, the effectiveness of development methods is determined by the
example of their adaptation to the practice of the economic entity. Solutions to increase the competitiveness of
enterprises cover the sphere of production, development of organizational systems of management, and "Kaizen"
system. Analysis of practice and modern approaches to increase competitiveness is carried out in the context of
implementation of solutions by domestic producers. In the course of the research it is determined that to solve
tasks, it is necessary to develop the technological process of manufacturing product, as well as elements of the
production system in part maintenance and operation of equipment. It is proved that the implementation of
production development program will increase the utilization of production capacities, reduce the cost of
production, change the indicator of time maintenance of production machines and equipment, and reduce used
production area.
Authors: Angana Saikia, Masaraf Hussain, Amit Ranjan Barua, Sudip Paul
Performance Analysis of various Neural Network functions for Parkinson’s disease Classification
Paper Title:
using EEG and EMG
Abstract: Artificial neural network (ANN) is a significant tool for classification of various types of disease
using either Biosignals/images or may be any kind of physical parameters. Establishment of appropriate
combination of learning, transfer function and training function is a very tedious task. Here, we compared the
performance of different training parameters in feed forward neural network for differentiating of Parkinson’s
disease using human brain (Electroencephalogram) and muscle signals (Electromyogram) features as the input
vector. 3 different types of training algorithm with six training functions is used. They are Gradient Descent
algorithms (traingd, traingdm), Conjugate Gradient algorithms (trainscg, traincgp) and Quasi-Newton algorithms
(trainbfg, trainlm). Proposed work compared the mentioned algorithm in terms of mean square error,
classification rate (%),R-value and the elapsed time.
Study showed that trainlm (Levenberg-Marquardt) best fits for larger data set. It showed the highest accuracy
rate of 100% with 0 mismatch classification with a best validation mean square error of 0.0040254 in 3 epochs
with a elapsed time of 1.12 seconds. The R-value found was 0.9998 which is in nearly equals to 1. Hence,
600.
Levenberg-Marquardt can be used as a training function for the classification of any brain disorder.
3402-
3406
Keyword : Artificial neural network (ANN), Electroencephalogram (EEG), Electromyogram (EMG),
Parkinson’s disease (PD), Neural Network Classification.
References:
1. H. Checkoway, L.M. Nelson," Epidemiologic approaches to the study of Parkinson's disease etiology," Epidemiology.
1999,pp.327-36.
2. A. Saikia, V. Majhi, M.Hussain, S.Paul, A.Datta," Tremor Identification Using Machine Learning in Parkinson's Disease," Early
Detection of Neurological Disorders Using Machine Learning Systems: IGI Global, 2019,pp.128-51.
3. I. Boersma, J. Jones, C. Coughlan, J. Carter, D. Bekelman, J. Miyasaki, " Palliative care and Parkinson's disease: caregiver
perspectives," Journal of Palliative Medicine, 2017;20(9):930-8.
4. De Rijk M, Breteler M, Graveland G, Ott A, Grobbee D, Van der Meche F, et al. Prevalence of Parkinson's disease in the
elderly: the Rotterdam Study. Neurology. Vol. 45, no.12,1995, pp.2143-6.
5. G. Pfurtscheller, Da Silva FL, " Event-related EEG/MEG synchronization and desynchronization: basic principles," Clinical
neurophysiology, Vol. 110, no. 11 1999, pp.1842-57.
6. Y.Z.Huang , F.Y. Chang, W.C. Liu, Y.F.Chuang, L.L.Chuang , Y.J. Chang, "Fatigue and muscle strength involving
walking speed in Parkinson’s disease: insights for developing rehabilitation strategy for PD, "Neural plasticity. 2017.
7. R.Sathya, A. Abraham, " Comparison of supervised and unsupervised learning algorithms for pattern classification,"
International Journal of Advanced Research in Artificial Intelligence, Vol. 2, no. 2, 2013, pp.34-8.
8. C. Loconsole, G.D. Cascarano, A. Brunetti, G.F. Trotta, G. Losavio, V. Bevilacqua, " A model-free technique based on computer
vision and sEMG for classification in Parkinson’s disease by using computer-assisted handwriting analysis," Pattern
Recognition Letters, Vol.121, 2019, pp.28-36.
9. L. Berus, S. Klancnik, M. Brezocnik, M. Ficko, " Classifying Parkinson’s Disease Based on Acoustic Measures Using
Artificial Neural Networks", Sensors, Vol. 19, no.1, 2019,pp.16.
10. S.M. Srinivasan, M. Martin, A. Tripathi, " ANN based Data Mining Analysis of the Parkinson’s Disease,"
International Journal of Computer Applications, Vol.168, no.1, 2017.
11. O. Er, O. Cetin , M.S. Bascil, F.A. Temurtas, " Comparative study on parkinson's disease diagnosis using neural networks
and artificial immune system," Journal of Medical Imaging and Health Informatics, Vol. 6, no.1, pp. 264-8.
12. M.K.S. Alsmadi, K.B. Omar, S.A.Noah, "Back propagation algorithm: the best algorithm among the multi-layer perceptron
algorithm," International Journal of Computer Science and Network Security,Vol.9, no.4, 2009, pp. 378-83.
13. S. Ali, K.A. Smith," On learning algorithm selection for classification," Applied Soft Computing, Vol. 2, no, 2,pp.
119-38.
14. M.H. Beale, M.T. Hagan, H.B. Demuth, "Neural network toolbox," User’s Guide, MathWorks, Vol. 2, 2010, pp. 77-81.
15. W.W. Hager, H.A. Zhang, " Survey of nonlinear conjugate gradient methods," Pacific journal of Optimization, Vol. 2, no. 1,
2006, pp. 5-58.
16. M.F. Møller," A scaled conjugate gradient algorithm for fast supervised learning. Neural networks, Vol. 6, no. 4, 1993,
pp. 525-33.
17. M.H. Beale, M.T. Hagan, H.B. Demuth," Neural network toolbox user’s guide," The MathWorks Inc, 1992.
18. A. Saikia, M. Hussain, A.R. Barua, S.Paul, " EEG-EMG correlation for parkinson’s disease," International Journal of
Engineering and Advanced Technology, Vol. 8, no.6,2019, pp.1179-85.
19. A. Saikia, M. Hussain, A.R. Barua, S. Paul, " Significance of Lyapunov Exponent in Parkinson's Disease Using
Electroencephalography,", 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN); 2019:
IEEE.
20. A. Andrews, E. Morin, L. McLean, " Finger movement classification using forearm EMG signals," 2008.
Keyword : critical value of parameter, heat conduction problem, maximum principle, numerical computation,
variable density.
601. References:
u = u + u1+
1. H. Fujita, “On the blowing up of solutions of the Cauchy problem for t ”, University of Tokyo, Journal of the Faculty of 3407-
Science, vol. 16, 1966, pp. 105-113.
2. M.Aripov, “Method of standard equation for solving nonlinear boundary value problems”, Tashkent, 1986, p. 137. 3412
3. J. L. V'azquez and V. A. Galaktionov, “Asymptotic behavior of solutions of the nonlinear absorption diffusion equation at a c ritical
exponent”, report of the Academy of Sciences of USSR 1989, no., p.p
4. V. A. Galaktionov and S. A. Posashkov, “Asymptotics of nonlinear heat conduction with absorption under the critical exponent”,
Preprint no. 71, Keldysh Inst. Appl. Math., Acad. Sci. USSR, 1986 (Russian). pp
5. V.A.Galaktionov, S.P. Kurdyumov, A.A. Samararskiy, “On asymptotic "eigenfunctions" of the Cauchy problem for a nonlinear
parabolic equation”, mathematical collection, 1985, vol. 126 (168), no. 4, p.p 435-472.
6. A.A. Samararskiy, A.V. Gulin, “Numerical methods”, “Nauka”, 1989, p. 432.
7. A.A. Samararskiy, introduction to the theory of difference schemes, “Nauka”, 1971, p. 553.
8. Aripov M., “Applied mathematics in science and technology”,”Tashkent”, 2008, p.166.
u = pu m
9. Diana Stan and Juan Luis Vazquez, “Asymptotic behavior of the doubly nonlinear equation t on bounded domains”, Elseiver,
Nonlinear analysis, 2013, vol. 77, pp. 1-32.
10. Aripov M., Mukimov A., “An asymptotic solution radially symmetric self-similar solution of nonlinear parabolic equation with source
in the second critical exponent case “, National university of Uzbekistan, ACTA NUUz, 2017, vol.2, n.2, p.p. 21-30.
Paper Title: Research Trends in Secure Routing Protocols and Communication System in WSNs
Abstract: At present, Wireless Sensor Networks (WSNs) is fastest growing technology which extensively
adopting for various application services including; weather monitoring, traffic prediction, surveillance, research
and academic fields etc. As the sensor nodes are randomly deployed in wireless environment, security metrics
becomes most promising challenge where communication wirelesses networks facing today. In WSNs, sensor
nodes acquires various security concern i.e. vulnerabilities, threats and malicious attacks. Due to the limited
602. resource constraints like bandwidth demand, limited memory, computational cost and minimum energy
consumption of sensor nodes makes the network security protocols unachievable. In this context, this 3413-
comprehensive study provides extensive review of WSNs, various challenges mainly related to security attacks 3421
and their solution strategies to strengthen the network performance. The significant contribution of this survey
study is to provide the comprehensive report on standard secure routing schemes introduced in the literature and
pertaining them to secure and non-secure routing protocols for strengthening the WSNs lifetime. Furthermore,
the study considers the most frequently used security protocols published between 2010 to 2019, and
investigates the major issues towards the security provisions in WSN, which may help for designing a futuristic
routing protocol for any WSNs.
Keyword : Cryptography Algorithms; LEACH; Security Attack; Secure Routing Protocol; Wireless Sensor
Network..
References:
1. S.K. Singh, M. P. Singh, and D. K. Singh, “Routing protocols in wireless sensor networks–A survey”, International Journal of
Computer Science & Engineering Survey (IJCSES), Vol.1, no. 2, pp.63-83, 2010
2. I.S. Hammoodi, B. G. Stewart, A. Kocian and S. G. McMeekin, “A comprehensive performance study of OPNET modeler for ZigBee
wireless sensor networks”, In 2009 Third International Conference on Next Generation Mobile Applications, Services and
Technologies, pp. 357-362, 2009.
3. A.M. El-Semary, M.M. Abdel-Azim, “New trends in secure routing protocols for wireless sensor networks”, Int J Distrib Sens Netw,
16, 2013
4. M.R. Ahmed, X. Huang, and D. Sharma, "A taxonomy of internal attacks in wireless sensor network”, Memory (Kbytes), 128, pp.48 ,
2012
5. S. Omar, O. E. Ghandour, and A. M. A. E-Haleem, “Multipath Active Based Routing Protocol for Mobile cognitive Radio AdHoc
Networks”, Wireless Communications and Mobile Computing, 2017.
6. G. Nandini, J. Anitha, “Performance Chronicles of Multicast Routing Protocol in Wireless Sensor Network”, International Journal of
Advanced Computer Science and Applications, vol. 8, no. 9, pp.284-293, 2017
7. H. Singh and D. Singh, “Taxonomy of routing protocols in wireless sensor networks: A survey”, In 2nd International Conference on
Contemporary Computing and Informatics (IC3I), pp. 822-830, 2016.
8. E.Hassan, K. Bourgba, and M. Ouzzif, "A survey on flat routing protocols in wireless sensor networks", In International Sympo sium
on Ubiquitous Networking, Springer, pp. 311-324, 2015..
9. El-A. Mohamed, and M. M. A-Azim, “New trends in secure routing protocols for wireless sensor networks”, International Journal of
Distributed Sensor Networks 9, no. 5 , 2013
10. M. Khalid, Z. Ullah, N. Ahmad, M. Arshad, B. Jan, Y. Cao, and A. Adnan, “A survey of routing issue s and associated protocols in
underwater wireless sensor networks”, Journal of Sensors, 2017
11. H. Echoukairi, K. Bourgba, and M. Ouzzif. "A survey on flat routing protocols in wireless sensor networks." In Advances in
Ubiquitous Networking, pp. 311-324. Springer, Singapore, 2016.
12. S.P. Singh, and S. C. Sharma, "A survey on cluster-based routing protocols in wireless sensor networks", Procedia computer science 45
(2015): 687-695.
13. J. Kumar, S. Tripathi, and R. K. Tiwari, "A survey on routing protocols for wireless sensor networks using swarm intelligence."
International Journal of Internet Technology and Secured Transactions 6, no. 2 (2016): 79-102.
14. H.D.E. Al-Ariki, M.N. S. Swamy, "A survey and analysis of multipath routing protocols in wireless multimedia sensor networks",
Wireless Networks 23, no. 6 (2017): 1823-1835.
15. E. Stavrou, A. Pitsillides, "A survey on secure multipath routing protocols in WSNs”, Computer Networks, vol.54, no. 13, pp. 2215-
2238, 2010
16. M. Za. Hassan, H.A-Rizzo, and F. A-Turjman. "A survey on multipath routing protocols for QoS assurances in real-time wireless
multimedia sensor networks." IEEE Communications Surveys & Tutorials 19, no. 3 (2017): 1424-1456.
17. S. Sathyadevan, S. Prabhakaranl, and K. Bipin. "A Survey of Security Protocols in WSN and Overhead Evaluation”, In Proceedings of
the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, pp. 729-738, 2015.
18. F. Ishmanov and Y. B. Zikria, "Trust mechanisms to secure routing in wireless sensor networks: current state of the research and open
research issues." Journal of Sensors, 2017
19. J. Kaur, S.S. Gill, and B.S. Dhaliwal, "Secure trust based key management routing framework for wireless sensor networks”, Jo urnal of
Engineering, 2016
20. T.M. Rahayu, S-G. Lee, and H-J. Lee, "A secure routing protocol for wireless sensor networks considering secure data aggregation."
Sensors 15, no. 7 (2015): 15127-15158.
21. F. E-Hajji, C. Leghris, and K. Douzi, "Adaptive Routing Protocol for Lifetime Maximization in Multi-Constraint Wireless Sensor
Networks”, Journal of Communications and Information Networks 3, no. 1 (2018): 67-83.
22. K.A. Kumar, A.V.N Krishna, and K. S. Chatrapati, “New secure routing protocol with elliptic curve cryptography for military
heterogeneous wireless sensor networks”, Journal of Information and Optimization Sciences38, no. 2 (2017): 341-365.
23. L. Li, and D. Li. "An Energy-Balanced Routing Protocol for a Wireless Sensor Network." Journal of Sensors, 2018
24. M.K. Khan, M. Shiraz, K. Z. Ghafoor, S. Khan, A. S. Sadiq, and G. Ahmed, "EE-MRP: Energy-efficient multistage routing protocol
for wireless sensor networks”, Wireless Communications and Mobile Computing, 2018
25. S-K. Lee, J-G. Koh, and C-R. Jung. "An energy-efficient QoS-aware routing algorithm for wireless multimedia sensor networks."
International Journal of Multimedia and Ubiquitous Engineering 9, no. 2 (2014): 245-252.
26. B-Y. Li, and P-J. Chuang "Geographic energy-aware non-interfering multipath routing for multimedia transmission in wireless sensor
networks." Information Sciences 249 (2013): 24-37.
27. K. Saleem, N. Fisal and J. Al-Muhtadi, "Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol," in
IEEE Sensors Journal, vol. 14, no. 7, pp. 2232-2239, July 2014.
28. D. Qin, S. Yang, S. Jia, Y. Zhang, J. Ma and Q. Ding, "Research on Trust Sensing Based Secure Routing Mechanism for Wireless
Sensor Network," in IEEE Access, vol. 5, pp. 9599-9609, 2017.
29. S. Li, S. Zhao, X. Wang, K. Zhang and L. Li, "Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless
Sensor Networks," in IEEE Systems Journal, vol. 8, no. 3, pp. 858-867, Sept. 2014.
30. S. Ganesh and R. Amutha, "Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering
mechanisms," in Journal of Communications and Networks, vol. 15, no. 4, pp. 422-429, Aug. 2013.
31. A. Liu, Z. Zheng, C. Zhang, Z. Chen and X. Shen, "Secure and Energy-Efficient Disjoint Multipath Routing for WSNs," in IEEE
Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3255-3265, Sept. 2012.
32. G. Zhan, W. Shi and J. Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs," in IEEE
Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184-197, March-April 2012.
33. M. Taherian, H. Karimi, A. M. Kashkooli, A. Esfahanimehr, T. Jafta, and M.Jafarabad. "The design of an optimal and secure rou ting
model in wireless sensor networks by using PSO algorithm." Procedia Computer Science 73 (2015): 468-473.
34. X. Zhenghong, C. Zhigang, and H. Changqin. "Secure routing protocol with anomaly detection in heterogeneous wireless sensor
networks." International Journal of Mobile Network Design and Innovation 4, no. 3 (2012): 157-163.
35. L. Chen, X. Qi, L. Liu, and G. Zheng. "A security routing protocol based on convergence degree and trust." International Journal of
Grid and Utility Computing 8, no. 1 (2017): 38-45.
36. A. Ahmed, K. A. Bakar, M. I. Channa, and A. W. Khan. "A secure routing protocol with trust and energy awareness fo r wireless sensor
network." Mobile Networks and Applications 21, no. 2 (2016): 272-285.
37. M. G-Otero, T. Zahariadis, F. Álvarez, H. C. Leligou, A. P-Hernández, P. Karkazis, and F. J. C-Quirós. "Secure geographic routing in
ad hoc and wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2010 (2010): 10.
38. L.H. Long and E. Choi. "Energy-Efficiency Protocol for Securing the Wireless Sensor Networks." In IFIP International Conference on
Network and Parallel Computing, pp. 589-598. Springer, Berlin, Heidelberg, 2012.
39. T. Maitra, Su. Barman, and D. Giri. "Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks." In Information
Technology and Applied Mathematics, pp. 23-40. Springer, Singapore, 2019.
40. T. Wang, G. Zhang, X. Yang, and A. Vajdi. "A trusted and energy efficient approach for cluster-based wireless sensor networks."
International Journal of Distributed Sensor Networks 12, no. 4 (2016): 3815834.
41. S. S. Jawaligi and G. S. Biradar. "QoS oriented and delay tolerant WSN routing protocol for data gathering in IoT ecosystem."
International Journal of Internet Technology and Secured Transactions 8, no. 3 (2018): 469-487.
42. G. Gulhane and N. V. Mahajan, "Securing multipath routing protocol using authentication approach for wireless sensor network." In
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on, pp. 729-733, 2014.
Paper Title: Identification of Diabetic Retinopathy from fundus images using CNNs
Abstract: the Diabetic Retinopathy is the diabetes-mellitus to human vision that is the main cause of
vision loss. The early stage detection of diabetic retinopathy is can play eminent role in the diabetes treatment.
The fundus of retinal image is utilized to recognize the symptoms of diabetic retinopathy. Moreover, the above
phenomena led us to propose this paper; here we propose segment based learning approach for identification of
diabetic retinopathy. The segment based image level is required to obtain the identification of diabetic
retinopathy images, the classifiers and features are equally learned from the data. Then, we adapt pre-trained
CNN as the fine tune to achieve the segment level estimation of diabetic retinopathy. For identification of
diabetic retinopathy, we achieve accuracy 96.97 and 98.46% at 20 and 30% and also achieve AUC (Area under
Curve) 97.51 and 98.50 at 20 and 30% on the Kaggle dataset. Our proposed model outperforms much better than
other models.
Paper Title: A Hybrid Forecasting Model for Option Price Prediction using Machine Learning Technique
607. Abstract: A hybrid model is presented in this paper that is aiming to forecast the option prices that are
analyzed in the data set of different banks. A new move is proposed by this paper that is forecasting the option
3444-
price with the use of ANN model which is optimizing the hybrid swarm optimization. The data set of the NSE 3450
India banking sector has been utilized for the calculation of an effective algorithm for forecasting the option
price with the help of this ANN model. For forecasting the option price, the methods which are used in this
paper are SOM (self organization map), RBF (Radial Basis Function) and the Hybrid Swarm Optimization
system. The hybrid swarm intelligence algorithm reduces the variation of prices and proceeds the data for the
prediction and used cascaded neural network-based classifier for the purification of data. Two results are
combined so that the option price prediction can be achieved. A comprehensive description of the option price is
offered with a combined forecasting model that is developing the accuracy of the option price forecasting, also
the reflection of the stock market trends are seen in this investigation and the model also has the capacity to offer
advices to the investors that are connected with the productive speculation.
Keyword : ANN model, option price, Deep neural network, PGO, ACO.
References:
1. Siddique, M., DebdulalPanda, S.D. and Mohapatra, S.K., 2017. A hybrid forecasting model for stock value prediction using soft
computing. International Journal of Pure and Applied Mathematics, 117(19), pp.357-363.
2. Xing, X., Stock Price Forecasting using RBF Neural Network and Hybrid Particle Swarm Optimization.
3. Noman, S., Shamsuddin, S.M. and Hassanien, A.E., 2009. Hybrid learning enhancement of RBF network with particle swa rm
optimization. In Foundations of Computational, Intelligence Volume 1 (pp. 381-397). Springer, Berlin, Heidelberg.
4. Foqaha, M. and Awad, M., 2017. Hybrid Approach to Optimize the Centers of Radial Basis Function Neural Network Using Particle
Swarm Optimization. JCP, 12(5), pp.396-407.
5. Di Persio, L. and Honchar, O., 2016. Artificial neural networks architectures for stock price prediction: Comparisons and app lications.
International journal of circuits, systems and signal processing, 10, pp.403-413.
6. Tsai, C.F. and Wang, S.P., 2009, March. Stock price forecasting by hybrid machine learning techniques. In Proceedings of the
International MultiConference of Engineers and Computer Scientists (Vol. 1, No. 755, p. 60).
7. Park, H., Kim, N. and Lee, J., 2014. Parametric models and non-parametric machine learning models for predicting option prices:
Empirical comparison study over KOSPI 200 Index options. Expert Systems with Applications, 41(11), pp.5227-5237.
8. Andreou, P.C., Charalambous, C. and Martzoukos, S.H., 2008. Pricing and trading European options by combining artificial neural
networks and parametric models with implied parameters. European Journal of Operational Research, 185(3), pp.1415 -1433.
9. Liang, X., Zhang, H., Xiao, J. and Chen, Y., 2009. Improving option price forecasts with neural networks and support vector
regressions. Neurocomputing, 72(13-15), pp.3055-3065.
10. Chong, E., Han, C. and Park, F.C., 2017. Deep learning networks for stock market analysis and prediction: Methodology, data
representations, and case studies. Expert Systems with Applications, 83, pp.187-205.
11. Majhi, R., Panda, G. and Sahoo, G., 2009. Efficient prediction of exchange rates with low complexity artificial neural network models.
Expert systems with applications, 36(1), pp.181-189.
12. Shen, W., Guo, X., Wu, C. and Wu, D., 2011. Forecasting stock indices using radial basis function neural networks optimized by
artificial fish swarm algorithm. Knowledge-Based Systems, 24(3), pp.378-385.
13. Adebiyi, A.A., Ayo, C.K., Adebiyi, M.O. and Otokiti, S.O., 2012. An improved stock price prediction using hybrid market indicators.
African Journal of Computing & ICT, 5(5), pp.124-135.
14. Saniee, M. and Habibi, A.J., 2010. A Hybridization of Evolutionary Fuzzy Systems and Ant Colony Optimization for Intrusion
Detection. ISeCure, 2(1).
15. Shuang, B., Chen, J. and Li, Z., 2011. Study on hybrid PS-ACO algorithm. Applied Intelligence, 34(1), pp.64-73.
16. Bies, R.R., Muldoon, M.F., Pollock, B.G., Manuck, S., Smith, G. and Sale, M.E., 2006. A genetic algorithm-based, hybrid machine
learning approach to model selection. Journal of Pharmacokinetics and Pharmacodynamics, 33(2), pp.195-221.
17. Helmy, T., Fatai, A. and Faisal, K., 2010. Hybrid computational models for the characterization of oil and gas reservoirs. Ex pert
Systems with Applications, 37(7), pp.5353-5363.
18. Liu, Y., Zheng, Q., Shi, Z. and Chen, J., 2004, August. Training radial basis function networks with particle swarms. In Inte rnational
Symposium on Neural Networks (pp. 317-322). Springer, Berlin, Heidelberg.
19. Chen, J. and Qin, Z., 2006, October. Training RBF neural networks with PSO and improved subtractive clustering algorithms. In
International Conference on Neural Information Processing (pp. 1148-1155). Springer, Berlin, Heidelberg.
20. Cui, X., Potok, T.E. and Palathingal, P., 2005, June. Document clustering using particle swarm optimization. In Proceedings 2005
IEEE Swarm Intelligence Symposium, 2005. SIS 2005. (pp. 185-191). IEEE.
21. Zhang, C., Shao, H. and Li, Y., 2000, October. Particle swarm optimisation for evolving artificial neural network. In Smc 2000
conference proceedings. 2000 ieee international conference on systems, man and cybernetics.'cybernetics evolving to systems, humans,
organizations, and their complex interactions'(cat. no. 0 (Vol. 4, pp. 2487-2490). IEEE.
22. Al-kazemi, B. and Mohan, C.K., 2002, November. Training feedforward neural networks using multi-phase particle swarm
optimization. In Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP'02. (Vol. 5, pp.
2615-2619). IEEE.
23. Shrivastava, P. and Verma, C.K., Optimization of the variance of attribute by hybrid swarm intelligence and option price pred ication
by cascading neural network. Bioscience Biotechnology Research Communications, Vol. 12, pp. 324-332, 2019
24. Shrivastava, P. and Verma, C.K., Prediction of Option Price using Ensemble of Machine Learning Algorithms for Indian Stock Market.
International Journal of Recent Technology and Engineering (IJRTE), Vol. 8 Issue-2, 2019, p.3231-3241.
Paper Title: Effect of Reinforcements on Specific Wear rate of Al 7075 / TiB2/ Cr2O3 hybrid Composites
Abstract: A composite material contains different reinforcing elements added to the major material that
forms the base matrix. In this work Aluminium 7075 matrix was reinforced with 12% TiB2and 4%, 6% and 8%
Cr2O3 and the wear behavior of this composite was studied. The composite material was prepared by the
process of stir casting. The rate of specific wear was measured for different reinforcements under varying
608. velocity and load. The Scanning Electron Microscope images of the worn-out surfaces were used to investigate
the wear pattern. The wear rate could further be extrapolated using fuzzy logic and were compared with the 3451-
experimental results. 3454
Keyword : Hybrid composites, Stir Casting, Fuzzy Logic, Specific Wear rate, Pin on disc, Micro hardness,
Impact Strength
References:
1. Gopichand Dirisenapu, Seelam Reddy, and Lingaraju Dumpala. “The effect of B4C and bn nanoparticles on the mechanical and
microstructural properties of al7010 hybrid metal matrix.” ,Materials Research Express, 6, 08 2019.
2. A. Baradeswaran, S.C. Vettivel, A. Elaya Perumal, N. Selvakumar, and R. Franklin Issac. “Experimental investigation on mechanical
behaviour, modelling and optimization of wear parameters of B 4C and graphite reinforced aluminium hybrid composites.” ,Materials
& Design, 63:620 – 632, 2014. ISSN 0261-3069.
3. S. Johny James, K. Venkatesan, P. Kuppan, and R. Ramanujam. “Hybrid aluminium metal matrix composite reinforced with SiC and
TiB2.”, Procedia Engineering, 97:1018 – 1026, 2014. ISSN 1877-7058.
4. Mahmood Khan, Muhammad Zulfaqar, Fahad Ali, and Tayyab Subhani. “Microstructural and mechanical characterization of hybrid
aluminum matrix composite containing boron carbide and Al-Cu-Fe quasicrystals.”, Metals and Materials International, 23(4):813–
822, Jul 2017. ISSN 2005-4149.
5. Basavarajappa Kuldeep, Ravikumar P, Pradeep S, and Gopi K.R. “Effect of boron nitride and zirconium dioxide on mechanical
behavior of Al 7075 metal matrix hybrid composite.” ,Materials Research Express, 6, 11 2018.
6. Senthil Kumar Marikkannan and Natrayan L. “Processing and characterization of AA2024/Al 2O3/sic reinforces hybrid composites
using squeeze casting technique.” ,Iranian Journal of Materials Science and Engineering, 16:55–67, 07 2019. doi:
10.22068/ijmse.16.2.55.
7. Balachandar Munisamy, Vijaya Ramnath Bindu Madhavan, Elanchezhian Chinnadurai, and Jeykrishnan Janardhanan. “Prediction of
mechanical properties of Al6061 metal matrix composites reinforced with zircon sand and boron carbide. “ ,Materials Testing,
61(6):537–542, Jun 2019. ISSN 0025-5300.
8. R. Palanivel, Isaac Dinaharan, R. Laubscher, and J. Davim. “Influence of boron nitride nanoparticles on microstructure and wear
behavior of AA6082/TiB2 hybrid aluminum composites synthesized by friction stir processing.”, Materials and design, 106:195–204,
06 2016.
9. Pratip Roy, Subhash Singh, and Kaushik Pal. “Enhancement of mechanical and tribological properties of SiC - and BC-reinforced
aluminium 7075 hybrid composites through friction stir processing.”, Advanced Composite Materials, 28(sup1):1–18, 2019.
10. Mahmut Can Senel, Mevlut Gurbuz, and Erdem Koc. “Fabrication and characterization of synergistic Al-SiC-gnps hybrid
composites.”, Composites Part B: Engineering, 154:1 – 9, 2018. ISSN 1359-8368.
11. Vipin Kumar Sharma and Vinod Kumar. “Development of rare-earth oxides based hybrid amcs reinforced with SiC/Al 2O3: mechanical
& metallurgical characterization.” ,Journal of Materials Research and Technology, 8(2):1971 – 1981, 2019. ISSN 2238-7854.
Paper Title: IoT based Smart Farming using Cloud Computing and Machine Learning
Abstract: Internet of Things (IoT) is a most emerging and advanced technology that works on computing
and communications. The survival of human beings in the world depends on the agricultural sector. The
traditional agriculture methods are to be replaced with smart technologies. In order to minimize the cost,
maintenance and monitoring the farms the technologies are used. The smart sensors sense the parameters like
temperature, humidity, water level, soil nutrition’s and PH levels are monitored. In this paper IoT methods are
used for smart farming .
Keyword : The traditional agriculture methods are to be replaced with smart technologies.
References:
1. Resh.H.M , Hydroponics food production:A definitive guide book for advanced home gardener and the commercial hydroponics
grower(7th.edu).CRC Press.
2. Miguel A.Zamora-Izuierdo, jose Santa, Juan A.Martinez,VicenteMartinez,AntonioF.Skarmete, “smart farming IoT Platform based on
609. edge and cloud computing”Bio-system Engineering,2019.
3. An, W.,Wu,D.,Ci,s. Luo,H.Adamchuk.V, Xu.Z ., “Agricultural cyber physical systems. In cyber system: Foundations, Principle and
applications ,2017. 3455-
4. MiquelA.Zamora, Izquierdo, joseSanta, Juan A,Martinez, Vicente Martinez, Antonio F.Scarmeta, " Smart farming IoT platform based 3458
on edge and cloud computing",2019.
5. Mahammad Shareef Mekala, P.Viswanathan, " CLAY-MIST:IoT-cloud enabled CMM index for smart agriculture
monitoringsystem",2018.
6. Zhao Liqiang, Yin Shouyi, Liu Leibo, Zhang Zhen, Wei Shaojun,ʊ A crop Monitoring System Based on Wireless Sensor
NetworkۅELSEVIER,Procedia Environmental Sciences-2011.
7. Fan TongKe, “Smart Agriculture based on Cloud Computing and IoT”, Journal of convergence information Technology, vol.8
nov.2013
8. Archana and Priya, "Design and Implementation of Automatic Plant Watering System" given at International Journal of Advanced
Engineering and world technology, vol-04, Issue-01, Jan-2016.
9. S. A. Salunke,“An Overview on Wireless Sensor Technologies for the Development of Agriculture”, S. Y. Chincholikar, S. P. Kha rde,
International Journal of Computer Science and Mobile Computing, Vol.4
10. Issue.6, June- 2015, pg. 416-418.
11. Li Jianting, Zhang Yingpeng, "Design and Accomplishment of the Real- Time Tracking System of Agricultural Products Logistics
Process."EProduct E-Service and E-Entertainment (ICEEE), 2010 International Conference on , pp.1,4, 7-9 Nov. 2010.
12. Dayaker, P., Honey Diana, , Chandrasekhara Reddy, T., Mallikarjuna Reddyreddy, A.” Advancements of security and privacy of
sensitive data cloud computing” Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 11-Special Issue, 2018.
13. A.Mallikarjuna, B. Karuna Sree, “ Security towards Flooding Attacks in Inter Domain Routing Object using Ad hoc Network”
International Journal of Engineering and Advanced Technology (IJEAT), Volume-8 Issue-3, February 2019.
Authors: Piyush G. Chandak, Anand B. Tapase, Ravindra P. Patil, Sabir S. Sayyed, Abdulrashid C. Attar
Paper Title: Utilizing different wastes in rural roads of Karad, District – Satara, India
Abstract: The rural roads in India comprise of village roads (VR) and other district roads (ODR). The
traffic intensity is taken as 2 million standard axles (msa) since traffic load has increased on the rural roads. The
design guidelines have recommended the utilization of wastes accessible in the nearby vicinity for road
construction. Effective disposal of wastes such as plastic, rubber and electronic waste is the main concern in
India. The adverse effects of these identified wastes could be put to a beneficial use if utilized in road
611. construction. Due to the increasing trend of heavy traffic on rural roads, a bituminous Macadam layer is
generally laid over granular layers of the pavement. As such, the primary objective of the research is to discover 3464-
the optimum content of using the identified wastes to replace bitumen and aggregates of rural roads. Numbers of 3469
laboratory tests have been carried out on modified mixtures to understand the aptness and optimum content of
the wastes in construction of rural roads. The strength property of the naturally available soil was studied for the
rural roads in Karad. The California bearing ratio test analysis and their outcomes were employed to assess the
strength of the subgrade in the study area. Further, based on the suitability of identified wastes in bituminous
layer, IITPave software was used to analyze the performance of rural roads of the study area. Using the IITPave
software, design charts were created based on utilizing the wastes for rural roads in Karad, District – Satara,
India.
Authors: M.S Bennet Praba, Sagari Sen, Chailshi Chauhan, Divya Singh
613. Keyword : Labour productivity, linear programming problem, optimization technique, simplex method.
3474-
References: 3481
1. Nasiibah, R. and Zinatul, A.Z., “University-Industry Collaboration: Entrepreneurial University Catalyst Towards,” Prosceeding
PERKEM VIII, vol. 3, pp. 1227–1233, 2013.
2. MESTECC, “Researcher-Industry Scientific Exchange (RISE) Programme,” 2019.
3. Kapelko, M., Lansink, A.O. and Stefanou, S.E., “Effect of Food Regulation on the Spanish Food Processing Industry: A Dynamic
Productivity Analysis,” PLoS One, vol. 10, no. 6, pp. 1–16, 2015.
4. Ohueri, C.C., Enegbuma, W.I., Wong, N.H., Kuok, K.K. and Kenley, R., “Labour Productivity Motivation Framework For Iskandar
Malaysia,” Built Environment Project Asset Management, vol. 8, no. 3, pp. 293–304, 2018.
5. Siu, M.F.F., “Resource Budget For Workface Planning In Industrial-Construction,” Facilities, vol. 37, no. 5–6, pp. 292–312, 2019.
6. Chaturvedi, S., Thakkar, J.J. and Shankar, R., “Labor Productivity in The Construction Industry: An Evaluation Framework for Causal
Relationships,” Benchmarking, vol. 25, no. 1, pp. 334–356, 2018.
7. Mahamid, I., “Contractors Perspective Toward Factors Affecting Labor Productivity in Building Construction,” Engineering,
Construction and Architectural Management, vol. 20, no. 4, pp. 446–460, 2013.
8. Ghoddousi, P., Alizadeh, B.T., Hosseini, M.R. and Chileshe, N., “Implementing The International Benchmarking Labour Productivity
Theoretical Model,” Benchmarking, vol. 21, no. 6, pp. 1041–1061, 2014.
9. Shahidul, M.I., and Shazali, S.T.S., “Dynamics of Manufacturing Productivity: Lesson Learnt From Labor Intensive Industries,”
Journal Manufacturing Technology Management, vol. 22, no. 5, pp. 664–678, 2011.
10. Ugulu, R.A. and Allen, S., “Using The Learning Curve Theory In The Investigation Of On-Site Craft Gangs’ Blockwork Construction
Productivity,” Built Environment Project Asset Management, vol. 8, no. 3, pp. 267–280, 2018.
11. Islam, S. and Shazali, S.T.S., “ Determinants Of Manufacturing Productivity: Pilot Study On Labor-Intensive Industries,” International
Journal Production. Performance Management, vol. 60, no. 6, pp. 567–582, 2011.
12. Tang, C.F., “The Non-Monotonic Effect Of Real Wages On Labour Productivity: New Evidence From The Manufacturing Sector In
Malaysia,” International Journal Social Economy, vol. 39, no. 6, pp. 391–399, 2012.
13. Iqbal, N., Ahmad, M., Allen, M.M.C. and. Raziq, M.M., “Does E-HRM Improve Labour Productivity? A Study Of Commercial Bank
Workplaces In Pakistan,” Employee Relations, vol. 40, no. 2, pp. 281–297, 2018.
14. Yang, J. and Chen, H., “Can Rewards Incentives Of Non-State-Owned Enterprises Realize Co-Win Cooperation Of Workers,
Enterprises And The Society?: From The Perspective Of Labor Productivity, Profit And Labor Absorption,” Nankai Business Review
International, vol. 10, no. 2, pp. 179–206, 2019.
15. Enshassi, A., Mohamed, S., Mayer, P. and Abed, K., “Benchmarking Masonry Labor Productivity,” International Journal Production
Performance Management, vol. 56, no. 4, pp. 358–368, 2007.
16. Anggoro, B.S.R., Rosida, M., Mentari, A.M., Novitasari, C.D. and Yulista, I., “Profit Optimization Using Simplex Methods On Home
Industry Bintang Bakery In Sukarame Bandar Lampung,” Journal Physics: Conference Series, vol. 1155, no. 1, 2019.
17. Salama, T. and Moselhi, O., “Multi-Objective Optimization For Repetitive Scheduling Under Uncertainty,” Engineering, Construction
and Architectural Management, vol. 0217, no. 2, pp. 1294–1320, 2019.
18. Ugulu, R.A., Arewa, A. and Allen, S., “Project-Specific Constraints Influencing Productivity Of Tradespeople In The Nigerian
Construction Industry,” Built Environment Project and Asset Management, pp. 1-14, 2019.
19. Aulia, M.R., Putra, D.N., Murniati, S., Mustahiroh, M., Octavia, D., and Budiasih, Y., “Maksimalisasi Keuntungan Dengan Pendekatan
Metode Simpleks Studi Kasus pada Pabrik Sendai X di Ciputat, Tangerang Selatan,” Liquidity, vol. 2, no. 2, pp. 144–150, 2018.
20. Saleh, S.A., and Latif, T.I., “Solving Linear Programming Problems By Using Excel ’ s Solver,” Tikrit University تﯾرﻛﺗ ﺔﻌﻣﺎﺟ,” vol. d,
no. April, 2019.
21. Sriwidadi, T. and Agustina, E., “Analisis Optimalisasi Produksi Dengan Linear Programming Melalui Metode Simpleks Teguh
Sriwidadi,” Binus Business Review, vol. 4, no. 2, pp. 725–741, 2013.
22. Hussain, M.R., Qayyum, M. and Hussain, M.E., “Effect Of Seven Steps Approach On Simplex Method To Optimize The Mathematical
Manipulation,” International Journal Recent Technology Engineering, vol. 7, no. 5, pp. 34–43, 2019.
23. Febres, G.L., “A Space Decomposition-Based Deterministic Algorithm For Solving Linear Optimization Problems,” Axioms, vol. 8,
no. 3, 2019.
24. Nadar, D. K., “Some Applications of Simplex Method,” RIET-IJSET International Journal Science Engineering Technology, vol. 2,
no. 2, p. 171, 2015.
25. Azlan, N.A.A.N., Saptari, A. and Mohamad, E. “Augmentation of Simplex Algorithm for Linear Programming Problem to Enhance
Computational Performance,” Journal Advanced Manufacturing Technology -Special Issue Symposium 2017, vol. 11, no. November,
pp. 31–46, 2017.
26. Tesfaye, G., Berhane, T., Zenebe, B. and Asmelash, S., “A Linear Programming Method to Enhance Resource Utilization Case,”
International Journal for Quality Research, vol. 10, no. 2, pp. 421–432, 2016.
Keyword : Classification Algorithm, Credit Risk evaluation, Machine learning, supervised learning.
References:
1. A. Khashman, “Neural networks for credit risk evaluation: Investigation of different neural models and learning schemes,” Expert
Systems with Applications, vol. 37, no. 9, pp. 6233–6239, 2010.
2. S. T. Li, W. Shiue,M. H. Huang, "The evaluation of consumer loans using support vector machines." Expert Systems with
614. Applications, vol. 30, no. 4, pp. 772–782, 2006.
3. A. E. Khandani, A. J. Kim, and A. W. Lo, “Consumer Credit Risk Models Via Machine-Learning Algorithms,” SSRN Electronic
Journal, 2010. 3482-
4. C. L. Devasena, “Adeptness Evaluation of Memory-Based Classifiers for Credit Risk Analysis,” 2014 International Conference on 3486
Intelligent Computing Applications, 2014.
5. N. Gulsoy and S. Kulluk, “A data mining application in credit scoring processes of small and medium enterprises commercial
corporate customers,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2019.
6. X. Huang, X. Liu, and Y. Ren, “Enterprise credit risk evaluation based on neural network algorithm,” Cognitive Systems Research,
vol. 52, pp. 317–324, 2018.
7. A. Khashman, “Credit risk evaluation using neural networks: Emotional versus conventional models,” Applied Soft Computing, vo l.
11, no. 8, pp. 5477–5484, 2011.
8. N M. Wang, J. Yu, and Z. Ji, “Personal Credit Risk Assessment Based on Stacking Ensemble Model,” IFIP Advances in Information
and Communication Technology Intelligent Information Processing IX, pp.328–333, 2018.
9. H. Zhong, C. Miao, Z. Shen, and Y. Feng, “Comparing the learning effectiveness of BP, ELM, I-ELM, and SVM for corporate credit
ratings,” Neurocomputing, vol. 128, pp. 285–295, 2014.
10. U. P. Shukla and S. J. Nanda, “Designing of a Risk Assessment Model for Issuing Credit Card Using Parallel Social Spider
Algorithm,” Applied Artificial Intelligence, vol. 33, no. 3, pp. 191–207, 2018.
11. E. Claderia, G. Brandao, H. Campos, and A. Pereira, "Characterizing and Evaluating Fraud in Electronic Transactions", Eighth Latin
America Web Congress, vol. 12, pp. 115-122, 2018.
12. M. U. Sapozhnikova, A. V. Nikonov, A. M. Vulfin, M. M. Gayanova, K. V. Mironov, D. V. Kurennov, “Anti-fraud system on the
basis of data mining technologies” International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 243-248,
2017.
13. M. Soui, I. Gasmi, S. Smiti, and K. Ghédira, “Rule-based credit risk assessment model using multi-objective evolutionary algorithms,”
Expert Systems with Applications, vol. 126, pp. 144–157, 2019.
14. Y. Sahin and E. Duman, "Detecting Credit Card Fraud by ANN and Logistic Regression", IEEE, pp. 315-319, 2011.
15. A. Bahnsen, A. Stojanovic, D. Aouada and B. Ottersten, "Cost-Sensitive Credit Card Fraud Detection using Bayes Minimum Risk",
2013 12th International Conference on Machine Learning and Applications, pp. 333-338, 2013.
16. A. Srivastava, M. Yadav, S. Basu, S. Salunkhe and M. Shabad, "Credit Card Fraud Detection at Merchant Side using Neural
Networks", 2016 International Conference on Computing for Sustainable Global Development (INDIACom), pp. 667-670, 2016.
17. Lichman, Moshe, “UCI Machine Learning Repository,” http://archive.ics.uci.edu/ml, 2013
18. ttps://archive.ics.uci.edu/ml/datasets/Statlog+(German+Credit+Data)
19. Weka Machine Learning Project, https://www.cs.waikato.ac.nz/ml/weka
Kung-Teck, Wong; Hafizul Fahri Hanafi; Norazilawati Abdullah; Noraini Mohamed Noh;
Authors:
Mahizer Hamzah
A Prototype of Augmented Reality Animation (ARA) E-Courseware: An Assistive Technology To
Paper Title:
Assist Autism Spectrum Disorders (Asd) Students Master In Basic Living Skills
Abstract: The purpose of this study is to identify the e-courseware effectiveness and Special Education
(SpeEdu.) Teacher perception in using Basic Living Skills (BLS) E-courseware prototypes, namely BLS
(Augmented Reality Animation) & BLS (Static graphic). The study employed survey research design and
experimental approaches. The survey design approach was conducted in identifying the usability of the
prototype of Basic Living Skills e-courseware among Special education (SpeEdu) Teachers and for the
experimental design approach was carried out to identify the ASD’s achievements between Basic Living Skills
E-courseware (Augmented Reality Animation) & Basic Living Skills (Static graphic) for Autism Spectrum
Disorders (ASD) students master in basic living skills. A total of five (5) practising SpeEdu teachers had
participated in this study, and there was 4 total number of children involved in the study. The study used a pre-
post experimental research design. The participating in-service teachers and ASD students were selected based
on the criteria required. Pre-test and Post-test instruments were employed to gather ASD students’ achievement
scores. Analysis descriptive was carried out to understand and compare the differences between control and
treatment group. The result indicated that BLS (Augmented Reality Animation) is more effective to be used
rather than BSL (Static graphic) and respondents are more dominant and satisfied with the BLS (Augmented
Reality Animation) presentation. The implications of this study are significant contributions to the Ministry of
Education Malaysia (MOE), teachers, parents and caregivers.
Paper Title: An Image Processing Based Fungus Detection System For Mangoes
Abstract: Fruits which grow with high yield in many states of India are rich in proteins. But due to
addition of excess pesticides and chemicals intake of these fruits lead to serious health problems. It is necessary
616. to identify the presence of chemical in the fruits before consuming it. In this project we have planned to develop
an image processing technique to analyze whether the fruit is free from chemicals and fungus. In our paper, we 3493-
have implemented MATLAB used as well as fungus present in the fruit. We capture the images of the fruit or 3497
we use datasets and train the database with different color-based changes that happen after adding chemicals to
the fruit. The enhancement process is carried out in the captured image. Then image is segmented to hit the
regions with affected spots in the fruit. K-means method is used to carry out the segmentation process. The input
image is compared with the given data set for training to identify the images. In this way unhealthy fruits can be
identified and the affected spots in the fruit can be detected.
Keyword : MATLAB; k-mean; image processing; segmentation.
References:
1. Yan Zhang, Jian Lian, Mingqu Fan and YuanjieZheng,"Deep indicator for fine-grained classification of banana’s ripening stages",
Zhang et al. EURASIP Journal on Image and Video Processing (2018) 2018:46 https://doi.org/10.1186/s13640-018-0284-8.
2. PaymanMoallem, Alireza Serajoddin, Hossein Pourghassem,"Computer vision-based apple grading for golden delicious apples based
on surface features", INFORMATION PROCESSING IN AGRICULTURE XXX (2016) XXX–XXX.
3. Siddharth Singh Chouhan, Ajay Kaul1, Uday Pratap Singh and Sanjeev Jain,"Bacterial foraging optimization based Radial Basis
Function Neural Network (BRBFNN) for identification and classification of plant leaf diseases: An automatic approach towards Plant
Pathology", 2169-3536 © 2017 IEEE.
4. DameshwariSahu, ChiteshDewangan, "Identification and Classification of Mango Fruits Using Image Processing", International
Journal of Scientific Research in Computer Science, Engineering and Information Technology© 2016 IJSRCSEIT | Volume 2 | Issue 2
| ISSN: 2456-3307.
5. Sandesh Raut, Amit Fulsunge,"Plant Disease Detection in Image Processing Using MATLAB",
DOI:10.15680/IJIRSET.2017.0606034.
6. AmelH.Abbas, MarwaA.Shamel,"Identify and Classify Normal and Defects of Prunus_armeniaca Using Imaging Techniques",
Kurdistan Journal of Applied Research (KJAR) | Print-ISSN: 2411-7684 – Electronic-ISSN: 2411-7706 | kjar.spu.edu.iq
7. Volume 2 | Issue 3 | August 2017 | DOI: 10.24017/science.2017.3.11.
8. Tejal Deshpande, Sharmila Sengupta, K.S.Raghuvanshi,"Grading& Identification of Disease in Pomegranate Leaf and Fruit", Tejal
Deshpande et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4638 -4645
9. www.ijcsit.
10. MrunmayeeDhakate, Ingole A. B.,"Diagnosis of Pomegranate Plant Diseases using Neural Network",978-1-4673-8564-0/15/$31.00
©2015 IEEE.
11. S. R. Dubey and A. S. Jalal, “Application of Image Processing in Fruit and Vegetable Analysis: A Review,” J. Intell. Syst., vol. 24, no.
4, pp. 405–424, 2015.
Paper Title: Brain MRI Segmentation using Cellular Automata in k-Means Algorithm
Abstract: Tumors in brain have a fast growth(malignant) and should be prevented through various
medical ways. However detecting these tumor cells accurately can help the medical professionals to provide
accurate and hassle free diagnosis and treatment. Thus we are using Cellular Automata to provide better
detection methods in an MRI(Magnetic Resonance Imaging). Cellular Automat is widely used concept with
image processing. It is a system which id discreet and dynamic and comprises of simple cellular grid and rules,
and works locally. Due to simplicity and usage in complex problems it is widely used concept in many new
emerging data science complex problems. Conway’s Game of Life is very well known cellular automata and
thus researchers are becoming more interested in CA.
Keyword : Data mining, MRI, Data science, Classifiers, cellular automata, multi-dimensional cellular
617. automata.
3498-
References: 3501
1. Tom Fawcett (Center for the Study ), “Data mining with cellular automata,” pp. 1-10, 2007.
2. M. Gardner. Mathematical games: The fantastic combinations of John Conway’s new solitaire game ”life”. Scientific American,
223:120–123, October 1970. Available: http://hensel.lifepatterns.net/ october1970.html.
3. B. Meshkboo and M. Kangavari, “Video Data Mining with Learning Cellular Automata,” pp. 1-9.
4. A. Sleit, A. Dalhoum, I. Al-dhamari, and A. Awwad, “Efficient Enhancement on Cellular Automata for Data Mining,” Technology,
pp. 616-620.
5. L. Zhou and M. Yang, “A Classifier Build Around Cellular Automata for Distributed Data Mining,” 2008 International Conference on
Computer Science and Software Engineering, pp. 312-315, 2008.
6. Mayank Arya Chandra, Vidushi, “A study and analysis of Cellular Automata based Classifier in Data Mining”, International
Conference on Advances in Computer Applications (ICACA) 2012 Proceedings published by International Journal of Computer
Applications.
7. Tugba Usta , Enes Burak Dundar,Emin Erkan Korkmaz,”A cellular automata based classification algorithm”,2018.
8. S. Wolfram. Cellular Automata and Complexity: Collected Papers. Westview Press, 1994.
9. S. Wolfram. A New K ind of Science. Wolfram Media, Inc., Champaign, IL, 2002
10. .http://atlas.wolfram.com/01/01/.
Authors: Shubhendu Banerjee, Sumit Kumar Singh, Atanu Das, Rajib Bag
Recognition of Hindi and Bengali Handwritten and Typed Text from Images using Tesseract on
Paper Title:
Android Platform
Abstract: The concept of digitization has marked a revolution in the area of data conversion, data storage
and data sharing by converting non-editable typographic & handwritten text into editable electronic text. Though
numerous such works have been carried out across the world in various languages using Optical Character
Recognition (OCR), satisfactory output has been observed only in a few languages. This paper is an endeavor
towards taking a step ahead in the digitization of two of the most extensively spoken languages in the Indian
sub-continent – Hindi and Bengali - using Google’s open source OCR Engine, Tesseract. Working on the scripts
of these two languages of Brahmi origin has its own challenges owing to their varied traits of character
segmentation and word formation. Here, the training of Tesseract with data sets of Hindi and Bengali
typographic and handwritten characters has been integrated with an inimitable pre-processing stage involving
input image customization and image augmentation that significantly enhances the image quality allowing
Tesseract to offer more accurate results, especially in cases of handwritten texts and obscure images. Besides, it
also incorporates the features of English translation and text to speech translation which render their significance
among the non-natives and visually impaired mass. The focal idea of this paper has been to reach out to an
extended mass by enabling digitization on the Android platform. Comparative analysis carried out on three
distinctive parameters - on images with typographic texts, handwritten texts and on inferior quality images -
shows that the paper, to a certain extent, does succeed in projecting superior output in at least two cases as
compared to the most consistent Android application of today’s time.
Paper Title: Medical Big Data Analytics Using Machine Learning Algorithms
Abstract: Artificial intelligence and expert systems plays a key role in modern medicine sciences for
disease prediction, surveillance interventions, cost efficiency and better quality of life etc. With the arrival of
new web-based data sources and systematic data collection through surveys and medical reporting, there is a
need of the hour to develop effective recommendation systems which can support practitioners in better
decision-making process. Machine Learning Algorithms (MLA) is a powerful tool which enables computers to
learn from data. While many novel developed MLA constantly evolves, there is need to develop more
systematic, robust algorithm which can interpret with highest possible accuracy, sensitivity and specificity. The
study reviews previously published series on different algorithms their advantages and limitations which shall
help make future recommendations for researchers and experts seeking to develop an effective algorithm for
predicting the likelihood of various diseases.
Keyword : Artificial intelligence, expert systems, Machine Learning Algorithms, disease prediction, future
recommendations.
References:
1. Jamison D, Breman J, Measham A. Disease Control Priorities in Developing Countries. In: The International Bank for Reconstruc tion
and Development. New York: Oxford University Press; 2006.
2. Winters-Miner LA. Seven ways predictive analytics can improve healthcare: Medical predictive analytics have the potential to
revolutionize healthcare around the world. Elsevier. 2014.
3. Omachonu VK, Einspruch NG. Innovation in Healthcare Delivery Systems: A Conceptual Framework. Innov J Public Sect Innov J.
2010;15:1–20.
4. Fatima M, Pasha M. Survey of Machine Learning Algorithms for Disease Diagnostic. J Intell Learn Syst Appl. 2017;09:1–16.
5. Assistant Secretary for Planning and Evaluation. Improving Data for Decision Making: HHS Data Collection Strategies for a
Transformed Health System. 2011.
6. Bhatt C, Dey N, Ashour AS. Internet of Things and Big Data Technologies for Next Generation Healthcare. London: Springer; 201 7.
620. 7. IBM. Decision Tree Models. 2012.
8. Srinivas S, Sarvadevabhatla RK, Mopuri KR, Prabhu N, Kruthiventi SSS, Babu RV. A Taxonomy of Deep Convolutional Neural Nets 3517-
for Computer Vision. 2016;
9. Danjuma K, Osofisan A O. Evaluation of Predictive Data Mining Algorithms in Erythemato-Squamous Disease Diagnosis. 2015;10. 3526
10. Dodek PM, Wiggs BR. Logistic regression model to predict outcome after in-hospital cardiac arrest: validation, accuracy, sensitivity
and specificity. Resuscitation. 1998;36:201–8.
11. L’Heureux A, Grolinger K, Elyamany HF, Capretz MAM. Machine Learning With Big Data: Challenges and Approaches. IEEE
Access. 2017;5:7776–97.
12. Salvador R, Radua J, Canales-Rodríguez EJ, Solanes A, Sarró S, Goikolea JM, et al. Evaluation of machine learning algorithms and
structural features for optimal MRI-based diagnostic prediction in psychosis. Hu D, editor. PLoS One. 2017;12:e0175683.
13. de Wit S, Ziermans TB, Nieuwenhuis M, Schothorst PF, van Engeland H, Kahn RS, et al. Individual prediction of long -term outcome
in adolescents at ultra-high risk for psychosis: Applying machine learning techniques to brain imaging data. Hum Brain Mapp.
2017;38:704–14.
14. Schnack HG. Improving individual predictions: Machine learning approaches for detecting and attacking heterogeneity in
schizophrenia (and other psychiatric diseases). Schizophr Res. 2017;
15. Chen M, Hao Y, Hwang K, Wang L, Wang L. Disease Prediction by Machine Learning over Big Data from Healthcare Communities.
IEEE Access [Internet]. 2017;5:8869–79. Available from: http://mmlab.snu.ac.kr/~mchen/min_paper/2017/2017-IEEE-Access-1-
DiseasePrediction.pdf
16. Zhao Y, Healy BC, Rotstein D, Guttmann CRG, Bakshi R, Weiner HL, et al. Exploration of machine learning techniques in predicting
multiple sclerosis disease course. Ramagopalan S V., editor. PLoS One. 2017;12:e0174866.
17. Abos A, Baggio HC, Segura B, García-Díaz AI, Compta Y, Martí MJ, et al. Discriminating cognitive status in Parkinson’s disease
through functional connectomics and machine learning. Sci Rep. 2017;7:45347.
18. Kim HC, Jo I-J, Sung JM, Chang H-J. Abstract P202: Cardiovascular Risk Prediction Using Machine-learning Methods in the Middle-
aged Korean Population. Circulation. 2017;135:AP202.
19. Bhatt A, Dubey SK, Bhatt AK, Joshi M. Data Mining Approach to Predict and Analyze the Cardiovascular Disease. In 2017. p. 117–
26.
20. Acharya UR, Fujita H, Adam M, Lih OS, Sudarshan VK, Hong TJ, et al. Automated characterization and classification of coronary
artery disease and myocardial infarction by decomposition of ECG signals: A comparative study. Inf Sci (Ny). 2017;377:17–29.
21. Masetic Z, Subasi A. Congestive heart failure detection using random forest classifier. Comput Methods Programs Biomed.
2016;130:54–64.
22. Weng SF, Reps J, Kai J, Garibaldi JM, Qureshi N. Can machine-learning improve cardiovascular risk prediction using routine clinical
data? Liu B, editor. PLoS One. 2017;12:e0174944.
23. Lafta R, Zhang J, Tao X, Li Y, Abbas W, Luo Y, et al. A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model
for Disease Risk Prediction Using a Real-Life Dataset. In: Kim J, Shim K, Cao L, Lee J, Lin X, Moon Y, editors. Advances in
Knowledge Discovery and Data Mining PAKDD 2017 Lecture Notes in Computer Science. Springer, Cham; 2017. p. 654 –70.
24. Frizzell JD, Liang L, Schulte PJ, Yancy CW, Heidenreich PA, Hernandez AF, et al. Prediction of 30-Day All-Cause Readmissions in
Patients Hospitalized for Heart Failure. JAMA Cardiol. 2017;2:204.
25. Dawes TJW, de Marvao A, Shi W, Fletcher T, Watson GMJ, Wharton J, et al. Machine Learning of Three-dimensional Right
Ventricular Motion Enables Outcome Prediction in Pulmonary Hypertension: A Cardiac MR Imaging Study. Radiology.
2017;283:381–90.
26. Aljaaf AJ, Al-Jumeily D, Hussain AJ, Dawson T, Fergus P, Al-Jumaily M. Predicting the likelihood of heart failure with a multi level
risk assessment using decision tree. In: 2015 Third International Conference on Technological Advances in Electrical, Electronics and
Computer Engineering (TAEECE). IEEE; 2015. p. 101–6.
27. Zheng Y, Guo X, Qin J, Xiao S. Computer-assisted diagnosis for chronic heart failure by the analysis of their cardiac reserve and heart
sound characteristics. Comput Methods Programs Biomed. 2015;122:372–83.
28. Le-Dong N-N, Hua-Huy T, Ngoc HMN, Martinot J-B, Xuan A-TD. Detection of Interstitial Lung Disease in Systemic Sclerosis Using
a Machine Learning Approach Based on Pulmonary Function Tests. Am J Respir Crit Care Med. 2017;195:A2531.
29. Spathis D, Vlamos P. Diagnosing asthma and chronic obstructive pulmonary disease with machine learning. Health Informatics J.
2017;
30. Yip TC-F, Ma AJ, Wong VW-S, Tse Y-K, Chan HL-Y, Yuen P-C, et al. Laboratory parameter-based machine learning model for
excluding non-alcoholic fatty liver disease (NAFLD) in the general population. Aliment Pharmacol Ther. 2017;46:447–56.
31. Hashem S, Esmat G, Elakel W, Habashy S, Abdel Raouf S, Elhefnawi M, et al. Comparison of Machine Learning Approaches for
Prediction of Advanced Liver Fibrosis in Chronic Hepatitis C Patients. IEEE/ACM Trans Comput Biol Bioinforma. 2017;1–1.
32. Saritha B, Manaswini N, Hiranmayi D, Ramana SV, Priyanka R, Eswaran K. Classification of Liver Data using a New Algorithm. In t J
Eng Technol Sci Res. 2017;4:330–4.
33. Chen Y, Luo Y, Huang W, Hu D, Zheng R, Cong S, et al. Machine-learning-based classification of real-time tissue elastography for
hepatic fibrosis in patients with chronic hepatitis B. Comput Biol Med. 2017;89:18–23.
34. Guadagni F, Zanzotto FM, Scarpato N, Rullo A, Riondino S, Ferroni P, et al. RISK: A Random Optimization Interactive System Based
on Kernel Learning for Predicting Breast Cancer Disease Progression. In: Rojas I, Ortuño F, editors. Bioinformatics and Biome dical
Engineering IWBBIO 2017 Lecture Notes in Computer Science. Springer, Cham; 2017. p. 189–96.
35. Murty NVR, Babu PMSP. A Critical Study of Classification Algorithms for LungCancer Disease Detection and Diagnosis. nternatio nal
J Comput Intell Res. 2017;13:1041–8.
36. López B, Torrent-Fontbona F, Viñas R, Fernández-Real JM. Single Nucleotide Polymorphism relevance learning with Random Forests
for Type 2 diabetes risk prediction. Artif Intell Med. 2017;
37. Alghamdi M, Al-Mallah M, Keteyian S, Brawner C, Ehrman J, Sakr S. Predicting diabetes mellitus using SMOTE and ensemble
machine learning approach: The Henry Ford ExercIse Testing (FIT) project. Liu B, editor. PLoS One. 2017;12:e0179805.
38. Pouriyeh S, Vahid S, Sannino G, De Pietro G, Arabnia H, Gutierrez J. A comprehensive investigation and comparison of Machine
Learning Techniques in the domain of heart disease. In: 2017 IEEE Symposium on Computers and Communications (ISCC). Greece:
IEEE; 2017. p. 204–7.
39. Acharya A. Comparative Study of Machine Learning Algorithms for Heart Disease Prediction. Helsinki Metropolia University of
Applied Sciences; 2017.
40. Papini GB, Fonseca P, Aubert XL, Overeem S, Bergmans JWM, Vullings R. Photoplethysmography beat detection and pulse
morphology quality assessment for signal reliability estimation. In: 2017 39th Annual International Conference of the IEEE
Engineering in Medicine and Biology Society (EMBC). IEEE; 2017. p. 117–20.
41. Finkelstein J, Jeong I cheol. Machine learning approaches to personalize early prediction of asthma exacerbations. Ann N Y Ac ad Sci.
2017;1387:153–65.
42. Wiemken TL, Furmanek SP, Mattingly WA, Guinn BE, Cavallazzi R, Fernandez-Botran R, et al. Predicting 30-day mortality in
hospitalized patients with community-acquired pneumonia using statistical and machine learning approaches. J Respir Infect.
2017;1:50–56.
43. Saleh L, Mcheick H, Ajami H, Mili H, Dargham J. Comparison of Machine Learning Algorithms to Increase Prediction Accuracy of
COPD Domain. In: Mokhtari M, Abdulrazak B, Aloulou H, editors. Enhanced Quality of Life and Smart Living ICOST 2017 Lecture
Notes in Computer Science. Switzerland: Springer, Cham; 2017. p. 247–54.
44. Pouriyeh S, Vahid S, Sannino G, De Pietro G, Arabnia H, Gutierrez J. A comprehensive investigation and comparison of Machine
Learning Techniques in the domain of heart disease. In: 2017 IEEE Symposium on Computers and Communications (ISCC) [Internet].
IEEE; 2017. p. 204–7. Available from: http://ieeexplore.ieee.org/document/8024530/
45. Masih N, Ahuja S. Prediction of Heart Diseases Using Data Mining Techniques. Int J Big Data Anal Healthc [Internet]. 2018;3:1–9.
Available from: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJBDAH.2018070101
46. Haq AU, Li JP, Memon MH, Nazir S, Sun R. A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using
Machine Learning Algorithms. Mob Inf Syst [Internet]. 2018;2018:1–21. Available from:
https://www.hindawi.com/journals/misy/2018/3860146/
47. Nashif S, Raihan MR, Islam MR, Imam MH. Heart Disease Detection by Using Machine Learning Algorithms and a Real-Time
Cardiovascular Health Monitoring System. World J Eng Technol [Internet]. 2018;06:854–73. Available from:
http://www.scirp.org/journal/doi.aspx?DOI=10.4236/wjet.2018.64057
48. Kumar Sen S. Predicting and Diagnosing of Heart Disease Using Machine Learning Algorithms [Internet]. International Journal Of
Engineering And Computer Science. 2017. Available from:
https://www.researchgate.net/publication/317486673_Predicting_and_Diagnosing_of_Heart_Disease_Using_Machine_Learning_Algo
rithms
49. Nikhar S, Karandikar AM. Prediction of Heart Disease Using Machine Learning Algorithms. Int J Adv Eng Manag Sci [Internet].
2016;2:617–21. Available from: https://media.neliti.com/media/publications/239484-prediction-of-heart-disease-using-machin-
4b2e96d4.pdf
50. Singh J, Kamra A, Singh H. Prediction of heart diseases using associative classification. In: 2016 5th International Conference on
Wireless Networks and Embedded Systems (WECON) [Internet]. IEEE; 2016. p. 1–7. Available from:
http://ieeexplore.ieee.org/document/7993480/
51. Patel J, Tejalupadhyay S, Patel S. Heart Disease prediction using Machine learning and Data Mining Technique [Internet]. 2016. 129 –
137 p. Available from:
https://www.researchgate.net/publication/309210947_Heart_Disease_prediction_using_Machine_learning_and_Data_Mining_Techniq
ue
52. Nnamoko N, Hussain A, England D. Predicting Diabetes Onset: An Ensemble Supervised Learning Approach. In: 2018 IEEE Congress
on Evolutionary Computation (CEC) [Internet]. IEEE; 2018. p. 1–7. Available from: https://ieeexplore.ieee.org/document/8477663/
53. Kaur H, Kumari V. Predictive modelling and analytics for diabetes using a machine learning approach [Internet]. Applied Compu ting
and Informatics. 2018 [cited 2019 Mar 6]. Available from: https://linkinghub.elsevier.com/retrieve/pii/S221083271830365X
54. Rahman T, Farzana SM, Khanom AZ. Prediction of Diabetes Induced Complications Using Different Machine Learning Algorithms
[Internet]. BRAC University; 2018. Available from:
http://dspace.bracu.ac.bd/xmlui/bitstream/handle/10361/10945/15101128_CSE.pdf?sequence=1&isAllowed=y
55. Joshi TN, Chawan PM. Logistic Regression And Svm Based Diabetes Prediction System. Int J Technol Res Eng [Internet].
2018;5:4347–50. Available from:
https://www.researchgate.net/publication/326416823_LOGISTIC_REGRESSION_AND_SVM_BASED_DIABETES_PREDICTION_
SYSTEM
56. Santhanam T, Padmavathi MS. Application of K-Means and Genetic Algorithms for Dimension Reduction by Integrating SVM for
Diabetes Diagnosis. Procedia Comput Sci [Internet]. 2015;47:76–83. Available from:
https://linkinghub.elsevier.com/retrieve/pii/S1877050915004536
57. Morton A, Marzban E, Giannoulis G, Patel A, Aparasu R, Kakadiaris IA. A Comparison of Supervised Machine Learning Techniques
for Predicting Short-Term In-Hospital Length of Stay among Diabetic Patients. In: 2014 13th International Conference on Machine
Learning and Applications [Internet]. IEEE; 2014. p. 428–31. Available from: http://ieeexplore.ieee.org/document/7033154/
58. Radha P, Srinivasan B. Predicting Diabetes by cosequencing the various Data Mining Classification Techniques. Int J Innov Sci Eng
Technol [Internet]. 2014;1:334–9. Available from: http://ijiset.com/v1s6/IJISET_V1_I6_55.pdf
59. Sudharsan B, Peeples M, Shomali M. Hypoglycemia Prediction Using Machine Learning Models for Patients With Type 2 Diabetes. J
Diabetes Sci Technol [Internet]. 2015;9:86–90. Available from: http://journals.sagepub.com/doi/10.1177/1932296814554260
60. Kumar V, Velide L. A Data Mining Approach For Prediction And Treatment Ofdiabetes Disease. Int J Sci Invent Today. 2014;3:73–9.
61. Singh A. Diabetes Disease Prediction System Using C4.5 and FCM algorithm. Int J Contemp Technol Manag [Internet]. 2018;7:1 –7.
Available from: http://www.ijctm.in/Admin/upload/ijctm-07-09-1201865.pdf
62. Bryanton M, Pathak R, Russa D La, Holmes O, Gotfrit R, Cook G, et al. Predicting lung cancer recurrence in patients within two years
of curative radiotherapy via a trained machine learning algorithm. J Nucl Med. 2017;58:113.
63. Bychkov D, Turkki R, Haglund C, Linder N, Lundin J. Abstract 5718: Outcome prediction in colorectal cancer using digitized tu mor
samples and machine learning. Cancer Res. 2017;77:5718–5718.
64. Sharma A, Karthik GS, Mittal N, Sindhu VL, Pradeep KR. A Survey o n Predictive Analysis of Cancer Survivability Rate Using
Machine Learning Algorithm. 2017;271–8.
65. Xiao L-H, Chen P-R, Gou Z-P, Li Y-Z, Li M, Xiang L-C, et al. Prostate cancer prediction using the random forest algorithm that takes
into account transrectal ultrasound findings, age, and serum levels of prostate-specific antigen. Asian J Androl. 2017;19:586.
66. Alehegn M, Joshi R. Analysis and prediction of diabetes diseases using machine learning algorithm : Ensemble approach. Int Re s J Eng
Technol. 2017;4:426–36.
67. Masih N, Ahuja S. Prediction of Heart Diseases Using Data Mining Techniques: Application on Framingham Heart Study. Int J Big
Data Anal Healthc. 2018;3:1–9.
68. Chen M, Hao Y, Hwang K, Wang L, Wang L. Disease Prediction by Machine Learning Over Big Data From Healthcare Communities.
IEEE Access [Internet]. 2017;5:8869–79. Available from: http://ieeexplore.ieee.org/document/7912315/
69. Shi F, Zhang Q, Chen J, Karimi HR. Macroscopic Expressions of Molecular Adiabatic Compressibility of Methyl and Ethyl Caprate
under High Pressure and High Temperature. Abstr Appl Anal. 2014;2014:1–10.
70. Raja M, Ali MS. An analysis of consumer perception towards retail brands in Big Bazaar Chennai. Indian J Appl Res. 2014;4:1 –3.
71. PM Kumar PM, Gandhi UD A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of
heart diseases. Computers & Electrical Engineering. 2018; 65: 222-235
72. Gokulnath V, Usha Devi G. A Review on Classification Algorithms of Medical Diagnostics Research Journal of Ph armaceutical,
Biological and Chemical Sciences. 2017; 2656-2660
73. Usha Moorthy, Usha Devi Gandhi. A Survey of Big Data Analytics Using Machine Learning Algorithms, IGI Global. 2018; 95 -123
74. V Vijayakumar, MK Priyan, G Ushadevi, R Varatharajan, Gunasekaran Manogaran, Prathamesh Vijay Tarare. E-health cloud security
using timing enabled proxy re-encryption, Mobile Networks and Applications, 2019; 3: 1034-1045.
621. Keyword : Nano silica, Polyethylene glycol, Fresh properties, Hardened properties.
References: 3527-
1. Hongjian Du, “Properties of ultra lightweight cement composites with nano silica, Construction and building materials 199(201 9). 3530
2. Mehmeth eren gulsan, “Development of fly ash /slag based self compacting geopolymer concrete using nano silica and steel fiber”,
Construction and building materials 211(2019).
3. Doha M. Al Saffer,”Effect of internal curing on behavior of high performance concrete: An Overview”, Case study in construction
materials (2108).
4. Seyed Alireza Zareei,”Performance of sustainable high strength concrete with basic oxygen steel making slag and nano silica”, Journal
of building engineering (2019).
5. Abdulkadir cuneyt aydin,”The synergic influence of nano silica and carbon nano tube on self compacting concrete”, Journal of building
engineering(2018).
6. Oveys Afzali Naniz,”Effect of colloidal nano silica on fresh and hardened properties of self compacting lightweight concrete” , Journal
of building engineering(2018).
7. Magda I.Mousa,”Self curing concrete types water retention and durability”, Alexandra engineering journal(2015).
8. Nadine Hani, “The effect of different water/binder ratio and nano silica dosage on fresh and hardened properties of self comp acting
concrete”, Construction and building materials 165(2018)
9. A. Karthik, “Investigation on mechanical properties of fly ash ground granulated blast furnace slag based self curing bio geo polymer
concrete”, Construction and building materials 149(2017).
Authors: Arvind K. Sharma, Avinash Sharma, Sagar Kumar, Divya Jain, Sumit Mittal
Paper Title: WSN Clustering Based on EECI (Energy Efficient Clustering using Interconnection) Method
Abstract: in WSN, clustering gives an effective way to enhance the network lifetime. Moreover It has
been observed that the clustering algorithm utilizes the two main technique first is selection of cluster head and
cycling it periodically in order to distribute the energy among the clusters and this in terms increases the
lifetime of network. Another challenge comes with this is minimize the energy consumption. In past several
algorithm has been proposed to increase the lifetime of the network and energy consumption, however these
methodologies lacks from efficiency. In this paper, we have proposed a methodologies named as EE-CI (Energy
Efficient Clustering using Interconnection), along with the random updation. Here the networks are parted into
different clusters, the cluster updation are done based on the CHC scheme. Moreover, in proposed methodology
cluster updation and data sample is determined through the change in sensor data. Here we propose a method for
sampling sensor and CHC for selecting the cluster head to balance the energy and improvise the energy
efficiency. Moreover, the proposed methodology is evaluated and the result is demonstrated by considering the
Leach as existing methodology, experiments results shows that the proposed methodology outperforms the
existing methodology.
5. G.S. Prihandana, M. Hamdi, Y.S. Wong, K. Mitsui, Effect of vibrated electrode in electrical discharge machining, in:Proc. First Int.
Conf. Seventh AUN/SEED-Net Fieldwise Semin. Manuf. Mater. Process., Kuala Lumpur, 2006: pp.133–138.
6. 6. Gangadharudu Talla,National Institute of Technology Rourkela, Powder-mixed Electric Discharge Machining (PMEDM) of
Inconel 625.
7. J.H. Zhang, T.C. Lee, W.S. Lau, X. Ai, Spark erosion with ultrasonic frequency, J. Mater. Process. Technol. 68 (1997)
8. J.S.oshi, G. Chakraverti, Performance Evaluation of Rotary EDM by Experimental design Technique, Def. Sci. J. 47 (2013) 65–73.
9. K. Egashira, T. Masuzawa, Microultrasonic Machining by the Application of Workpiece Vibration, CIRP Ann. - Manuf. Technol. 48
(1999) 131–134.
10. K.P. Rajurkar, Z. Yu, 3D micro-EDM using CAD/CAM, CIRP Ann. - Manuf. Technol. 49 (2000) 127–130.
Authors: Komal Kundan Sharma, Jyoti Raghatwan, Mrunalinee Patole, Vina M. Lomte
Paper Title: “Voting System Using Multichain Blockchain and Fingerprint Verification”
Abstract: Nowadays, crypto currency has become a trending theme within the software package globe.
Crypto currency may be a digital quality that’s meant to operate as a dealings medium that utilizes sturdy
cryptography to secure asset exchange and make sure plus transfer. Crypto currency is in addition spoken as
digital suburbanised cash. Block chain stores knowledge concerning dealings which will be accustomed assess
transaction trait. This voting system deals with multi chain block chain technology. We can define block chain
as a digital transaction which is used to record financial transactions also as totally different transactions. As a
result of the knowledge keep within the block chain isn’t related to personal identifiable information, it’s such a
fanonymity attribute. Blockchain allows dealings and verification to be clear. The options of this block chain
technology are useful in powerful voting system,robustness, obscurity and transparency. The electoral system is
our country’s core. Veri- fication of fingerprints employed in this theme to authenticate identity of electors.
Keyword : Block chain, Multi chain Block Chain, Voting, Crypto Currency, Fingerprint Verification.
References:
1. Nir Kshetri, Jeffrey Voas “Blockchain-Enabled E-Voting”, 07407459/18/33.00 2018 IEEE
2. Ali Kaan Koc, Emre Yavuz, Umut Can Cabuk, Gokhan Dalkoloc “Towards Secure E-Voting Using Ethereum Blockchain”, 978-1-
5386-34493/18/31.00 2018 IEEE.
3. C.D. Clack, V.A. Bakshi, and L. Braine, “Smart contract templates: foundations, design landscape and research directions”, Mar
2017, arXiv:1608.00771.
4. F. Hao and P.Y.A. Ryan, “Real-World Electronic Voting: Design, Analysis and Deployment”, CRC Press, pp. 143-170, 2017.
5. P. McCorry, S.F. Shahandashti, and F. Hao, “A smart contract for boardroom voting with maximum voter privacy”, International
Conference on Financial Cryptography and Data Security.”Springer, Cham, pp. 357-375, 2017.
6. U.C. abuk, A. avdar, and E. Demir, “E-Democracy-The-Next-GenerationDirectDemocracy-and-Applicability-in-Turkey.”pdf.(Nov
632. 2016)
7. G. Wood, “Ethereum: a secure decentralised generalised transaction ledger”, Ethereum Project Yellow Paper, vol. 151, pp. 1 -32, 3588-
2014. 3597
8. Estonian National Electoral Committee “E-voting System”, 2010. [Online]. Available: https://www.valimised.ee/sites/default/files/
uploads/eng/General Description E-Voting 2010.pdf.
9. E. Maaten, “Towards remote e-voting: Estonian case”, Electronic Voting in Europe-Technology, Law, Politics and Society, vol. 47,
pp. 83-100, 2004
10. S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system”, [Online]. Available: https://bitcoin.org/bitcoin.pdf.
11. M. Hochstein, “Moscows Blockchain Voting Platform Adds Service for High-Rise Neighbors”, CoinDesk, 15 Mar. 2018;
https://www.coindesk .com/moscows-blockchain-voting -platform-adds-service-for-high-rise neighbors.
12. S. Horwitz, “Getting a Photo ID So You Can Vote Is Easy. Unless Youre Poor, Black, Latino or Elderly”, Washington Post, 23 May
2016;https://www.washingtonpost.com /politics/courts law/gettinga-photo -id-so-you-can-vote-is-easy-unless -youre-poor-black-
latino-orelderly /2016/05/23/8d5474ec-20f0 -11e6-8690-f14ca9de2972 story .html noredirect5onutm term 5.233edc07152e.
13. “Not-So-Clever Contracts”, Economist, 28 July 2016; https://www .economist.com/news/business /21702758-time-being-least-
human -judgment-still-better-bet-cold -hearted.
14. [14] “Security Criteria for Electronic Voting” Peter G. Neumann, Computer Science Laboratory, SRI International, Menlo Park CA
940251-650-8592375 Neumann@csl.sri.com [15] “Blockchain: Foundational Technology to Change the World” Evgenii Khudnev
Bachelors Thesis, School of Business and Culture, Degree Programme in Business Information Technology Bachelor of Business
Administration
15. “Securing E-Voting System using Blockchain”, Komal K. Sharma, Prof. Mrunalinee Patole,
http://ijircce.com/upload/2018/november/9Securing.pdf
16. “Securing Voting System Using Blockchain and Fingerprint Verication”, Komal Kundan Sharma, Prof. Mrunalinee Patole, Prof.
Vina M. Lomte, International Research Journal of Engineering and Technology(IRJET) Volume6,Issue6,June2019S.NO:517,
https://www.irjet.net/archives/V6/i6/IRJET-V6I6517.pdf
17. https://www.bbc.com/news/world-asia-india-46987319
18. https://www.ndtv.com/india-news/lok-sabha-election-2019-april-11phase-1-bjp-muzaffarnagar-candidate-sanjeev-balyan-wants-
faces-in-b2021280
19. https://www.ndtv.com/india-news/general-election-2019-congressleader-jitin-prasada-sister-finds-out-her-vote-is-already-cast-
2030232
20. https://www.ndtv.com/video/player/news/congress-flags-60-lakh-fakevoters-in-madhya-pradesh-probe-ordered/486378
21. https://caravanmagazine.in/vantage/why-india-needs-to-change-itselectoral-voting-system
Keyword : privacy preserving data mining, decision rule mining, implementation of data mining technique,
performance evaluation.
References:
1. E. Toch, B. Lerner, E. B. Zion, I. B. Gal, “Analyzing large-scale human mobility data: a survey of machine learning methods and
applications”, Knowl Inf Syst, https://doi.org/10.1007/s10115-018-1186-x
2. I. Kavakiotis, O. Tsave, A. Salifoglou, N. Maglaveras, I. Vlahavas, I. Chouvarda, “Machine Learning and Data Mining Methods in
Diabetes Research”, Computational and Structural Biotechnology Journal 15 (2017) 104–116
3. J. Qiu, Q. Wu, G. Ding, Y. Xu and S. Feng, “A survey of machine learning for big data processing”, EURASIP Journal on Advances
in Signal Processing (2016) 2016:67, DOI 10.1186/s13634-016-0355-x
4. C. W. Lin, T. P. Hong, H. C. Hsu, “Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining”, Hindawi
Publishing Corporation Scientific World Journal Volume 2014, Article ID 235837, 12 pages
5. P. S. Rao, S. Satyanarayana, “Privacy preserving data publishing based on sensitivity in context of Big Data using Hive”, J Big Data
(2018) 5:20, https://doi.org/10.1186/s40537-018-0130-y
6. O. Tene, J. Polonetsky, “Big Data for All: Privacy and User Control in the Age of Analytics”, 11 Nw. J. Tech. & Intell. Prop., 239
(2013).
7. R. Mendes, J. P. Vilela, “Privacy-Preserving Data Mining: Methods, Metrics, and Applications”, Vol. 5, 2017, IEEE
8. Y. A. A. S. Aldeen, M. Salleh, M. A. Razzaque, “A comprehensive review on privacy preserving data mining”, SpringerPlus (2015)
4:694, DOI 10.1186/s40064-015-1481-x
9. K. Xu, H. Yue, L. Guo, Y. Guo, Y. Fang, “Privacy-preserving Machine Learning Algorithms for Big Data Systems”, 2015 IEEE 35th
International Conference on Distributed Computing Systems, 1063-6927/15© 2015 European Union DOI 10.1109/ICDCS.2015.40
10. I. San, N. At, I. Yakut, H. Polat, “Efficient paillier cryptoprocessor for privacy-preserving data mining”, Security and Communication
Networks 2016; 9:1535–1546, Wiley Online Library, DOI: 10.1002/sec.1442
11. Z. Gheid, Y. Challal, “Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining”, IEEE TristCom, Aug 2016,
Tianjin, China pp.791 - 798, ff10.1109/TrustCom.2016.0140ff ffhal-01466904f
12. R. Lu, K. Heung, A. H. Lashkari, A. A. Ghorbani, “A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-
Enhanced IoT”, Special Section on Security and Privacy in Applications and Services for Future Internet of Things, Vol. 5, 2017,
IEEE
13. Y. Kokkinos, K. G. Margaritis, “Confidence ratio Affinity Propagation in ensemble selection of neural network classifiers for
distributed privacy-preserving data mining”, Neurocomputing, (2015), vol. 150, pp. 513−528
14. S. Sharma, K. Chen, A. Sheth, “Towards Practical Privacy-Preserving Analytics for IoT and Cloud Based Healthcare Systems”, IEEE
Internet Computing, March-April 2018
15. Y. Li, C. Bai, C. K. Reddy, “A Distributed Ensemble Approach for Mining Healthcare Data under Privacy Constraints”, Inf Sci (Ny).
2016 February 10; 330: 245–259. doi:10.1016/j.ins.2015.10.011
16. H. Hammami, H. Brahmi, I. Brahmi, S. B. Yahia, “Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a
Cloud Computing Environment”, EMCIS 2017, LNBIP 299, pp. 397–413, DOI: 10.1007/978-3-319-65930-5_32, Springer
International
17. K. Birman, M. Jelasity, R. Kleinberg, E. Tremel, “Building a Secure and Privacy-Preserving Smart Grid”, ACM SIGOPS OSR 49(1)
pp131–136, http://dx.doi.org/10.1145/ 2723872.2723891.
18. N. Domadiya, U. P. Rao, “Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the
heart diseases”, Sådhanå (2018) 43:127 Indian Academy of Sciences, https://doi.org/10.1007/s12046-018-0916-9
19. W. Gan, J. C. W. Lin, H. C. Chao, S. L. Wang, P. S. Yu, “Privacy Preserving Utility Mining: A Survey”, arXiv:1811.07389v1 [cs.DB]
18 Nov 2018
20. J. C. W. Lin, W. Gan, P. F. Viger, L. Yang, Q. Liu, J. Frnda, L. Sevcik, M. Voznak, “High utility-itemset mining and privacy-
preserving utility mining”, Perspectives in Science (2016) 7, 74—80
21. G. Kalyani, M. V. P. Chandra Sekhara Rao and B. Janakiramaiah, “Privacy-Preserving Association Rule Mining Using Binary TLBO
for Data Sharing in Retail Business Collaboration”, Advances in Intelligent Systems and Computing 515, © Springer Nature
Singapore Pte Ltd. 2017
22. B. Abidi, S. B. Yahia, C. Perera, “Hybrid Microaggregation for Privacy-Preserving Data Mining”, arXiv:1812.01790v1 [cs.CR] 4 Dec
2018
23. C. Y. Lin, Y. H. Kao, W. B. Lee and R. C. Chen, “An efficient reversible privacy‑preserving data mining technology over data
streams”, SpringerPlus (2016) 5:1407, DOI 10.1186/s40064-016-3095-3
24. T. Pawar, Prof. S. Kamalapur, “A Survey on Privacy Preserving Decision Tree Classifier”, International Journal of Engineering
Research and Applications, Vol. 2, Issue 6, November- December 2012, pp.843-847
25. I. Ray, T. C. Ong, I. Ray, M. G. Kahn, “Applying Attribute Based Access Control for Privacy Preserving Health Data Disclosure”,
978-1-5090-2455-1/16/$31.00 ©2016 IEEE
26. L. Urquhart, N. Sailaja, D. McAuley, “Realising the right to data portability for the domestic Internet of things”, Pers Ubiquit Comput
(2018) 22:317–332, DOI 10.1007/s00779-017-1069-2
27. “Laboratory Module 8: Mining Frequent Itemsets – Apriori Algorithm”, available online at:
http://software.ucv.ro/~cmihaescu/ro/teaching/AIR/docs/Lab8-Apriori.pdf
28. K. K. Mishra, R. Kaul, “Audit Trail Based on Process Mining and Log”, International Journal of Recent Development in Engineering
and Technology, Volume 1, Issue 1, Oct 2013
Paper Title: Interpretation of CBR Test Consequences for Subgrade Soil Preserved Through Geo-Grid
Abstract: The California Bearing Ratio (CBR) is a parameter for evaluation of the mechanical strength of
sub grade, base course and other layers of a new carriage way. It depends on various factors and nature of soil.
The service life of pavement on weaker soil sub grade is quite low due to the high compressibility and plasticity
behavior of soils. Some soils possess less strength, CBR value and have high affinity to moisture content. Hence
it is important to increase the strength of soil for sustainable performance of Indian roads. To increase the sub
grade soil strength, geogrids are used in roads. Geogrids are cost effective polymeric materials used as soil
reinforcement. It helps to increase the stability and bearing capacity of soil, enables good drainage and involves
less maintenance. Increase in CBR value of the sample with use of geogrids leads to reduction in the thickness of
pavement.
Two soil samples are collected from the nearby construction sites. Basic tests are to be conducted on the samples
to determine its engineering and index properties followed by CBR test under optimum moisture content. This
paper deals with the experimental results of CBR tests on different types of sub grade soil by increasing the
number of geogrid layers in each trial. This gives the optimum number of geogrid layer to attain the maximum
CBR value. This paper also includes the application of CBR value in the design of flexible pavements as per
IRC recommendations.
Keyword : Decay Rate, Hyper-parameter tuning, Learning Rates, Neural Network, Scheduling Policy.
639. References:
1. Schmidhuber, Jürgen. "Deep learning in neural networks: An overview." Neural networks 61 (2015): 85-117. 3641-
2. Leung, Henry, and Simon Haykin. "The complex backpropagation algorithm." IEEE Transactions on signal processing 39.9 (1991): 3644
2101-2104.
3. Domhan, Tobias, Jost Tobias Springenberg, and Frank Hutter. "Speeding up automatic hyperparameter optimization of deep neural
networks by extrapolation of learning curves." Twenty-Fourth International Joint Conference on Artificial Intelligence. 2015.
4. Ruder, Sebastian. "An overview of gradient descent optimization algorithms." arXiv preprint arXiv:1609.04747 (2016).
5. Darken, Christian, Joseph Chang, and John Moody. "Learning rate schedules for faster stochastic gradient search." Neural Networks for
Signal Processing II Proceedings of the 1992 IEEE Workshop. IEEE, 1992.
6. Huang, Guang-Bin, Lei Chen, and Chee Kheong Siew. "Universal approximation using incremental constructive feedforward networks
with random hidden nodes." IEEE Trans. Neural Networks 17.4 (2006): 879-892.
7. Krizhevsky, Alex, Ilya Sutskever, and Geoffrey E. Hinton. "Imagenet classification with deep convolutional neural
networks." Advances in neural information processing systems. 2012.
8. Simonyan, Karen, and Andrew Zisserman. "Very deep convolutional networks for large-scale image recognition." arXiv preprint
arXiv:1409.1556 (2014).
9. Szegedy, Christian, et al. "Going deeper with convolutions." Proceedings of the IEEE conference on computer vision and pattern
recognition. 2015.
10. Hochreiter, Sepp, et al. "Gradient flow in recurrent nets: the difficulty of learning long-term dependencies." (2001).
11. Glorot, Xavier, and Yoshua Bengio. "Understanding the difficulty of training deep feedforward neural networks." Proceedings of the
thirteenth international conference on artificial intelligence and statistics. 2010.
12. Bjorck, Nils, et al. "Understanding batch normalization." Advances in Neural Information Processing Systems. 2018.
13. He, Kaiming, et al. "Deep residual learning for image recognition." Proceedings of the IEEE conference on computer vision and
pattern recognition. 2016.
14. Khalid, El Asnaoui, et al. "An efficient Descriptor for Image Retrieval: Application to COIL-100 Database."
15. Fei-Fei, Li, Rob Fergus, and Pietro Perona. "One-shot learning of object categories." IEEE transactions on pattern analysis and
machine intelligence 28.4 (2006): 594-611.
16. Krizhevsky, Alex, and Geoff Hinton. "Convolutional deep belief networks on cifar-10." Unpublished manuscript 40.7 (2010): 1-9.
Keyword : irrigation system, irrigated agriculture, collective farming, traditional economic relations.
References:
1. A.P.Demidov, Economic essays on cotton growing, cotton trade and industry of Turkestan. Vol. 2. - M., 1926 . p. 11.
2. Modern village of Central Asia. Vol. II. Khorezm. Hankinsky volost. - Tashkent, 1926 ;. Modern village of Central Asia (socio-
economic essay). Vol. III 3. Kitab volost. (Kashkadarya region of the Uzbek SSR). Ed. B.B.Kart and I.E.Suslova. - Tashkent, 1926. -
p.237.
3. M.S. Andreev, Some results of an ethnographic expedition in the Samarkand region in 1921. - Tashkent., 1922. - pp. 22-37.
4. Zarubin I.I. The population of Samarkand region. (Size, ethnographic composition and territorial distribution with ethnograph ic map). -
L., 1926 . pp. 8-25.
5. A.Kh. Doniyorov, Some Scenes from the History of Ethnography of Uzbekistan (20-80s of the 20th century). – Tashkent: Yangi asr
avlodi, 2003.
6. S.P. Tolstov, The results of twenty years of work of the Khorezm archaeological and ethnographic expedition. (1937-1956 // SE. 1957.
No. 4. pp 31-59 ; Ethnography // Science in Uzbekistan. - Tashkent, 1974. 194 p.
7. Materials on zoning of Central Asia. Prince I. Territory and population of Bukhara and Khorezm. Part I. - Bukhara. H / II / Khorezm. -
Tashkent, 1926 ;. Materials of the All-Union Census of 1926 in the Uzbek SSR. Vol. I. Settled results. - Samarkand, 1927. Materials on
the regionalization of the Turkestan region ...
8. Orography is a section of physical geography that examines the terrain, its structure, and its surface.
9. I. Shastal Orography and irrigation of Khorezm // Materials on zoning ... Prince. II /, Part II.– Khorezm. 3-19 p.)
10. Materials on zoning of Uzbekistan Issue I. Brief description of the projected districts and regions. - Samarkand, TsKR Uz Publishing
House, 1926.)
11. D. Basov, Baikals of the Shirabad Valley // For the reconstruction of agriculture - Samarkand, 1929. No. 2; S.K. Kondrashev, Water
use of the Shirabad and Surkhan valley of the Bukhara Khanate / Materials of work of the hydromodular part of the land improvement
department. - M., 1918. Issue. fourteen; V.A. Polozov Uzbek community land use in the Sherabad valley and Karshi steppe Uz SSR //
National economy of Central Asia. No. 7.– T .; 1925. S.69-75.)
12. A.R. Kayumov, Ethnic situation in southern Uzbekistan in the 19th - early 20th centuries (based on Surkhan-Sherabad valley
materials). Abstract of diss. sciences. - Tashkent, 2011.– p.23.
13. Work and life on collective farms. From the experience of studying collective farms // Collective farms of the Soviet East. Digest of
articles. - L., 1931.
14. A.Novikov, Cotton growing and cotton industry // All Central Asia. Reference book for 1926. pp. 153-163.
15. V.I. Yuferev, Cotton growing in Turkestan. Leningrad, - 1925; The same author. IN AND. Essays on the economics of cotton farming.
- Moscow: Promizdat. - 1927.
16. N.I.Vavilov, Cultivated plants of the Khiva oasis. Botanical and agronomical essays // Transactions. In Applied Botany and Se lection. -
L., 1929.T. XX.
17. S.K. Kondrashev, Water in an irrigated farm. - Moscow: New Village, 1922 .; The same author. Irrigated Khorezm. Organization of
irrigation, territory and labor in dekhkan farms in the lower reaches of the river. Amu Darya. - Moscow, 1931.
18. K.L.Pokrovsky, Water Law Development in Central Asia // Bulletin of Irrigation. No. 1. 1927.
19. B.N.Kastalsky, Historical and geographical overview of the Surkhan-Shirabad valley // Bulletin of irrigation. No. 1, 4. - Toshkent,
1930.
20. V.V.Tsinserling, Irrigation in the Amu Darya basin. - M .: 1924., Irrigation in the Amu Darya. - M., 1927.
21. V.V. Bartold, V.V. Tsinserling, Irrigation by Amu-Darya // Proceedings of the Central Asian Committee (for museums and the
protection of ancient monuments of art and nature). Vol. III. - Tashkent, 1928. – p.251
22. S.P.Trombachev, Foundations for the calculation of irrigation systems. - Tashkent, 1919. - 69 p .; The same author. Irrigation and
drainage. - Tashkent: Uzgiz, 1925. - 204 p. ; G.K.Rezinkampf, Irrigation problems of Turkestan. - Moscow: State Publishing House,
1921 .-- 148 p .; The same author. To the new project of irrigation of the Hungry Steppe. Part 1. –Leningrad: Glavupprvodkhoz of
Central Asia, 1930. - 200 p .; I.G.Alexandrov, Irrigation Project of Southeast Ferghana. –Moscow: TPP, 1923. - 234 p .; The same
author. Irrigation of new land in the Tashkent region. - Moscow: TPP. 1923.– 56 s .; G.I.Vinogradov, Irrigation in the valley of
Kashkadarya. - Tashkent: SANIIRI, 1935. 100 p.
23. T.D. Solovey, The evolution of understanding of the subject of ethnography in Soviet ethnographic literature. 1917-1932 // Bulletin of
Moscow University. - 1990.-№5. - 50-60 p.
24. A.Kh.Doniyorov, Ethnographic research in Uzbekistan in the twentieth century: the main stages, problems, development prospects.
Manuscript of the dissertation for the degree of Doctor of Historical Sciences. - Tashkent, 2003.
25. Socialist agriculture of Uzbekistan. - Tashkent: Uzpolygraphkombinat, 1938.
Authors: Lanka Komal Sai Manohar, Kotapati Subhash Reddy, Sk.Moulali, G.Swapna, K.V.Siva Reddy
Paper Title: Static and Dynamic Simulink model of Wireless Power Transfer methods for EV Applications
Abstract: Present day's remote power Transfer Systems are utilized mainly to move the limited quantity
of power inside short ranges. In latest applications it is for the most part used to charge Smart Phones, Electric
Toothbrushes Scanning RFID [Radio wave Frequency Identification labels are utilized to assemble information
or read the data] Tags. In the fields medical, WPT frameworks are utilized to charge the Bio-gadgets like
pacemakers with no contact and move the vitality in attractive medium. These all applications are low power
gadgets. For high power applications like EV accusing is additionally conceivable of WPT Systems. From the
previous barely any years, looks into on Electric vehicles are made increasingly concerned and it picked up
ubiquity since it won't emanate any ozone depleting substances and it uses environmentally friendly power
vitality. Indeed, even Electric vehicles are having numerous favorable circumstances there are a few issues
ejected when it experiences with the clients. One of the primary drawbacks is charging framework. Since it is
powerless against certain conditions like Weather, Vandalism and Electrocution. Thus, WPT frameworks are
641. better partner for charging EVs. In this paper, unmistakable sorts of Wireless Power Transfer advancements has
given and basic structure of shut and open circle WPT frameworks in tangle lab were given. Further, recognize 3650-
highlights has been made in the middle of the tangle lab reproduction of both open and shut circle frameworks 3653
and distinctive link frameworks and remote power move frameworks.
Keyword : Wireless Power Transfer WPT, Design of Optimization, Electric Vehicles, coil shapes, Quality
Factor and Coupling Coefficient..
References:
1. Nikola Tesla, “Apparatus for transmitting electrical energy.,” US1119732 A, May 4, 1907
2. Sk. Moulali and K. Subbarao ”A Review on Recent Developments in Wireless Power Transfer” in IJCTA,2016, pp. 421 -426.
3. Ravi teja.s,Moulali.sk, Nikhil.M and Venkata srinivas.B ‘A dual wireless power transfer-based battery charging system for electric
vehicles’, IJEAT, Volume 8, Issue 4,April 2019,Pages 1211-1214.
4. J. C. Schuder, ‘Powering an artificial heart: birth of the inductively coupled-radio frequency system in 1960,Artificial Organs,
volume.26,issue. 11, page.909-915, 2002.
5. J.C. Schuder, J.H. Gold, and H.E, Stephenson, ”An inductively coupled rf system for the transmission of 1kw of power through the
skin,” IEEE Trans. On Biomedical Engineering, volume.18,no.4, page.265-273,1971.
6. C.Reinhold, P.Scholz, W.John, and U.Hilleringmann,”Efficient antenna design of inductive coupled RFID-systems with high power
demand,” Journal of communications, volume.2, no. 6, page. 14-23, year-2007.
7. F. Grover, ‘Inductance calculations’, ser. Dover phoenix editions, Dover Publications, Incorporated, 2004.
8. H.L Li, A.P Hu, G. Covic, and C.S Tang, ”Optimal coupling condition of IPT system for achieving maximum power transfer,”
Electronics letters, volume. 45, no.1,page. 76-77, January 2009.
9. Kumar, A., Guravareddy, Srikanth, M. “Automatic wireless mobile charger using arduino feedback”,IJITEE,2019.
10. Srinivasarao, B., Lalitha, S.V.N.L., Sreenivasarao, Y. “Selection of filter and reduction of ripple in the output of boost-converter for
four bus micro grid system”,IJEAT,2019.
Paper Title: Encryption Algorithm – Detecting Chemical Structures using Graph Theory
Abstract: Security is the matter of great importance when the confidential/important information is stored
and transferred across the insecure channel such as an internet where the possibility of protection of information
is at high risk. Cryptography is a powerful tool to ensure the secure communication between different operators
by transferring the protected information and only the authorized receiver can access the information. Though
there are many encryption algorithms available in literature, the requirement of new encryption algorithms also
receives importance to prevent any traditional opportunity to sniff data. In this paper, we have proposed a new
algorithm to encrypt and decrypt information of interest, using graph theoretical approach.
Keyword : Calcium Carbonate, Environmental friendly, Crack free concrete, Bacterial Concrete.
643.
References:
1. Use of bacteria to repair cracks in concrete by Kim van Tittelboom a, Nele De BELIE
3659-
2. Gollapudi et al,. 1995 stocks-fischer et al.2006 rodriguez Navarro et al. 2003 3661
3. Rafat Saddique, Navneet Kaur chahal, “ effect of of ureolytic bacteria on concrete properties”, construction and building
Materials 25
4. Klass van breugel, Self healing Material Conceps as solution for Aging Infrastructures, 37 th conference on our world in concrete
and structures August 2012
5. Yuequiang sui, mechanical behaviour of self healing concrete, Master thesis, Louisana State University and agricultural and
mechanical college
6. Sonja then, gan seng , Optimisation of Microcapsulation Process for self healing Polymeric Material,Sain Malaysian 40(7)(2011);
795-802
7. Sclangen E, Sangadji S. Addressing infrastructure durability and sustainability by self healing mechanism- Recent advances in
self healing concrete and asphalt. Procedia Eng [Internet]. Elsevier B.V.; 54(2013)39-57
8. Pacheco- Torgal F, Labrincha JA. Biotech cementitious materials: some aspects of an innovative methodology for concrete with
enhanced durability. Constr Build Mater [Internet]. Elsevier Ltd; 40(2013)1136-57.
Aleksandr Dunets, Angelina Penkova, Elena Potekhina, Olga Gribkova, Alla Nikolaeva, Denis
Authors:
Smirnov
Paper Title: Cluster as a form of Resort Development: Organizational and Managerial Structure
Abstract: The article considers the prospect of forming a tourism cluster by the example of the existing
644. resort Belokurikha. This is due to the historical background and concentration of tourist facilities, as well as the
experience of joint project implementation by the cluster members. The authors identify five functional 3662-
complexes in the cluster structure and describe their characteristics. The article suggests a model of the tourist 3668
cluster management structure along with the stages of its formation in the region.
Keyword : tourist cluster, Belokurikha resort, institutional structure, management structure
References:
1. Alexandrova,, A. Yu. (2007). The nature and characteristics of tourist clusters. Recreational Nature Management, Tourism, and
Sustainable Development of Regions: international materials. scientific-practical conf. - Barnaul: Publishing house of ASU, Pp. 13-16.
2. Akhmadeev, R.G., Bykanova, O.A., Turishcheva, T.B. (2018) Brics' foreign debt burden and its impact on core institutional basis.
Journal of Reviews on Global Economics, 7, pp. 345-359.
3. Akhmetshin, E. M., Kolpak, E. P., Sulimova, E. A., Kireev, V. S., Samarina, E. A., & Solodilova, N. Z. (2017). Clustering as a
criterion for the success of modern industrial enterprises. International Journal of Applied Business and Economic Research, 15(23),
221-231.
4. Barmuta, K. A., Yakovenko, Z. M., Zadorozhnaya, L. I., Mironov, D. S., & Klochko, E. N. (2017). Advantages of cluster approac h in
managing the economy of the Russian federation. International Journal of Applied Business and Economic Research, 15(23), 355-364.
5. Bordas, E. (2001). Improving public-private sectors cooperation in tourism: A new paradigm for destinations. Tourism Review. Vol.
56, N 3/4. P. 38 –41.
6. Bozhkova, G. N., Shastina, E. M., Kalimullina, O. V., & Shatunova, O. V. (2019). Study of literary images of gifted characters in
optional activities as a means to develop capable and talented youth. Space and Culture, India, 7(1), 264-273.
doi:10.20896/saci.v7i1.463
7. Bykanova, O.A., Akhmadeev, R.G., Glubokova, N.Y., Kravchuk, I.S. (2018) The global market of roundwood: Financial aspects.
Bulgarian Journal of Agricultural Science, 24 (1), pp. 8-16.
8. Demirhan, G., & Yücel, C. (2016). A Prediction for Teacher Commitment: Effects of Managerial Style, Burnout and Demographics,
Research in Social Sciences and Technology, (I)1, 24-43,
9. Dunets, A.N. (2011). Tourist and recreational complexes of the mountain region. Barnaul: AltSTU Publishing House, 204 p.
10. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019). Spatial tourism plannin g:
Using the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
11. Farooq, M. O., Elseoud, M. S. A., Turen, S., & Abdulla, M. (2019). Causes of non-performing loans: The experience of gulf
cooperation council countries. Entrepreneurship and Sustainability Issues, 6(4), 1955-1974. doi:10.9770/jesi.2019.6.4(29)
12. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of so ciety.
Journal of Social Studies Education Research, 10(3), 118-135.
13. Friedrichs, Y. Gummesson E. (2006). Hotel networks and social capital in destination marketing. International Journal of Service
Industry Management. V. 17, V. 1. P. 58-75.
14. Frolova, I., Voronkova, O., Islamutdinova, D., Gordeyeva, O., Fedulova, I., & Zhminko, A. (2019a). Ecologization of ag roindustrial
production: Organizational and economic transformations. Journal of Environmental Management and Tourism, 10(3), 622 -630.
doi:10.14505/jemt.v10.3(35).16
15. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019b). Corruption as an obstacle to
sustainable development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
16. Gabidullina, F. I., Korganbekov, B. S., Makarova, V. F., Zakirov, R. A., & Kayumova, G. F. (2019). Concept «teacher» in language
consciousness of students of philological faculty. XLinguae, 12(3), 45-54. doi:10.18355/XL.2019.12.03.04
17. Goryushkina, N. E., Petrova, L. I., Khudyakova, T. M., Tchuykova, N. M., Klimovskikh, N. V., & Voinova N. E. (2019).
Diversification and its role in improving hotel industry businesses competitiveness. International Journal of Engineering and Advanced
Technology, 9(1).
18. Gordon, I., Goodall, B. (2000). Localities and tourism. Tourism Geographies. 2 (3). P. 290-311.
19. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of
loss of profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
20. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagogica l and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219
21. Ghosh, M., & Ghosal, S. (2019). Historical geography of forestry and forest culture in sub-himalayan west bengal, 1757-2015. Space
and Culture, India, 6(5), 215-227. doi:10.20896/SACI.V6I5.393
22. Kagema, J. (2018). The School Curriculum and Its Influence on Teacher Motivation in Curriculum Implementation in Kenya. Journ al
of Culture and Values in Education, 1(1), 9-25. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/3
23. Kayumova, G., Sheymardanov, S., Akhtarieva, R., & Zhundibayeva, A. (2019). Developing creative potential of a schoolchild by
means of native language. Journal of Social Studies Education Research, 10(1), 81-92.
24. Kashirskaya, L., Voronkova, O., Sitnov, A., Shichiyakh, R., Kudinova, M., & Sycheva, I. (2019). Rural development through the
formation of zonal agro-ecological clusters. Journal of Environmental Management and Tourism, 10(3), 651-659.
doi:10.14505/jemt.v10.3(35).19
25. Kenna, J., & Russell III, W. (2018). The Culture and History of Standards-Based Educational Reform and Social Studies in America.
Journal of Culture and Values in Education, 1(1), 26-49. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/2
26. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment.
Journal of Social Studies Education Research, 10(3), 387-403.
27. Kovalev, Yu. P. (2009). Factors of development of cluster initiatives in the tourism sector. Regional studies. No. 4/5 (25), Pp. 23-31.
28. Korchagina, N. A. (2010). Features of the implementation of cluster initiatives in tourism. Vestn. Astrakhan state. tech. un-that. Ser.
Economy. No. 1. Pp. 131-137
29. Korchagina, N.A. (2009). Cluster policy is a technology for improving the efficiency of company management. - Astrakhan:
Publishing House "Astrakhan University", 117 p.
30. Korableva, O.N., Kalimullina, O.V., Mityakova, V.N. (2019) Designing a System for Integration of Macroeconomic and Statistica l
Data Based on Ontology. Advances in Intelligent Systems and Computing, 998, p. 157-165
31. Kolmakov, V. V., Polyakova, A. G., Karpova, S. V., & Golovina, A. N. (2019). Cluster development based on competitive
specialization of regions. Economy of Region, 15(1), 270-284. doi:10.17059/2019-1-21
32. Korkmaz, U., & Avci, Z. Y. (2016). Turkish pre-service teachers’ experiences with contemporary technology games and perceptions
about teaching with instructional games. Research in Social Sciences and Technology, 1(1)
33. Kuznetsova, I. G., Voronkova, O. Y., Nimatulaev, M. M., Ruiga, I. R., Zhuruli, G. N., & Levichev, V. E. (2019a). Ensuring the
national security of agriculture in the digital era through the formation of human capital. International Journal of Economic s and
Business Administration, 7, 558-569.
34. Kuznetsova, I. G., Goloshchapova, L. V., Ivashina, N. S., Shichiyakh, R. A., Petrova, L. I., & Tkachev, B. P. (2019b). The paradigm of
human capital development capable of adapting innovations in the transition to a digital economy. International Journal of Civil
Engineering and Technology, 10(2), 1408-1417.
35. Kruzhalin, V.I. (2009). Tourism and recreational clusters - new strategies for the development of regional tourism. Resort business,
tourism and recreation. T. 3. No. 4 (12). - Pp. 29-32.
36. Leiper, N. (1979). The framework of tourism: towards a definition of tourism, tourist, and the tourist industry. Annals of Tourism
Research. V. 6 (4). Р. 390-407
37. Mazhar, L. Yu. (2008). Territorial tourist and recreational systems. - Smolensk: Universum, 211 p.
38. Mandal, J., & Sanyal, S. (2019). Geospatial analysis of fluoride concentration in groundwater in puruliya district, west bengal. Space
and Culture, India, 6(5), 71-86. doi:10.20896/SACI.V6I5.369
39. Magsumov, T.A. (2019). Apprenticeship in secondary vocational schools during the economic modernization in late imperial Russ ia.
Part 2. European Journal of Contemporary Education, 8(1), 215-221. doi: 10.13187/ejced.2019.1.215
40. Mironenko, N.S., Bochvarova, M. (1986). Recreational systems. - M.: Publishing House of Moscow State University, 136 p.
41. Movchan, I. B., Yakovleva, A. A., & Daniliev, S. M. (2019). Parametric decoding and approximated estimations in engineering
geophysics with the localization of seismic risk zones on the example of northern part of kola peninsula. Paper presented at the 15th
Conference and Exhibition Engineering and Mining Geophysics 2019, Gelendzhik 2019, 188-198.
42. Nicic, M., & Mitrovic, N. (2019, June). The importance of cluster support projects in tourism for achieving competitive advan tage.
In TISC-Tourism International Scientific Conference Vrnjačka Banja (Vol. 4, No. 1, pp. 758-774.
43. Novelli, M., Schmitz B., Spencer T. (2006). Networks, clusters and innovation in tourism: A UK experience. Tourism Management.
V. 27 (6). Р. 1141-1152.
44. Pavlyshyn, L., Voronkova, O., Yakutina, M., & Tesleva, E. (2019). Ethical problems concerning dialectic interaction of culture and
civilization. Journal of Social Studies Education Research, 10(3), 236-248.
45. Paptsov, A., & Nechaev, V. (2019). Towards to a single innovation space in the agrarian sector of the member states of the eurasian
economic union: A case study. Entrepreneurship and Sustainability Issues, 7(1), 637-648. doi:10.9770/jesi.2019.7.1(45)
46. Preobrazhensky, V.S., Vedenin, Yu.A., Zorin, I.V. et al. (1975). Theoretical Foundations of Recreational Geography. M. Science, 224
p.
47. Preobrazhensky, V.S., Vedenin, Yu.A. Zorin I.V. (1992). Theory of Recreational and Recreational Geography. M., 172 p.
Pyatinkin, S.F., Bykova, T.P. (2008). Cluster development: essence, relevant approaches, foreign experience. Minsk. Theseus, 72 p.
48. Plaskova, N. S., Prodanova, N. A., Zatsarinnaya, Е. I., Korshunova, L. N., & Chumakova, N. V. (2017). Methodological support of
organizations implementing innovative activities investment attractiveness estimation. Journal of Advanced Research in Law and
Economics, 8(8), 2533-2539. doi:10.14505/jarle.v8.8(30).25
49. Prodanova, N. A., Plaskova, N. S., Bochkareva, N. G., Babalykova, I. A., Gazizyanova, Y. Y., & Zherelina, O. N. (2019). Integ rated
corporate reporting as an innovative business reporting model. International Journal of Engineering and Advanced Technology, 8(5),
2075-2078.
50. Puryaev, A. S., Puryaeva, Z. A., Kharisova, A. R., & Puryaev, A. A. (2019). Investigation and explanation of mathematical too ling for
accounting non-economic characteristics during the investment project effectiveness’ assessing process. IOP Conference Series:
Materials Science and Engineering, 570, 012074. https://doi.org/10.1088/1757-899X/570/1/012074
51. Sagdieva, R., Husnutdinov, D., Mirzagitov, R., & Galiullin, R. (2019). Kinship terms as proof of genetic relationship. Journal of Social
Studies Education Research, 10(3), 103-117.
52. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosophical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
53. Shatunova O., Anisimova T., Sabirova F., Kalimullina O. (2019) STEAM as an Innovative Educational Technology. Journal of Social
Studies Education Research. Vol. 10 (2), 131-144.
54. Sessa, A. (1988). The science of systems for tourism development. Annals of Tourism Research. Vol. 15. P. 219-235.
55. Sharpley, R. (2009). Tourism Development and the Environment: Beyond Sustainability? London, GBR: Earthscan, 214 p.
56. Shaw, G., Williams, A.M. (2004). Tourism and Tourism Spaces. London: Thousand Oaks. New Delhi: SAGE Publications, 311 р.
57. Sozieva, Z. I. (2009). Formation and development of tourist and recreational clusters in the region: foreign experience. R egional
economics: theory and practice. –№ 25. Pp. 65-70.
58. Sycheva, I., Voronkova, O., Vorozheykina, T., Yusupova, G., Semenova, A., & Ilyin, A. (2019a). The main directions of improving
the environmental and economic efficiency of regional production. Journal of Environmental Management and Tourism, 10(3), 631-
639. doi:10.14505/jemt.v10.3(35).17
59. Sycheva, I. N., Voronkova, O. Y., Kovaleva, I. V., Kuzina, A. F., Bannikov, S. A., & Titova, S. V. (2019b). Motivation in per sonnel
management of a trading enterprise. International Journal of Economics and Business Administration, 7, 570-582.
60. Tarman, B., Baytak, A., & Duman, H. (2015). Teachers' views on an ICT reform in education for social justice. Eurasia Journal of
Mathematics, Science and Technology Education, 11(4), 865-874. doi:10.12973/eurasia.2015.1445a
61. Titova, S. V., Surikov, Y. N., Voronkova, O. Y., Skoblikova, T. V., Safonova, I. V., & Shichiyakh, R. A. (2019). Formation,
accumulation and development of human capital in the modern conditions. International Journal of Economics and Business
Administration, 7(2), 223-230.
62. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issue),
416-424.
63. Voronkova, O., Sycheva, I., Kovaleva, I., Khasanova, A., Gorovoy, S., & Vorozheykina, T. (2019a). Assessing the environmental
impact of the intensification of agricultural production. Journal of Environmental Management and Tourism, 10(3), 697-705.
doi:10.14505/jemt.v10.3(35).24
64. Vasilev, B., & Tung, L. V. (2019). Research methods of V/F control for matrix converter use direct space vector modulation.
International Journal of Electrical and Computer Engineering, 9(6), 5115-5124. http://doi:10.11591/ijece.v9i6.pp5115-5124
65. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019b). Sustainable
development of territories based on the integrated use of industry, resource and environmental potential. International Journ al of
Economics and Business Administration, 7(2), 151-163.
66. Voronkova, O., Yankovskaya, V., Kovaleva, I., Epishkin, I., Iusupova, I., & Berdova, Y. (2019c). Sustainable territorial development
based on the effective use of resource potential. Entrepreneurship and Sustainability Issues, 7(1), 662-673.
doi:10.9770/jesi.2019.7.1(47)
Paper Title: EAgeBioS: Enhanced Biometric System to handle the Effects of Template Aging
Abstract: Biometric Systems are well-known security systems that can be used anywhere for
authentication, authorization or any kind of security verifications. In biometric systems, the samples are trained
first and then it can be used for testing in long runs. Many recent researches have shown that a biometric system
may fail or get compromised because of the aging of the biometric templates. The fact that temporal duration
affects the performance of the biometric system has shattered the belief that iris does not change over lifetime.
645. This is also possible in the case of iris. So, the main focus of this work is to analyze the effect of aging and also
to propose a new system that can deal with template aging. We have proposed a new iris recognition system with
3669-
an image enhancement mechanism and different feature extraction mechanisms. In this work, three different
3677
features are extracted, which are then fused to be used as one. The full system is trained on a dataset of 2500
samples for the year 2008 and testing is done in three different phases (i) No-Lapse, (ii) 1-Year Lapse and (iii) 2-
Year Lapse. A portion of the ND-Iris-Template-Aging dataset [11] is used with a period of three years lapse.
Results show that the performance of the hybrid classifier AHyBrK [17] is improved as compared to KNN and
ANN and the effect of aging in terms of degraded performance is clear. The performance of this system is
measured in terms of False Rejection Rate, Error Rate, and Accuracy. The overall performance of AHyBrK is
51.04% and 52.98% better than KNN and ANN respectively in terms of False Rejection Rate and Error Rate
whereas the accuracy of this proposed system is also improved by 5.52% and 6.04% as compared to KNN and
ANN respectively. This proposed system also achieved high accuracy for all the test phases.
Keyword : Template Aging, Hybrid Classifier, Feature Extraction, Feature Fusion, Quality Enhancement
References:
1. Alhamrouni,, M. (2017). Iris Recognition By Using Image Processing Techniques. Master’s Thesis. Graduate School of Natural And
Applied Science, ATLIM University.
2. Alsultan, A., Warwick, K. & Wei, H., (2016). Free-text keystroke dynamics authentication for Arabic language, IET Biometrics, 5(3),
164–169.
3. Baker, S. E., Bowyer, K. W., & Flynn, P. J. (2009). Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-
Lapse between Gallery and Probe Matches. Advances in Biometrics Lecture Notes in Computer Science, 1170–1179.
4. Bowyer, K. W., Baker, S. E., Hentz, A., Hollingsworth, K., Peters, T., & Flynn, P. J. (2009). Factors that degrade the match distribution
in iris biometrics. Identity in the Information Society, 2(3), 327–343.
5. Browning, K., & Orlans, N. (2014). Biometric Aging: Effects of Aging on Iris Recognition. The MITRE Corporation, 13(3472), 1–13.
6. Carls, J. W. (2009). A Framework for Analyzing Biometric Template Aging and Renewal Prediction. Air Force Institute of
Technology.
7. Carls, J. W., Raines, R., Grimaila, M., & Rogers, S. (2008). Biometric enhancements: Template aging error score analysis. 2008 8th
IEEE International Conference on Automatic Face & Gesture Recognition.
8. Czajka A. (2014) Influence of Iris Template Aging on Recognition Reliability. In: Fernández-Chimeno M. et al. (eds) Biomedical
Engineering Systems and Technologies. BIOSTEC 2013. Communications in Computer and Information Science, vol 452. Springer,
Berlin, Heidelberg.
9. Ellavarason, E. (2013). Effects of Aging on Iris Biometric Recognition. 2013th Ed. Denmark, Kongens Lyngby: Technical University
of Denmark.
10. Fenker, S. P., & Bowyer, K. W. (2011). Experimental evidence of a template aging effect in iris biometrics. 2011 IEEE Workshop on
Applications of Computer Vision (WACV).
11. Fenker, S. P., & Bowyer, K. W. (2012). Analysis of template aging in iris biometrics. 2012 IEEE Computer Society Conference on
Computer Vision and Pattern Recognition Workshops.
12. Fenker, S. P., Ortiz, E., & Bowyer, K. W. (2013). Template Aging Phenomenon in Iris Recognition. IEEE Access, 1, 266–274.
13. Harvey, J., Campbell, J., & Adler, A. (2018). Characterization of biometric template aging in a multi-year, multi-vendor longitudinal
fingerprint matching study. IEEE Transactions on Instrumentation and Measurement, 13(1), 1–9.
14. Johnson, M., Yambay, D., Rissacher, D., Holsopple, L., & Schuckers, S. (2018). A longitudinal study of iris recognition in
children. 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA).
15. Kanak, A. & Sogukpinar, I., (2017). BioTAM: a technology acceptance model for biometric authentication systems, IET Biometrics,
6(6), 457–467.
16. Komogortsev, O. V., Holland, C. D., & Karpov, A. (2014). Template aging in eye movement-driven biometrics. Biometric and
Surveillance Technology for Human and Activity Identification XI.
17. Kumar, S., Lamba, V. K., & Jangra, S. (2019). ILivSpot: Secure Biometric System based on Iris Liveliness Detection. (Communicated)
18. Labati, R., Genovese, A. and Munoz, E. (2016). Biometric recognition in automated border control: a survey. ACM Comput. Surv.,
49(2), pp.1-24.
19. Lanitis, A. (2010). A survey of the effects of aging on biometric identity verification. International Journal of Biometrics, 2(1), 34.
20. Mamdouhi, M., Kazemi, M., & Amoabedini, A. (2019). A New Model for Iris Recognition by Using Artificial Neural
Networks. Fundamental Research in Electrical Engineering, Lecture Notes in Electrical Engineering, 185–196.
21. Mehrotra, H., Vatsa, M., Singh, R., & Majhi, B. (2013). Does Iris Change Over Time? PLoS ONE, 8(11).
22. Muley, A. & Kute, V., (2018). Prospective solution to bank card system using fingerprint, in 2018 2nd International Conference on
Inventive Systems and Control (ICISC), 898 – 902.
23. Neurotechnology. (2019, October 09). VeriEye SDK. Retrieved from https://www.neurotechnology.com/verieye.html
24. Ramlee, R. A., Ramli, A. R., & Noh, Z. M. (2017). Pupil Segmentation of Abnormal Eye using Image Enhancement in Spatial
Domain. IOP Conference Series: Materials Science and Engineering, 210, 012031.
25. Ryu, J., Jang, J., & Kim, H. (2010). Analysis of the effect of fingerprint sample quality in template aging. Journal of Biometrics (J.
Biom.), 2(1), 34–62.
26. Sabhanayagam, T., Venkatesan, V. P., & Senthamaraikannan, K. (2018). A Comprehensive Survey on Various Biometric
System. International Journal of Applied Engineering Research, 13(5), 2276–2297.
27. Telgad, R. L., Siddiqui, A., Lothe, S. A., Deshmukh, P. D., & Jadhao, G. (2017). Development of an efficient secure biometric system
by using iris, fingerprint, face. 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM).
28. Tome-Gonzalez, P., Alonso-Fernandez, F., & Ortega-Garcia, J. (2008). On the Effects of Time Variability in Iris Recognition. 2008
IEEE Second International Conference on Biometrics: Theory, Applications, and Systems.
29. Trokielewicz, M. (2015). Linear regression analysis of template aging in iris biometrics. 3rd International Workshop on Biometrics and
Forensics (IWBF 2015).
30. Uludag, U., Ross, A., & Jain, A. (2008). Biometric template selection and update: a case study in fingerprints. Pattern Recognition, 37,
1533–1542.
31. Yang, J. Hu, Wang, S. & Wu, Q., (2018). Biometrics based Privacy-Preserving Authentication and Mobile Template
Protection, Wireless Communications and Mobile Computing, 2018, 1–17. https://doi.org/10.1155/2018/7107295 .
Paper Title: Recent Nature Inspired Techniques for Solar Power Point Tracking Application
Abstract: Photovoltaic (PV) array generates non-linear I-V and P-V characteristics. As a result, it is
difficult to transfer the maximum power from source to load. The Maximum Power Point Tracking (MPPT) is
used to track the Maximum Power Point (MPP) and extract the maximum power of solar PV. The disadvantages
of conventional MPPT techniques are less MPP tracking speed, high MPP settling time and less accuracy. In
646. order to overcome the disadvantages of conventional techniques, in this article different types of recent nature
inspired optimization techniques are reviewed to track the MPP. In addition, the application of optimization 3678-
technique based Maximum Power Point Tracking (MPPT) technique for standalone and grid connected 3684
application is explained in detail. The advantages of optimization techniques are highly reliable, better accuracy,
less time to convergence and fast response.
Keyword : DC-DC conveter, Optimization methods, MPPT, optimum duty cycle, and PV system.
References:
1. Daneshpour, Raheleh, and Mehdi Mehrpooya. "Design and optimization of a combined solar thermophotovoltaic power generation an d
solid oxide electrolyser for hydrogen production." Energy conversion and management 176 (2018): 274-286.
2. Nayak, Pabitra K., et al. "Photovoltaic solar cell technologies: analysing the state of the art." Nature Reviews Materials 4.4 (2019): 269.
3. Salman, Salman, A. I. Xin, and W. U. Zhouyang. "Design of a P-&-O algorithm based MPPT charge controller for a stand-alone
200W PV system." Protection and Control of Modern Power Systems 3.1 (2018): 25.
4. Ambikapathy, A., Gajendra Singh, and Prabhakar Tiwari. "Smart Switching Algorithm Between IC and PO Algorithms for Grid -
Connected PV System." Advances in smart grid and renewable energy. Springer, Singapore, 2018. 83-92.
5. Podder, Amit Kumer, Naruttam Kumar Roy, and Hemanshu Roy Pota. "MPPT methods for solar PV systems: a critical review based
on tracking nature." IET Renewable Power Generation (2019).
6. Hammami, Manel, et al. "Three-Phase Three-Level Flying Capacitor PV Generation System with an Embedded Ripple Correlation
Control MPPT Algorithm." Electronics 8.2 (2019): 118.
7. Wu, Zhongqiang, and Danqi Yu. "Application of improved bat algorithm for solar PV maximum power point tracking under partially
shaded condition." Applied Soft Computing 62 (2018): 101-109.
8. Kandemir, Ekrem, Selim Borekci, and Numan Sabit Cetin. "Conventional and Soft-Computing Based MPPT Methods Comparisons in
Direct and Indirect Modes for Single Stage PV Systems." Elektronika ir Elektrotechnika 24.4 (2018): 45-52.
9. Atia, Doaa Mohamed. "Global Maximum Power Point Tracking-Based Computational Intelligence Techniques." Modern Maximum
Power Point Tracking Techniques for Photovoltaic Energy Systems. Springer, Cham, 2020. 131-163.
10. Abdel-Basset, Mohamed, Doaa El-Shahat, and Ibrahim El-Henawy. "Solving 0–1 knapsack problem by binary flower pollination
algorithm." Neural Computing and Applications: 1-19.
11. Abdel-Basset, Mohamed, and Laila A. Shawky. "Flower pollination algorithm: a comprehensive review." Artificial Intelligence
Review (2018): 1-25.
12. Diab, Ahmed A. Zaki, and Hegazy Rezk. "Global MPPT based on flower pollination and differential evolution algorithms to mitig ate
partial shading in building integrated PV system." Solar Energy 157 (2017): 171-186.
13. Murdianto, Farid Dwi, Ainur Rofiq Nansur, and Alfis Syah Laili Hermawan. "Modeling and simulation of MPPT coupled inductor
sepie converter using Flower Pollination Algorithm (FPA) Method in DC mierogrid system." Engineering Technology and
Applications (IES-ETA), 2017 International Electronics Symposium on. IEEE, 2017.
14. Pei, Tingting, Xiaohong Hao, and Qun Gu. "A Novel Global Maximum Power Point Tracking Strategy Based on Modified Flower
Pollination Algorithm for Photovoltaic Systems under Non-Uniform Irradiation and Temperature Conditions." Energies 11.10 (2018):
2708.
15. Priyadarshi, Neeraj, et al. "Maximum Power Point Tracking for Brushless DC Motor-Driven Photovoltaic Pumping Systems Using a
Hybrid ANFIS- FLOWER Pollination Optimization Algorithm." Energies 11.5 (2018): 1-16.
16. Rizk-Allah, Rizk M., and Aboul Ella Hassanien. "New binary bat algorithm for solving 0–1 knapsack problem." Complex & Intelligent
Systems 4.1 (2018): 31-53.
17. Wu, Zhongqiang, and Danqi Yu. "Application of improved bat algorithm for solar PV maximum power point tracking under partially
shaded condition." Applied Soft Computing 62 (2018): 101-109.
18. Karagöz, M. Kadir, and Hüseyin Demirel. "A Novel MPPT Method for PV Arrays Based on Modified Bat Algorithm with Partial
Shading Capability." International Journal of Computer Science and Network Security (IJCSNS) 17.2 (2017): 61.
19. Oshaba, A. S., E. S. Ali, and SM Abd Elazim. "PI controller design for MPPT of photovoltaic system supplying SRM via BAT search
algorithm." Neural Computing and Applications28.4 (2017): 651-667.
20. Yang, Xin-She. "Harmony search as a metaheuristic algorithm." Music-inspired harmony search algorithm. Springer, Berlin,
Heidelberg, 2009. 1-14.
21. Gao, Xiao Zhi, et al. "Harmony search method: theory and applications." Computational intelligence and neuroscience2015 (2015): 39.
22. Kumar, Nishant, et al. "Normal Harmonic Search Algorithm-Based MPPT for Solar PV System and Integrated With Grid Using
Reduced Sensor Approach and PNKLMS Algorithm." IEEE Transactions on Industry Applications 54.6 (2018): 6343-6352.
23. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
24. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
25. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
26. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
27. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be
published.
28. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum
Electron., submitted for publication.
29. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
30. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301].
31. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
32. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL)
33. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
34. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)
Tidal Energy Integrated Robust Frequency Control of an Islanded AC Microgrid with Improved-
Paper Title:
MFO Tuned Tilt Controller
Abstract: In recent electrical energy scenario different renewable energy based distribution generation
(DG) systems have been developed to provide electrical power to distant and remote consumers. In view of this
current research article presents a Tidal Power Plant (TPP) and its integration with an Islanded AC Microgrid
system. The tidal energy based TPP is modelled to generate required electrical power. However the inherent
647. dynamic behaviour of TPP largely affects the microgrid system frequency especially in islanded mode of
operation. In regard to this to obtain necessary control mechanism in an islanded AC microgrid system , present 3685-
research article proposes a tilt multistage TDF/(1+TI) controller and to show effectiveness of proposed tilt 3692
controller for microgrid control it has been compared with multistage PDF/1+PI and PID controllers. To obtain
optimal gain parameters of above implemented controllers an Improved- Moth Flame Optimization (I-MFO)
technique has been proposed for this study. To justify viability of proposed I-MFO algorithm its performances
have been compared with original MFO algorithm. Finally it has been noticed that to obtain robust frequency
control in an islanded AC microgrid system, proposed I-MFO optimized tilt multistage controller exhibits
outstanding performance under wind, solar and tidal energy uncertainties.
Keyword : Distribution Generation (DG); Microgrid; Tidal Power Plant (TPP); Tilt multistage TDF/1+TI
Controller; Improved-Moth Flame Optimization (I-MFO) algorithm; Integral of Time multiplied Absolute Error
References:
1. D.E. Olivares, A. Mehrizi-Sani, A.H.Etemadi, C.A. Cañizares, R. Iravani, M. Kazerani , G.A. Jimenez-Estevez, Trends in microgrid
control, IEEE Transactions on smart grid. 5(4) (2014), pp.1905-1919.
2. F.Nejabatkhah, Y. W. Li, Overview of power management strategies of hybrid AC/DC microgrid, IEEE Transactions on Power
Electronics. 30(12) (2015) , pp.7072-7089.
3. R. H. Lasseter, P.Paigi, Microgrid: A conceptual solution, In Power Electronics Specialists Conference, PESC 04.IEEE 35th
Annual Vol. 6, pp. (2004), pp. 4285-4290.
4. C. A. Cortes, S. F. Contreras, M.Shahidehpour ,Microgrid topology planning for enhancing the reliability of active distribution
networks, IEEE Transactions on Smart Grid, 9(6) (2018), pp.6369-6377.
5. R.Boukenoui, R.Bradai, A. Mellit, M.Ghanes, H.Salhi, Comparative analysis of P&O, modified hill climbing-FLC, and adaptive
P&O-FLC MPPTs for microgrid standalone PV system. In Renewable Energy Research and Applications (ICRERA), 2015
International Conference on (pp. 1095-1099).
6. T. Kamal, S. Z. Hassan, M. H.Riaz, H. Li, M. Sarmad, G. M. Mufti, Design and control of photovoltaic/micro-turbine/super-capacitor
based microgrid system. In Multi-topic Conference (INMIC), 2017 International(pp. 1-6). IEEE.
7. N. L.Díaz, A. C. Luna, J. C. Vasquez, J. M. Guerrero, Centralized control architecture for coordination of distributed renewable
generation and energy storage in islanded ac microgrids, IEEE Transactions on Power Electronics. 32(7)(2017). pp.5202-5213.
8. Y. Han, P. Shen, X. Zhao, J. M. Guerrero, An enhanced power sharing scheme for voltage unbalance and harmonics compensation i n
an islanded AC microgrid. IEEE Transactions on Energy Conversion. 31(3) (2016), pp.1037-1050.
9. H.Qiu, W.Gu, Y. Xu, Z.. Wu, S.Zhou, J.Wang, Interval-Partitioned Uncertainty Constrained Ro-bust Dispatch for AC/DC Hybrid
Microgrids With Uncontrollable Renewable Generators, IEEE Transactions on Smart Grid. (2018).
10. B. Zhao, Q.Haifeng, R. Qin, Z.Xue-song, W.Gu, C. Wang, Robust Optimal Dispatch of AC/DC Hybrid Microgrids Considering
Generation and Load Uncertainties and Energy Storage Loss, IEEE Transactions on Power Systems. (2018).
11. D. Wu, F. Tang, T.,Dragicevic, J. C. Vasquez, J. M. Guerrero, Autonomous active power control for islanded ac microgrids with
photovoltaic generation and energy storage system, IEEE Transactions on energy conversion.29(4)(2014). pp.882-892.
12. S. Ahmadi, S.Shokoohi, H.Bevrani, A fuzzy logic-based droop control for simultaneous voltage and frequency regulation in an AC
microgrid. International Journal of Electrical Power & Energy Systems. 64 (2015), pp. 148-155.
13. P. C.Sahu, S. Mishra, R. C.Prusty, S. Panda, Improved-salp swarm optimized type-II fuzzy controller in load frequency control of
multi area islanded AC microgrid, Sustainable Energy, Grids and Networks.16(2018). pp.380-392.
14. I. Pan, S. Das, Fractional order AGC for distributed energy resources using robust optimization. IEEE Transactions on Smart
Grid, 7(5) (2016), pp.2175-2186.
15. R. K.,Khadanga, S.Padhy, S., Panda, A. Kumar, Design and analysis of multi‐stage PID controller for frequency control in an island ed
micro‐grid using a novel hybrid whale optimization‐pattern search algorithm, International Journal of Numerical Modelling: Electronic
Networks, Devices and Fields. e2349(2018).
16. S. Y. Lu, L. Wang, T. M. Lo, A. V. Prokhorov, Integration of wind power and wave power generation systems using a DC
microgrid, IEEE Transactions on Industry Applications. 51(4) (2015), pp. 2753-2761.
17. K. T. Tan, B.Sivaneasan, X. Y. Peng, P. L. So, Control and operation of a dc grid-based wind power generation system in a
microgrid, IEEE Transactions on Energy Conversion, 31(2) (2016), pp. 496-505.
18. N. L.Diaz, D. Wu, T.Dragicevic, J. C. Vasquez, J. M. Guerrero, Stored energy balance for distributed pv-based active generators in an
ac microgrid, In Power Energy Society General Meeting (pp. 1-5) (2015).
19. A. M.Bouzid, J. M. Guerrero, A.Cheriti, M.Bouhamida, P.Sicard, M.Benghanem, A survey on control of electric po wer distributed
generation systems for microgrid applications. Renewable and Sustainable Energy Reviews.44(2015). pp.751-766.
20. M. E.Lotfy, T.Senjyu, M. A. F.Farahat, A. F. Abdel-Gawad, A.Yona, A frequency control approach for hybrid power system using
multi-objective optimization, Energies.10(1)(2017) 80.
21. H. M.Hasanien, Whale optimisation algorithm for automatic generation control of interconnected modern power systems including
renewable energy sources, IET Generation, Transmission & Distribution. 12(3) (2017), pp. 607-614.
22. H.Polinder, M.E.C.Damen, F. Gardner, Linear PM generator system forwave energy conversion in the AWS, IEEE Trans. Energy
Convers,19,(3) (2004), pp. 583–589.
23. R. K.Sahu, S. Panda, A.Biswal, G. C.Sekhar, Design and analysis of tilt integral derivative controller with filter for load frequency
control of multi-area interconnected power systems, ISA transactions. 61 (2016), pp. 251-264.
24. M. A.Taher, S. Kamel, F. Jurado, M. Ebeed, An improved moth‐flame optimization algorithm for solving optimal power flow
problem, International Transactions on Electrical Energy Systems. e2743. (2018).
Keyword : Deep Learning, Context aware recommender system, sequence aware recommender system,
Gated Recurrent Unit, Recurrent Neural Networks.
References:
1. Rendle, S.; Freudenthaler, C.; and Schmidt-Thieme, L. 2010. Factorizing personalized markov chains for nextbasket recommendation.
In WWW, 811–820.
2. Chen, J.; Wang, C.; and Wang, J. 2015. A personalized interest-forgetting markov model for recommendations. In AAAI, 16–22.
3. He, R., and McAuley, J. 2016a. Fusing similarity models with markov chains for sparse sequential recommendation. In ICDM, 191 –
200.
4. Yu, F.; Liu, Q.; Wu, S.; Wang, L.; and Tan, T. 2016. A dynamic recurrent model for next basket recommendation. In SIGIR, 729–732.
5. Liu, Q.;Wu,S.;Wang,L.;andTan,T. 2016c. Predictingthe next location: A recurrent model with spatial and temporal contexts. In AAAI,
194–200.
6. Cui, Q.; Wu, S.; Liu, Q.; and Wang, L. 2016. A visual and textual recurrent neural network for sequen tial prediction. arXiv preprint
arXiv:1611.06668.
7. Hidasi, B.; Quadrana, M.; Karatzoglou, A.; and Tikk, D. 2016. Parallel recurrent neural network architectures for feature -rich session-
based recommendations. In RecSys, 241–248
8. Liu, Q.; Wu, S.; and Wang, L. 2017. Multi-behavioral sequential prediction with recurrentl og-bilinearmodel. TKDE 29(6):1254–1267.
9. Hochreiter, S., and Schmidhuber, J. 1997. Long short-term memory. Neural Computation 9(8):1735–1780
10. Cho, K.; Van Merri¨enboer, B.; Gulcehre, C.; Bahdanau, D.; Bougares, F.; Schwenk, H.; and Bengio, Y. 2014. Learning phrase
representations using rnn encoder-decoder for statistical machine translation. In EMNLP.
11. Liu, J.; Wang, G.; Hu, P.; Duan, L.-Y.; and Kot, A. C. 2017. Global context-aware attention lstm networks for 3d action recognition. In
CVPR.
12. Wang, P.; Guo, J.; Lan, Y.; Xu, J.; Wan, S.; and Cheng, X. 2015. Learning hierarchical representation model for next basket
recommendation. In SIGIR, 403–412.
13. Le,Q.,and Mikolov, T. 2014. Distributed representations of sentences and documents. In ICML, 1188–1196.
14. Rendle, S.; Freudenthaler, C.; Gantner, Z.; and SchmidtThieme, L. 2009. Bpr: Bayesian personalized ranking from implicit feed back.
In UAI, 452–461.
15. Werbos, P. J. 1990. Backpropagation through time: what it does and how to do it. Proceedings of the IEEE 78(10):1550–1560.
16. Liu, Q.; Wu, S.; Wang, D.; Li, Z.; and Wang, L. 2016b. Context-aware sequential recommendation. In ICDM, 1053–1058.
17. Mnih,A.,and Hinton, G. 2007. Three new graphica lmodels for statistical language modelling. In ICML, 641–648.
18. Bengio, Y.; Simard, P.; and Frasconi, P. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions
on Neural Networks 5(2):157–166.
19. Liu,J.;Shahroudy,A.;Xu,D.;and Wang, G. 2016a. Spatiotemporal lstm with trust gates for 3d human action recognition. In ECCV, 816–
833.
20. Abdulnabi, A. H.; Shuai, B.; Winkler, S.; and Wang, G. 2017. Episodic camn: Contextual attention-based memory networks with
iterative feedback for scene labeling. In CVPR.
21. Zeng, X.; Ouyang, W.; Yan, J.; Li, H.; Xiao, T.; Wang, K.; Liu, Y.; Zhou, Y.; Yang, B.; Wang, Z.; et al. 2016. Crafting gbd -net for
object detection. arXiv preprint arXiv:1610.02579.
22. Zhai, S.; Chang, K.-h.; Zhang, R.; and Zhang, Z. M. 2016. Deepintent: Learning attentions for online advertising with recurrent neural
networks. In SIGKDD, 1295–1304.
23. Mnih, V.; Heess, N.; Graves, A.; et al. 2014. Recurrent models of visual attention. In NIPS, 2204–2212.
24. Bahdanau, D.; Cho, K.; and Bengio, Y. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint
arXiv:1409.0473.
25. Luong, M.-T.; Pham, H.; and Manning, C. D. 2015. Effective approaches to attention-based neural machine translation. arXiv preprint
arXiv:1508.04025.
26. Wang, Y.; Huang, M.; Zhu, X.; and Zhao, L. 2016. Attention-based lstm for aspect-level sentiment classification. In EMNLP, 606–615.
27. Manning, C. D.; Raghavan, P.; and Sch¨utze, H. 2008. Introduction to information retrieval. Cambridge University Press.
28. Shi, Y.; Karatzoglou, A.; Baltrunas, L.; Larson, M.; Hanjalic, A.; and Oliver, N. 2012. Tfmap: optimizing map for top-n context-aware
recommendation. In SIGIR, 155–164.
29. He, R., and McAuley, J. 2016b. Vbpr: Visual bayesian personalized ranking from implicit feedback. In AAAI, 144– 150.
30. Keivan Villatel, Elena Smirnova, Jeremie Mary, Philippe Preux. 2018. Recurrent Neural Networks for Long and Short Term Sequen tial
Recommendation. In Proceedings of ACM Conference RecSys’18, arXiv:1807.09142v1.
31. Elena Smirnova and Flavian Vasile. 2017. Contextual Sequence Modeling for Recommendation with Recurrent Neural Networks. In
Proceedings of ACM Recommender Systems conference, Como, Italy, 27th-31st August 2017 (RecSys ’17), 8 pages. DOI:
10.475/123_4.
32. Ben-Shimon, D., Tsikinovsky, A., Friedmann, M., Shapira, B., Rokach, L., & Hörle, J. (2015). RecSys Challenge 2015 and the
YOOCHOOSE Dataset. RecSys.
Authors: Tat-Hien Le, Nguyen Quoc Y, Nguyen Thi Ngọc Hoa, Nguyen Thi Hai Ha, Vu Ngoc Bich
Paper Title: Prediction of Propeller Open Water Characteristics for High Speed Boat by CFD Method
Abstract: Nowadays with the development of computational resources, calculating the open water
characteristics of the propeller using Computational Fluid Dynamics (CFD) has been used widely at the initial
design stage because of relatively accurate result, time and cost saving, in comparison with experimental
approach. This paper presents the results of computational evaluation of propeller open water characteristics for
high speed boat, based on steady RANSE flow model with rotating reference frame approach. The effects of
mesh density, mesh generation are analyzed in order to improve obtained numerical results. The well-known
Gawn propeller series, that is often used for high speed vessel is used to verify and validate the accuracy of case
649. studies. In this study, the authors use the commercial solver Star CCM+ by SIEMENS.
3701-
Keyword : Propeller, open water, RANSE, CFD, high speed boat. 3706
References:
1. Molland, A.F., S.R. Turnock, and D.A. Hudson, Ship resistance and propulsion. 2017: Cambridge university press.
2. Bertram, V., Practical ship hydrodynamics. 2011: Elsevier.
3. Perali, P., T. Lloyd, and G. Vaz. Comparison of uRANS and BEM-BEM for propeller pressure pulse prediction: E779A propeller in a
cavitation tunnel. in Proceedings of the 19th Numerical Towing Tank Symposium. 2016.
4. Brizzolara, S., D. Villa, and S. Gaggero. A systematic comparison between RANS and panel methods for propeller analysis. in Proc. Of
8th International Conference on Hydrodynamics, Nantes, France. 2008.
5. Barkmann, U., H.-J. Heinke, and L. Lübke. Potsdam Propeller Test Case (PPTC). in Proceeding of the Second International Symposium
on Marine Propulsors-smp’11. 2011.
6. Baltazar, J.M., D.R. Rijpkema, and J. Falcao De Campos. Numerical studies for verification and validation of open-water propeller RANS
computations. in Proceedings of the 6th International Conference on Computational Methods in Marine Engineering (Rome, Italy).
2015.
7. Tu, T.N., Numerical simulation of propeller open water characteristics using RANSE method. Alexandria Engineering Journal, 2019.
8. Gawn, R., Effect of pitch and blade width on propeller performance. Trans. INA, 1953. 95: p. 157.
9. Ferziger, J.H. and M. Perić, Computational methods for fluid dynamics. Vol. 3. 2002: Springer.
10. Menter, F.R., M. Kuntz, and R. Langtry, Ten years of industrial experience with the SST turbulence model. Turbulence, heat and mass
transfer, 2003. 4(1): p. 625-632.
11. CD-adapco, 2017. STAR-CCMþ User Guide.
12. Tran Ngoc Tu, N.M.C., Comparison Of Different Approaches For Calculation Of Propeller Open Water Characteristic Using RANSE
Method. Naval Engineers Journal, 2018. Volume 130, Number 1, 1 March 2018, pp. 105-111(7).
13. Gawn, R. and L. Burrill, Effect of cavitation on the performance of a series of 16" propellers.". Transactions of the Royal Institution of
Naval Architects, 1957. 99.
14. https://www.ittc.info/media/8169/75-03-03-01.pdf.
15. Wilcox, D.C., Turbulence modeling for CFD. Vol. 2. 1998: DCW industries La Canada, CA.
16. ITTC-Quality Manual 7.5-03-01-01, 2008
Paper Title: An Energy Aware Strategy for Distributed Cache Discovery with Stale Page Reduction
Abstract: With the immense growth in the field of mobile communication, a good number of complex
applications are now available for the mobile devices. The complex applications are made available to comply
with the client demand for the higher performing and higher capable applications, which can be accessible from
any locations and any devices. Thus, the application developers have attempted to make highly scaled
applications to be deployed on mobile communication devices. The larger applications have higher demand for
memory and processing capabilities. Thus, making the similar infrastructure available on the mobile computing
environments was always a challenge. Nonetheless, with the availability of distributed computing architecture,
the bottleneck for the computing capabilities for these complex applications can be handled. Nonetheless, the
memory capabilities for the applications must be addressed more sophisticated manner using distribution of the
memory and sharing of the data. Henceforth, distributed caching came under existence.A conveyed cache is an
augmentation of the customary idea of cache utilized in a solitary district. A conveyed cache may traverse
various servers with the goal that it can develop in size and in value-based limit. It is for the most part used to
store application information living in database and web session information.One of the most popular technique
for making the cache available is to perform cache discovery operations in the network. A number of parallel
research attempts are made to identify the accurate place in the network to create or build the distributed cache
network.However, the most of the parallel research attempts are criticised for considering single dimensions for
cache discovery as few of the work focuses on distance, few of the work focuses on density and some of the
works focuses on page replacement policies applicable on mobile computing environments as MANETs or
WSN. Henceforth, the demand of the research is to consider multiple parameters for cache discovery and build a
framework to automatically define the cache distribution. Hence, this work proposes a novel architecture or
framework to detect the cache distribution based on distance, stale page reduction mechanism and finally the
energy optimization. The outcome of the research is to automate the recommendation of cache discovery and
650. increase the network life time by 90% compared to the existing methods for cache discovery. In order to handle
the complex processing of the proposed algorithms, this work deploys machine learning methods to reduce the
time complexity. 3707-
3712
Keyword : Cache Management, Stale Page, MANET Caching, Distributed Cache, Cache Data Pattern
Analysis, Cache Stale Data Replacement, Energy Aware Caching.
References:
1. Kaur, G., Saini, J.: Mobility aware cache management in wireless environment. In: International Conference on Methods and Models
in Science and Technology, India, pp. 291–297 (2010)
2. Tassum, K., Syed, M., Damodaram, A.: Enhanced-location-dependent caching and replacement strategies in mobile environment. Int.
J. Comput. Sci. Issues 8(2), 160–167 (2011)
3. Lee, D., Chin, S., Min, J.: Efficient resource management and task migration in mobile grid environments. J. Commun. Comput. Inf.
Sci. 78(1), 384–393 (2010)
4. Shanmugarathinam, G., ViveKanandan, K.: Thread based cache consistency model for mobile environment. Int. J. Comput. Sci.
Commun. 2(2), 315–318 (2011)
5. Anandharaj, G., Anitha, R.: A Distributed cache management architecture for mobile computing environments. In: International
Advance Computing Conference, India, pp. 642–648 (2009)
6. Joy, P.T., Jacob, K.P.: A comparative study of cache replacement policies in wireless mobile networks. In: Proceedings of the Second
International Conference on Advances in Computing and Information Technology (ACITY) vol. 176, pp. 609–619 (2012)
7. Kottursamy, K., Raja, G., Saranya, K.: A data activity-based server-side cache replacement for mobile devices. In: Proceedings of the
International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems, pp. 579–589 (2016)
8. Tiwari, R., Kumar, N.: An adaptive cache invalidation technique for wireless environments. Telecommun. Syst. 62(1), 149 –165
(2016)
9. Chavan, H., Sane, S.: Mobile database cache replacement policies: LRU and PPRRP. In: International Conference on Computer
Science and Information Technology, India, pp. 523–531 (2011)
10. Li, C., Wang, D., Zhang, X.: Enhanced adaptive insertion policy for shared caches. In: International Conference on Advanced Parallel
Processing Technologies, Berlin, pp. 16–30 (2011)
11. Lee, J.H., Kwon, S.J., Chung, T.S.: ERF: efficient cache eviction strategy for e-commerce applications. In: International Conference
on Mobile and Wireless Technology, pp. 295–304 (2018)
12. Chakravorty, C., Usha, J.: Cache management issues. In: Mobile Computing Environment, International Journal of Mobile Network
Communications & Telematics (IJMNCT), vol. 2, No.1, February 2012.
Authors: Ben Ghida, D.
Paper Title: Heat Recovery Ventilation for Energy-Efficient Buildings: Design, Operation and Maintenance
Abstract: Since the 1990s, many efforts have been intensified to fight global warming and energy crisis.
Considering that the building sector is responsible for about 40% of the EU energy use and 36% of CO2
emissions, many sustainable concepts have been revived from the past, a number of new innovative technologies
have been invented, and new construction standards and policies have been implemented.
Sustainable architecture offers tailor-made solutions to minimize the negative environmental impacts of
buildings without compromising its users' comfort. According to studies, humans spend about 90% of their live-
time indoors; indoor air quality has a major effect on human health. Hence, bringing fresh air into all habitable
areas without letting the warm/cool air escape has become a priority.
If properly operated and maintained, heat recovery ventilation (VHR) in energy-efficient buildings leads to an
increased filtration and removal of micropollutants, and an overall improvement of the indoor air quality, thus
generating more comfort and less health-related problems. A systematic case study in Italy is used in this
research providing evidences of the effectiveness of mechanical ventilation heat recovery systems. This paper
discusses a case with a combination of poor design, operation and maintenance to answer the questions of: what
are the concerns about potential failures that are associated with these systems; and are there any cons in the
651. technical aspects of a mechanical heat recovery ventilation system?
3713-
Keyword : Passivhaus, Energy efficiency, HVAC, Indoor air quality, Sustainable architecture. 3715
References:
1. Arundel AV, Sterling EM, Biggin JH, Sterling TD. (1986). “Indirect health effects of relative humidity in indoor environments”.
Environ Health Perspect, Vol. 65, pp. 351-361.
2. BenGhida, D. (2016). “Indoor radon mitigation in South Korea”, International Journal of Applied Engineering Research, vol. 11 , no.
15, pp. 8521-8523
3. BenGhida, D. (2017). “Concrete as a sustainable construction material”, Key Engineering Materials, Vol. 744, pp. 196-200
4. California Air Resources Board (2005). Indoor Air Pollution in California. [online] California: California Environmental Protection
Agency. Available at: https://www.arb.ca.gov/research/apr/reports/l3041.pdf [Accessed 4 Feb. 2019]
5. Del Corno, B. (2015). L’umidità in casa. Prevenzione, diagnosi, scelta dei materiali e tecniche d’intervento. Con 7 esempi progettuali.,
Maggioli Editore, Santarcangelo di Romagna.
6. EPA. (n.d.). The Inside Story: A Guide to Indoor Air Quality | US EPA. [online] Available at: https://www.epa.gov/indoor-air-quality-
iaq/inside-story-guide-indoor-air-quality [Accessed 4 Feb. 2019].
7. Juodis, E. (2006). Extracted ventilation air heat recovery efficiency as a function of a building's thermal properties. Energ y and
Buildings 38, pp. 568-573.
8. Manz, H., Huber, H., Schälin, A., Weber, A., Ferrazzini, M., Studer, M. (2000). Performance of single room ventilation units with
recuperative or regenerative heat recovery. Energy and Buildings 31, pp. 37-47.
9. Rudd, A. and Bergey, D. (2013). Ventilation System Effectiveness and Tested Indoor Air Quality Impacts. BA 1309. Springfield:
Building Science Corporation - Building America Report..
Paper Title: Model of Bottom Hole Assembly with Rotary Steerable System
Abstract: This article presents a static model of bottom hole assembly (BHA) with rotary steerable
system (RSS). This model is aimed at estimation of control actions generated by RSS actuators upon drilling
path definition. The model can be also applied for estimation of BHA strength properties.
Keyword : Directional drilling, rotary steerable system, push-the-bit, research, static model, drilling mode,
soil strength.
References:
1. A.S. Klimov, “Povyshenie effektivnosti bureniya naklonno-napravlennykh i gorizontal'nykh skvazhin” [Improvement of drilling
efficiency of inclined and horizontal wells] IRNTU, Collections of research papers, 2015, p. 27.
2. S.B. Suslick, D.J. Schiozer, “Risk analysis to petroleum exploration and production: an overview”, Journal of petroleum science and
engineering, 44(2), 2004, pp. 1–9.
652. 3. S. Laik, “Recent trends in exploration, exploitation and processing of petroleum resources”. Tata McGraw-Hill Publishing Company
Limited, 2009.
4. A. Calderoni, J. Oppelt, A. Ligrone, A. Trampini, S. Gauld, “Automated steering systems applied to complex horizontal well in South 3716-
Italy”. Proceedings: European Geothermal Conference Basel '99, 2, 1999. 3722
5. Novye rekordy bureniya i mnogostvol'nogo zakanchivaniya v Zapadnoi Sibiri. Part 2. Available: https://rogtecmagazine.com/wp-
content/uploads/2016/09/01-New-Achievements-in-Multilateral-Drilling-and-Completions-in-Western-Siberia-Part-2.pdf
6. I.A. Shevchenko, “Razvitie tekhnologii upravlyaemogo rotornogo bureniya pri stroitel'stve skvazhin s subgorizontal'nym profilem”
[Development of rotary steering upon construction of wells with subhorizontal profile]. Proceedings: Engineering sciences in Russia
and abroad. 3rd International conference. Moscow: Buki-Vedi, 2014, pp. 112-114.
7. Rotary steerable drilling: faster, smoother wellbores, Drilling contractor, 2002, pp. 30-31.
8. RSS ready to open new world of drilling, Drilling contractor, 2006, pp. 12-16.
9. T.O. Akbulatov, L.M. Levinson, R.A. Khasanov, “Opredelenie raschetnogo radiusa iskrivleniya pri rabote rotornykh uprav lyaemykh
system” [Definition of predicted curve radius upon operation of rotary steering systems], Neftegazovoe delo, 6(2), 2008, pp. 29–32.
10. W. Yan, Y. Peng, S. Zhang, H. Wu, “Research on rotary steerable drilling system”, Metallurgical and mining industry , 2, 2016, pp.
144-148.
11. M. Elshafei, M. Khaim, A. Al-Majed, “Optimization of rotary steerable drilling”. Proceedings: 2nd International Conference of
Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 7 – 8, 2015 , Paper No. 167
12. X. Guang, J. Li, “Research on application of steering drilling technologies in shale gas development”, Geological Engineering Drilling
Technology Conference (IGEDTC), New International Convention Exposition Center Chengdu Century City, 23-25 May 2014, pp 270
– 275.
13. W. Wang, Y. Geng, N. Wang, X. Pu, J.O. Fiaux, “Toolface control method for a dynamic point-the-bit rotary steerable drilling
system”, Energies, 2019.
14. C. Zhang, W. Zou, N. Cheng, “Overview of rotary steerable system and its control methods”, Proceedings: International Conference on
Mechatronics and Automation, August 7 - 10, Harbin, China, pp. 1559 - 1565
15. K.V. Frolov, “Mechanical Engineering”: Encyclopedia. Mining Machinery, IV-24, 2011.
Keyword : motivation, educational and cognitive activity, practice-oriented tasks, interactive teaching
methods.
References:
1. E.P. Il’in, “Motivation and motives”. Saint Petersburg: Peter, 2002, p. 512.
2. T.I. Il’ina, “Methods of studying the motivation of learning in high school” [Questionnaire of studying the motivation of lea rning in
high School]. Available: www.eztests.xyz/tests/personality_ilyina/
3. D.A. Novikov, “Statistical methods in pedagogical research (typical cases)”. Moscow: MZ-Press, 2004, p. 67.
4. O.A. Tomashevskaya, “Formation of cognitive motivation of students”. Pedagogy: traditions and innovations: In the Proceedings of the
IV International Scientific Conference. Chelyabinsk: Two Komsomol members, 2013, pp. 169-171.
5. P.K. Durkin, M.P. Lebedeva, “To the problem of studying the motivational and need sphere of schoolchildren”. Arkhangelsk state
technical University, 2007, pp. 112.
6. A.K. Markova, “Psychology of professionalism”. Moscow: International humanitarian fund “Znanie”, 1996, pp. 308.
7. V.G. Leont’ev, “Psychological mechanisms of motivation”. Novosibirsk, 1992, p. 178.
8. R.S. Nemov, “General psychology”. Moscow: VLADOS, 2003, p. 400.
9. A.A. Orlov, “Introduction to professional activity: Practical methods on pedagogy”. Moscow, 2003, p. 96.
10. Yu.G. Odegov, G.G. Rudenko, S.N. Apenko, A.I. Merko, “Staff motivation”: Tutorial. Practical tasks. Moscow: Publishing House
“Alpha-Press”, 2010, p. 640.
11. E.M. Kargina, “Motivation of education at the University”. Modern scientific researches and innovations, 6, 2014. Available:
www.web.snauka.ru/issues/2014/06/35558
12. E.M. Kargina, “Formation of professional motivation of future specialists (on the example of the Association of “University
educational complex”)”. Penza, 2004.
13. R.V. Gabdreev, A.V. Smirnov, “Formation of motivation of educational and cognitive activity of University students”, Educatio n and
self-development. 10, 2008, pp. 227-233.
14. A.V. Smirnov, “Increase of motivation of educational activity to disciplines of natural science and mathematical cycle”, Theory and
practice of measurement of latent variables in education. Slavyansk-on-Kuban: PC SGPI, 2007, pp. 235-237.
15. A.V. Smirnov, I.V. Valiakhmetova, “Modern aspects of motivation of educational activity of University students”, Actual questions of
psychology and pedagogy. Novosibirsk: CRNS, 2009, pp. 81-95.
16. A.V. Smirnov, R.V. Gabdreev, I.V. Valiakhmetova, “Dialogue culture and motivation of educational activity of University stude nts”,
Tolerance in Russia: history and modernity. Moscow: PLC “Globus”, 2008, pp. 201-207.
17. A.V. Smirnov, I.V. Semenova, R.V. Gabdreev, “Motives of educational activity of students”, Scientific and educational potential of
youth in the system of professional education as the main resource of the nation. Kazan: RPC “Shkola”, 2007, pp. 164-167.
Keyword : Acceleration spectrum, bearing, machine learning, neural network, rolling element defects,
vibration velocity.
References:
1. P.B. Gerike. “Monitoring the technical condition of drilling rigs of the DML series by parameters of mechanical vibrations”, Vestnik
nauchnogo tsentra po bezopasnosti rabot v ugol’noj promyshlennosti, 1, 2014p. 28-31.
655. 2. V.I. Pisarev, A.A. Vaganov, A.F. Denisenko, and I.O. Tyuterev. “Maintenance and repair the metalworking tools with CNC of the
basis of CIP diagnostics of the technical condition”, Izvestija Samarskogo nauchnogo tsentra Rossijskoj akademii nauk, 16(1 -2), 2014, 3735-
pp. 508-513. 3741
3. S.V. Rozhkov, G.V. Shadskiy, and V.G. Shadskiy. “Use of neural network apparatus to analyze vibration characteristics spindle
assemblies for machine tools”, Izvestija Tul’skogo gosudarstvennogo universiteta. Tekhnicheskije nauki, 8(2), 2017, pp. 271 -275.
4. S. V. Korobkova. “Problems of efficient approximation of multidimensional functions using neural networks”, Izvestija Yuzhnogo
federal’nogo universiteta. Tekhnicheskije nauki, 58(3), 2006, pp. 121-127.
5. M.B. Rahmoune, A. Hafaifa, and M. Guemana. “Fault Diagnosis in Gas Turbine Based on Neural Networks: Vibrations Speed
Application”, in Applied condition monitoring, 5, T. Fakhfakh, F. Chaari, M. Abdennadher, M. Abbes, and M. Haddar (Eds.). Cham:
Springer International Publishing Switzerland, 2017, pp 1-11. DOI: 10.1007/978-3-319-41459-1_1
6. Z. Chen, X. Chen, C. Li, R.V. Sanchez, and H. Qin. “Vibration-based gearbox fault diagnosis using deep neural networks”, Journal of
Vibroengineering, 19(4), 2017, pp 2475-2496. DOI: 10.21595/jve.2016.17267
7. P. Chopra. “Making Your Neural Network Say “I don’t know” - Bayesian NNs using Pyro and PyTorch”, Towards Data Science,
2018. Retrieved from: https://towardsdatascience.com/making-your-neural-network-say-i-dont-know-bayesian-nns-using-pyro-and-
pytorch-b1c24e6ab8cd (access date: 12.10.2019).
8. E.S. Gasparov. Providing dynamic quality of high-speed spindle units based on modeling and in-place assessment of the condition of
the supports. PhD thesis Abstract, Samara, 2016. 173 p.
9. E.S. Gasparov. “Spindle assembly support model on rolling bearings,” Vestnik Samarskogo gosudarstvennogo tekhnicheskogo
universiteta. Tekhnicheskije nauki, 4(40), 2013, p. 98-105.
10. V.F. Zhuravlev, V.B. Balmont. Gyroscope Ball Bearing Mechanics. Moscow: Mashinostrojenije, 1986. 272 p.
11. A.-E.Yu. Witkut. “Transfer function between the geometry of manufacturing precision ball bearings and a variable moment of
resistance”, Vibrotekhnika, 3(8), 1969, pp. 85-90.
12. M.K. Leontiev. “Nonlinear models of rolling bearings in rotor dynamics”, Vestnik Moskovskogo aviatsionnogo instituta, 19(2), 2012,
pp. 134-145.
13. M.K. Leontiev, V.A. Karasev, O.Yu. Potapova, and S.A. Degtyarev. “The dynamics of the rotor in rolling bearings”, Vibraysija
mashin: izmerenije, snizhenije, zashchita, 4(7), 2006, pp. 40-45.
14. A.S. Kelson, Yu.N. Zhuravlev, and N.V. Yanvarev. Calculation and design of rotary machines. Leningrad: Mashino stroenije, 1977.
288 p.
15. M.A. Galakhov, A.N. Burmistrov. Calculation of bearing units. Moscow: Mashinostroenije, 1988. 336 p.
16. R.D. Beiselman. Rolling bearings: Ref. 6th ed. Moscow: Mashinostroenije, 1975. 574 p.
17. O.V. Cheremisina, T.E. Litvinova, and D.S Lutskiy. “Separation of samarium, europium and erbium by oleic acisolution at
stoichiometric rate of extractant”, Innovation-Based Development of the Mineral Resources Sector: Challenges and Prospects, 11th
conference of the Russian-German Raw Materials, 2018, pp. 413-419.
18. D. Lutskiy, T. Litvinova, I. Oleijnik, and I. Fialkovskiy. “Effect of anion composition on the extraction of cerium (Iii) and yttrium (Iii)
by oleic acid”, ARPN Journal of Engineering and Applied Sciences, 13(9), 2018, pp. 3152-3161.
19. N.V. Dzhevaga, and O.L. Lobacheva. “Separation of the rare-earth elements (REE) by flotation approaches”, The International
Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management,SGEM 2018, 18(5.1), 2018, pp. 801-
808.
20. O. Lobacheva, and N. Dzhevaga. “Rare earth elements recovery on the exampleof europium (III) from lean technogenic raw
materials”, Journal of Ecological Engineering, 18(6), 2017, pp. 122-126.
21. O.L. Lobacheva, I.V. Berlinskii, and N.V. Dzhevaga. “Thermodynamics of complexation in an aqueous solution of Tb(lll) nitrate at
298 K”, Russian Journal of Physical Chemistry A, 91(1),2017, pp. 67-69.
22. D.A. Ilyukhin, S.A. Ivanik, and A.S. Pevnev. Justification of method of continuous measurements of position of sides of surface mine.
IOP Conf. Series: Journal of Physics: Conf. Series 1118 (2018) 012017. DOI: 10.1088/1742-6596/1118/1/012017
23. N.P. Senchina, E. Ermolin, and O. Ingerov. “Integration of ground audio-magnetotelluric (AMT) and airborne magnetic surveys for
exploration of gold-bearing quartz veins”, GEOBAIKAL 2014 - 3rd International Geobaikal Conference 2014: Exploration and Field
Development in East Siberia.
24. R.K. Nadirov, L.I. Syzdykova, and A.K. Zhussupova. “Electrochemical recovery of gold from concentrate by using sulfur-graphite
electrode as the leaching agent source”, Journal of Chemical Technology and Metallurgy, 53(3), 2018, pp. 556-563
25. O.F. Putikov, and N.P. Senchina. “Precise Solution of the System of Nonlinear Differential Equations in Partial Derivatives of the
Theory of Geoelectrochemical Methods”, Doklady Akademii Nauk (Doklady Earth Sciences), 2(463), 2015, pp. 726-727.
26. K.R. Nadirov, L.I. Syzdykova, and A.K. Zhussupova, “Copper smelter slag treatment by ammonia solution: leaching process
optimization”, Journal of Central South University, 24, 2017, pp. 2799-2804.
Paper Title: Axial Impact Crushing Performance of Bi-tubular Structures with Stiffeners
Abstract: Thin-walled tube shaped components have been expansively utilized as an impact energy
dissipating devices in modern vehicles in order to decrease fatalities and vehicle damage during accidents. The
present article investigates the axial crushing performance of bi-tubular structures of various configurations.
Nonlinear impact simulations were performed on the proposed bi-tubular structure using finite element
ABAQUS/CAE explicit code. From the outcomes attained, the Energy Absorption Capability (EAC) of bi-
tubular structures with stiffeners were compared and it confirmed that bi-tubular structures have more potential
than that of traditional simple geometry tubes. Furthermore, bi-tubular structure of circle section enclosed with
square type section were recommended as significant one for superior EAC. This kind of bi-tubular structures
was found to be proficient energy absorbing elements in vehicles to improve the crashworthiness performance.
Paper Title: The Importance of Teacher Cooperation in the Process of School Guidance for High School Students
Abstract: The purpose of this article is to examine the importance of involvement teachers in the school
657. orientation process and its effectiveness in the way high school students choose their educational path.
Interviews and a survey were conducted with 74 teachers of different seniority selected from five public high
3747-
schools in three regional directorates, in the 2018/2019 academic year, Casablanca-Settat region. This study
3751
shows from a deep analysis, that the coordination and cooperation with teachers and students in the process of
school orientation were very low or null.
In this study, scientific research and my experience have shown that the attainment of the desired objectives
of high school students' educational guidance can only be achieved through coordination and cooperation
between the various actors in the school guidance process. Teacher’s role is very essential since they are the
closest to the student and the process of the student's educational orientation must be one of his main and
fundamental tasks.
It is concluded that public schools with the integration of teachers in the student's educational guidance have
more success in the school path, as the participation of teachers in the guidance of their students, improves the
process and increases its effectiveness.
Our study has allowed us to detect very important results and information on the teacher’s role who must be an
advisor in his school and must be a requirement of the process of academic guidance of high school students that
we will present and discuss.
Keyword : teacher integration, school guidance, high school student, teacher advisor, school path
References:
1. Procedia - Social and Behavioral Sciences, Volume 116, 21 February 2014,Pages 2757-2759 Fergül Kılıç, Oya Ramazan (1)
2. (Fontana David, 2001, pq5q)(2)
3. Caroff, A., et Simon, J. (1988) L’orientation des élèves. Problèmes généraux. Rôle des structures et des acteurs de l’orientation, rapport
conjoint IGEN et IGAEN, M.E.N.R.S., doc. Mult. La documentation française.
4. Périer P. (1998) Les conceptions des enseignants des collèges et lycées en matière d'évaluation et d'orientation des élèves. Carrefours
de I' éducation, no 6, juillet. Académie d’Amines.
5. Procedia - Social and Behavioral Sciences, Volume 209, 3 December 2015, Pages 439-446
6. Procedia - Social and Behavioral Sciences,Volume 182, 13 May 2015, Pages 381-387
7. L'orientation scolaire (Piéron, 1979, p.315)
8. Ali Boulahcen, « Le processus d’orientation scolaire au Maroc », Revue internationale d’éducation de Sèvres, 38 | 2005, 25-34.
9. Jean Guichard, « Proposition d’un schéma d’entretien constructiviste de conseil en orientation (life designing counseling) pour des
adolescents ou de jeunes adultes », L'orientation scolaire et professionnelle, 37/3 | 2008, 413-440.
10. J. Guichard et M. Huteau, L’Orientation scolaire et professionnelle, Paris, Dunod, 2005.
11. C. Chassagne, Éducation à l’orientation, Paris, Magnard (Chemins de formation), P. 18 1998.
12. B. Stevanovic, « L'orientation scolaire », Le Télémaque 2008/2 (n° 34), p. 9-22. 2008
13. Guichard et M. Huteau, La psychologie de l’orientation
14. https://www.sencampus.com/l-orientation-cle-de-la-reussite-au-senegal/
15. http://almohandiss.com/index.php/actualites/enseignement/lorientation-cle-de-la-reussite-scolaire-au-maroc.
Authors: Bennet Praba, Arila Vamsi Krishna, Hari Prasad, Sai Nithish
Paper Title: Secure User Authentication using Captcha as Passwords based on Graphical Methods
Abstract: An alternative to traditional text-based password is being proposed. This aims to enhance the
safety and security of the current system by adding a layer of additional security, the proposed system uses
FIDO (Fast Identity Online) which unlike password catalogue, stores personally recognizing information data
locally on the handler's device to defend it. FIDO's personal identification and local storing of biometric is an
intended way to ease user apprehensions about personal data. Image-captchas have lately developed into a very
prevalent and extensively organized crossways throughout the online networks to guard from the offensive
things. Still, the developing competence in the system field has steadily weakened the safety of Image-captcha
and has exposed them to attacks. Built on our valuation, we roughly recognize the defects in these methods of
prominent structures, laterally with the perfect performance and plan. Ideologies for more secure captchas are
formed from our findings which lean-to light on the considerate of measure and impact, for captcha solving.
659. Paper Title: Anomaly Detection in Engineering Structures Using WSN and Machine Learning
Abstract: Wireless Sensor Networks are widely used for data acquisition in wide areas of applications 3757-
like Health care, agriculture, surveillance etc. MEMs technology enables development of highly efficient, 3760
minute sensors. One of such applications of Wireless Sensor Networks (WSN) is monitoring the engineering
structures, for damage detection and characterization. WSN technology is used for detecting the level of damage
in huge bridge structures in metros and cities. Various technologies like wi-fi, zigbee, Bluetooth etc are used in
the existing system for communication between nodes of the WSN. A novel method using RF technology for
WSN is proposed that enables the coverage of a large area and higher data transfer speed.
Novel methods of data analysis using machine learning also needs to be explored, to generate incites to the huge
amount of data generated by sensors. Localization or finding the exact location of the problem area in the sensor
network is a tedious task and can be handled well by using machine learning algorithms.
Keyword : Liver cancer, medical image segmentation, neural network, lesion segmentation, deep learning.
References:
1. World Health Organization. http://www.who.int/mediacentre/factsheets/fs297/en/
2. Deng, X. and Du, G. (2008) 3D Liver Tumor Segmentation Challenge 2008. MICCAI Workshop.
660. 3. Hame, Y. (2008) Liver Tumor Segmentation Using Implicit Surface Evolution. Proceedings of the MICCAI Workshop on 3D
Segmentation in the Clinic: A Grand Challenge II 2008. 3761-
4. Massoptier, L. and Casciaro, S. (2008) A New Fully Automatic and Robust Algorithm for Fast Segmentation of Liver Tissue. 3764
Proceedings of the MICCAI Workshop on 3D Segmentation in the Clinic: A Grand Challenge II 2008.
5. Shimizu, A., Narihira, T., Furukawa, D., Kobatake, H., Nawano, S. and Shinozai, K. (2008) Ensemble Segmentation Using Adaboos t
with Application to Liver Lesion Extraction from A CT Volume. Proceedings of the MICCAI Workshop on 3D Segmentation in the
Clinic: A Grand Challenge II 2008.
6. Zhou, J., Xiong, W., Tian, Q., Tian, Q., Qi, Y., Liu, J., Leow, W., Han, T., Venkatesh, S.K. and Wang, S. (2008) Semi-Automatic
Segmentation of 3D Liver Tumors from CT Scans Using Voxel Classification and Propagational Learning. Proceedings of the
MICCAI Workshop on 3D Segmentation in the Clinic: A Grand Challenge II 2008.
7. Tustison, N.J., Shrinidhi, K.L., Wintermark, M., Durst, C.R., Kandel, B.M., Gee, J.C., et al. (2015) Optimal Symmetric Multim odal
Templates and Concatenated Random Forests for Supervised Brain Tumor Segmentation (Simplified) with ANTsR. Neuroinformatics,
13, 209-225.
8. Ciresan, D.C., Giusti, A., Gambardella, L.M. and Schmidhuber, J. (2013) Mitosis Detection in Breast Cancer Histology Images w ith
Deep Neural Networks. MICCAI 2013, LNCS 8150, 411-418.
9. Krizhevsky, A., Sutskever, I. and Hinton, G. (2012) Image Net Classification with Deep Convolutional Neural Networks. Advance s in
Neural Information Processing Systems, 1097-1105.
10. Prasoon, A., Petersen, K., Igel, C., Lauze, F., Dam, E. and Nielsen, M. (2013) Deep Feature Learning for Knee Cartilage Segmentation
Using a Triplanar Convolutional Neural Network. MICCAI 2013, LNCS 8150, 246-253.
11. LeCun, Y., Bottou, L., Bengio, Y. and Haffner, P. (1998) Gradient-Based Learning Applied to Document Recognition. Proceedings of
the IEEE, 86, 2278-2324.
12. Theano. http://www.deeplearning.net/software/theano/
13. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., et al. (2011) Scikit-Learn: Machine Learning in
Python. Journal of Machine Learning Research, 12, 2825-2830.
Keyword : Literacy Skills, Socioeconomic Status, Home Literacy Environment, Social Skills.
References:
1. Atmazaki. dkk, “Panduan gerakan literasi nasional,” p. 41, 2017.
2. A. Sverdlov, D. Aram, and I. Levin, “Kindergarten teachers’ literacy beliefs and self-reported practices: On the heels of a new national
literacy curriculum,” Teach. Teach. Educ., vol. 39, pp. 44–55, 2014.
3. R. Wildová and J. Kropáčková, “Early Childhood Pre-reading Literacy Development,” Procedia - Soc. Behav. Sci., vol. 191, pp. 878–
883, 2015.
4. C. Liu, G. K. Georgiou, and G. Manolitsis, “Modeling the relationships of parents’ expectations, family’s SES, and home literacy
environment with emergent literacy skills and word reading in Chinese,” Early Child. Res. Q., vol. 43, pp. 1–10, 2018.
5. R. P. Bowles, J. M. Pentimonti, H. K. Gerde, and J. J. Montroy, “Item Response Analysis of Uppercase and Lowercase Letter Nam e
Knowledge,” J. Psychoeduc. Assess., vol. 32, no. 2, pp. 146–156, 2014.
6. T. P. Alloway, S. E. Gathercole, A. M. Adams, C. Willis, R. Eaglen, and E. Lamont, “Working memory and phonological awareness as
predictors of progress towards early learning goals at school entry,” Br. J. Dev. Psychol., vol. 23, no. 3, pp. 417–426, 2005.
7. E. Reese, S. Suggate, J. Long, and E. Schaughency, “Children’s oral narrative and reading skills in the first 3 years of reading
instruction,” Read. Writ., vol. 23, no. 6, pp. 627–644, 2010.
8. V. N. Durand, I. M. Loe, J. D. Yeatman, and H. M. Feldman, “Effects of early language, speech, and cognition on later readi ng: A
mediation analysis,” Front. Psychol., vol. 4, no. SEP, pp. 1–11, 2013.
9. J. W. Jacoby and N. K. Lesaux, “Language and literacy instruction in preschool classes that serve Latino dual language learne rs,” Early
Child. Res. Q., vol. 40, pp. 77–86, 2017.
10. D. Liu, K. K. H. Chung, and C. McBride, “The role of SES in Chinese (L1) and English (L2) word reading in Chinese -speaking
kindergarteners,” J. Res. Read., vol. 39, no. 3, pp. 268–291, 2016.
11. F. Alivernini and S. Manganelli, “A Multilevel Structural Equation Model Testing the Influences of Socio-Economic Status and Pre-
Primary Education on Reading Literacy in Italy,” Procedia - Soc. Behav. Sci., vol. 205, no. May, pp. 168–172, 2015.
12. M. Vasilyeva, E. Dearing, A. Ivanova, C. Shen, and E. Kardanova, “Testing the family investment model in Russia: Estimating indirect
effects of SES and parental beliefs on the literacy skills of first-graders,” Early Child. Res. Q., vol. 42, no. October 2016, pp. 11–20,
2018.
13. S. J. Gibb, D. M. Fergusson, and L. J. Horwood, “Childhood family income and life outcomes in adulthood: Findings from a 30-year
longitudinal study in New Zealand,” Soc. Sci. Med., vol. 74, no. 12, pp. 1979–1986, 2012.
14. D. Hartas, “Families’ social backgrounds matter: Socio-economic factors, home learning and young children’s language, literacy and
social outcomes,” Br. Educ. Res. J., vol. 37, no. 6, pp. 893–914, 2011.
15. M. Hood, E. Conlon, and G. Andrews, “Preschool Home Literacy Practices and Children’s Literacy Development: A Longitudinal
Analysis,” J. Educ. Psychol., vol. 100, no. 2, pp. 252–271, 2008.
16. L. G. Hamilton, M. E. Hayiou-Thomas, C. Hulme, and M. J. Snowling, “The Home Literacy Environment as a Predictor of the Early
Literacy Development of Children at Family-Risk of Dyslexia,” Sci. Stud. Read., vol. 20, no. 5, pp. 401–419, 2016.
17. C. S. Puranik, B. M. Phillips, C. J. Lonigan, and E. Gibson, “Early Childhood Research Quarterly Home literacy practices and
preschool children ’ s emergent writing skills : An initial investigation,” Early Child. Res. Q., vol. 42, no. May 2016, pp. 228–238,
2018.
18. L. S. Yeo, W. W. Ong, and C. M. Ng, “The Home Literacy Environment and Preschool Children’s Reading Skills and Interest,” Early
Educ. Dev., vol. 25, no. 6, pp. 791–814, 2014.
19. K. Miyamoto, M. C. Huerta, and K. Kubacka, “Fostering social and emotional skills for well-being and social progress,” Eur. J. Educ.,
vol. 50, no. 2, pp. 147–159, 2015.
20. K. S. Tarasova, “Development of Socio-emotional Competence in Primary School Children,” Procedia - Soc. Behav. Sci., vol. 233, no.
May, pp. 128–132, 2016.
21. C. E. Baker, “Fathers’ and Mothers’ Home Literacy Involvement and Children’s Cognitive and Social Emotional Development:
Implications for Family Literacy Programs,” Appl. Dev. Sci., vol. 17, no. 4, pp. 184–197, 2013.
22. J. J. Montroy, R. P. Bowles, L. E. Skibbe, and T. D. Foster, “Social skills and problem behaviors as mediators of the relationship
between behavioral self-regulation and academic achievement,” Early Child. Res. Q., vol. 29, no. 3, pp. 298–309, 2014.
23. N. L. Aikens and O. Barbarin, “Socioeconomic Differences in Reading Trajectories: The Contribution of Family, Neighborhood, and
School Contexts,” J. Educ. Psychol., vol. 100, no. 2, pp. 235–251, 2008.
24. Y. Li, L. Xu, L. Liu, Y. Lv, Y. Wang, and C. S. Huntsinger, “Can preschool socioeconomic composition moderate relationships
between family environment and Chinese children’s early academic and social outcomes?,” Child. Youth Serv. Rev., vol. 60, pp. 1–10,
2016.
25. E. Reynolds, K. Stagnitti, and E. Kidd, “Play, language and social skills of children attending a play -based curriculum school and a
traditionally structured classroom curriculum school in low socioeconomic areas,” Australas. J. Early Childhoodournal early Child.,
vol. 36, no. 4, pp. 120–130, 2011.
26. L. K. Ferretti and K. L. Bub, “The influence of family routines on the resilience of low-income preschoolers,” J. Appl. Dev. Psychol.,
vol. 35, no. 3, pp. 168–180, 2014.
27. E. van Bergen, T. van Zuijen, D. Bishop, and P. F. de Jong, “Why Are Home Literacy Environment and Children’s Reading Skills
Associated? What Parental Skills Reveal,” Read. Res. Q., vol. 52, no. 2, pp. 147–160, 2017.
28. I. V. S. Mullis and M. O. Martin, “Since last General Assembly …,” no. October, 2015.
29. A. C. W. Schachner, E. K. Newton, R. A. Thompson, and M. Goodman-Wilson, “Becoming prosocial: The consistency of individual
differences in early prosocial behavior,” Early Child. Res. Q., vol. 43, pp. 42–51, 2018.
30. N. A. Kauffman and M. Kinnealey, “Comprehensive social skills taxonomy: Development and application,” Am. J. Occup. Ther., vol.
69, no. 2, 2015.
31. E. Melhuish, M. Phan, K. Sylva, P. Sammons, I. Siraj-Blatchford, and B. Taggart, “Effects of the Home Learning Environment and
preschool center experience upon literacy and numeracy development in early primary school,” J. Soc. Issues, vol. 64, no. 1, pp. 95–
114, 2008.
32. B. A.T., M. L. M., R. A., and K. M., “A qualitative exploration of social support during treatment for severe alcohol use disorder and
recovery,” Addict. Behav. Reports, vol. 6, no. June, pp. 76–82, 2017.
33. Lou Ann Griswold; Samantha Townsend, “Assessing the Sensitivity of the Evaluation of Social Interaction: Comparing Social Skills in
Children With and Without Disabilities,” Am. J. Occup. Ther., 2012.
34. S. K. Baker, L. E. Santoro, D. J. Chard, H. Fien, Y. Park, and J. Otterstedt, “An Evaluation of an Explicit Read Aloud Intervention
Taught in Whole-Classroom Formats In First Grade,” Elem. Sch. J., vol. 113, no. 3, pp. 331–358, 2013.
35. J. A. M. Farver, Y. Xu, S. Eppe, and C. J. Lonigan, “Home environments and young Latino children’s school readiness,” Early Child.
Res. Q., vol. 21, no. 2, pp. 196–212, 2006.
36. D. Aram, O. Korat, E. Saiegh-Haddad, S. H. Arafat, R. Khoury, and J. A. Elhija, “Early literacy among Arabic-speaking
kindergartners: The role of socioeconomic status, home literacy environment and maternal mediation of writing,” Cogn. Dev., vol. 28,
no. 3, pp. 193–208, 2013.
Keyword : Remote Sensing, Satellite Images, Particle Swarm Optimization, kappa coefficient
References:
1. J.Jayanth, S.Koliwad and A. Kumar, “Classification of remote sensed data using Artificial Bee Colony algorithm”, The Egyptian
Journal of Remote Sensing and Space Science, Vol.18, No. 1, pp.119-126,2015.
2. Z. Zou and Z. Shi, “Random Access Memories: A New Paradigm for Target Detection in High Resolution Aerial Remote Sensing
663. Images”, in IEEE Transactions on Image Processing, Vol. 27, No. 3, pp. 1100-1111, 2018.
3. X. Liu, X. Li, L. Liu and J. He, “An innovative method to classify remote-sensing images using ant colony optimization”, IEEE
Transactions and Geosciencefor Remote Sensing, Vol. 46, No.12, pp.4198–4208, 2008.
3776-
4. B.Akay, D.Karaboga, B. Akay and D. Karaboga, “A survey on the applications of artificial bee colony in signal, image, and video 3782
processing”, Signal, Image and Video Processing, Vol. 9, No. 4, pp.967-990,2015.
5. A.Voisin, A. Vladimir Krylov , G. Moser, B. Sebastianoand J.Zerubia,“Supervised
classification of multi-sensor and multi-resolution remote sensing images with a hierarchical copula-based approach”,IEEE
Transactions and Geoscience for Remote Sensing,Vol. 20, pp. 1–18,2013.
6. H. Kundra and H. Sadawarti, “ Hybrid Algorithm of Cuckoo Search and Particle Swarm Optimization for Natural Terrain
Feature Extraction”,Research journal of Information Technology, Vol.7, No.1, pp. 58- 69, 2015.
7. K. Sabanci, M. Fahriunlersenand K. Polat, “Classification of Different Forest Types with Machine Learning Algorithms” ,
Research for Rural Development, Vol. 1, 2016
8. S. M. Jog, M. Dixit, A.Rajgopalan and S. D. Ranade, “KNN and SVM based Satellite Image Classification”,International
Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol. 4, No. 6, pp. 158 -162,
2016.
9. O.Csillik, “Fast segmentation and classification of very high resolution remote sensing data using SLIC superpixels”, Remote
Sensing, Vol. 9, No. 3, pp.243,2017.
10. H. Wang, J. Jiang and G. Zhang, “CraterIDNet: An End-to-End Fully Convolutional Neural Network for Crater Detection and
Identification in Remotely Sensed Planetary Images”, Remote Sensing, Vol. 10, No.7, pp.1067,2018.
11. K. Fu, W.Dai , Y. Zhang , Z. Wang , M. Yan and X. Sun, “MultiCAM: Multiple Class Activation Mapping for Aircraft Recognition
in Remote Sensing Images”, Remote Sensing, Vol.11, No.5, pp.544,2019.
12. S. Dhingra, D.Kumar, “A review of remotely sensed satellite image classification”, International Journal of Electrical and Computer
Engineering, Vol. 9, No.3, pp.1720,2019.
13. Q.Wang, Z.Meng, & X.Li, “Locality adaptive discrminant alanlysis for spectral-spatial classification of Hyperspectral images”.
IEEE Geoscience and Remote Sensing Letters, 14(11), 2077-2081, 2016.
14. S. Sarkar,S. Das,S.S.Chaudhuri, “Hyperspectral image segmentation using Renyi entropy based multi-level thresholding aided with
differential evolution” Expert systems with application, 50,120-129,2016.
15. S.Rani, S.Dhingra, “Classificationn of Remotely Sensed Data by Texture Features with the Nature-Inspire Optimization Algorithm”,
Vol.7, No.8, 2019.
Petr Albinovich Krasochko, Dmitry Sergeevich Borisovets, Rudolf Borisovich Korochkin, Pavel
Authors: Petrovich Krasochko, Oleg Yurevich Chernykh, Andrey Georgievich Koshchaev, Sergey
Viktorovich Shabunin
Paper Title: The Effect of Silver and Zinc Nanoparticles on The Structural Characteristics of Bacterial Cells
Abstract: The paper presents the results of studying the influence of nanoparticles of silver and zinc on
664. the culture of Madin-Darby Bovine Kidney (MDBK) and bacterial cells of E. coli at various dilution rates and
various incubation times. The interaction of MDBK cells with the nanoparticles of zinc has a strong deleterious
3783-
effect on the cells and causes morphological changes in them. At the same time, no toxic effects were observed
3789
after the interaction of silver nanoparticles and the cells. During incubation of E. coli bacterial cells with zinc
nanoparticles, not only changes in the morphology of the cell membrane surface but also the destruction of
bacterial cells were observed. During incubation with silver nanoparticles at various dilution rates for various
times, changes in the cell shape from rod-shaped to rounded, without symptoms of destruction were noted.
Keyword : Silver Nanoparticles, Zinc Nanoparticles, Mdbk, Escherichia Coli, Incubation, Atomic Force
Microscopy, Damaging Effect.
References:
1. A.G. Koshchaev, I.V. Shchukina, A.V. Garkovenko, E.V. Ilnitskaya, V.V. Radchenko, A.A. Bakharev, L.A. Khrabrova, “Allelic
variation of marker genes of hereditary diseases and economically important traits in dairy breeding cattle population”. Journal of
Pharmaceutical Sciences and Research, 10(6), 2018, pp. 1566-1572.
2. L.N. Skvortsova, A.G. Koshchaev, V.I. Shcherbatov, Y.A. Lysenko, V.I. Fisinin, I.P. Saleeva, S.F. Sukhanova, “The use of prob iotics
for improving the biological potential of broiler chickens”. International Journal of Pharmaceutical Research, 10(4), 2018, pp. 760-765.
3. I.N. Tuzov, V.G. Ryadchikov, A.N. Ratoshniy, N.I. Kulikova, A.G. Koshchaev, “Using Holstein Cattle in Conditions of the Krasnodar
Territory”. Journal of Pharmaceutical Sciences and Research, 10(12), 2018, pp. 3160-3163.
4. P. Chauhan, M. Sharma, R. Puri, S. Puri, “Phytochemical Screening of Acorus calamus Linn and Cuscuta reflexa Roxb”. Annals of
Agri-bio Research, 24(1), pp. 115-118.
5. A.G. Koshchaev, Y.A. Lysenko, A.A. Nesterenko, A.V. Luneva, A.N. Gneush, “Development of feed additives for poultry farming”.
Dusunen Adam, 10(1), 2019, pp. 1567-1572.
6. E.I. Anisimova, A.G. Koshchaev, O.N. Eremenko, A.S. Krivonogova, K.V. Plemyashov, T.V. Kalashnikova, S.V. Shabun in,
“Economic efficiency of productive features of various dairy cattle genotypes”. International Journal of Innovative Technolog y and
Exploring Engineering, 8(8), 2019, pp. 3207-3211.
7. A.G. Koshchaev, T.A. Inyukina, N.N. Guguchvili, Y.A. Makarov, A.M. Gulyukin, O.P. Neverova, V.N. Shevkopljas, “The influence
of metabolic products of Echinococcus granulosus on the oxidation processes in the organism of pigs”. Journal of Pharmaceutic al
Sciences and Research, 10(9), 2018, pp. 2317-2325.
8. E.V. Yausheva, “Issledovanie biologicheskogo deystviya nanochastits metallov” [Studying the biological effect of metal
nanoparticles]. Issues of biological, medical, and pharmaceutical chemistry, 9, 2013, pp. 54-60.
9. N.V. Rukosuev, “Preparaty na osnove nanochastits v klinicheskoy praktike: dostizheniya i perspektivy” [Preparations based on
nanoparticles in clinical practice: achievements and perspectives]. Issues of biological, medical, and pharmaceutical chemistry, 10,
2014, pp. 3-22.
10. I.P. Saleeva, V.S. Lukashenko, A.G. Koshchaev, V.G. Volik, D.Y. Ismailova, “Quality of Broiler Chicken Meat with the Use of
Various Methods of Growing”. Journal of Pharmaceutical Sciences and Research, 10(11), 2018, pp. 2979-2984.
11. I.V. Serdyuchenko, A.G. Koshchaev, N.N. Guguchvili, I.S. Zholobova, I.M. Donnik, A.M. Smirnov, B.V. Usha, “Microbiocenosis of
the intestinal tract of honey bees and its correction”. OnLine Journal of Biological Sciences, 18(1), 2018, pp. 74-83.
12. A.N. Ratoshny, A.A. Soldatov, S.I. Kononenko, I.N. Tuzov, A.G. Koshchaev, “Organization of feeding dairy cows for preventing
metabolic disorders”. Journal of Pharmaceutical Sciences and Research, 10(12), 2018, pp. 3273-3276.
13. A.N. Troshin, P.D. Onischuk, A.G. Koshchaev, S.P. Kudinova, O.V. Koshchaeva, V.Y. Nikitin, A.S. Krivonogova, “Pa rameters of
acute toxicity of the Ferro-Quin iron-sorbitol-protein complex”. International Journal of Pharmaceutical Research, 10(4), 2018, pp.
784-790.
14. A.A. Rakhmetova, “Antibakterialynaya i ranozazhivlyayuschaya aktivnosty mazey s nanochastitsami medi na osnove proizvodnyh
metiltsellyulozy” [Antibacterial and wound-healing activity of ointments containing copper nanoparticles based on methylcellulose
derivatives]. Issues of biological, medical, and pharmaceutical chemistry, 3, 2014, pp. 22-27.
15. I.G. Kiselev, I.A. Rodin, A.N. Bezin, A.A. Stekolnikov, A.G. Koshchaev, M.G. Yakovets, A.S. Krivonogova, “Clinical aspects of the
use of smooth and full-threaded rods of the VOSIS veterinary orthopedic set in cats”. International Journal of Innovative Technology
and Exploring Engineering, 8(8), 2019, pp. 3212-3215.
16. S.V. Svistunov, N.N. Bondarenko, A.G. Koshchaev, D.A. Normov, V.N. Shevkopljas, O.P. Neverova, A.M. Smirnov, “Productive
qualities of gray mountain caucasian bees of type Krasnopolyansky”. International Journal of Innovative Technology and Exploring
Engineeringm 8(7), 2019, pp. 631-635.
17. V.G. Tyurin, V.G. Semenov, D.A. Nikitin, A.V. Lopatnikov, I.N. Madebeikin, A.G. Koshchaev, O.V. Koshchaeva, “Stimulation of
adaptogenesis in aberdeen-angus calves for improving productive qualities”. International Journal of Engineering and Advanced
Technology, 8(5), 2019, pp. 440-444.
18. A.A. Bakharev, O.M. Sheveleva, K.A. Fomintsev, K.N. Grigoryev, A.G. Koshchaev, K.A. Amerkhanov, I.M. Dunin,
“Biotechnological characteristics of meat cattle breeds in the Tyumen region”. Journal of Pharmaceutical Sciences and Research,
10(9), 2018, pp. 2383-2390.
19. A.G. Koshchaev, Y.A. Lysenko, A.V. Luneva, A.N. Gneush, M.V. Aniskina, V.I. Fisinin, I.P. Saleeva, “Studying Biological Activ ity
of Lactobacillus Hydrolysates”. Journal of Pharmaceutical Sciences and Research, 10(10), 2018, pp. 2475-2479.
20. N.I. Kryukov, V.O. Yurchenko, A.G. Koshchaev, N.E. Gorkovenko, D.P. Vinokurova, A.A. Bogosyan, S.F. Sukhanova, “The
Derivative Of Prussian Blue Paint ‒ Khzh-90 Cesium Isotopes’ Sorbent At Mycotoxicoses”, International Journal of Pharmaceutical
Research, 10(4), 2018, pp. 669-674.
21. A.G. Koshchaev, T.A. Inyukina, N.N. Guguchvili, A.V. Uspensky, S.V. Larionov, F.I. Vasilevich, S.V. Engashev, “The effect of
metabolites Echinococcus granulosus on the amino acid composition of the cattle slaughter products”. International Journal of
Innovative Technology and Exploring Engineering, 8(7), 2019, pp. 589-596.
22. N.A. Samoilov, “Issledovanie antimikrobnyh svoystv nanochastits serebra, stabilizirovannyh sopolimerami maleinovoy kisloty”
[Studying the antimicrobial properties of silver nanoparticles stabilized with copolymers of maleic acid]. Biotechnology, 1, 2015, pp.
75-84.
23. P.A. Krasochko, A.E. Stankut, “Protivovirusnye i antibakterialynye svojstva nanochastits serebra” [Antiviral and antibacterial
properties of silver nanoparticles]. Our agriculture. Veterinary science and animal breeding, 6, 2013, pp. 64 – 67.
24. A.G. Koshchaev, Y.A. Lysenko, A.A. Lysenko, A.V. Luneva, I.P. Saleeva, V.I. Fisinin, “Screening of microorganism symbiont strains
as a base of probiotics for poultry industry”. Journal of Pharmaceutical Sciences and Research, 9(8), 2017, pp. 1373 -1379.
25. S.V. Svistunov, A.G. Koshchaev, N.N. Bondarenko, O.V. Koshchaeva, A.M. Smirnov, Y.A. Yuldashbayev, O.G. Lorets, “Selection of
Bees of the Gray Mountain Caucasian Breed: Apis mellifera caucasica L. of the Krasnaya Polyana Type”. Journal of Pharmaceutic al
Sciences and Research, 10(12), 2018, pp. 3185-3188.
26. P.A. Krasochko, V.A. Mashero, “Immunostimulyatory i sovremennye sposoby korrektsii immunnogo otveta” [Immunostimulants and
modern methods of correcting the immune response]. Epidemiology, immunobiology, pharmacology, and sanitation, 1, 2004, pp. 32 -
36.
27. A.G. Koshchaev, Y.A. Lysenko, M.P. Semenenko, E.V. Kuzminova, I.A. Egorov, E.J. Javadov, “Engineering and development of
probiotics for poultry industry”. Asian Journal of Pharmaceutics, 12(4), 2018, pp. S1179-S1185.
28. M.I. Zverzhanovskiy, S.N. Zabashta, T.S. Kataeva, A.G. Koshchaev, M.V. Nazarov, “Epizootic trichinellosis situation and consortive
links in jackals (Canis aureus L.) in North-western Region of Russia”. Indian Veterinary Journal, 94(10), 2017, pp. 29-32.
29. A.N. Troshin, A.N. Turchenko, P.D. Onischuk, A.G. Koshchaev, S.P. Kudinova, A.Y. Shantyz, O.V. Koshchaeva, “Long-term use of
iron-mineral and iron-organic drugs”. International Journal of Pharmaceutical Research, 10(4), 2018, pp. 791-797.
30. I.A. Khmel, O.A. Koksharova, M.A. Radtsig, “Antibakterialynye effekty ionov serebra: vliyanie na rost gramotritsatelynyh bakteriy i
obrazovanie bioplyonok” [Antibacterial effects of silver ions: the effect on the growth of gram-negative bacteria and biofilm
formation]. Molecular Genetics, Microbiology, and Virology, 4, 2009, pp. 27-31.
31. A.V. Garkovenko, V. V. Radchenko, E.V. Ilnitskaya, A. G. Koshchaev, I.V. Shchukina, A.A. Bakharev, S.F. Sukhanova,
“Polymorphism of cattle microsatellite complexes”. Journal of Pharmaceutical Sciences and Research, 10(6), 2018, pp. 1545 -1551.
32. V.G. Semenov, D.A. Nikitin, A.V. Volkov, V.G. Tyurin, A.G. Koshchaev, A.A. Nesterenko, S.V. Shabunin, “Preventing Shipping
Stress in Imported Heifers with the Use of Immunocorrection”. International Journal of Innovative Technology and Exploring
Engineering, 8(5), 2019, pp. 1591-1595.
33. E.I. Anisimova, A.G. Koshchaev, A.A. Nesterenko, A.A. Bakharev, A.G. Isaeva, T.M. Shuvaeva, T.V. Kalashnikova, “Comparative
Assessment Of The Relationship Between Intrabreed Types Of Simmental Cows And Sectionized Traits”. International Journal of
Pharmaceutical Research, 10(4), 2018, pp. 604-610.
34. I.S. Koba, A.A. Lysenko, A.G. Koshchaev, A.K. Shantyz, I.M. Donnik, V.I. Dorozhkin, S.V. Shabunin, “Prevention of Mastitis in
Dairy Cows on Industrial Farms”. Journal of Pharmaceutical Sciences and Research, 10(10), 2018, pp. 2582-2585.
35. E.V. Kuzminova, M.P. Semenenko, A.G. Koshchaev, O.Y. Chernyh, A.N. Turchenko, “Pharmacological prevention of obstetric and
gynecological diseases in cows”. Dusunen Adam, 10(1), 2019, pp. 608-612.
36. N.I. Kulikova, O.N. Eremenko, A.G. Koshchaev, T.V. Kalashnikova, N.V. Evdokimov, K.A. Amerkhanov, I.M. Dunin, “Productive
longevity of holstein bulls' female offspring”. International Journal of Engineering and Advanced Technology, 8(5), 2019, pp. 435-439.
Keyword : social entrepreneurship, social entrepreneur, social good, comparative analysis, interdisciplinary
analysis.
References:
1. N.V. Baranova, “Sotsialnaya otvetstvennost predprinimatelstva v Rossii: voprosy terminologii, razvitiya, natsionalnykh osobennostei”
665. [Social responsibility of entrepreneurship in Russia. Aspects of terminology, development, national specifics]. The Russian Journal of
Entrepreneurship, 18(9), 2017, pp. 1479-1489 3790-
2. M. Batalina, A. Moskovskaya, L. Taradina, “Obzor opyta i kontseptsii sotsial'nogo predprinimatelstva s uchetom vozmozhnostei ego
primeneniya v sovremennoi Rossii” [A survey of practice and concepts of social entrepreneurship with a focus on the potential
3794
application in Russia]: Preprint WP1/2008/02. Moscow: State University – Higher School of Economics, 2008.
3. M.N. Konyagina, M. Krasnopevtseva, “Molodezh i sotsialnoe predprinimatelstvo v Rossii” [Youth and social entrepreneurship in
Russia], Rossiiskoe predprinimatelstvo [The Russian Journal of Entrepreneurship], 20(1), 2019, pp. 159-172
4. A. Moskvina, D. Dolzhikova, “Uchastie lyudei starshego vozrasta v sotsialnom predprinimatelstve na primere sotsialnogo
akseleratora” [Participation of seniors in social entrepreneurship as exemplified by a social accelerator]. Zhurnal issledovanii sotsialnoi
politiki [The Journal of Social Policy Studies], 16(1), 2018, pp. 169-176
5. S. Bansal, I. Garg, G.D. Sharma, “Social Entrepreneurship as a Path for Social Change and Driver of Sustainable Development: A
Systematic Review and Research Agenda”, Sustainability, 11, 2019, pp. 1091.
6. P. Bento, M. Jacquinet, R. Albuquerque, “How Social Entrepreneurship Promotes Sustainable Development: With Some Examples
from Developed and Developing Countries”, In: New Paths of Entrepreneurship Development. Studies on Entrepreneurship, Structu ral
Change and Industrial Dynamics. Springer, Cham, 2019.
7. E. Muralidharan, S. Pathak, Sustainability, Transformational Leadership, and Social Entrepreneurship (2018) Sustainability, 10, p. 567-
589.
8. A. Forouharfar, S.A. Rowshan, H. Salarzehi, “An epistemological critique of social entrepreneurship definitions”, Journal of Global
Entrepreneurship Research, 8, 2018, pp. 11-51.
9. O.B. Ponomarev, “O perspektivakh razvitiya teorii sotsialnogo predprinimatelstva” [On potential development of the social
entrepreneurship theory]. Rossiiskoe predprinimatelstvo [The Russian Journal of Entrepreneurship], 18(4), 2017, pp. 561-570.
10. A. Chepurenko, “Entrepreneurship Theory: New Challenges and Future Prospects”. Foresight-Russia, 9(2), 2015, pp. 44–57.
11. V.V. Zhokhova, “Sotsialnoe predprinimatelstvo: kontseptsiya, sushchnost i znachenie” [Social entrepreneurship: concept, substance
and implications]. Sovremennaya konkurentsiya [Modern competition], 9(4(52)), 2015, pp. 77-99.
12. M.K. Baymuhasheva, R.K. Sabirovа, “Theoretical Research of Social Entrepreneurship”. Reports, 4, 2019, pp. 66-70.
13. A. Forouharfar, S. Rowshan, H. Salarzehi, “Introducing a Conceptual Framework for the Strategic Classification of State -Sponsored
Social Entrepreneurship A Conceptual Study”, Social and Management Research Journal, 16(1), 2019.
14. D. Kelly, “Differences Between Social Entrepreneurs & Business Entrepreneurs”. Small Business: Chron.com, 2019. Available:
http://smallbusiness.chron.com/differences-between-social-entrepreneurs-business-entrepreneurs-36624.html
15. N. Ivashchenko, N. Bulygina, “Social entrepreneurship in Russia: current state and development features”. MIR (Modernization.
Innovation. Research), 10(1), 2019, pp. 114-132
16. D. Littlewood, D., Holt, D. Social Entrepreneurship in South Africa: Exploring the Influence of Environment (2015) Busine ss &
Society, URL: https://www.researchgate.net/publication/272349900_Social_Entrepreneurship_in_South Africa Exploring the Influence
of_Environment
17. G.K.S. Nimeshi, “A Systematic Literature Review on Social Entrepreneurship and Characteristics of Social Entrepreneurs”.
International Journal of Multidisciplinary Research Review, 1(39), 2018, pp. 50-53.
18. H. Utomo, S. Priyanto, L. Suharti, G. Sasongko, “Developing social entrepreneurship: a study of community perception in Indon esia”.
Entrepreneurship and Sustainability Issues, 7, 2019, pp. 233-246.
19. A.A. Moskovskaya, A.A. Berendyaev, A.Yu. Moskvina, “Mezhdu sotsialnym i ekonomicheskim blagom: konflikt proektov legitimatsii
sotsialnogo predprinimatelstva v Rossii” [Between social and economic good: the conflict of projects in legitimation of social
entrepreneurship in Russia]. Monitoring obshchestvennogo mneniya: Ekonomicheskie i sotsial'nye peremeny [Monitoring of Public
Opinion: Economic and Social Changes], 6, 2017, pp. 31-51.
20. F. Guo, B. Zou, J. Guo, “What determines academic entrepreneurship success? A social identity perspective”. International
Entrepreneurship and Management Journal, Springer, 15(3), 2019, pp. 929-952.
21. V.S. Hodgkin, “Business social entrepreneurs: working towards sustainable communities through socially responsible business
practices”. 2019. Available at:
https://www.researchgate.net/publication/34466638_Business_social_entrepreneurs_working_towards_sustainable_communities_throu
gh_socially_responsible_business_practices
22. M.A. Makarchenko, A.A. Antonov, “Ponyatie sotsialnogo predprinimatelstva i otlichitelnye osobennosti sotsialnykh predprinimatelei”
[The notion of social entrepreneurship and the specific profile of social entrepreneurs]. Nauchnyi zhurnal NIU ITMO [Scientif ic
journal NRU ITMO], Series Economics and Environmental Managementm, 2, 2015, pp. 35-42.
23. H.M. Neck, A.C. Corbett, “The Scholarship of Teaching and Learning Entrepreneurship”. Journal of Modern Competition, 12(1(67) ),
2018, pp. 114-142.
24. A. Rey-Martí, A. Mohedano-Suanes, V. Simón-Moya, “Crowdfunding and Social Entrepreneurship: Spotlight on Intermediaries”.
Sustainability, 11(4), 2019, pp. 1175.
25. D. Bjärsholm, “Social Entrepreneurship in an International Context”. In: Sport and Social Entrepreneurship in Sweden. Palgrav e
Macmillan, Cham, 2018, pp. 23-39. https://doi.org/10.1007/978-3-319-72496-6_3
26. A.G. Moreno, L.L. Muñoz, R.P. Morote, “The Role of Higher Education in Development of Entrepreneurial Competencies: Some
Insights from Castilla-La Mancha University in Spain”. Administrative Sciences, 9, 2019, pp. 16-40.
27. T. Peterson, K.A. Schenker, “Definition of Sport and Social Entrepreneurship”. In: Sport and Social Entrepreneurship in Swede n.
Palgrave Macmillan, Cham, 2018. https://doi.org/10.1007/978-3-319-72496-6_4
28. M.S. Satar, N. Saqib, “Individual social entrepreneurship orientation: towards development of a measurement scale”. Asia Pacific
Journal of Innovation and Entrepreneurship, 13(1), 2019, pp. 49-72.
29. Yu.N. Arai, “Biznes-modeli v sotsialnom predprinimatelstve: podkhod k postroeniyu tipologii” [Business models in social
entrepreneurship. Approaches to building a typology]. Russian Journal of Management, 16(2), 2018, pp. 253-272.
30. T.S. Shipunova, S.Yu. Kazantseva, “Gosudarstvenno-chastnoe partnerstvo kak forma sotsialnogo predprinimatelstva” [Public-private
partnership as a form of social entrepreneurship]. Rossiiskoe predprinimatelstvo [The Russian Journal of Entrepreneurship], 1 9(4),
2018, pp. 907-918.
31. T. Lunkyna, A. Ivanenko, “Features of the Development of Social Entrepreneurship: Foreign Experience (2019) Modern Economics,
15, p. 142-147
32. T. Golob, M. Makarovich, “Sotsialnye predpriyatiya trudovoi integratsii v Tsentralnoi i Vostochnoi Evrope v usloviyakh strukturno-
semioticheskikh transformatsii” [Work integration social enterprises in Central and Eastern Europe amid structural and semiotic
transformation]. Monitoring obshchestvennogo mneniya: Ekonomicheskie i sotsialnye peremeny [Monitoring of Public Opinion:
Economic and Social Changes], 5, 2018, pp. 233-249
33. P. Erpf, M. Ripper, M. Castignetti, “Understanding Social Entrepreneurship Based on Self-Evaluations of Organizational Leaders –
Insights from an International Survey”, Journal of Social Entrepreneurship, 10, 2019, pp. 1-19.
34. T.L. Chernysheva, Sotsialnoe predprinimatelstvo v vuze [Social entrepreneurship in HEI] (2017) Rossiiskoe predprinimatelstvo [The
Russian Journal of Entrepreneurship], 18 (21), pp. 3207-3220
35. S. Lam-Lam, E. Ahumada-Tello, I. Plascencia-López, O.O. Ovalle-Osuna, R.V. Barragán-Quintero, R. D. Evans, K. Soria-Barreto,
“New Challenges in Universities: Teaching Social Entrepreneurship”, IEEE Technology & Engineering Management Conference
(TEMSCON), 2019, pp. 1-6.
Ludmila Victorovna Lunina, Zareta Talbievna Tazova, Hazret Ruslanovich Siyukhov, Anzaur
Authors:
Adamovich Skhalyakhov, Nafset Tevchezhovna Siyukhova
Development of The Technology of Obtaining A Non-Alcoholic Beverage for Preventing Iodine
Paper Title:
Deficiency Disorders with The Use of Nonconventional Plant Raw Materials
Abstract: The article presents the results of the research on the development of the formulation and the
technology for obtaining a non-alcoholic beverage for preventing iodine deficiency disorders based on an extract
from the nontraditional plant raw materials of the North-Caucasian region. Using the experiment planning
module of the STATISTICA suite, the optimal formulation of the phytocomposition mixture for enriching the
developed beverage was obtained, which contained the herb of common thyme (lat. Thimus serpyllum L), the
herb of purple coneflower (lat. Echinacea Angustifolia), leaves of black currant (lat. Ríbes nígrum); leaves of
walnut (lat. Juglans regia L.), with the predictive total iodine content of 82.001 µg/100 g. Laboratory and
modeling experiments were performed for obtaining an extract and developing the technology of making the
beverage based on it. The developed non-alcoholic beverage has a distinctive taste and a distinct herbal aroma
with light notes of dried fruit; it has a preventive effect for the iodine deficiency conditions, which has been
confirmed experimentally – the content of functional ingredient (iodine) in it is 48.0 mg/100 cm3 (32 % of the
666. recommended daily intake of iodine), which corresponds to the requirements of GOST R 56543-2015 applicable
to functional drinks. In terms of quality and safety, the beverage meets the requirements of regulatory documents
of the Russian Federation and the Eurasian Economic Union and may be included in the diets of various age 3795-
groups as a taste beverage and a functional beverage for preventing iodine deficiency. 3805
Keyword : iodine deficiency, nonconventional plant raw materials, plan of the experiment, analysis of
variance, phytocomposition mixture, extract, ultrasonic treatment, non-alcoholic beverage.
References:
1. I. Gunnarsdottir, L. Dahl, “Iodine intake in human nutrition: a systematic literature review”. Food & Nutrition Research, 56, 2012, pp.
19731.
2. B. Hetzel, “Iodine-deficiency disorders”. London: Churchill Livingstone, 2000.
3. M. Zimmermann, “Are weaning infants at risk of iodine deficiency even in countries with established iodized salt programs?”. Nestle
Nutr Inst Workshop Ser, 70, 2012, pp. 137–46.
4. Normy fiziologicheskikh potrebnostei v energii i pishchevykh veshchestvakh dlya razlichnykh grupp naseleniya Rossiiskoi Federatsii
[Rational nutrition. Norms of the physiological needs in energy and nutrients for various groups of population of the Russian
Federation]. Guide 2.3.1.2432-08. Moscow, 2008.
5. O.Y. Orlova, T.V. Pilipenko, L.P. Nilova, M.V. Nikulina, “Traditsionnye i perspektivnye rastitelnye istochniki ioda dlya
obogashcheniya pishchevykh produktov” [Traditional and promising plant sources of iodine for enriching food products]. National
Research University of Information Technologies, Mechanics and Optics scientific journal. Series "Processes and equipment in food
production", Saint-Petersburg, 4, 2015, pp. 26 – 34.
6. L.V. Donchenko, E.V. Scherbakova, L.Y. Rodionova, “Tekhnologiya funktsionalnykh produktov pitaniya” [The technology of
obtaining functional foods]: textbook. Krasnodar: KubSAU, 2009, p. 231.
7. L.V. Donchenko, E.V. Scherbakova, “Proektirovanie funktsionalnykh produktov pitaniya” [Development of functional foods]:
textbook. Krasnodar: KubSAU, 2010, p. 192.
8. A.V. Stepovoy, “Proizvodstvo bezalkogolnykh funktsionalnykh napitkov novogo pokoleniya” [Production of new generation non -
alcoholic functional beverages]: monograph. Krasnodar : KubSAU, 2013, p. 84.
9. GOST 28458-90. Vegetable feeds. Method for determination of iodine.
10. GOST 31660-2012 Foods. Anodic stripping voltammetric method of iodine mass concentration determination. 2012.
11. GOST R 54634-2011 Functional food products. Method of vitamin E determination. 2011.
12. StP00668034-23-15-2009 Materials of plant origin. The method of determination of the mass concentration of ascorbic, chlorogenic
and caffeic acids using capillary electrophoresis. 2009.
13. Industry Standard STO00668034-097-20018 Biological objects, products of processing. Determination of the mass concentration of
quercetin and rutin by high-performance capillary electrophoresis.
14. StP00668034-23-14-2009 Materials of plant origin. The method for determination of the mass concentration of ammonium cations,
potassium, sodium, magnesium, and calcium using capillary electrophoresis. Certification: GNU SKZNIISiV. 2009.
15. GOST 27998-88 Vegetable feeds. Methods for determination of iron.
16. GOST 26928–86 Foods. Method for determination of iron.
17. GOST R 54037-2010 Foodstuffs. Determination of water-soluble antioxidants content by amperometric method in vegetables, fruits,
products of their processing, alcoholic and non-alcoholic beverages. 2010.
18. GOST 6687.5-86 Non-alcoholic industry products. Methods for determination of organoleptic indices and products volume (with
Change No. 1, with amendment).
19. A.A. Khalafyan. “Statistica 6. Matematicheskaya statistika s elementami teorii veroyatnostei” [Statistica 6. Mathematical statistics with
elements of the probability theory]. Moscow: Binom, 2010, p. 491.
20. Promyshlennaya statistika: Kontrol kachestva, analiz protsessov, planirovanie eksperimentov v pakete STATISTICA [Industrial
statistics: Quality monitoring, analysis of processes, design of experiments in the STATISTICA software package]. Moscow: Lib-
rocom publishing house, 2013, p. 384.
21. GOST 6687.4-86 Non-alcoholic drinks, kvasses and syrups. Method of acidity determination.
22. FR.1.31.2008.01730 Method of measuring the mass fraction of arsenic and mercury in food products, food raw materials and baby food
using the method of inverse voltammetry. 2008.
23. FR 1.31.2008.01733 Method of measuring the mass fraction of cadmium, lead, copper, and zinc in food products using the method of
inverse voltammetry. 2008.
24. GOST 33504-2015 Food additives. Dihydroquercetin. Specifications. 2015.
25. MP 2.3.1.2432-08. Ratsionalnoe pitanie. Normy fiziologicheskikh potrebnostei v energii i pishchevykh veshchestvakh dlya razlichnykh
grupp naseleniya Rossiiskoi Federatsii [Rational nutrition. Norms of the physiological needs in energy and nutrients for various groups
of population of the Russian Federation]. Methodical recommendations. Moscow, 2008, p. 39.
26. GOST R 56543-2015 Functional beverages. General specifications. 2015.
27. CU TR 021/2011 "On food safety". 2011.
Anton Viktorovich Dvornikov, Sergei Anatolyevich Krylov, Gleb Igorevich Zagrebin, Anatoly
Authors:
Nikolaevich Afanasyev
Paper Title: Creating Electronic Atlases Using Spatiotemporal Data
Abstract: The authors have developed a method for creating and using spatiotemporal data for electronic
atlases, including the concept development, designing the database structure, developing methods for storing,
processing and displaying data, as well as their implementation as a historical geoportal. The types of electronic
atlases and their characteristics have been listed. The scenarios of using atlases have been considered, as well as
a system of controlling, updating, and storing data with due consideration for their spatial and temporal
component. The approaches to designing the database structure, indexing, retrieving, and protecting data have
been provided. The implementation of the method will allow to obtain spatial data as cartographic works for any
historical date and any territory, while the system of continuous data update will allow obtaining current
cartographic information. The developed method addresses the issues of spatiotemporal data storage, update, and
use in electronic atlas mapping, which will ensure the integration of multitemporal data into a single information
space of the area under study.
Keyword : Aluminum salts, Oligomer Condensate, Chloride Penetration, Dry Shrinkage, Chemical
Erosion.
References:
668. 1. Dousti, A., Shekarchi, M., Alizadeh, R., and Taheri-Motlagh, A., 2011, “Binding of externally supplied chlorides in micro silica
concrete under field exposure conditions”, Cement and Concrete Composites, 33(10), pp.1071-1079. 3813-
2. Hussain, S. E., and Al-Saadoun, S. S., 1993, “Effect of tricalcium aluminate content of cement on chloride binding corrosion of
reinforcing steel in concrete”, Materials Journal, 89(1), pp.3-12. 3818
3. Shin, C. B., and Kim, E. K., 2002, “Modeling of chloride ion ingress in coastal concrete”, Cement and Concrete Research, 32(5 ),
pp.757-762.
4. Martın-Pérez, B., Zibara, H., Hooton, R. D., and Thomas, M. D. A., 2000, “A study of the effect of chloride binding on service life
predictions”, Cement and Concrete Research, 30(8), pp.1215-1223.
5. Truc, O., Ollivier, J. P., and Nilsson, L. O., 2000, “Numerical simulation of multi-species transport through saturated concrete during a
migration test—MsDiff code”, Cement and Concrete Research, 30(10), pp.1581-1592.
6. Luping, T., and Nilsson, L. O., 1993, “Rapid determination of the chloride diffusivity in concrete by applying an electric field”,
Materials Journal, 89(1), pp.49-53.
7. Zhu, Q., Jiang, L., Chen, Y., Xu, J., and Mo, L., 2012, “Effect of chloride salt type on chloride binding behavior of concret e”,
Construction and Building Materials, 37, pp.512-517.
8. Arya, C., Buenfeld, N. R., and Newman, J. B., 1990, “Factors influencing chloride-binding in concrete”, Cement and Concrete
research, 20(2), pp.291-300.
9. Zibara, H., Hooton, R. D., Thomas, M. D. A., and Stanish, K., 2008, “Influence of the C/S and C/A ratios of hydration products on the
chloride ion binding capacity of lime-SF and lime-MK mixtures”, Cement and Concrete Research, 38(3), pp.422-426.
10. Wang, Y., Shui, Z., Gao, X., Yu, R., Huang, Y., and Cheng, S., 2019, “Understanding the chloride binding and diffusion behaviors of
marine concrete based on Portland limestone cement-alumina enriched pozzolans”, Construction and Building Materials, 198(20),
pp.207-217.
11. Justnes, H., 1998, “A review of chloride binding in cementitious systems”, Nordic Concrete Research-Publications, 21, pp.48-63.
12. Funahashi, M., 1990, “Predicting corrosion-free service life of a concrete structure”, ACI Materials Journal, 87(6), pp.581-587
13. Hudak, P. F., 2000, “Sulfate and chloride concentrations in Texas aquifers”, Environment international, 26(1-2), pp.55-61.
14. Browne, R. D., Domone, P. L., and Geoghegan, M. P., 1977, “Deterioration of concrete structures under marine conditions and t heir
inspection and repair”, In Maintenance of maritime structures, Thomas Telford Publishing, pp. 137-162
15. Korea Concrete Institute, 2009, “Concrete Standard Specification”, KCI
16. Sumer, M., 2012, “Compressive strength and sulfate resistance properties of concretes containing Class F and Class C fly ashe s”
Construction and Building Materials, 34, pp.531-536.
Keyword : Aluminum salts, SCMs, Chloride Penetration, Dry Shrinkage, Sulfate erosion.
References:
1. Martın-Pérez, B., Zibara, H., Hooton, R. D., and Thomas, M. D. A., 2000, “A study of the effect of chloride binding on service life
predictions”, Cement and Concrete Research, 30(8), pp.1215-1223.
2. Yuan, Q., Shi, C., De Schutter, G., Audenaert, K., and Deng, D., 2009, “Chloride binding of cement-based materials subjected to
external chloride environment – a review", Construction and building materials, 23(1), pp.1-13.
3. Shin, C. B., and Kim, E. K., 2002, "Modeling of chloride ion ingress in coastal concrete", Cement and Concrete Research, 32(5),
pp.757-762.
4. BS 8500, 2006, “Concrete complementary British Standard to BS EN 206-1 Part 1: Method of specifying and guidance for the
specifier”, British standard
5. ACI 201, 2000, “ACI Manual of concrete practice 2000, materials and general properties of concrete, Chapter 2 – aggressive chemical
exposure, American concrete institute”, pp.8-12
6. H. Justnes, 1998, “A review of chloride binding in cementitious systems,” Nordic Concrete Research, 21, pp.48-63.
7. Rahla, K. M., Mateus, R., and Bragança, L., 2019, "Comparative sustainability assessment of binary blended concretes using
Supplementary Cementitious Materials (SCMs) and Ordinary Portland Cement (OPC). Journal of Cleaner Production, 220, pp.445-
459.
8. Cyr, M., 2013, "Influence of supplementary cementitious materials (SCMs) on concrete durability. In Eco-efficient concrete",
Woodhead Publishing, pp. 153-197.
9. Samad, S., and Shah, A., 2017, "Role of binary cement including Supplementary Cementitious Material (SCM), in production of
environmentally sustainable concrete: A critical review", International journal of Sustainable built environment, 6(2), pp.663-674.
10. Klemczak, B. A., 2014, "Modeling thermal-shrinkage stresses in early age massive concrete structures–Comparative study of basic
models", Archives of Civil and Mechanical Engineering, 14(4), pp.721-733.
11. Kawaguchi, T., and Nakane, S., 1996, "Investigations on determining thermal stress in massive concrete structures", Materials Journal,
93(1), pp.96-101.
12. Wang, R., Yu, J., He, P., Gu, S., Cao, Z., and Liu, Q., 2019, "Investigation of ion chelator and mineral admixtures improving salt-frost
resistance of cement-based materials", Construction and Building Materials, 227, 116670.
13. Wang, Y., Shui, Z., Gao, X., Yu, R., Huang, Y., and Cheng, S., 2019, “Understanding the chloride binding and diffusion behaviors of
marine concrete based on Portland limestone cement-alumina enriched pozzolans”, Construction and Building Materials, vol.198,
pp.207-217.
14. Al-Khaja, W. A., Rasheeduzzafar, W. A., Al-Sayed, M. H., and Al-Khoder, A. A., 1994, "Sulfate Resistance and Chloride Penetration
Characteristics of High-Strength Concrete", Special Publication, 149, pp.123-134.
15. Maes, M., and De Belie, N., 2014, "Resistance of concrete and mortar against combined attack of chloride and sodium sulphate",
Cement and Concrete Composites, 53, pp.59-72.
16. Valipour, M., Pargar, F., Shekarchi, M., Khani, S., and Moradian, M., 2013, "In situ study of chloride ingress in concretes c ontaining
natural zeolite, metakaolin and silica fume exposed to various exposure conditions in a harsh marine environment", Construction and
Building Materials, 46, pp.63-70.
Paper Title: Artificial Intelligence Enabled In-Video Advertising: Infiltrating The Fashion Industry
Abstract: This paper focuses on the enormous impact of Artificial Intelligence technology for enabling
the usage of In-Video Advertising as a part of the content marketing strategy for fashion brands. Every brand
wants to reach consumers when they are prone to get influenced. However, as the consumers are spoilt for
choices and the digital mediums are creating unique customer journeys with an individualistic approach. Hence,
there exists a requirement of more engaging advertising approach, to catch the attention of the consumer and to
enable discovery of brands at high moments of desire. Since this paper focuses on In-Video Advertising &
Artificial Intelligence, thus an understanding of the building blocks of In-Video advertising calls to delve deeper
in Artificial Intelligence and content marketing strategy. This paper discusses a unique opportunity for Fashion
brands to use In-Video Advertising as a disruptive, efficient and engaging tool to reach consumers when they are
in the best state to be influenced. This novel advertising option can benefit marketers in the fashion industry and
can generate significant revenues.
670.
Keyword : Artificial Intelligence, In video Advertising, content Marketing strategy, OTT, fashion industry 3826-
3832
References:
1. Medium.. (2018). What exactly is Machine Learning?. [online] Available at: https://medium.com/swlh/what-exactly-is-machine-
learning-50789d7860ec
2. Kietzmann, J., Paschen, J. and Treen, E. (2018). Artificial Intelligence in Advertising. Journal of Advertising Research, 58(3), pp.263-
267.
3. Miralles-Pechuán, L., Rosso, D., Jiménez, F. and García, J. (2016). A methodology based on Deep Learning for advert value
calculation in CPM, CPC and CPA networks. Soft Computing, 21(3), pp.651-665.
4. Goldberg, L. and Goldberg, L. (2018). A brief history of artificial intelligence in advertising – Econsultancy. [online] Econsultancy.
Available at: https://econsultancy.com/a-brief-history-of-artificial-intelligence-in-advertising/
5. Technopak.com. (2019). [online] Available at: http://www.technopak.com/Files/indian-apparel-market.pdf
6. Liao, W., Chen, K. and Hsu, W. (2008). AdImage.
7. Hammond, K. (2015). Practical Artificial Intelligence for Dummies. John Wiley & Sons.
8. Cockburn, I., Henderson, R. and Stern, S. (2018). The Impact of Artificial Intelligence on Innovation: An Exploratory Analysis.
[online] NBER. Available at: http://www.nber.org/chapters/c14006
9. Gartner.com. (2017). [online] Available at: https://www.gartner.com/imagesrv/media-products/pdf/Criteo/Criteo-1-43VKFYC.pdf
10. SAGE Journals. (2011). Applications of artificial intelligence in the apparel industry: a review - ZX Guo, WK Wong, SYS Leung, Min
Li, 2011. [online] Available at: https://journals.sagepub.com/doi/abs/10.1177/0040517511411968
11. Broder, A., Fontoura, M., Josifovski, V. and Riedel, L. (2007). A semantic approach to contextual advertising.
12. Schreuder, A., Schreuder, A. and van Wyk, J. (2017). [online] Samra.co.za. Available at: http://www.samra.co.za/wp -
content/uploads/2017/05/Customer-Centric-Artificial-Intelligence_Schreuder-Schreuder-and-van-Wyk.pdf
13. Ko, E. and Bong Park, Y. (2002). Determinants of internet advertising effects: advertisement types and clothing involvement. Irish
Marketing Review, 15(2), pp.51 - 58.
14. Kim, J. (2017). The Disruptive Impact of Technology on the Fashion Industry. MIT.
15. Lee, J. and Song, J. (2019). Editorial: recent trends in advertising and required research in emerging markets—an Asian
perspective. International Journal of Advertising, 38(4), pp.507-510.
16. Dasgupta, S. and Grover, P. (2019). Impact of Digital Strategies on Consumer Decision Journey. Academy of Marketing Studies
Journal, 23(1).
17. Tao Mei, Xian-Sheng Hua and Shipeng Li (2009). VideoSense: A Contextual In-Video Advertising System. IEEE Transactions on
Circuits and Systems for Video Technology, 19(12), pp.1866-1879.
18. Juniperresearch.com. (2019). Retailer Spending on AI to Grow Nearly Fourfold. [online] Available at:
https://www.juniperresearch.com/press/press-releases/retailer-spending-on-ai-to-grow
19. MIlnes, H. (2018). Artificial intelligence is informing how fashion designers create – Glossy. [online] Glossy. Available at:
https://www.glossy.co/connected-fashion/how-artificial-intelligence-is-informing-how-fashion-designers-create\
20. Mageean, L. (2019). The Future of Fashion: How AI is Changing the Fashion Retail Industry. [online] WhichPLM. Available at:
https://www.whichplm.com/the-future-of-fashion-ai-changing-fashion-retail-industry/
21. Pulizzi, J. (2012). Content Marketing Definition - Examples. [online] Content Marketing Institute. Available at:
https://contentmarketinginstitute.com/2012/06/content-marketing-definition/
22. Callanan, S. (2018). The Future Of Interactive Video - WIREWAX CEO @ Unbound London 2018 [Video]. Retrieved from
https://www.youtube.com/watch?v=5yT8EIWKW88
23. Shewan, D. (2017). Dwell Time: The Most Important Metric You’re Not Measuring.
https://www.wordstream.com/blog/ws/2014/06/10/dwell-time
24. Click-Through Rate (CTR) - Definition - Digital Marketing Encyclopedia. (2019). https://willmarlow.com/click-through-rate-ctr/
25. Mackey, M. (2019). What Is Click-Through Rate & Why CTR Is Important https://www.searchenginejournal.com/ppc-guide/click-
through-rate-ctr/#close
26. Du Plessis, C. (2015). An exploratory Analysis of essential elements of Content Marketing.
27. Qin, X., & Jiang, Z. (2019). The Impact of AI on the Advertising Process: The Chinese Experience. Journal Of Advertising, 48(4), 338-
346. doi: 10.1080/00913367.2019.1652122
28. Giri, C., Jain, S., Zeng, X., & Bruniaux, P. (2019). A Detailed Review of Artificial Intelligence Applied in the Fashion and Apparel
Industry. IEEE Access, 7, 95376-95396.
29. Deng, S., Tan, C., Wang, W., & Pan, Y. (2019). Smart Generation System of Personalized Advertising Copy and Its Application t o
Advertising Practice and Research. Journal Of Advertising, 48(4), 356-365.
30. Boman, K., & Raijonkari, K. (2017). Online Video as a Marketing Tool A quantitative survey on video marketing habits Kalle Bo man
Kalle Raijonkari Bachelor’s thesis April 2017.
31. Richardson, O. (2019). AI is eating Advertising. Caribbean Business, eNewspaper(April 25, 2019), 30.
32. Callanan, S. (2019). WIREWAX In Conversation | IBC 2019. https://youtu.be/jyDb_W9TuxM
33. Malthouse, E., Hessary, Y., Vakeel, K., Burke, R., & Fudurić, M. (2019). An Algorithm for Allocating Sponsored Recommendations
and Content: Unifying Programmatic Advertising and Recommender Systems. Journal Of Advertising, 48(4), 366-379.
Keyword : concept, legislative concept, doctrinal concept, conceptual idea, conceptual scheme, conceptual
system, conceptualization, postgraduate education.
References:
64. K. Szczucki, “Ethical legitimacy of criminal law”, International Journal of Law, Crime and Justice, 53, 2018, pp. 67-76.
65. L.S. Miller, J.T. Whitehead, “Chapter 14: Innovations and Predictions in Criminal Justice”. Report Writing for Criminal Justice
Professionals (Fourth Edition), 2011, pp. 283-297.
66. Dzh. Fletcher, A.V. Naumov, “Osnovnye koncepcii ugolovnogo prava”. Moscow, 1998, p. 512.
67. J.M. Pollock, Criminal Law. 2009. LexisNexis, Anderson Pub., p. 897.
68. F.A. Kuzin, “Dissertaciya: prakticheskoe posobie dlya doktorantov, aspirantov i magistrantov”. Moscow, 2008, pp. 38.
69. S.A. Lebedev, “Filosofiya nauki”: nauchnoe izdanie. Moscow, 2000, pp. 553-555.
70. N. Prior, “Part III: List of Graduate Programs in Criminal Justice and Criminology in Canada, Alphabetical by School Name”: (Information
taken directly from school/department websites). Graduate Study in Criminology and Criminal Justice, 2015, pp. 445-458.
71. E.A. Kirillova, R.A. Kurbanov, N.V. Svechnikova, T.E. Zul'fugarzade, S.S. Zenin, “Problems of fighting crimes on the internet”, Journal of
Advanced Research in Law and Economics, 8(3), 2017, pp. 849-856.
72. N.I. Zagorodnikova, S.V. Borodina, V.F. Kirichenko, “Ugolovnoe pravo. Chast' Obshchaya”. Moscow, 1966, pp. 243 -249.
73. J. Crystal, “Criminal justice in the Middle East”, Journal of Criminal Justice, 29(6), 2001, pp. 469-482.
74. T. Schröder, “Corporate crime, the lawmaker's options for corporate criminal laws and Luhmann's concept of “useful illegality ”,
International Journal of Law, Crime and Justice, 57, 2019, pp. 13-25.
75. S. Sitnikova, “Neokonchennoe prestuplenie i ego vidy”. Moscow, 2002, pp. 6-8.
76. N. Persak, “Beyond public punitiveness: The role of emotions in criminal law policy”, International Journal of Law, Crime an d Justice, 57,
2019, pp. 47-58.
77. Yu.E. Prohorov, “Vpoiskah koncepta: nauchnoe izdanie”. Moscow, 2009, p. 13-19.
78. K.V. Wright, “Twenty-two years of federal investment in criminal justice research: The National Institute of Justice, 1968–1989”, Journal of
Criminal Justice, 22(1), 1994, pp. 27-40.
79. A.A. Gricanov, “Vsemirnaya enciklopediya: Filosofiya”. Moscow, 2001, p. 506.
80. S. Shavell, “Law and Economics”, International Encyclopedia of the Social & Behavioral Sciences, 2015, pp. 448-453.
81. H. Ditrich, “Cognitive fallacies and criminal investigations”, Science & Justice, 55(2), 2015, pp. 155-159.
82. L.M. Levett, A.M. Thompson, “Law and Society”, International Encyclopedia of the Social & Behavioral Sciences, 2015, pp. 509 -514.
83. M. Catino, “Mafia rules. The role of criminal codes in mafia organizations”, Scandinavian Journal of Management, 31(4), 2015, pp. 536-
548.
Paper Title: Hematological Parameters of Boars-Producers at Use of a Natural Mineral Additive in a Diet
Abstract: The aim of the research was to study the morphological and biochemical indicators of the blood of
boars-producers using in the diet of a natural mineral additive-bischofite of the Volgograd field. To conduct
scientific and economic experience, four groups of boars-producers of 5 animals each were formed. In the
experiment, boars-producers of the control group received the main diet, and I, II and III experimental groups – in
addition to the main diet, respectively, 5, 8 and 11 ml per animal per day of natural bischofite. Against the
background of scientific and economic experience, studies were carried out to study hematological parameters in
experimental boars of comparable groups. The results of the research showed that the hematological parameters in
the boars of the producers of the compared groups were within the physiological norm and characterized the normal
activity of all organs and systems. Compared with animals of the control group, at the end of the main period, after
testing the blood of the boars of the experimental groups, the number of erythrocytes was higher by 2.77-6.77%,
hemoglobin - by 0.80-2.95%, and the total protein content in blood serum was higher by 0.87-1.57%, albumin by
2.44-6.50% . The boars of the experimental groups exceeded the albumin-globulin coefficient of the animals of the
control group by 2.56-8.97%. The content of inorganic magnesium in the blood serum of the boars-producers of the
experimental groups, compared with the control, was 0.14 more; 0.20 and 0.24 mmol / L. According to the results
on the productive qualities of boars, the introduction of natural bischofite into the diets contributed to an increase in
ejaculate volume by 5.0-7.81%; increased sperm cell concentration in 1 ml of sperm - by 2.79-5.12%, sperm
activity - by 2.27-6.82%, in comparison with the control. The use of bischofite in the diet of boars, in comparison
with the control, contributed to the economic effect due to the cost of additional sperm production - 14080.0 -
22848.0 rubles. At the same time, the best results in terms of hematological and productive indicators of boars-
producers, economic efficiency were achieved when bischofite was included in the diet at a dose of 8 ml per boar
per day.
672.
Keyword : boars-producers, diet, bischofite of the Volgograd field, hematological parameters, sperm production
quality, economic efficiency. 3837-
3841
References:
1. D.K. Kulik, A.T. Varakin, V.V. Salomatin, E.A. Harlamova, “Influence of feed additives on productive indicators of ram”,
Ecological and meliorative aspects of environmental management: materials of the International Scientific and Practical
Conference. Volgograd: FSBI VO Volgograd SAU, vol. 4, 2017, pp. 259-264
2. G.R. Fenwick, “The assessment of a new protein source – Rapeseed”, Proc. Nutr. Soc, vol. 41, 1982, pp. 277-288.
3. S.A. Miroshnikov, E.V. Yausheva, E.A. Sizova, E.P. Miroshnikova, V.I. Levahin, “Comparative assessment of effect of copper
nano- and microparticles in chicken”, Oriental Journal of Chemistry, vol. 31(4), 2015, pp. 2327-2336.
4. V.S. Zoteev, E.I. Pisarev, S.I. Nikolaev, V.V. Salomatin, A.T. Varakin, “False flax cake in mixed feed for the fatten ing of lactating
cows and dairy stores”, Research Journal of Pharmaceutical, Biological and Chemical Sciences, vol. 9(5), 2018, pp. 1422-1428.
5. H.B. Baymishev, A.A. Perfilov, O.N. Pristyajnyuk, N.N. Edrenin, “Reproductive and productive qualities of primary heifers obtained
from cows under conditions of intensive technology”, Izvestiya of Samara state agricultural Academy, vol. 1, 2009, pp. 22-24.
6. H.Z. Valitov, S.V. Karamaev, “Productive longevity of cows in conditions of intensive milk production technolog y”, Samara: RIC
SGSHA, 2012.
7. A.P. Korobov, A.A. Vasilev, “The effectiveness of the use of starter feed in feeding prenursery pigs”, Reports of Russian Academy of
Agricultural Sciences, vol. 3, 2001, p. 43
8. S.I. Nikolaev, V.N. Struk, S.V. CHehranova, A.V. Nikishenko, “Influence of mustard protein-containing feed concentrate “Gorlinka”
on milk production of cows”, News of the Nizhnevolzhskyagrouniversity complex: science and higher professional education, vol.
4(48), 2017, pp. 205-212.
9. G.A. Simonov, V.M. Kuznetsov, V.S. Zoteev, A.G. Simonov, “Organization of complete feeding of dairy cows in the Sakhalin
region”, Scientific and practical ways to improve environmental sustainability and socio-economic support for agricultural
production: materials of the International Scientific and Practical Conference, with. Solenoye Zaymische: FSBI “Pre-Caspian
Research Institute of Arid Farming”, 2017, pp. 1369-1371.
10. I.F. Gorlov, V.I. Levakhin, V.F Radchikov, V.F. Tsai, S.E. Bozhkova, “Еffect of feeding with organic microelement complex on
blood composition and beef production of young cattle”, Modern Applied Science, vol. 9(10), 2015, pp. 8-16.
11. A.T. Varakin, V.V. Salomatin, E.A. Harlamova, T.A. Varlamova, “The efficiency of milk production using flax and rapeseed
millcake”, Izvestiya of Samara state agricultural Academy, vol. 13, 2018, pp. 30-34
12. A.M. Uhtverov, Kh.B. Baymishev, I.N. Khakimov, M.A. Kohanov, V.S. Grigoryev, A.T. Varakin, “Duration of economic use of
breeding sows with the different levels of fat depth and early maturity”, Research Journal of Pharmaceutical, Biological and
Chemical Sciences, vol. 9(5), 2018, pp. 935-942.
13. V.M. Kulikov, A.G. Korotkov, V.V. Salomatin, A.T. Varakin, “Complex mineral dressing for animals - Volgograd bischofite”,
Zootechnics, vol. 1, 1993, pp. 29-32
14. A.T. Varakin, V.V. Salomatin, O.V. CHeprasova, D.V. Nikolaev, “Physiological indicators and meat productivity of young pigs f or
fattening with the inclusion of the feed additive Bishtreon in the rations”, Zootechnics, vol. 3, 2012, pp. 20-22
15. V .Salomatin, A. Varakin, M. Salomatina, “Bishofit in pigs feeding”, Animal husbandry of Russia, vol. 6, 2015, pp. 27-28
16. V. Salomatin, A. Ryadnov, A. Shperov, “Meat productivity and biochemical blood parameters of pigs with feed additives of
selenium-organic preparations into rations”, Chief livestock specialist, vol. 2, 2010, pp. 32-35
17. C.F. Nascimento, R.H. Branco, S.F. Bonilha, J.N. Cyrillo, J.A. Negrão, M.E. Mercadante, “Residual feed intake and blood variables
in young Nellore cattle”, Journal of Animal Science, vol. 93(3), 2015, pp. 1318-1326.
18. V.V. Salomatin, A.T. Varakin, D.A. Zlepkin, “The effect of natural bischofite on the morphological and biochemical blood
parameters of fattened pigs”, Pig production, vol. 2, 2012, pp. 68-70
19. W.R. Butler, J.J. Calaman, S.W. Beam, “Plasma and milk urea nitrogen in relation to pregnancy rate in lactating dairy cattle”,
Journal of Animal Science, vol. 74(4), 1996, pp. 858-865.
20. C.A. Lents, L.A. Rempel, J. Klindt, T. Wise, D. Nonneman, B.A. Freking, “The relationship of plasma urea nitrogen with growth
traits and age at first estrus in gilts”, Journal of Animal Science, vol. 91(7), 2013, pp. 3137-3142.
21. V.V. Salomatin, A.A. Ryadnov, T.A. Ryadnova, “Physiological indicators of fattened pigs with using biologically active preparations
in diets”, Feeding farm animals and fodder production, vol. 6, 2012, pp. 39-41.
Keyword : market, competition, demand, supply, price, marketing, production and marketing organizations,
Russia.
References:
1. Minakov I.A. “Formirovanie i razvitie agroprodovolstvennogo rynka” [Formation and Development of the Agri-Food Market].
Michurinsk: Publishing House of the Michurinsk State Agrarian University, 2013, p. 225.
2. Minakov I.A., Kvochkin A.N., Sabetova L.A. “Ekonomika agroprodovolstvennogo rynka” [Economics of the Agri-Food Market].
Moscow: INFRA-M. 2014, p. 232.
673. 3. Sharapova N.V. “Gosudarstvennoye regulirovaniye agroprodovolstvennogo rynka: antimonopolnye protsessy” [State Regulation of t he
Agri-Food Market: Antimonopoly Processes]. Economics of Agricultural and Processing Enterprises, 11, 2017, pp. 10–14.
4. Minakov I.A. “Osobennosti formirovaniya i funktsionirovaniya agroprodovolstvennogo rynka” [Peculiarities of Forming and Functioning
3842-
of the Agri-Food Market]. Economics of Agricultural and Processing Enterprises, 4, 2014, pp. 63–65. 3847
5. Kulikov N. “Problemy importozameshcheniya plodovo-yagodnoy produktsii na agroprodovolstvennom rynke Rossii” [Problems of Import
Substitution of Fruit and Berry Products on the Agri-Food Market of Russia], AIC: Economics, Management, 6, 2015, pp. 3–12.
6. Gosudarstvennaya programma razvitiya selskogo hozyaystva i regulirovaniya rynkov selskokhozyaystvennoy produktsii, syrya i
prodovolstviya na 2013 – 2020 gody. Postanovleniye Pravitelstva Rossiyskoy Federatsii No. 717 ot 14 iyulya 2012 g. [State Program for
the Development of Agriculture and Regulation of Agricultural Products, Raw Materials and Food Markets for 2013 – 2020. Decree of the
Government of the Russian Federation No. 717 dated July 14, 201].
7. Zhidkov S.A. “Theoretical Aspect of Development of Market Environment In Grain Farming”, The Journal of Social Sciences Research,
Special issue December, 2018, pp. 85–89.
8. Maslova V.V., Kibirov A.Ya. “Nauchnye osnovy formirovaniya tsen v APK” [Scientific Fundamentals of Price Formation in the Agro-
Industrial Complex], Economics, Labor, Management in Agriculture, 11, 2018, pp. 8–13.
9. Kibirov A.Ya. “O regulirovanii agroprodovolstvennogo rynka stran Yevropeyskogo Soyuza v usloviyakh globalizatsii” [On Regulating the
Agri-Food Market of the Countries of the European Union in the Context of Globalization], Economics, Labor, Management in
Agriculture, 2, 2016, pp. 21–25.
10. Nuraliev S.U. “Torgovo-ekonomicheskaya politika i problemy importozameshcheniya na prodovolstvennom rynke” [Trade and Economic
Policy and the Problems of Import Substitution in the Food Market]. Economics of Agricultural and Processing Enterprises, 1, 2018, pp.
2–5.
11. Kulikov I., Minakov I. “A Socio-economic Study of the Food Sector: The Supply Side”, European Research Studies Journal, Vol. XXI, Is.
4, 2018, pp. 175–184.
12. Solopon V.A., Minakov I. A. “Food Safety in the Sphere of Production and Consumption of Vegetable Products”, International Jo urnal of
Engineering & Technology, 7 (4.38), 2018, pp. 523 – 527.
13. Polunin N.Yu. “Marketingovy podkhod k formirovaniyu infrastruktury agroprodovolstvennogo rynka” [Marketing Approach to Forming
the Infrastructure of the Agri-Food Market], Economics, Labor, Management in Agriculture, 2, 2018, pp. 106–111.
14. Romanyuk M.A. Mukhametzyanov R.R., Gruziy S.V. “Sovremennoye sostoyaniye i problemy razvitiya selskokhozyaystvennogo
proizvodstva i agroprodovolstvennogo rynka Rossii” [The Current State and Problems of the Development of Agricultural Production and
the Agri-Food Market of Russia], Economics of Agricultural and Processing Enterprises, 6, 2018, pp. 18–23.
15. Stavtsev A.N., Khashir A.A., Koroleva Yu.M., Natarov D.S., Romanenko R.G. “Metodicheskiye podkhody k otsenke
konkurentosposobnosti na rynke agroprodovolstvennoy produktsii” [Methodological Approaches to Assessing Competitiveness in the
Agri-Food Market], Economics, Labor, Management in Agriculture, 1, 2019, pp. 4–14.
Keyword : artificial forests, species diversity, dominance structure, community stability, ecological structure,
life form.
References:
1. V.M. Berezina, “Izmenenie entomofauny pochv v svyazi s perekhodom iz uslovii stepi v usloviyakh lesa” [Entomofauna change of soils in
connection with the transition from steppe conditions to forest conditions]. “Entomologicheskoe obozrenie” [Entomological Review],
27(1-2), 1937, pp. 77-112.
2. S.I. Sigida, “O nekotorykh osobennostyakh fauny zhuzhelits polezashchitnykh lesopolos razlichnogo vozrasta na Stavropo le” [About some
features of the fauna of ground beetles of field-protecting forest belts of various ages in the Stavropol Territory]. “Novye problemy
zoologicheskoi nauki i ikh otrazhenie v vuzovskom prepodavanii” [New problems of zoological science and th eir reflection in university
teaching], 1, 1979, pp. 155-156.
3. M.I. Shishova, “Zhuzhelitsy lesonasazhdenii v usloviyakh rekreatsii” [Ground beetles in recreation conditions]. Materials of scientific and
methodological meeting of pedagogical zoologists, 1, 1990, pp. 305-307.
4. I.Kh. Sharova, M.Yu. Romankina, “Naselenie zhuzhelits (Coleoptera, Carabidae) v yablonevykh sadakh i prilegayushchikh
agrolandshaftakh severnoi lesostepi Rossii. Monografiya” [Ground beetle population (Coleoptera, Carabidae) in apple gard ens and
adjacent agrolandscapes of the northern forest-steppe of Russia. Monograph], 2001, p. 162 .
5. M.Yu. Romankina, “Strukturnaya organizatsiya naseleniya zhuzhelits (Coleoptera, Sarabidae) lesopolos Tambovskoi oblasti” [Structural
organization of the ground beetle population (Coleoptera, Sarabidae) of the forest belts in the Tambov region]. “Problemy regionalnoi
ekologii” [Problems of regional ecology], 5, 2009, pp. 92-98.
6. M.Yu. Romankina, A.A. Popova, T.V. Shalamova, “Ekologo-faunisticheskaya struktura naseleniya zhukov-zhuzhelits (Coleoptera, 3848-
Sarabidae) lesopolosy v raione gorodskoi svalki” [Ecological and faunistic structure of the population of ground beetles (Coleoptera,
Sarabidae)) of the forest belt in the area of the city refuse dump]. “Vestnik Tambovskogo universiteta: nauchno-teoreticheskii i 3851
prakticheskii zhurnal” [News of Tambov University: scientific-theoretical and practical magazine], 12(1), 2007, pp. 183-186.
7. K.V. Arnoldi, T.S. Perel, I.Kh. Sharova, “Vliyanie iskusstvennykh lesnykh nasazhdenii na pochvennykh bespozvonochnykh glinistoi
polupustyni” [Effect of artificial forests on soil invertebrates of the clay semi-desert] // “Zhivotnye iskusstvennykh lesnykh nasazhdenii v
glinistoi polupustyne” [Animals of artificial forests in the clay semi-desert], 1971, pp. 34-54.
8. R.S. Sigida, “Adaptatsii zhukov-zhuzhelits (Coleoptera, Carabidae) k edaficheskim faktoram v usloviyakh antropogennykh landshaftov
Tsentralnogo predkavkazya” [Adaptation of ground beetles (Coleoptera, Carabidae) to edaphic factors in the conditions of anthropogenic
landscapes of the Central Ciscaucasia]. Abstract of the dissertation of the doctor of biological sciences, 2010.
9. W. Tischler, “Synokologische Untersuchungen an der Fauna der Felder und Feldgeholze”, Zeitschrift für Morp hologie und Ökologie der
Tiere, 47, 1958, pp. 54-114.
10. T. Bonkowska, “The effect of shelterbelts on the distribution of Carabidae”, H Ecol. pol., 18(28), 1970, pp. 559-569.
11. H.S. Barber, “Traps for cave in habiting Insecta”, Journal of the Elisha Mitchell Scientific Society, 46(2), 1931, pp. 259-266.
12. E.A. Dunaev, “Metody ekologo-entomologicheskikh issledovanii” [Ecological and entomological research methods]. MosgorSYuN, 1997,
pp. 44.
13. V.P. Pristavko, “Informatsionnyi indeks vidovogo raznoobraziya kak kriterii dlya ekologicheskogo monitoringa (na primere zhuzhelits
Coleoptera, Carabidae)” [Information index of species diversity as a criterion for environmental monitoring (on the example of ground
beetles Coleoptera, Carabidae)]. “Biol. osnovy osvoeniya, rekonstruktsii i okhrany zhivotnogo mira Belorussii” [Biological foundations of
development, reconstruction and conservation of wildlife in Belarus]. Minsk, 1983, pp. 59.
14. Yu.A. Pesenko, “Printsipy i metody kolichestvennogo analiza v faunisticheskikh issledovaniyakh” [Principles and methods of quantitative
analysis in faunistic studies]. Science, 1982, pp. 288.
15. M.Z. Aubakirov, V.N. Domatsky, M.K. Mustafin, L.S. Selunskaya, M.A. Khassanova, G.M., E.N. Erenko, G.K. Khairov, “The
Technology of Preventing Ecological and Economic Damage Caused by Echinococcosis”, International Journal of Engineering and
Advanced Technology, 8(6), 2019, pp. 2933-2946.
16. E. Kryukova, N. Bodneva, T. Sribnaya, N. Filimonova, O. Vershinina, “The Development of the Restaurant Business in Russi a”, Journal
of Environmental Management and Tourism, 10(2), 2019, pp. 412-419.
17. M.V. Grafkina, B.N. Nyunin, E.Y. Sviridova, “Environmental Monitoring and Simulation of Infrasound Generating Mechanism of Tr affic
Flow”, J. Ecol. Eng. 20(7), 2019, pp. 90–97.
18. V.G. Tyurin, V.G. Semenov, D.A. Nikitin, A.V. Lopatnikov, I.N. Madebeikin, A.G. Koshchaev, O.V. Koshchaeva, “Stimulation of
Adaptogenesis in Aberdeen-Angus Calves for Improving Productive Qualities”, International Journal of Engineering and Advanced
Technology, 8(5), 2019, pp. 440-444.
Paper Title: Selecting General Entities for TOGAF’s Core Content Metamodel using Best Worst Method
Abstract: Enterprise Architecture (EA) Developments are often faced with metamodel complexity problem.
The data for metamodel exploration significantly affects the depth of an EA analysis. In practice, however, it is
limited by the scope, cost, time and quality. The entities in the EA initiation metamodel is crucial in forming an
optimal metamodel based on data completeness, time, cost, quality, and scope. In this study, entities in the EA
metamodel were selected from general entities in the TOGAF's core content metamodel, combined with various
standards related to the upstream petroleum industry. The entity selection methodology consists of two stages,
namely Preparation and Screening, as well as Analysis and Selection. Entity data are extracted from the needs of
the upstream petroleum industry. The analysis was done using the best worst method (BWM). The criteria are
based on the EA development goals of the Federation of Enterprise Architecture Professional Organizations. BWM
analysis produces a relatively meaningful ranking of the entities that forms as general entities in the core content
metamodel. This study proposes the methodology, ranking order of entities, and entities composition that form
general entities for the core content metamodel.
Paper Title: Influence of Fabric Parameterso Wicking Behaviour of Polyester/Lycra Knitted Fabrics
Abstract: Wicking is one of the important properties of fabrics which decide its utility. The sweat generated in
the body should be absorbed by the fabric as otherwise it may lead to skin diseases. It is advised that cotton fabrics
should be worn net to the skin in order to get comfort to the wearer. This article is concerned with wicking which
plays a vital role in determining comfort and moisture transport behavior of fabric and also into find out the effect
of four parameters of single jersey, rib and pique knitted structures on the wickability. Parameters taken for the
study were polyester cross-section, lycra denier used, plated structure and loop length.
Paper Title: Self-Compacting Concrete with Recycled Coarse Aggregate and Manufactured Sand
Abstract: This article mainly focused on the influence of recycle coarse aggregate and manufactured sand on
the properties of self compacting concrete (SCC). The main purpose of this research is reuse of recycled aggregate
in SCC and also to reduce use of fine aggregate by replacing manufactured sand. The SCC mixtures were prepared
with 0, 25, 50, 75 and 100% replacement of recycle coarse aggregate in natural coarse aggregate and M-Sand in
fine aggregate with a Water/Binder ratio of 0.36. Different test covering fresh properties of these SCC mixtures
were executed the results were compared with EFNARC guidelines and IS 10262:2019. The feasibility of utilizing
recycled aggregate and M-Sand in self compacting concrete has been examined and found that it is suitable for
concrete.
678. Keyword : Self compacting concrete, recycle coarse aggregate M-Sand, fresh properties.
3868-
References: 3873
1. IS 10262:2019 “Concrete Mix Proportioning” – Guidelines.
2. EFNARC – 2002 – Specifications and Guidelines for Self – Compacting Concrete.
3. C.Kou and C.S.Poon, Properties of self compacting concrete prepared with coarse and fine recycled concrete aggregates, Cement and
Concrete Composites, (2009), 31, pp- 622-627.
4. Khatib JM, Properties of concrete incorporating fine recycled aggregate, Cement and Concrete Research, (2009), 35 pp-763-769.
5. Zoran Jure Grdic, Gordana A, Tolicic – Curcic, Iva M.Despotovic, Nenad S.Ristic, Properties of self compacting concrete prepared with
coarse recycled aggregates, Construction and Building Materials, (2010), 24, pp-1129-1133.
6. Myle N, W.Choi and T.Abu – Lebdeh, Use of recycled aggregate and fly ash in concrete pavement, James American J Engineering and
Applied Sciences, (2011), 4(2), pp-201-208.
7. K.C.Panda and P.K.Bal, Properties of self compacting concrete prepared with coarse recycled aggregates, SciVerse Science Dir ect,
Procedia Engineering (2013), 51,pp- 159 -164.
8. Kamal M.M, Safan M.A, Etman,Z.A and Eldaboly E.A, Evaluating the fresh properties of recycled self compacting concrete over time,
International Journal of Current Engineering and Technology, (2013), 2(2), pp- 436-446.
9. S.Santos, P.R.da silva, J.de Brito, Self Compacting concrete with recycled aggregates – A literature review, Journal of Building.
Paper Title: Aerial and Under-water Dronal Communication: Potentials, Issues and Vulnerabilities
Abstract: The use of UAVs has been on the rise since the past decade. These UAVs are very versatile and can
be applied to several fields ranging from agriculture to military reconnaissance. Due to the immense functionality
of the UAVs, it has now become a very popular topic in Research. With the advent of Deep Learning and Machine
Learning the autonomous navigation functionalities have been improved but it still poses a challenge as navigating
a drone involves the integration of its software and hardware functionalities. This paper reviews both indoor and
outdoor navigation. Topics in navigation such as Control, Hardware, Algorithms, Path-Planning, and
communication are touched upon in this paper. The paper also presents a discussion on the Navigation of UAVs
using vision-based technologies, this technology encompasses the use of various sensors and cameras and integrate
it with the navigation system of the UAV to ensure the success of UAV’s operation. UAVs play a pivotal role in
networking, many applications have been developed which have UAVs as an important component in them. Their
applications include Urban computing, Internet of Things, Ubiquitous Computing to name a few. Safely operating a
UAV as a network node is not a simple task, these nodes are prone to various types of attacks. A new type of attack
introduced in this paper is termed as “Coagulation Attack”. This attack gets its name from the coagulation property
of fluids wherein fluids clot and their particles settle down. This paper explores the concept, issues, challenges and
research aspects of Coagulation attack. This paper also introduces the concept of Underwater Wireless
Communication. On a planet where 70% of the surface is covered in water, UWC has a lot of potentials to be
exploited. Moreover UWC is critical in many key areas of Maritime research, commerce, and surveillance. UWC is
used for experimental observation, data collection and analysis, underwater navigation, disaster prevention and
early detection warning of a tsunami. In addition, we summarize emerging technologies in the UWC, future
research directions and recommendations using fifth-generation (5G) communication techniques.
Keyword : Aerial Drone Communication, Under-water Drone communication, Coagulation Attack,
Vulnerabilities, Security Aspects
References:
1. Karthigeyan, P.; Raja, M.S.; Prabu, S.; Gnanaselvam, R. Flying robot-a drone for urban warfare. Pervasive Computing (ICPC), 2015
International Conference on. IEEE, 2015, pp. 1–4.
2. Cui, J.Q.; Phang, S.K.; Ang, K.Z.; Wang, F.; Dong, X.; Ke, Y.; Lai, S.; Li, K.; Li, X.; Lin, F.; others. Drones for cooperati ve search and
rescue in post-disaster situations. Cybernetics and Intelligent Systems (CIS) and IEEE Conference on Robotics, Automation and
Mechatronics (RAM), 2015 IEEE 7th International 433 Conference on. IEEE, 2015, pp. 167–174.
3. Avila, M.; Funk, M.; Henze, N. Drone navigator: Using drones for navigating visually impaired persons. Proceedings of the 17th
International ACM SIGACCESS Conference on Computers & Accessibility. ACM, 2015, pp. 327–328.
679. 4. Schneegass, S.; Alt, F.; Scheible, J.; Schmidt, A.; Su, H. Midair displays: exploring the concept of free-floating public displays. CHI’14
Extended Abstracts on Human Factors in Computing Systems. ACM, 2014, pp. 2035–2040.
5. Sharma and R. Kumar, “A cooperative network framework for multi-uav guided ground ad hoc networks,” Journal of Intelligent &
3874-
Robotic Systems, vol. 77, no. 3-4, pp. 629–652, 2015. 3885
6. E. AbdAllah, H. Hassanein, and M. Zulkernine, “A survey of security attacks in information-centric networking,” Comm. Surv. Tutorials,
IEEE, vol. 17, pp. 1441–1454, third quarter 2015.
7. L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han, and J. Wang, “Byzantine attack and defense in cognitive radio networks: A survey,” Comm.
Surv.Tutorials, IEEE, vol. 17, pp. 1342–1363, thirdquarter 2015.
8. S. Riazul Islam, D. Kwak, M. Humaun Kabir, M. Hossain, and K.-S. Kwak, “The internet of things for health care: A comprehensive
survey,” Access, IEEE, vol. 3, pp.678–708, 2015.
9. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, “Ensuring safety, security, and sustainability of mission-critical
cyber–physical systems,” Proceedings of the IEEE, vol. 100, no. 1, pp. 283–299, 2012.
10. K. Hartmann and C. Steup, “The vulnerability of uavs to cyber attacks- an approach to the risk assessment,” in Cyber Conflict (CyCon),
2013 5th International Conference on, pp. 1–23, IEEE, 2013.
11. M. Barrere, R. Badonnel, and O. Festor, “Vulnerability assessment in autonomic networks and services: A survey,” Commun. Sur.
Tutorials, IEEE, vol. 16, pp. 988–1004, Second 2014.
12. O. Zouhri, S. Benhadou, and H. Medromi, “A new adaptative security protocol for uav network,” in Advances in Ubiqu itous Networking
2, pp. 649–657, Springer, 2017.
13. Sharma and R. Kumar, “G-fanet: an ambient network formation between ground and flying ad hoc networks,” Telecommunication
Systems, pp. 1–24, 10.1007/s11235-016-0210-2, 2016.
14. Sharma and R. Kumar, “Teredo tunneling-based secure transmission between uavs and ground ad hoc networks,” International Journal of
Communication Systems, 10.1002/dac.3144, 2016
15. L. Negash, S.-H. Kim, and H.-L. Choi, “Distributed unknown-input- observers for cyber attack detection and isolation in formation flying
uavs,” arXiv preprint arXiv:1701.06325, 2017.
16. H. Sedjelmaci, S. M. Senouci, and M.-A. Messous, “How to detect cyber-attacks in unmanned aerial vehicles network?,” in Global
Communications Conference (GLOBECOM), 2016 IEEE, pp. 1–6, IEEE, 2016
17. Kim, B. Wampler, J. Goppert, I. Hwang, and H. Aldridge, “Cyber attack vulnerabilities analysis for unmanned aerial vehicles,” in
Infotech@ Aerospace 2012, p. 2438, 2012.
18. Abbaspour, K. K. Yen, S. Noei, and A. Sargolzaei, “Detection of fault data injection attack on uav using adaptive neural network,”
Procedia Computer Science, vol. 95, pp. 193–200, 2016.
19. [A. Sanjab, W. Saad, and T. Bas¸ar, “Prospect theory for enhanced cyber physical security of drone delivery systems: A networ k
interdiction game,” arXiv preprint arXiv:1702.04240, 2017
20. S. Zhou and Z. Wang, OFDM for underwater acoustic communications. John Wiley & Sons, 2014.
21. L. Lanbo, Z. Shengli, and C. Jun-Hong, “Prospects and problems of wireless communication for underwater sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 8, pp. 977–994, 2008.
22. Gussen, P. Diniz, M. Campos, W. A. Martins, F. M. Costa, and J. N. Gois, “A survey of underwater wireless communication techn ologies,”
J. Commun. Inform. Sys, vol. 31, no. 1, 2016.
23. Y. Y. Al-Aboosi, M. S. Ahmed, N. S. M. Shah, and N. H. H. Khamis, “Study of absorption loss effects on acoustic wave propagation in
shallow water using different empirical models,” 2006.
24. J. Huang, J. Sun, C. He, X. Shen, and Q. Zhang, “High-speed underwater acoustic communication based on ofdm,” in Microwave,
Antenna, Prop-agation and EMC Technologies for Wireless Communications, 2005. MAPE 2005. IEEE International Symposium on, vol.
2. IEEE, 2005, pp. 1135–1138.
25. L. Lanbo, Z. Shengli, and C. Jun-Hong, “Prospects and problems of wireless communication for underwater sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 8, pp. 977–994, 2008.
26. J. Wu, X. Ma, X. Qi, Z. Babar, and W. Zheng, “Influence of pulse shaping filters on papr performance of underwater 5g communication
system technique: Gfdm,” Wireless Communications and Mobile Com-puting, vol. 2017, 2017.
27. M. Lanzagorta, “Underwater communications,” Synthesis Lectures on Communications, vol. 5, no. 2, pp. 1–129, 2012.
28. H. Kaushal and G. Kaddoum, “Underwater optical wireless communi-cation,” IEEE access, vol. 4, pp. 1518–1547, 2016.
29. McGuire, K.; Coppola, M.; de Wagter, C.; de Croon, G. Towards autonomous navigation of multiple pocket-drones in real-world
environments. Intelligent Robots and Systems (IROS), 2017 IEEE/RSJ 442 International Conference on. IEEE, 2017, pp. 244–249.
30. Jaeger, K.; Bers, K.H. Image-based 3D scene analysis for navigation of autonomous airborne systems.Intelligent Robots and Computer
Vision XX: Algorithms, Techniques, and Active Vision. International 445 Society for Optics and Photonics, 2001, Vol. 4572, pp. 310–321.
31. Villar, M.Z.; Plaza, J.M.C. Fine 3D Path Following of a Quadcopter. Iberian Robotics conference. Springer, 2017, pp. 679–690.
32. Bertacchini, E.; Castagnetti, C.; Corsini, A.; De Cono, S. Remotely Piloted Aircraft Systems (RPAS) for high resolution topography and
monitoring: civil protection purposes on hydrogeological contexts. Earth 450 Resources and Environmental Remote Sensing/GIS
Applications V. International Society for Optics and 451 Photonics, 2014, Vol. 9245, p. 924515.
33. Meng, S.; Wen, Z.; Su, X.; Tang, W. A Self-Navigation Method with Monocular Plane Discovery. Vehicular Technology Conference
(VTC-Fall), 2017 IEEE 86th. IEEE, 2017, pp. 1–5.
34. Raimondi, F.; Trapanese, M.; Franzitta, V.; Di Dio, V. Identification of the inertial model for innovative semi-immergible USV (SI-USV)
drone for marine and lakes operations. OCEANS’15 MTS/IEEE Washington. IEEE, 2015, pp. 1–11.
35. Kim, J.; Lee, J.; Jeong, J.; Kim, H.; Park, J.S.; Kim, T. San: Self-adaptive navigation for drone battery charging in wireless drone
networks. Advanced Information Networking and Applications Workshops (WAINA), 459 2016 30th International Conference on. IEEE ,
2016, pp. 248–251.
36. Chakareski, J. Drone Networks for Virtual Human Teleportation. Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks,
Systems, and Applications. ACM, 2017, pp. 21–26.
37. Huang, Y.P.; Sithole, L.; Lee, T.T. Structure From Motion Technique for Scene Detection Using Autonomous Drone Navigation. IEEE
Transactions on Systems, Man, and Cybernetics: Systems 2017.
38. Von Stumberg, L.; Usenko, V.; Engel, J.; Stückler, J.; Cremers, D. From monocular SLAM to autonomous drone exploration. Mobile
Robots (ECMR), 2017 European Conference on. IEEE, 2017, pp. 1–8.
39. Esrafilian, O.; Taghirad, H.D. Autonomous flight and obstacle avoidance of a quadrotor by monocular SLAM. Robotics and Mechatronics
(ICROM), 2016 4th International Conference on. IEEE, 2016, pp. 240–245.
40. Saska, M.; Krajník, T.; Faigl, J.; Vonásek, V.; Prˇeucˇil, L. Low cost mav platform ar-drone in experimental verifications of methods for
vision based autonomous navigation. Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ International Conference on. IEEE, 2012,
pp. 4808–4809.
41. Gandhi, D.; Pinto, L.; Gupta, A. Learning to fly by crashing. arXiv preprint arXiv:1704.05588 2017.
42. Mhatre, V.; Chavan, S.; Samuel, A.; Patil, A.; Chittimilla, A.; Kumar, N. Embedded video processing and data acquisition for unmanned
aerial vehicle. Computers, Communications, and Systems (ICCCS), International Conference on. IEEE, 2015, pp. 141–145.
43. Bhatia, S.; Yang, H.; Zhang, R.; Höflinger, F.; Reindl, L. Development of an analytical method for IMU calibration. Systems, Signals &
Devices (SSD), 2016 13th International Multi-Conference on. IEEE, 2016, pp. 131–135.
44. Viet, H.N.; Kwon, K.R.; Kwon, S.K.; Lee, E.J.; Lee, S.H.; Kim, C.Y. Implementation of GPS signal simulation for drone securit y using
Matlab/Simulink. Electronics, Electrical Engineering and Computing (INTERCON), 2017 IEEE XXIV International Conference on.
IEEE, 2017, pp. 1–4.
45. Go, J.G.; Chung, J.Y. A compact LNA integrated antenna for global navigation satellite systems. 483 Radio-Frequency Integration
Technology (RFIT), 2017 IEEE International Symposium on. IEEE, 2017, pp. 229–231.
46. Zhang, E.; Zambrano, J.; Amrhar, A.; Landry, R.; Ajib, W. Design and implementation of a wideband radio using SDR for avionic
applications. Integrated Communications, Navigation and Surveillance Conference 487 (ICNS), 2017. IEEE, 2017, pp. 2D2–1.
47. Monterrosa, N.; Bran, C. Design and implementation of a motor control module based on PWM and FPGA for the development of a U AV
flight controller. Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), 2015 CHILEAN
Conference on. IEEE, 2015, pp. 783–789.
48. Murray, P.; Schukat, M. MAV based SLAM and autonomous navigation: A view towards efficient on-board systems. Signals and Systems
Conference (ISSC), 2017 28th Irish. IEEE, 2017, pp. 1–6.
49. Notarpietro, R.; De Mattia, S.; Campanella, M.; Pei, Y.; Savi, P. Detection of buried objects using reflected GNSS signals. EURASIP
Journal on Advances in Signal Processing 2014, 2014, 132.
50. Lineswala, P.L.; Shah, S.N.; Shah, R. Different categorization for jammer: The enemy of satellite navigation.Convergence in Technology
(I2CT), 2017 2nd International Conference for. IEEE, 2017, pp. 282–287.
51. Sato, S.; Anezaki, T. Autonomous flight drone for infrastructure (transmission line) inspection (2). 2017 International Conference on
Intelligent Informatics and Biomedical Sciences (ICIIBMS). IEEE, 2017, pp. 294–296.
52. Colorado, J.; Perez, M.; Mondragon, I.; Mendez, D.; Parra, C.; Devia, C.; Martinez-Moritz, J.; Neira, L.An integrated aerial system for
landmine detection: SDR-based Ground Penetrating Radar onboard an autonomous drone. Advanced Robotics 2017, 31, 791–808.
53. Scheerer, K. Airborne multisensor system for the autonomous detection of landmines 1996.
54. Tanzi, T.; Roudier, Y.; Apvrille, L. Towards a new architecture for autonomous data collection. The International Archives of
Photogrammetry, Remote Sensing and Spatial Information Sciences 2015, 40, 363.
55. Ghallabi, F.; Kawamura, A.; Pyo, Y.; Tsuji, T.; Kurazume, R. Control architecture for service drone in informationally structured
environment. System Integration (SII), 2015 IEEE/SICE International Symposium on. IEEE, 2015, pp. 611–618.
56. Lioulemes, A.; Galatas, G.; Metsis, V.; Mariottini, G.L.; Makedon, F. Safety Challenges in using AR. Drone to collaborate with humans in
indoor environments. Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environme nts.
ACM, 2014, p. 33.
57. Wang, Z.; Ding, R. The algorithm design and implementation of optical navigation device for UAV.Technology, Networking, Electronic
and Automation Control Conference (ITNEC), 2017 IEEE 2nd 517 Information. IEEE, 2017, pp. 389–393.
58. Aguilar, W.G.; Angulo, C.; Costa-Castello, R. Autonomous Navigation Control for Quadrotors in Trajectories Tracking. International
Conference on Intelligent Robotics and Applications. Springer, 2017, pp. 287–297.
59. Bregu, E.; Casamassima, N.; Cantoni, D.; Mottola, L.; Whitehouse, K. Reactive control of autonomous drones. Proceedings of the 14th
Annual International Conference on Mobile Systems, Applications, and Services. ACM, 2016, pp. 207–219.
60. Blazhko, V.; Kalinovsky, A.; Kovalev, V. Unmanned Aerial Vehicle (UAV): back to base without satellite navigation. Internatio nal
Conference on Pattern Recognition and Information Processing. Springer, 2016, pp. 140–149.
61. Zabihi, R.; Vaughan, R. Conformai axial-direction PIFA on a small cylinder. General Assembly and 528 Scientific Symposium of the
International Union of Radio Science (URSI GASS), 2017 XXXIInd. IEEE, 2017, pp. 1–2.
62. Babu, V.M.; Das, K.; Kumar, S. Designing of self tuning PID controller for AR drone quadrotor. Advanced Robotics (ICAR), 2017 18th
International Conference on. IEEE, 2017, pp. 167–172.
63. Krajník, T.; Vonásek, V.; Fišer, D.; Faigl, J. AR-drone as a platform for robotics research and education. International conference on
research and education in robotics. Springer, 2011, pp. 172–186.
64. Nitschke, C.; Minami, Y.; Hiromoto, M.; Ohshima, H.; Sato, T. A quadcopter automatic control contest as an example of interdisciplinary
design education. Control, Automation and Systems (ICCAS), 2014 14th International Conference on. IEEE, 2014, pp. 678 –685.
65. Ebeid, E.; Skriver, M.; Jin, J. A Survey on Open-Source Flight Control Platforms of Unmanned Aerial Vehicle. Digital System Design
(DSD), 2017 Euromicro Conference on. IEEE, 2017, pp. 396–402.
66. Zou, J.T.; Wang, C.Y.; Wang, Y.M. The development of indoor positioning aerial robot based on motion capture system. Advanced
Materials for Science and Engineering (ICAMSE), International Conference on. IEEE, 2016, pp. 380–383.
67. Hussein, A.; Al-Kaff, A.; de la Escalera, A.; Armingol, J.M. Autonomous indoor navigation of low-cost quadcopters. Service Operations
And Logistics, And Informatics (SOLI), 2015 IEEE International Conference on. IEEE, 2015, pp. 133–138.
68. Vílez, P.; Certad, N.; Ruiz, E. Trajectory generation and tracking using the AR. Drone 2.0 Quadcopter UAV. Robotics Symposium (LARS)
and 2015 3rd Brazilian Symposium on Robotics (LARS-SBR), 2015 12th Latin American. IEEE, 2015, pp. 73–78.
69. Spero, D.J.; Jarvis, R.A. Path planning for a mobile robot in a rough terrain environment. Robot Motion and Control, 2002. Ro MoCo’02.
Proceedings of the Third International Workshop on. IEEE, 2002, pp. 417–422.
70. Krishna, D.S.; Krithivasan, S.; Yadav, H.; Selvaraj, V. Aerial assisted path planning for terrestrial rover without complete environment
map. Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on. IEEE, 2015, pp.
1–7.
71. Madawalagama, S.; Munasinghe, N.; Dampegama, S.; Samarakoon, L. LOW COST AERIAL MAPPING WITH CONSUMER-GRADE
DRONES. 37th Asian Conference on Remote Sensing, Colombo, 2016.
72. Mac, T.T.; Copot, C.; Hernandez, A.; De Keyser, R. Improved potential field method for unknown obstacle avoidance using UAV in indoor
environment. Applied Machine Intelligence and Informatics (SAMI), 2016 IEEE 14th International Symposium on. IEEE, 2016, pp. 345–
350.
73. Chen, X.L.; Tang, Q.; Che, J. An indoor quadrotor locating and object-following algorithm using monocular vision. Intelligent Control and
Automation (WCICA), 2012 10th World Congress on. IEEE, 2012, pp. 4747–4753.
74. Ayadi, M.; Suta, L.; Scuturici, M.; Miguet, S.; Amar, C.B. A Parametric Algorithm for Skyline Extraction.International Conference on
Advanced Concepts for Intelligent Vision Systems. Springer, 2016, pp. 604–615.
75. Barajas, M.; Dávalos-Viveros, J.P.; Garcia-Lumbreras, S.; Gordillo, J.L. Visual servoing of uav using cuboid model with simultaneous
tracking of multiple planar faces. Intelligent Robots and Systems (IROS), 2013 566 IEEE/RSJ International Conference on. IEEE, 2013,
pp. 596–601.
76. Iacono, M.; Sgorbissa, A. Path following and obstacle avoidance for an autonomous UAV using a depth camera. Robotics and
Autonomous Systems 2018, 106, 38–46.
77. Yang, L.; Zhou, S.; Zhao, L.; Bi, G. A data-driven approach for monitoring forward velocity for small and lightweight drone. Aerospace
Electronics and Remote Sensing Technology (ICARES), 2015 IEEE International Conference on. IEEE, 2015, pp. 1–6.
78. Boddhu, S.K.; McCartney, M.; Ceccopieri, O.; Williams, R.L. A collaborative smartphone sensing platform for detecting and tra cking
hostile drones. Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IV. International Society for
Optics and Photonics, 2013, Vol. 8742, p. 874211.
79. Milani, S.; Memo, A. Impact of drone swarm formations in 3D scene reconstruction. Image Processing (ICIP), 2016 IEEE International
Conference on. IEEE, 2016, pp. 2598–2602.
80. Ibarra, L.M.R.; Freire, A.F.S.; Minango, S.N.R.; del RocíoVelasco, N.; Chang, E.O.; Chipantasi, D.J.M. Applying artificial vision
techniques and artificial neural networks to autonomous quadcopter landing. Ecuador Technical Chapters Meeting (ETCM), 2017 IEEE.
IEEE, 2017, pp. 1–6.
81. Dionisio-Ortega, S.; Rojas-Perez, L.O.; Martinez-Carranza, J.; Cruz-Vega, I. A deep learning approach towards autonomous flight in forest
environments. Electronics, Communications and Computers (CONIELECOMP), 2018 International Conference on. IEEE, 2018, pp. 139–
144.
82. Pestana, J.; Sanchez-Lopez, J.L.; De La Puente, P.; Carrio, A.; Campoy, P. A vision-based quadrotor multi-robot solution for the indoor
autonomy challenge of the 2013 international micro air vehicle competition. Journal of Intelligent & Robotic Systems 2016, 84, 601–620.
83. Yuan, C.; Recktenwald, F.; Mallot, H.A. Visual steering of uav in unknown environments. Intelligent Robots and Systems, 2009. IROS
2009. IEEE/RSJ International Conference on. IEEE, 2009, pp. 3906–3911.
84. Ström, D.P.; Bogoslavskyi, I.; Stachniss, C. Robust exploration and homing for autonomous robots. Robotics and Autonomous Sys tems
2017, 90, 125–135.
85. Godaliyadda, G.; Kwon, D.K.; Moore, D.; Cheng, V. A Sense and Avoid Algorithm using Surround Stereo Vision for Drones. Electronic
Imaging 2017, 2017, 29–34.
86. Pinage, F.; Carvalho, J.R.H.; Freitas, E.R.V.; de Queiroz Neto, J.P. Feature transform technique for combining landmark detec tion and
tracking of visual information of large rain forest areas. Robotics Symposium and Competition (LARS/LARC), 2013 Latin American.
IEEE, 2013, pp. 30–37.
87. Dena Ruiz, J.; Aouf, N. Unscented Kalman Filter for Vision Based Target Localisation with a Quadrotor. 14th International Con ference on
Informatics in Control, Automation and Robotics (ICINCO), 2017, pp.26–28.
88. Jung, S.; Cho, S.; Lee, D.; Lee, H.; Shim, D.H. A direct visual servoing-based framework for the 2016 IROS Autonomous Drone Racing
Challenge. Journal of Field Robotics 2018, 35, 146–166.
89. Raj, C.V.; Sree, B.N.; Madhavan, R. Vision based accident vehicle identification and scene investigation. IEEE Region 10 Sympo sium
(TENSYMP), 2017. IEEE, 2017, pp. 1–5.
90. J. Partan, J. Kurose, and B. N. Levine, “A survey of practical issues in underwater networks,” ACM SIGMOBILE Mobile Computing and
Communications Review, vol. 11, no. 4, pp. 23–33, 2007.
91. N. Saeed, A. Celik, T. Y. Al-Naffouri, and M.-S. Alouini, “Underwater optical wireless communications, networking, and localization: A
sur-vey,” arXiv preprint arXiv:1803.02442, 2018.
92. Hayajneh, M.; Melega, M.; Marconi, L. Design of autonomous smartphone based quadrotor and implementation of navigation and
guidance systems. Mechatronics 2018, 49, 119–133.
93. Kuhnert, K.; Kuhnert, L. Light-weight sensor package for precision 3D measurement with micro UAVs EG 618 power-line monitoring.
Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci 2013, pp. 235–240.
94. Angelino, C.V.; Cicala, L.; Persechino, G.; Baccaglini, E.; Gavelli, M.; Raimondo, N. A sensor aided H.264 encoder tested on aerial
imagery for SFM. Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014, pp. 1194–1197.
95. Lesecq, S.; Foucault, J.; Birot, F.; de Chaumont, H.; Jackson, C.; Correvon, M.; Heck, P.; Banach, R.; di Matteo, A.; Di Palm a, V.; others.
INSPEX: design and integration of a portable/wearable smart spatial exploration system. 2017 Design, Automation & Test in Eur ope
Conference & Exhibition (DATE). IEEE, 2017, pp. 746–751.
96. Moran, O.; Gilmore, R.; Ordóñez-Hurtado, R.; Shorten, R. Hybrid Urban Navigation for Smart Cities. arXiv preprint arXiv:1705.01516
2017.
97. Kobayashi, T.; Seimiya, S.; Harada, K.; Noi, M.; Barker, Z.; Woodward, G.K.; Willig, A.; Kohno, R. Wireless technologies to a ssist search
and localization of victims of wide-scale natural disasters by unmanned aerial vehicles. Wireless Personal Multimedia Communications
(WPMC), 2017 20th International Symposium on. IEEE, 2017, pp. 404–410.
98. Jones, B.; Dillman, K.; Tang, R.; Tang, A.; Sharlin, E.; Oehlberg, L.; Neustaedter, C.; Bateman, S. Elevating communication,
collaboration, and shared experiences in mobile video through drones. Proceedings of the 2016 ACM Conference on Designing
Interactive Systems. ACM, 2016, pp. 1123–1135.
99. Lee, J. Optimization of a modular drone delivery system. Systems Conference (SysCon), 2017 Annual IEEE International. IEEE, 2017, pp.
1–8.
100. Habibi, J.; Gupta, A.; Carlsony, S.; Panicker, A.; Bertino, E. Mavr: Code reuse stealthy attacks and mitigation on unmanned aerial
vehicles. Distributed Computing Systems (ICDCS), 2015 IEEE 35th InternationalConference on. IEEE, 2015, pp. 642–652.
101. Silva, T.D.; Kahandagamage, R.; Sanjeewa, I.; Kulasinghe, C.; Ariyarathne, R. GENERATING MORE ACCURATE DIGITAL
ELEVATION MODELS INCORPORATING OFF THE SHELF GIS SOFTWARE BY USING DRONE IMAGERY. 2016.
102. Ozirkovskyy, L.; Pashchuk, Y.; Mashchak, A.; Volochiy, S. The automation of the exploitation risks assessment of the navigation
information system of air drones. Modern Problems of Radio Engineering. Telecommunications and Computer Science (TCSET), 2016
13th International Conference on. IEEE, 2016, pp. 140–144.
103. Vasconcelos, G.; Carrijo, G.; Miani, R.; Souza, J.; Guizilini, V. The impact of DoS attacks on the AR. Drone 2.0. Robotics Symposium
and IV Brazilian Robotics Symposium (LARS/SBR), 2016 XIII Latin American. IEEE, 2016, pp. 127–132.
104. Xiao, F.; Zhou, M.; Liye, Y.; Yang, J.; Wang, Q. Poster: Enabling secure location authentication in drone. Proceedings of the 23rd Annual
International Conference on Mobile Computing and Networking. ACM, 2017, pp. 600–602.
105. Matolak, D.W. Unmanned aerial vehicles: Communications challenges and future aerial networking.Computing, Networking and
Communications (ICNC), 2015 International Conference on. IEEE, 2015, pp. 567–572.
106. Lukas von Stumberg, Vladyslav Usenko, Jakob Engel, Jörg Stückler, Daniel Cremers “From Monocular SLAM to Autonomous Drone
Exploration” arXiv:1609.07835 [cs.RO]
107. Nitsche M., Pire T., Krajník T., Kulich M., Mejail M. (2014) Monte Carlo Localization for Teach-and-Repeat Feature-Based Navigation.
In: Mistry M., Leonardis A., Witkowski M., Melhuish C. (eds) Advances in Autonomous Robotics Systems. TAROS 2014. Lecture Not es
in Computer Science, vol 8717. Springer, Cham
108. Bashar Alhafni, Saulo Fernando Guedes, Lays Cavalcante Ribeiro, Juhyun Park, Jeongkyu Lee “Mapping Areas using Computer Vision
Algorithms and Drones” arXiv:1901.00211 [cs.CV]
Denis Alekseevich Maximov, Yurii Vladimirovich Mishin, Aleksandr Yurevich Mishin, Margarita
Authors:
Sergeevna Shakhova, Andrey Nikolaevich Zharov, Raisa Vasilievna Lopukhina
Paper Title: Entrepreneurship in Educational Organisations: Innovations and Technologies
Abstract: In the current context, organizations need to look for new innovative factors to improve the
efficiency of their activities. One of these alternative approaches to the contemporary organization and its
management is the concept of intra-organizational entrepreneurship or intrapreneurship.
The purpose of the present study is to justify the need to apply the concept of intrapreneurship in educational
institutions, and to analyze the main lines and forms of its development.
The article analyzes the concept of intrapreneurship considering its theoretical aspects in different socio-
economic areas.
The authors present the results of an empirical study of intrapreneurship in educational institutions analyzing
availability of intrapreneurship in comprehensive education institutions and offering the classification of
intrapreneurship areas in comprehensive education organizations, as well as determining the severity of the main
forms of intrapreneurship in each of these areas.
Paper Title: Reproductive Qualities of Romanov Sheep with Regard to the Paratypic Factors
Abstract: The article discusses the results of own studies of the authors, the literature data, and the best
practices of Romanov sheep breeding. The research was performed at the two Romanov sheep pedigree breeding
units in the Tver region, LLC Rassvet and LLC PF Pokrov. This breed has several advantages, such as the
possibility of insemination in any season, early maturing, multiparity, the quality of sheepskin, and the taste of the
lamb meat. The authors studied the productivity and the reproductive ability of ewes depending on the season, the
age of insemination, the live weight, the birth type of the lamb crop. More lambs are obtained in the lambings
during the autumn and winter from the ewes after three and more lambings. The survival rate is higher in the winter
and summer lambings. The optimal time of insemination is 12 – 13 months. At these farms, three lambings were
obtained in two years.
Keyword : the age at first insemination, birth type, ewes, lamb crop survival rate, lambs’ weaning, lambing, live
weight, polyestricity, reproductive ability, Romanov sheep.
References:
1. Kh. A. Amerkhanov, M. V. Egorov, and E. L. Revyakin, Aktualynye aspekty vedeniya ovtsevodstva i kozovodstva v sovremennyh usloviyah
[Relevant aspects of sheep and goats breeding in the modern conditions]. Moscow: FSBSI Rosinformagrotekh, 2012.
2. N. P. Sudarev, A. S. Abramyan, and D. Abylkasymov, Romanovskaya poroda ovets (Osnovy razvedeniya v tsentralynoj Rossii) [The
682. Romanov sheep breed (The basics of breeding in Central Russia)], 2nd ed., rev. and amend. Scientific and practical recommendations. Tver:
The Tver State Agricultural Academy, 2017. 3897-
3. E. A. Babich, N. A. Kikebayev, V. A. Raketsty and A. A. Baisakalov. (2019, June). Dependence of Growth and Development of Rearing 3901
Stock in Northern Kazakhstan on the Origin of Servicing Bulls. Agri Bio. Research Publishers. Vol. 24(1). Available:
http://agribiop.com/dependence-of-growth-and-development-of-rearing-stock-in-northern-kazakhstan-on-the-origin-of-servicing-bulls/
4. S. Kaldybayev, K. Kubenkulov, I. Alimaev and K. Erzhanova. (2019, June). The Modern State of Degraded Pastures in the Submontane
Semi-desert and Desert Zones of Kazakhstan. Agri Bio. Research Publishers. Vol. 24(1). Available: http://agribiop.com/the-modern-state-
of-degraded-pastures-in-the-submontane-semi-desert-and-desert-zones-of-kazakhstan/
5. I. Ju. Dominitsty, G. P. Demkin, V. V. Salautin and N. A. Pudovkin. (2019, June). Morphometric Characteristics of Pathological Processes
in the Lungs, Liver and Kidneys in Calves with Catarrhal Bronchopneumonia. Agri Bio. Research Publishers. Vol. 24(1). Available:
http://agribiop.com/morphometric-characteristics-of-pathological-processes-in-the-lungs-liver-and-kidneys-in-calves-with-catarrhal-
bronchopneumonia/
6. N. I. Kravchenko, “Zanimatysya ovtsevodstvom vygodno. Osnova rentabelynosti – mnogoplodie ovtsematok i intensivnoe vyraschivanie
yagnyat” [Sheep breeding is profitable. The bases of profitability are ewes' multiparity and intensive lamb growing], Animal Breeding in
Russia, vol. 6, 2014, pp. 7–9.
7. A. I. Erokhin, S. A. Erokhin, and E. A. Karasev, Intensifikatsiya vosproizvodstva ovets [Intensification of sheep reproduction]. Moscow:
Infra-M, 2012.
8. D. D. Arsenyev, and V. Y. Lobkov, “Problemy i perspektivy razvitiya romanovskogo ovtsevodstva” [Problems and perspectives of
Romanov sheep breeding development], Bulletin of the Agrarian and Industrial Complex of the Upper Volga region, vol. 3(23), 2013, pp.
27–31.
9. N. A. Fedorov, A. I. Erokhin, and L. S. Novikov, Romanovskoe ovtsevodstvo [Romanov sheep breeding]. Moscow: Agropromizdat, 1987.
10. A. I. Erokhin, E. A. Karasev, and S. A. Erokhin, Romanovskaya poroda ovets: Sostoyanie, sovershenstvovanie, ispolyzovanie genofonda
[The Romanov sheep breed: State, improvement and the use of the gene pool]. Moscow: FSSI Rosinformagrotekh, 2005.
11. B. Xiao-Dan, C. Ming-Xing, J. Hai-Guo, F. Li, and Y. Su-Cheng, “Estrogen receptor as a candidate gene for prolificacy of Small Tail Han
sheep”, Acta Genetica Sinica, vоl. 32, 2005, pp. 1060–1065.
Anna Geroldovna Bezdudnaya, Marina Gennadyevna Treyman, Tatyana Yuryevna Ksenofontova,
Authors:
Roman Valentinovich Smirnov, Alexey Valerevich Vasilchikov, Natalya Anatolyevna Loginova
Enhancing the Environmental Safety of The Region by Introducing Innovative Methods for Recycling
Paper Title:
of Production Biowaste
Abstract: The main specifics of poultry waste management, characteristic of the Russian Federation, have been
presented in the article. The goal of the study is to identify problems and ways of processing waste from the poultry
farm activities.
The situation with waste management has been analyzed in the article, and the specifics of the production
683. activities of the poultry farm have been considered by the example of the largest company in Russia, JSC Roskar.
Aside from technological specifics, the methods and processes for processing poultry droppings, the most common 3902-
in Russia and abroad, have been examined in detail. 3908
As a result, the most priority method for processing production biowaste has been defined as incineration to
produce a byproduct of biochar; the characteristics of the plant and its features have been defined based on the
waste composition and the amount of its formation as a result of agricultural activities.
Keyword : production waste management, incineration, biochar, poultry farm, waste recycling, recycling
principles.
References:
1. A. Bezdudnaya, O. Kadyrova, N. Zinchik, D.S. Iudin, P. Induchny, M. Treiman, “Actual issues related to organizing the work on the
market of services on collecting, transporting and cleaning liquid household waste in the private housing on the territory of the urban
agglomeration”, International Journal of Civil Engineering and Technology, 9(11), 2018, pp. 1738 – 1752
2. A.M. Bondarenko, V.P. Zabrodin, A.N. Kurochkin, “Mekhanizatsiya protsessov pererabotki navoza zhivotnovodcheskikh predpriyatiy v
vysokokachestvennyye organicheskiye udobreniya” [Mechanization of processing of manure from livestock enterprises into high -quality
organic fertilizers]. The Azov-Black Sea State Agroengineering Academy. Zernograd: ABSAA, 2010, p. 183.
3. Yu.I. Efimychev, Yu.O. Plekhova, V.N. Gubanov, “Organizatsionno-ekonomicheskoye obespecheniye razvitiya promyshlennykh
predpriyatiy” [Organizational and economic support for the development of industrial enterprises]: The Nizhny Novgorod State University
named after N.I. Lobachevsky. Nizhny Novgorod: Publishing House of the Nizhny Novgorod State University, 2010, p. 186.
4. V.G. Golubtsov, A.A. Tyulkin, A.V. Syatchikhin, “Problemy nauchno-tekhnicheskoy i innovatsionnoy politiki v Rossii” [Problems of
scientific, technical, and innovative politics in Russia]. USA: Sant Louis MOUSA Publishing house Science & innovation center, 2013,
pp. 79 – 103.
5. T.Yu. Ksenofontova, “Upravleniye konkurentosposobnostyu predpriyatiya na osnove vovlecheniya v khozyaystvennyy oborot
innovatsionnoyemkikh OIS” [Management of enterprise competitiveness based on the involvement of innovative-intensive intellectual
property items in the economic turnover]. Business in law, 2013, pp. 227 – 230.
6. O.A. Surzhko, M.A. Kulikova, “Ekologicheskaya bezopasnost pri pererabotke i utilizatsii kontsentrirovannykh po biogennym elem entam
zhidkikh otkhodov promyshlennykh predpriyatiy” [Environmental safety in the recycling and disposal of industrial nutrient liquid waste
from industrial enterprises concentrated by nutrient elements]. Ministry of Education and Science of the Russian Federation, The South
Russian State Technological University. Novocherkassk: SRSTU (NPI), 2011, p. 140.
7. A.M. Gonopolsky, A.V. Albegova, I.V. Kozlyakova, “Upravleniye potokami otkhodov” [Waste flow management]. Moscow: VESI, 2014,
p. 463.
8. A.Yu. Vinarov, A.A. Kukharenko, T.V. Ipatova, “Biotekhnologiya pererabotki otkhodov zhivotnovodstva i ptitsevodstva v
organicheskoye udobreniye” [Biotechnology for recycling waste from livestock and poultry farming into organic fertilizer]. Mo scow,
1998, p. 114.
9. V.I. Golik, E.V. Shevchenko, E.B. Ermishina, “Kontseptualnyye aspekty razvitiya promyshlennykh predpriyatiy sovremennoy Rossii”
[Conceptual aspects of the development of industrial enterprises in modern Russia]. Krasnodar: Southern Institute of Manageme nt, 2011,
p. 275.
10. R.E. Khabibullin, G.O. Ezhkova, O.A. Reshetnik, “Optimizatsiya biotekhnologicheskikh protsessov pererabotki otkhodov
agropromyshlennogo kompleksa” [Optimization of biotechnological processes for recycling agricultural waste]. Kazan: The Kazan
National Research Technological University, 2016, p. 199.
11. V.V. Ivanov, I.V. Ivanov, “Kompleksnaya pererabotka promyshlennykh otkhodov” [Complex recycling of industrial waste]. Ryazan: NP
"Golos gubernii", 2011, p. 472.
12. Glubokaya pererabotka biomassy i otkhodov selkokhozyaystvennogo proizvodstva [Deep recycling of biomass and agricultural wast e: a
scientific analytical review]. Moscow: The Federal State Budgetary Institution Rosinformagroteh, 2014, p. 250.
13. Yu.N. Kartushina, V.F. Zheltobryukhov, “Metody pererabotki tverdykh otkhodov” [Solid waste recycling methods]: Ministry of Ed ucation
and Science of the Russian Federation, The Volgograd State Technical University. Volgograd: VolgSTU, 2016, p. 96.
14. A.K. Timurbekova, “Pererabotka otkhodov pishchevoy promyshlennosti” [Food industry waste recycling]: study guide. Almaty: Nur-Print,
2014, p. 58.
15. N.N. Korneva, A.V. Molchanova, V.P. Lysenko, “Ekologicheskiye i ekonomicheskiye perspektivy razvitiya promyshlennogo
ptitsevodstva” [Environmental and economic prospects for the development of the industrial poultry farming]. All-Russian Research
Institution of Poultry Farming. Moscow: Voskhod-A, 2009, p. 207.
16. N.F. Timerbaev, R.G. Safin, A.R. Khisameeva, T.D. Iskhakov, “Sovershenstvovaniye tekhniki i tekhnologii protsessa gazifikatsi i
vysokovlazhnykh otkhodov” [Improving the techniques and technology of gasification of high-moisture waste]. Kazan: Kazan National
Research Technological University, 2013, p. 92.
17. D.A. Baeva, V.B. Chernov, “Upravleniye konkurentosposobnostyu promyshlennogo predpriyatiya” [Management of the competitivenes s
of an industrial enterprise – Chelyabinsk]: Abris-Print, 2010, p. 189.
18. Ya.I. Vaisman, V.N. Korotaev, L.V. Rudakova, “Upravleniye otkhodami. Mekhanobiologicheskaya pererabotka tverdykh bytovykh
otkhodov. Kompostirovaniye i vermikompostirovaniye organicheskikh otkhodov” [Waste management. Mechanobiological processing of
municipal solid waste. Composting and vermicomposting of organic waste]: The Perm National Research Polytechnic University, The
Federal Budgetary Research Institution, Research Institute of Ecology and State Environmental Protection named after A. N. Sysin of the
Ministry of Health of the Russian Federation. Perm: Publishing house of the Perm National Research Polytechnic University, 20 12, p. 224.
19. O.N. Klyukina, N.V. Nepovinnikh, E.V. Kuntashov, “Innovatsionnyye tekhnologii kompleksnoy pererabotki produktsii selskogo khoz-va i
yeyo otkhodov na territorii Rossiyskoy Federatsii” [Innovative technologies for the integrated recycling of agricultural prod ucts and their
waste in the Russian Federation]. Ministry of Agriculture of the Russian Federation, The Federal State Budgetary Educational
Establishment of Higher Professional Education “Saratov State Agrarian University named after N.I. Vavilov”. Saratov: Saratov source,
2015, p. 289.
Nikolay Mikhailovich Rebelsky, Valery Nikolaevich Alferov, Valery Valerevich Smirnov, Victor
Authors:
Nikolaevich Prasolov
Paper Title: Forming an Optimal Investment Portfolio
Abstract: The choice of the investor’s investment policy is determined by their capabilities and market
conditions. The formed investment portfolio has some positive specifics and advantages over other types of capital
investment. Portfolio investment allows not only to plan and evaluate the results of investment in various markets,
but also to control them in order to achieve high investment efficiency. An investment portfolio can be formed from
various market instruments of corporate stocks and bonds with varying degrees of security and risk, as well as
investing in other financial instruments. However, it is worth noting that investment portfolios with alternative
684. investments are increasingly common in practice.
3909-
3914
Keyword : risk, portfolio investment, assets, portfolio return, financial instruments.
References:
1. Н.М. Markowitz, “Portfolio Selection: Efficient Diversification of Investments”, Yale University Press, 1959, p. 344.
2. H.M. Markowitz, “Portfolio Selection”, The Journal of Finance, 7(1), 1952, pp. 77-91.
3. Н.М. Markowitz, “The Optimization of the Quadratic Function Subject to Linear Constrains”, Naval Research Logistic Quarterly, 3, 1956,
pp. 111-133.
4. J. Tobin, “The Theory of Portfolio Selection”, in: F. H. Hahn and F.R.P. Brechling, The Theory of Interest Rate. London: Macmillan,
1965, pp. 3-51.
5. J. Tobin, “Liquidity Preference as Behavior Towards Risk”, Review of Economic Studies, 25(2), 1958, pp. 65-86.
6. J. Mossin, “Equilibrium in Capital Assets Market”, Econometrica, 34(4), 1966, pp. 768-783.
7. Treynor, J.L. Market Value, Time, and Risk / J.L. Treynor. – Unpublished manuscript, 1961.
8. J.L. Treynor, “How to Rate Management of Investment Funds”, Harvard Business Review, 43(1), 1965, pp. 63 – 75.
9. W. Sharpe, A. Gordon, “Investments”. Moscow: Infra-M, 2015, p. 509.
10. W. Sharpe, “Portfolio theory and capital markets”, N.Y.: McGraw-Hill, 1970, p. 130.
11. W. Sharpe, “Asset allocation: Management style and performance measurement”, Journal of Portfolio Management, 18(2), 1992, pp . 7-19.
12. J. Lintner, “The Valuation of Risk Assets and the Selection of Risky Investments in Stock Portfolios and Capital Budgets”, Review of
Economics and Statistics, 47(1), 1965, pp. 13 – 37.
13. F. Modigliani, R.A. Cohn, “Inflation, rational valuation, and the Market”, Financial Analysts Journal, 35(2), 1979, pp. 24-44.
14. F. Modigliani, L. Modigliani, “Risk-adjusted performance: how to measure it and why”, Journal of Portfolio Management, 23(2), 1997, pp.
45-54.
15. S. Ross, “The Arbitrage Theory of Capital Asset Pricing”, Journal of Economic Theory, 13(3), 1976, pp. 341-360.
16. R. Roll, “A critique of the asset pricing theory’s tests: Part I: On past and potential testability of the theory”, Journal of Financial
Economics, 4(2), 1977, pp. 129-176.
17. R. Roll, “A possible explanation of the small firm effect”, Journal of Finance, 36(4), 1981, pp. 879-888.
18. E.F. Fama, M.H. Miller, “The Theory of Finance”, New York: Holt, Rinehart and Winston, 1972, p. 368.
19. E.F. Fama, K.R. French, “Common risk factors in the returns on stocks and bonds”, The Journal of Financial Economic s, 33(1), 1993, pp.
3-56.
20. A.S. Shapkin, V.A. Shapkin, “Ekonomicheskiye i finansovyye riski. Otsenka, upravleniye, portfel investitsiy” [Economic and financial
risks. Assessment, management, investment portfolio]: monograph. M.: Dashkov and Co., 2018, p. 544.
21. A.S. Shapkin, V.A. Shapkin, “Upravleniye portfelem investitsiy tsennykh bumag” [Managing the securities investment portfolio] :
Monograph. Moscow: Dashkov and Co., 2018, p. 512.
22. Yu.F. Kasimov, “Osnovy teorii optimalnogo portfelya tsennykh bumag” [Fundamentals of the theory of an optimal securities portfolio]:
monograph. Moscow: Filin, 2011, p. 142.
23. A.E. Abramov, “Investitsionnyye fondy. Dokhodnost i riski, strategii upravleniya portfelem” [Investment funds. Return and ris ks, portfolio
management strategies]. Moscw: Alpina Publisher, 2015, p. 311.
24. R. Gibson, “Formirovaniye investitsionnogo portfelya: upravleniye finansovymi riskami [Forming the investment portfolio: fina ncial risk
management]. Moscow: Alpina Publisher, 2015, p. 270.
25. M.A. Khalikov, “Osobennosti modeley upravleniya investitsionnym portfelem ne institutsionalnogo investora – fundamentalnyye
issledovaniya rossiyskogo fondovogo rynke” [Specifics of non-institutional investor investment portfolio management models]
fundamental research into the Russian stock market: fundamental research. Moscow: 2015, pp. 3136-3145.
26. R.C. Merton, “An Intertemporal Capital Asset Pricing Model”, Econometrica, 41(5), 1973, pp. 867-887.
27. R.C. Merton, “Optimum Consumption and Portfolio Rules in a Continuous-time Model”, Journal of Economic Theory, 3(4), 1971, pp.
373-413.
28. A.N. Burenin, “Upravleniye portfelem tsennykh bumag” [Securities portfolio management]: study guide. Moscow: NTO named after
Vavilov, 2008, p. 24.
29. A.N. Burenin, “Rynok tsennykh bumag” [Stock market]. Moscow: NTO, 2014, p. 35.
30. Official website of the Moscow Exchange. Available at: https://www.moex.com/
Keyword : Nanofluid, Resistance to the flow, Stenosis, Permeability constant, Magnetic Parameter, Porous
Medium .
685. References:
1. D.F. Young. Effects of a Time-Dependent Stenosis on Flow through a Tube. J. Eng. Ind., Trans ASME, vol. 90, pp. 248-254, May 1968. 3915-
2. B. E. Morgan and D. F. Young. An Integral Method for the Analysis of Flow in Arterial Stenoses. Bulletin of Mathematical Biology, vol.
36, pp. 39-53, Feb. 1974. 3921
3. D. MacDonald. On Steady Flow through Modeled Vascular Stenoses. Journal of Biomechanics, vol. 12, no. 1, pp. 13-201979.
4. N. Padmanabhan. Mathematical Model of Arterial Stenosis. Med. Biol. Eng. Comput., vol. 18, pp. 281-286, Aug. 1980.
5. J. B. Shukla, R. S. Parihar and B. R. P. Rao. Effects of Stenosis on Non-Newtonian Flow of the Blood in an Artery. Bull. Math. Biol.
Vol. 42, pp. 283-294, Jan. 1979.
6. Rashid Ali, Ramindar Kaur, V. K. Katiyar and M. P. Singh. Mathematical modelling of Blood Flow through Vetebral Artery with
Stenoses. Indian Journal of Biomechanics Special Issue, March 2009.
7. Ranadhir Roy, N. Daniel Riahi and Nelson Carrasquero. Mathematical Modeling of Blood Flow in an Artery with an Unsteady
Stenosis using Power-Law Fluid Model. SOP Transactions on Applied Mathematics, vol.1, no. 1 pp-2373-8480, July 2014.
8. K. Maruthi Prasad and G. Radhakrishnamacharya. Flow of Herschel-Bulkley Fluid through an Inclined Tube of Non-Uniform Cross-
Section with Multiple Stenoses. Arch. Mech., vol.60, no. 2, pp. 161-172, Warszawa 2008.
9. Gurju Awgichew and G. Radhakrishnamacharya. Effect of Slip Condition and Multiple Constrictions on Couple Stress Fluid Flow
through a Channel of Non Uniform Cross Section. ARPN Journal of Engineering and Applied Sciences, vol. 8, no. 5, May 2013.
10. Sapna Ratan Shah, S. U. Siddiqui and Anuradha Singh. Effects of Inclined Multi-Stenoses Arteries on Blood Flow Characteristics
Using Bingham Plastic Fluid. International Journal for Mathematics, vol. 1, pp. 7-14, Dec. 2015.
11. Raja Agarwal and N. K. Varshney. Pulsatile Flow of Herschel-Bulkley Fluid through an Inclined Multiple Stenoses Artery with Periodic
Body Acceleration. Pelagia Research Library, Advances in Applied Science Research, vol.7(3), pp.102-113, 2016.
12. Francesco Gentile, Paolo Decuzzi. Time Dependent Dispersion of Nanoparticles in Blood Vessels. J. Biomedical Science and
Engineering, vol. 3, pp. 517-524, April 2010.
13. Sohail Nadeem, Shagufta Ijaz and Noreen Sher Akbar. Nanoparticle Analysis for Blood Flow of Prandtl Fluid Model with Stenosis.
International Nano Letters, 2013.
14. R. Ellahi, S. U. Rahman, S. Nadeem and N. S. Akbar. Blood Flow of Nanofluid through an Artery with Composite Stenosis and
Permeable Walls. Appl. Nanosci., vol. 4, pp.919-926, Nov 2014.
15. Noreen Sher Akbar and M. T. Mustafa. Ferromagnetic Effects for Nanofluid Venture Through Composite Permeable Stenosed Arteries
with different Nanosize Particles. AIP Advances, vol. 5, June 2015.
16. S. U. S. Choi and J. A. Eastman. Enhancing Thermal Conductivity of Fluids with Nanoparticles, ASME International Mechanical
Engineering Congress & Exposition, New York, vol. 66, pp. 9-105, Nov. 1995.
17. T. M. Nabil El-dabe, M. Moatimid, A. Hassan, and R. Mostapha. Analytical Solution of the Peristaltic Flow of a Jeffrey Nanofluid in a
Tapered Artery with Mild Stenosis and Slip Condition. International Journal of Innovation and Applied Studies, vol.12, no.1, pp. 1-32,
July 2015.
18. K. Maruthi Prasad, N. Subadra and M. A. Srinivas. Peristaltic Transport of Nanofluid in an Inclined Tube. American Journal of
Computational and Applied Mathematics, vol.5(4), pp. 117-128, May 2015.
19. Rekha Bali, Nivedita Guptaa and Swati Mishra. Study of Transport of Nanoparticles with Power Law fluid Model for Blood Rheology
in Capillaries. Journal of Progressive Research in Mathematics, vol. 7, May 2016.
20. Bali, R. and Awasthi, U. (2011): “Mathematical model of blood flow in the small blood vessel in presence of magnetic field”, Applied
Mathematics, vol.2, pp. 264-269.
21. Tripathi, D. (2012): “A mathematical model for blood flow through an inclined artery under the influence of an inclined magnetic field, “
Journal of Mechanics in Medicine and Biology, vol. 12, pp. 1-18.
22. Bhatnagar, A., Shrivastav, R. K. and Singh, A. K. (2015): “ A numerical analysis for the effect of slip velocity and stenosis shape on
Non-newtonian flow of blood”, International Journal of Engineering, vol. 28 (3), pp. 440-446.
23. Jain, M., Sharma, G. C. and Singh, R. (2010): “Mathematical modelling of blood flow in a stenosed artery under MHD effect through
porous medium,” International Journal of Engineering, Transactions B, vol. 23, no. 3-4, pp. 243-252.
Oksana Holiuk, Ian Kurinnyi, Svetlana Kurinna, Nataliia Honchar, Viktoriia Rozghon, Valentyna
Authors:
Dogadina
Paper Title: Integrative Model for Enhancing Students' Competencies and the Quality of Educational Services
Abstract: The active introduction of digital technologies leaves its mark on all spheres of life, as well as on the
modern education system, in particular, the need to improve the quality of educational services forces us to look for
new teaching methods.
The opportunities provided by modern science to the young generation of teachers, in close interconnection with
the accumulated experience of traditional teaching systems, make it possible to significantly increase both the
effectiveness and quality of training and the competence of students.
The rhythm and dynamics of modern life necessitate the search for new approaches to traditional paradigms in
enlightenment. The capabilities of the digital age technologies make it possible to implement such training schemes
that were simply impossible with traditional approaches.
A flexible approach and a modular structure allow you to quickly adapt any training course to any needs, adding
and updating outdated information at no particular cost. Combined training systems fully realize all the advantages
of distance learning, which can significantly expand the geographical and time frames, making any course truly
universal.
686.
Keyword : Competencies, Educational Services, Integrative Model, Quality, Student.
3922-
References: 3928
1. Prokopenko, O., Holmberg, R., Omelyanenko, V., Information and communication technologies support for the participation of
universities in innovation networks (comparative study), Innovative Marketing, 2018, 14(3), pp. 17-29
2. Bashynska, I., Baldzhy, M., Ivanchenkova, L., Skliar, L., Nikoliuk, O., Tkachuk, G., Game risk management methods for investm ent
portfolio optimization, International Journal of Recent Technology and Engineering, 8(2), 2019, pp. 3940-3943.
3. Svitlana Bondarenko, Olena Laburtseva, Оlena Sadchenko, Vira Lebedieva, Oleksandra Haidukova, Tetyana Kharchenko, Modern Lead
Generation in Internet Marketing for the Development of Enterprise Potential, International Journal of Innovative Technology and
Exploring Engineering, Volume-8 Issue-12, October 2019, pp. 3066-3071 DOI: 10.35940/ijitee.L2477.1081219
4. Omar Ochoa, Salamah Salamah, An approach to enhance students' competency in software verification techniques, October 2015,
Conference: 2015, IEEE Frontiers in Education Conference (FIE) DOI: 10.1109/FIE.2015.7344050
5. Ella Graj et al., Enhancing student competency in risky clinical environments: Evaluating an online education program, Novemb er 2018,
Australian Psychologist, 54(1), DOI: 10.1111/ap.12364
6. Rudolf R. Sinkovics, Christopher Richardson, Yong Kyu Lew, Enhancing Student Competency and Employability in International
Business Through Master’s Dissertations, January 2016, Journal of Teaching in International Business, 26(4), DOI:
10.1080/08975930.2015.1130107
7. Yan Bai, Carol Taylor, Cyber defense competition: enhancing student competency in information security, Conference: SIGITE' 11 ACM
Special Interest Group for Information Technology Education Conference, West Point, NY, USA, October 20-22, 2011, October 2011,
DOI: 10.1145/2047594.2047675
8. Putrya Hawa, Interactive e-learning in pharmacology to enhance student competency in faculty of medicine UII, April 2009, DOI:
10.20885/JKKI.Vol7.Iss4.art7
Authors: Anatoly Maslov, Nataliia Spasiv, Borys Bezzubko, Iuliia Lazebnyk, Tetiana Nych, Lyudmila Ternova
Paper Title: A Systemic view of One-Pass Cryptographic Key Distribution Techniques for WSNs
Abstract: The availability and use of cheaper and smaller sensors has brought an evolution in the field of
Wireless Sensor Networks. The changes occurring in the environment can be observed, recorded through the large-
scale deployment of sensor nodes that can build-up the much-required information system. Also, they are able to
monitor and congregate data about the living organisms therein. In near future, millions more devices are expected
to be connected. We focus upon the security services required by WSNs that are most challenging as compared to
other networks. First, we introduce the commercially used motes with the comparison of technical and
implementation related issues. Second, we analysed the variants of existing one-pass key management protocols for
the resource constrained devices. Our aim is to provide a new direction to WSN Security through a restricted key
distribution mechanism.
Keyword : Forward Secrecy, Implicit Key Authentication, key distribution, Known/Unknown key Security,
Motes, One-pass key Establishment, Wireless Sensor Networks
References:
1. Knight, J. R., Allan, R. J., Folland, C. K., Vellinga, M., & Mann, M. E., “A signature of persistent natural thermohaline circulation
cycles in observed climate,” Geophysical Research Letters, Vol.32, no.20, 2005.
2. Kahn RHKJM and KSJ Pister, “Mobile networking for smart dust,” In ACM/IEEE International Conference on Mobile Computing
and Networking (MobiCom 99), Seattle, 1999.
688. 3. V Veena Madhuri, Syed Umar, and P Veeraveni, “A study on smart dust (mote) technology,” In International Journal of Science,
Engineering and Computer Technology, Vol.3, no.3, pp.124, 2013.
4. Chien-Chung Shen, Chavalit Srisathapornphat, and Chaiporn Jaikaeo, “Sensor information networking architecture and
3933-
applications,” IEEE Personal communications, Vol.8, no.4, pp. 52-59, 2001. 3942
5. Abu Zafar Abbasi, Noman Islam, Zubair Ahmed Shaikh, et al., “A review of wireless sensors and networks’ applications in
agriculture,” Computer Standards & Interfaces, Vol.36, no.2, pp. 263-270, 2014.
6. S Gowrishankar, TG Basavaraju, DH Manjaiah, and Subir Kumar Sarkar, “Issues in wireless sensor networks,” In Proceedings of the
World Congress on Engineering, Vol.1, pp. 978-988, 2008.
7. Luis Ruiz-Garcia, Loredana Lunadei, Pilar Barreiro, and Ignacio Robla, “A review of wireless sensor technologies and applications
in agriculture and food industry: state of the art and current trends”, In sensors, Vol.9, no.6, pp. 4728-4750, 2009.
8. Martin Turon, “Mote-view: A sensor network monitoring and management tool,” In the Second IEEE Workshop on Embedded
Networked Sensors, 2005, EmNetS-II., pp. 11-17, 2005.
9. Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci, “Wireless sensor networks: a survey,” In Computer
networks, vol.38, no.4, pp. 393–422, 2002.
10. Franck L Lewis, “Wireless sensor networks, Smart environments: technologies, protocols, and applications,” pp. 11-46, 2004.
11. Matthias Ringwald and Kay Romer, “Deployment of sensor networks: Problems and passive inspection,” In Intelligent Solutions in
Embedded Systems, 2007 Fifth Workshop on, pp. 179-192. IEEE, 2007.
12. Joseph M Kahn, Randy H Katz, and Kristofer SJ Pister, “Next century challenges: mobile networking for smart dust,” In Proceedings
of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 271-278, ACM, 1999.
13. Marcos Augusto M Vieira, Claudionor N Coelho, DC da Silva, and Jos´e Monteiro da Mata, “Survey on wireless sensor network
devices,” In Emerging Technologies and Factory Automation,” In Proceedings. ETFA’03. IEEE Conference, vol.1, pp. 537 -544.
IEEE, 2003.
14. Maxim A Batalin and Gaurav S Sukhatme, “Coverage, exploration and deployment by a mobile robot and communication network,”
In Telecommunication Systems, vol.26, no. (2-4), pp. 181-196, 2004.
15. Roger Wattenhofer, Li Li, Paramvir Bahl and Y-M Wang, “Distributed topology control for power efficient operation in multihop
wireless ad hoc networks,” In INFOCOM 2001. Twentieth annual joint conference of the IEEE computer and communications
societies. Proceedings. IEEE, vol.3, pp. 1388-1397, IEEE, 2001.
16. Micaz datasheet, MEMSIC, http://www.memsic.com/userfiles/files/Datasheets/WSN/micaz_datasheet-t.pdf, (accessed March 7,
2018).
17. Tmote Sky Datasheet, https://insense.cs.st-andrews.ac.uk/files/2013/04/tmote-sky-datasheet.pdf, (accessed March 7, 2019).
18. Imote2, Datasheet, (accessed March 7, 2019) http://wsn.cse.wustl.edu/images/e/e3/Imote2_Datasheet.pdf,
19. DC Jinwala, Dhiren R Patel, and KS Das Gupta, “A survey of the security issues in wireless sensor networks,” ADIT Journal of
Engineering, Vol.3, no.1, pp. 17-29, 2006.
20. K. CHELLI, “Security issues in wireless sensor networks: Attacks and countermeasures,” In Proceedings of The World Congress on
Engineering, vol.1, 2015.
21. Alfred J Menezes, Tatsuaki Okamoto and Scott A Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field,”
IEEE Transactions on Information Theory, Vol.39, no.5, pp. 1639-1646, 1993.
22. Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong, “Security in wireless sensor networks: issues and challenges,” In
8th International Conference Advanced Communication Technology, vol.2, pp. 1043-1048. IEEE, 2006.
23. Ahmad Salehi Shahraki, MA Razzaque, Parisa Naraei and Ali Farrokhtala, “Security in wireless sensor networks: issues and
challenges,” In Space Science and Communication (IconSpace), 2013 IEEE International Conference on, pp. 356-360, IEEE, 2013.
24. J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: A survey, Security in distributed, grid, mobile,
and pervasive computing,” Vol.1, pp. 367, 2007.
25. Mohamed-Lamine Messai, “Classification of attacks in wireless sensor networks,” arXiv:1406.4516, 2014.
26. K Abirami and B Santhi, “Sybil attack in wireless sensor network,” IJET, ISSN, pp. 0975-4024, 2013.
27. Cricket mote Datasheet, http://www.memsic.com/userfiles/files/Datasheets/WSN/6020-0082-02_a_cricket_kit-t.pdf, (accessed
January 7, 2019).
28. J.P. Kaps, G. Gaubatz, and B. Sunar, “Cryptography on a speck of dust,” IEEE Computer, Vol.40, no.2, pp. 38-44, 2007.
29. Whitfield Diffie and Martin Hellman, “New directions in cryptography,” IEEE transactions on Information Theory, Vol. 22, no.6 , pp.
644-654, 1976.
30. Ronald L Rivest, Adi Shamir, and Leonard Adleman, “A method for obtaining digital signatures and public-key cryptosystems,”
Communications of the ACM, Vol. 21, no.2, pp.120-126, 1978.
31. L. Eschenauer and V.D. Gligor, “A key-management scheme for distributed sensor networks,” In Proceedings of the 9th ACM
conference on Computer and communications security, pp. 41-47, ACM, 2002.
32. Taher ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” In Workshop on the Theory and
Application of Cryptographic Techniques, pp. 10-18, Springer, 1984.
33. Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz, “Comparing elliptic curve cryptography and
RSA on 8-bit CPUs,” In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 119-132. Springer, 2004.
34. E Munivel and GM Ajit, “Efficient public key infrastructure implementation in wireless sensor networks,” In International
Conference on Wireless Communication and Sensor Computing, ICWCSC-2010, pp.1-6, IEEE, 2010.
35. Benamar Kadri, Mohammed Feham and Abdallah Mahamed, “Lightweight pki for wsn mpki,” The Journal of Security and
Communication Networks, Vol.10, no. 2, pp. 135-141, 2010.
36. Haowen Chan, Adrian Perrig, and Dawn Song, “Random key predistribution schemes for sensor networks,” In Sec urity and Privacy,
2003. Proceedings. 2003 Symposium on, pp. 197-213, IEEE, 2003.
37. A Selva Reegan and E Baburaj, “Key management schemes in wireless sensor networks: a survey,” In Circuits, Power and
Computing Technologies (ICCPCT), International Conference on, pp. 813-820, IEEE, 2013.
38. R. Blom, “An optimal class of symmetric key generation systems,” In Workshop on the Theory and Application of of Cryptographic
Techniques, pp. 335-338, Springer,1984.
39. Jong-Myoung Kim, Joon-Sic Cho, Sung-Min Jung, and Tai-Myoung Chung, “An energy-efficient dynamic key management in
wireless sensor networks,” In The 9th International Conference on Advanced Communication Technology, vol.3, pp. 2148 -2153,
IEEE, 2007.
40. M.F. Younis, K. Ghumman, and M. Eltoweissy, “Location-aware combinatorial key management scheme for clustered sensor
networks,” IEEE transactions on Parallel and Distributed Systems, Vol.17, no.8, pp. 865–882, 2006.
41. Yiying Zhang, Xiangzhen Li, Jianming Liu, Jucheng Yang, and Baojiang Cui, “A secure hierarchical key man agement scheme in
wireless sensor network,” International Journal of Distributed Sensor Networks, SAGE, 2012.
42. Zhen Yu and Yong Guan, “A key management scheme using deployment knowledge for wireless sensor networks,” IEEE
Transactions on Parallel and Distributed Systems, Vol.19, no.10, pp. 1411-1425, 2008.
43. Dijiang Huang, Manish Mehta, Deep Medhi, and Lein Harn, “Locationaware key management scheme for wireless sensor networks,”
In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 29-42, ACM, 2004.
44. Mishra, M.R., Kar, J. and Majhi, B., “Practical deployment of one-pass key establishment protocol on wireless sensor
networks,” International Journal of Pure and Applied Mathematics, Vol.100, no.4, pp.531-542, 2015.
45. Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco and Rainer Steinwandt, “(password) authenticated key
establishment: from 2-party to group,” In Theory of Cryptography Conference, pp.499-514, Springer, 2007.
46. NIST Skipjack, “KEA algorithm specifications,” 1998.
47. Richard Ankney, Don Johnson, and M Matyas, “The unified model, Contribution to X9F1,” 1995.
48. Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas and Scott Vanstone, “An efficient protocol for authenticated key agreem ent,
Designs, Codes and Cryptography,” Vol.28, no.2, pp. 119-134, 2003.
49. Hugo Krawczyk, “HMQV: A high-performance secure diffie-hellman protocol,” In Annual International Cryptology Conference, pp.
546–566, Springer, 2005.
50. Konstantinos Chalkias, Spyros T Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides and Anastasios Alexiadis, “A provably
secure onepass two-party key establishment protocol,” In International Conference on Information Security and Cryptology, pp. 108-
122, Springer, 2008.
51. Yuan Wang, Duncan S Wong, and Liusheng Huang, “One-pass key establishment model and protocols for wireless roaming with
user anonymity,” International Journal of Network Security, Vol.16, no.2, pp.129-142, 2014.
52. Mishra, M.R., Kar, J. and Majhi, B., “Practical deployment of One-Pass key establishment protocol on wireless sensor
networks”. International Journal of Pure and Applied Mathematics, Vol 100, No.4, pp.531-542, 2015.
53. 53. M Choudary Gorantla, Colin Boyd, and Juan Manuel Gonz´alez Nieto, “Id-based one-pass authenticated key establishment,” In
Proceedings of the sixth Australasian conference on Information security, Vol.81, pp.39-46. Australian Computer Society, 2008.
Keyword : Deep Artificial neural network (D-ANN), Image Processing, Inverse Kinematics, MATLAB, Robotic
manipulator.
References:
1. Cianchetti, M., Arienti, A., Follador, M., Mazzolai, B., Dario, P., & Laschi, C. (2011). Design concept and validation of a robotic arm
inspired by the octopus. Materials Science and Engineering: C, 31(6), 1230-1239
2. Manzoor, S., Islam, R. U., Khalid, A., Samad, A., & Iqbal, J. (2014). An open- source multi-DOF articulated robotic educational platform
for autonomous object manipulation. Robotics and Computer-Integrated Manufacturing, 30(3), 351-362.
3. Guiochet, J., Tondu, B., & Baron, C. (2003, October). Integration of UML in human factors analysis for safety of a medical robot for
tele-echography. In Intelligent Robots and Systems, 2003.(IROS 2003). Proceedings. 2003 IEEE/RSJ International Conference on (Vo l.
4, pp. 3212-3217). IEEE.
4. Števo, S., Sekaj, I., & Dekan, M. (2014). Optimization of robotic arm trajectory using genetic algorithm. IFAC Proceedings Volumes,
47(3), 1748-1753.
5. R. K. Mittal, I. J. Nagrath, Book: Robotics and Control, Publisher: Tata Mc Graw Hill.
6. Shah Shubham k., Mishra, R. and Mohapatro G.S., “experimental and theoretical design analysis and modeling of a CT image guided
robotic arm” in International Conference on engineering applied science and technology. 978-1-5386-4956-5/18, July 2018
Paper Title: Project Scheduling using Event Based Scheduler with ABC
Abstract: Scheduling is the first and foremost step for every project implementation. Project scheduling could
be a mechanism to communicate what tasks has to be compelled to get done and which resources are going to be
allotted to finish those tasks in what timeframe. Project scheduling occurs during the planning phase of the project.
The problem comprises the correct assignment of employees to the various tasks that frame a software project,
casing in time and cost limitations. To accomplish this objective, this paper presents and discusses the EBS with
ACO, FCM clustering and EBS with ABC and the conclusions are drawn from it. First, to schedule human
resources to tasks we implement Event based scheduler with the Ant colony optimization algorithm (ACO) for
probabilistic optimization, second, for fast scheduling we implemented Fuzzy c means clustering to assign similar
data points of employees to clusters so that the searching space will be reduced. Third, for optimum scheduling we
apply Artificial Bee Colony algorithm with Event Based Scheduler. Artificial bee colony (ABC) is an optimization
algorithm based on stochastic calculation which has demonstrated good search capacities on numerous
advancement issues. Based on these findings we briefly describe the scheduling with FCM-EBS with ABC prompt
optimum values.
Keyword : Artificial Bee Colony (ABC), Event Based Scheduler (EBS), Fuzzy C Means (FCM), Resource
Constrain Project Scheduling (RCPS), task scheduling.
690.
References:
1. Yunning, Z., & Xixi, S. (2010, May). Research on improved PERT model in analysis of schedule risk of project. In E-Business and
E-Government (ICEE), 2010 International Conference on (pp. 2768-2771). IEEE. 3947-
2. Stelth, P., & Roy, G. L. (2009). Projects’ analysis through CPM (critical path method). School of Doctoral Studies (European Union) 3955
Journal, 1, 42.
3. Chand, S. (2016, November). Evolutionary algorithms for resource constrained project scheduling problems: Current issues & future
directions. In Region 10 Conference (TENCON), 2016 IEEE (pp. 2202-2204). IEEE.
4. Shen, X., Minku, L. L., Bahsoon, R., & Yao, X. (2016). Dynamic software project scheduling through a pro active-rescheduling
method. IEEE Transactions on Software Engineering, 42(7), 658-686.
5. Stylianou, C., Gerasimou, S., & Andreou, A. S. (2012, November). A novel prototype tool for intelligent software project scheduling
and staffing enhanced with personality factors. In Tools with Artificial Intelligence (ICTAI), 2012 IEEE 24th International
Conference on (Vol. 1, pp. 277-284). IEEE.
6. Yannibelli, V., & Amandi, A. (2011). A knowledge-based evolutionary assistant to software development project scheduling. Expert
Systems with Applications, 38(7), 8403-8413.
7. Chang, C. K., Jiang, H. Y., Di, Y., Zhu, D., & Ge, Y. (2008). Time-line based model for software project scheduling with genetic
algorithms. Information and Software Technology, 50(11), 1142-1154.
8. Padberg, F., & Weiss, D. (2011, December). Optimal Scheduling of Software Projects Using Reinforcement Learning. In Software
Engineering Conference (APSEC), 2011 18th Asia Pacific (pp. 9-16). IEEE.
9. Chen, W. N., & Zhang, J. (2013). Ant colony optimization for software project scheduling and staffing with an event-based
scheduler. IEEE Transactions on Software Engineering, 39(1), 1-17.
10. Minku, L. L., Sudholt, D., & Yao, X. (2014). Improved evolutionary algorithm design for the project scheduling problem based on
runtime analysis. IEEE Transactions on Software Engineering, 40(1), 83-102.
11. Chicano, F., Luna, F., Nebro, A. J., & Alba, E. (2011, July). Using multi-objective metaheuristics to solve the software project
scheduling problem. In Proceedings of the 13th annual conference on Genetic and evolutionary computation (pp. 1915-1922). ACM.
12. Chatzis, S.P., 2011.A fuzzy c-means-type algorithm for clustering of data with mixed numeric and categorical attributes employing a
probabilistic dissimilarity functional Expert Systems with Applications 38: 8684–8689.
13. 13. Tereshko,V.andAoengarov.(2005).Collective decision making in honey-bee foraging dynamics. Computing and
Information Systems, 9:1-7.
Authors: Seena Simon, A. Hemamathi, J. Jenishtalouis
Authors: Raikhan Sabirova, Dybys Zhanserikova, Gulmira Topanova, Uldar Autalipova, Arna Aplashova
693.
Paper Title: Model of Students’ Professional Competence Formation
Abstract: The paper is focused on the process of students’ professional competence formation. The major
emphasis is on the competencies related to social and educational activities in the context of the commercialization
of education. The authors’ biggest contribution is a specially designed model. It describes the formation of
students’ professional competence in social and educational activities. Professional competencies of students are a
qualitative integral manifestation of personal traits with a focus on social and educational activities. It includes a
certain level of individual development and the mastering of special knowledge, skills, and abilities, as well as self-
development that contribute to the successful implementation of professional activities in the context of the
commercialization of education. The formation of professional competencies is presented as a focused, systematic
process. There is much evidence that this process requires a systematic pedagogical, psychological, and special
knowledge to develop skills and abilities in organizing and conducting social and pedagogical work. The content of
this process is a complex activity targeting professionally significant qualities, the acquisition of systematized
knowledge and skills in the field of social pedagogical activity. The results of the study are of much importance for
practical use in the university. The proposed model allows identifying the levels of formation of students’
professional competencies.
Keyword : model, formation, professional competence, students, social and educational activities, the
commercialization of education.
References:
1. C. Zastrow, “Introduction to Social Work and Social Welfare”, Brooks/Cole Publishing Company, 1996, pp. 512-537.
2. M. Celce-Murcia, Z. Dörnyei, S. Thurell, “Communicative competence: A pedagogically motivated model with content specifications”,
Issues in Applied Linguistics, 6(2), 1995, pp. 5-35.
3. O.B. Budnik, “Social and Pedagogical Activity: A philosophical aspect of Otocentrics and Cognitive Pedagogy”, Domestic and foreign
pedagogy, 3, 2013, pp. 13-25.
4. E.M. Gorenkov, “Innovative potential as complete social and pedagogical system”, Moscow: Prometheus Publishing House, 2012. 3965-
5. Zh.K. Onalbek, V.V. Grinshkun, B.S. Omarov, B.Z. Abuseytov, E.T. Makhanbet, B.B. Kendzhaeva, “The Main Systems and Types of
Forming of Future Teacher-Trainers’ Professional Competence”, Life Science Journal, 10(4), 2013, pp. 2397-2400. 3971
6. E.K. Henner, “Information and Communication Competence of the Teacher: The Structure, Requirements and Measurement System”,
Computer Science and Education, 12, 2004, pp. 5-9.
7. Y. Utegenov, U. Assanova, K. Kilybayev, E. Uaidullakyzy, B. Muzdybayev, E. Danabekov, “Formation of Information and Professio nal
Competence of Primary School Teachers”, Life Science Journal, 11(10s), 2014, pp. 133-140.
8. E.V. Sibirskaya, O.A. Stroeva, “Key provisions, determinants and conditions of innovative development management”, Vestnik OrelGIET,
1, 2011, pp. 5-10.
9. Y.B. Omarov, D.G.-S. Toktarbayev, I.V. Rybin, A.Zh. Saliyeva, F.N. Zhumabekova, Sh. Hamzina, N. Baitlessova, J. Sakenov, “Methods
of Forming Professional Competence of Students as Future Teachers”, International Journal of Environmental and Science Education,
11(14), 2016, pp. 6651-6662.
10. K.M. Berkimbaev, B.T. Kerimbaeva, “Communicative competence of future specialist. European Science and Technology”, Materials of
the 2th International Research and Practice Conference 9-10 May, 2012.
11. Z. Zhumabaeva, A. Zhumasheva, T. Kenzhebayeva, J. Sakenov, A. Tleulesova, M. Kenenbaeva, Sh. Hamzina, “On the Role of Variational
Disciplines in the Formation of Professional Competence of Students as Future Teachers”, International Journal of Environmental and
Science Education, 11(15), 2016, pp. 6671-6686.
12. N.V. Mirza, “Creative Component of Professional Competence of a Teacher”, International Journal of Applied and Fundamental Study, 2,
2013. Available at: http://science-sd.com/455-24286
13. V.K. Sharma, (2015). “How does motivation influence Saudi students’ communicative competence?”, Rep Opinion 2015, 7(11), pp. 36-48.
doi:10.7537/marsroj071115.05.
14. 14. T.S. Ostrianko, “Mental mapping in organizational and pedagogical activity of a secondary school social pedagogue”, Modern
pedagogy, 2, 2014. Available at: http://pedagogika.snauka.ru/en/2014/02/2069
15. M.T. Baymukanova, J.H. Kendirbekova, V.V. Bobrova, Z.Y. Oleksyuk, “Value of practice in social formation of readiness to teacher
social and educational activity with children and adolescents in the microenvironment”, Modern problems of science and education, 1,
2013. Available at: https://science-education.ru/en/article/view?id=8440
16. D.Zh. Sakenov, Y.V. Kushnir., Y. Shnaider, D.Zh. Abdulkhamidova, “Preparation of Students of Higher Education Institution for
Professional Activity in the Course of Studying of Pedagogical Disciplines”, World Applied Sciences Journal, 19(10), 2012, pp. 1431 -
1436.
17. G.O. Rakhimbekova, Z.M. Baigozhina, A.Y. Abdrakhmanova, A.R. Samatanova, R.K. Orazakova, Z.Z. Nurtayeva, J.Z. Sakenov,
“Development of Professional Competence in Students of Creative Pedagogical Specialties (Professionally-Oriented Aspect)”, Life
Science Journal, 12(1s), 2015, pp. 24-28.
Margarita Sergeevna Shakhova, Maria Vasilievna Smorodinova, Olga Aleksandrovna Repushevskaya,
Authors:
Aleksandr Vasilievich Tkach, Elena Ivanovna Balalova, Deni Dokkaevich Saydulaev
Digital Education in the Context of the Development of the Digital Economy: Technological
Paper Title:
Opportunities and Prospects
Abstract: Digital education is education that primarily functions based on digital technologies, that is,
electronic transactions that are implemented using the Internet. Digital education aims to professionalize and
increase the mobility of those who study and at the present stage of ICT development, it can be considered as a
technological basis for the fundamentalization of higher education. The purpose of the article is to analyze the
technological capabilities of digital education on the example of the use of innovative classroom in the educational
694. process. The article analyzes the advantages of the educational environment equipped with digital tools. Based on
an expert survey, the main characteristics of the innovative classroom, as well as technological requirements for the
3972-
innovative classroom, are determined and various models for the organization of the innovative classroom are
3976
presented.
Keyword : digital economy, digital education, educational environment, educational process, innovative
classroom, innovative classroom model.
References:
1. M.N. Dudin, O.F. Shakhov, M.S. Shakhova, E.P. Rusakova, Y.S. Sizova, “Digital Technologies as a Driver of Intellectual Stratification of
Human Resources: Socio-Economic Inequality”, International Journal of Recent Technology and Engineering, 8(2), 2019, pp. 4436-4440.
2. S.S. Nosova, G.V. Kolodnyaya, S.A. Bondarev, S.A. Verigo, A.B. Kudryashov, “Digital Business as a Driver of Economic Growth i n
Russia”, Espacios, 40(24), 2019, pp. 25.
3. Y.Y. Kail, A.V. Shokhnekh, M.V. Samsonova, R.M. Lamzin, Y.Y. Elsukova, “Prospects of GR Management Development in the context
of forming a digital economy”, Espacios, 40(22), 2019, pp. 30.
4. T.V. Pogodina, V.G. Aleksakhina, V.A. Burenin, T.N. Polianova, L.A. Yunusov, “Towards the innovation -focused industry development
in a climate of digitalization: the case of Russia”, Entrepreneurship and Sustainability Issues, 6(4), 2019, pp. 1897-1906.
5. A.V. Bataev, E.V. Plotnikova, “Assessment of digital banks’ performance”, Espacios, 40(20), 2019, pp. 24.
6. A.B. Abuova, S.A. Tulkubayeva, Yu.V. Tulayev, S.V. Somova, M.B. Tashmukhamedov, “The Technology of Cultivating Agricultural
Crops Based on Ortho photomaps, Digital and 3-D Surface Models”, International Journal of Engineering and Advanced Technology, 8(4),
2019, pp. 775-778.
7. E.A. Kirillova, A.V. Pavlyuk, O.E. Blinkov, E.V. Blinkova, E.L. Sidorenko, “Digital Inheritance of Social Media Accounts”, International
Journal of Engineering and Advanced Technology, 8(4), 2019, pp. 963-967.
8. N.Yu. Ignatova, “Obrazovanie v tsifrovuyu epokhu: monografiya”. Nizhnii Tagil: NTI (filial) UrFU, [Education in the digital age: a
monograph. - Nizhny Tagil: NTI (branch) of Ural Federal University], 2017, p. 128.
9. I.M. Faizrakhmanov, Z.H. Tanatarova, Lilija Mansurovna Allanina, Elena Ivanovna Sukhova and Ekaterina Aleksandrovna Pogrebinskaya,
“Modern theological education in Rrussia European experience and development prospects”, European Journal of Science and Theology,
14(6), 2018, pp. 183-193.
10. T.V. Fomicheva, V.I. Kataeva, J.O. Sulyagina, T.A. Evstratova, M.G. Chardymskiy, “Digitization of the Population in Russia:
Technologies and Levels of Interaction”, International Journal of Recent Technology and Engineering, 8(2), 2019, pp. 4728 -4731.
11. N.V. Komleva, “Professionalnaya kompetentnost lichnosti v usloviyakh Smart-obshchestva” [Professional competency of an individual in
a smart society] Otkrytoe obrazovanie [Open Education], 1, 2017, pp. 27-33.
12. T.I. Volostnova, “Sovremennye tekhnologii obrazovaniya v vysshei shkole” [Modern education technologies in higher school]. Mi r nauki i
obrazovaniya [World of science and education], 3, 2015, pp. 1-3.
13. N.G. Maloshonok, “Vzaimosvyaz ispolzovaniya Interneta i multimediinykh tekhnologii v obrazovatelnom protsesse so studenchesko i
vovlechennostyu” [The relationship between the use of the Internet and multimedia technologies in the educational process and student
involvement], Voprosy obrazovaniya [Education Issues], 4, 2016, pp. 59-83.
14. R. Luckin, W. Clark, K. Logan, R. Graber, M. Oliver, A. Mee, “Do Web 2.0 tools really open the door to learning: practices, perceptions
and profiles of 11-16-year-old learners”, Learning, Media and Technology, 34(2), 2009, pp. 87-104.
15. McGuinness, C. Fulton, “Digital literacy in higher education: A case study of student engagement with e-tutorials using blended learning”,
Journal of Information Technology Education: Innovations in Practice, 18, 2019, pp.1-28.
16. I.V. Naletova, “Izmeneniya sistemy obrazovaniya pod vliyaniem onlain-tekhnologii” [Changes in the education system under the influence
of online technologies]. Gaudeamus, 2, 2015, pp. 9-13.
17. Badarch, N.G. Tokareva, M.S. Tsvetkova, “MOOK: rekonstruktsiya vysshego obrazovaniya” [Reconstruction of higher education].
Vysshee obrazovanie v Rossii [Higher education in Russia], 10, 2014, pp. 135-146.
18. W. Barber, S. King, “Teacher-student perspectives of invisible pedagogy: New directions in online problem-based learning environments”,
The Electronic Journal of e-Learning, 14(4), 2016, pp.235-243.
19. Rowlands, D. Nicholas, P. Williams, P. Huntington, M. Fieldhouse, B. Gunter, R. Withey, H.R. Jamali, T. Dobrowolski, C. Tenopir, “The
Google generation: the information behaviour of the researcher of the future”, Aslib proceedings: New Information Perspective s, 60(4),
2008, pp. 290-310.
20. J.E. Hinostroza, C. Matamala, C. Labbé, M. Claro, “Factors (not) affecting what students do with computers and internet at home”,
Learning, media and technology, 40(1), 2015, pp. 43-63.
21. Gonzáles, “The relationship between approaches to teaching, approaches to e-teaching and perceptions of the teaching situation concerning
e-learning among higher education teachers”, Instructional Science, 40(6), 2012, pp. 975-997.
22. D.H. Shin, Y.J. Shin, H. Choo, K. Beom, “Smartphones as smart pedagogical tools: Implications for smartphones as u -learning devices”,
Computers in Human Behavior, 27(6), 2011, pp.2207- 2214.
23. Littlejohn, H. Beetham, L. McGill, “Learning at the digital frontier: A review of digital literacies in theory and practice”, Journal of
Computer Assisted Learning, 28, 2012, pp. 547–556.
24. G. Blackwell, F. Chalifour, “Tech class”, Professionally Speaking: The Magazine of the Ontario College of Teachers, 2012, pp. 35–39.
25. M.N. Dudin, E.A. Pogrebinskaya, E.I. Sukhova, A.N. Kirsanov, “Modern religious education as the basis for the development of new
confessional relations”, European Journal of Science and Theology, 15(5), 2019, pp. 133-147.
Keyword : hydroelectric engineering, renewable energy sources, green technologies, combined energy sources,
microhydroturbine.
696. References:
1. B.V. Lukutin, O.A. Surzhikova, E.B. Shandarova, “Vozobnovlyaemaya energetika v detsentralizovannom energosnabzhenii”: monogra fiya 3981-
[Renewable power engineering in decentralized power supply: monograph]. Moscow, Energoatomizdat, 2008. 3987
2. J.J. Jamian, R.N.S.R. Mukhtaruddin, M.A. Baharudin, “Standalone Hybrid System Design for rural areas electrification in Malaysia w ith
Windro wind turbine”, The Institute of Electrical Engineers of Japan, 11(3), pp. 9-21. Available at:
https://www.scribd.com/document/323530283/Standalone-Hybrid-System-Design-for-Rural-Areas-Electrification-in-Malaysia-With-
Windro-Wind-Turbine
3. A.V. Tarasov, “Substantiation of flow sections of hydro units of minor low-head hydropower plants”: Cand. thesis. St Petersburg, 2010.
4. A.A. Zharkovskij, R.I. Kazakov, V.L. Pleshanov, V.A. Umov, “Characteristics forecasting and design of electrical centrifugal immer sed
pumps with using the program complex SAPR TsN”, Khimicheskoe I Neftegazovoe Mashinostroenie, 5, 2001, pp. 20 -22.
5. A.A. Zharkovskii, R.I. Kazakov, V.L. Pleshanov, V.A. Umov, “The TsN CAD system, submerged electrocentrifugal pump design, and
characteristic forecasting”, Chemical and Petroleum Engineering, 37(5-6), 2001, pp. 285-289.
6. D.G. Svoboda, A.A. Zharkovskii, E.A. Ivanov, “Influence of the Geometric Parameters of the Impeller of a Free-Vortex Pump on the
Energy and Cavitation Characteristics of the Pump”, Chemical and Petroleum Engineering, 54(9-10), 2019, pp. 673-680.
7. A.A. Zharkovskii, A.Y. Pospelov, “Use of 3D Methods for Flow Analysis, Prediction of Characteristics, and Optimization of the Shape of
Settings of Hydraulic Turbines”, Power Technology and Engineering, 49(1), 2015, pp. 27-32.
8. A.Y. Pospelov, A.A. Zharkovskii, “Effect of the Parameters of a Computational Model on the Prediction of Hydraulic Turbine
Characteristics”, Power Technology and Engineering, 49(3), 2015, pp. 159-164.
9. E.A. Dundur, A.A. Zharkovskij, S.N. Shkarbul', “Three-dimensional potential flow calculation in turbomachinery impeller. Part 1. Problem
statement, flow model, calculation methods”, Khimicheskoe I Neftegazovoe Mashinostroenie, 11, 1995, pp. 41-45.
Sergei Sergeevich Smirnov, Dmitrii Aleksandrovich Sytnik, Nikolai Valerievich Bradis, Andrei
Authors:
Ivanovich Kardakov
Paper Title: Inertial Tracking Systems for Virtual Reality Devices
Abstract: Tracking systems are the most important components in virtual reality devices and appliances. In the
simplest case, in order to represent current picture for a user of virtual reality glasses, it is required to provide head
tracking. In complex devices of virtual reality, it is also required to track position of device itself and dynamics of
its motions. This work is aimed at development of 3D positioning algorithms for virtual reality devices and
appliances. In this work positioning is based on operation of inertial sensors. The issues of motion capture and
calibration of inertial devices are considered as well as application of Madgwick filter for noise suppression and
quaternions for description of coordinate rotation. This work discusses the application of the developed algorithms
for various virtual reality devices and appliances.
697.
Keyword : Sphere, Virtual reality, Madgwick filter, Gyroscope, Accelerometer, Quaternion. 3988-
3994
References:
1. Virtual reality. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/Virtual_reality
2. A.S. Nabiev, L.T. Nurkusheva, K.K. Suleimenova, G.K. Sadvokasova, Z.A. Imanbaeva, “Virtual Reconstruction of Historical
Architectural Monuments: Methods and Technologies”, International Journal of Innovative Technology and Exploring Engineering, 8(10),
2019, pp. 3880-3887.
3. E.A. Kirillova, A.V. Pavlyuk, I.A. Mikhaylova, T.E. Zulfugarzade, S.S. Zenin, “Bitcoin, Lifecoin, Namecoin: The Legal Nature of Virtual
Currency”, Journal of Advanced Research in Law and Economics, 9(1), 2018, pp. 119-126.
4. Total Vision. Available at: http://total-vision.ru/
5. USB. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/USB
6. HDMI. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/HDMI
7. StarBlade: virtual reality simulator. Total Interactive. Available at: https://total-interactive.com/content/products/star_blade/
8. Bluetooth Low Energy. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/Bluetooth_Low_Energy
9. ICM-20602 High Performance 6-axis MEMS MotionTracking Device. TDK InvenSense. Available at:
https://www.invensense.com/products/motion-tracking/6-axis/icm-20602/
10. STM32 32-bit Arm Cortex MCUs. STMicroelectronics. Available at: https://www.st.com/en/microcontrollers-microprocessors/stm32-32-
bit-arm-cortex-mcus.html
11. Introduction Of The World’s Lowest Power 9-Axis MotionTracking Device. Electronic Specifier. Available at:
https://www.electronicspecifier.com/sensors/mpu-9350-invensense-worlds-lowest-power-9-axis-motiontracking-device
12. USB human interface device class. Wikipedia, the free encyclopedia. Available at:
https://en.wikipedia.org/wiki/USB_human_interface_device_class
13. Analog to digital converter. Wikipedia, the free encyclopedia. Available at: https://en.wikipedia.org/wiki/Analog-to-digital_converter
14. O. Evsegneev, “Kalibrovka magnitometra. Elektronnyi kompas” [Calibration of magnetometer. Electrnoic compass]. Robotclass. Available
at: https://robotclass.ru/articles/magnetometer-and-compass
15. Quaternion. Wikipedia, the free encyclopedia. Available at: https://ru.wikipedia.org/wiki/Кватернион
16. V.N. Gordeev, “Kvaterniony i bikvaterniony s prilozheniyami v geometrii i mekhanike” [Quaternions and biq uaternions with applications
in geometry and mechanics]. Kiev: Stal', 2016.
17. E. Foxlin, “Inertial head-tracker sensor fusion by a complementary separate-bias Kalman filter”. In Proc. Virtual Reality Annual
International Symposium the IEEE, 267, 1996, pp. 185–194.
18. S.O.H. Madgwick, “An efficient orientation filter for inertial and inertial/magnetic sensor arrays”, Report x-io and University of Bristol
(UK), 25, 2010, pp. 113–118.
Paper Title: Effect of Basalt fibers on the properties of high strength self-compacting concrete.
Abstract: Concrete having characteristics strength of more than 65 MPa is categorized as high-strength
concrete according to IS 456. The high strength concrete is more brittle compared to ordinary strength concrete and
inclusion of fibers can increase the ductility of concrete. In the present study, high strength self-compacting
concrete of characteristic strength of 90 MPa was developed as per the guidelines of EFNARC. Basalt fibers were
considered to investigate its influence on the properties of high strength self compacting concrete. Three aspect
ratios of 230, 530 and 600 were considered and are added in proportions of 0.1% and 0.4% by volume of concrete.
The properties of concrete determine were fresh and hardened. Fresh properties such as slump flow test, V-funnel
test, V-funnel T5 minutes and L-box test were determined as per EFNARC. Also, hardened properties such as
compressive strength, split tensile strength and flexural strength were determined. A typical comparison on the
effect of aspect ratio of basalt fibers and the dosage on the properties of concrete were determined. From the
results, the optimum dosage of fibers was determined.
Paper Title: Model of HfO2/Al2O3 Dielectric ALN\INN\Alganmos HEMT for Power Application
Abstract: The work involves to devise dielectric HfO2/Al2O3MOS-HEMT stack to validate for the device
structure through the refinement of mesh analysis. The structure of the AlN\InN\AlGaN HEMT MOS-HEMTs are
designed and meshed using the script file in the Sentaurus structure editor. TheAlN\InN\AlGaN MOS-HEMTs
output characteristic are examined for physics of MOS-HEMT in Hydrodynamic model TCAD. The amalgamation
formation ofthe Al0.30GaN0.70 barrierinterface with the channelofhigh 2DEG density result in anincreaseddrain
699. current density and high trans conductance. Additional the device performance of DC transfer characteristics, small
signal analysis of AlN/InN/AlGaNMOS-HEMT are analyzed and simulated.
3999-
4002
Keyword : MOS-HEMT,AlN\InN\AlGaN, Hydrodynamic model, Al0.30GaN0.70 and2DEG.
References:
1. Ching-Sung Lee, Yu-Hao Liao, Bo-Yi Chou, Han-Yin Liu, Wei-Chou Hsu. "Composite HfO2/Al2O3-dielectric AlGaAs/InGaAs
MOSHEMTs by using RF sputtering/ozone water oxidation", Superlattices and Microstructures, 2014
2. M. Sheerin Begum, J. Vijayashree, A. Mohanbabu, N. Mohankumar. "Investigation of performance of InAsSb based high electron
mobility transistors (HEMTs)", 2017 Devices for Integrated Circuit (DevIC), 2017
3. Lee, Ching-Sung, Yu-Hao Liao, Bo-Yi Chou, Han-Yin Liu, and Wei-Chou Hsu. "Composite HfO2/Al2O3-dielectric AlGaAs/InGaAs
MOS HEMTs by using RF sputtering/ozone water oxidation", Superlattices and Microstructures, 2014.
4. F. Medjdoub, J. Derluyn, K. Cheng, M. Leys, S. Degroote, D. Marcon, D. Visalli, M. Van Hove, M. Germain, G. Borghs. "Low On -
Resistance High-Breakdown Normally Off AlN/GaN/AlGaN DHFET on Si Substrate", IEEE Electron Device Letters, 2010
5. Igor E. Anokhin, Matthias Wurl, Katia Parodi, Anatoly B. Rosenfeld. "Application of silicon planar structures for the spectru m
determination of the proton beams produced by laser-driven particle accelerators. Theoretical approach.", 2017 IEEE Nuclear Science
Symposium and Medical Imaging Conference (NSS/MIC), 2017
6. Y. Niiyama et al.: Normally off operation GaN-based MOSFETs for power electronics applications, Semicond. Sci. Technol., 25, 125006,
(2010).
7. T.E. Cook Jr. et al.: Measurement of the band offsets of SiO2 on clean n- and p-type GaN(0001), J. Appl. Phys. 93, 3995, (2003).
8. J.J. Freedsman et al.: Normally-off Al2O3/AlGaN/GaN MOS-HEMT on 8 in. Si with low leakage current and high breakdown voltage
(825 V), Appl. Phys. Express, 7, 04100, (2014).
9. W. Ahn et al.: Normally-off AlGaN/GaN MOS-HEMTs by KOH wet etch and RF-sputtered HfO2 gate insulator, Proceedings of 25th Int.
Symp. on Power Semiconductor Devices & IC’s (ISPSD), pp.311-314, (2013).
10. Andrzej Taube, MariuszSochacki, Jan Szmidt, Eliana Kaminska, and Anna Piotrowska ,Modelling and Simulation of Normally-Off
AlGaN/GaN MOS-HEMTs Intl Journal Of Electronics and Telecommunications, 2014, VOL. 60, NO. 3, PP. 253–258 2014. DOI:
10.2478/eletel-2014-0032.
11. X.-H. Ma, J.-J. Zhu, X.-Y. Liao, T. Yue, W.-W. Chen, and Y. Hao, "Quantitative characterization of interface traps in Al2O3/AlGaN/GaN
metal-oxide-semiconductor high- electron mobility transistors by dynamic capacitance dispersion technique," Applied Physics Letters, vol.
103, p. 033510, 2013.
Larysa Ivanchenkova, Larysa Skliar, Olha Pavelko, Yuliia Cheban, Halyna Kuzmenko, Anastasiia
Authors:
Zinkevych
Paper Title: Improving Accounting and Analysis of Innovative Costs
Abstract: Based on the goal set in the beginning of the work and formulated tasks, the research is devoted to
the study of theoretical and normative bases of accounting and analysis of innovative costs of the enterprise. The
essence of innovation and innovation costs as an object of accounting and analysis is investigated. The actual
problems of accounting of expenses on innovations are analyzed. The methodical bases of the enterprise innovative
cost analysis are investigated. Investigating the current issues of accounting for innovation costs before accounting
for innovation costs has identified a key direction - displaying innovation costs as a separate accounting entity.
The study provides recommendations on how to improve accounting and analysis of innovation costs, namely, the
authors proposed an accounting approach that provides for the preliminary creation of additional analytical sections
on the expense accounts and in the accounts, which keep records of capital investment and proposed to analyze
innovation costs as part of a comprehensive analysis of innovation activity of the enterprise. An algorithm for
analyzing enterprise innovation has been developed, which includes five stages of analysis, a system of indicators
for analysis of innovation, a statement of sources of financing of innovation-investment activity and a statement of
the volume of innovation costs, which will provide a well-reasoned and reasonable estimate of costs.
700.
Keyword : Accounting, Analysis, Enterprise, Innovative Costs . 4003-
4009
References:
1. Svitlana Bondarenko, Olena Laburtseva, Оlena Sadchenko, Vira Lebedieva, Oleksandra Haidukova, Tetyana Kharchenko, Modern Lead
Generation in Internet Marketing for the Development of Enterprise Potential, International Journal of Innovative Technology and
Exploring Engineering, Volume-8 Issue-12, October 2019, pp. 3066-3071 DOI: 10.35940/ijitee.L2477.1081219
2. I. Bashynska, I. Lytovchenko, D. Kharenko, Sales tunnels in messengers as new technologies for effective Internet-marketing in tourism
and hospitality, International Journal of Innovative Technology and Exploring Engineering, Volume-8 Issue-12, October 2019, pp. 594-
598 DOI: 10.35940/ijitee.L3470.1081219
3. I. Bashynska, M. Baldzhy, L. Ivanchenkova, L. Skliar, O. Nikoliuk, G. Tkachuk, Game risk management methods for investment portfolio
optimization, International Journal of Recent Technology and Engineering, Volume-8 Issue-2, 2019, pp. 3940-3943 DOI:
10.35940/ijrte.B1729.078219
4. Prokopenko, O., Eremenko, Y., Omelyanenko, V., Role of international factor in innovation ecosystem formation, Economic Annals-XXI,
3-4, 2014, pp. 4-7
5. Krykavskyy, Y.V., Industrial supply chains: Between efficiency and responsibility, Actual Problems of Economics, 179 (5), 2016, pp. 30-
41.
6. Krykavskyy, Y., Falovych, V., The principle of the extended responsibility in the formation of multimodal transportation attr activeness,
Economic Annals-XXI, 159 (5-6), 2016, pp. 67-70. doi: 10.21003/ea.V159-14
7. V.N. Nesterov, A.Sh. Akhtyamova, E.S. Domracheva, Accounting and Analysis in Managing the Cost Of Innovation, Mediterranean
Journal of Social Sciences, 6(1), 2015, DOI: 10.5901/mjss.2015.v6n1s3p217
8. E. V. Demidko, Accounting and analysis of the cost of quality, January 2019, DOI: 10.18411/lj-03-2019-49
Paper Title: Dynamic Data Analysis and Decision Making on Twitter Data
Abstract: It became a tedious task for the data analysts to make decisions on social networks. The existing
approaches are not adequate to perform data pre-processing, analysis and decision making on the data dynamically.
Therefore, this research aims to propose an approach to data analysis and decision making. The proposed approach
emphasis on extracting tweets form twitter API (Application Program Interface), pre-processing the tweets by
701. following seven pre-processing steps. The processed tweets are trained by NLTK (Natural Language Toolkit) and
Text Blob are given to the sentiment analysis. Classification is done using the Naive Bayes algorithm to make a
decision on processed tweets. The tweets which are related to “MeToo Movement” are considered primarily for 4010-
decision making and satisfactory results are obtained. It is been observed that the proposed approach is accurate 4015
when compared to other approaches.
Keyword : Twitter, Text pre-processing, Machine learning, Sentiment Analysis, MeToo movement.
References:
1. SymeonSymeonidis, Dimitrios Effrosynidis, and AviArampatzis: “A comparative evaluation of pre-processing techniques and their
interactions for twitter sentiment analysis” in Expert Systems with Applications Elsevier, pp:298-310, 2018.
2. Zhao Jianqlang and GuiXiaolin: “comparison research on text pre-processing methods on twitter sentiment analysis” IEEE access, 5, 2870-
2879, 2017.
3. Tajinder and Madhu Kumari: “Role of text pre-processing in twitter sentiment analysis” procedia computer science 89 (2016) 549-554.
4. Ahmad FathanHidayatullah, ElangCergasPembrani, Wisnu Kurniawan, Gilang Akbar, Ridwan Pranata: “Twitter topic modelling on
football news”. International conference on computer and communication systems,2018 in Indonesia.
5. Prerna Mishra, Ranjana Rajnish and Pankaj Kumar: “Sentiment analysis of twitter data: case study on digital India” International
conference on information technology in 2016.
6. M.Trupthi, Suresh Pabboju and G. Narasimha: “Sentiment analysis on twitter using streaming API”, International adv ance computing
conference in 2017.
7. Yuling chen and Zhi zhang: “Research on text sentiment analysis based on CNN and SVM”, 13 th IEEE conference on industrial electronics
and applications on 31may-2 June 2018.
8. Kavya Suppala and Narasinga rao: “Sentiment analysis using Naïve Bayes classifiers”, international journal of innovative technology and
exploring engineering June 2019.
9. Huma Parveen and Shikha Pandey: “Sentiment analysis on twitter data-set using Naive Bayes algorithm”, 2016 IEEE 2 nd international
conference on applied and theoretical computer and communication technology.
10. Ali Hasan, Sana Moin, Ahmad Karim and Shahaboddin Shamshirband “Machine learning-based sentiment analysis for twitter accounts”,
MDPI, 2018.
11. Imane el Alaouli,Youssef Gahi, Rochdi Messoussi, youness chaabi, Alexis tadoskoff and Abdessamad Kobi “A novel adaptable approach
for sentient analysis on big social data” Springer 2018.
12. Ankita Rane and Anand Kumar: “Sentiment classification system of twitter data for US airlines services analysis” , 2018 42nd IEEE
international conference of computer and software and applications.
13. Guru tutorial point “Guru99 Tech Pvt Ltd”,Copyright - Guru99 2019,https://www.guru99.com/nltk-tutorial.html
14. Text blob https://textblob.readthedocs.io/en/dev/
15. Bhumika Gupta and Monika Negi: “Study of twitter sentiment analysis using machine learning algorithms on python” international journal
of computer applications (0975-8887) volume 165-no.9, may 2017.
16. Wikipidiahttps://en.wikipedia.org/wiki/Me_Too_movement_(India).
17. Lowri Williams, Christian Bannister, Michael Arribas-Ayllon, Alun Preece and Irena Spasic: “The Role of Idioms in Sentiment Analysis”,
Expert Systems with Applications, Elsevier, (2015).
18. Hemant J. Kamble, Jyotim Ingale, Bhagyashri R. Posture and Ganesh S. Ghuge “Sentiment Analysis of Twitter User Using Bigdata and
Hadoop”, published in International Journal of Engineering Research in Computer Science and Engineering, v-5 I-3 2018.
19. Sahar A El Rahman, Feddah Alhumaidi and Wejdan Abdullah Alsehri: “Sentiment analysis on twitter data” IEEE 2019.
20. Abdullah alsaeedi and mohammad Zubair khan: “A study on sentiment analysis techniques of twitter data”, international journal of
advanced computer science and applications, vol-10, no.2,2019.
21. Google search https://www.google.com/search?
Keyword : Social Engineering - Cyber Security - Social Networking - Hacking - Interactive Links- digital social
engineering.
References:
1. Ibrahim Mustafa, Ahmed Hassan Al-Zayat, Hamid Abdul Qader, Mohammed Ali Al-Najjar, 2004, the Intermediate Dictionary, Al-
Shorouk International Library, 4th edition, p. 1037.
2. Shafik, Hassanein, 2007, the Journey of the News in Press and Visual News Agencies, Dar Al Fikr Al Arabi, Cairo.
702. 3. Murad, Kamil Khurshid, 2011, Mass Communication and Media, Amman, Jordan, Dar Al-Masirah for Printing, Publishing and
Distribution. 4016-
4. Abbas Badran, 2010 Electronic Wars: Engagement in a Changing World, Center for E- Government Studies, Beirut. 4025
5. Aboud, Khalaf, 2015, Media and Migration to the Digital Age, Dar Al-Hamed for Publishing and Distribution, Amman, Jordan.
6. Mushtaq, Al-Naimi, 2018, fraud Information as one of Information Crimes, Halabi Legal Publications, Beirut, Lebanon.
7. Shloch, Noura, 2018, Cyber-piracy in the Cyberspace, “The Growing Threat to State Security,” Babylon Center for Humanities Journal,
vol. 8, no. 2, Algeria
8. Al Ittihad Newspaper, December 21, 2018
9. https://www.alittihad.ae/article/81471/2018/-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-
%D9%8A%D8%AD%D8%B0%D8%B1-%D9%85%D9%86-%D8%B1%D8%B3%D8%A7%D8%A6%D9%84-
%D8%A7%D8%AD%D8%AA%D9%8A%D8%A7%D9%84-%D8%B9%D8%A8%D8%B1-
%D8%A7%D9%84%D9%88%D8%A7%D8%AA%D8%B3%D8%A7%D8%A8-
English Reference
10. Amoroso, Edward. 2006. Cyber Security. New Jersey: Silicon Press Global Digital Report in 2018, published on Jan 2019.
11. Dr. Frederick Wamala, THE ITU NATIONAL CYBERSECURITY STRATEGY GUIDE, 2011.
12. David Bell, Brain D. Loader, Nickolas Please and Douglas Sculer, Cyber Culture the key concept, first published 2004.
13. Kemmerer, Richard. A. 2003. Cybersecurity. Proceedings of the 25th IEEE, International Conference on Software Engineering: 70 5-715.
http://dx.doi.org/10.1109/ICSE.2003.1201257
14. Internet websites
15. https://en.wikipedia.org/wiki/WhatsApp seen on 15 March 2019
16. https://en.wikipedia.org/wiki/Twitter seen on 15 March 2019
17. https://www.hawiyyah.com/en seen on 13 March 2019
18. https://middleeast-business.com/en/%D8%AA%D9%86%D8%A7%D9%85%D9%8A-%D8%A7%D9%84%D8%AA%D9%87% D8%
AF% D9% 8A% D8% AF% D8% A7% D8% AA-% D8% A7% D9% 84% D8% A5% D9% 84% D9% 83% D8% AA% D8% B1% D9 %
88% D9% 86% D9% 8A% D8% A9-% D8% A7% D9% 84% D9% 85% D8% A7% D9% 84% D9% 8A% D8% A9 seen on 12 March
2019
19. https://www.malwarebytes.com/cryptojacking/ seen on 10 March 2019
20. https://www.statista.com/chart/17267/cyber-security-threats/ seen on 12 March 2019
21. https://www.straitstimes.com/singapore/courts-crime/singapore-airlines-warns-of-phishing-scam-promising-free-plane-tickets seen on 13
March 2019
22. https://twitter.com/OMN_4/status/995205570507563008 seen on 13 Mar 2019
23. http://www.wt-spy.com/homen.php?langar seen on 13 March 2019
24. https://www.youtube.com/watch?v=AkEJCebvGcY seen on 13 March 2019
25. Volume(issue), paging if given. Available: http://www.(URL)
Paper Title: Design and Fabrication of Solar Powered Autonomous Seed Sowing Vehicle
Abstract: At present there is a huge scarcity of skilled manpower in agricultural sector. Farmers have to look
for the state of the art technology to carry out the cultivation activities to improve the productivity. A rapid progress
in the technology has led to the development of modern techniques in farming and utilizes innovative technologies
to overcome problems associated with the conventional methods. This paper addresses the design and fabrication of
a seed sowing vehicle which is controlled by a microcontroller and powered by solar panel.
Keyword : Seed sowing robot, micro controller, solar powered, zigbee control.
References:
1. S. V Upadhyaya, V. V. Gowda. G, M. B. Poojith, and V. K. Kumar, “A Review on Agricultural Seed Sowing,” International Journal of
Innovative Research in Science, Engineering and Technology, vol. 6, no. 4, pp. 7216–7223, 2017.
2. S. Annamalai, K. Vignesh, and N. Vikneswaran, “Design and Fabrication of Onion Seed Sowing Machine,” Int. J. Sci. Res. Sci. E ng.
Technol., pp. 447–450, 2019.
3. A. Dhawale, A. Jadhao, S. Hendve, K. Fadnvis, S. Hande, and A. Gadling, “Review of Multipurpose Agriculture Machine,” International
Journal of Research in Engineering, Science and Management, no. 2, 2019.
4. S. H. B. T, S. Chellur, A. L. A, and S. K. Y. H. M, “Multi-Purpose Agricultural Vehicle,” imperial Journal of Interdisciplinary Research,
Vol-3, issue. 6, pp. 125–129, 2017.
5. P. V Nithin and S. Shivaprakash, “Multi purpose agricultural robot,” International Journal of Engineering Research, vol. 5013 , no. 5, pp.
1191–1195, 2016.
703. 6. G. Naveen, K. Suresh, A. P. S, A. Raj, and G. Gokul, “fabrication of multi purpose agricultural vehicle,” International Journal of Scientific
Research and Review Volume 07, Issue 05, May 2019, pp. 885–887.
7. S. G. Vishal, S. P. Pratap, R. H. Narayan, and S. H. Praveen, “Fabrication of multipurpose farm equipment,” vol. 5, no. 5, pp. 167–172. 4026-
8. P. N. Umakant, “An Effectual Design of Agribot and Novel Implementation for Smart Agriculture,” International Refereed Journa l of 4031
Reviews and Research , vol. 5, no. 4, 2017.
9. M. U. Hassan, M. Ullah, and J. Iqbal, “Towards Autonomy in Agriculture : Design and Prototyping of a Robotic Vehicle with Seed
Selector,” 2016 2nd Int. Conf. Robot. Artif. Intell., pp. 37–44, 2016.
10. K A Sunitha, G S G S Suraj,CH P N Sowrya,G Atchyut Sriram,D Shreyas and T Srinivas, “Agricultural robot designed for seeding
mechanism,” IOP Conf. Series: Materials Science and Engineering , 2017.
11. P. Khedkar, G. Khandare, A. Gaikwad, P. Ukirade, and A. Y. Deogade, “Design and Development of Vacuum Seed Sowing Robot,”
International Journal for Mechanical Engineering and Aeronautical Engineering, vol. 6, no. 4, pp. 1–12, 2018.
12. P A Reddy, G.E Babu, "AGRIBOT -RF based farmer friendly Agricultural Robot with automatic seed dispensing system", International
Journal of Research, Page No : 362, vol. 7, no. 362, pp. 362–369, 2018.
13. K. Singhal and G. Prajapati, “Solar Powered Seed Sowing Machine,” international Journal of Applied Engineering Research, vol. 13, no.
6, pp. 259–262, 2018.
14. M. Ahalya, A. Muktha, M. Veena, G. Vidyashree, and V. J. Rehna, “Solar Powered Semi-Automatic Pesticide Sprayer for use in
Vineyards,” SSRG International Journal of Electronics and Communication Engineering ,vol. 4, no. 4, pp. 52–55, 2017.
15. B. Ranjitha, M. N. Nikhitha, and K. Aruna, “Solar Powered Autonomous Multipurpose Agricultural Robot Using Bluetooth / Android
App,” 2019 3rd Int. Conf. Electron. Commun. Aerosp. Technol., pp. 872–877, 2019.
16. N. V. Reddy, S. V. S. Prasad, T. Priyanka, and N. Pushpalatha, “Solar Operated Agrobot,” IOSR Journal of Electronics and
Communication Engineering , vol. 11, no. 3, pp. 62–65, 2016.
17. S. Swetha and G. H. Shreeharsha, “Solar Operated Automatic Seed Sowing Machine,” International Journal of Advanced Agricultur al
Sciences and Technology , vol. 4, no. 1, pp. 67–71, 2015.
18. S. Mujawar, S. Patil, S. Patil, and S. Pawar, “Solar Powered Variable Pitch Smart Seed Sowing System with Herbicides Sprayer,”
International Journal of Engineering Trends and Technology, vol. 46, no. 7, pp. 404–407, 2017.
19. B.Mohan, M.V.Ramesh, T. Srinivasa Rao, "Electrical Based Seed Sowing Machine", Journal of Emerging Technologies and Innovative
Research, Volume 5, Issue 11, pp.. 649-655, November 2018.
Keyword : artistic giftedness, school student, art education, artistic and creative development, visual art,
children’s drawing contest, exhibition of children’s drawings, teenager.
References:
1. L.L. Alekseeva, “Predmety iskusstva v shkole i otsenka kachestva obrazovaniya” [Art subjects at school and quality assessment in
education]. Pedagogika iskusstva, 2, 2017, pp. 15–20.
2. D.B. Bogoyavlenskaya, “Rabochaya kontseptsiya odarennosti” [The practical framework of giftedness]. Moscow, the Ministry of
Education and Science of the Russian Federation, 2003. ISBN 5-88521-095-5.
3. A.V. Bakushinsky, “Khudozhestvennoe tvorchestvo i vospitanie” [Artistic creativity and education]. Moscow, Novaya Moskva, 1925.
4. A.V. Bakushinsky, “Khudozhestvennoe tvorchestvo i vospitanie Opyt issledovaniya na materiale prostranstvennykh iskusstv” [Artistic
creativity and education. Research experience based on three-dimensional arts]. Moscow, Publishing house “KARAPUZ”, 2009.
5. L.S. Vygotsky, “Voobrazhenie i tvorchestvo v detskom tvorchestve: psikhologicheskii ocherk” [Imagination and creativity in childhood: a
psychological essay]. Moscow, Prosveshchenie, 1967.
6. V.G. Lisovskii, “Akademiya khudozhestv” [The Academy of Arts]. Leningrad, Lenizdat, 1982.
7. N.A. Dmitrieva, “Izobrazhenie i slovo” [Image and word]. Moscow, Iskusstvo, 1962.
8. G.V. Labunskaya, “Izobrazitelnoe tvorchestvo detei” [Children’s creative activities in the sphere of visual arts]. Moscow, Prosveshchenie,
1965.
9. V.S. Shcherbakov, “Izobrazitelnoe iskusstvo. Obuchenie i tvorchestvo” [Visual art. Teaching and creativity]. Moscow, Prosveshchenie,
1969.
10. S.D. Levin, “Vash rebenok risuet” [Your child is drawing]. Moscow, Sovetskii khudozhnik, 1979.
11. G.V. Labunskaya, A.V. Shchekin-Krotova, “Konkursy i vystavki detskogo izobrazitelnogo tvorchestva” [Contests and exhibitions of
children’s creative activities in the sphere of visual arts]. Moscow, TsDKhVD, Prosveshchenie, 1939.
Paper Title: Multi-Core Eight Bit Ternary Content-Addressable Memory Design Based Image Learning System
Abstract: In this research work, the image is learned to find features to make use of during its analysis and a
genetic apices based low power Ternary Content-Addressable Memory (TCAM) is designed to implement the
proposed image learning system. A technique called Content Matching Search Register is proposed in this work to
perform the image learning operations in proposed TCAM architecture. This paper proposes an ImOFF algorithm
for image analysis. The focus of this multi-core TCAM (MC-TCAM) is to make fast computations and search
based designs. The focus application of this research work is in the design of low power On-board Embedded-VLSI
chip to perform image analysis. Proposed multi-core eight bit Ternary TCAM (MCEB-TCAM) is analyzed using
IC design tools in 90nm technology, using Verilog hardware description language and usage of Cadence for layout
generation and parasitic extraction of the circuit components.
706. Paper Title: Cross-layer Rate Adjusted Congestion Controlled Protocol for Wireless Multimedia Sensor Networks
Abstract: Wireless Multimedia Sensor Networks (WMSNs) consists of set of sensor nodes which can capture 4042-
multimedia data as well as scalar data from the target region and transmit to the base station. The type and nature of 4046
traffic generated in WMSNs leads to congestion and it can cause substantial loss of data packets, reduced
throughput and wastage of energy. In order to overcome the challenge, a cross layer protocol which adjusts the rate
of transmission is proposed in this paper. As per the information provided by the MAC layer regarding buffer
availability and channel traffic condition, the proposed protocol adjusts the channel access along with transmission
rate of the nodes. The simulation results reveal that the proposed protocol performs better than the existing
protocols with respect to packet loss, throughput and energy.
Keyword : Historical, Heritage, Ultraviolet Radiations, Illuminance, Light Emitting Diode (LED),
707. Conservation.
References: 4047-
1. Tétreault, J. Damage Function Based on UV Spectrum for Different Materials. CCI Report 125877. Ottawa, ON: Canadian Conservation 4052
Institute, 2013.
2. Ghosh K., Mondal A., 2015, Some studies on the composition of ultra violet rays in visible light from various light sources, vol.- BXII.1,
pp. 436-442
3. Uniyal, C.P. (1995). Preventive Conservation of Archival Materials: Some Rather Ignored but Vital Aspects- CCPI, vo-28, New Delhi:
p50-55.
4. Thomson, G, 1986, The Museum Environment, International Institute for Conservation of Historic and Artistic Works, Butterworth-
Heinemann, 2nd Edition, p. 33
5. M. Havas, Health Concerns Associated with Energy Efficient Lighting and Their Electromagnetic Emissions, vol. 3, SCENIHR & Light
Sensitivity, 2008.
6. Cebula,T.A., E.N.Henrikson, P.E.Hartman, and W.H.Biggley. (1995). Reversion profiles of cool white fluorescent lig ht compared with far
ultraviolet light: homologies and differences. Photochem Photobiol 61:353-359.
7. B. L. Diffey, “Sources and measurement of ultraviolet radiation,” Methods, vol. 28, no. 1, pp. 4–13, 2002.
8. “General discussion on energy saving,” in Proceedings of the 1st International Conference on Power Electronics Systems and
Applications, D. H. Wang and K. W. E. Cheng, Eds., pp. 298–303, IEEE, November 2004.
9. Saunders, D. Ultra-Violet Filters for Artificial Light Sources. National Gallery Technical Bulletin 13. London, UK: The National Gallery,
1989, pp. 61–68.
10. Hoppe VU, Kopplow HJ, Wiskemann A. Statistical evaluation of light protection factors. Arzneimittel for schung. 1975; 25(5):817-25.
German.
11. CIE (International Commission on Illumination). CIE 157:2004. Control of Damage to Museum Objects by Optical Radiation. Vienna,
Austria: CIE, 2004.
Government of India.IS: 3646 (INDIAN STANDARD: 3646), 1992
Keyword : Alternative routing, Cellular manufacturing System, Operation sequence, Part family, Similarity
coefficient,
References:
1. Abtin nourmohammadzadeh ,Hamed Rafiei, Hossein Dashti, Masoud Rabbani (2013) ‘Cell formation problem with alternative process
plans alternative routes considering defect rate’, International Journal of Scientific & Engineering Reasearch, Vol. 4, No. 5.
2. Amit Rai Dixit and Mishra, P.K. (2007) ‘Heuristic based approach of Cell Formation considering Operation Sequence’, Proceedin gs of 4065-
World Congress on Engineering, Vol. II, WCE 2007, London, U.K. 4072
3. Busaba Phruksaphanrat and Nittaya Ngampak (2011) ‘Cellular Manufacturing Layout Design and Selection: A case Study of Electronic
Manufacturing Service Plant’, proceedings of international MultiConference of Engineers and Computer Scientists, Vol. II , Hong Kong.
4. Chalapathi, P.V. (2012) ‘Complete Design of Cellular Manufacturing Systems’, International Journal of Advanced Engineering
Technology 0976-3945.
5. Chin-Chih Chang, Feng-Chia Li, Tai- hsi Wu, ‘An sufficient tabu search approach to determine cell formation, cell layout, and
intracellular machine layout in the cellular manufacturing system’.
6. Chin-Chih Chang, Tai-Hsi Wu (2011) ‘A water flow-like algorithm or cellular manufacturing design and layout’, International Conference
on Advanced Information Technologies (AIT)
7. Chin-chih chang, Tai-Hsi Wu and Chien-Wei Wu (2013) ‘An Efficient Approach to Determine Cell Formation, Cell Layout and Intra
cellular Machine Sequence in Cellular Manufacturing Systems’, Computers & Industrial Engineering Vol. 66 pp.438-450.
8. Dipak Laha and Manash Hazarika (2016) ‘A Heuristic Approach for Machine Cell Formation Problems with Alternative
Routings’,Twelfth International Multi-Conference on Information Processing (IMCIP).
9. Farouq Alhourani (2013) ‘Clustering algorithm for solving group technology problem with multiple process routings’, Computers and
Industrial Engineering Vol. 66 pp.781-790.
10. Harhalakis G, Nagi R, Proth JM. (1990), ‘An efficient heuristic in manufacturing cell formation for group technology applica tions’,
International Journal of Production Research Vol.28, pp.185–198
11. Jamal Arkat, Mohammad Saeed Ameli (2006) ‘Cell formation with alternative process routings and machine reliability consideration’,Int J
Adv ManufTechnol Vol. 35: pp.761-768.
12. Murugan, M. and Selladuari, V. (2011) ‘Formation of Machine Cells/Part Families in Cellular Manufacturing Systems Using an ART-
Modified Single Linkage Clustering Approach – A Comparative Study’, Jordan Journal of Mechanical and Industrial Engineering, Vol. 5,
No. 3.
13. Raja, S., & Anbumalar, V. (2016a), ‘An effective methodology for cell formation and intra‑cell machine layout design in cellular
manufacturing system using parts visit data and operation sequence data’,. The Brazilian Society of Mechanical Sciences and
Engineering; Vol. 38, pp. 869–882.
14. Raja, S., & Anbumalar, V. (2016b), ‘A new method for integrating feasibility assessment and cell formation problem considering
operation sequence’, International journal of Advanced 608 Engineering Technology, Vol. 7, No.1,pp. 544, 551.
Paper Title: To Distinguishing The Infirmity By Using Palmistry Algorithm In Image Processing
Abstract: The endeavor is made arrangements for structure up the utilization of palmistry to find the human
ailment from their palm. Palm looking for is a sensational issue in the restorative administration's system. In the
proposed methodology, Palm investigating is inspected from the perspectives of model assertion, heuristics, and
learning. Two sorts are cleared in this technique. Tremendous learning is one of the perspectives in AI that has an
unusual condition of accreditation. In standard palmistry has used in the past method of room science. It is the
distortions the future from the palm print of an individual. In this endeavor the palm print utilities for a blemish the
sickness with the help of Artificial Immune System (AIS) to get to the human lead. CLONALG is a count, which is
executed to recognize the blemish area. While separating of palm print we can without a lot of a stretch find the
disfigurement domain. The character perceiving confirmation has been the palm print unmitigated dependent on
Convolutional Neural Networks (CNN) which detects the efficient process of FS and VS.
Keyword : CLONALG, CS – Clonal Selection, Feature Selection, Variable Selection, AIS – Artificial Immune
System, CNN – Convolutional Neural Networks.
References:
1. Application of Digital Image Processing and Analysis in Healthcare Based on Medical Palmistry, Hardik Bhalchandra Pandit, Dipti
Shah, IJCA Special Issue on Intelligent Systems and Data Processing (ICISD), pages 56-59, 2011
2. Digital Image Processing in Medical Palmistry, Maiduguri Sudhir, E.V.Narayana International Journal of Advanced Engineering and
Global Technology I Vol-04, Issue-03, May 2016, ISSN No: 2309-4893
3. Expar: A fuzzy rule-based expert system for palmistry, Prateek Agrawal, Vishu Madaan, S.K. Singh, M. Sharma, I J C T A, 9(11)
2016, pp. 5207-5214 © International Science Press
4. A study of identical twins’ palmprints for personal verification, Adams Wai-KinKong, Guangming Lu, Volume 39, Issue 11,
November 2006, Pages 2149-2156
5. Application of Prediction Software in Palmistry, Author: Aditya K Navpat, Rahul Mukherjee, Vishaka Pandita, and Sumeet Gupta,
IJCA Proceedings on National Conference on Recent Trends in Computing © 2012 by IJCA Journal NCRTC - Number 4 Year of
712.
Publication: 2012
6. Segmentation of human palm for symbol detection and pattern matching, Dr. Hardik B. Pandit and Prof. Dipti Shah, International 4077-
Journal of Advanced Engineering Research and Studies E-ISSN2249–8974, 2014 4080
7. A Study of Automation in Palmistry, Shivali Soni, Dr. Kapil Gupta, International Journal of Advanced Research in Computer Science
and Software Engineering, Volume 5, Issue 5, May 2015 ISSN: 2277 128X
8. Medical Palmistry: An Artistic Analysis and Future beyond Lexical Meaning, K. Ramasamy, A. Srinivasan, Research Journal of
Pharmacy and Technology, Volume No. : 10, Issue No. : 11, Year: 2017
9. Architecture for Medical Image Processing, Rumen Mironov, Roumen Kountchev, Advances in Intelligent Analysis of Medical Data
and Decision Support Systems pp 225-234, Springer-Verlag Berlin Heidelberg 2013
10. Wider Necessity of Digital Image processing in Biomedical with its further scope Pavan Kumar Naik, Arun Kumbi, Vishwanath
Hiregoudar, International Journal for Research Trends and Innovation, Volume 1 Issue 2, November-2016
11. Evaluation of Different Feature Extractors and Classifiers for Offline Handwritten Devnagari Character Recognition, Brijmohan
Singh, Ankush Mittal, Debashish Ghosh, Journal of Pattern Recognition Research, JPRR Vol 6, No 2 (2011); DOI:10.13176/11.302 |
12. A pattern recognizing the study of palm reading, Author: Oda, M., Womack, B. F., & Tsubouchi, K.IEEE Transactions on Systems,
Man, & Cybernetics, SMC-1(2), 171-175, 1971.
13. Study on eye troubles using palm print and image processing technique, Indra Kumar S S, Dr. M S Shashidhara, International journal
of recent trends in engineering and research, 2016
14. Digital Image Processing Techniques in Character Recognition - A Survey, Dr. Marlapalli Krishna, Gunupusala Satyanarayana, V.
Devi Satya Sri, International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 20 17
IJSRCSEIT | Volume 2 | Issue 6 | ISSN: 2456-3307
15. Enhancing Palm Print Recognition System, Author: Priyanka Kamboj, Mr Goutam Gupta,International Journal of Advanced Research
in Electronics and Communication Engineering (IJARECE)Volume 5, Issue 11, November 2016
16. Early-stage disease diagnosis system using human nail image processing, Trupti S Indi watch, and institute of technology Maharashtra,
Yogesh a Gunge College of Engineering Pune Maharashtra. July 2016
17. Predicting the big five personality traits from handwriting, Mihai Gavrilescu and Nicolae Vizireanu, University “Politehnica” of
Bucharest Romania, April 2018
18. Identification of palm print using dermatoglyphics analysis and detection system, Y Qiao, Z Li, Q Wang, Y Zeng, K Liang,
Biomedical Engineering Center, Beijing University of Technology, Beijing 100022, China. April 2005
19. Personality identification of palmprint using convolutional neural networks, Ariyanto, Esmeralda C Djamal, Ridwan
Ilyas, Universitas Jenderal Achmad Yani, Cimahi, Indonesia, IEEE, August 2018
20. Toward more accurate matching of contactless palmprint images under less constrained environments, Ajay Kumar, The Hong
Kong Polytechnic University, Hong Kong, May 2018.
Authors: Sikkisetti Jyothirmayee, V. Dilip Kumar, Ch. Someswara Rao, R.Shiva Shankar
713. Paper Title: Predicting Stock Exchange using Supervised Learning Algorithms
Abstract: The stock market price trend is one of the brightest areas in the field of computer science, 4081-
economics, finance, administration, etc. The stock market forecast is an attempt to determine the future value of the 4090
equity traded on a financial transaction with another financial system. The current work clearly describes the
prediction of a stock using Machine Learning. The adoption of machine learning and artificial intelligence
techniques to predict the prices of the stock is a growing trend. More and more researchers invest their time every
day in coming up with ways to arrive at techniques that can further improve the accuracy of the stock prediction
model. This paper is mainly concerned with the best model to predict the stock market value. During the
mechanism of contemplating the various techniques and variables that can be taken into consideration, we
discovered five models Which are based on supervised learning techniques i.e.., Support Vector Machine (SVM),
Random Forest, K-Nearest Neighbor (KNN), Bernoulli Naïve Bayes.The empirical results show that SVC performs
the best for large datasets and Random Forest, Naïve Bayes is the best for small datasets. The successful prediction
for the stock will be a great asset for the stock market institutions and will provide real-life solutions to the
problems that stock investors face.
Keyword : Stock Market, Machine Learning, Dataset, Data pre-processing, Supervised Learning
Algorithms,Predictions.
References:
1. G. Zhang, B.E. Patuwo, M.Y. Hu*, Forecasting with Artificial Neural Networks: the state of the art, Int. J. Forecasting 14 (1998) 35-62.
2. K. Kim, Financial Time Series Forecasting Using Support Vcctor Machines. Neurocomputing, 55, pp. 307 319, 2003.
3. T.manoj lovic* and I.stajdvhar*, Predicting Stock Market Trends Using Random Forest: A Sample of the Zagreb Stock Exchange, IEEE
International Convention, pp. 1189- 1193, 2015
4. Yuqing Dai, Yuning Zhang, Machine Learning in Stock PriceTrend Forecasting, 2013.
5. KooshaGolmohammadi, Osmar R. Zaiane and David Díaz, Detecting Stock Market Manipulation using Supervised Learning Algorithms,
IEEE International Conference on Data Science and Advanced Analytics, pp. 435-441, 2014.
6. P. Hajek, Forecasting Stock Market Trend using Prototype Generation Classifiers, WSEAS Transactions on Systems, Vol.11, No. 12, pp.
671-80, 2012.
7. V Kranthi Sai Reddy, "Stock Market Prediction using Machine Learning", International Research Journal of Engineering and Tech nology
(IRJET), vol. 08, no. 4, pp. 1033-1035, Oct 2018, ISSN 2395-0056.
8. Saahil Madge, Predicting Stock Price Direction using Support Vector Machines Independent Work Report Spring 2015, Princeton
University
9. K. Hiba sabia, Aditya Sharma, Adarrsh Paul, Sarmistha Pardhi, Saurav Sanyal, "Stock Market Prediction using Machine Learning",
International Research Journal of Engineering and Technology (IREAT), vol. 05, no. 4, pp. 1033-1035, April 2019, ISSN 2249-8958.
10. Shen, Shunrong, Haomiao Jiang, and Tongda Zhang. "Stock market forecasting using machine learning algorithms." (2012)
11. https://www.researchgate.net/publication/313408030_A_Review_on_Prediction_of_Stock_Market_using_Various_Methods_in_the_Field
_of_Data_Mining.
12. J. Patel, S. Shah, P. Thakkar, and K. Kotecha, Predicting stock and stock price index movement using Trend Deterministic Data
Preparation and machine learning techniques, Expert Systems with Applications, Volume 42, Issue 1, Pages 259 -268, ISSN 0957- 4174,
2015.
13. N. Masoud, Predicting direction of stock prices index movement using artificial neural networks: the case of Libyan financial market,
British Journal of Economics, Management & Trade, 4(4): 597-619, 2014.
14. Y. Zuo, E. Kita, Up/Down Analysis of Stock Index by Using Bayesian Network, Engineering Management Research, Issue 2, Vol.1, 2012,
pp.46–52.
15. D. Diaz, B. Theodoulidis, and P. Sampaio, “Analysis of stock market manipulations using knowledge discovery techniques applied
intraday trade prices,” Expert Syst. Appl., vol. 38, no. 10, pp. 12757–12771, Sep. 2011.
16. K. Golmohammadi and O. R. Zaiane, “Data Mining Applications for Fraud Detection in Securities Market,” in 2012 European Intelligence
and Security Informatics Conference, 2012, pp. 107–114.
17. F. Neri, Agent based Modeling under Partial and Full Knowledge Learning Settings to Simulate Financial Markets, AI Communications,
Issue 4, Vol.25, 2012,pp.295-304.
18. P. Hajek, Municipal Credit Rating Modelling by Neural Networks, Decision Support Systems,Issue 1, Vol. 51, 2011, pp.108 –118.
19. P. Hajek, V. Olej, Credit Rating Modelling by Kernel-based Approaches with Supervised and Semi-Supervised Learning, Neural
Computing & Applications, Issue 6, Vol.20, 2011, pp.761–773.
20. F.E.H. Tay, L. Cao, Application of support vector machines in -nancial time series forecasting, Omega 29 (2001) 309–317.
Keyword : PMDC, motor parameter variation, tunable PID, H∞ norm, tracking, disturbance rejection
References:
1. Soni, Ritu. Singh D.B.V. Pandey, Pramod. & Sharma, Priyanka, “Simulation of optimal speed control for a DC motor using conventional
PID controller and Fuzzy logic controller”, International Journal of information and computation Technology, 2013; Vol. 3, No . 3 , pp
181-188.
715. 2. Ilyas Eker, “Sliding mode control with PID sliding surface and experimental application to an electromechanical plant,” ISA transactions,
2006; Vol. 45, no. 1, pp. 109-118. A. Sabanovic, “Variable structure systems with sliding modes in motion control- A survey,” IEEE
Transactions on Industrial Informatics, 2011; Vol. 7, no. 2, pp. 212-223.
4097-
3. A. Sabanovic, “Variable structure systems with sliding modes in motion control- A survey,” IEEE Transactions on Industrial Informatics, 4102
vol. 7, no. 2, pp. 212-223, 2011.
4. K. D. Young, V. I. Utkin, and U. Ozguner, “A control engineers guide to sliding mode control,” IEEE Transactions on Control Systems
Technology, vol. 7, pp. 328-342, May 1999.
5. M. L. Corradini, G. Ippoliti, S. Longhi, and G. Orlando, “A quasisliding mode approach for robust control and speed estimatio n of PM
synchronous motors,” IEEE Transactions on Industrial Electronics, vol. 59, pp. 1096-1104, Feb 2012.
6. J. B. Cao and B. G. Cao, “Fuzzy-logic-based sliding-mode controller design for position-sensorless electric vehicle,” IEEE Transactions
on Power Electronics, vol. 24, pp. 2368-2378, Oct 2009.
7. Yadav, S. Misra, V. Omar, S. Dixit, V. Chaubey, P (2014) “Speed control of DC motor using optimal PID Tuning method”, National
student conference on Advances in Electrical & Information Communication Technology, pp 94-98.
8. He, Jian-Bo., Wang, Qing-Guo., Lee, Tong-Heng.: (2000) “PI/PID controller tuning via LQR approach”, Chemical Engineering Science,
Vol. 55, No. 13, pp 2429-2439.
9. Nasri, M. Nezamabadi-pour, H. &Maghfoori, M (2007) “A PSO based optimum design of PID controller for a linear brushless DC motor”,
International Journal of Electrical, Robotics, Electronics and Communications Engineering, Vol. 1, No. 2, pp 171-175.
10. Pinto, A. Elvis, H. Domingues, I. Rocha, L. & Cruz, S (2010-2011) “The Particle swarm optimization algorithm”
11. R. Bautista-Quintero and M. J. Pont, “Implementation of H-infinity control algorithms for sensor-constrained mechatronic systems using
lowcost micro controllers,” IEEE Transactions on Industrial Informatics, vol. 4, pp. 175-184, Aug 2008.
12. F. F. M. El-Sousy, “Hybrid H∞-based wavelet-neural-network tracking control for permanent-magnet synchronous motor servo drives,”
IEEE Transactions on Industrial Electronics, vol. 57, pp. 3157-3166, Sept 2010
13. Brezina Lukas, Brezina Tomas, “H-infinity controller design for a DC motor model with Uncertain Parameters”, Engineering Mechanics,
Vol 18 No 5/6, pp 271-279 2011
14. Prem Kumar M, Raghu Ram JV, “Design and Simulation of ARTD Controller for Chemical Process Industry PMDC Motor”4th
International Conference on Electrical Energy Systems (ICEES)
Paper Title: Performance Parameter of AODV and DSR Potocol by Varying Nodes Mobility
Abstract: MANET is a cluster of nodes that are mobile which transfer the packet within a limited transmission
range. It is decentralized and infrastructure less wireless network. Due to host mobility requirement for a robust
dynamic routing protocol is needed, since a random and dynamic difference in the network topology is there. This
716. paper presents a performance analysis between two routing protocols AODV and DSR. In terms of throughput,
PDR and delay both protocols AODV and DSR is compared. 4103-
4105
Keyword : AODV, DSR, Mobile Ad-hoc Network, NS-2.
References:
1. V. Rajeshkumar, P. Siva Kumar, “Comparative Study of AODV, DSDV, DSR Routing Protocols in MANET Using Network Simulator -
2”, International Journal of Advanced Research in Computer and Communication Engineering, December 2013.
2. J. Hoebeke, I. Moerman, B. Dhoedt, P. Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges” Journal of
the communication networks, July 2004.
3. F. Tseng, L. D. Chou and H. Chao, “A Survey of Black Hole Attacks in Wireless Mobile Ad hoc Networks”, Human-Centric Computing
and Information Sciences, 2011.
4. E. Royer, S. Barbara, C. Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal
Communication , April 1999.
5. C. Perkins, E.B. Royer, S. Das, “Ad hoc On-Demand Distance Vector(AODV) Routing, Internet Draft,” RFC 3561, IETF Network
Working Group, July 2003.
6. N. S. Yadav, R. P. Yadav, ”Performance Comparison and Analysis of Table-Driven and On-Demand Routing Protocols for Mobile Ad-
Hoc Networks”, International Journal of Information and Communication Engineering, 2008.
7. A. Boukerche, ”Performance Evaluation of Routing Protocols for Ad Hoc Networks”, Mobile Networks and Applications, Kluwer
Academic Publishers, 2004.
8. D. B. Johnson, D. A. Maltz, and Y. Hu, “The dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)”, Internet-draft, 19
July 2004.
9. D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, IETF
Draft, April 2003, work in progress, <online available> http://www.ietf.org/internet-draft/draft-ietf-manet-dsr-09.txt.
10. Y. Pan, “Design Routing Protocol Performance Comparison in NS2: AODV Comparing to DSR as an example”, Deptt. Of CS, SUNY
Binghamton, Vestal NY 13850.
11. Z. B. A. Hani, D. B. Baba, “Designing Routing protocols for Mobile Ad hoc networks”, IEEE 2003.
Paper Title: Compaction Behaviour and Grain Size Alteration of Sand -Clay Mix
Abstract: Sand-bentonite mix is commonly used as liner material or backfill material in landfill sites.
Bentonite belonging to group of montmorillionite clay provides higher density and less void ratio to lessen
permeability of liner layer mixed with sand. This mix is inevitable and economical where soil nearby landfill site
have sandy soil .Many literatures provided geotechnical aspects of using this mix.In this present study, the grain
size distribution analysis and compaction of sand–bentonite mixture for 10%,20% and 30% bentonite mix is studied
to propose economic and less permeable liner material with lower shrinkage. Locally available sand from different
river , Odisha (India) was mixed with different proportions of commercial sodium bentonite. The following
research output presented here elaborately show the effect of clay particle on compaction, Relative Density,
Coefficient of uniformity,Coefficient of curvature, permeability by gradually adding commercial Sodium Bentonite
10% by weight upto 30%. The result show that there is a significant improvement in MDD and OMC of Sand-
Bentonite mix along with decrease in void ratio. The grain size alteration eventually helped to increase the dry
density and reduced void ratio will enhance the scope of this mix to be used as liner layer in landfill system.
Paper Title: Contingency Analysis of Fault and Minimization of Power System Outage Using Fuzzy Controller
Abstract: In power systems, voltage stability perform the major role in design and its operation. Major system
failures are occur due to voltage variability and breakdown. To meet and compensate the rising power demand of
regular usage in modern trends, transmission networks are enormously loaded which create the voltage instability.
Contingency analysis is a recognized energy managing tool. It calculate the violation in the transmission line. In
718. this paper a computational controller fuzzy system is suggested to handle the transmission line outage and overload
in other branch kind of problems in Power system. The efficiency of power transmission system with fuzzy 4111-
controller is inveterate by computation of various parameters of transmission bus under different loading situations. 4115
For the contingency analysis the transmission power flow several methods have been developed. Fast Decoupled
load flow program is the effective method which provides a fast and effective solution to the contingency analysis
in the transmission system and also it is incorporate with matrix alteration formula which gives additional
advantage for the system.
Keyword : Fuzzy Logic, Voltage stability, Contingency Analysis, non-linear system.
References:
1. Qiming chen, and James , “Identifying high risk N-K contingency for online security assessment” IEEE,Transaction on power system,
Vol.20(2), May 2005,pp.823
2. V. J. Mishra and M. D. Khardenvis, "Contingency analysis of power system," 2012 IEEE Students' Conference on Electrical, Electronics
and Computer Science, Bhopal, 2012, pp. 1-4.
3. Ashutash Tiwari and V.Ajjarapu, “Contingency assessment for voltage dip and short term voltage stability analysis”, Bulk powe r system
dynamics and control, Charleston, USA, August 2007.
4. M.O.Ogbuatu and K.Ekiokekeme, “Minimization of Power System Outage Using Fuzzy Logic Control Mechanism”, International Journa l
of Latest Technology in Engineering, Management & Applied Science, Vol.7 (8), August 2018, pp. 136-148.
5. K. L. Lo and A. K. I. Abdelaal, "Fuzzy logic based contingency analysis," DRPT2000. International Conference on Electric Utility
Deregulation and Restructuring and Power Technologies. Proceedings (Cat. No.00EX382), London, UK, 2000, pp. 499-504
6. A.Sathish Kumar, “Control of Robot Manipulator Error using FPDI – IQGA in Neural Network”, International Journal of Computational
and Theoretical Nanoscience, Vol.13 (3), March 2016, pp. 1740-1748(9).
7. A.Sathish Kumar, “GRNN based inertia parameters identification of robot dynamics”, International Journal of Advances in Natural and
Applied Sciences,Vol.10 (16), November 2016, pp.115-119.
Paper Title: A Parametric Oriented Research on Routing Algorithms in Mobile Adhoc Networks
Abstract: Due to the infrastructure-less and no central administration architecture, Mobile Adhoc Networks
(MANETs) gained significant interest in various wireless information transfer related applications. However, the
selection of an optimal path to transmit the data is a more critical issue in MANETs because the nodes are resource-
constrained and also have mobility. To provide an optimal solution to this constraint, various methods are proposed
in earlier. Initially, some basic routing protocols are developed and further by modifying the base protocols so
many strategies are developed. The proposed Research paper outlines a detailed survey about the earlier developed
such strategies and also done a fined classification based on the methodology they followed. Broadly the
comprehensive routing approaches are classified into two classes, namely single metric-based approaches and
multiple metrics-based approaches. The further classification is done based on the routing protocol used at the base.
Due to the widespread utilization of meta-heuristic algorithms, some authors used those techniques also in the
discovery of an optimal path and some approaches are outlined in this paper. Moreover, at every phase, a fine and
detailed comparison is shown through various constraints.
Keyword : Mobile Adhoc Networks, Proactive, Reactive, Single metric, multiple metrics, Energy, Mobility,
Delay.
References:
1. M Bansal, R Rajput, & G Gupta,1999, “Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation
considerations” .
2. I Chlamtac, M Conti,and, Liu, J, 2003, “Mobile ad hoc networking: Imperatives and challenges”. Ad Hoc Networks, 1(1), 13 –64.
3. K Gorantala 2006, “Routing protocols in mobile Adhoc Networks”.
4. M Conti, & S Giordano, 2007, “Multihop Adhoc networking: The theory”pp, 78–86.
5. L Cao, T Dahlberg,& Y Wang,2007 “Performance evaluation of energy-efficient ad hoc routing protocols”. In IEEE International on
719. Performance, Computing, and Communications Conference, 2007. IPCCC 2007 (pp. 306–313).
6. N Vassileva, F Barcelo-Arroyo, 2008, “A survey of routing protocols for maximizing the lifetime of ad hoc wireless networks”pp, 77–90.
7. Thomas Kunz ,2008, “Accurately Predicting Residual Energy Levels in MANETs”. IEEE International Conference on Wireless and 4116-
Mobile Computing, Networking, and Communications, Avignon, France. 4126
8. Martin Appiah ,2017, “Performance comparison of mobility models in Mobile Ad Hoc Network (MANET)”.
9. Bhavyesh Divecha, Ajith Abraham, Crina Grosan, Sugata Sanyal, 2007, “Impact of Node Mobility on MANET Routing Protocols
Models”, Journal of Digital Information Management. 5(1).
10. Wen Chen Ching- and Chi Weng Chuan, 2009, “Bandwidth based routing protocols in mobile Adhoc networks”. The journal of
supercomputing. 50:240.
11. Parkash, A Surjeet, and R Tripathi,2013, “QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs”. Journa l of
Communications and Network, 5, 1-8.
12. C.E. Perkins and P. Bhagwat, 1994, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”,
Comp. Comm. Rev., pp.234-244.
13. Park VD and MS Corson ,1997, “A highly adaptive distributed routing algorithm for mobile wireless networks", Proc. INFOCOM'97 , 9
pages.
14. B David. Johnson, A Davis. Maltz, 1999, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks" October 1999 IETF
Draft, 49 pages.
15. E Charles. Perkins, M Elizabeth. Royer, R Samir, 1999, “Ad Hoc On-demand Distance Vector Routing, October 99 IETF Draft, 33 pages.
16. Murthy S. and Garcia J,Luna-Aceves, 1996, “An Efficient Routing Protocol for Wireless Networks", pp. 183-97.
17. M Joa-Ng and I.-T. Lu,1999, “A Peer-to-Peer zone-based two-level link-state routing for mobile Ad Hoc Networks”, pp.1415-25.
18. Chiang C. C, 1997, “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel”. Proc. IEEE SICON'97, pp.197 -
211.
19. Bellur B, and Ogier R.G, 1999, “A Reliable, Efficient Topology Broadcast Protocol for Dynamic Networks," Proc. IEEE INFOCOMM
’99, pp. 178–186.
20. Jacquet P, Muhlethaler P, 2001,” Optimized link-state routing protocol for ad hoc networks”. In Proceedings of IEEE International Multi-
Topic Conference, IEEE INMIC 2001.
21. Ali Moussaoui, Semchedine Fouzi, 2014, “A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks”,pp.117–
125.
22. Billington J. and C Yuan, “On modeling and analyzing the dynamic MANET on-demand (DYMO) routing protocol, 2009, pp. 98–126.
23. Z Haas, J, Pearlman, M. R., and Samar, P., (2002). “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”. IETF internet-draft.
24. Maciej Wojciechowski, 2008, “Border Gateway Protocol Modeling and Simulation”.
25. Lammle, 2007, “CCNA Cisco Certified Network Associate Study Guide (Sixth ed”, Indianapolis, Indiana: Wiley Publishing, ISBN 978-0-
470-11008-9.
26. N Ghanem, S Boumerdassi, & E Renault, 2005, “New energy-saving mechanisms for mobile ad-hoc networks using OLSR”. pp. 273–274.
27. Rango De, Fotino F, M, & S Marano, 2008, “EE-OLSR: Energy efficient OLSR routing protocol for mobile ad-hoc networks”. In IEEE
(pp. 1–7).
28. L Fatima, & E Najib, 2012, “Energy and mobility in the OLSR routing protocol”, Journal of Selected Areas in Telecommunication s
(JSAT), 2012(3), 1–6.
29. T Kunz, & R Alhalimi, 2010, “Energy-efficient proactive routing in MANET: Energy metrics accuracy. Ad Hoc Networks”, 8(7), pp.755–
766.
30. A Benslimane, Khoury El, R, Azouzi El, R, & S Pierre, 2006, “Energy power-aware routing in OLSR protocol”,MCWC 2006 (pp. 14–19).
IEEE.
31. S Mahfoudh , & P Minet, 2008, “An energy efficient routing based on OLSR in wireless ad hoc and sensor networks”,AINAW 2008 (pp.
1253–1259). IEEE.
32. T Kunz,2008, “Energy-efficient variations of OLSR. In Wireless Communications and Mobile Computing Conference”, IWCMC’08
International (pp. 517–522). IEEE.
33. P Ren, J Feng, P Hu, & J Cai, 2009, “Energy saving ad-hoc on-demand distance vector routing for mobile ad-hoc networks”. In IEEE
International Conference on Communications, 2009. ICC’09 (pp. 1–5). IEEE.
34. M Tarique, & K. E Tepe, 2009,” Minimum energy hierarchical dynamic source routing for mobile ad hoc networks” , 7(6),pp.1125–1135.
35. M Tarique, & K. E Tepe, 2007, “A new hierarchical approach to reactive routing protocols for wireless ad hoc networks with cr oss-layer
design”, 2(1), pp. 12–20.
36. H Safa, M Karam, & B Moussa, 2014, “PHAODV: Power aware heterogeneous routing protocol for MANETs”,pp. 60–71.
37. Tie, T. H., Tan, C. E., & Lau, S. P. (2010). “Alternate link maximum energy level ad hoc distance vector scheme for energy ef ficient ad
hoc networks routing”. In 2010 International Conference on Computer and Communication Engineering (ICCCE) (pp. 1–6). IEEE.
38. Lalitha, V., & Rajesh, R. S. (2014). “AODV_RR: A maximum transmission range based ad hoc on-demand distance vector routing in
MANET”. Wireless Personal Communications, 78(1), 491–506.
39. Waheb A. Jabbar, Mahamod Ismail, and Rosdiadee Nordin. (2014). “Performance Evaluation of the MBA-OLSR Routing Protocol for
MANETs”. Journal of Computer Networks and Communications Volume 2014, Article ID 951638, 10 pages.
40. T. Clausen, C. Dearlove, and P. Jacquet, “The optimized link-state routing protocol version 2,” draft-IETF-manet-olsrv2-00, Work in
progress, 2006.
41. M. A. Adhoc Networking and U. Herberg, “Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks
(MANETs) draft-ietf-manet-rfc6622-bis-03,” 2013.
42. Mohamed A. Ryan, Sayed Nouh, Tarek M. Salem, Abdelhady M. Naguib. (2018). “EDA-AODV: Energy and Distance Aware AODV
Routing Protocol”. Volume 5, Issue 5, September – October (2018).
43. Rahman Mahfuzur Bosunia,1 Daniel P, and Seong-Ho Jeong, ,2015, “A New Routing Protocol with High Energy Efficiency and
Reliability for Data Delivery in Mobile Ad Hoc Networks”, 8 pages.
44. Debika Bhattacharyya, Avimita Chatterjee, Baisakhi Chatterjee, Arnab Kumar Saha, Arnab Santra. (2018). “A novel approach to energy-
efficient low-cost routing in MANET by a reduction in packet size”. IEEE 8th Annual Computing and Communication Workshop and
Conference (CCWC), Las Vegas, NV, USA.
45. S. Devi, and N. P Hegde, (2016). “Reliable and Power Efficient Routing Protocol for MANETs”. I. J. Computer Network and
Information Security, 2016, 10, 61-69.
46. Joshi, R. D., & Rege, P. P. (2012). “Implementation and analytical modeling of modified optimized link-state routing protocol for network
lifetime improvement”. IET Communications, 6(10), 1270–1277
47. Guo, Z., Malakooti, S., Sheikh, S., Al-Najjar, C., Lehman, M., & Malakooti, B. (2011). “Energy-aware proactive optimized link-state
routing in mobile ad-hoc networks”. Applied Mathematical Modelling, 35(10), 4715–4729.
48. Kots, A., & Kumar, M, 2014, “The fuzzy-based QMPR selection for OLSR routing protocol”. Wireless Networks, 20(1), 1–10.
49. Anuradha, M., & Anandha Mala, G. S. 2014. “Multi-objective cross-layer based multipath routing protocol in MANET”, 68(3), page no.
531–540.
50. Yi, J., Cizeron, E., Hamma, S., & Parrein, B. (2008). “Simulation and performance analysis of MP-OLSR for mobile ad hoc networks”, pp.
2235–2240.
51. S Sarkar, R Datta, “Mobility-aware route selection technique for mobile ad hoc networks”. IET Wirel. Sens. Syst. 2017, 7, 55–64.
52. Ladas, A.; Deepak, G.C.; Pavlatos, N.; Politis, C. “A selective multipath routing protocol for ubiquitous networks”. Ad Hoc N etw. 2018,
77, 95–107.
53. Derrick, B; White, P (2017). "Comparing Two Samples from an Individual Likert Question". International Journal of Mathematics and
Statistics. 18 (3): 1–13.
54. Li, Z.; Wu, Y. “Smooth mobility and link reliability-based optimized link state routing scheme for MANETS”. IEEE Commun. Lett. 2017,
21, 1529–1532.
55. De Rango, F.; Guerriero, F.; Fazio, P. “Link-stability and energy-aware routing protocol in distributed wireless networks”. IEEE Trans.
Parallel Distrib. Syst. 2012, 23, 713–726.
56. Ehrgott, Matthias, Xavier Gandibleux. 2006. “Bound sets for bi-objective combinatorial optimization problems”. Computers & Operations
Research, 34 2674–2694
57. Kadri, B., Feham, M., & M’ Hamed, A. (2008), “Weight-based DSR for mobile ad hoc networks”. In IEEE (pp. 1–6).
58. Li, L., Li, C., & Yuan, P. (2015),” An energy level-based routing protocol in ad hoc networks”. Wireless Personal Communications, 81(3),
981–996.
59. Bhatt, U. R., Nema, N., & Upadhyay, R. (2014). “Enhanced DSR: An efficient routing protocol for MANET”. pp.215 –219.
60. G Varaprasad, & Narayanagowda, S. H, 2013, “Implementing a new power-aware routing algorithm based on an existing dynamic source
routing protocol for mobile ad hoc networks”, pp.137–142.
61. S Shankar, G Varaprasad, & H. N Suresh,2014, “Importance of on-demand modified power-aware dynamic source routing protocol in
mobile ad-hoc networks”. IET on Microwaves, Antennas & Propagation, 8(7), 459–464.
62. K., Misra, Dhurandher, S, S M Obaidat, S, Bansal, & Punia, V. 2009, “EEAODR: An energy-efficient ad hoc on-demand routing protocol
for mobile ad hoc networks”. International Journal of Communication Systems, 22(7), 789–817.
63. Katiravan, J., Sylvia, D., & Rao, D. S. (2015). Energy-efficient link aware routing with power control in wireless ad hoc networks. The
Scientific World Journal.
64. Yanez-Marquez, C., I Lopez-Yanez, O Camacho-Nieto, 2013, “BDD-based algorithm for the minimum spanning tree in wireless ad-hoc
network routing”, pp.600–601.
65. B Bollig, 2012, “On symbolic OBDD-based algorithms for the minimum spanning tree problem”. Theoretical Computer Science, 447, pp.
2–12.
66. Gomez, J., Campbell, A. T., Naghshineh, M., & Bisdikian, C. (2003). “PARO: Supporting dynamic power-controlled routing in wireless
ad hoc networks”. Wireless Networks, 9(5), 443–460.
67. Y. P. Aneja, A. Bari, A. Jaekel. (2009). “Minimum Energy Strong Bidirectional Topology for Ad Hoc Wireless Sensor Networks”. IEEE
ICC 2009.
68. Rishiwal, V., Yadav, M., Bajapai, S., & Verma, S. (2009), “Power-aware routing in ad hoc wireless networks”. Journal of Computer
Science and Technology, 9(2), 101–109.
69. Balachandra, M., Prema, K., & Makkithaya, K. (2014), “Multi-constrained and multipath QoS aware routing protocol for MANETs”.
Wireless Networks, 20(8), 2395–2408.
70. Chettibi, S., & Benmohamed, M. (2009), “Multipath energy-aware on-demand source routing protocol for mobile ad-hoc networks”.
71. Guodong, W., Gang, W., & Jun, Z. (2010), “ELGR: An energy efficiency and load-balanced geographic routing algorithm for lossy mobile
ad hoc networks”, pp.334–340.
72. Sheng Yen Yun, Chan Yi-Kung, Han Chieh Chao, Jong Hyuk Park, (2008) “A genetic algorithm for energy-efficient based multicast
routing on MANETs”. Computer Communications 31 (2008) 2632–2641.
73. SusanAugustine, lM.Kaliappan, Paramasivan B, 2016, “Enhancing energy efficiency and load balancing in mobile ad hoc networks using
dynamic genetic algorithms”, Volume 73, September 2016, Pages 35-43.
74. ShahramJamali, LeilaRezaei, Sajjad JahanbakhshGudakahriz, (2013). An Energy-efficient Routing Protocol for MANETs: a Particle
Swarm Optimization Approach. journal of applied research and technology. Volume 11, Issue 6, December 2013, Pages 803-812.
75. DipikaSarkar, AbhishekMajumder, SwagataChoudhury, 2018, “Enhanced-Ant-AODV for optimal route selection in a mobile ad-hoc
network”,2018.
76. Zhou, J., Tan, H, 2016, “Ant colony-based energy control routing protocol for mobile ad hoc networks under different node mobility
models”. EURASIP J. Wirel. Commun. Networking, 2016:105.
77. A.Nagaraju, S.Ramachandram, (2014). "Mathematical Models to Reduce Redundant Broadcasting in MANETs," International Journal o f
Wireless and Mobile Communication (IJWMC)
78. A.Nagaraju, S Ramachandram, “A Strategy to Reduce the Control Packet Load of AODV Using Weighted Rough Set Model For
MANET,” International Journal of Arab Information Technology (IAJIT), Vol.8, No.1
79. A.Nagaraju, S Ramachandram, “A Strategy to Reduce the Control Packet Load of AODV Using Weighted Rough Set Model For
MANET,” International Journal of Arab Information Technology (IAJIT), Vol.8, No.1.
80. A.Nagaraju, S.Ramachandram,(2009) “Rough Set based Ad-hoc On-demand Distance vector Routing algorithm for MANET’s,”
Proceedings of International Conference On Compute-2009 ACM Banglore Chapter, Paper is available in ACM Portal.
720. Keyword : Neonatal brain, Magnetic Resonance Imaging, Mathematical morphology, Watershed macro
controlled segmentation.
4127-
References: 4132
1. Mangin, J.F., 2000.Entropy minimization for automatic correction of intensity nonuniformity. In: IEEE Workshop MMBIA. Hilton Head
Island, South Carolina, pp. 162-169.
2. Kuklisova-Murgasova, M.,Aljabar, P.,srinivasan, L., Councsell, S.J., Doria,V.,Serag, A., Gousias, I.s., Boardman, J.p., Rutherford, M.a .,
Edwards, A.d., Hajnal, J.v., Rueckert,D., 2011.A dynamic 4D probabilistic atlas of the developing brain.Neuroimage 54 (40), 2750-2763.
3. Beucher, s., Meyer, F., 1993. The morphological approach to segmentation: the watershed transformation. In: Dougherty, E.R. (Ed.),
Mathematical Morphology in image processing. CRC Press, New York, pp. 433-481.
4. Lotufo, R., Falcao, A., 2000. The ordered queue and the optimality of the watershed approaches. In: Goutsias, J., Vincent, L. M.,
Bloomberg, D. (eds.), Mathematical Morphology and its Application to Image and Signal processing. Kluwer Academic Publishers.
5. Laura Gui a, Radoslaw Lisowski a,b, Tamara Faundez a, Petra S. Hüppi a, François Lazeyras b,Michel Kocher c. Morphology -driven
automatic segmentation of MR images of the neonatal brain. ELSEVIER publishers. In: Medical Image Analysis 16 (2012) 1565–1579,
6. Beare, Richard J et al. “Neonatal Brain Tissue Classification with Morphological Adaptation and Unified Segmentation.” Frontiers in
neuroinformatics vol. 10 12. 29 Mar. 2016, doi:10.3389/fninf.2016.00012
7. B. Sridhar; K.V.V.S. Reddy; A. Mallikarjuna Prasad “Mammographic image analysis based on adaptive morphological fuzzy logic CAD
system”
by International Journal of Biomedical Engineering and Technology (IJBET), Vol. 17, No. 4, 2015
Paper Title: Experimental Evaluation of Open Source Data Mining Tools: R, Rapid Miner and KNIME
Abstract: In the current scenario of Big Data, open source Data Mining tools are very popular in business data
analytics. The paper presents a comprehensive study of three most popular open source data mining tools – R,
RapidMiner and KNIME. The tools are compared by implementing them on two real datasets. Performance is
evaluated by creating a decision tree of the datasets taken. Our objective is to find the best tool for classification.
The study can help researchers, developers and users in selecting a tool for accuracy in their data analysis and
prediction. Experiments depict that accuracy level of the tool changes with the quantity and quality of the dataset.
721. The results show that RapidMiner is the best tool followed by KNIME and R.
Keyword : Classification, Data Mining tools, Decision tree, KNIME , R, RapidMiner. 4133-
References: 4144
1. D. Pyle, Data Preparation for Data Mining, San Diego: Academic Press, 1999.
2. http://www.kdnuggets.com/2017/05/poll-analytics-data-science-machine-learning-software-leaders.html
3. Nurdatillah Hasim, Norhaidah Abu Haris “A Study of Open-Source Data Mining Tools for Forecasting”, in the proceedings of IMCOM’15,
January 08 – 10, 2015, ACM 2015.
4. Magdalena Graczyk, Tadeusz Lasota, and Bogdan Trawiński, “Comparative Analysis of Premises Valuation Models Using KEEL,
RapidMiner, and WEKA”, in the proceedings of ICCI 2009, Springer-Verlag Berlin Heidelberg 2009.
5. Luís C. Borges, Viriato M. Marques and Jorge Bernardino, “Comparison of Data Mining Techniques and Tools for Data Classification”, in
the proceedings of C3S2E13, Jul 10-12 2013, Portugal, ACM, 2013.
6. Hemlata, Dr. Preeti Gulia, “Comprehensive Study of Open- Source Big Data Mining Tools”, International Journal of Artificial Intelligence
and Knowledge Discovery, e-ISSN: 2231-0312, Vol. 6, Issue 1, January, 2016.
7. Angela Lausch, Andreas Schmidt, Lutz Tischendorf, “Data mining and linked open data – New perspectives for data analysis in
environmental research”, Ecological Modelling, 0304-3800, Elsevier, Science Direct, 2014.
8. A. Jović*, K. Brkić* and N. Bogunović, “An overview of free software tools for general data mining”, in the proceedings of 37th
International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), IEEE, 2014.
9. Ahmad Al-Khoder, Hazar Harmouch, “Evaluating four of the most popular Open Source and Free Data Mining Tools”, International
Journal of Academic Scientific Research (272-6446), Volume 3, Issue 1, PP 13-23.
10. Neha Chauhan, Nisha Gautam, “Parametric Comparison of Data Mining Tools”, International Journal of Advanced Technology in
Engineering and Science, Vol. No. 3, Issue 11, November 2015.
11. Jaideep Jagadeeshwar Rao, Rakesh Kelappan and Paul Pallath, “Recommendation System to Enhance Planning of Software Development
using R”, in the proceedings of RSSE’14 June 3, 2014, Hyderabad, ACM 2014.
12. Hilda Kosorus, J¨urgen H¨onigl, Josef K¨ung, “Using R, WEKA and RapidMiner in Time Series Analysis of Sensor Data for Structu ral
Health Monitoring”, in the proceedings of 22nd International Workshop on Database and Expert Systems Applications, IEEE, 2011.
13. https://archive.ics.uci.edu/ml/datasets/Iris
14. https://www.rstudio.com
15. http://rapidminer.com
16. https://www.knime.org
Keyword : Leaf disease, bilateral filter, Otsu’s segmentation, ABCD feature, Support Vector Machine.
References:
1. Pooja, V., Das and R. And Kanchana, V., April, 2017. Plant leaf disease identification with image processing techniques. IEEE
Technological Innovations for Agriculture and Rural Development (TIAR) in 2017 (pp. 130-133). IEEEE
2. M., M., Fischer, M. And Bruckstein, A., from 1994. On the contribution of Gabor to enhancing the pictu re. Recognition of trends, 27(1),
pp.1-8
3. Tomasi, C. and Manduchi, R., 1998, January. Bilateral gray and light filtering. In Iccv (Vol. 98, No. 1, p. 2).
4. Paris, S., Kornprobst, P., Tumblin, J. and Durand, F., 2009. Bilateral filtering: applications and theory. Computer Graphics and Vision
722. Foundations and Patterns ®, 4(1), pp.1-73
5. Paris, S. and Durand, F., 2006, May. A rapid approximation of the bilateral filter using a signal processing approach. In the European 4145-
Computer Vision Conference (pp. 568-580)
6. N.S., Ramteke. And in 2013, Jain, S.V. Automatic computer-aided detection of skin cancer based on ABCD rule using MATLAB. IJCTA, 4149
pp. 691-697, 4(4)
7. Ghaiwat, and S.N. And Arora, P., from 2014. Detection and identification using image processing techniques of plant leaf diseases: a
summary. Global Engineering & Technology Journal of Recent Advances, 2(3), pp.1-7.
8. S.B. Dhaygude. And the 2013 Kumbhar, N.P. Detection of the disease of agricultural plant leaf using image processing. Interna tional
Journal of Electrical, Electronics and Instrumentation Engineering Research, 2(1), pp.599-602.
9. Landge, P.S., Patil, S.A., Otari, O.D., Khot, D.S. And the 2013 Malavkar, U.G. Automatic detection and classification by imag e processing
of plant disease. Computer Science and Software Engineering International Journal of Advanced Research, 3(7), pp. 798-801
10. A.H., Kulkarni. And Patil, A., from 2012. Use of image processing technique to identify diseases of plants. Modern Engineerin g Research
International Journal, 2(5), pp.3661-3664.
11. Wang, H., Li, G., Ma, Z. and Li, X., 2012, October. Image identification of plant diseases based on back propagation networks . 5th
International Image and Signal Processing Congress 2012 (pp. 894-900). IEEE.
12. Chaudhary, P., Cheeran, A.N. Chaudhari, A.K. And Godara, S., from 2012. A color transform method focused on the identification of
disease spot on plant leaf. Computer Science and Telecommunications International Review, 3(6), pp. 65-70
13. M. de Ridder, D. Egmont-Petersen. And Commerce, H., 2002. Neural network image processing — a summary. Recognition of trends,
35(10), pp.2279-2301
14. Mohamad, D. Zafar, M.F. And Anwar, M.M., Dec. 2006. Recognition of online isolated handwritten characters by the use of sub -character
primitive features of backpropagation neural networks. International Multitopic Conference of the IEEE in 2006 (pp. 157-162). IEEEE.
IEEE
15. Barbedo, 2013, J.G.A. Techniques for digital image processing to detect, quantify and classify plant disease. SpringerPlus, p .660, 2(1).
16. Naikwadi, S. and Amoda, N., 2013. Advancements in plant disease identification image processing. Global Technology and Managemen t
Software or Innovation Journal (IJAIEM), 2(11).
Paper Title: Effectiveness of Yield Measures on Performance and Profitability of Selected Banks in India
Abstract: Productivity is one of the important measures which helps for growth and development of economy
of the country. The productivity plays a crucial part in organizational achievement of excellence which is essential
for dynamic society. Optimum productivity of a company depends on coordination between all inputs that yield
723. maximum profitability with minimum effort. Hence the present study is focus on an objective of identify and
compare the factors influencing the Productivity as well as Profitability Performance of select Public and Private 4150-
sector banks in India. The sample consists of 20 Banks which were operating in India. The study period considered 4155
for the study is ten years from 2008-09 to 2017-18. The methodology which is used in the present study is
Correlation analysis which helps to know the relationship between the select variables and Regression analysis is
used to analyse the impact of select independent variables such as Sales Per employee, value added per employee,
Profit before tax per employee, employee cost to sales and employee cost to value added on dependent variables
like Return on Assets, Return on Equity and Value added per fixed assets. Further Independent sample test is used
to assess the relationship between Productivity and Performance measures of select Public and Private sector Banks
in India. Thus, the results from correlation analysis indicate that almost all the independent variables except Sales
per employee and employee cost to sales have significant relationship with dependant variables in both Public
sector and private sector banks. The Regression result shows that Sales per employee is having significant negative
impact on Return on Assets, return on equity and Value added per fixed assets. Independent samples test reveals
that the Private sector banks are showing superior performance than Public sector banks.
Paper Title: Corporate System Users Identification by the Keyboard Handwriting based on Neural Networks
Abstract: The paper is devoted to practical information security aspects in the corporate system. Particular
attention is paid for the ensuring access control problem for corporate confidential information. Solving this
problem involves identifying a person trying to gain unauthorized access to the corporate system and identification
of a authorized user committing illegal actions. The paper shows that a person's keyboard handwriting is
determined by behavioural characteristic, which is very difficult to imitate. This means that the person
identification based on the keyboard handwriting analysis is the most reliable. It is necessary to consider the
possibility of accidental uncontrolled change user’s keyboard handwriting settings when it works. Such changes
can be caused by changes in physiological or emotional state. Using neural networks enables to perform analysis of
handwriting keyboard considering these changes at the real time. Thus, the artificial neural networks using makes it
possible considerably improves the security of corporate confidential information protection from authorized user
committing illegal actions. Existing methods and algorithms for user identifying by his keyboard handwriting are
focused on using a multilayer perceptron. However, FAM architecture and capabilities analysis of adaptive
resonance theory has identified advantages such as the ability to form associative pairs and map the rules of fuzzy
724. inferences to clusters of neural networks in this category. Considering these characteristics was decisive in
choosing the neural network intelligent system for users identification by his keyboard handwriting style. As a
4156-
result of the research proposed generalized architecture Corporate System Users Identification by the Keyboard
4161
Handwriting, based on the use of Cascade ARTMAP. The scheme of rules formation in Cascade ARTMAP and the
knowledge base formation scheme of Users Identification Intelligent System by Keyboard Handwriting are
proposed.
Keyword : access control, information security, keyboard handwriting, neural network, unauthorized access.
References:
1. Hack at any cost: how much APT can cost https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/ch
2. Internet Security Threat Report: Volume 21 by Symantec Corporation https://www.symantec.com/content/dam/symantec/docs/reports/
istr21-2016-en.pdf
3. W.-K. Incident Response Capabilities in 2016: The 2016 SANS https://www.sans.org/reading-room/whitepapers/incident/
incidentresponse-capabilities-2016-2016-incident-response-survey- 37047.
4. V. Ivanov, E. Lubova, D. Cherkasov, “Authentication And Authorization”, Problems of modern science and education 2017.
5. Keyboard handwriting as a means of authentication, I. Aguryanov , https://www.securitylab.ru/blog/personal/aguryanov/29985.php
6. K. Bossanova, Social Engineering Or How To Hack The Human System, Scientists Of Labor On The Union At The Student - Plovdiv.
Series A: Public Sciences, Art And Culture.
7. V.E. Snityuk “The problem of choosing the optimal alternative in the conditions of compositional uncertainty“, Cherkasy: ChITI Bulletin,
2000, №2, рр. 140-145.
8. S. Osowski “Sieci neuronowe do przetwarzania informacji“, Warszawa, 2000, p 342. (in Polish).
9. G.A. Carpenter, S. Grossberg, J.H. Reynolds “ARTMAP: Supervised Real-Time Learning and Classification of Nonstationary Data by a
Self-Organizing Neural Network“, Neural Networks, 4, 1991.
10. A. Arutiunian “Fuzzy Neural Network Sorter”, Technological Systems, Кiev,2009, vol.1(45), рр. 54–57.
11. В. Kosko, С. Guest “Optical bi-directional associative memories“, Sosiety for Photo-optical and Instrumentation Engineers Proceedings:
Image Understanding, 1987, рр. 11-18
12. J. J. Hopfield “Learning algorithms and probability distributions in feedforward and feed-back networks“, PNAS December 1, 1987 84
(23) рр. 8429-8433. https://doi.org/10.1073/pnas.84.23.8429
13. A. H. Tan “Cascade ARTMAP: Integrating Neural Computation and Symbolic Knowledge Processing“, IEEE Trans, Neural Networks,
1997, vol. 8, n.2.
14. Terenchuk, N. Poltorachenko, Yu. Kosharna “Analysis of the ability of artificial neural networks to solve the problems of ass essing the
technical condition of building structures”. “Construction production”. Kiev, vol.63/1, 2017, pp.85-90
15. Terenchuk, А. Pashko, В. Yeremenko, S. Kartavykh, N. Ershovа, “Modeling an intelligent system for the estimation of technical state of
construction structures“, Eastern-European Journal of Enterprise Technologies, 2018, Vol3, #2(93), рр. 47-53
16. H.T. Hguen, M. Sugeno, R. Tong, R. R. Yager “Theoretical aspects of fuzzy control“, New York, John Wiley & Sons, 1995, 359 p.
17. Yu. Rіabchun “Intellectualization of decision support systems for choosing the specialization of training”. Management of Development of
Complex Systems. Kiev, 2019, vol. 39
Paper Title: Support Vector Regression based Mapreduce Throttled Load Balancer for Data Centers
Abstract: The process of analyzing big data and other valuable information is a significant process in the
cloud. Since big data processing utilizes a large number of resources for completing certain tasks. Therefore, the
incoming tasks are allocated with better utilization of resources to minimize the workload across the server in the
cloud. The conventional load balancing technique failed to balance the load effectively among data centers and
dynamic QoS requirements of big data application. In order to improve the load balancing with maximum
throughput and minimum makespan, Support Vector Regression based MapReduce Throttled Load Balancing
(SVR-MTLB) technique is introduced. Initially, a large number of cloud user requests (data/file) are sent to the
cloud server from different locations. After collecting the cloud user request, the SVR-MTLB technique balances
the workload of the virtual machine with the help of support vector regression. The load balancer uses the index
table for maintaining the virtual machines. Then, map function performs the regression analysis using optimal
hyperplane and provides three resource status of the virtual machine namely overloaded, less loaded and balanced
load. After finding the less loaded VM, the load balancer sends the ID of the virtual machine to the data center
controller. The controller performs migration of the task from an overloaded VM to a less loaded VM at run time.
This in turn assists to minimize the response time. Experimental evaluation is carried out on the factors such as
throughput, makespan, migration time and response time with respect to a number of tasks. The experimental
results reported that the proposed SVR-MTLB technique obtains high throughput with minimum response time,
makespan as well as migration time than the state -of -the -art methods.
Keyword : Big data processing, Support Vector Regression, hyperplane, Throttled Load Balancing, MapReduce
function
References:
1. Feilong Tang , Laurence T. Yang , Can Tang , Jie Li ; Minyi Guo, “A Dynamical and Load-Balanced Flow Scheduling Approach for Big
725. Data Centers in Clouds”, IEEE Transactions on Cloud Computing, Volume 6 , Issue 4 , 2018, Pages 915 – 928
2. Altaf Hussain, Muhammad Aleem, Abid Khan, Muhammad Azhar Iqbal, Muhammad Arshad Islam, “RALBA: a computation -aware load 4162-
balancing scheduler for cloud computing”, Cluster Computing, Springer, Volume 21, Issue 3, 2018, Pages 1667–1680 4171
3. Jie Cui , Qinghe Lu , Hong Zhong , Miaomiao Tian , Lu Liu, “A Load-Balancing Mechanism for Distributed SDN Control Plane Using
Response Time”, IEEE Transactions on Network and Service Management , Volume 15 , Issue 4 , 2018, Pages 1197 – 1206
4. Jian Liu, Huanqing Dong, Junwei Zhang, Zhenjun Liu, Lu Xu, “HWM: a hybrid workload migration mechanism of metadata server cluster
in data center”, Frontiers of Computer Science, Springer, Volume 11, Issue 1,2017, Pages 75–87
5. Sweekriti M. Shetty and Sudheer Shetty, “Analysis of load balancing in cloud data centers”, Journal of Ambient Intelligence and
Humanized Computing, Springer, 2019, Pages 1-9
6. J. Octavio Gutierrez-Garcia and Adrian Ramirez-Nafarrate, “Agent-based load balancing in Cloud data centers”, Cluster Computing,
Springer, Volume 18, Issue 3, September 2015, Pages 1041-1062
7. Shuo Wang, Jiao Zhang, Tao Huang, Tian Pan, Jiang Liu, Yunjie Liu, “Flow distribution-aware load balancing for the datacenter”,
Computer Communications, Elsevier, Volume 106, 2017, Pages 136-146
8. Liang Yu ,Tao Jiang , Yulong Zou, “Price-Sensitivity Aware Load Balancing for Geographically Distributed Internet Data Centers in
Smart Grid Environment”, IEEE Transactions on Cloud Computing, Volume 6 , Issue 4 , 2018, Pages 1125 – 1135
9. Jun Duan and Yuanyuan Yang, “A Load Balancing and Multi-Tenancy Oriented Data Center Virtualization Framework”, IEEE
Transactions on Parallel and Distributed Systems, Volume 28 , Issue 8 , 2017 , Pages 2131 – 2144
10. Mohit Kumar and S.C.Sharma, “Deadline constrained based dynamic load balancing algorithm with elasticity in cloud environment”,
Computers & Electrical Engineering, Elsevier, Volume 69, 2018, Pages 395-411
11. Jia Zhao, Kun Yang ,Xiaohui Wei , Yan Ding , Liang Hu , Gaochao Xu, “A Heuristic Clustering -Based Task Deployment Approach for
Load Balancing Using Bayes Theorem in Cloud Environment”, IEEE Transactions on Parallel and Distributed Systems, Volume 27 , Issue
2 , 2016 , Pages 305 – 316
12. Tianyi Chen , Antonio G. Marques , Georgios B. Giannakis, “DGLB: Distributed Stochastic Geographical Load Balancing over Cloud
Networks”, IEEE Transactions on Parallel and Distributed Systems ,Volume 28 , Issue 7 , Pages 1866 – 1880
13. Xiao Song, Yaofei Ma, and Da Teng, “A Load Balancing Scheme Using Federate Migration Based on Virtual Machin es for Cloud
Simulations”, Mathematical Problems in Engineering, Hindawi Publishing Corporation, Volume 2015, September 2014, Pages 1 -11
14. Jixiang Yang, Ling Ling, and Haibin Liu, “A Hierarchical Load Balancing Strategy Considering Communication Delay Overh ead for
Large Distributed Computing Systems”, Mathematical Problems in Engineering, Hindawi Publishing Corporation, Volume 2016, April
2016, Pages 1-9
15. Hadi Khani, Nasser Yazdani, Siamak Mohammadi, “A self‐organized load balancing mechanism for cloud compu ting”, Concurrency and
Computation: Practice And Experience, Volume 29, Issue 4, 2017, Pages 1-19
16. Ramona Trestian , Kostas Katrinis, Gabriel-Miro Muntean, “OFLoad: An OpenFlow-Based Dynamic Load Balancing Strategy for
Datacenter Networks”, IEEE Transactions on Network and Service Management , Volume 14 , Issue 4 , 2017, Pages 792 – 803
17. Keng-Mao Cho, Pang-Wei Tsai, Chun-Wei Tsai, Chu-Sing Yang, “A hybrid meta-heuristic algorithm for VM scheduling with load
balancing in cloud computing”, Neural Computing and Applications, Springer, Volume 26, Issue 6, August 2015, Pages 1297–1309
18. Kousik Dasguptaa, Brototi Mandalb, Paramartha Duttac, Jyotsna Kumar Mondald, Santanu Dame, “A Genetic Algorithm (GA) based Lo ad
Balancing Strategy for Cloud Computing”, Procedia Technology, Elsevier, Volume 10, 2013, Pages 340 – 347
19. Jianjiang Li, Yajun Liu, Jian Pan, Peng Zhang, Wei Chen, Lizhe Wang, “Map-Balance-Reduce: An improved parallel programming model
for load balancing of MapReduce”, Future Generation Computer Systems, Elsevier, 2017, Pages 1-28
20. Hui Zhang , Guofei Jiang , Kenji Yoshihira , Haifeng Chen, “Proactive Workload Management in Hybrid Cloud Computing”, IEEE
Transactions on Network and Service Management , Volume 11 , Issue 1, 2014, Pages 90 – 100
21. E.Sivaraman, R. Manickachezian, “Unevenness measurement using the support vector machine and dynamic multiservice load balancing
with modified genetic algorithm in cloud-based multimedia system”, International Journal of Computer Aided Engineering and
Technology, Volume 10, Issue 6, 2018, Pages 732-747
22. E.Sivaraman, R. Manickachezian, “Efficient multimedia content storage and allocation in multidimensional cloud computing reso urces”,
International Journal of Intelligent Systems Technologies and Applications,, Volume 18 , Issue 1-2, 2019, Pages 20 – 33
23. C.R.Durga Devi and R.Manicka Chezian, “Resource optimized ensemble gradient boosting classifier for traffic aware big data an alytics”,
Journal of Advanced Research in Dynamical & Control Systems , Volume 10 , Issue 3, 2018, Pages 839-852
24. C.R.Durga Devi and R.Manicka Chezian, “Multivariate Logistic Regression based Gradient Descent Firefly Optimized Round Robin
Scheduling with Big Data”, Journal of Advanced Research in Dynamical & Control Systems , Volume 11 , Issue 1, 2019 , Pages 179-192
Keyword : Natural Language processing, Text mining, Question answering system, Data mining.
References:
1. A. Mohasseb, M. Bader-El-Den, M. Cocea, Question categorization and classification using grammar based approach, Information
Processing and Management, 2018.
2. O. Kolomiyets, M.-F. Moens, A survey on question answering technology from an information retrieval perspective, Inf. Sci. 181 (24)
(2011) 5412–5434.
3. F. Bu, X. Zhu, Y. Hao, X. Zhu, Function-based question classification for general qa, in: Proceedings of the 2010 conference on empirical
726. methods in natural language processing, Association for Computational Linguistics, 2010, pp. 1119–1128.
4. J. Bullington, I. Endres, M. Rahman, Open ended question classification using support vector machines, in: MAICS, 2007.
5. X. Li, D. Roth, Learning question classifiers: the role of semantic information, Nat. Lang. Eng. 12 (03) (2006) 229–249. 4172-
6. P. Le-Hong, X.-H. Phan, T.-D. Nguyen, Using dependency analysis to improve question classification, in: Knowledge and Systems 4176
Engineering, Springer, 2015, pp. 653–665.
7. X. Li, X.-J. Huang, L.-d. Wu, Question classification using multiple classifiers, in: Proceedings of the 5th Workshop on Asian Language
Resources and First Symposium on Asian Language Resources Network,2005.
8. D. Metzler, W.B. Croft, Analysis of statistical question classification for fact-based questions, Inf. Retr. 8 (3) (2005) 481–504.
9. D. Zhang, W.S. Lee, Question classification using support vector machines, in: Proceedings of the 26th Annual International ACM SIGIR
Conference on Research and Development in Informaion Retrieval, ACM,2003, pp. 26–32.
10. M. Mishra, V.K. Mishra, H. Sharma, Question classification using semantic, syntactic and lexical features, Int. J. Web Semant. Technol. 4
(3) (2013) 39.
11. Z. Huang, M. Thint, Z. Qin, Question classification using head words and their hypernyms, in: Proceedings of the Conference on
Empirical Methods in Natural Language Processing, Association for Computational Linguistics, 2008, pp. 927–936.
12. F. Li, X. Zhang, J. Yuan, X. Zhu, Classifying what-type questions by head noun tagging, in: Proceedings of the 22nd International
Conference on Computational Linguistics-Volume 1, Association for Computational Linguistics, 2008, pp. 481–488.
13. D. Moldovan, M. Pa¸sca, S. Harabagiu, M. Surdeanu, Performance issues and error analysis in an open -domain question answering
system, ACM Trans. Inf. Syst. 21 (2) (2003) 133–154.
14. F. Benamara, Cooperative question answering in restricted domains: the webcoop experiment, 2004.
15. T.T. Nguyen, L.M. Nguyen, A. Shimazu, Using Semi-Supervised Learning for Question Classification, vol. 3, Information and Media
Technologies Editorial Board, 2008, pp. 112–130.
16. T.T. Nguyen, L.M. Nguyen, Improving the accuracy of question classification with machine learning, in: Research, Innovation and
Vision for the Future, 2007 IEEE International Conference on, IEEE, 2007, pp. 234–241.
17. Márquez, Lluís, and Lluis Padró. "A flexible POS tagger using an automatically acquired language model." Proceedings of the eighth
conference on European chapter of the Association for Computational Linguistics. Association for Computational Linguistics, 1997.
18. Speck, R., Ngonga Ngomo, A.-C.: Ensemble learning for named entity recognition. In: Mika, P., et al. (eds.) ISWC 2014, Part I. LNCS,
vol. 8796, pp. 519–534. Springer, Heidelberg (2014)
19. N. Van-Tu, L. Anh-Cuong, Improving question classification by feature extraction and selection, Indian J. Sci. Technol. 9 (17) (2016).
20. D. Metzler, W.B. Croft, Analysis of statistical question classification for fact-based questions, Inf. Retr. 8 (3) (2005) 481–504.
21. S. Xu, G. Cheng, F. Kong, Research on question classification for automatic question answering, in: Asian Language Processing (IALP),
2016 International Conference on, IEEE, 2016, pp. 218–221.
Keyword : Red mud, concrete, mix design, M30, aluminum hydroxides, compressive strength, split tensile
strength
References:
1. Moh Juned & Mr. Anwar Ahmad, “Experimental Study of Concrete Strength Properties Using Red Mud (bauxite residue) as a partial
replacement of binder content for M25 grade of Concrete” Volume 5, Issue 04, April-2019.
2. D. Linora Metilda, C. Selvamony, R. Anandakumar and A. Seeni Investigations on optimum possibility of replacing cement partia lly by
redmud in concrete Vol. 10(4), pp. 137-143, 28 February, 2015
3. Sunitha M.Pujar, Dr.K.B.Prakash,Effect of Replacement of Cement by Red mud on the Properties of Concrete, Volume 5, Issue 9,
September-2014
4. Sandeep B. Chougule, Uday B. Patil, Suhas M. Patil On the Experimental Investigations of Red Mud, Volume 6 Issue XI, Nov 2018.
5. Gowsalya. R & Bhagyalakshmi. A, Experimental Study on Partial Replacement of Cement by Red Mud, NCRTET-2015 Conference
Proceedings
Authors: Muhamad Farhan Mohd Pu’ad, Khairul Azami Sidek, Maizirwan Mel
Paper Title: Portable Water Quality Monitoring System for Aquaponics using We MOS
Abstract: Technology today had advanced rapidly for the betterment of our life. However, agriculture seems to
be left behind in the rapid progress. With the growing population nationwide, more food is required especially in
the agriculture sector. Aquaponics is an efficient approach for food production which combines plant and fish
farming together. In aquaponics, water quality especially the water’s pH level is crucial to be monitored regularly
to ensure the fishes are in good health. However, measuring the pH level routine is no longer efficient today since
the availability of technology. This study proposed a portable water quality monitoring system which currently only
measures the water’s pH level since it is the most important parameter in water quality. Mainly, the system uses
WeMos board and Message Queuing Telemetry Transport (MQTT) protocol for data processing and sending it to a
Raspberry Pi (base station) for storage and visualisation. The device has been successfully tested at the Malaysian
Institute of Sustainable Agriculture (MISA). website. The device was proven waterproof and floatable. It also can
run for about 89 hours on battery only without solar panel. However, there is always area for improvement which
includes adding more sensors to optimise usage of the device and also a Liquid-Crystal Display (LCD) screen for
user convenience. Nonetheless, this is a step towards modernising the agriculture sector.
728.
Keyword : Aquaponics, monitoring system, water quality, WeMos.
4181-
References: 4184
1. Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233-
2243.
2. Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9.
3. Prosekov, A. Y., & Ivanova, S. A. (2018). Food security: The challenge of the present. Geoforum, 91, 73-77.
4. Rakocy, J. E. (2012). Aquaponics: integrating fish and plant culture. Aquaculture production systems, 1, 343-386.
5. Junge, R., König, B., Villarroel, M., Komives, T., & Jijakli, M. H. (2017). Strategic points in aquaponics.
6. Nikhil, R., Rajender, R., Dushyantha, G. R., Khadri, M. N. S., & Kalshetty, J. N. (2018). Smart water quality monitoring system using IoT
environment. Int. J. Innov. Eng. Technol.
7. Pranata, A. A., Lee, J. M., & Kim, D. S. (2017, June). Towards an IoT-based water quality monitoring system with brokerless pub/sub
architecture. In 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN) (pp. 1-6). IEEE.
8. Saravanan, K., Anusuya, E., & Kumar, R. (2018). Real-time water quality monitoring using Internet of Things in SCADA. Environmental
monitoring and assessment, 190(9), 556.
9. Memon, S. K., Shaikh, F. K., Mahoto, N. A., & Memon, A. A. (2019, January). IoT based smart garbage monitoring & collection s ystem
using WeMos & Ultrasonic sensors. In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies
(iCoMET) (pp. 1-6). IEEE.
10. Rukhmode, S., Vyavhare, G., Banot, S., Narad, A., & Tugnayat, R. M. (2017). IOT based agriculture monitoring system using wem os. no.
March, 14-19.
11. Kodali, R. K., & Sahu, A. (2016, December). An IoT based weather information prototype using WeMos. In 2016 2nd International
Conference on Contemporary Computing and Informatics (IC3I) (pp. 612-616). IEEE.
Paper Title: Parameters Tuning of Adaptive Firefly Algorithm based Strategy for t-way Testing
Abstract: The adaptive firefly algorithm (AFA) is developed based on an elitism operator. Elitism operators
can perform the function of updating the effectiveness of diversification in a search algorithm. In this study, a
strategy was proposed to upgrade the FA concerning static issues. Most traditionally, for evolutionary algorithms,
729. elitism suggests that the best solution found is utilized to work for the next generation. Elitism involves the
replication of a small set of the fittest candidate solutions, which remain unaltered, into succeeding generations.
4185-
The condition can radically impact execution time by ensuring that the El waste no time on re-finding newly-
4191
disposed partial solutions. Candidates who stay protected and unmodified via elitism all meet the requirements for
parent selection in terms of rearing the remainder of the succeeding generation. This study used different tuning
parameters, such as the number of fireflies, iterations and switching probability. To ensure that AFA could perform
for t-way testing as useful as other strategies to generate the best performance. Considering the standard covering
array (N, 2,5^7) it demonstrates the tuning parameters for AFA to improve elitism. In this paper, the Findings
show that AFA, as well as t-way testing, can deliver the minimum requirements and sufficient results.
Keyword : T-way testing problem, combinatorial test, firefly algorithm, elitism, tuning parameters.
References:
1. M. Rahman, R. R. Othman, R. B. Ahmad, and M. M. Rahman, “Event driven input sequence t-way test strategy using simulated
annealing,” in 2014 5th International Conference on Intelligent Systems, Modelling and Simulation, 2014, pp. 663–667.
2. K. J. Nurmela, “Upper bounds for covering arrays by tabu search,” Discret. Appl. Math., vol. 138, no. 1–2, pp. 143–152, 2004.
3. J. Stardom, Metaheuristics and the search for covering and packing arrays. Simon Fraser University Burnaby, 2001.
4. A. R. A. Alsewari and K. Z. Zamli, “Design and implementation of a harmony-search-based variable-strength t-way testing strategy with
constraints support,” Inf. Softw. Technol., vol. 54, no. 6, pp. 553–568, 2012.
5. B. S. Ahmed, K. Z. Zamli, and C. P. Lim, “Constructing a t-way interaction test suite using the particle swarm optimization approach,”
Int. J. Innov. Comput. Inf. Control, vol. 8, no. 1, pp. 431–452, 2012.
6. R. Eberhart and J. Kennedy, “A new optimizer using particle swarm theory,” in MHS’95. Proceedings of the Sixth International
Symposium on Micro Machine and Human Science, 1995, pp. 39–43.
7. D. Karaboga, “An idea based on honey bee swarm for numerical optimization,” Technical report-tr06, Erciyes university, engineering
faculty, computer …, 2005.
8. A. A. Alsewari, L. M. Xuan, and K. Z. Zamli, “Firefly Combinatorial Testing Strategy,” in Science and Information Conference, 2018,
pp. 936–944.
9. X.-S. Yang, “Multiobjective firefly algorithm for continuous optimization,” Eng. Comput., vol. 29, no. 2, pp. 175–184, 2013.
10. X.-S. Yang, “Firefly algorithm, Levy flights and global optimization,” in Research and development in intelligent systems XXVI,
Springer, 2010, pp. 209–218.
11. S. Arora, S. Singh, S. Singh, and B. Sharma, “Mutated firefly algorithm,” in 2014 International Conference on Parallel, Distributed and
Grid Computing, 2014, pp. 33–38.
12. I. Pavlyukevich, “Cooling down Lévy flights,” J. Phys. A Math. Theor., vol. 40, no. 41, p. 12299, 2007.
13. X.-S. Yang, “Firefly algorithms for multimodal optimization,” in International symposium on stochastic algorithms, 2009, pp. 169–178.
14. X.-S. Yang, “Firefly Algorithms for Multimodal Optimization,” Proc. 5th Int. Conf. Stoch. Algorithms Found. Appl., pp. 169–178, 2009.
15. A. H. Gandomi, X.-S. Yang, S. Talatahari, and A. H. Alavi, “Firefly algorithm with chaos,” Commun. Nonlinear Sci. Numer. Simul., vol.
18, no. 1, pp. 89–98, 2013.
16. R. Imanirad, X.-S. Yang, and J. S. Yeomans, “Modelling-to-generate-alternatives via the firefly algorithm,” J. Appl. Oper. Res., vol. 5,
no. 1, pp. 14–21, 2013.
17. M. K. A. Ariyaratne and T. G. I. Fernando, “A comparative study on nature inspired algorithms with firefly algorithm,” Int. J. Eng.
Technol., vol. 4, no. 10, pp. 611–617, 2014.
18. J. Senthilnath, S. N. Omkar, and V. Mani, “Clustering using firefly algorithm: performance study,” Swarm Evol. Comput., vol. 1, no. 3,
pp. 164–171, 2011.
19. X. S. Yang and X. He, “Firefly algorithm: recent advances and applications,” Int. J. Swarm Intell., vol. 1, no. 1, p. 36, 2013.
20. S. M. Farahani, A. A. Abshouri, B. Nasiri, and M. R. Meybodi, “A Gaussian firefly algorithm,” Int. J. Mach. Learn. Comput., vol. 1, no.
5, p. 448, 2011.
21. X.-S. Yang, Nature-inspired metaheuristic algorithms. Luniver press, 2010.
22. S. Łukasik and S. Żak, “Firefly algorithm for continuous constrained optimization tasks,” in International conference on computational
collective intelligence, 2009, pp. 97–106.
23. S. K. Pal, C. S. Rai, and A. P. Singh, “Comparative study of firefly algorithm and particle swarm optimization for noisy non -linear
optimization problems,” Int. J. Intell. Syst. Appl., vol. 4, no. 10, p. 50, 2012.
24. X.-S. Yang and X. He, “Firefly algorithm: recent advances and applications,” arXiv Prepr. arXiv1308.3898, 2013.
25. I. Fister, X. S. Yang, and J. Brest, “A comprehensive review of firefly algorithms,” Swarm Evol. Comput., vol. 13, pp. 34–46, 2013.
26. R. R. Othman, K. Z. Zamli, and S. M. S. Mohamad, “T-way testing strategies: A critical survey and analysis,” Int. J. Digit. Content
Technol. its Appl., vol. 7, no. 9, p. 222, 2013.
27. M. I. Younis and K. Z. Zamli, “MIPOG-an efficient t-way minimization strategy for combinatorial testing,” Int. J. Comput. Theory Eng.,
vol. 3, no. 3, p. 388, 2011.
28. J. N. Cawse, Experimental design for combinatorial and high throughput materials development. Wiley-Interscience Hoboken, NJ, 2003.
29. K. Z. Zamli, R. R. Othman, M. I. Younis, and M. H. M. Zabil, “Practical adoptions of T-way strategies for interaction testing,” in
International Conference on Software Engineering and Computer Systems, 2011, pp. 1–14.
30. M. I. Younis, K. Z. Zamli, and R. R. Othman, “Effectiveness of the cumulative vs. normal mode of operation for combinatorial testing,”
in 2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA), 2010, pp. 350–354.
31. A. W. Williams, Software component interaction testing: Coverage measurement and generation of configurations. University of Ottawa
(Canada), 2002.
Keyword : Minimum Fuzzy Rule-Based Controller, Sensor, Actuator, Motion Planning, Wheeled Robot.
References:
1. Pandey and D. R. Parhi, “Optimum path planning of mobile robot in unknown static and dynamic environments using fuzzy-wind
driven optimization algorithm,” Def. Tech., vol. 13(1), pp. 47-58, 2017.
2. Engedy and G. Horvath, “Artificial neural network based local motion planning of a wheeled mobile robot,” In: IEEE Int. Sym. on
Comp. Inte. and Info. (CINTI), pp. 213-218, 2010.
3. Pandey and Kavita B., “Cascade neuro-fuzzy architecture based mobile-robot navigation and obstacle avoidance in static and dynamic
environments,” Inter. J. of Adv. Rob. and Auto., vol. 1(3), pp. 1-9, 2016.
4. M. Imen, M. Mohammad and M. A. Shoorehdeli, “Tracking control of mobile robot using ANFIS,” In: IEEE Int. Conf. on Mech. and
Auto., Beijing, China, pp. 422-427, 2011.
5. H. Miao and Y. C. Tian, “Dynamic Robot Path Planning using an Enhanced Simulated Annealing Approach,” App. Math. and Comp.,
vol. 222, pp. 420-437, 2013.
6. S. Ahmadzadeh and M. Ghanavati, “Navigation of Mobile Robot Using the PSO Particle Swarm Optimization,” Jou. of Aca. and App.
Stu. (JAAS), vol. 2(1), pp. 32-38, 2012.
7. Ghorbani, S. Shiry and A. Nodehi, “Using genetic algorithm for a mobile robot path planning,” In: IEEE Int. Conf. on Fut. Com. and
Com., Kuala Lumpur, Malaysia, pp. 164-166, 2009.
8. M. P. Garcia, O. Montiel, O. Castillo, R. Sepulveda and P. Melin, “Path planning for autonomous mobile robot navigation with ant
colony optimization and fuzzy cost function evaluation,” Appl. Soft Comp., vol. 9(3), pp. 1102-1110, 2009.
9. M. Algabri, H. Mathkour, H. Ramdane and M. Alsulaiman, “Comparative study of soft computing techniques for mobile robot
navigation in an unknown environment,” Comp. in Hum. Beha., vol. 50, pp. 42-56, 2015.
10. J. Alonso-Mora, S. Baker, and D. Rus, “Multi-robot formation control and object transport in dynamic environments via constrained
optimization,” Inter. Jour. of Robo. Res., vol. 36(9), pp. 1000–1021, 2017.
11. K. Patle, A. Pandey, D. R. K. Parhi and A. Jagadeesh, “A review: On path planning strategies for navigation of mobile robot,” Defe.
Tech., vol. 15, pp. 582–606, 2019.
12. P. Panahandeh, K. Alipour, B. Tarvirdizadeh, and A. Hadi, “A kinematic Lyapunov-based controller to posture stabilization of wheeled
mobile robots,” Mech. Sys. and Sig. Process., 134, pp. 106319–106337, 2019.
Keyword : Scheduling problem, Self Adaptive Mutated Particle Swarm Optimization, Smart Grid, Heuristic
algorithm.
References:
1. Ipakchi and F. Albuyeh, “Grid of the future,” IEEE Power and Energy Magazine, Vol. 7, No. 2, pp. 52–62, 2009.
2. Khosrow Moslehi and Ranjit Kumar, “A Reliability Perspective of the Smart Grid”, IEEE Transactions on Smart Grid, Vol. 1, No. 1, pp.
57-64, 2010.
3. Linas Gelazanskas, Kelum A.A Gamage, “Demand Side Management in Smart Grid: A Review and Proposals for Future Direction”,
Sustainable Cities and Society, Vol. 11, pp. 22-30, 2014.
731. 4. Peter Palensky and Dietmar Dietrich, “Demand Side Management: Demand Response, Intelligent Energy Systems, and smart Loads”, IEEE
Transactions of Industrial Informatics, Vol. 7, No. 3, pp. 381-388, 2011.
5. PierluigiSiano, “Demand Response and Smart Grids- A Survey”, Renewable and Sustainable Energy Reviews, Elsevier, Vol. 30, pp. 461- 4199-
478, 2014. 4208
6. Ameena Saad Al-Sumaiti, Mohammed Hassan Ahmed, and Magdy M. A. Salama, “Smart Home Activities: A Literature Review”, Electric
Power Components and Systems, Vol. 42, pp. 294–305, 2014.
7. Sergio Salinas, Ming Li and Pan Li, “Multi-Objective Optimal Energy Consumption Scheduling in Smart Grids”, IEEE Transactions on
Smart Grid, Vol. 1, No. 1, pp. 341-348, 2013.
8. Ana Soares, Carlos Henggeler Antunes, Carlos Oliveira and Alvaro Gomes, “A multi-objective genetic approach to domestic load
scheduling in an energy management system”, Energy, Elsevier, Vol. 77, pp. 144-152, 2014.
9. Christopher O. Adika and Lingfeng Wang, “Autonomous Appliance Scheduling for Household Energy Management”, IEEE Transactions
on Smart Grid, Vol. 5, No. 2, pp 673-682, 2014.
10. PhaniChavali, Peng Yang and AryeNehorai, “A Distributed Algorithm of Appliance Scheduling for Home Energy Management System”,
IEEE Transactions on Smart Grid, Vol. 5, No. 1, pp. 282-290, 2014.
11. Anvari-Moghaddam, H. Monsef and A. Rahimi-Kian, “Optimal Smart Home Energy Management Considering Energy Saving and a
Comfortable Lifestyle”, IEEE Transactions on Smart Grid, Vol. 6, No. 1, pp. 324-332, 2015.
12. H. T. Roh and J. W. Lee, “Residential Demand Response Scheduling with Multiclass Appliances in the Smart Grid”, IEEE Transactions on
Smart Grid, Vol. 7, No. 1, pp. 94-104, 2016.
13. Mohammad Rastegar, Mahmud Fotuhi-Firuzabad and HamidrezaZareipour, “Home energy management incorporating operational priority
of appliances”, Electrical Power and Energy Systems, Elsevier, Vol. 74, pp. 286–292, 2016.
14. P. Samadi, V.W. Wong and R. Schober, “Load scheduling and power trading in systems with high penetration of renewable energy
resources”, IEEE Transactions on Smart Grid, Vol. 7, No. 4, pp. 1802–1812, 2016.
15. Hu, R. Skorupski, R. Entriken and Y. Ye, “A Mathematical Programming Formulation for Optimal Load Shifting of Electricity Demand for
the Smart Grid”, IEEE Transactions on Big Data, Vol. 99, pp.1-14, 2016.
16. Y. Wang, B. Wang, C.C. Chu, H. Pota, and R. Gadh, “Energy management for a commercial building microgrid with stationary and mobile
battery storage”, Energy and Buildings, Vol. 116, pp. 141–150, 2016.
17. Y. Zhang, N. Rahbari-Asr, J. Duan and M. Y. Chow, “Day-Ahead Smart Grid Cooperative Distributed Energy Scheduling With Renewable
and Storage Integration”, IEEE Transactions on Sustainable Energy, Vol. 7, No. 4, pp. 1739-1748, 2016.
18. W. Shi, N. Li, C. C. Chu, and R. Gadh, “Real-Time Energy Management in Microgrids”, IEEE Transactions on Smart Grid, Vol. 8, No. 1,
pp. 228-238, 2017.
19. S.Bahrami, V.W. Wong and J. Huang, “An Online Learning Algorithm for Demand Response in Smart Grid”, IEEE Transactions on Smart
Grid,doi: 10.1109/TSG.2017.266759, 2017.
20. A.H. Mohsenian-Rad and A. Leon-Garcia, "Optimal residential load control with price prediction in real-Time electricity pricing
environments," IEEE Transactions on Smart Grid, vol. 1, no. 2, pp. 120-133, 2010.
21. C. Chen, K. G. Nagananda, G. Xiong, S. Kishore and L. V. Snyder, "A Communication-Based Appliance Scheduling Scheme for
Consumer-Premise Energy Management Systems," in IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 56-65, 2013.
22. Chengshan Wang, Yue Zhou, Jidong Wang and Peiyuan Peng, “A novel Traversal -and-Pruning algorithm for household load scheduling”,
Applied Energy, Vol. 102, pp. 1430-1438, 2013.
23. M. Fathi and H. Bevrani, "Adaptive Energy Consumption Scheduling for Connected Microgrids Under Demand Uncertainty," in IEEE
Transactions on Power Delivery, vol. 28, no. 3, pp. 1576-1583, 2013.
24. Khomami H S, Javidi M H, “An Efficient Home Energy Management System for Automated Residential Demand Response”, 28th
International Power System Conference, 4-6 November, Tehran, Wroclaw, pp. 303-312, 2013.
25. K. M. Tsui and S. C. Chan, “Demand Response Optimization for Smart Home Scheduling Under Real-Time Pricing”, IEEE Transactions on
Smart Grid, Vol. 3, No. 4, pp. 1812-1821, 2012.
26. Thillainathan Logenthiran, Dipti Srinivasan, and Tan Zong Shun, “Demand Side Management in Smart Grid Using Heuristic Optimization”,
IEEE Transactions on Smart Grid, Vol. 3, No. 3, pp. 1244-1252, 2012.
Paper Title: Pitch Pattern Analysis in Speech of Children with Autism Spectrum Disorder
Abstract: Autism Spectrum Disorder (ASD) is a multifaceted neurodevelopmental condition. Atypical
communication mostly occurs in tandem with ASD. We compared voice pitch of 16 Marathi children and
adolescents with ASD of age of 7 to 18 with 27 Typically Developing (TD). Speech samples have been recorded
and stored in .wav format with sampling frequency of 48000 Hz. For analysis we used PRAAT, a program for
speech analysis, manipulation and synthesis. We divided the ASD and TD group into total 4 groups on basis of age
and gender for comparison. We found that differences in voice pitch are present in these comparison groups, and
male ASD group have more pitch variation than respective comparison groups. In future we look forward to
include more ASD participants in study to increase the Marathi speech database for ASD.
Paper Title: Assessement of Safety Management for Public Construction Sites in Nigeria
Abstract: The study investigates the attitude of construction firms operating within Kano metropolis towards
safety provision for workers on site. In achieving these objectives Investigatory Survey Research Approach Method
(ISRAM) was adopted and used in order to obtain quantitative and qualitative data. Questionnaires were distributed
to various construction companies within Kano metropolis, the totals of eighty (80) copies were distributed and
fifty eight (58) copies were retrieved. Data collected were found suitable. And were analyzed using Software
statistical package (SPSS). From the analysis the result revealed that there is negligence in the attitude of
construction companies towards safety and stricter regulations have to been forced. Dissemination of information
733. on safety techniques would reduce accident on site and increase the worker’s moral for better performance in turns
to reducing overrun cost. Ineffectiveness of government policy on safety measure especially in construction work 4213-
was found to have contributed to low productivity by workers on site, since they don’t have access to any claim 4217
even when accident occurred on sites. Archaeologists have discovered thousands of bodies buried in the foundation
of the wall. Bodies were also used to make up the wall’s thickness. It has been estimated that millions of workers
lost their lives due to accident, intense physical labor, starvation and disease. This is in order of magnitude of life
per meter of wall length. Therefore, safety in mission statement of large construction firms or companies is not
common (Amaechi, 1990). Execution is supported by correlation; some of these correlations were by organizations
such as Independent Project Analysis (IPA). It has been statistically proven that there is correlation between good
front end loading and safety performance of good front end loading.
Keyword : Investigatory Survey Research Approach Method (ISRAM), Software statistical package (SPSS).
References:
1. Amaechi, I. O. (1990), "Accident on construction site", The Registered Builder's Journa; A. Publication of the Nigerian institute of
building Vol. 1 No2,pp.3-6.
2. Boucher R. C. (1999),“Industrial Studies for Building Students”, Longman Publishers, Toronto, Canada, p6.
3. De Rlamer R. (1980),"Modern Safety and Health Technology", A Wiley Inter-service Publication, California, pp 55.
4. D. Russel (1958),"Modern Safety Practice" Dobbs Ferry John willey& Sons Inc. New York. Pp 95-97.[5] George S. (2004),"Building
Technology and Management", 2nd Edition, Prentice Hall Inc. london, pp 12 and 18.
5. Institution of Civil Engineering (1960), Safety on construction sites.
6. M. Evans (1968),"The Employers Guide to the Law of Health Safety & Welfare work", A Wheat & Co. Ltd Exeter, Devcon 24 High
Buru Cres. London. Pp 55.
7. Nunauly S. W. (1995) ,“Construction and Management”, Revised Edition, Tata McGraw Hill Publishing Company, New Delhi, India,
p44.
8. Oyedeiran O. S. (1989), “Industrial Accident and safety (Concept causes and cases)”, presented to the Department of psychology,
University of Lagos, p57.
9. Paulson, B. C. (1992), “Professional Construction Management.” Graw-Hill, Inc. New York. P58-60.
10. R. Chudley R. (2006) “Building Construction Hand book ” Sixth edition Printed and bound Great in Britain By Biddles Ltd. P34.
11. Nigeria, (1999) Constitution “Factories Decree No. of June 1987” Part III Section 23, Part V Section 47, Part VII Section 60.
12. Osha 2014 (https://www.osha.gov/doc/) .
13. Wikipedia ( http://en.wikipedia.org/wiki/Construction#cite_note-niosh-topic-21).
14. Ehow (http://www.ehow.com/about_5559326_safety-important-construction.html).
15. Audra Binca (2014) “Importance of safety in Contrction”http://www.ehow.com/about_5559326_safetyimportant-construction.html.
Authors: Merlin Gilbert Raj S, Shine Let G, Merlin Sajini M L, Paul Abraham
735 Abstract: Due to the development of road infrastructure and business trade, transportation of goods is
increasing day-by-day. Each vehicle has its own configuration, size, power and capacity. However, heavy vehicles
4223-
are often used to carry loads beyond their capacity. Therefore overloading is one of the major problems which
4230
affect truckers as well as other motorists and pedestrians going near-by. In order to provide a convenient solution to
this problem, a web-based tracking system is proposed. A heavy duty vehicle which is overloaded and moving at
high speed may cause the vehicle to loose balance while making turns along the roads. This problem may also
cause the tire to burst, which in turn makes it difficult to control the vehicle. Communication module is interfaced
with a microcontroller which takes data from global positioning system receiver to locate the current position of the
overloaded vehicle. This unit is majorly controlled by an electronic control unit. A sensing element is placed at the
axle point of the vehicle to concentrate on the total weight of the vehicle. A software study is done to extract the
global positioning system data from GPRMC format. The proposed system is simulated and tested for semi-real
data. The received data is transmitted to the control room user for further improvement in traffic regulation and
road safety.
Keyword : Force sensor resistor GSM, GPS, Overloaded vehicle, smart tracking, Web-interface.
References:
1. Swapan Bagui, A. Das, and C. Bapanapalli, “Controlling Vehicle Overloading in BOT Projects,” Procedia - Soc. Behav. Sci., vol.
104, pp. 962–971, 2013.
2. A. Kishore and R. Klashinsky, “Prevention of Highway Infrastructure Damage Through Commercial Vehicle Weight Enforcement,”
Annu. Indian Roads Congr. Sess., pp. 4–7, 2000.
3. B. Jacob and V. Feypell-de La Beaumelle, “Improving truck safety: Potential of weigh-in-motion technology,” IATSS Res., vol. 34, no.
1, pp. 9–15, 2010.
4. A. D. E. Coning and A. J. Hoffman, “Proposed Alternative To Assist Current Overload Operations in South Africa,” Proc. 35th South.
African Transp. Conf. (SATC 2016), no. Satc, pp. 23–35, 2016.
5. A. N. M. Faruk, W. Liu, S. I. Lee, B. Naik, D. H. Chen, and L. F. Walubita, “Traffic volume and load data measurement using a portable
weigh in motion system: A case study,” Int. J. Pavement Res. Technol., vol. 9, no. 3, pp. 202–213, 2016.
6. A. Mahmoudabadi and S. M. Seyedhosseini, “Improving the efficiency of weigh in motion systems through optimized allocating tr uck
checking oriented procedure,” IATSS Res., vol. 36, no. 2, pp. 123–128, 2013.
7. K. Muronga, I. Sallie, V. De Franca, and A. Nieuwoudt, “Monitoring overloaded vehicles: improving traffic control centre performance
by using management information systems,” Proc. 35th South. African Transp. Conf. (SATC 2016), no. Satc 2016, pp. 597–608, 2016.
8. K. Hassan, A. Sam, and D. Machuve, “Overview on Passengers Overload Control in Public Buses Case Study: Tanzania,” Int. J. En g.
Comput. Sci., vol. ISSN, no. 8, pp. 2536–2540, 2013.
9. T. Sinshaw, “Designing Of Overload Monitoring System In Public Transportation Based On,” Int. J. Sci. Technol. Res., vol. 6, no. 10, pp.
273–277, 2017.
10. M. Safdar, “A Mobile Vehicle Weight Sensor and its Application in Transportation (Case Study : Municipal Solid Waste Collection
Vehicles),” 1st Int. Electron. Conf. Remote Sens., pp. 1–12, 2015.
11. K. Renju and P. Noronha, “A Survey on Detecting Overloaded Vehicle in Video Surveillance Systems,” Int. J. Eng. Res. …, vol. 4, no.
02, pp. 2–4, 2015.
12. Khairurrijal, M. M. Munir, A. Suhendi, H. Thaha, and M. Budiman, “An AT89S52 Single Board Computer for Teaching an
Instrumentation System Course,” Comput. Appl. Eng. Educ., vol. 15, no. 2, pp. 166–173, 2006.
13. K. A. Salim and I. M. Idrees, “Design and Implementation of Web-Based GPS-GPRS Vehicle Tracking System,” Int. J. Comput. Sci.
Eng. Technol., vol. 3, no. 12, pp. 443–448, 2013.
Authors: Zahoor Ur Rehman, Siti Sarah Binti Omar, Shafie Bin Mohamad Zabri, Sonia Lohana
Paper Title: Wideband Circularly Polarized Planer Inverted-F Antenna using Reactive Impedance Surface
Abstract: A wideband circularly polarized (CP) planar inverted-F antenna (PIFA) is proposed and designed
using reactive impedance surface (RIS) for mobile communication. PIFA with RIS is used for CP radiation, size
reduction and wideband of the proposed CP-PIFA. It is a different technique for improving the various performance
parameters of the antenna, that is, narrow bandwidth, size reduction, and the axial ratio (AR). The structure of
circular polarized PIFA is designed, analyzed, geometrically optimized, and implementation of the antenna to
operate at 2.4 GHz WLAN bands. Finally, a proposed CP-PIFA is analyzed and simulated using full 3D
electromagnetic high-frequency structure simulator (HFSS). The measured impedance bandwidth of designing an
antenna (S11) 10-dB is 1399 MHz (1.542-2.943 GHz) 58.29\%, simulated 3-dB axial ratio bandwidth is 870 MHz
(1.639-2.50 GHz) 36.25\%, measured voltage standing wave ratio (VSWR) is 1.02 and the realized gain is 8.1 dB
for the 2.4 GHz WLAN bands.
Keyword : Planar Inverted-F Antenna, Reactive Impedance Surface, Wideband, Circular Polarization, Axial
Ratio.
737.
References: 4240-
1. X.-Z. Lai, Z.-M. Xie, X.-L. Cen, and Z. Zheng, “A novel technique for broadband circular polarized pifa and diversity pifa systems,”
Progress In Electromagnetics Research, vol. 142, pp. 41–55, 2013. 4245
2. C. Y. Chiu, K. M. Shum, and C. H. Chan, “A tunable via-patch loaded pifa with size reduction,” IEEE transactions on antennas and
propagation, vol. 55, no. 1, pp. 65–71, 2007.
3. N. L. Bohannon and J. T. Bernhard, “Design guidelines using characteristic mode theory for improving the bandwidth of pifas,” IEEE
Transactions on Antennas and Propagation, vol. 63, no. 2, pp. 459– 465, 2014.
4. H. Wong, K. K. So, K. B. Ng, K. M. Luk, C. H. Chan, and Q. Xue, “Virtually shorted patch antenna for circular polarization,” IEEE
Antennas and Wireless Propagation Letters, vol. 9, pp. 1213–1216, 2010.
5. K. Agarwal, A. Alphonse et al., "Compact asymmetric-cross slotted microstrip antenna on reactive impedance surface," in 2012 IEEE
AsiaPacific Conference on Antennas and Propagation. IEEE, 2012, pp. 51–52.
6. Y. Dong, H. Toyao, and T. Itoh, “Compact circularly-polarized patch antenna loaded with metamaterial structures,” IEEE transactions
on antennas and propagation, vol. 59, no. 11, pp. 4329–4333, 2011.
7. K. Agarwal, A. Alphonse et al., "Design of compact circularly polarized microstrip antennas using meta-surfaces," in 2013 European
Microwave Conference. IEEE, 2013, pp. 1067–1070.
8. N. Jeevanandham, K. Agarwal, A. Alphonse et al., "Dual-band circularly polarized hexagonal-slot antenna," in 2012 9th European
Radar Conference. IEEE, 2012, pp. 508–511.
9. Y. Yao, X. Wang, X. Chen, J. Yu, and S. Liu, "Novel diversity/Mimo pifa antenna with broadband circular polarization for multimode
satellite navigation," IEEE Antennas and Wireless Propagation Letters, vol. 11, pp. 65–68, 2012.
10. A. Motevasselian and W. G. Whittow, "Patch size reduction of rectangular microstrip antennas using a cuboid ridge," IET Microwaves,
Antennas & Propagation, vol. 9, no. 15, pp. 1727–1732, 2015.
11. L. Bernard, G. Chartier, and R. Sauleau, "Wideband circularly polarized patch antennas on reactive impedance substrates," IEEE
Antennas and Wireless Propagation Letters, vol. 10, pp. 1015–1018, 2011.
12. D. Chandu, R. K. Barik, and S. Karthikeyan, "Triple-band circularly polarized antenna on a two-layered high impedance surface with
two in-phase reflection bands," in 2017 47th European Microwave Conference (EuMC). IEEE, 2017, pp. 600–603.
13. K. Agarwal, A. Alphonse et al., "Wideband circularly polarized AMC reflector backed aperture antenna," IEEE Transactions on antennas
and propagation, vol. 61, no. 3, pp. 1456–1461, 2012.
14. J. Chatterjee, A. Mohan, and V. Dixit, "Broadband circularly polarized h shaped patch antenna using reactive impedance surface,” IEEE
Antennas and Wireless Propagation Letters, vol. 17, no. 4, pp. 625–628, 2018.
15. S. Jagtap, A. Chaudhuri, N. Chaskar, S. Kharche, and R. K. Gupta, “A wideband microstrip array design using ris and prs layer s,” IEEE
Antennas and Wireless Propagation Letters, vol. 17, no. 3, pp. 509– 512, 2018.
16. S. Nelaturi and N. V. S. N. Sarma, "A compact microstrip patch antenna based on metamaterials for wi-fi and WiMAX applications,"
Journal of Electromagnetic Engineering and Science, vol. 18, no. 3, pp. 182–187, 2018.
17. G. Samanta and S. R. Bhadra Chaudhuri, “Design of a compact cp antenna with enhanced bandwidth using a novel hexagonal ring based
reactive impedance substrate,” Progress In Electromagnetics Research, vol. 69, pp. 115–125, 2018.
18. Z. Zhang, W. Chen, J. Fu, P. Li, B. Lv, and Z. Wang, “Circularly polarized patch array antenna based on reactive impedance surface,”
IET Microwaves, Antennas & Propagation, vol. 12, no. 14, pp. 2213–2217, 2018.
19. S. X. Ta and I. Park, “Low-profile broadband circularly polarized patch antenna using metasurface,” IEEE Transactions on Antennas and
Propagation, vol. 63, no. 12, pp. 5929–5934, 2015.
Paper Title: Effect of Hub Radius on Rotational Stability of Functionally Graded Timoshenko Beams
Abstract: This work is concerned to examine the rotational stability of functionally graded cantilever
Timoshenko beams. Power law with various indices as well as exponential law were used to find out the effect of
hub radius parameter on the stability of both functionally graded ordinary (FGO) beam. Floquet’s theory was used
to establish the stability boundaries. The governing equation of motion was followed by Hamilton’s principle and
solved by Finite element method. Dependence of Bulk modulus on thickness of beam was studied using both power
law and exponential distribution. The influence of hub radius parameter was found to be enhancing the stability of
FGO beams. It has further been confirmed that the effect of hub radius with exponential distribution of constituent
phases renders better stability compared to power law distribution of the phases in the functionally graded
material(FGM).
Keyword : Exponential law, FGO beam, hub radius, Power law, Stability.
References:
1. Madhusudan S., Sarcar M.M.M., Rao N.B.R.M., “Mechanical properties of Aluminum-Copper(p) composite metallic materials”, Journal
of Applied Research and Technology,2016, Vol.14(5), pp:293-299.
2. Madhusudan S., Madhukiran J., Varma D.P., Raju C.R., “Experimental studies on hygric strain behaviour of Jute-Pineapple hybrid
composites”, International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016,pp:4387-4391.
3. Baburaja K., Venkatasubbaiah K., Kalluri R., “Hybrid materials of aluminium”, Materials Today: Proceedings,2016, Vol.3(10), pp:4140-
4145.
4. Baburaja K., Kumar G.A., Venkatesh L., Yogesh M., Gowtham M.G.S., Kishore D.S.C., “Structure and property relation of hybrid
738. aluminium composite”, International Journal of Mechanical Engineering and Technology,2017,Vol.8(5),pp:344-350.
5. T. Yokoyama, “Free vibration characteristics of rotating Timoshenko beams,” International Journal of Mechanical Sciences, 1988,
Vol.30(10), pp: 743-755. 4246-
6. R. T. Wang, “Vibration of multi-span Timoshenko beams to a moving force,” Journal of Sound and Vibration, 1997, Vol.207(5), pp: 731- 4251
742.
7. S. C. Lin and K. M. Hsiao, “Vibration analysis of a rotating Timoshenko beam,” Journal of Sound and Vibration, 2001, Vol.240(2), pp:
303-322.
8. J. S. Wu and L. K. Chiang, “Out-of-plane responses of a circular curved Timoshenko beam due to a moving load,” International Journal
of Solids and Structures, 2003, Vol.40(26), pp: 7425-7448.
9. A. Bazoune, “Effect of tapering on natural frequencies of rotating beams,” Shock and Vibration, 2007., Vol.14(3), pp:169–179.
10. D.R. Jackson and S. O. Oyadiji, “Free Vibration Analysis of Rotating Tapered Bresse-Rayleigh Beams Using the Differential
Transformation Method,” Proceedings of the ASME 2009 International Design Engineering Technical Conferences & Computers and
Information in Engineering Conference,2009, pp:1-9.
11. S.C.Mohanty, R.R.Dash and T. Rout, “Free Vibration of a Functionally Graded Rotating Timoshenko Beam Usin g FEM,” Advances in
Structural Engineering, 2013,Vol. 16(2), pp:405–418.
12. F. Ebrahimi and M. Mokhtari, “Transverse vibration analysis of rotating porous beam with functionally graded microstructure u sing the
differential transform method,” Journal of the Brazilian Society of Mechanical Sciences and Engineering, 2015,Vol.37(4),pp:1435-1444.
13. F. Ebrahimi and M. Mokhtari, “Free Vibration Analysis of a Rotating Mori–Tanaka-Based Functionally Graded Beam via Differential
Transformation Method,” Arabian Journal for Science and Engineering, 2016,Vol.41(2),pp: 577-590.
14. [14] B. Panigrahi and G. Pohit, “Effect of cracks on nonlinear flexural vibration of rotating Timoshenko functionally graded material
beam having large amplitude motion,” Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering
Science, 2018,Vol. 232 (6),pp:930-940.
15. S.N.Padhi, T.Rout, K.S.Raghuram, “Parametric instability and property variation analysis of a rotating cantilever FGO beam”,
International Journal of Recent Technology and Engineering, 2019,Vol.8(1),pp:2921-2925.
16. S.N.Padhi, K.S.Raghuram, T.Rout, V.Naga Sudha, Gill Santosh Kumar, “Mechanical Property Variation of a Rotating Cantilever FG SW
Beam under Parametric Excitation”, International Journal of Innovative Technology and Exploring Engineering,2019, Vol.8(11),pp:495-
499.
17. Ning Zhang, Tahir Khan, Haomin Guo, Shaoshuai Shi, Wei Zhong and Weiwei Zhang,”Functionally Graded Materials: An Overview of
Stability,Buckling, and Free Vibration Analysis,” Advances in Materials Science and Engineering,Vol.2019,pp:1-18.
Keyword : Alternate path routing, QoS, Lightpath, Wavelength assignment strategy, Blocking probability.
References:
1. Barpanda, Ravi Sankar, Ashok Kumar Turuk, and Bibhudatta Sahoo. "QoS aware routing and wavelength allocation in optical burst
switching networks using differential evolution optimization." Digital Communications and Networks, vol. 4, no. 1, pp. 3-12, 2018.
2. Ebrahimzadeh, Amin, Akbar Ghaffarpour Rahbar, and Behrooz Alizadeh. "Request differentiation in dynamic light-path establishment for
WDM routed all optical networks of data centers." Optical Fibre Technology, vol. 21, no. 2, pp. 73-80, 2015.
3. Neal Charbonneau. Static Routing and Wavelength Assignment for Multicast Advance Reservation in All-Optical Wavelength-Routed
WDM Networks. In IEEE/ACM Transactions on Networking (TON) vol. 20, no. 1, pp. 15-20, 2012.
4. Bhanja, Urmila, and Debajyoti Mishra. "Dynamic routing and wavelength assignment using fuzzy logic controller in WDM optical
networks." In 2015 International Conference on Signal Processing and Communication (ICSC), vol.8, pp. 380-385, 2015.
5. Bonani, Luiz H., and Majid Forghani-Elahabad. "An improved least cost routing approach for WDM optical network without wavelength
converters." Optical fibre Technology, vol. 32, issue 5, pp. 30-35, 2016.
740. 6. D. Banerjee, B. Mukherjee, Wavelength-routed optical networks: Linear formulation, resource budget trade-offs and a reconfiguration
study, IEEE/ACM Transactions on Networking, vol. 8, no. 9, pp. 598–607, Oct. 2000.
7. E. Karasan and E. Ayanoglu, “Effects of Wavelength Routing and Selection Algorithms on Wavelength Conversion Gain in WDM Optical 4257-
Networks,” IEEE/ACM Transactions on Networking, vol. 6, no. 2, pp. 186-193, April 2008. 4260
8. Asuman E. Ozdaglar and Dimitri P. Bertsekas Routing and Wavelength Assignment in Optical Networks. In Networking, IEEE/ACM
Transactions, vol. 11, no. 2, pp. 220-230, 2003.
9. G Shen, T.H Cheng, S.K Bose, C Lu, T.Y Chai, H.M.M Hosseini. Approximate analysis of limited-range wavelength conversion all-
optical WDM networks. In Computer Communications; vol. 24, no. 10, pp. 126-130, 2001.
10. Shan, D.M., Chua, K.C., Phung, M.H., Mohan, G.: Priority-based offline wavelength assignment in OBS networks. IEEE Trans.
Communications; vol. 56, no. 10, pp. 1694–1704, 2008.
11. D. Mishra and U. Bhanja, “FWM Aware Fuzzy Dynamic Routing and Wavelength Assignment in Transparent Optical Networks”,
International Journal of Electrical, Electronic and Communication Engineering, vol. 9, issue 8, pp. 981-990, 2015.
12. N. Charbonneau and V.M. Vokkarane, “Static Routing and Wavelength Assignment for Multicast Advance Reservation in All-Optical
Wavelength-Routed WDM Networks”, IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 20, issue 1, pp. 1-14, 2012.
13. A.G. Rahbar, “Review of Dynamic Impairment-Aware Routing and Wavelength Assignment Techniques in All-Optical Wavelength
Routed Networks”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 14, issue 4, pp. 1065-1089, 2012.
14. A.N. Khan and P. Saengudomlert, “Design based routing and wavelength assignment in WDM networks using link-based multiplexing
gain”, Optical Switching and Networking, vol. 15, no. 10, pp. 111-120, 2015.
15. Rajalakshmi, P., Jhunjhunwala, A. Wavelength reassignment algorithms for all-optical WDM backbone networks. Opt. Switch. Networks,
vol. 4, no. 3, pp. 147–156, 2007.
16. X. Wang, M. Brandt-Pearce, and S. Subramaniam, “Distributed grooming, routing, and path length-based wavelength assignment for
dynamic optical networks using ant colony optimization”, IEEE/OSA Journal of Optical Communications and Networking, vol. 6, issue 6,
pp. 578-589, 2014.
17. M. Dell' Orco, M. Marinelli, and M.A. Silgu, “Bee Colony Optimization for innovative travel time estimation, based on a mesoscopic
traffic assignment model”, Transportation Research Part C: Emerging Technologies, vol. 66, issue 2, pp. 48-60, 2016.
18. A. de Sousa, C.B. Lopes, and P. Monteiro, “Lightpath Admission Control in Dynamic Optical Transport Networks”, Electronic Notes in
Discrete Mathematics, vol. 52, issue 8, pp. 205-212, 2016.
19. Y. Dong, S. Zhao, H. dan Ran, Y. Li, and Z. Zhu, “Routing and wavelength assignment in a satellite optical network based on a nt colony
optimization with the small window strategy”, IEEE/OSA Journal of Optical Communications and Networking, vol. 7, issue 10, pp. 995 -
1000, 2015.
20. Y.S. Kavian, A. Rashedi, A. Mahani, and Z. Ghassemlooy, “Routing and wavelength assignment in optical networks using Artificial Bee
Colony algorithm”, Optik - International Journal for Light and Electron Optics, vol. 124, issue 12, pp. 1243-1249, 2013.
Keyword : Feature space, Feature extraction, Illumination Normalization, Low Resolution Face Images, LRFR.
References:
1. Xiang Xu, Wanquan Liu, Ling Li, “ Low Resolution Face Recognition in Surveillance Systems”, Journal of Computer and
Communications, 2014,2,70-77.
2. Wilman W. W. Zou, and Pong C. Yuen, “Very Low Resolution Face Recognition Problem , IEEE Transactions On Image
Processing”, Vol. 21, No. 1, January 2012.
3. Srimanta Mandal, Shejin Thavalengal, Anil Kumar Sao, “Explicit and implicit employment of edge-related information in super-
resolving distant faces for recognition”, Pattern Anal Applic, Springer-Verlag , London 2015.
4. Manish N. Kapse Dr. Sanjay V. Dudul, “A survey on of Low Resolution Face Recognition based on direct approaches”,
International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 11, November 20
5. Vo Dinh Minh Nhat, SungYoung Lee, Hee Yong Youn, “Whitened LDA for Face Recognition” , CIVR’07,ACM, July 2007
6. Gheorghita Ghinea1, Rajkumar Kannan, And Suresh Kannaiyan, “Gradient-Orientation-Based PCA Subspace for Novel Face
Recognition”, IEEE Access, VOLUME 2, 2014
7. Jae Young Choi, Yong Man Ro, “Color Face Recognition for Degraded Face Images” , IEEE Transactions On Systems, Man, And
Cybernetics—Part B: Cybernetics, Vol. 39, No. 5, October 2009
8. Samik Banerjee, Suranjana Samanta, Sukhendu Das, “Face Recognition in Surveillance Conditions with Bag-of-words, using
Unsupervised Domain Adaptation”, Association for Computing Machinery.ICVGIP ’14, December.
9. ZhifeiWang, Zhenjiang Miao, Q.M. JonathanWu, YanliWan , Zhen Tang, “Low-resolution face recognition: a review”, Vision
Computing (2014) 30:359–386
10. Huu-Tuan Nguyen and Alice Caplier, “Local Patterns of Gradients for Face Recognition”, IEEE Transactions on Information
Forensics And Security, Vol. 10, No. 8, August 2015, pp 1739.
11. Shih-Ming Huang, Yang-Ting Chou, Jar-Ferr Yang, “Low-resolution face recognition in uses of multiple-size discrete cosine
transforms and selective Gaussian mixture models”, IET Computer Vision, 2014, Vol. 8, Iss. 5, pp. 382–390.
12. Zhenyu Wang , Wankou Yang , Xianye Ben, “Low-resolution degradation face recognition over long distance based on CCA”, The
Natural Computing Applications Forum 2015.
13. Joshua C. Klontz, Anil K. Jain, “A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects” IEEE
Computer Society November 2013.
14. Le An, Mehran Kafai, and Bir Bhanu,” Dynamic Bayesian Network for Unconstrained Face Recognition in Surveillance Camera
Networks”, IEEE Journal on Emerging And Selected Topics In Circuits And Systems, Vol. 3, No. 2, June 2013, 155.
15. Wilman W. Zou, Pong C. Yuen, and Rama Chellappa, “Low-Resolution Face Tracker Robust to Illumination Variations”, IEEE
Transactions on Image Processing, Vol. 22, No. 5, May 2013.
16. Chuan-Xian Ren, Dao-Qing Dai, and Hong Yan,” Coupled Kernel Embedding for Low-Resolution Face Image Recognition”, IEEE
Transactions on Image Processing, Vol. 21, No. 8, August 2012.
17. Yang-Ting Chou, Shih-Ming Huang and Jar-Ferr Yang, Chou, “Class-specific kernel linear regression classification for face
recognition under low-resolution and illumination variation conditions”, EURASIP Journal on Advances in Signal Processing (2016).
18. Hae-Min Moon, Chang Ho Seo, Sung Bum Pan, “A face recognition system based on convolution neural network using multiple
distance face” Springer-Verlag Berlin Heidelberg 2015.
19. Daniel F. Smith, Arnold Wiliem, and Brian C. Lovell, “Face Recognition on Consumer Devices: Reflections on Replay Attacks” ,
IEEE Transactions on Information Forensics And Security, Vol. 10, No. 4, April 2015.
20. Kuang-Chih Lee, Jeffrey Ho, and David Kriegman, “Acquiring Linear Subspaces for Face Recognition under Variable Lighting”,
IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 27, No. 5, May 2005.
21. Athinodoros S. Georghiades, Peter N. Belhumeur and David J. Kriegman, “From Few to Many: Illumination Cone Models for Face
Recognition under Variable Lighting and Pose”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 23, No. 6 ,
June 2001.
Paper Title: IoT Based Voice Controlled Multitasking System for Home
Abstract: Internet of Things is a rising innovation that makes our world more astute. In recent years, there has
been immense development in the realm of insightful gadgets for home mechanization. Such contraptions are
planned so as to facilitate communication among individuals and everyday home obligations. This paper exhibits a
voice-controlled smart home with multi-functions using ESP32 as the wireless choice. Voice control (using human
voice to control any load like light, fan, ac, geyser, motor etc.). The voice-commands are recognized by a dedicated
hardware module and the recognized data is sent to database using ESP32. On the accepting unit, raspberry pi
peruses the information from the database and deciphers the directions verbally expressed by the client and controls
the family unit apparatuses.
Keyword : Rasberrypi3, Esp32, MQ-32 Sensor, PIR Sensor, Flame sensor, GSM, GPS, Firebase, Relay, voice
742. module.
4265-
References: 4268
1. J. Stragier, L. Hauttekeete, L. Marez, Introducing Smart Grids in Residential Contexts: Consumers' Perception of Smart Househ old
Appliances, Belgium, pp. 1-2, 2010.
2. P. Waher, Learning Internet of Things, Birmingham, pp. 1-3, 2015
3. J. Chase, The Evolution of the Internet of Things, Texas Instruments, Texas, pp. 1-3, 2013
4. D. Zhang, L. Yang, H. Huang, Searching in Internet of Things: Vision and Challenges, Busan, 2011
5. K. Lueth, The 10 most popular Internet of Things applications right now, https://iot-analytics.com/10-internet-of-things-applications/,
pp. 1, February 2015
6. Nest Developers Documentation, http://developers.nest.com/, Last Access: April 20th 2016
7. Philips Hue Developer Program, http://developers.meethue.com/, Last Access: April 20th 2016
8. IoTivity, http://www.iotivity.org/, Last Access: April 24th 2016[8] IoTivity, http://www.iotivity.org/, Last Access: April 24th 2016
9. Lou Frenzel, Electronic Design, What’s the difference between ZigBee and Z-Wave?, pp. 1, March 29th 2012.
10. AppleHomeKit,http://www.apple.com/ios/homekit/, Last Access: April 24th 2016
11. Z-Wave Smart Lock, http://danalock.com/, Last Access: May 2016.
12. The Oplink Connected Alarm Shield, http://www.oplinkconnected.com/, Last Access: May 2016.
13. Samsung SmartThings Home Monitoring Kit, http://www.samsung.com/, Last Access: May 2016.
Authors: Venkata Ranga Rao Kommineni, Pavan Kumar Kolluru, Razeena Begum Shaik,
743.
Paper Title: Improved Health Care System in Fog Computing and WSN
Abstract: Fog computing is most widely used in many applications. This is the most advanced computing of
the various services in the cloud. Fog is considered as another layer that is a distributed network and is similarly
having an association with cloud computing and the internet of things (IoT). Health care is the one of the
dominating domain in present world. The healthcare with IoT has some of the drawbacks such as limited storage,
computing and accessing. To improve the performance the task scheduling algorithm is implemented. To overcome
this, in this paper, the novel healthcare system with fog computing and WSN is implemented. Results show the
performance of the proposed system.
Paper Title: Multilevel Image Thresholding for Image Segmentation using Hybrid Algorithm
Abstract: Image thresholding is an extraction method of objects from a background scene, which is used most
of the time to evaluate and interpret images because of their advanced simplicity, robustness, time reduced, and
precision. The main objective is to distinguish the subject from the background of the image segmentation. As the
ordinary image segmentation threshold approach is computerized costly while the necessity for optimization
techniques are highly recommended for multi-tier image thresholds. Level object segmentation threshold by using
Shannon entropy and Fuzzy entropy maximized with hGSA-PS. An entropy maximization of hGSA-PS dependent
multilevel image thresholds is developed, where the results are best demonstrated in PSNR, misclassification,
structural similarity index and segmented image quality compared to the Firefly algorithm, adaptive cuckoo search
algorithm and the search algorithm gravitational.
Keyword : agriculture, human capital, quality of life, wages, human resources, income, expenses .
References:
746. 1. Alogali, A. (2018). World Englishes: Changing the Paradigm of Linguistic Diversity in Global Academia. Research in Social Sciences and
Technology, 3(1), 54-73. Retrieved from http://ressat.org/index.php/ressat/article/view/342 4285-
2. Akhmetshin, E. M., Dzhavatov, D. K., Sverdlikova, E. A., Sokolov, M. S., Avdeeva, O. A., & Yavkin, G. P. (2018). The influence of
innovation on social and economic development of the russian regions. European Research Studies Journal, 21(Special Issue 2), 767-776.
4290
3. Arribas, I.; Espinós-Vañó, M. D.; García, F.; Tamosiuniene, R. 2019. Negative screening and sustainable portfolio diversification,
Entrepreneurship and Sustainability Issues 6(4): 1566-1586. https://doi.org/10.9770/jesi.2019.6.4(2)
4. Baharuddin, B., & Dalle, J. (2019). Transforming learning spaces for elementary school children with special needs. Journal o f Social
Studies Education Research, 10(2), 344-365.
5. Boutelier, S. (2019). Limiting Learning Environments through Domestication. Journal of Culture and Values in Education, 2(1), 45-55.
Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/29
6. Bozhkova, G. N., Shastina, E. M., Kalimullina, O. V., & Shatunova, O. V. (2019). Study of literary images of gifted characters in optional
activities as a means to develop capable and talented youth. Space and Culture, India, 7(1), 264-273. doi:10.20896/saci.v7i1.463
7. Bahri, Sumaryana, A., Karnaesih, E., & Karlina, N. (2019). The implementation of the allocation and distribution of school operational
assistance program for compulsory education units in kuningan regency, west java province. Journal of Social Studies Educatio n Research,
10(1), 178-192.
8. Bahzar, M. (2019). Authentic leadership in madrassas: Asserting islamic values in teacher performance. Journal of Social Studies
Education Research, 10(1), 259-284. Retrieved from www.scopus.com
9. Baidi. (2019). The role of parents’ interests and attitudes in motivating them to homeschool their children. Journal of Social Studies
Education Research, 10(1), 156-177.
10. Bentahar, A., & O’Brien, J. L. (2019). Raising students’ awareness of social justice through civic literacy. Journal of Socia l Studies
Education Research, 10(1), 193-218.
11. Bohdaniuk, O.; Buriak, R.; Savchuk, V. 2019. Competitiveness of horticultural products as a precondition of industry development,
Entrepreneurship And Sustainability Issues 6(4): 1587-1601. https://doi.org/10.9770/jesi.2019.6.4(3)
12. Dautov, G. F., Mingazova, L., Sayfulina, F. S., & Kayumova, G. F. (2018). Written heritage of the golden horde. [Patrimonio e scrito de la
horda de oro] Opcion, 34(Special Issue 14), 895-911.
13. Dharmawan, R., Nababan, M. R., Tarjana, M. S. S., & Djatmika. (2019). Mistranslation and maltranslation in a medical website:
Evidences from dorland’s medical dictionary. Journal of Social Studies Education Research, 10(1), 219-240.
14. Dmitrieva, I. S., Sharafutdinov, R. I., Gerasimov, V. O., Akhmetshin, E. M., & Pavlov, S. V. (2017). Method evaluation of the human
capital with its innovational potential consideration and perspectives of regional development: The example of the Republic o f Tatarstan
and Volga Federal District regions. Espacios, 38(40)
15. Dube, B. (2019). Examination mafiarisation, and the contradictions of performativity in zimbabwe: A quest for rebalancing pedagogy.
Journal of Social Studies Education Research, 10(2), 31-45.
16. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019). Spatial tourism planning: Using
the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
17. Dagdilelis, V. (2018). Preparing teachers for the use of digital technologies in their teaching practice. Research in Social Sciences and
Technology, 3(1), 109-121. Retrieved from http://ressat.org/index.php/ressat/article/view/345
18. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of society.
Journal of Social Studies Education Research, 10(3), 118-135.
19. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019). Corruption as an obstacle to sustainable
development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
20. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagog ical and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219
21. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of loss of
profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
22. Goryushkina, N. E., Gaifutdinova, T. V., Logvina, E. V., Redkin, A. G., Kudryavtsev, V. V., & Shol, Y. N. (2019). Basic princ iples of
tourist services market segmentation. International Journal of Economics and Business Administration, 7(2), 139-150.
23. Johnson, C., & Hinton, H. (2019). Toward a Brillant Diversity. Journal of Culture and Values in Education, 2(1), 56 -70. Retrieved from
http://cultureandvalues.org/index.php/JCV/article/view/27
24. Jones, A. (2019). Parallel Oppressions. Journal of Culture and Values in Education, 2(1), 18-33. Retrieved from
http://cultureandvalues.org/index.php/JCV/article/view/31
25. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment.
Journal of Social Studies Education Research, 10(3), 387-403.
26. Korableva, O., Durand, T., Kalimullina, O., & Stepanova, I. (2019). Studying user satisfaction with the MOOC platform interfa ces using
the example of coursera and open education platforms. Paper presented at the ACM International Conference Proceeding Series, 26 -30.
doi:10.1145/3322134.3322139
27. Kuznetsova, I. G., Voronkova, O. Y., Nimatulaev, M. M., Ruiga, I. R., Zhuruli, G. N., & Levichev, V. E. (2019). Ensuring the national
security of agriculture in the digital era through the formation of human capital. International Journal of Economics and Business
Administration, 7, 558-569.
28. Kuznetsova, I. G., Bulyga, R. P., Rakhmatullina, L. V., Titova, S. V., Shichiyakh, R. A., & Zakirov, R. A. (2019). Problems and prospects
of human capital development in modern russia. International Journal of Economics and Business Administration, 7(2), 164 -175.
29. Kuznetsova, I. G., Goloshchapova, L. V., Ivashina, N. S., Shichiyakh, R. A., Petrova, L. I., & Tkachev, B. P. (2019). The paradigm of
human capital development capable of adapting innovations in the transition to a digital economy. International Journal of Civil
Engineering and Technology, 10(2), 1408-1417.
30. Kuznetsova, I. G., Surikov, Y. N., Votchel, L. M., Aleynikova, M. Y., Voronkova, O. Y., & Shichiyakh, R. A. (2019). The metho dological
aspect of human capital formation in the digital economy. International Journal of Mechanical Engineering and Technology, 10(2), 1020-
1030.
31. Kuzmin, E.A.; Vinogradova, M.V.; Guseva, V.E. 2019. Projection of enterprise survival rate in dynamics of regional economic
sustainability: case study of Russia and the EU, Entrepreneurship and Sustainability Issues 6(4):1602 -1617.
https://doi.org/10.9770/jesi.2019.6.4(4)
32. Kustati, M., & Al-Azmi, H. (2018). Pre-Service Teachers’ Attitude on ELT Research. Research in Social Sciences and Technology, 3(2),
1-13. Retrieved from http://ressat.org/index.php/ressat/article/view/47
33. Lorincová, S.; Hitka, M.; Bajzíková, Ľ.; Weberová, D. 2019. Are the motivational preferences of employees working in small en terprises
in Slovakia changing in time, Entrepreneurship and Sustainability Issues 6(4): 1618-1635. https://doi.org/10.9770/jesi.2019.6.4(5)
34. Meier, L. (2019). Questioning the Problematic Nature of School Culture in Elementary Teacher Education. Journal of Culture an d Values
in Education, 2(1), 34-44. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/30
35. Morales-Ramirez, C. (2018). The Puerto Rican Flag - A Study in Vexillology. Research in Social Sciences and Technology, 3(3), 42-67.
Retrieved from http://ressat.org/index.php/ressat/article/view/369
36. Mullakhmetov, K. S., Sadriev, R. D., Gabaidullina, L. A., & Akhmetshin, E. M. (2018). Influence of human capital characteristics on
transformation of management and control in the management of social and economic systems. Paper presented at the Proceedings of the
31st International Business Information Management Association Conference, IBIMA 2018: Innovation Management and Education
Excellence through Vision 2020, 3562-3572.
37. Mullins, R. (2019). Using Dewey’s Conception of Democracy to Problematize the Notion of Disability in Public Education. Journ al of
Culture and Values in Education, 2(1), 1-17. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/24
38. Olaniyi, O.E.; Prause, G.; Bakkar, Y. 2019. Entrepreneurial compliance opportunities for maritime fuel producers, Entrepreneurship and
Sustainability Issues 6(4): 1550-1565. https://doi.org/10.9770/jesi.2019.6.4(1)
39. Pavlyshyn, L., Voronkova, O., Yakutina, M., & Tesleva, E. (2019). Ethical problems concerning dialectic interaction of cultur e and
civilization. Journal of Social Studies Education Research, 10(3), 236-248.
40. Prodanova, N., Trofimova, L., Pozdeeva, S., Melekhina, T., Rustanov, A., & Guryanova, I. (2019a). Perspective of developing software
for financial reporting under IFRS in the system of national governance. Journal of Advanced Research in Dynamical and Contro l
Systems, 11(8 Special Issue), 406-410.
41. Prodanova, N. A., Plaskova, N. S., Bochkareva, N. G., Babalykova, I. A., Gazizyanova, Y. Y., & Zherelina, O. N. (2019 b). Integrated
corporate reporting as an innovative business reporting model. International Journal of Engineering and Advanced Techn ology, 8(5), 2075-
2078.
42. Prodanova, N. A., Smolentsev, V. M., Norkina, A. N., Shukshina, Y. A., & Polyanskaya, O. A. (2017). Formation of system of in ternal
control and features its functioning in the innovative development of industrial enterprises. International Journal of Applied Business and
Economic Research, 15(13), 179-189.
43. Popova, L. I., Demina, I. D., Stepanenko, Y. S., Tran, Q. N., Meshkova, G. V., & Afonasova, M. A. (2019). Regional aspects of sectoral
digitalization: Problems and prospects. International Journal of Economics and Business Administration, 7(2), 176-188.
44. Raba’, A., & Harzallah, H. (2018). Palestinian Teachers’ Views on the Factors That Limit Students’ Creativity and Some Possib le
Strategies to Overcome Them. Research in Social Sciences and Technology, 3(2), 40-57. Retrieved from
http://ressat.org/index.php/ressat/article/view/330
45. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosophical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
46. Sycheva, I. N., Voronkova, O. Y., Kovaleva, I. V., Kuzina, A. F., Bannikov, S. A., & Titova, S. V. (2019). Motivation in pers onnel
management of a trading enterprise. International Journal of Economics and Business Administration, 7, 570-582.
47. Shatunova O., Anisimova T., Sabirova F., Kalimullina O. (2019) STEAM as an Innovative Educational Technology. Journal of Soci al
Studies Education Research. Vol. 10 (2), 131-144.
48. Tarman, B., & Kılınç, E. (2018). Poetry in the Social Studies Textbooks in Turkey. Journal of Culture and Values in Education, 1(1), 50 -
62. Retrieved from http://cultureandvalues.org/index.php/JCV/article/view/4
49. Tarman, B. (2018). Editorial: 2018 (3)2. Research in Social Sciences and Technology, 3(2), i-ii. Retrieved from
http://ressat.org/index.php/ressat/article/view/370
50. Titova, S. V., Surikov, Y. N., Voronkova, O. Y., Skoblikova, T. V., Safonova, I. V., & Shichiyakh, R. A. (2019). Formation, a ccumulation
and development of human capital in the modern conditions. International Journal of Economics and Business Administration, 7(2), 223-
230.
51. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issue), 416 -
424.
52. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019). Sustainabl e
development of territories based on the integrated use of industry, resource and environmental potential. International Journal of
Economics and Business Administration, 7(2), 151-163.
53. Voronkova, O., Yankovskaya, V., Kovaleva, I., Epishkin, I., Iusupova, I., & Berdova, Y. (2019). Sustainable territorial development based
on the effective use of resource potential. Entrepreneurship and Sustainability Issues, 7(1), 662-673. doi:10.9770/jesi.2019.7.1(47)
54. Yehya, F. Y., Barbar, A., & Abou Rjeily, S. (2018). Diagnosing the barriers for integrating Educational Technology in Physics courses in
Lebanese secondary schools. Research in Social Sciences and Technology, 3(2), 14-39. Retrieved from
http://ressat.org/index.php/ressat/article/view/337
55. Zhundibayeva, A. K., Ergobekov, K. S., & Espenbetov, A. S. (2013). The lyrical hero in the works of kazakh's poet shakarim
kudaiberdiev. Life Science Journal, 10(SPL.ISSUE11), 113-117.
Elena Permyakova, Olga Voronkova, Galina Poltarykhina, Alla Plisova
Authors:
Galina Rodina, Leonid Popok
The Concept of Agro-Industrial Integration of a Border Region with Adjacent Territories under the
Paper Title:
Conditions of the EAEU
Abstract: The subject of research in this paper is the prospects for integration relations of the Russian border
region, the Altai Territory, with the adjacent territories of the Republic of Kazakhstan based on the concept of
polarized development of territories. An analysis of the existing prerequisites and the current state of integration
processes, as well as the specifics of the development of the regions, showed the possibility of using the agricultural
sector as a propulsive industry. The possibility of increasing the workload of production facilities of processing
enterprises of the Altai Territory using the raw stock potential of the livestock industry in the East Kazakhstan
Region has been identified.
Keyword : agribusiness, integration, border region, adjacent territories, meat subsector, Eurasian Economic
Union, development strategy
References:
1. Arniati, T., Puspita, D. A., Amin, A., & Pirzada, K. (2019). The implementation of good corporate governance model and auditor
independence in earnings' quality improvement. Entrepreneurship and Sustainability Issues, 7(1), 188-200. doi:10.9770/jesi.2019.7.1(15)
2. Bure, M., & Tengeh, R. K. (2019). Implementation of internal controls and the sustainability of SMEs in harare in zimbabwe.
Entrepreneurship and Sustainability Issues, 7(1), 201-218. doi:10.9770/jesi.2019.7.1(16)
3. Dunets, A., Muhamedieva, A., Sycheva, I., Perepechkina, E., Vakhrushev, I., & Kulchytskiy, A. (2019). Spatial tourism planning: Using
the model of functional and planning complexes. Journal of Environmental Management and Tourism, 10(4), 711 -719.
doi:10.14505/jemt.v10.4(36).01
4. Dunets, A. N., Ivanova, V. N., & Poltarykhin, A. L. (2019). Cross-border tourism cooperation as a basis for sustainable development: A
case study. Entrepreneurship and Sustainability Issues, 6(4), 2207-2215. doi:10.9770/jesi.2019.6.4(45)
5. Fedulova, I., Ivanova, V., Atyukova, O., & Nosov, V. (2019). Inclusive education as a basis for sustainable development of society.
747. Journal of Social Studies Education Research, 10(3), 118-135.
6. Frolova, I., Voronkova, O., Alekhina, N., Kovaleva, I., Prodanova, N., & Kashirskaya, L. (2019). Corruption as an obstacle to sustainable 4291-
development: A regional example. Entrepreneurship and Sustainability Issues, 7(1), 674-689. doi:10.9770/jesi.2019.7.1(48)
7. Glotko A.V., Sycheva I.N., Permyakova E.S. (2018). Organic agricultural products on the transboundary territories of the greater Altai:
4295
problems and development prospects. International monthly scientific journal "ECONOMY PROFESSIONAL BUSINESS" No. 2 2018. P.
22-23. Access mode: https://elibrary.ru/item.asp?id=35042591 - Title from the screen.
8. Grakhova, S., Fayzrakhmanov, I., Zhundibayeva, A., Yakutina, M., Sharipov, R., & Stepykin, N. (2019). Information, pedagogical and
facilitation technologies in teaching a special philology class at non-specialized faculties of higher education institutions. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1613-1620. doi:10.35940/ijitee.L3154.1081219
9. Goloshchapova, L. V., Plaskova, N. S., Prodanova, N. A., Yusupova, S. Y., & Pozdeeva, S. N. (2018). Analytical review of risk s of loss of
profits in cargo transportation. International Journal of Mechanical Engineering and Technology, 9(11), 1897-1902.
10. Goryushkina, N., Voinova, N., Voronkova, O., Sitnov, A., Shichiyakh, R., & Gordeyeva, O. (2019a). Theoretical aspects of
entrepreneurial education for hospitality industry. Journal of Environmental Management and Tourism, 10(4), 835-841.
doi:10.14505/jemt.10.4(36).14
11. Goryushkina, N. E., Gaifutdinova, T. V., Logvina, E. V., Redkin, A. G., Kudryavtsev, V. V., & Shol, Y. N. (2019b). Basic pr inciples of
tourist services market segmentation. International Journal of Economics and Business Administration, 7(2), 139-150.
12. Ivanova, V., Poltarykhin, A., Szromnik, A., & Anichkina, O. (2019). Economic policy for country's digitalization: A case study.
Entrepreneurship and Sustainability Issues, 7(1), 649-661. doi:10.9770/jesi.2019.7.1(46)
13. Kashirskaya, L., Voronkova, O., Sitnov, A., Shichiyakh, R., Kudinova, M., & Sycheva, I. (2019). Rural development through the
formation of zonal agro-ecological clusters. Journal of Environmental Management and Tourism, 10(3), 651-659.
doi:10.14505/jemt.v10.3(35).19
14. Korableva, O.N., Kalimullina, O.V., Mityakova, V.N. (2019) Designing a System for Integration of Macroeconomic and Statistica l Data
Based on Ontology. Advances in Intelligent Systems and Computing, 998, p. 157-165
15. Kolmakov, V., & Polyakova, A. (2019). Regional free cash flow dataset: An approach to regional performance evaluation. Data in Brief,
25 doi:10.1016/j.dib.2019.104175
16. Kireev, B., Zhundibayeva, A., & Aktanova, A. (2019). Distance learning at higher education institutions: Results of an experiment. Journal
of Social Studies Education Research, 10(3), 387-403.
17. Luzina, T. V., Dudareva, E. A., Akhmetshin, E. M., Prodanova, N.A., Berdova, Y. S. & Emaletdinova, G. E. (2019). International Legal
Format for Trans Regionalisation of Trade and Economic Partnership within BRICS in Global Development. Space and Culture, Ind ia
2019, 7(3), 1-10.
18. Official statistics of the Territorial Authority of the Federal State Statistics Service for the Altai Territory Available at: http://akstat.gks.ru/
19. Pavlyshyn, L., Voronkova, O., Yakutina, M., & Tesleva, E. (2019). Ethical problems concerning dialectic interaction of cultur e and
civilization. Journal of Social Studies Education Research, 10(3), 236-248.
20. Paptsov, A., & Nechaev, V. (2019). Towards to a single innovation space in the agrarian sector of the member states of the eu rasian
economic union: A case study. Entrepreneurship and Sustainability Issues, 7(1), 637-648. doi:10.9770/jesi.2019.7.1(45)
21. Permyakova, E.S. (2012). Development of a cross-border agro-industrial region in the context of economic integration with neighboring
territories (Abstract ... diss. Candidate of economic sciences) (ASU)
22. Plaskova, N. S., Prodanova, N. A., Zatsarinnaya, Е. I., Korshunova, L. N., & Chumakova, N. V. (2017). Methodological support of
organizations implementing innovative activities investment attractiveness estimation. Journal of Advanced Research in Law and
Economics, 8(8), 2533-2539. doi:10.14505/jarle.v8.8(30).25
23. Prodanova, N., Plaskova, N., Popova, L., Maslova, I., Dmitrieva, I., Sitnikova, V., & Kharakoz, J. (2019a). The role of IT to ols when
introducing integrated reporting in corporate communication. Journal of Advanced Research in Dynamical and Control Systems, 11(8
Special Issue), 411-415.
24. Prodanova, N., Trofimova, L., Pozdeeva, S., Melekhina, T., Rustanov, A., & Guryanova, I. (2019b). Perspective of developing s oftware
for financial reporting under IFRS in the system of national governance. Journal of Advanced Research in Dynamical and Control
Systems, 11(8 Special Issue), 406-410.
25. Polyakova, A. G., Akhmetshin, E. M., Pavlyuk, A. V., & Meshkova, G. V. (2019). Investment appeal of a regio n and its impact on
investment inflows. Entrepreneurship and Sustainability Issues, 7(2), 1089-1097. http://doi.org/10.9770/jesi.2019.7.2(21)
26. Saenko, N., Voronkova, O., Volk, M., & Voroshilova, O. (2019). The social responsibility of a scientist: Philosoph ical aspect of
contemporary discussions. Journal of Social Studies Education Research, 10(3), 332-345.
27. Sycheva I.N., Kuzmina N.N, Permyakova E.S., Svistula I.A. (2015). Labor Theory of Value in the Methodology of Researching Eco nomic
Systems. Journal of Applied Economic Sciences. Vol. 6(36), pp. 973-979.
28. Sycheva I. N., Belaia N. V., Permyakova E. S. (2017) Problems of manpower formation and use in a region with agro-industrial
specialization Revista Espacios 38 Available at: http://www.revistaespacios.com/a17v38n49/17384917.html (Accessed 31 03 2019)
29. Sycheva, I.N., E.S. Permyakova (2019). Development of integration relations: history and development prospects. Science and practice of
organization of production and management (Organization-2018): materials of the international scientific and practical conference.
Barnaul: AltSTU Publishing House, pp. 185-195.
30. Sycheva I. N., & Svistula I. A. (2017). Cross-sectoral approach to improving integration processes in agro-industrial complexes Revista
espacios 38 Available at: http://www.revistaespacios.com/a17v38n33/a17v38n33p06.pdf (31 03 2019)
31. Sycheva, I.N., E.S. Permyakova, N.N. Kuzmina (2016). Cross-border development of the region’s economy in the context of the Eurasian
Economic Union: state, problems, prospects: monograph. Alt. Gos. Tech. University of them. I.I. Polzunova. - Barnaul: AltSTU Publishing
House, 168 p.
32. Sycheva, I.N., E.S. Permyakova (2016) Poles of growth: the evolution of the concept and its adaptation for the effective deve lopment of
the regional economy. Bulletin of the Altai Academy of Economics and Law No. 1 (43) 2016. P. 73-76.
33. Sycheva, I.N., Permyakova E.S. (2016) Foreign economic cooperation of the Altai Territory with the border regions of Kazakhstan.
Science, education and innovations: a collection of articles of the International scientific and practical conference, (October 15, 2016,
Ekaterinburg). In 3 hours, Part 2 - Yekaterinburg: AETERNA, 2016.S. 213 - 216.
34. Trofimova, L., Prodanova, N., Korshunova, L., Savina, N., Ulianova, N., Karpova, T., & Shilova, L. (2019). Public sector entities’
reporting and accounting information system. Journal of Advanced Research in Dynamical and Control Systems, 11(8 Special Issue), 416-
424.
35. Voronkova, O. Y., Iakimova, L. A., Frolova, I. I., Shafranskaya, C. I., Kamolov, S. G., & Prodanova, N. A. (2019a). Sustainab le
development of territories based on the integrated use of industry, resource and environmental potential. International Journal of
Economics and Business Administration, 7(2), 151-163.
36. Voronkova, O., Yankovskaya, V., Kovaleva, I., Epishkin, I., Iusupova, I., & Berdova, Y. (2019b). Sustainable territorial development
based on the effective use of resource potential. Entrepreneurship and Sustainability Issues, 7(1), 662-673. doi:10.9770/jesi.2019.7.1(47)
Paper Title: Artificial Intelligence in Financial Services: Customer Chatbot Advisor Adoption
Abstract: The growing sophistication technology has helped us exchange Information at our fingertips,
eliminating the need for human support.” A platform designed to understand, learn and converse like a human and
answer ad-hoc queries in real time is commonly referred to as a Chabot”. Chabot advisor is Artificial intelligence
(AI) computer program that impersonates human communication in its natural format including text or spoken
language using a technique such as NLP, image processing or video processing along with the end task completion
as instructed by the user [1]. The purpose of the paper was to examine what are the drivers for Chabot advisor
services adoption (CBA), focusing on financial services. This study presents the explanatory Chabot advisor
services factors by extending the Technology Acceptance Model (TAM). The construct in the research are like
perceived privacy, perceived security, enjoyment and social influence. This empirical study was conducted in Pune
city in India by collecting primary data from 310 online financial services customers. Data collected was analyzed
using structural equation modeling using PLS-SEM.The outcome of this study is vital to financial companies like
banks, policymakers, technology services adoption literature and provide customer-centric financial services.
748.
Keyword : Chatbot advisors, Artificial Intelligence, Financial Services, Technology adoption, PLS SEM. 4296-
4303
References:
1. S. B, " Adoption of digital payment systems in the era of demonetization in India: An empirical study," Journal of Science and
Technology Policy Management, vol. 10, no. 1, pp. 143-71, 2019 Mar 4.
2. Belanche. D, Casaló LV, Flavián C. Artificial Intelligence in FinTech: "Understanding Robo-Advisors Adoption Among Customers,"
Industrial Management & Data Systems. Artificial Intelligence In Fintech, 2019.
3. S. B, " Adoption of digital payment systems in the era of demonetization in India: An empirical study," Journal of Science and
Technology Policy Management, vol. 10, no. 1, pp. 143-71, 2019 Mar 4
4. Gupta MP, Jana D,”E-government evaluation: A framework and case study.," Government information quarterly 20, vol. 4 , pp. 365-387.,
2003.
5. Kaushik AK, Agrawal AK, Rahman Z., "Tourist behaviour towards self-service hotel technology adoption: Trust and subjective norm as
key antecedents.," Tourism Management Perspectives , vol. 16 , pp. 278-289., 2015.
6. Park E, Kim KJ, "An integrated adoption model of mobile cloud services: exploration of key determinants and extension of technology
acceptance model.," Telematics and Informatics , vol. 3, pp. 376-385., 2014.
7. Zhu DS, Lin TC, Hsu YC, "Using the technology acceptance model to evaluate user attitude and intention of use for online games.","
Total Quality Management & Business Excellence 23, no. , vol. 7, no. 8, pp. 965-980., 2012.
8. Gefen D, Karahanna E, Straub DW, "Trust and TAM in online shopping: An integrated model.," MIS quarterly 27, vol. 1, pp. 51-90.,
2003.
9. Featherman MS, Pavlou PA., "Predicting e-services adoption: a perceived risk facets perspective.," International journal of human-
computer studies , vol. 59, no. 4, pp. 451-474., 2003.
10. Hair JF, Ringle CM,". Hair, "PLS-SEM: Indeed a silver bullet," Journal of Marketing Theory and Practice, vol. 19, no. 2, pp. 139-152,
2011.
11. Ringle CM, Sarstedt M, Straub , "A critical look at the use of PLS-SEM," MIS Quarterly., 2012.
12. Okuda T, Shoda S,"AI-Based Chatbot Service For Financial Industry," Fujitsu Scientific And Technical Journal , vol. 54(2), pp. 4-8.,
2018.
13. J. Trivedi, ". Examining the Customer Experience of Using Banking Chatbots and Its Impact on Brand Love: The Moderating Role of
Perceived Risk," Journal of Internet Commerce, pp. 91-111, 08 Feb 2019.
14. Shaikh A, Phalke G, Patil P, Bhosale S, Raghatwan J. A, "A survey on chatbot conversational systems.," International Journal of
Engineering Science,, 2016.
15. D. Duijst, " Can We Improve The User Experience Of Chatbots With Personalisation?," 2017.
16. L. Dal Porto, "Chatbot Chatter.," Quality Progress, vol. 50, no. 7, pp. 6-9., 2017.
17. Letheren K, Dootson P. "Banking With A Chatbot: A Battle Between Convenience And Security. The Conversation.," 2017.
18. Hsu CL, Lu HP., " Why Do People Play On-Line Games? An Extended TAM With Social Influence And Flow Experience”,",
Information And Management, vol. 41, no. 7, pp. 853-68.
19. "Financial services companies lead in AI adoption: Report," TimesofIndia.com, Aug 16, 2019, 16:25 IST.
20. Deloitte.Com, "Ai-And-Risk-Management.Pdf," Centre for Regulatory Strategy EMEA.
21. STAMFORD, Conn, "Artificial Intelligence Will Create More Jobs Than It Eliminates," Gartner Says By 2020, 13 December 2017
22. "The List Of Indian Organizations Launching AI-Powered VAs Keeps Growing," Insight, 3 April 2018.
23. K. Gupta, "Rise Of The Robo-Banker," 15 July 2018. [Online]. Available: Https://Www.Businesstoday.In/Magazine/The-Hub/Rise-Of-
The-Robo-Banker/Story/279479.Html.
24. S. Z. Haque, 18 September 2017. [Online]. Available: https://www.indusnet.co.in/How-Chatbots-Are-Changing-The-Insurance-Industry/.
25. Ringle CM, Sarstedt M, Straub D,” A critical look at the use of PLS-SEM “MIS Quarterly (MISQ). 2012;36(1)
26. J. Huang, M. Zhou and D. Yang, "Extracting Chatbot Knowledge From Online Discussion Forums.," IJCAI, vol. 7, pp. 423-428, 2007,
January.
27. A. Deshpande, A. Shahane, D. Gadre, M. Deshpande and P. M. Joshi, "A Survey Of Various Chatbot Implementation Technique s,"
International Journal Of Computer Engineering And Applications, p. 11, 2017.
28. R. Richad, V. Vivensius, S. Sfenrianto and K. Emil R, "ANALYSIS OF FACTORS INFLUENCING MILLENNIAL’S TECHNOLOGY
ACCEPTANCE OF CHATBOT IN THE BANKING INDUSTRY IN INDONESIA.," International Journal of Civil Engineering and
Technology (IJCIET), vol. 10, no. 04, April 2019, pp. 1270-1281, Article ID: IJCIET_10_04_133, 2019.
29. Gupta, P. Kriti, S. Swati and B. and Preeti, "Citizen adoption of e-government: a literature review and conceptual framework.," Electronic
Government, an International Journal 12, vol. 2, pp. 160-185, 2016.
30. I. Ajzen and M. Fishbein., "Attitudes and normative beliefs as factors influencing behavioral intentions.," Journal of personality and
social psychology 21, vol. 1, no. 1, 1972.
31. Shih and Hung-Pin, "Extended technology acceptance model of Internet utilization behavior."," Information & management, vol. 41, no.
6, pp. 719-729, 2004.
32. Yucel, A. Ummuhan and G. Yasemin, "Technology acceptance model: A review of the prior predictors.," Egitim Bilimleri Fakultesi
Dergisi 46, vol. 1, p. 89, 2013.
33. G. B. Svendsen, J. A. K, L. Johnsen, Almås-Sørensen and V. Joar, "Personality and technology acceptance: the influence of personality
factors on the core constructs of the Technology Acceptance Model," Behaviour & Information Technology, vol. 32, no. 4, pp. 323-334,
2013.
34. F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology.," MIS quarterly, pp. 319-340,
1989.
35. M. A. Shareef, K. Vinod, K. Uma and Y. K. Dwivedi., "e-Government Adoption Model (GAM): Differing service maturity levels.,"
Government information quarterly, vol. 28, no. 1, pp. 17-35., 2011.
36. A. P. Chaves and M. A. Gerosa, "How should my chatbot interact? A survey on human-chatbot interaction design. arXiv preprint
arXiv:1904.02743.," p. 2019.
37. Zarouali B, Poels K, Walrave M, Ponnet K, "‘You talking to me?’The influence of peer communication on adolescents’ persuasion
knowledge and attitude towards social advertisements."Behaviour & Information Technology, vol. 37, no. 5, pp. 502-516., 2018.
38. L. U. Okoye, E. O. Alexander, I. O. JOHNSON, N. Felix, Ezeji and B. U. Achugamonu,"IMPERATIVES FOR DEEPENING
CUSTOMER SERVICE DELIVERY IN THE NIGERIAN BANKING SECTOR THROUGH ENGINEERING AND TECHNOLOGY-
BASED CHANNELS.," International Journal of Civil Engineering and Technology(IJCIET), vol. 1, pp. 2156-2169, 2019.
39. M. Aboelmaged and T. R. Gebba., "Mobile banking model: An examination of technology acceptance model and theory of planned
behaviour," International Journal of Business Research and Development,, vol. 2, no. 1, pp. 35-50, 2013.
40. Hair Jr JF, Hult GT, Ringle C, Sarstedt M, A primer on partial least squares structural equation modeling (PLS-SEM), Sage publications,
2016., 2016.
41. C. Fornell and L. David F, "Structural equation models with unobservable variables and measurement error: Algebra and statistics,"
Journal of marketing research, pp. 382-388., 1981.
42. G. Sahu and S. T. Gupta MP, "Towards a model of e-governance acceptance.," From Policy to Reality, no. 1, 2004.
43. K. Zafiropoulos, K. Ioannis and i. V. Vasilik, "Exploring e-governance acceptance by primary and secondary education teachers in
Greece.," International Journal of Information Technology and Management, vol. 13, no. 4, pp. 285-304., 2014.
44. A. Kaushik, A. AK and Z. Rahman, ". Tourist behaviour towards self-service hotel technology adoption: Trust and subjective norm as key
antecedents.," Tourism Management Perspectives, vol. 16, pp. 278-89., 2015.
45. Park E, Kim KJ, "An integrated adoption model of mobile cloud services: exploration of key determinants and extension of technology
acceptance model.," Telematic and Informatics, vol. 31, no. 3, pp. 376-85., 2014.
46. J. Thong, H. SJ and K. Tam, "The Effects Of Post-Adoption Beliefs On The Expectation-Confirmation Model For Information
Continuance," International Journal Of Human-Computer Studies, vol. 64, no. 5, pp. 799-810, 2006.
47. Hsu CL, Lu HP, "Why do people play on-line games? An extended TAM with social influences and flow experience.," Information &
management, vol. 41(7), pp. 853-868., 2004.
48. F. Lin, S. S, Fofanah and D. Liang, "Assessing citizen adoption of e-Government initiatives in Gambia: A validation of the technology
acceptance model in information systems success.," Government Information, Vols. Quarterly 28,, no. 2, pp. 271-279, 2011.
49. G. C. Moore and B. Izak, "Development of an instrument to measure the perceptions of adopting an information technology innov ation.,"
Information systems research, vol. 2, no. 3, pp. 192-222., 1991.
50. T. Teo, C. B. Lee, C. S. Chai and W. S. L, "Assessing the intention to use technology among pre-service teachers in Singapore and
Malaysia: A multigroup invariance analysis of the Technology Acceptance Model (TAM)," Computers & Education, vol. 53, no. 3, 2009.
51. Colesca, S. Elena and L. Dobrica, "Adoption and use of e-government services: The case of Romania.," Journal of applied research and
technology, vol. 6, no. 3, pp. 204-217, 2008.
52. Lewis, E. F, M. Hardy and S. Beverly, "An analysis of survey reporting in the imaging professions: is the issue of non -response bias being
adequately addressed?," Radiography, vol. 19, no. 3, pp. 240-245., 2013.
53. Podsakoff PM, Organ DW, "Self-reports in organizational research: Problems and prospects.," Journal of Management, vol. 12(4), pp.
531-544., 1986.
54. J. Henseler, "On the convergence of the partial least squares path modeling algorithm.," Computational Statistics, vol. 1, pp. 107-120,
2010.
55. D. Gefen, D. Straub and M. C. Boudreau, "Structural equation modeling and regression: Guidelines for research practice.,"
Communications of the Association for Information Systems., vol. 4, no. 1, p. 7, 2000.
56. J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson and R. L. Tatham, "Multivariate data analysis," vol. 6, 2006.
57. S. Sang, J.-D. Lee and J. Lee., "Adoption Of E-Government Services," International Journal Of E-Adoption, vol. 1, no. 2, pp. 1-22., 2009.
58. J. Moon and Y. Kim, "Extended The TAM For World-Wide-Web Context," Information And Management, vol. 38, no. 4, pp. 217-30.,
2001.
59. T. Hu, A. Xu, Z. Liu, Q. You, G. Y. V. Sinha and A. R. , "Touch Your Heart: A Tone-aware Chatbot for Customer Care on Social
Media.," in CHI Conference on Human Factors in Computing Systems., 2018.
60. Araujo T, ". Living up to the chatbot hype: The influence of anthropomorphic design cues and communicative agency framing on
conversational agent and company perceptions.," Computers in Human Behavior., Vols. 183-189, p. 85, 2018 Aug 1.
61. Carlos Roca J, José García J, José de la Vega J., "The importance of perceived trust, security and privacy in online trading systems.,"
Information Management & Computer Security, vol. 17, no. 2, pp. 96-113, 2009.
62. C. T. Harry, "Values, attitudes, and interpersonal behavior," in In Nebraska symposium on motivation.
Keyword : Neem, Dermatophytes, Supercritical fluid carbon dioxide, high performance liquid chromatography.
References:
1. Ezeonu, C.S., Imo, C., Agwaranze, D.I., Iruka, A. and Joseph, A. 2018. Antifungal effect of aqueous and ethanolic extracts of neem leaves,
stem bark and seeds on fungal rot diseases of yam and cocoyam. Chemical and Biological Technologies in Agriculture. 5:18.
https://doi.org/10.1186/s40538-018-0130-3.
2. Susmitha, S., Vidyamol, K.K., Ranganayaki, P. and Vijayaragavan, R. 2013. Phytochemical extraction and antimicrobial properties of
749. Azadirachta indica (Neem). Global Journal of Pharmacology, 7, 316–320.
3. Venugopal, P.V. and Venugopal, T.V. 1993. Antimycotic susceptibility testing of dermatophytes. Indian Journal of Medical
Microbiology,11, 151-154. 4304-
4. Natarajan, V., Venugopal, P.V. and Menon, T, 2003. Effect of Azadirachta indica (neem) on the growth pattern of dermatophytes. Indian 4309
Journal of Medical Microbiology, 21, 98-101.
5. Danielski, L. 2007. "Extraction and fractionation of natural organic compounds from plant materials with supercritical carbon dioxide."
Phd thesis, Technische University Hamburg-Harburg, Hamburg, pp. 181.
6. Canela, A. P. R. F., Rosa, P. T. V., Marques, M.O.M. and Meirelesm M.A.M, 2002. "Supercritical Fluid Extraction of Fatty Acids and
Carotenoids from the Microalgae Spirulina maxima." Industrial & engineering chemistry research, 41, 3012-3018.
7. Roy, B. C., Goto, M. and Hirose, T., 1996. "Extraction of ginger oil with supercritical carbon dioxide: experiments and modeling".
Industrial and engineering chemistry research, 35, 607-612.
8. Johnson, S. and Morgan, E.D., 1997. "Supercritical fluid extraction of oil and triterpenoids from neem seeds." Phytochemical Analysis, 8,
228-232.
9. Mongkholkhajornsilp, D., Douglas, S., Douglas, P.L., Elkamel, A., Teppaitoon, W. and Pongamphai, S., 2005. Supercritical CO 2
extraction of nimbin from neem seeds - a modelling study, Journal of Food Engineering, 71, 331-340.
10. Morgan, E. D., 2009."Azadirachtin, a scientific gold mine." Bioorganic & medicinal chemistry, 17, 4096-4105.
11. Melwita, E. and Ju Y.-H., 2010. "Separation of azadirachtin and other limonoids from crude neem oil via solvent precipitation."
Separation and Purification Technology, 74, 219-224.
12. Rao, D.V.K., Singh, K., Chopra, P., Chabra, P.C. and Ramanujalu, G., 1986. In vitro antibactericidal activity of neem oil. Indian Journal
of Medical Research, 84, 314-316.
13. Rebell, G. and Zaias, N., 2001. Introducing the syndromes of human dermatophytosis. Cutis, 67, 6-17.
14. Polaquini, SR , Svidzinski, TI , Kemmelmeier, C and Gasparetto, A., 2006. Effect of aqueous extract from Neem (Azadirachta indica A.
Juss) on hydrophobicity, biofilm formation and adhesion in composite resin by Candida albicans. Archives of Oral Biology, 51, 482–490.
15. Natarajan, V., Pushkala, S., Karuppiah, V.P. and Prasad, P.V., 2002. Anti dermatophytic activity of Azardirachta indica (neem ) by invitro
study. Indian Journal of Pathology and Microbiology, 45, 311-313.
16. Cleveland, T. E. and Bhatnagar, D., 1992. Molecular strategies for reducing aflatoxin levels in crops before harvest. In D. Bhatnagar and
T. E. Cleveland (Eds.), Molecular approaches to improving food quality and safety. pp 205–228. New York: Van Nostrand Reinhold.
17. Philips, T. D., Clement, B. A., and Park, D. L., 1994. Approaches to reduction of aflatoxins in foods and feeds. In D. L. Eaton & J. D.
Groopman (Eds.), The toxicology of aflatoxins: Human health, veterinary and agricultural significance, pp. 383 –406. New York:
Academic Press.
18. Razzaghi-Abyaneh, M., Allameh, A., Tiraihi, T., Shams-Ghahfarokhi, M. and Ghorbanian, M., 2005. Morphological alterations in
toxigenic Aspergillus parasiticus exposed to neem (Azadirachtaindica) leaf and seed aqueous extracts. Mycopathologia, 159, 565–570.
19. Mahmoud, D.A., Hassanein, N.M., Youssef, K.A. and Zeid, M.A.A., 2011. Antifungal activity of different neem leaf extracts and the
nimonol against some important human pathogens. Brazilian Journal of Microbiology, 42, 1007-1016.
20. Govindachari, T.R., Suresh, G., Gopalakrishnan, G., Banumathy, B. and Masilamani, S., 1998. Identification of antifungal compounds
from the seed oil of Azadirachta indica. Phytoparasitica, 26, 1-8.
21. Hoque, M.M.D., Bari, M.L., Inatsu, Y., Juneja, V.K. and Kawamoto, S., 2007. Antibacterial activity of guava (Psidiumguajava L.) and
neem (A. indica A. Juss.) extracts against foodborne pathogens and spoilage bacteria. Foodborne Pathogens and Disease, 4, 481-488.
22. Ambrosino, P., Fresa, R., Fogliano, V., Monti, S.M. and Ritieni, A., 1999. Extraction of azadirachtin A from neem seed kernels by
supercritical fluid and its evaluation by HPLC and LC/MS, Journal of Agricultural and Food Chemistry, 47, 5252–5256.
23. Schaaf O., Jarvis A. P., Andrew van der Esch S., Giagnacovo G. and Oldham N. J., 2000. Rapid and sensitive analysis of azadir achtin and
related triterpenoids from neem from HPLC-atmospheric pressure chemical ionisation mass spectrometry. Journal of chromatography A,
886. PP. 89-97.
24. Haldar, S, Phapale, P.B., Kolet, S.P. and Thulasiram, H.V., 2013. Expedient preparative isolation, quantification and characterization of
Neem limonoids from Neem Fruits. Analytical Methods, 5, 5386-539.
25. Ismadji, A., Kurniawan, Y.H., Ju, F.E., Soetaredjo, A. and Ayucitra Ong, L.K., 2013. Solubility of azadirachtin and several t riterpenoid
compounds extracted from neem seed kernel in supercritical CO 2, Fluid Phase Equilibria, 336, 9-15.
26. Charmaine Lloyd, A.C., Menon, T. and Umamaheshwari, K., 2005. Anticandidal activity of Azadirachta indica. Indian Journal
Pharmacology, 37, 386-389.
27. Dube, S. and Tripathi, S., 1987. Toxicity of some plants against dermatophytes. National Academy of Sciences, India, Science Letters, 10,
45-48.
28. Grewal, P.S. and Grewal, S.K., 1988b. Selective fungicidal properties of some plant extracts to mushroom weed moulds. Phytopa thologia
Mediterranea, 27, 112-114. http://www.jstor.org/stable/42684907.
Keyword : inverted-v steel bracing, equivalent lateral force method, pushover, time history, ncsc-2015 code
References:
1. V. Gioncu, F.M. Mazzolani, Seismic Design of Steel Structures, CRC Press, 2013 (Nov 21).
2. Mahmoudi, M., Montazeri, S., & Abad, M. J. S. (2018). Seismic performance of steel X-knee-braced frames equipped with shape
memory alloy bars. Journal of Constructional Steel Research, 147, 171-186.
4314-
3. J. Erochko, C. Christopoulos, Tremblay Robert, H.J. Kim, Shake table testing and numerical simulation of a self-centering energy 4320
dissipative braced frame, Earthq.Eng. Struct. Dyn. 42 (April) (2013) 1617–1635.
4. Costanzo, S., D’Aniello, M., & Landolfo, R. (2018). The influence of moment resisting beam-to-column connections on seismic behavior
of chevron concentrically braced frames. Soil Dynamics and Earthquake Engineering, 113, 136-147.
5. Fukuta, Toshibumi, et al. "Seismic performance of steel frames with inverted V braces." Journal of Structural Engineering 115 .8 (1989):
2016-2028.
6. EN 1993-1-1 (2005) (English): Eurocode 3: Design of steel structures - Part 1-1: General rules and rules for buildings [Authority: The
European Union Per Regulation 305/2011, Directive 98/34/EC, Directive 2004/18/EC]
7. De Normalisation, C. E. (2005). European standard EN 1998-3 Eurocode 8: Design of structures for earthquake resistance–part 3:
assessment and retrofitting of buildings. Brussels, Belgium.
8. CSI, C. (2015). Analysis reference manual for SAP2000, ETABS, SAFE and CSiBridge. Computers and Structures, Inc., Berkeley, C A,
USA.
9. Sadeghi K., Ghaboun N., (2019, June) “Significant Guidance to Employ the Software to Analyze and Design the Reinforced Concrete
Structures: State-Of-The-Art”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) [Online]. 8(9), 1160-
1169, Available: https://www.ijitee.org/wp-content/uploads/papers/v8i9/I8035078919.pdf
10. Onur A. Z., Nouban F., (2019, July) “Software in the Architectural Presentation and Design of Buildings: State-Of-The-Art”,
International Journal of Innovative Technology and Exploring Engineering (IJITEE) [Online]. 8(10), Available:
https://www.ijitee.org/wp-content/uploads/papers/v8i10/J94860881019.pdf.
11. Turkish Standard Code of Practice for Design of Buildings and Structures for Agriculture. TS 498. Turkish Standards Institute; 1987 [in
Turkish].
12. Council, B. S. S. (2000). Prestandard and commentary for the seismic rehabilitation of buildings. Report FEMA-356, Washington, DC.
13. Chamber of Civil Engineers. (2015). KKTC Deprem Bölgelerinde Yapılacak Binalar Hakkında Yönetmelik. Lefkoşa: Inşaat Mühendisleri
Odasi Chamber of Civil Engineers.
14. Campbell, K. W., & Bozorgnia, Y. (2010). A ground motion prediction equation for the horizontal compo nent of cumulative absolute
velocity (CAV) based on the PEER-NGA strong motion database. Earthquake Spectra, 26(3), 635-650.
Paper Title: Improvement of Antipodal Vivaldi Antenna Performance for Wireless Application
Abstract: This paper discusses about miniaturized size of the antipodal Vivaldi antenna by using triangular
and circular slots on the Vivaldi antenna. A normal antipodal Vivaldi antenna using FR4 epoxy substrate with a
dielectric constant of 4.4 and thickness 1.6mm has been designed. Then, the triangular and the circular slots are
added at the upper layer of the miniaturized size of the antenna, the triangular slot plays a major role in reduction of
size of the antenna and also results in the better improvement of return loss, gain and bandwidth operated at a
frequency in the range of 3GHz to 25GHz and the circular slot placed at the exponential part of the antenna helps to
reduce excessive mutual coupling between different slots of the antenna. The feeding technique used for designing
of this antenna is micro strip feedline. The proposed antenna results in different applications by incrementing the
frequency. The results of simulation are been realized using HFSS 13.0, a high frequency simulator structure
752. program. The structured antipodal Vivaldi radio wire and the triangular and round openings antipodal Vivaldi
receiving wire are manufactured. The arrival misfortune reaction and the increase of the manufactured radio wires
are estimated and contrasted and the re-enactment results. 4321-
4324
Keyword : Antipodal, Bandwidth, Gain, Micro strip field line, Return losses, VSWR
References:
1. Wei, L., Hu, R. Q., Qian, Y., & Wu, G. (2014). Key elements to enable millimeter wave communications for 5G wireless systems. IEEE
Wireless Communications, 21(6), 136-143.
2. Gibson, P. J. (1979, September). The vivaldi aerial. In 1979 9th European Microwave Conference (pp. 101-105). IEEE.
3. Kumar, A., Kaur, J., & Singh, R. (2013). Performance analysis of different feeding techniques. International journal of emerg ing
technology and advanced engineering, 3(3), 884-890.
4. Teni, G., Zhang, N., Qiu, J., & Zhang, P. (2013). Research on a novel miniaturized antipodal Vivaldi antenna with improved radiation.
IEEE Antennas and wireless propagation letters, 12, 417-420.
5. Ojaroudi, N., & Ojaroudi, M. (2013). Novel design of dual band-notched monopole antenna with bandwidth enhancement for UWB
applications. IEEE Antennas and Wireless Propagation Letters, 12, 698-701.
6. Adamiuk, G., Zwick, T., & Wiesbeck, W. (2008, May). Dual-orthogonal polarized vivaldi antenna for ultra wideband applications. In
MIKON 2008-17th International Conference on Microwaves, Radar and Wireless Communications (pp. 1-4). IEEE.
7. Zhou, B., & Cui, T. J. (2011). Directivity enhancement to Vivaldi antennas using compactly anisotropic zero -index metamaterials. IEEE
Antennas and Wireless Propagation Letters, 10, 326-329.
8. Bai, J., Shi, S., & Prather, D. W. (2011). Modified compact antipodal Vivaldi antenna for 4–50-GHz UWB application. IEEE Transactions
on Microwave Theory and Techniques, 59(4), 1051-1057.
9. Fei, P., Jiao, Y. C., Hu, W., & Zhang, F. S. (2011). A miniaturized antipodal Vivaldi antenna with improved radiation characteristics. IEEE
antennas and wireless propagation letters, 10, 127-130.
10. .B.M.S.Sreenivasa Rao1, Mr.R.Arun Sekar,An Efficient Design Of Planar Inverted F-Antenna International Journal for Scientific Research
& Development| Vol. 6, Issue 12, 2019,
Paper Title: The Mechanism of the Industrial Enterprise’s Strategy Development Formation
Abstract: Theoretical and applied aspects of the mechanism of the industrial enterprise’s strategy
development formation, are investigated. Based on the presented scientific achievement towards the enterprise’s
strategic development formation concept, done a systematization of the existing scientific approaches towards
considering the investigated concept from the point of view of different objects, in particular: systematic approach,
functional approach, hierarchical approach, process approach, system-target approach, system- structural approach.
Taking into account the specifics of the listed approaches, it is noted that the most rational in the current conditions
of the industrial enterprises’ functioning is the use of system-structural approach. Presented the mechanism of the
industrial enterprise’s strategy development formation, based on the proposed approach, as a systematic algorithm
of actions, that allows on the basis of strategic management to determine the mission, goals and tasks of the
enterprise, to develop the main strategic directions and measures of its development in conditions of dynamic
change of the external environment at optimal use of the all enterprise’s available resources. Defined the business
entity’s targeted areas of work, according to which the process of development and selection of the strategy’s
development type, including: strategic plans, tactical plans and operational planning, should be carried out. There
are five levels at which the industrial enterprise’s strategy development is developed: corporate level, business
level, functional level, technical level, operational level, and modular level. The purpose, toolkit, factors and
methods of realization diagnostics of the industrial enterprise’s strategy development are grounded. It is noted that
the process of implementation of the enterprise’s strategy development and control over its implementation predicts
the practical implementation of the following measures: defined plans and taking measures aimed at the
implementation of the made enterprise’s strategy development; monitoring the progress of the implementation of
the strategy’s development and determining the need for its adjustment; evaluation of the strategy’s implementation
and taking into account the implementation’s disadvantages by developing the next strategy or modification of the
existing strategy; control over maintaining the existing values of strategic development indicators, the
organization’s activities and the enterprise’s strategic management effectiveness as a whole.
753. Keyword : development strategy, industrial enterprise management, mechanism of development strategy
formation, strategic management. 4325-
References: 4331
1. O.V. Lyulov, Forming of development strategies of enterprise in conditions of unbalanced economy, Abstract of Ph.D. dissertation,
Economics and Management of Enterprises by Types of Economic Activity, Sumy State University, Sumy, 2011.
2. A. A. Doroshuk, “The choice of enterprise’s strategy in the conditions of economic crisis,” Strategies of development of the enterprise in
the conditions of market economy, vol. 3., 2008, pp. 92–95.
3. O.V. Raevnev, “Enterprise development management: methodology, mechanisms, models,” Kharkiv: INZHEK, 2006, pp. 110 -111.
4. O. M. Tridid, The enterprise’s strategy development in crisis, Ph.D. Thesis, Economics, organization and management of enterprises,
Donetsk National University, Donetsk, 2003.
5. I. Filipishin, “The concept of industrial enterprise development management,” Economy, vol. 1(115), 2012, pp. 112-117.
6. S. P. Usik, “Development strategy choice with consideration of enterprise level of readiness for strategic changes,” Actual p roblems of
economy, vol. 6(96), 2009, pp. 142-150.
7. N. V. Popova, N. M. Belevtsova, “Development of enterprise development strategy,” Bulletin of Economics of Transport and Industry,
vol.29, 2010, pp. 359-363.
8. N. V. Kasyanova, Management of enterprise development on the basis of cumulative approach: concept, models and methods, Donet sk:
Kupriyanov VS, 2011.
9. I. M. Khvostina, “Mechanism of enterprise development management,” Investments: practice and experience, vol. 1, 2015, pp. 30 -33.
10. V.M. Kolosok, Methodology of development of strategic management of large industrial enterprises, Mariupol: State Technical University
"Azov State Technical University", 2012.
11. S. Yu. Khaminich, Management of the enterprise on the basis of educational potential, Donetsk: DNU, 2006.
12. O. I. Khomenko, “Types of strategies and tools for forming the strategy of enterprise development,” Management development, vol.
3(181), 2015, pp.131-137.
13. V. V. Zhikhareva, T. M. Savelieva, “Formation of strategy of enterprise development under uncertainty,” Economy and society, vol. 9,
2017, pp. 423-427.
14. I. V. Smolin, System of strategic planning of enterprise development, Ph.D. Thesis, Economics, organization and management of
enterprises, Kyiv National University of Trade and Economics, Kyiv, 2005, Ukraine.
15. I. V. Tyukha, I. O. Denysyuk, “The strategy development in the system of enterprise’s strategie,” Econo mics of the food industry, vol.
3(19), 2013, pp. 33-37.
16. Chandler Alfred D.Jr. Strategy and Structure: Chapters in the History of the Industrial Enterprise, Mass.: M. I. T. Press Pp. xiv,
Cambridge, 1962.
17. Warner, Mildred, Lingwen Zheng, Economic Development Strategies for Recessionary Times: Survey Results from 2009, ICMA
Municipal Year Book 2011 (Washington, D.C.: ICMA, 2011), pp. 33-42.
18. Lee Frederiksen “Business development strategy: a high-growth approach,” January 2019, [Online]. Available:
https://hingemarketing.com/blog/story/business-development-strategy-a-high-growth-approach.
754. Authors: Marzuki Ibrahim, M. Hisham Omar, Imran Abdullah, M. Sophist Ahmad, S.A.Tajuddin Sh.Yusoff
Paper Title: The Innovation of Worship Products for the Future Generation
Abstract: The heyday of Islam began as early as the middle of the 7th century and once again proved that
Islamic science was the forerunner of all kinds of creations and innovations in science and technology. However,
today, we see Muslims struggling to make a name for themselves in pioneering science and technology. It should
not be so since many of the creations enjoyed today are based on inventions from Islamic civilizations rather than
Western ones. Therefore, to restore the past glory, a new plan must begin from now. Among others, through the
development of worship products for the use of Muslims worldwide. Studies have shown that efforts to produce
tangible products are still low due to the increased focus on non-tangible products such as banking systems, health,
and beauty products. Therefore, to ensure the idea of developing this worship product is clearly understood, several
examples of existing worship products are presented and discussed regarding their weaknesses from a design
perspective. Four examples of the latest innovative products designed specifically for the needs of Muslims are
described. The rationale for the need for innovations in worship products is also statistically discussed in light of
the rapid growth of Muslims, with over 1.6 billion Muslims. Furthermore, as many as nine groups of worship
products have the potential to develop, such as products for prayer, knowledge gathering, pilgrimage, and umrah.
Finally, the design features that need to be considered for developing next-generation worship products to meet
customer and market needs are also discussed. The results of this research are intended to raise awareness to the
world about the golden age of Islamic science and that this innovation is still relevant today. Innovation is a catalyst
for high-income economic development. In this regard, developing and producing innovative worship products can
generate wealth to improve the quality of life of Muslims worldwide.
Such is the initiative introduced by the professional design team in Faculty of Innovative Design and Technology
(FRIT) at Universiti Sultan Zainal Abidin (UniSZA) Malaysia that has developed a range of Islamic conceptual
products. Based on the results of the observation technique during the pilot test, conducted in many states across the
country, there are several issues that need to be resolved namely that Muslims in Malaysia desperately need
innovative products that can help them to worship consistently and confidently. This means that there are still no
well-built innovative Islamic-based products available in the local market. As such, the Muslim demographic group
in the country as well as around the world, comprising senior citizens, adults, teens and children will be able to
enjoy the contributions produced by FRIT at UniSZA.
Keyword : CMOS, Gate diffusion Input (GDI), MTCMOS, nm, sleep transistor (ST), Sleepy- Gate Diffusion
Input (S-GDI), VLSI.
References:
1. . M. Kang and Y. Lablebici, “CMOS Digital Integrated Circuits Analysis and Design,”(2003), pp. 481-520, McGraw-Hill publications.
2. A. Sharma and H. Sohal, “Considerations for Ultra-Low-Power VLSI Design–A Survey,” Journal of Nanoelectronics and Optoelectronics,
(2016), Vol. 11, pp. 1–21.
3. S. Borkar, “Design challenges of technology scaling,” IEEE Journal of Micro, (1999), Vol. 19, No. 4, pp. 23-29.
4. N.H.E. Weste and D.M. Harrie, “CMOS VLSI Design: A Circuits and Systems Perspective,” 4th edition, pp. 327-423, Addison-Wesley
publications.
5. D. Das, “VLSI Design - 2nd Edition” Oxford University Press, (2015), pp. 307-314.
6. A. Jaekel, S. Bandyopadhyay and G.A. Jullien, "Multi-level factorization technique for pass transistor logic,”IEE Proceedings - Circuits,
Devices and Systems, (1998), Vol. 145, No. 1 ,pp. 48 – 54.
7. P. P.Patil and A. A.Hatkar, “Comparative Analysis of 8 Bit Carry Skip Adder using CMOS and PTL Techniques with Conventional
MOSFET at 32 Nanometer Regime,” IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems,
(2016), pp. 1-5.
8. M. Mittal, A. Rathod, “Digital circuit optimization using Pass Transistor Logic architectures,”International Conference on Emerging 4340-
Trends in Communication Technologies, (2016), pp. 1-5.
9. C. Kao, “BDD-based synthesis for mixed CMOS/PTL logic,” International journal of circuit theory and applications, (2011), Vol. 39, pp. 4347
923–932.
10. T. Bhuvaneswari, V. Prasad, A. Singh and C. Senthilpari, “Performance Analysis of Reversed Binary Decision Diagram Pass Trans istor
Logic Synthesis,”International journal of circuit theory and applications, (2011), Vol. 41, No.8, pp. 844-853.
11. P. Gupta, A. Gupta, and A.Asati, “Leakage Immune Modified Pass Transistor Based 8T SRAM,” International Journal of Reconfigur able
Computing,Cell in Subthreshold Region,(2015), pp. 1-10.
12. X. Bai, Y. Tsuji, T. Sakamoto, A. Morioka, M. Tada, N. Okamoto, N. Iguchi, and H.Hada, “Area-efficient nonvolatile carry chain based
on pass-transistor/atom-switch hybrid logic,” Japanese Journal of Applied Physics, (2016), Vol. 55, No. 4s.
13. I. Levi, A.Kaizerman and A.Fish, “Low voltage dual mode logic: Model analysis and parameter extraction,” Microelectronics
Journal,(2013), Vol. 44, pp. 553–560.
14. A. Srinivasulu and M. Rajesh, “ULPD and CPTL Pull-Up Stages for Differential Cascode Voltage Switch Logic,” Journal of Engineering,
(2013), pp. 1-5.
15. S. Mutoh, T. Douseki, Y. Matsuya, T. Aoki, S. Shigematsu and J. Yamada, “1- V Power Supply High- Speed Digital Circuit Technology
with Multithreshold-Voltage CMOS,” IEEE Journal of Solid- State Circuits,(1995), Vol. 30, No. 8, pp. 847-854.
16. S. Yuan, Y. Li, Y. Yuan, Y. Liu, “Pass transistor with dual threshold voltage domino logic design using standby switch for reduced
subthreshold leakage current,” Microelectronics Journal, (2013), Vol. 44, No. 12, pp. 1099-1106.
17. W. Wang, M. Anis, S.Areibi, “Fast Technique for Standby Leakage Reduction in MTCMOS circuits,” IEEE International SOC
Conference,(2004), pp. 21-24.
18. C. long, L. He, “Distributed Sleep Transistor Network for Power Reduction,” IEEE transactions on very large scale integration (VLSI)
systems, vol. 12, no. 9, pp. 937-945, 2004.
19. K. Shi, D. Howard, “Challenges in Sleep Transistor Design and Implementation in Low Power designs,” ACM/IEEE Design Automatio n
Conference,(2006), pp. 113-116.
20. K. Shi, D. Howard, “Sleep Transistor Design and Implementation - Simple Concepts Yet Challenges To Be Optimum,” IEEE International
Symposium on VLSI Design, Automation and Test, (2006), pp. 1-4.
21. S. Devi, N. S. Suhas and K. M. Anand, “Design of Full Subtractor using DPL Logic and MTCMOS Technique to Reduce the Leakage
Current and Area,” International Conference on Electrical, Computer and Communication Technologies, (2017), pp. 1-4.
22. S. Katrue, D. Kudithipudi, GALEOR: Leakage reduction for CMOS circuits, IEEE International Conference on Electronics, Circuits and
Systems, (2008), pp. 574-577.
23. M. Kumar, M.A. Hussain, S. K. Paul, New hybrid Digital Circuit Design techniques for reducing Subthreshold Leakage Power in Standby
mode, Journal of Circuits and Systems,(2013), pp. 75-82.
24. S. Singhal, N. Gaur, A. Mehra, P. Kumar, Analysis and Comparison of Leakage Power Reduction Technique in Cmos Circuits,
International conference on Signal processing and Integration Network, (2015), pp. 936-944.
25. R. Goyal, S. Sharma, “Single Bit Hybrid Full Adder Cell by Gate Diffusion Input and Pass Transistor Logic Technique,” IEEE
International conference on advances in electrical technology for green energy, (2017), pp. 37-42.
26. V. Foroutan, M. Taheri, K. Navi , A. Mazreah, “Design of two Low-Power full adder cells using GDI structure and hybrid CMOS logic
style,” Integration, the VLSI journal, (2014).
27. A.Morgenshtein, V.Yuzhaninov, A. Kovshilovsky and A. Fish, “Full-Swing Gate Diffusion Input logic—Case-study of low-power CLA
adder design,” NTEGRATION, the VLSI journal, (2014).
28. M. Shoba, R. Nakkeeran, “GDI based full adders for energy efficient arithmetic applications,” Engineering Science and Technology an
International Journal,(2015).
29. C. N. Shilpa, K. D. Shinde, H. V. Nithin, “Design, Implementation and Comparative Analysis of Kogge Stone Adder using CMOSand
GDI design: A VLSI Based Approach,” International Conference on Computational Intelligence and Communication Networks, (2016).
30. T. Sharma and L.Kumre, “A Novel Energy-Efficient Hybrid Full Adder Circuit,”IEEE International Symposium on Circuits and Systems,
(2017), pp. 1-4.
31. K. Dhar, “Design of a Low Power, High Speed, Energy Efficient Full Adder Using Modified GDI and MVT Scheme in 45nm
Technology,” International Conference on Control, Instrumentation, Communication and Computational Technologies, (2014), pp. 36-41.
32. S. Sankar, U. S. Kumar, M. Goel, M. S. Baghini, V. R. Rao, “Considerations for Static Energy Reduction in Digital CMOS ICs Using
NEMS Power Gating,”IEEE Transactions on Electron Devices, (2017), Vol. 64, No. 3, pp. 1399 – 1403.
33. J. Lin, M. Sheu, Y. Hwang, C. Wong, M. Tsai, Low-Power 19-Transistor True Single-Phase Clocking Flip-Flop Design Based on Logic
Structure Reduction Schemes,IEEE Transactions on Very Large Scale Integration (VLSI) Systems, (2017), Vol. 25, No. 11, pp. 3033 –
3044.
34. C. Goyal, J. S. Ubhi, & B. Raj, “Design of nano scale CMOS full adder with low leakage and ground bounce noise reduction,”
International conference on Signal Processing and Communication, (2016), pp. 380-385.
35. A. Nag, D. Nath, S. N. Pradhan, “Leakage Reduction of SRAM-Based Look-Up Table Using Dynamic Power Gating,” Journal of Circuits,
Systems, and Computers, (2017), Vol. 26, No. 3, pp. 1-12.
36. H. Okuhara, A. Ahmed, J. M. Kühn, H. Amano, Asymmetric Body Bias Control With Low-Power FD-SOI Technologies: Modeling and
Power Optimization, IEEE Transactions on Very Large Scale Integration (VLSI) Systems,(2018), Vol. 26, No. 7, pp. 1254-1267.
37. S. Saxena, R. Mehra, “Low-power and high-speed 13T SRAM cell using FinFETs, IET Circuits, Devices & Systems,”(2017), Vol. 11, No.
3, pp. 250-255.
38. A. Sharma, R. Mehra, “Area and Power Efficient CMOS Adder Design by Hybridizing PTL and GDI Technique,” International Journal of
Computer Applications, (2013), Vol.66, No. 4, pp. 15-22.
39. A. Morgenshtein, A. Fish and I. A. Wagner, “Gate-Diffusion Input (GDI): A Power-Efficient Method for Digital Combinatorial Circuits,”
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, (2002), Vol. 10, No. 5.
Paper Title: Early Detection of stenosis in Coronary Artery using Adaboost and ANN Classification
Abstract: In recent years, due to the prevailing challenges in cardiovascular diseases in human , early
detection of severity of stenosis has become essential. In this paper, an image processing method for detecting and
localizing the regions in the coronary artery for segmentation is proposed.. This method works with a set of CT
reconstructed images and gives much precision in detecting stenosis and helps clinical physicians for better
diagnostic decision making process. CT is the widely used imaging technique to assess these kind of artery
diseases. Ada Boost algorithm and colour based segmentation are used to exactly find out the regions in the artery.
757.
This method is applied on the reconstructed CT image of the heart along with preprocessing techniques for the
detection of stenosis and center lines of the segmented arteries are extracted using texture extraction method. The 4352-
CT images data set are collected from Sri Chakra scan centre, Chennai. 4356
Keyword : Coronary artery disease, CT image, image segmentation, stenosis, texture extraction
References:
1. W. Xue, G. Brahm, S. Pandey, S. Leung, and S. Li,” Medical Image Analysis, vol. 43, pp. 54–65, 2018
2. Yang Dong. A Research on Coronary arteries Segmentation Algorithm for CTA Images and the Analysis on Vascular Stenosis Degree.
Zhejiang University, 2015.
3. Kavousi M, Desai CS, Ayers C, et al. Prevalence and prognostic implications of arteria coronaria calcification in low risk girls, a meta-
analysis. JAMA 2016. , http://doi:10.1001/jama.2016.17020.
4. Mast ME, Heijenbrok MW, van Kempen-Harteveld ML, et al. Less intense of CT-based calcium scores of the coronary arteries: three
years effect after breast-conserving radiotherapy using breath-hold. Strahlenther Onkol 2016; 192:696–704.
5. Gernaat SAM, Išgum I, de Vos BD, et al. Automatic arteria coronaria ca evaluation on radiation therapy designing CT scans of carcinoma
patients: dependability and association with ancient vessel risk factors. PLoS ONE 2016.
6. yefeng zheng, maciej loziczonek, bogdan georgescu, s. kevin zhou fernando, vega-higuera, dorin comaniciu machine learning primarily
based vesselness measuring for arteria coronaria segmentation in internal organ ct volumes
7. van den Bogaard VAB, Ta BDP, van der Schaaf A, et al. Validation and modification of a prediction model for acute internal organ events
in patients with carcinomar treated with radiation therapy supported on three-dimensional dose distributions to internal organ
substructures. J Clin Oncol 2017; 35:1171–8.
8. K. Saenko, and T. Darrell, “Long-term perennial convolutional networks for visual recognition and description,” in Proceedings of the
IEEE Conference on laptop Vision and Pattern Recognition, 2015, pp. 2625–2634
9. A. Rao, N. Yadu, Y. Pimpalwar, and S. Sinha, “Utility of coronary artery calcium scores in predicting coronary atherosclerosis amongs t
patients with moderate risk of coronary artery disease,” Journal of Indian College of Cardiology, vol. 7(2), pp. 55-59, 2017.
10. H. Yaşar and M. Ceylan, “A novel approach for reduction of breast tissue density effects on traditional and abnormal lots classification,”
Journal of Medical Imaging and Health science, vol. 6(3), pp. 710-717, 2016.
11. https://www.researchgate.net/figure/Figure1-Deaths-by-cause-and-sex-UK-This-figure-compiles-data-from-the-four-countries-
of_fig4_277780486
Keyword : WMN, Routing, Delay Reduction, Dynamic Switching, Congestion Prediction, MANET.
References:
1. L. Zhang, C. Wan, "Dynamic Path Planning Design for Mobile Sink with Burst Traffic in a Region of WSN", Wireless Communications
and Mobile Computing(Hindawi), pp. 8, 2019.
2. P. Aimtongkham, T. G. Nguyen, C. So-In, "Congestion Control and Prediction Schemes Using Fuzzy Logic System with Adaptive
Membership Function in Wireless Sensor Networks", Wireless Communications and Mobile Computing(Hindawi), pp. 19, 2018.
758. 3. R. Melki, M. M. Mansour, A. Chehab, "A fairness-based congestion control algorithm for multipath TCP", IEEE Wireless
Communications and Networking Conference (WCNC), pp. 1 - 6, 2018. 4357-
4. S. C. Nguyen, X. Zhang, T.M.T. Nguyen, G. Pujolle, "Evaluation of Throughput Optimization and Load Sharing of Multipath TCP in
Heterogeneous Networks", In Proc. Eighth Int. Conf. Wireless and Optical Communications Networks, pp. 1-5, 2011. 4363
5. J. Wang, M.Song, "Rate-Based Active Queue Management for TCP Flows over Wired and Wireless Networks", EURASIP Journal on
Wireless Communications and Networking, Vol. 2007, pp. 8, 2007.
6. M. Ikeda, E. Kulla, M. Hiyama, M. Takizawa, "Congestion Control for Multi-flow Traffic in Wireless Mobile Ad-hoc Networks", IEEE
Sixth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 290 - 297, 2012.
7. F. Ren, T. He, S. K. Das, and Chuang Lin, "Traffic-Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks", IEEE
Transactions On Parallel And Distributed Systems, Vol. 22, No. 9, September 2011.
8. A. K. Dwivedi and G. Prajapati, "Study of Congestion Control in Multi-Flow in MANET", International Journal of Computer
Applications (0975 - 8887), Vol. 122 - No.14, July 2015.
9. M. A. Gawas, L. J. Gudino, K. R Anupama, "Congestion-Adaptive and Delay-Sensitive Multirate Routing Protocol in MANETs: A Cross-
Layer Approach", Journal of Computer Networks and Communications(Hindawi), pp. 13, 2019.
10. M. Shafiee, J.Ghaderi, "A Simple Congestion-Aware Algorithm for Load Balancing in Datacenter Networks", IEEE/ACM Transactions on
Networking, Vol. 25(6), pp. 3670 - 3682, 2017.
11. W. Song, S. Jiang, and G.Wei, "A Congestion-Aware Multipath Routing with Cross-Layer Design for Wireless Mesh Networks",
Proceedings of the 15th Asia- Pacific Conference on Communications,157, 2009.
12. M. F. Tsai, N. Chilamkurti, J. H. Park, C. K. Shieh, "Multi-path transmission control scheme combining bandwidth aggregation and packet
scheduling for real-time streaming in the multi-path environment", IET Communications, vol. 4, no. 8, pp. 937-945, 2010.
13. K. C. Rahman, Syed Faisal Hasan, "Explicit Rate-based Congestion Control for Multimedia Streaming over Mobile Ad hoc Networks",
International Journal of Electrical & Computer Sciences IJECS-IJENS, Vol. 10, No. 04, 2010.
14. M. Ikeda, E. Kulla, M. Hiyama, L. Barolli, M. Younas, and M. Takizawa, "TCP Congestion Control in MANETs for Multiple Traffic
Considering Proactive and Reactive Routing Protocols", 15th International Conference on Network-Based Information Systems, 2012.
15. C. -Ya Huang, P. Ramanathan, "Network Layer Support for Gigabit TCP Flows in Wireless Mesh Networks", IEEE Trans. on Mobile
Computing, Vol. 14(10), pp. 2073 - 2085, 2015.
16. A. Darehshoorzadeh, R. E. De Grande, A. Boukerche, "Toward a Comprehensive Model for Performance Analysis of Opportunistic
Routing in Wireless Mesh Networks", IEEE Trans. on Vehicular Technology, Vol. 65(7), Pp. 5424 - 5438, 2016.
17. H. Shen, L. Cai, and X. Shen, "Performance analysis of TFRC over a wireless link with truncated link-level ARQ", IEEE Transactions on
Wireless Communications, vol. 5, no. 6, June 2006.
18. A. A. El-Sherif, A. Mohamed, "Joint Routing and Resource Allocation for Delay Minimization in Cognitive Radio Based Mesh
Networks", IEEE Trans. on Wireless Comm., Vol. 13(1), Pgs. 186 - 197, 2014.
19. E. Lochin, G. Jourjon, S. Ardon P. Senac, "Promoting the Use of Reliable Rate Based Transport Protocols: The Chameleon Protocol",
International Journal of Internet Protocol Technology, Vol 5, Issue 4, pp 175-189, March 2010.
20. S. J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks", IEEE International Conference on
Communications, Vol. 10, pp. 3201– 3205, 2001.
21. L. Wang, Y. Shu, M. Dong, L. Zhang, and O. W. W. Yang, "Adaptive multipath source routing in ad hoc networks", In IEEE International
Conference on Communications, vol. 3, pp. 867–871, 2001.
22. D. A. Tran and H. Raghavendra, "Congestion adaptive routing in mobile ad hoc networks", IEEE Transactions on Parallel and Distributed
Systems, vol. 17, no. 11, pp. 1294–1305, 2006.
23. J. D. C. Little, S.C. Graves, "Little's Law", In book: Building Intuition, DOI: 10.1007/ 978-0-387-73699-0, pp.81-100, 2008.
24. C. M. Lagoa, H. Che, B.A. Movsichoff, "Adaptive control algorithms for decentralized optimal traffic engineering on the internet",
IEEE/ACM Trans. Networking, Vol. 12 (3), pp. 415-428, 2004.
25. C. Wan, J. Chang, and L. Zhang, "Dynamic path planning design of mobile sink for single region bursty traffic", Computer Science, Vol.
44(5), pp. 61–65, 2017.
Paper Title: ATM Crime Prevention and theft Detection model by Wireless Technologies RFID and GSM
Abstract: The Implementation of Advanced ATM theft avoidance System is brought into world with the
perception of ATM wrong doing occurring far and wide. This paper manages the counteractive action of ATM
wrongdoing. At whatever point burglary happens, MEMS module is present to detect crime happening at ATM
machine. Proposed framework is done by ARM controller based installed framework designed for constant
information gathered utilizing a MEMS module. When the theft happens this, designed system automatically alerts
alarm such as buzzer, dc motor control gate, GSM sends SMS to authorized person and the status is displayed in
LCD to monitor. Simultaneously this framework additionally manages the well lbeing of the client by cautioning
the encompassing individuals and close-by police headquarters at whatever point the client is in risky circumstance.
Here we utilize RFID module to verify ATM Card. RFID discoveres ATM card can swipe anyplace. It naturally
sends burglary alert through GSM, buzzer ready individuals, DC motor entryway lock and all the status is displayed
759. on LCD. Keil software is used to implement programmatically and execute the project successfully.
4364-
4367
Keyword : ARM Microcontroller, ATM, GSM, MEMS, RFID
References:
1. Best Practice for ATM Security (Overview of ATM security situation, forecast, and best practices) GRG Banking Equipment (HK) Co.,
Ltd .2011/5/27
2. "European ATM Crime Report." The European ATM Security Team. June 2011.
3. Sivakumar T, GajjalaAskok& K. SaiVenuprathap, “Design and Implementation of Security Based ATM Theft Monitoring System”,
4. “Global ATM Market and Forecasts to 2016.” Retail Banking Research. September 2011. Brochure Pg 2.
5. Kim, Bo-Ra, “Domestic ATM status and meanings”, Payment and Settlement, and IT, Vol. 44, pp. 76, 2011.
6. John Adrian Shepherd-Barron, British inventor (1960), “Development the cash machine Automated Teller Machine or ATM
7. G. Ahmed Zeeshan " Embedded Web Server for Real-Time Remote Control and Monitoring of a Raspberrypi based on Open Source
Platform " IJESC Vol. 6 ISSUE 8 July 2016.
8. G. Ahmed Zeeshan " Fall Detection System and Body Positioning with Heart Rate Monitoring " IJRECE Vol. 6 ISSUE 4 November 2018.
Paper Title: Recognition of Handwritten Digits using Convolutional Neural Network and Linear Binary Pattern
Abstract: Over the past few years there has been a tremendous developments observed in the field of
computer technology and artificial intelligence, especially the use of machine learning concepts in Research and
Industries. The human effort can be further more reduced in recognition, learning, predicting and many other areas
using machine learning and deep learning. Any information which has been handwritten documents consisting of
digits in digital form like images, recognizing such digits is a challenging task.
The proposed system can recognize any handwritten digits in the document which has been converted into digital
format. The proposed model includes Convolutional Neural Network (CNN), a deep learning approach with Linear
Binary Pattern (LBP) used for feature extraction. In order to classify more effectively we also have used Support
Vector Machine to recognize mere similar digits like 1 and 7, 5 and 6 and many others. The proposed system CNN
and LBP is implemented on python language; also the system is tested with different images of handwritten digits
taken from MNIST dataset. By using proposed model we could able to achieve 98.74% accuracy in predicting the
760. digits in image format.
4368-
Keyword : CNN, LBP, RBF, SVM 4372
References:
1. Hemant Kumar, Rishabh, “Comprehensive Review on Supervised Machine Learning Algorithms”, 2017 International Conference on
Machine Learning and Data Science (MLDS), 2017.
2. Vanita Jain, Arun Dubey ,Amit Gupta, “ Comparative analysis of machine learning algorithms in OCR”, 2016 3rd International
Conference on Computing for Sustainable Global Development (INDIACom), 2016.
3. R.R. Malyan , S. Sunthankar, “Machine learning for hand printed character perception”, IEE Colloquium on Machine Learning, 2014.
4. Sonia Kuwelkar, Mithili N Mayekar, “Implementation of machine learning algorithm for character recognition on GPU”, International
Conference on Computing Methodologies and Communication (ICCMC), 2017.
5. Priya,Rajendra Singh,Soni Cha Priya,Rajendra Singh,Soni Changlani, “Recognition of Handwritten Digits using Proximal Support Vector
Machine”, Journal of Emerging Technologies and Innovative Research (JETIR), Volume 4, Issue 04, 2017.
6. Anish Kumar Jha1 , Anupam Ghosh1, “Hand Written Digit Recognition using Convolutional Neural Network (CNN)”, International
Journal of Innovations & Advancement in Computer Science, Volume 6, Issue 5, 2018.
7. “Handwritten Bangla Digit Recognition Using Chemical Reaction Optimization”, 9th ICCCNT ,2018.
8. Bappy Shahriar Abir, H.M. Mehedi Hasan, “Handwritten Bangla Digit Recognition Using Chemical Reaction Optimization”, 9th
International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2018.
9. Shruti R. Kulkarni, Bipin Rajendran,”, 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2017.
10. Amitava Choudhury, Tanmay Bhowmik, “Handwritten Bengali Numeral Recognition using HOG Based Feature Extraction Algorithm”,
5th International Conference on Signal Processing and Integrated Networks (SPIN), 2018.
11. Leo Pauly, Dr.Binu paul, R,”Hand written Digit Recognition System for South Indian Languages using Artificial Neural Network”, *th
International Conference on Contemporary Computing, 2015.
12. R Kurniawan Nur, Nurul ,“Handwriting Digit Recognition using Local Binary Pattern Variance and K-Nearest Neighbor Classification”,
4th International Conference on Information and Communication Technology , 2016.
13. Michio Yasuda, Yumi Nakashima, "Pattern Augmentation for Handwritten Digit Classification based on Combination of Pre-trained CNN
and SVM", 2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in
Computational Medical and Health Technology (ICIEV-ISCMHT), 2017.
14. Dr Hak KeungLam, Retno Larasati, "Handwritten Digit Recognition using Ensemble Neural Network and Ensemble Decision Tree",
International Conference on Smart Cities, Automation & Intelligent Computing System Yogyakarta, Indonesia, 2017.
15. Hanadi Hassen ; Ali Hamdi,”Arabic Bank Cheque Words Recognition Using Gabor Features”, 2nd International Workshop on Arabic a nd
Derived Script Analysis and Recognition (ASAR), 2018.
16. Muhammad Usman Ghani, Syed, “Handwritten Digit Recognition using DCT and HMMs”, 12th International Conference on Frontiers of
Information Technology,2014.
17. Prashanth Kambli, Amruthalakshmi “Investigating the Various Approaches towards Handwritten Digit Recognition ”, 5th National
Conference on Advancement In Information Technology, 2019, Journal of Network Security Computer Networks.
18. Ratan Kumar Basak, Shalini Guha, Saptarshi De, Sucheta Nag, “Hindu Arabic character recognition using mathematical morphology”,
IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016.
19. Nikolaos Toulgaridis, Theodore Antonakopoulos, “RBM-based hardware accelerator for handwritten digits recognition”, Panhellenic
Conference on Electronics and Telecommunications (PACET), 2017.
20. Po-Yuan Shih,Wei-Bin Liang,” Integration of Orthogonal Feature Detectors in Prameter Learningof Artificial Neural Networks to Improve
robustness and the Evaluation on Hand-Written Digit Recognition Tasks”, IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP), 2016.
Authors: Nik Lukman Nik Ibrahim, Mohd Khairul Azhar Mat Sulaiman, Amran Atan
Paper Title: Daylighting Rule of Thumb for Room with Glazing Transmittance Variation
Abstract: Since antiquity, architects have been using simple guides or easy to use calculation methods called
rules of thumb for predicting daylighting performance inside buildings. These rules of thumb in daylighting
continue to develop as new knowledge in science and technology evolves. In architectural practice, daylighting
rules of thumb have often been expressed in terms of the percentages of window area to floor area. Such rules can
be found in architectural literatures as well as in building regulations in various countries. The percentages of
window glazing area to floor area suggested in the literatures and building codes often range from 10% to 35%
depending on the specified visual tasks and the illumination characteristics desired. One of the most frequently
cited daylighting rules of thumb is for 20% glazing to floor area allocated for habitable room or space. These rules
of thumb are usually based on the standard clear glass with transmittance value of approximately 0.8 to 0.9.
However, many recent buildings in tropical countries have glazing transmittance lower than this value for glare
control and privacy purpose. In order to address this issue, daylighting simulations were conducted using AGi-32 to
determine the effects of different glazing transmittances on indoor daylight performances and to modify existing
rule of thumb. Based on the simulation data and analysis, a well-known daylighting rule of thumb by Littlefair is
modified to cater for multiple glazing transmittances. This new rule of thumb presents an easy to use calculation to
estimate daylight factor for interior based on glazing transmittance value.
Paper Title: Design of Optimal Acceptance Sampling Plan for Network Intrusion Detection
Abstract: Network Intrusion Detection Systems (NIDS) protects networks connected to the internet from
malicious attacks by monitoring network flows predominantly at fragment level in network layer. Inspecting every
fragment of a network flow is computationally prohibitive. The Acceptance Sampling for Network Intrusion
Detection (ASNID) method avoids hundred percent inspections of fragments to detect anomalous flows. This study
proposes a model to determine optimal acceptance sample size. Further, this study also proposes a model for
estimating the cost of computational effort.
Keyword : Acceptance Sampling, Expected Total Cost, Expected Computational Effort, Geometric
Mean Accuracy Index, Network Intrusion Detection.
References:
1. Georgios Androulidakis, Vassilis Chatzigiannakis, Symeon Papavassiliou, “Network Anomaly Detection and Classification via
Opportunistic Sampling”, IEEE Networks, Vol 23, No.9, 2009, pp 6-12.
2. C.MadhusudhanaRao, Dr M.M.Naidu, “Acceptance Sampling for Network Intrusion Detection” Journal of Theoretical and Applied
Information Technology Vol 95, No24, pp 6707-6718, December 2017.
3. Eleazar Eskin, “Anomaly Detection over Noisy data using learned probability distributions” in Proc. 7th International Conference on
Machine Learning. Morgan Kaufmann, 2000, pp. 255–262.
4. M L Shyu, S C Chen, K Sarinna pakorn, and L Chang, “A novel anomaly detection scheme based on principal component classifier,”
IEEE Foundations and New Directions of Data Mining Workshop, pp. 172–179, Nov. 2003.
5. C Manikopoulos, S Papavassiliou, “Network Intrusion and Fault Detection: A Statistical Anomaly Approach,” IEEE Commun. Mag., vol.
40, no. 10, pp. 76–82, October 2002.
6. K. Wang and S. J. Stolfo, “Anomalous Payload-Based Network Intrusion Detection,” in Proceedings of Recent Advances in Intrusion
Detection. Springer, 2004, pp. 203–222.
7. X Song, M Wu, C Jermaine, and S Ranka, “Conditional Anomaly Detection,” IEEE Transactions on Knowledge and Data Eng., vol. 19,
pp. 631–645, 2007.
762. 8. W Lu and A A Ghorbani, “Network Anomaly Detection Based on Wavelet Analysis,” EURASIP Journal on Advances in Signal
Processing, vol. 2009, no. 837601, January 2009. 4379-
9. Sandya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson Thomas, “ Modeling Intrusion Detection System using Hybrid Intelligent 4383
Systems” Journal of Network and Computer Applications, Vol 30, No.1, 2007, pp 114-132.
10. 10. Srinivas Mukkamala, Andrew H. Sung “Feature Selection for Intrusion Detection using Neural Networks and Support Vector
Machines” Journal of transportation research board, Vol 1822, 2003,pp1822-5.
11. Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas, “Feature deduction and ensemble design of intrusion detection systems” Journal of
Computers & Security, Vol 24, 2005,pp 295-307.
12. Taeshik Shon, Yongdue Kim, Cheolwon Lee, Jon sub Moon, “A Machine Learning Framework for Network Anomaly Detection using
SVM and GA” Proceedings of the IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point,
NY,June,15-19, 2005,pp 176-183.
13. 13.Surat Srinoy, Werasak Kurutach, Witcha Chimphlee, Siriporn Chimphlee, Santi Sounsri, “Computer Intrusion Detection with
Clustering and Anomaly Detection Using ICA and Rough, Fuzzy” Proceedings of the 4th WSEAS Int. Conference on Information Security,
Communications and Computers, Tenerife, Spain, December, 16-18, 2005, pp 252-257.
14. 14. M. Roesch, “Snort-Lightweight Intrusion Detection for Networks,” Proc. 13th USENIX Conference on System Administration, Seattle,
Washington, November, 7-12, 1999, pp 229–238.
15. 15. S Jiang, X Song, H Wang, J J Han, Q H. Li, “A Clustering Based Method for Unsupervised Intrusion Detections,” Pattern Recognition
Letters, Vol. 27, no. 7, 2006, pp. 802–810.
16. 16. Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani,“K-Means+ID3: A Novel Method for Supervised Anomaly Detection by
Cascading K-Means Clustering and ID3 Decision Tree Learning Methods”, IEEE Transactions on knowledge and data Engineering ,
Vol.19,No.3, 2007, pp 1-10.
17. 17. Amuthan Prabakar Muniyandi, R. Rajeswari, R. Rajaram “Network Anomaly Detection by Cascading K-Means Clustering and
C4.5 Decision Tree algorithm” Procedia Engineering, Vol.30, 2012, pp 174 – 182.
18. 18. Z. Muda, W. Yassin, M. N. Sulaiman, and N. I. Udzir, “A K-means and naive bayes learning approach for better intrusion
detection,” Information Technology Journal., Vol. 10, No. 3, 2011, pp 648–655.
19. 19. P Barford, j Kline, D. Plonka, and A. Ron “A Signal Analysis of Network Traffic Anomalies”, In Proc. ACM SIGCOMM IMW’02,
pages 71–82, Marseille, France, Nov. 2002.
20. 20. N Duffield “Sampling for Passive Internet Measurement: A Review”. Statistical Science, Vol. 19, No.3, pp 472–498, 2004.
21. 21. J Mai, A Sridharan, C N Chuah, T Ye, and H Zang “Impact of Packet Sampling on Port scan Detection” Technical Report RR06-ATL-
043166, Sprint ATL, 2006.
22. 22. C. Madhusudhanarao, M. M. Naidu , “A Model for Generating Synthetic Network flows and Accuracy Index for Evaluation of
Anomaly Network Intrusion Detection Systems”, Indian Journal of Science and Technology, Vol 10 No.14, pp 1-16, 2017.
Authors: Babita Panda, Arjyadhara Pradhan, Bhagabat Panda, Nivedita pati, Chitralekha Jena
Paper Title: Detection of Malware attacks in smart phones using Machine Learning
765. Abstract: In recent years, security has become progressively vital in mobile devices. The biggest security
problems in android devices are malware attack which has been exposed to different threats. The volume of new
4396-
applications by the production of mobile devices and their related app-stores is too big to manually examine the
4400
each and every application for malicious behavior. Installing applications which may leads to security
vulnerabilities on the smart phones request access to sensitive information. There are various malwares can attack
android device namely virus, worms, Botnet, Trojans, Backdoor and Root kits due to these attacks the users is
compromised by privacy. Root kits and viruses in mobile phone and IoT devices improve along with smart device
versions are very difficult to detect or to the least costly. There are 3 places where the trace of these root kits / virus
is visible namely CPU, Baseband and Memory. In the new approach we will use machine learning to detect
“anomaly” usage pattern and a remote (master server) will analyze and verify the presence of such threats. This
research work aims to develop a pipeline to investigate if any application present in a smart device is a malware or
not. This pipeline uses HMM algorithm to read anomaly in application behavior, deep learning with Deep Belief
Networks (DBN) to classify application events, and bootstrapping algorithm using random forest to categorize the
application itself after malware or benign.
Keyword : Malware attacks, mobile phone, android device, Hidden Markov Model (HMM), Deep
Belief Network (DBN), Random Forest (RF), Machine Learning (ML)
References:
1. Emarketer. (2014) 2 billion consumers worldwide to get smart (phones) by 2016. [Online]. Available:
http://www.emarketer.com/Article/2- Billion-Consumers-Worldwide-Smartphones-by-2016/1011694
2. M. Senthil Kumar et. al, Experimental investigations on mechanical and microstructural properties of Al 2O3/SiC reinforced hybrid metal
matrix composite, IOP Conference Series: Materials Science and Engineering, Volume 402, Number 1, PP 012123.
(https://doi.org/10.1088/1757-899X/402/1/012123)
3. Android. (2015) Android, the world’s most popular mobile platform. [Online]. Available: http://developer.android.com/about/index.html
4. M. Fan, J. Liu, X. Luo et al., “Android malware familial classification and representative sample selection via frequent subg raph
analysis,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1890–1905, 2018.
5. Z. Lin, X. Fei, S. Yi, Y. Ma, C.-C. Xing, and J. Huang, “A secure encryption-based malware detection system,” KSII Transactions on
Internet and Information Systems, vol.12, no.4, pp. 1799–1818, 2018.
6. Fei Xiao, Zhaowen Lin ,Yi Sun and Yan Ma, “Malware Detection Based on Deep Learning of Behavior Graphs”, Mathematical
Problems in Engineering, Volume 2019, Article ID 8195395, 10 pages, https://doi.org/10.1155/2019/8195395.
7. Kumar, M. Senthil, et al. "Processing and characterization of AA2024/Al 2O3/SiC reinforces hybrid composites using squeeze casting
technique." Iran. J. Mater. Sci. Eng 16.2 (2019): 55-67.
8. Surendar Madhawaa, P. Balakrishnanb and Umamakeswari Arumugama, “Employing invariants for anomaly detection in software defined
networking based industrial internet of things”, Journal of Intelligent & Fuzzy Systems xx (20xx) x–xx DOI: 10.3233/JIFS-169670, 2018.
9. S.Yogeshwaran, R.Prabhu, Natrayan.L, Mechanical Properties of Leaf Ashes Reinforced Aluminum Alloy Metal Matrix Composites,
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 13, 2015.
10. Tianliang Lu and Su Hou, “A Two-Layered Malware Detection Model Based on Permission for Android”, 2018, IEEE International
Conference on Computer and Communication Engineering Technology (CCET).
11. L.Natrayan et al. Optimization of squeeze cast process parameters on mechanical properties of Al 2O3/SiC reinforced hybrid metal matrix
composites using taguchi technique. Mater. Res. Express; 5: 066516. (DOI: 10.1088/2053-1591/aac873,2018).
12. Liu Min, Lang Rongling, Cao Yongbin. “Number of trees in random forest”, [J]. Computer Engineering and Applications. 2015,
51(5):126- 131.
13. Arash Habibi Lashkari, Andi Fitriah A. Kadir, Hugo Gonzalez, Kenneth Fon Mbahand Ali A. Ghorbani, “Towards a Network-Based
Framework for Android Malware Detection and Characterization”, 2017, 15th Annual Conference on Privacy, Security and Trust.
14. L.Natrayan , P. Sakthi shunmuga sundaram, J. Elumalai. Analyzing the Uterine physiological With MMG Signals using SVM,
International journal of Pharmaceutical research, 2019, 11(2); 165-170.
15. Natrayan, L., M. Senthil Kumar, and Mukesh Chaudhari. "Optimization of Squeeze Casting Process Parameters to Investigate the
Mechanical Properties of AA6061/Al2O3/SiC Hybrid Metal Matrix Composites by Taguchi and Anova Approach." Advanced Engineering
Optimization Through Intelligent Techniques. Springer, Singapore, 2020. 393-406.
16. Sundaram, P. Sakthi Shunmuga, N. Hari Basker, and L. Natrayan. "Smart Clothes with Bio-Sensors for ECG Monitoring." International
Journal of Innovative Technology and Exploring Engineering 8.4 (2019): 298-301.
17. Martinelli F, Mercaldo F, Saracino A. BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware[C]//Proceedings of the
2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017: 899-901.
18. L. Natrayan and M. Senthil Kumar. Study on Squeeze Casting of Aluminum Matrix Composites-A Review. Advanced Manufacturing and
Materials Science. Springer, Cham, 2018. 75-83. (https://doi.org/10.1007/978-3-319-76276-0_8.)
19. Balaji Baskaran and Anca Ralescu, “A Study of Android Malware Detection Techniques and Machine Learning”, MAICS 2016.
20. Kateryna Chumachenko, “Machine Learning Methods for Malware Detection And Classification”, 2017.
21. Jemili Farah, Zaghdoud M., and Ben Ahmed M.A framework for an adaptive intrusion detection system using Bayesian network.
Intelligence and Security Informatics, IEEE, 2007.
22. Singh Satnam, Donat William, Pattipati Krishna, and Willet Peter. Anomaly detection via feature-aided tracking and hidden markov
model. Aerospace Conference, IEEE, pages 1–18, March 2007.
Paper Title: Lithium Ion Battery Performance for Different Size of Electrode Particles and Porosity
Abstract: Nowadays, the interest of high proficiency of Lithium ion batteries is increasing as they provide
high volumetric energy densities and to meet the demand of exponentially growth of electronic devices.
Furthermore, LIB has shown their potential to offer high performance rechargeable battery in the research of
electric vehicles. Electrochemical process of Lithium ion batteries encompasses a complex ion transport between
the anode and cathode within an electrolyte. The multiscale LIB model consists of charge transport within electrode
766. particle and in electrolyte and the reaction rate at the electrolyte-electrode particle interface which directly relating
the geometry of microstructure (the size of particles, about 1nm) to the behaviour in macroscopic model (within the
4401-
thickness of electrode, about 1 µm). Thus, the geometry of cell and the interfacial behaviour are significantly
4405
control the rate of reaction rate. This study concerns about the effect of geometry variations of cell upon the
discharge curve of LiFePO4 cathode material. The electrochemical model is solved using Method of Lines
technique by discretising the spatial variable using Finite Difference Method. The simulation result is verified with
experimental data of LiFePO4 cell by Yu et. al. [14]. The effect of different sizes of particles and volume fractions
upon the cell performance are examined. It has been shown that decreasing the size of electrode particles produce
high cell potential but slightly low capacity. On the other hand, the optimal volume fraction is shown to be
ε_ν=0.4763 provided that all the particles are spherical and of the same size. Smaller volume fractions resulted in
low capacity.
Keyword : Many of these materials are already in use, like silica fume, fly ash etc.
767.
References: 4406-
1. Elango A and Ashok Kumar A “ Study on Partial Replacement of plastic waste as fine aggregate in concrete” International Journal
of Current Engineering And Scientific Research, Volume 5, Issue 5, 2018, ISSN (Print):2393-8374, ISSN (Online): 2394-0697
4412
2. LhakpaWangmoThinghTamang, TsheringWangmo, Karma TsheringDarjay, Karma SangayPhuntsho, PhuntshoNamgyal,
UgyenWangchuk “Use of Plastics in Concrete as Coarse Aggregate” International Journal of Education and Applied Research,
Volume 7, Issue 5, 2017, ISSN (Print) 2249-4944, ISSN(Online) 2348-0033.
3. Amula.R.G, Azeef Ashraf, Muhammad Hussain, Rejith.K.U, Vijitha.V. “ use of waste plastic as aggregates in Concrete”
International Journal of Scientific & Engineering Research. Volume 7, Issue 4, 2016, ISSN 2229-5518
4. S. Vanitha, V. Natrajan and M Praba“ utilization of waste plastic as a partial replacement of coarse aggregates in concrete Bloc ks”
Indian Journal of Science and Technology, Volume 8, Issue 12, 2015, ISSN (Print) 0974-6846, ISSN (Online) 0974-5645
5. Daniel Yaw Osei, “ Experimental investigation on recycled plastics as aggregate in concrete”, International Journal of Structural and
Civil Engineering Research, Volume 3, Issue 2, 2014, ISSN 2319-6009
6. T. Subramani and V K Pugal, “ Experimental study on Plastic waste as a coarse aggregate for structural concrete”, International
Journal of Application or Innovation in Engineering & Management, Volume 4, Issue 5, 2015, ISSN 2319-4847
7. RaghatateAtul M., “ Use of plastic in concrete to improve its properties”, International Journal of Advanced Engineering Research
and Studies, Volume 1, Issue 3, 2012, ISSN 2249-8947
8. Praveen Mathew, ShibiVarghase, Thomas Paul ,EldhoVarghase, “ Recycled Plastic as coarse aggregates for structural concrete”,
International Journal for Innovative Research in Science, Engineering and Technology, Volume 2, Issue 3, 2013, ISSN 2319-8753
9. B Jaivignesh and A Sofi, “ Study on mechanical properties of concrete using Plastic Waste as an Aggregate”, IOP Conference Se ries:
Earth and Environmental Science, 2016
10. NabajyotiSaikia , Jorge de Brito, “ Use of plastic waste as aggregate in Cement mortar and concrete: A Review”, ELSEVIER,
Construction and Building Material, 2012
11. Manhal A Jibreal and Farah Peter, “ Strength and Behavior of concrete contains waste plastic”, Journal of Ecosystem and Ecography,
Volume 6, Issue 2, 2016, ISSN 2157-7625
12. MB Hossain, P Bhowmik, KM Shaad, “ Use of waste plastic aggregates in concrete as a constitutional material” Progressive
Aggriculture Journal, 2016, ISSN 1017-8139
13. Baboo Rai, TabionRushad, Bhavesh Kr, S K Duggal, “ Study of Waste Plastic Mix Concrete with Plastic”, International Scholarity
Research Network, ISRN Civl Engineering, Volume 2012, Article ID 469272
14. IS 10262:2009,” Concrete mix proportioning- guidelines”, Buereau of Indian Standards
15. IS 383:1970,” Specifications for coarse and fine aggregates from natural resources”, Buereau of Indian Standards
16. IS 456:2000, “ Code of practice for plain and reinforced concrete”, Buereau of Indian Standards.
Paper Title: Integrating Wind Electrical Energy for the Marine Electrical Power System
Abstract: Utilization of renewable energy for the reduction of fuel consumption and green house gas (GHG)
emissions in the shipping industry has been increased rapidly in the recent years. Wind energy is a clean renewable
energy with no pollution which is abundantly available at sea. This paper proposes two different possible
configurations of connecting wind power energy into the ship’s main grid bus system . Wind electrical energy
output has been connected to ship’s main ac bus system in one configuration and it is connected to ship’s main dc
bus system. Even though Wind assisted ship propulsion (WASP) had been started already in the last decades in the
form of wing sails, kites, Flettener rotor etc which could assist auxiliary propulsion of the ships, the application of
wind power generator on the ship is not often applied. Therefore this paper has a relevant significance in applying
wind electrical energy for the marine electrical power system needs. This paper also reveals the benefits and
challenges in the area of onboard wind generation and opens future research possibilities in integrating wind energy
into marine industry.
Keyword : Wind energy conversion system (WECS), Horizontal axis wind turbine (HAWT), Vertical axis
wind turbine(VAWT), wind assisted ship propulsion (WASP).
768.
References: 4413-
1. Could Wind Power Return to Commercial Shipping? – gCaptain https://gcaptain.com/wind-power-return-commercial-shipping/
2. Y. Li, H. Wan and X. Meng, "Research on Wind Power Generation Application on the Ships and Offshore Structures," 2009 Asia-Pacific
4418
Power and Energy Engineering Conference, Wuhan, 2009, pp. 1-3.doi: 10.1109/APPEEC.2009.4918724
3. Zhou Heliang, “Wind power industry development prospect and strategy in China”, ShangHai Electric Power Transaction, 2007, pp1-4.
4. D A Banjarnahor 2017 IOP Conf. Series: Earth and Environmental Science 75 (2017) 012007 doi :10.1088/1755-1315/75/1/012007
5. H.M. Bayzid Belal, Moin Uddin and Tajbia Karim “Design and implementation of an eco-friendly water vehicle” In International
Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), 2019. 10.1109/ICREST.2019.8644441
6. E. Bøckmann, S. Steen, "Wind turbine propulsion of ships," In Second International Symposium On Marine Propulsors, Hamburg,
Germany, 2011.
7. Ionescu, Dora & Vlase, Sorin & Ivanoiu, Mircea. (2014). Innovative solutions for small scale vertical axis wind turbines used in harbours
and shore areas. JIDEG. JIDEG. 83-86.
8. Barrass, B. & Derrett, D.R.. (2006). Ship stability for masters and mates. 10.1016/C2010-0-68323-4.
9. https://www.emarineinc.Com/securing-Your-Boat-Wind-Generator-In-Severe-Weather.
10. Kukner, Abdi & Bulut, Sertaç & Halilbese, Akilenese. (2016). “Renewable energy options and an assessment of wind -based propulsion
systems for small crafts.
11. Sorensen, Poul & Cutululis, Nicolaos & Lund, Torsten & Anca, Daniela & Soerensen, Troels & Hjerrild, Jesper & Donovan, Martin &
Christensen, Leif & Nielsen, Henny. (2007). “ Power Quality Issues on Wind Power Installations in Denmark”. 2007 IEEE Power
Engineering Society General Meeting, PES. Pp(1 – 6) 10.1109/PES.2007.385924
12. S.W. Mohod And M.V. Aware, “Power quality and grid code issues In Wind Energy Conversion System,” M. Aware And D. Lu, Eds.
Rijeka: Intech Open, 2013.
13. A.F. Zobaa And S.H.A. Aleem, Power quality in future electrical power systems. IET Digital Library, Uk,2017
Keyword : Gesture recognition; Robot; Motor driver; Bluetooth Module; Mobile Application; NODEMCU;
IoT
References:
1. Quazi, M. R., Wani, M., Kinkar, G., Nagrare, A., & Sheikh, S. (2018, January). Hand Gesture Based Robot Control. In National
Conference on Advances in Engineering and Applied Science (NCAEAS).
2. Mukherjee, S., Dhar, M., & Ghosh, A. (2018). Accelerometer Based Wireless Gesture Controlled Robot for Medical Assistance using
Arduino Lilypad.
3. Bajoria, A., Bhatnagar, S., Bhide, J., Birla, S., & Singh, A. (2018). A QUALITATIVE ANALYSIS OFWIRELESS ROBOTIC
ARMS. International Journal of Advanced Research in Computer Science, 9(2), 262.
4. Aswinbalaji, R., & Arunraja, A. (2015). Wireless Voice Controlled Robotics Arm. International Journal of Emerging Technology in
Computer Science & Electronics, 12(4), 33-38.
5. Eric Ravenscraft, “BUILD A KICKASS ROBOT ARM: THE PERFECT ARDUINO PROJECT FOR BEGINNERS”, URL:
https://lifehacker.com/build-a-kickass-robot-arm-the-perfect-arduino-project-1700643747,
visited 4th April 2015.
6. Varalakshmi, B. D., Pachauri, A., Thriveni, J., Venugopal, K. R., & Patnaik, L. M. (2014). Mems Sensors Controlled Haptic Forefinger
Robotic Aid. International Journal of Advanced Research in Engineering & Technology (IJARET), 5(10), 45-54.
7. Hussain, S. B., & Kanwal, F. (2016, August). Design of a 3 DoF robotic arm. In 2016 Sixth International Conference on Innovative
Computing Technology (INTECH) (pp. 145-149). IEEE.
8. A. N. Reganti, S. Ananthapalli, B. C. V. Mohan, R. Mounica and V. K. Mittal, "Mobile Quad-Controlled Wireless Robotic Arm,” Delhi,
2016,2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), pp. 1-5.
9. Shiratori, T., & Hodgins, J. K. (2008, December). Accelerometer-based user interfaces for the control of a physically simulated character.
In ACM Transactions on Graphics (TOG) (Vol. 27, No. 5, p. 123). ACM.
10. Mishra, S., Tamboli, S. M., Yamgar, M. M., & Prakash, R. (2017, March). Smart device based gesture controller for industrial
applications. In 2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2) (pp. 463-467). IEEE.
Keyword : Interval valued trapezoidal intuitionistic fuzzy set, Multi criteria group decision making (MCGDM),
unknown criteria weights, Interval Valued Intuitionistic Trapezoidal Fuzzy Einstein Weighted Arithmetic
Averaging Operator (IVITFEWAA)
References:
1. T Y Chen., “Multiple criteria group decision-making with generalized interval-valued fuzzy numbers on signed distances and incomplete
weights”, Applied Mathematical Modelling, Vol. 36, No.7, 2012, pp. 3029-3052.
2. P Liu. and F Jin., “A multi-attribute group decision-making method based on weighted geometric aggregation operators of interval-
valued trapezoidal fuzzy numbers”, Applied Mathematics Modelling, Vol. 36, Issue 6,2012, pp: 2498-2509.
3. C Tan and X Chen, “Interval-Valued Intuitionistic Fuzzy Multicriteria Group Decision Making Based on VIKOR and Choquet Integral”,
Journal of Applied Mathematics, Vol. 2013, ID. 656879. http://dx.doi.org/10.1155/2013/656879
4. X-H Chen., Yang Li., Wang P., and Yue Wei., “A fuzzy multicriteria group Decision-making with new entropy of interval-valued
770. intuitionistic fuzzy sets”, Journal of Applied Mathematics, Article ID: 827268 , 2013.
5. Z Jiang and Y Wang, “Multiple group decision making with unknown decision expert weights information in the framework of Interval
intuitionistic trapezoidal fuzzy numbers”, Mathematica problems in Engineering, Article ID. 635476, 4424-
2014. http://dx.doi.org/10.1155/2014/635476 4429
6. J Wu and Y Liu, “An approach for multiple attribute group decision making problems with interval valued intuitionistic trapezoidal fuzzy
numbers”, Computers & Industrial Engineering, Vol. 66, 2013, pp. 311- 324.
7. Z S Xu, “An overview of methods for determining OWA weights”, International Journal of Intelligent Systems, Vol.20, 2005, pp.843-
865.
8. G Deschrijver and E Kerre, “A generalization of operators on intuitionistic fuzzy sets using triangular norms and conforms”, Notes on
Intuitionistic Fuzzy sets, Vol.8, No.1, 2002, pp.19-27.
9. E Klement, R Mesiar and E Pap, “Triangular norms”, Kluwer Academic Publishers, Dordrecht, 2000.
10. E P Klement, R Meisar and E Pap, “Triangular norms, Position paper I: basic analytical and algebraic properties”. Fuzzy Sets and
Systems, Vol. 143, No.1, 2004 , pp.5-26.
11. W Wang and X Liu, “Intuitionistic fuzzy geometric aggregation operators based on Einstein operations”. International Journal of
Intelligent Systems, Vol. 26, 2011, pp.1049-1075.
12. W Wang and X Liu, “Intuitionistic fuzzy information aggregation using Einstein operations”, IEEE Transactions on Fuzzy Systems,Vol.
20, 2012, pp.923-938.
13. W Wang and X Liu, “Interval-valued intuitionistic fuzzy hybrid weighted averaging operator based on Einstein operation and its
application to decision making”, Journal of Intelligent Fuzzy Systems, Vol.25, 2013, pp.279-290.
14. K Atanasov, “Intuitonistic fuzzy sets”, Fuzzy sets and Systems, 20, 1986, pp.87-96.
15. K Atanassov and G Gargov, “Interval-valued intuitionistic fuzzy sets”, Fuzzy Sets and Systems, 31,1989, pp.343-349.
16. Z.S Xu and J Chen, “An approach to group decision making based on intuitionistic judgment matrices”, System Engineer-Theory and
Practice, 27, 2007, pp.126-133.
17. S P Wan, “Multi-attribute decision making method based on interval-valued intuitionistic trapezoidal fuzzy number”, Control and
Decision, 26(6), 2011, pp.857-860.
18. V Sireesha and K Himabindu, “An ELECTRE approach for multicriteria interval-valued intuitionistic trapezoidal fuzzy group decision
making problems”, Advances in fuzzy systems, Vol. 2016, Article ID. 1956303, http://dx.doi.org/10.1155/2016/1956303
19. Michael Greenacre , Raul Primicerio “Multivariate Analysis of Ecological Data”,ISBN:978- 84-92937-50-9, published by Fundacion
BBVA, 2013.
20. J Wu and Y Liu, “An approach for multiple attribute group decision making problem with interval valued intuitionistic trapezoidal fuzzy
numbers”, Computers & Industrial Engineering, 66, pp.311-324, 2013.
Keyword : Disruption tolerant systems, Router, IP Address, Delay time, Network Central Locations.
References:
1. A. Balasubramanian, B. Levine, and A. Venkataramani, “DTN Routing as a Resource Allocation Problem,” ACM SIGCOMM Computer
Communication Review Volume 37 Issue 4, October 2007, Pages 373-384
2. C. Boldrini, M. Conti, and A. Passarella, “ContentPlace: Social-Aware Data Dissemination in Opportunistic Networks,” Proc. 11 thInt’l 4430-
Symp. Modeling, Analysis and Simulation of Wireless and MobileSystems (MSWiM), pp. 203-210, 2008. 4434
3. L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “WebCaching and Zipf-Like Distributions: Evidence and Implications.”Proc. IEEE
INFOCOM, vol. 1, 1999.
4. J. Burgess, B. Gallagher, D. Jensen, and B. Levine, “MaxProp:Routing for Vehicle-Based Disruption-Tolerant Networks,” Proc.IEEE
INFOCOM, 2006.
5. Wei Gao, Guohong Cao, Arun Iyengar, and Mudhakar Srivatsa, “Cooperative Caching for Efficient Data Access in Disruption Tolerant
Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014.
6. A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of Human Mobility on Opportunistic Forwardin g
Algorithms. IEEE Trans. on Mobile Computing, 6(6):606–620, 2007.
7. K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. Proc. SIGCOMM, pages 27–34, 2003.
8. M. J. Pitkanen and J. Ott. Redundancy and distributed caching in mobile dtns. In Proceedings of 2nd ACM/IEEE Workshop on Mobility in
the Evolving Internet Architecture (MobiArch). ACM, 2007.
9. I. Psaras, L. Wood, and R. Tafazolli. Delay-/ disruption-tolerant networking: State of the art and future challenges. University of Surrey,
Technical Report, 2010.
10. J. Reich and A. Chaintreau. The Age of Impatience: Optimal Replication Schemes for Opportunistic Networks. In Proceedings of ACM
CoNEXT, pages 85–96, 2009.
Authors: Aliyu Usman, Nurain Izzaty, Rizwan Ibrahim, Muslich Hartadi Sutanto, Sri Sunarjono
Keyword : Natural rubber latex, modified bitumen, Atomic Force Microscopy, Temperature susceptibility,
772. storage stability
References: 4435-
1. Bala, N. and I. Kamaruddin, Physical and storage stability properties of linear low density polyethylene at optimum content, in Engineering 4440
Challenges for Sustainable Future. 2016. ROUTLEDGE in association with GSE Research. p. 395-399.
2. Yao, H., et al., Rheological properties and chemical bonding of asphalt modified with nanosilica. Journal of Materials in Civil Engineering,
2012. 25(11): p. 1619-1630.
3. Petersen, J.C., Chemical composition of asphalt as related to asphalt durability, in Developments in petroleum science. 2000, Elsevier. p.
363-399.
4. Sengoz, B. and G. Isikyakar, Evaluation of the properties and microstructure of SBS and EVA polymer modified bitumen. Construction and
Building Materials, 2008. 22(9): p. 1897-1905.
5. Bala, N., et al., Rheological properties investigation of bitumen modified with nanosilica and polyethylene polymer. International Journal
of Advanced and Applied Sciences, 2017. 4(10): p. 165-174.
6. Airey, G.D., Rheological properties of styrene butadiene styrene polymer modified road bitumens ☆ . Fuel, 2003. 82(14): p. 1709-1719.
7. Fini, E.H., et al., Chemical characterization of biobinder from swine manure: Sustainable modifier for asphalt binder. Journal of Materials
in Civil Engineering, 2011. 23(11): p. 1506-1513.
8. You, Z., et al., Evaluation of low-temperature binder properties of warm-mix asphalt, extracted and recovered RAP and RAS, and
bioasphalt. Journal of materials in Civil Engineering, 2011. 23(11): p. 1569-1574.
9. Peralta, J., et al., Bio-renewable asphalt modifiers and asphalt substitutes, in Sustainable bioenergy and bioproducts. 2012, Springer. p.
89-115.
10. Sani, A., et al., Engineering and microscopic characteristics of natural rubber latex modified binders incorporating silane additive.
International Journal of Pavement Engineering, 2019: p. 1-10.
11. Shafii, M., J. Ahmad, and E. Shaffie, Physical properties of asphalt emulsion modified with natural rubber latex. World Journal of
Engineering, 2013. 10(2): p. 159-164.
12. Al-Mansob, R.A., et al., Physical and rheological properties of epoxidized natural rubber modified bitumens. Construction and Building
Materials, 2014. 63: p. 242-248.
13. Shafabakhsh, G., M. Faramarzi, and M. Sadeghnejad, Use of Surface Free Energy method to evaluate the moisture susceptibility of sulfur
extended asphalts modified with antistripping agents. Construction and Building Materials, 2015. 98: p. 456-464.
14. Wen, Y., et al., The use of natural rubber latex as a renewable and sustainable modifier of asphalt binder. International Journal of
Pavement Engineering, 2017. 18(6): p. 547-559.
15. Ziari, H., M. Naghavi, and R. Imaninasab, Performance evaluation of rubberised asphalt mixes containing WMA additives. International
Journal of Pavement Engineering, 2018. 19(7): p. 623-629.
16. Shaffie, E., et al., Stripping performance and volumetric properties evaluation of hot mix asphalt (HMA) mix design using natural rubber
latex polymer modified binder (NRMB), in InCIEC 2014. 2015, Springer. p. 873-884.
17. Zhu, J., B. Birgisson, and N. Kringos, Polymer modification of bitumen: Advances and challenges. European Polymer Journal, 2014. 54: p.
18-38.
18. Al-Sabaeei, A., et al., A Review of using natural rubber in the modification of bitumen and asphalt mixtures used for road construction.
Jurnal Teknologi, 2019. 81(6).
19. Swetha, D.V. and K.D. Rani, Effect of Natural Rubber on The Properties of Bitumen and Bituminous Mixes. International Journal of Civil
Engineering and Technology, 2014. 5(10): p. 09-21.
20. Tantatherdtam, R., Reinforcement of natural rubber latex by nanosize montmorillonite clay. 2003.
21. Ismail, H. and M.N. Salmah, Dynamic vulcanization of rubberwood-filled polypropylene/natural rubber blends. Polymer testing, 2001.
20(7): p. 819-823.
22. Azahar, N., et al., An overview on natural rubber application for asphalt modification. Int. J. Agric. For. Plant, 2016. 2: p. 212-218.
23. Ouyang, C., et al., Improving the aging resistance of styrene–butadiene–styrene tri-block copolymer modified asphalt by addition of
antioxidants. Polymer degradation and stability, 2006. 91(4): p. 795-804.
24. Read, J., D. Whiteoak, and R.N. Hunter, The shell bitumen handbook. 2003: Thomas Telford.
25. Yusoff, N.I.M., et al., The effects of moisture susceptibility and ageing conditions on nano-silica/polymer-modified asphalt mixtures.
Construction and Building Materials, 2014. 72: p. 139-147.
26. Arshad, A.K., et al., Microstructure of nanosilica modified binder by atomic force microscopy. Jurnal Teknologi, 2016. 78(7-3).
Keyword : Artifacts, Adaptive noise cancellers, Convergence, EEG, Health care monitoring .
References:
1. F. C. Morabito et al., “Enhanced compressibility of EEG signal in Alzheimer’s disease patients,” IEEE Sensors J., vol. 13, no. 9, pp.
3255–3262, Sep. 2013.
2. S. Gao, Y. Wang, X. Gao, and B. Hong, “Visual and auditory brain– computer interfaces,” IEEE Trans. Biomed. Eng., vol. 61, no. 5, pp.
1436–1447, May 2014.
3. T. Zarghami, H. S. Mir, and H. Al-Nashash, “Transfer-function-based calibration of sparse EEG systems for brain source localization,”
IEEE Sensors J., vol. 15, no. 3, pp. 1504–1514, Mar. 2015.
4. N. Ille, P. Berg, and M. Scherg, “Artifact correction of the ongoing EEG using spatial filters based on artifact and brain signal
topographies,” J. Clin. Neurophysiol., vol. 19, no. 2, pp. 113–124, 2002.
5. E. Urrestarazu, J. Iriarte, M. Alegre, M. Valencia, C. Viteri, and J. Artieda, “Independent component analysis removing artifacts in ictal
recordings,” Epilepsia, vol. 45, no. 9, pp. 1071–1078, 2004.
6. B. W. McMenamin, A. J. Shackman, L. L. Greischar, and R. J. Davidson, “Electromyogenic artifacts and electroencephalographic
inferences revisited,” NeuroImage, vol. 54, no. 1, pp. 4–9, 2011.
7. A. Nijholt and D. Tan, “Brain-computer interfacing for intelligent systems,” IEEE Intell. Syst., vol. 23, no. 3, pp. 72–79, May 2008.
8. B. J. Lance, S. E. Kerick, A. J. Ries, K. S. Oie, and K. McDowell, “Brain computer interface technologies in the coming decades,” Proc.
IEEE, vol. 100, no. 13, pp. 1585–1599, May 2012.
9. J. B. F. Van Erp, F. Lotte, and M. Tangermann, “Brain computer interfaces: Beyond medical applications,” Computer, vol. 45, no. 4, pp.
26–34, Apr. 2012.
10. G. Schalk and E. C. Leuthardt, “Brain-computer interfaces using electrocorticographic signals,” IEEE Rev. Biomed. Eng., vol. 4, pp. 140–
154, Oct. 2011.
11. Y. Lingling, H. Leung, M. Plank, J. Snider, and H. Poizner, “EEG Activity During Movement Planning Encodes Upcoming Peak Speed
and Acceleration and Improves the Accuracy in Predicting Hand Kinematics,” IEEE Journal of Biomedical and Health Informatics, vol.
19, no. 1, pp. 22-28, 2015.
12. K. T. Sweeney, H. Ayaz, T. E. Ward, M. Izzetoglu, S. F. McLoone, and B. Onaral, “A methodology for validating artifact remova l
techniques for physiological signals,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 5, pp. 918–926, Sep. 2012.
13. F. Morbidi, A. Garulli, D. Prattichizzo, C. Rizzo, and S. Rossi, “Application of Kalman filter to remove TMS-induced artifacts from EEG
recordings,” IEEE Trans. Control Syst. Technol., vol. 16, no. 6, pp. 1360–1366, Nov. 2008.
14. P. C. Petrantonakis and L. J. Hadjileontiadis, “Emotion recognition from brain signals using hybrid adaptive filtering and higher order
crossings analysis,” IEEE Trans. Affective Comput., vol. 1, no. 2, pp. 81–97, Jul./Dec. 2010.
15. G.V.S.Karthik, S. Y. Fathima, Md. Zia Ur Rahman, Sk.RafiAhamed, A. Lay-Ekuakille, “Efficient Signal conditioning techniques for Brain
activity in Remote Health Monitoring Network”, IEEE Sensors Journal, Vol-13, No-9, pp. 3276-3283, 2013.
16. M. Z. U. Rahman, S. R. Ahamed, and D. V. R. K. Reddy, “Efficient and simplified adaptive noise cancellers for ECG sensor based remote
health monitoring,” IEEE Sensors J., vol. 12, no. 3, pp. 566–573, Mar. 2012.
17. S. Olmos and P. Laguna, “Steady-state MSE convergence analysis in LMS adaptive filters with deterministic reference inputs for
biomedical signals,” IEEE Transaction on Signal Processing, vol. 48, pp. 2229-2241, Aug. 2000.
18. M. S. E. Abadi and John H. Husoy, “Mean-square performance of the family of adaptive filters with selective partial updates”, Signal
Processing, vol. 88, pp. 2008-2018, 2008.
19. Eweda Eweda, “Analysis and Design of a Signed Regressor LMS Algorithm for Stationary and Nonstationary Adaptive Filtering with
Correlated Gaussian Data”, IEEE Transactions on Circuits and Systems, vol. 37, no. 11, pp. 1367-1374, Nov., 1990.
20. I. Soumya, Md. Zia Ur Rahman, D.V.R.K.Reddy A. Lay-Ekuakille, “Efficient Block Processing of Long duration Biotelemetric Brain data
for Health Care Monitoring”, Review of Scientific Instruments, Vol-86, pp.035003-1-10, 2015.
21. B. Farhang-Boroujeny, Adaptive Filters-Theory and Applications. Chichester, U.K.: Wiley, 1998.
22. S Jo, and S W Kim, “Consistent Normalized Least Mean Square Filtering With Noisy Data Matrix”, IEEE Transactions on Signal
Processing, vol. 53, no. 6, pp. 2112-2123, June, 2005.
23. K. K. Parhi, VLSI Digital Signal Process. Systems. New York, NY, USA: Wiley, 1999.
24. Emotiv Systems, Emotiv Brain Computer Interface Technology, San Francisco, CA, USA [Online]. Available: http://emotiv.com
25. J. Malmivuo and R. Plonsey, Bioelectromagnetism: Principles and Applications of Bioelectric and Biomagnetic Fields. Oxford, U.K.:
Oxford Univ. Press, 1995.”
776. Keyword : Emotion Analysis, Sentiment Analysis, Affect Analysis, Fine-grained, Hindi Corpus, Gujarati
Corpus, Opinion Mining 4453-
4457
References:
1. R. Plutchik, “Emotion: A psychoevolutionary synthesis: Harpercollins College Division,” 1980.
2. “Digital 2019: Global Internet Use Accelerates - We Are Social.” [Online]. Available: https://wearesocial.com/blog/2019/01/digital-
2019-global-internet-use-accelerates. [Accessed: 31-Oct-2019].
3. E. Öhman, T. Honkela, and J. Tiedemann, “The challenges of multi-dimensional sentiment analysis across languages,” in
Proceedings of the Workshop on Computational Modeling of People �s Opinions, Personality, and Emotions in Social Media
(PEOPLES), 2016, pp. 138–142.
4. W. Wolny, “Emotion analysis of Twitter data that use emoticons and emoji ideograms,” 2016.
5. H. Wang and J. A. Castanon, “Sentiment expression via emoticons on social media,” in 2015 IEEE International Conference on Big
Data (Big Data), 2015, pp. 2404–2408.
6. D. Das, S. Poria, C. M. Dasari, and S. Bandyopadhyay, “Building resources for multilingual affect analysis--a case study on hindi,
bengali and telugu,” in Workshop Programme, 2012, p. 54.
7. V. K. Jain, S. Kumar, and S. L. Fernandes, “Extraction of emotions from multilingual text using intelligent text processing a nd
computational linguistics,” J. Comput. Sci., vol. 21, pp. 316–326, 2017.
8. C. Strapparava, A. Valitutti, and others, “Wordnet affect: an affective extension of wordnet.,” in Lrec, 2004, vol. 4, no. 1083–1086,
p. 40.
9. “Hindi WordNet, IIT Mumbai.” [Online]. Available: http://www.cfilt.iitb.ac.in/∼wordnet/ wn.old/.
10. A. Esuli and F. Sebastiani, “Sentiwordnet: A publicly available lexical resource for opinion mining.,” in LREC, 2006, vol. 6, pp.
417–422.
11. P. Ekman, “An argument for basic emotions,” Cogn. Emot., vol. 6, no. 3–4, pp. 169–200, 1992.
12. “India - number of social network users 2023 | Statista.” [Online]. Available: https://www.statista.com/statistics/278407/number-of-
social-network-users-in-india/. [Accessed: 01-Aug-2019].
13. H. Schuff, J. Barnes, J. Mohme, S. Padó, and R. Klinger, “Annotation, modelling and analysis of fine-grained emotions on a stance
and sentiment detection corpus,” in Proceedings of the 8th Workshop on Computational Approaches to Subjectivity, Sentiment and
Social Media Analysis, 2017, pp. 13–23.
14. S. Goyal, N. Tiwari, and R. B. India, “EMOTION RECOGNITION: A LITERATURE SURVEY.”
15. E. Cambria, S. Poria, D. Hazarika, and K. Kwok, “SenticNet 5: Discovering conceptual primitives for sentiment analysis by mea ns of
context embeddings,” in Thirty-Second AAAI Conference on Artificial Intelligence, 2018.
Authors: Shajin Prince, Samson Immanuel J, Manoj G, Amir Anton Jone A, Bini D
Paper Title: Design of a Linear Voltage to Frequency Converter for Digital Audio Applications
Abstract: Voltage to frequency converters are used in various types of analog to digital converters in suitable
digital audio applications. One of the applications is the Audio Interface which has been considered. The Voltage to
frequency converter (VFC) thus plays a major role in the analog to digital conversion. This paper proposes a low
power VFC designed in 0.18 µm technology which in turn is used to design a low cost and a high-resolution analog
to digital converter (ADC). The analog signal is given to the V-F converter and the VFC output is given to the
frequency counter using a suitable link. This counter gives the digital output. The design is implemented in PSoC
and the performance is analysed with the previous technologies. Parameters such as sensitivity, output frequency
and power consumption are analysed. This V-F converter and ADC are used in the digital audio interface which is
used for audio applications. With the proposed VFC and ADC, the interface produced a good SNR compared to the
conventional audio interfaces.
Keyword : Hybrid composites, Stir Casting, Fuzzy Logic, Specific Wear rate, Pin on disc, Micro hardness,
Impact Strength
References:
1. Gopichand Dirisenapu, Seelam Reddy, and Lingaraju Dumpala. “The effect of B 4C and bn nanoparticles on the mechanical and
microstructural properties of al7010 hybrid metal matrix.” ,Materials Research Express, 6, 08 2019.
2. A. Baradeswaran, S.C. Vettivel, A. Elaya Perumal, N. Selvakumar, and R. Franklin Issac. “Experimental investigation on mechanical
behaviour, modelling and optimization of wear parameters of B 4C and graphite reinforced aluminium hybrid composites.” ,Materials &
Design, 63:620 – 632, 2014. ISSN 0261-3069.
3. S. Johny James, K. Venkatesan, P. Kuppan, and R. Ramanujam. “Hybrid aluminium metal matrix composite reinforced with SiC and 4465-
TiB2.”, Procedia Engineering, 97:1018 – 1026, 2014. ISSN 1877-7058. 4468
4. Mahmood Khan, Muhammad Zulfaqar, Fahad Ali, and Tayyab Subhani. “Microstructural and mechanical characterization of hybrid
aluminum matrix composite containing boron carbide and Al-Cu-Fe quasicrystals.”, Metals and Materials International, 23(4):813–822,
Jul 2017. ISSN 2005-4149.
5. Basavarajappa Kuldeep, Ravikumar P, Pradeep S, and Gopi K.R. “Effect of boron nitride and zirconium dioxide on mechanical beh avior of
Al 7075 metal matrix hybrid composite.” ,Materials Research Express, 6, 11 2018.
6. Senthil Kumar Marikkannan and Natrayan L. “Processing and characterization of AA2024/Al 2O3/sic reinforces hybrid composites using
squeeze casting technique.” ,Iranian Journal of Materials Science and Engineering, 16:55–67, 07 2019. doi: 10.22068/ijmse.16.2.55.
7. Balachandar Munisamy, Vijaya Ramnath Bindu Madhavan, Elanchezhian Chinnadurai, and Jeykrishnan Janardhanan. “Prediction of
mechanical properties of Al6061 metal matrix composites reinforced with zircon sand and boron carbide. “ ,Materials Testing, 61(6):537–
542, Jun 2019. ISSN 0025-5300.
8. R. Palanivel, Isaac Dinaharan, R. Laubscher, and J. Davim. “Influence of boron nitride nanoparticles on microstructure and wear behavior
of AA6082/TiB2 hybrid aluminum composites synthesized by friction stir processing.”, Materials and design, 106:195–204, 06 2016.
9. Pratip Roy, Subhash Singh, and Kaushik Pal. “Enhancement of mechanical and tribological properties of SiC- and BC-reinforced
aluminium 7075 hybrid composites through friction stir processing.”, Advanced Composite Materials, 28(sup1):1–18, 2019.
10. Mahmut Can Senel, Mevlut Gurbuz, and Erdem Koc. “Fabrication and characterization of synergistic Al-SiC-gnps hybrid composites.”,
Composites Part B: Engineering, 154:1 – 9, 2018. ISSN 1359-8368.
11. Vipin Kumar Sharma and Vinod Kumar. “Development of rare-earth oxides based hybrid amcs reinforced with SiC/Al 2O3: mechanical &
metallurgical characterization.” ,Journal of Materials Research and Technology, 8(2):1971 – 1981, 2019. ISSN 2238-7854.
Keyword : Cement, Natural sand, Nylon Glass Granules(NGG), Steel Fiber, Fly ash, Compressive Strength,
split tensile strength, Flexural Strength
779. References:
1. In 2009 vol. Waste Management Zainab Z. Ismail Enas A. AL-Hashmion on waste glass recycling as a partial substitute for fine
concrete aggregate. (29) pp 655–659. 4469-
2. . S.P. Gautam, Srivastava Vikas and V.C. Agarwal on the use of glass waste in Concrete 2012 J as a good aggregate. Acad. Indus. Res. 4474
Vol. 1(6).
3. In 2012, Construction and Building Materials vol. (35) pp 785–791, Esraa Emam Ali Sherif H. Al-
Tersawy on Recycled glass as a partial substitute for fine aggregate in self-compacting concrete.\
4. Mohammad Iqbal Malik , Aarif Manzoor , Barkat Ahmad , Syed Asima4, Rozi Ali , Muzafar Bashir on Positive Potential Of Partial
Replacement Of Fine Aggregates By Waste Glass (<600 Micron) In Concrete in 2014 vol. (5) pp 146-153
5. Mrs. Bhandari P.S. Mr. Dhale S.A. Mr. Ghutke V.S. Mrs. Pathan V.G. on Influence of Fine Glass Aggregate On Cement Mortar in
2014 International Journal Of Engineering And Computer Science ISSN. Vol. (3) pp 2319-7242
6. M. Adaway & Y. Wang, on partial replacement for fine aggregate in structural concrete is particularly attractive in 2015 Elec tronic
Journal of Structural Engineering 2015 vol. 14(1) .
7. F. Mahdi , H. Abbas , A.A. Khan ,” Strength characteristics of polymer mortar and concrete using different compositions of resins
derived from post consumer PET bottles “,Construction and Building Materials 24 (2010) 25–36
8. R.V. Silva , J. de Brito Naba jyoti Saikia ,” Influence of curing conditions on the durability -related performance of concrete made
with selected plastic waste aggregates “,Cement & Concrete Composites 35 (2013) 23–3
9. Dr. Prahallada. M.C and Dr. Prakash K.B “Strength and Workability Characteristics of Waste Plastic Fibre Reinforced Concrete
Produced From Recycled Aggregates” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
10. Batayneh M., 2007, “Use of waste materials in concrete mixes”, Waste management (27)1870-1878.
11. Alexandra M. da Silva, Jorge de Brito ,Rosário Veiga,” Incorporation of fine plastic aggregates in rendering mortars
“,Construction and Building Materials 71 (2014) 226–236.
12. A. Oner , S. Akyuzb, R. Yildiza,(2004)“An experimental study on strength development of oncrete containing fly ash and optimum
usage of fly ash inconcrete” Cement and Concrete Research , Vol.35, Issue 6, pp 11651171
Keyword : Bubble column, Bubble size, Bubble size distribution, gas holdup, interfacial area, Image
processing, Multi-phase system.
References:
1. A. Karn, C. Ellis, R. Arndt, J. Hong, “An integrative image measurement technique for dense bubbly flows with a wide size dis tribution”,
Chem. Eng. Sci. vol. 122, 2015, pp.240–249.
2. F.S. Ahmed, B. A. Sensenich, S.A. Gheni, D. Znerdstrovic, M. H. Al-Dahhan “Bubble Dynamics in 2D Bubble Column: Comparison
between high-speed camera imaging analysis and 4-point optical probe”, Chem. Eng. Commun. vol. 202, 2015, pp. 85–95.
3. Y.M. Lau, N.G. Deen, J.A.M. Kuipers, “Development of an image measurement technique for size distribution in dense bubbly flows”
780. Chem. Eng. Sci. vol. 94, 2013a, pp.20–29.
4. Y.M. Lau, K. T. Sujatha, M. Gaeini, N.G. Deen, J.A.M. Kuipers “Experimental study of the bubble size distribution in a pseudo -2D bubble 4475-
column”, Chem. Eng. Sci. vol.98, 2013b, pp. 203–211.
5. Y. Fu, Y. Liu, “Development of a robust image processing technique for bubbly flow measurement in a narrow rectangular channe l”, Int.
4479
J. Multiphase Flow. vol. 84, 2016, pp.217–228.
6. A. Zaruba, E. Krepper, H. M. Prasser, E. Schleicher, E. “Measurement of bubble velocity profiles and turbulent diffusion coefficients of
the gaseous phase in rectangular bubble column using image processing”, Exp. Therm. Fluid Sci. vol. 29, 2005, pp.851–860.
7. G. Besagni, F. Inzoli, “Bubble size distributions and shapes in annular gap bubble column”, Exp. Therm Fluid Sci. vol. 74, 2016a, pp.27–
48.
8. G. Besagni, F. Inzoli, “Comprehensive experimental investigation of counter-current bubble column hydrodynamics: Holdup, flow regime
transition, bubble size distributions and local flow properties”, Chem. Eng. Sci. vol. 146, 2016b, pp.259–290.
9. J.R.V. Cordero, D. Sámano, R. Zenit, “Study of the properties of bubbly flows in Boger-type fluids”, J. Non-Newtonian Fluid Mech. vol.
175–176, 2012, pp.1–9.
10. S. Zhong, X. Zou, Z. Zhang, H. Tian, “A flexible image analysis method for measuring bubble parameters”, Chem. Eng. Sci. vol. 141,
2016, pp.143–153.
11. X. Guan, N. Yang, “Bubble properties measurement in bubble columns: From homogeneous to heterogeneous regime”, Chem. Eng. Res.
Des. vol. 127, 2017, pp. 103–112.
12. D. Feng, J-H. Ferrasse, A. Soric, O. Boutin, “Bubble characterization and gas–liquid interfacial area in two phase gas–liquid system in
bubble column at low Reynolds number and high temperature and pressure”, vol. 144, 2019, pp. 95-106.
13. Y.M. Lau, F. Moller, U. Hampel, M. Schubert, “Ultrafast X-ray tomographic imaging of multiphase flow in bubble columns – Part 2:
Characterisation of bubbles in the dense regime”, Int. J. Multiphase Flow, vol. 104, 2018, pp. 272-285.
14. A. H. G. CENTS, D. J. W. JANSEN, D.W.F. BRILMAN, G. F. VERSTEEG,” INFLUENCE OF SMALL AMOUNTS OF ADDITIVES ON GAS
HOLD-UP, BUBBLE SIZE, AND INTERFACIAL AREA”, IND. ENG. CHEM. RES. VOL. 44, 2005, PP.4863-4870.
15. R. Pohorecki, W. Moniuk, A. Zdrójkowski, “Hydrodynamics of a bubble column under elevated pressure”, Chem. Eng. Sci. vol. 54, 1999,
pp. 5187-5193.
16. M. Millies, D. Mewas, “Interfacial area density in bubbly flow”, Chem. Eng. Process. vol. 38, 1999, pp. 307–319.
17. K. Akita, F. Yoshida, “Bubble size, interfacial area, and liquid-phase mass transfer coefficient in bubble columns”, Ind. Eng. Chem.
Process Des. Dev. vol. 13(1), 1974, pp. 84-91.
18. W. A. Al-Masry, E. M. Ali, “Identification of hydrodynamics characteristics in bubble columns through analysis of acoustic sound
measurements—Influence of the liquid phase properties”, Chem. Eng. Process. vol. 46, 2007, pp.127–138.
Keyword : Climate change, Intensity Duration Frequency (IDF), Normal Distribution, Rainfall Duration.
References:
1. Bell F. C., 1969, “Generalized rainfall-duration-frequency relationship”, ASCE J. Hydraulic Eng., 95, 311–327.
2. Bernard, M. M., (1932), “Formulas for rainfall intensities of long durations”. Trans. ASCE 6:592 - 624.
3. Bhaskar, N. R.; Parida, B. P.; Nayak, A. K. 1997. Flood Estimation for Ungauged Catchments Using the GIUH. Journal of Water Resources
Planning and Management., ASCE 123(4): 228-238.
4. Chow V.T., D.R. Maidment and L.W.Mays, 1988, “Applied Hydrology”, McGraw- Hill, Chapter 10 – Probability, Risk and Uncertainty
Analysis for Hydrologic and Hydraulic Design: 361 – 398.
5. M. M. Rashid, 1 S. B. Faruque and 2 J. B. Alam 2012, “Modeling of Short Duration Rainfall Intensity Duration Frequency (SDRIDF)
Equation for Sylhet City in Bangladesh.
6. Mohammed Badiuddin Parvez, M Inayathulla “Generation Of Intensity Duration Frequency Curves For Different Return Period Using
Short Duration Rainfall For Manvi Taluk Raichur District Karnataka”, International Research Journal of Engineering and Management
Studies (IRJEMS), Volume: 03 Issue: 04 | April -2019.
7. Mohammed Badiuddin Parvez, M Inayathulla “Prioritization Of Subwatersheds of Cauvery Region Based on Morphometric Analysis Using
GIS”, International Journal for Research in Engineering Application & Management (IJREAM), Volume: 05 Issue: 01, April -2019. 4.
8. Mohammed Badiuddin Parvez, M Inayathulla “Modelling of Short Duration Isopluvial Map For Raichur District Karnataka”, International
Journal for Science and Advance Research in Technology (IJSART), Volume: 05 Issue: 4, April -2019.
9. Mohammed Badiuddin Parvez, M Inayathulla, "Rainfall Analysis for Modelling of IDF Curves for Bangalore Rural, Karnataka",
International Journal of Scientific Research in Multidisciplinary Studies , Vol.5, Issue.8, pp.114-132, 2019
10. Mohammed Badiuddin Parvez, and M Inayathulla. "Generation of Short Duration Isohyetal Maps For Raichur District Karnataka"
International Journal Of Advance Research And Innovative Ideas In Education Volume 5 Issue 2 2019 Page 3234-3242
11. Mohammed Badiuddin Parvez, and M Inayathulla. " Derivation Of Intensity Duration Frequency Curves Using Short Duration Rainfall For
Yermarus Raingauge Station Raichur District Karnataka" International Journal of Innovative Research in Technology Volume 6 Issue 2
July 2019 Page 1-7
12. Mohammed Badiuddin Parvez, Chalapathi K and M Inayathulla. " Geomorphological Analysis of Two Mini-Watersheds in Raichur City
Karnataka" International Research Journal of Engineering and Technology (IRJET) Volume 6 Issue 6 June 2019 Page 2896-2901
13. Sherman, C. W. (1931). Frequency and intensity of excessive rainfall at Boston, Massachusetts, Transactions of the American Society of
Civil Engineers, 95, pp.951– 960.
Authors: Sh. Kh. Fazilov, N.M. Mirzaev, T.R. Nurmukhamedov, K.A. Ibragimova, S.N. Ibragimova
Paper Title: Model of Recognition Operators Based on the Formation of Representative Objects
Abstract: Parametric representations of the model of recognition operators based on the selection of
representative objects are considered. The main idea of the proposed model is to build a family of proximity
functions in the parameter space. In this case, the proximity function is determined within the framework of the
radial function. A distinctive feature of the proposed model is the formation of preferred features with respect to
selected representative objects when constructing recognition operators. To verify the performance of the proposed
model, experimental studies were carried out to solve the model problem.
Keyword : Supply Chain Network, Temporal Community Detection, Graph Analytics, Internet of Things,
Risk.
References:
1. L. Carstens, J. L. Leidner, K. Szymanski, and B. Howald, “Modeling Company Risk and Importance in Supply Graphs,” in ESWC 2017,
2017, vol. 1, pp. 18–32.
2. E. Liongosari, P. Mullan, M. Muller, and P. Guittat, “Smart Production Finding a way Forward: How Manufacturers can make the most of
the Industrial Internet of Things,” 2016.
3. D. Yan, Y. Bu, Y. Tian, A. Deshpande, and J. Cheng, “Big Graph Analytics Systems,” in SIGMOD’16, 2016, pp. 2241 –2243.
4. W. Ligtenberg, “Tink , a temporal graph analytics library for Apache Flink,” Department of Mathematics and Computer Science,
University of Technology, 2017.
5. F. S. F. Pereira, S. d. Amo, and J. Gama, “Evolving Centralities in Temporal Graphs: A Twitter Network Analysis,” in 2016 17t h IEEE
International Conference on Mobile Data Management (MDM), 2016, vol. 2, pp. 43–48.
6. G. Rossetti and R. Cazabet, “Community Discovery in Dynamic Networks : a Survey Community Discovery in Dynamic Networks : a
Survey,” Cornell Univ. Libr., no. July, 2017.
7. P. J. Mucha, T. Richardson, K. Macon, M. A. Porter, and J.-P. Onnela, “Community Structure in Time-Dependent, Multiscale, and
Multiplex Networks,” Science, no. July, May-2010.
8. A. C. Pereira and F. Romero, “A review of the meanings and the implications of the Industry 4.0 concept,” in Manufacturing En gineering
Society International Conference 2017, 2017.
9. Pierre-Olivier Bédard-Maltais, “Industry 4.0: The New Industrial Revolution Are Canadian manufacturers ready?,” 2017.
10. S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of Things ( IoT ): A Literature Review,” J. Comput. Commun., vol. 3, no. May,
pp. 164–173, 2015.
11. L. Da Xu, W. He, and S. Li, “Internet of Things in Industries : A Survey,” IEEE Trans. Ind. INFORMATICS, vol. 10, no. 4, pp. 2233–
2243, 2014.
12. D. Mourtzis, E. Vlachou, and N. Milas, “Industrial Big Data as a result of IoT adoption in Manufacturing,” Procedia CIRP, vol. 55, pp.
290–295, 2016.
13. R. Chitkara and R. Mesirow, “The Industrial Internet of Things,” 2016.
14. C. Perera, C. H. Liu, and S. Jayawardena, “The Emerging Internet of Things Marketplace From an Industrial Perspective: A Surv ey,” IEEE
Trans. Emerg. Top. Comput., no. 61272509, 2015.
15. S. Schrauf and P. Berttram, “Industry 4.0: How digitization makes the supply chain more efficient , agile , and customer-focussed,” 2016.
16. I. Robinson, J. Webber, and E. Eifrem, Graph Databases: New Opportunities for Connected Data, 2nd ed. United: O’Reilly Media, 2015.
17. A. Drosou, I. Kalamaras, S. Papadopoulos, and D. Tzovaras, “An enhanced Graph Analytics Platform ( GAP ) providing insight in Big
Network Data,” J. Innov. Digit. Ecosyst., vol. 3, no. 2, pp. 83–97, 2016.
18. Emil Eifrem, “Why graph databases are perfect for the Internet of Things,” SIlicon Angle, 2015.
19. M. Ben Jdidia, C. Robardet, and E. Fleury, “Communities detection and analysis of their dynamics in collaborative networks,” in 2nd
International Conference on Digital Information Management (ICDIM), 2007.
20. T. Viard, M. Latapy, and C. Magnien, “Computing maximal cliques in link streams,” Theor. Comput. Sci., vol. 609, no. Part 1, pp. 245–
252, 2016.
Authors: Kambhampati Kalyana Kameswari, J Raghaveni, R. Shiva Shankar, Ch. Someswara Rao
Keyword : Machine Learning, Natural Language Processing, Twitter, Political opinion, Supervised
Learning, Election Result Prediction.
References:
1. Godbole, Namrata, Manja Srinivasaiah, and Steven Skiena. "Large-Scale Sentiment Analysis for News and Blogs." ICWSM 7.21 (2007):
219-222.
2. Fumagalli, Laura.and Emanuela Sala. 2011. “The total survey error paradigm and pre-election polls: the case of the 2006 Italian general
elections”. Tech. rep., ISER Working Paper Series: 2011-29.
3. Mondher Bouazizi, Tomoaki Ohtsuki, "A Pattern-Based Approach for Multi-Class Sentiment Analysis in Twitter", Access IEEE, vol. 5,
pp. 20617-20639, 2017, ISSN 2169-3536.
4. Boia, Marina, et al. "A:) is worth a thousand words: How people attach sentiment to emoticons and words in tweets." Social computin g
(social com),2013 international conference on. IEEE, 2013.
5. Manuel, K., Kishore Varma Indukuri, and P. Radha Krishna. "Analyzing internet slang for sentiment mining." 2010 Second Vaagdevi
International Conference on Information Technology for Real-World Problems. 2010.
6. Akcora, Cuneyt Gurcan, et al. "Identifying breakpoints in public opinion." Proceedings of the first workshop on soc ial media analytics.
ACM,2010.
7. Gao, Wei, and Fabrizio Sebastiani. "Tweet sentiment: From classification to quantification." Advances in Social Networks Analysis and
Mining(ASONAM), 2015 IEEE/ACM International Conference on. IEEE, 2015.
8. Bhoir, Purtata, and Shilpa Kolte. "Sentiment analysis of movie reviews using lexicon approach." Computational Intelligence and
Computing Research (ICCIC), 2015 IEEE International Conference on. IEEE, 2015.
9. Mandal, Santanu, and Sumit Gupta. "A Lexicon-based text classification model to analyze and predict sentiments from online reviews."
Computer, Electrical & Communication Engineering (ICCECE), 2016 International Conference on. IEEE, 2016
10. Aung, Khin Zezawar, and Nyein Nyein Myo. "Sentiment analysis of students' comments using a lexicon-based approach." Computer and
Information Science (ICIS), 2017 IEEE/ACIS 16th International Conference on. IEEE,2017.
11. Hailong, Zhang, Gan Wenyan, and Jiang Bo. "Machine learning and lexicon-based methods for sentiment classification: A survey." Web
Information System and Application Conference (WISA), 2014 11th. IEEE,2014.
12. Rezapour, Rezvaneh, et al. "Identifying the Overlap between Election Result and Candidates’ Ranking Based on Hashtag -Enhanced,
Lexicon-BasedSentiment Analysis." Semantic Computing (ICSC), 2017 IEEE 11 th International Conference on. IEEE, 2017.
13. Ramteke, Jyoti, et al."Election result prediction using Twitter sentiment analysis." Inventive Computation Technologies (ICICT),
International Conference on. Vol. 1. IEEE, 2016.
14. Bouazizi, Mondher, and Tomoaki Ohtsuki. "Sentiment analysis in twitter: From classification to the quantification of sentiments within
tweets." Global Communications Conference (GLOBECOM), 2016 IEEE. IEEE, 2016.
15. J. M. Soler, F. Cuartero, and M. Roblizo, ``Twitter as a tool for predicting elections results,'' in Proc. IEEE/ACM Int. Conf. Adv. Social
Netw.Anal. Mining (ASONAM), Aug. 2012, pp. 1194_1200.
16. A. Java, X. Song, T. Finin, and B. Tseng, ``Why we Twitter: Understanding microblogging usage and communities,'' in Proc. 9th
WebKDD 1st SNA-KDD Workshop Web Mining Social Netw. Anal., Aug. 2007, pp.56_65. Proceedings of the second International
Conference on Inventive Systems and Control (ICISC 2018)IEEE Xplore CompliantPartNumber:CFP18J06-ART,ISBN:978-1-5386-0807-
4;DVDPart Number:CFP18J06DVD, ISBN:978-1-5386-0806-7978--
17. Harshali P. Patil,Dr. Mohammad Atique, “Sentiment Analysis for Social Media: A Survey”, Department of Computer Enginee ring
Thakur College of Engineering & Technology Mumbai, India.
18. Megha Rathi, Aditya Malik, Daksh Varshney, Rachita Sharma, Sarthak Mendiratta, “Sentiment Analysis of Tweets using Machine
Learning Approach”, Jaypee Institute of Information Technology JIIT Sec-62 Noida, India.
19. http://www.nltk.org/
20. https://pypi.python.org/pypi/textblob
21. Mondher Bouazizi, Tomoaki Ohtsuki, "A Pattern-Based Approach for Multi-Class Sentiment Analysis in Twitter", Access IEEE, vol. 5,
pp. 20617- 20639, 2017, ISSN 2169-3536.
Paper Title: Real-Time Hindrance Detection Prototype in Internal Atmosphere Expending Ultrasonic Sensors
Abstract: Currently, ultrasonic sensors are extensively used in voluminous applications, for instance: robotics
solicitations, unmanned vehicles, medical presentations, etc. In which remoteness measurement of an object is one
of the most important issues. This can be achieved using a variety of sensors: Optical, Radar, IR, Ultrasonic, etc.
Measuring distance using ultrasonic sensors might be the cheapest and its reliability is probably acceptable. In this
paper we talk about the employments of these sensors to plan a convenient gadget helping the outwardly debilitated
stay away from obstructions on their ways by sounds.
788. References:
1. Prof. D. S. Vidhya, Miss Cecilia Jane D’Silva, Miss Delicia Perlin Rebelo, Mr. Linford William Fernandes, “Analysis of Obstac le
Detection Using Ultrasonic Sensor”, IJIRST –International Journal for Innovative Research in Science & Technology| Volume 2 | Issue
4541-
11 | April 2016 4544
2. Christopher N. Yalung, Cid Mathew S. Adolfo, “Analysis of Obstacle Detection Using Ultrasonic Sensor”, International Research
Journal of Engineering and Technology (IRJET) | Volume 4 | Issue 1 | Jan 2017.
3. Gerard Gibbsa, Huamin Jiab, Irfan Madanib, “Obstacle Detection with Ultrasonic Sensors and Signal Analysis Metrics”, INAIR
International Conference on Air Transport 2017.
4. B. Peasley and S. Birchfield, “Real-time obstacle detection and avoidance in the presence of specular surfaces using an active3D sensor,”
in Proceedings of the IEEE Workshop on Robot Vision (WoRV ’13), pp. 197–202, Clearwater Beach, Fla, USA, January 2013.
5. J. M. Benjamin, N. A. Ali, and A. F. Schepis, “A laser cane for the blind,” Proceedings of the San Diego Biomedical Symposium , vol.12,
pp. 53–57, 1973
6. Shoval, S., Borenstein, J., and Koren, Y., 1994f, “Mobile Robot Obstacle Avoidance in a Computerized Travel Aid for the Blind.”
Proceedings of the 1994 IEEE International Conference on Robotics and Automation, San Diego, CA, May 8- 13, pp. 2023-2029.
7. Kumar.K, Champaty.B, Uvanesh K., Chachan R., Pal K., Anis A., “Development of an ultrasonic cane as a navigation aid for the blind
people”; in Proceedings of the 2014 International Conference on Control, Instrumentation, Communication and Computational
Technologies (ICCICCT); Kanyakumari District, India. 10–11 July 2014
Paper Title: Implementation of 5-Stage 32-Bit Microprocessor Based Without Interlocked Pipelining Stages
Abstract: Many processors have evolved in the past century; Out of which, Reduced Instruction set
Computing (RISC) processors are well known for their ease of use. The next in line was the Microprocessor
without Interlocked pipelining stages (MIPS) RISC based architecture. Less number of instructions, good amount
of registers makes these processors a boon to use. Often times, MIPS processors loose the battle against their
contenders due to lack of speed. Hence, there is a sheer necessity in designing a more robust system that has all the
advantages of MIPS. Over time, there have been designs that could solve the power drawbacks and the area
optimizations. However, performance criterion is mostly neglected. This paper emphasizes on the performance
metric of pipelined 32-bit MIPS microprocessor. This processor supports RISC architecture and has been designed
under Harvard architecture. Pipelining technique is used to solve the problem of low performance and achieve
smaller execution times. The processor has four pipes. Pipes are the structures which store data. Pipes can be
viewed as register banks. These pipes are generally used to store the intermediate data. The design contains various
modules like ALU, Instruction fetch register, Execution unit, Memory, Program counter (PC). Verilog HDL has
been used to implement the design. The software used is Xilinx ISE for design and ISIM simulator has been used
791. for simulation purposes. The applications of this MIPS microprocessor are abundant. MIPS microprocessor can be
used to carry out the fundamental tasks and an application specific core/IP/processor can be designed and combined 4557-
with MIPS. This facilitates in meeting the goals of high performance, lower time-to-market and cost- effectiveness. 4561
Some application specific uses can be for music systems, PDA, Image processing etc.
Paper Title: Method for The Primary Processing of Silkworm Cocoons (Bombyx Mori)
Abstract: The article discusses the results of an experimental study of the process of primary processing of
silkworm cocoons (Bombyx mori). During the study, the possibilities of the primary processing of silkworm
cocoons using elastic waves with infrared radiation were examined. The Tashkent State Technical University has
developed a mechanism for generating low-frequency oscillations due to an electromechanical drive to pallets. In
the laboratory of the department, a full-scale test was carried out for the primary processing of silkworm cocoons
(Bombyx mori). Studies were carried out to determine the parameters as temperature and time of primary
processing of silkworm cocoons in 5 times repetition. The results of the experiments are the primary processing of
live cocoons (Bombyx mori) in the amount of one hundred pieces with infrared rays, the effects of vibration and
elastic waves (the distance between the tube distributing infrared rays and raw materials is 10 cm, the duration of
792. the process is 5 minutes). The study revealed that, as silkworm cocoons processed in the temperature range at 65-70
0С using vibration waves were moderate for 3-5 minutes and for 10 days at a temperature of 38-42 0С the cocoons 4562-
continued to dry to 10-12% of the cane humidity. The use of elastic waves in the processing of cocoons proceeded 4565
5-10% lower relative to the processing using vibratory waves. The obtained results, the experiments confirm that
when applying vibration and IR radiation accelerates the process of primary processing of silkworm cocoons. The
study found the optimum temperature and time for the primary processing of silkworm cocoons. Due to briefly
temporary processing, the final product is improved.
Paper Title: Experimental Sound Absorption of Several Loose Uncooked Granular Materials
Abstract: Absorbent materials it's an acoustic solution that can be used to control the reverberation time (RT)
in deferent spaces as: conference rooms, in halls, theaters, cinema.... and also, it can be used in walls or ceilings of
buildings to improve the acoustic insulation Which can be used for internal separations between spaces. This study
focuses on the experimental study of the acoustic absorption coefficient of several granular food materials as a
function of frequency 50 to 1600 Hz. All acoustic absorption tests performed in this study are performed by an
acoustic impedance tube or Kundt tube. And to the knowledge of the author it is the first time in the literature that
someone studies the acoustic behavior of this kind of materials. Several parameters were studied such as the effect
of thickness on the sound absorption coefficient of the materials tested, like the influence of the grain form on the
acoustic absorption by the introduction of a new parameter L / D, and finally the influence of density and type of
material on the sound absorption coefficient. The objective of this work is to study the influence of the grain shape
on the sound absorption coefficient, and that's why we have chosen these fifteen materials each one with its own
shape. The results of these experimental tests show that when the sample thickness rises, the acoustic absorption
coefficient rises too with a shift from resonance frequency to low frequencies. When the L/D parameter rises, the
absorption behavior increases too in all frequencies mentioned. Finally, as the density of the tested material rises,
the percentage of sound absorption of the materials also rises.
795.
4578-
Keyword : Acoustic absorption coefficient, granular materials, granular pastas, impedance tube 4583
References:
1. The French and noise pollution - Ifop survey for the Ministry of Ecology, Sustainable Development and Energy - September 2014
2. K.H. Or, and Al “OIL PALM EMPTY FRUIT BUNCH FIBERS AS SUSTAINABLE ACOUSTIC MATERIAL” Proceedings of
Mechanical Engineering Research Day 2015, pp. 99-100, March 2015
3. Mohammed.G, and Al “CHARACTERISATION OF NON-CONSOLIDATED CORK CRUMBS AS A BASIC SOUND
ABSORBER RAW MATERIAL”, Proceedings of the Twelfth International Congress on Sound and Vibration Lisbon, Portugal, 11-
15 July, (2005).
4. Williams Paul T., and Al “MEASUREMENT OF THE BULK ACOUSTIC PROPERTIES OF fiBROUS MATERIALS AT HIGH
TEMPERATURES” Applied Acoustics 77 (2014) 29–36
5. European Standard EN ISO 10534-2:2001, Determination of acoustic absorption factor and in impedance tubes. Transfer function
method.
6. Utsuno H, and Al. Transfer function method for measuring characteristic impedance and propagation constant of porous materials. J
Acoust Soc Am 1989;86:637–43.
7. F. Sun, and Al. Sound absorbing characteristics of fibrous metal materials at high temperatures. Appl Acoust 2010;71:221 –35.
8. Delany ME, Bazley EN. Acoustical properties of fibrous materials. Appl Acoust 1970;3:105–16.
9. Hasina Mamtaz, and Al “ACOUSTIC ABSORPTION OF fiBRO-GRANULAR COMPOSITE WITH CYLINDRICAL GRAINS”
Applied Acoustics 126 (2017) 58–67.
10. Abd ALRahman Lamyaa, and Al “EXPERIMENTAL STUDY ON NATURAL FIBERS FOR GREEN ACOUSTIC ABSORPTION
MATERIALS” American Journal of Applied Sciences 10 (10): 1307-1314, 2013.
11. Bousshine Said, and Al “EXPERIMENTAL INVESTIGATION OF SOUND ABSORPTION OF LOOSE BIO-SOURCED ALFA
FIBERS” Proceedings of the Twenty fourth International Congress on Sound and Vibration, London, UK, 23-27 July,( 2017).
12. Ayoub BOUBEL, and Al” SOUND ABSORPTION MEASUREMENTS OF SOME POROUS LOOSE GRANULAR
MATERIALS”, Proceedings of the 45th Inter.Noise HAMBOURG, Germany, 21-24 August, (2016).
13. Ayoub BOUBEL and Al “EXPERIMENTAL INVESTIGATION OF SOUND ABSORPTION OF SOME LOOSE UNCOOKED
GRANULAR PASTAS, STARCHY FOODS AND CEREALS”. Proceeding of the 24 th International Congress on Sound and
Vibration, London, UK, 23-27 July,( 2017).
Keyword : MPPT (P&O) algorithm, PWM Inverter, PV-FC system, Proportional Integrate current controller.
References:
1. K. Karimov, M. Saqib, P. Akhter, M. Ahmed, J. Chattha & S. Yousafzai, "A simple photo-voltaic tracking _system", Solar_Energy
Materials & Solar Cells, vol. 87, no. 1-4, pp. 49-59, 2005. [Accessed 21 January 2019].
796.
2. M. Khan, S. Tanzil, R. Rahman & S. Alam, "Design &structure of an automatic solar tracking system", International Conference on 4584-
Electrical & Computer Engineering (ICECE 2010), 2010. [Accessed 21 January 2019]. 4589
3. Crutzen, P. J., Mosier, A. R., Smith, K. A., & Winiwarter, W. (2017). N 2 O release from agro-biofuel production negates global warming
reduction by replacing fossil-fuels. In Paul J. Crutzen: A pioneer on atmospheric chemistry & climate change in the anthropocene (pp. 227-
238). Springer, Cham.
4. D. P. Hohm, M. E. Ropp, “Comparative Study of Maximum Power Point_Tracking Algorithms By Experimental, Programmable,
Maximum Power Point-Tracking Test Bed”, 0-7803-5772-8/00,IEEE, 2018, 1699-1702.
5. Marcelo Gradella Villalva, Jonas Rafael Gazoli, Ernesto Ruppert Filho ‘Modeling & Circuit-Based Simulation Of Photovoltaic_Arrays’
IEEE 2009 Brazilian power electronics conference, pp. 1244-1254, 2017.
6. An enhanced P&O checking algorithm MPPT for high tracking efficiency of partially sheltered PV moduleSol. IEEE Trans.
Energy, vol.22 163 (2018),
7. S. Samuelsen, “Why the automotive future will be dominated by fuel_cells,” IEEE Spectrum, Dec. 2016.
8. S. SAMAL, & P.K., HOTA, “Power Quality
Improvement by Solar Photo-voltaic/Fuel Cell Integrated System Expending UPQC”, International Journal of Renewable Energy Research
(IJRER), 7(4),pp.2075-2084. , 2017
9. S. Sarita, & P. K. Hota. "Design & analysis of solar PV-fuel cell & wind energy based microgrid system for power quality improvement."
Cogent Engineering 4, no. 1 pp.1402453, 2017.
10. G.Ceglia, V.Guzman, C.Sanchez, F.Ibanez, J.Walter, & M.I. Gimanez, “A new simplified multilevel inverter_topology for DC-AC
conversion,” IEEE Trans. Power Electron., vol.21, no.5, pp.1311- 1319, Sep.2006.
11. Rodriguez, J.; Jih-Sheng Lai; Fang Zheng Peng; “Multilevel inverters: _a survey of topologies, controls, & applications” Industrial
Electronics, IEEE Transactions on Volume 49, Issue 4,Aug. 2002 Page(s):724–738.
12. Ilhami Colak a, Ersan Kabalci b, Ramazan Bayindir ‘Review of multilevel_voltage source inverter topologies & control schemes’Energy
conversion & management, vol. 52, iss.2, pp. 1114-1128, 2011.
Paper Title: Multiorgan Detection: Deep Learning Based Techniques and Research Directions
Abstract: Automatic organ segmentation plays an important role in clinical procedures such as planning of
radiation therapies and in computer-aided diagnostic systems. Several state-of –art techniques are available for
multiorgan segmentation, however deep learning methods are doing exceptionally well and become the
methodology of choice to analyze medical images. This intensively carried out work is conducted for deep learning
methods applied on various organs in abdominal CT images. Firstly, this paper formulates segmentation, semantic
segmentation problem and their methods. Secondly, multiorgan detection techniques based on deep learning along
with their contributions, chosen datasets and gaps are discussed. It presents the metrics used to evaluate these
797. methods. Finally, interesting conclusions has been drawn which will add to do future work using deep learning.
4590-
Keyword : Deep Learning, Semantic Segmentation, Fully Convolutional Neural Network etc. 4594
References:
1. Gentle Introduction to Computer Vision [Online]. Available: https://machinelearningmastery.com/what-is-computer-vision/. [Accessed:
20-Oct-2019].
2. Y. Yang, H. Jiang and Q. Sun, "A Multiorgan Segmentation Model for CT Volumes via Full Convolution -Deconvolution Network",
BioMed Research International, vol. 66, pp. 90-99, 2017
3. J. E. Iglesias and M. R. Sabuncu, “Multi-atlas segmentation of biomedical images: A survey,” Medical Image Analysis., vol. 24, no. 1, pp.
205–219, 2015.
4. A. M. Ali, A. A. Farag, and A. S. El-Baz, “Graph Cuts Framework for Kidney Segmentation with Prior Shape Constraints,” Medical
Image Computing and Computer-Assisted Intervention – MICCAI 2007, pp. 384–392, 2007.
5. J. Paredes, “Comparison and Evaluation of Methods for Liver Segmentation From CT Datasets,” IEEE Transaction on Medical Imaging,
vol. 28, no. 8, p. 280, 2009.
6. D. Lin, C. Lei and S. Hung, "Computer-Aided Kidney Segmentation on Abdominal CT Images", IEEE Transactions on Information
Technology in Biomedicine, vol. 10, no. 1, pp. 59-65, 2006.
7. H. Ling, S. Kevin Zhou, Y. Zheng, B. Georgescu, M. Suehling, and D. Comaniciu, “Hierarchical, learning-based automatic liver
segmentation,” 26th IEEE Conference on Computer Vision and Pattern Recognition CVPR, 2008.
8. G. Litjens et al., “A survey on deep learning in medical image analysis.,” Medical Image Analysis., vol.42, pp. 60–88, 2017.
9. H. Kakeya, T. Okada, and Y. Oshiro, “3D U-JAPA-Net: Mixture of Convolutional Networks for Abdominal Multiorgan CT
Segmentation,” Lecture Notes on Computer Science. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11073
LNCS, pp. 426–433, 2018.
10. B. A. Landman et al., “Fully convolutional neural networks improve abdominal organ segmentation,” Proceedings SPIE Int Soc Opt Eng,
pp.1-100, 2018.
11. H. R. R. B et al., " A Multi-scale Pyramid of 3D Fully Convolutional Networks for Abdominal Multiorgan Segmentation," Medical Image
Computing and Computer-Assisted Intervention – MICCAI 2013, vol. 8150, pp 417-425, Springer International Publishing, 2013.
12. E. Gibson et al., “Automatic Multiorgan Segmentation on Abdominal CT with Dense V-Networks,” IEEE Transaction on Medical
Imaging, vol. 37, no. 8, pp. 1822–1834, 2018.
13. R. Kechichian, S. Valette, and M. Desvignes, “Automatic Multiorgan Segmentation via Multiscale Registration and Graph Cut,” IEEE
Transaction on Medical Imaging, vol. 37, no. 12, pp. 2739–2749, 2018.
14. X. Zhou, R. Takayama, S. Wang, T. Hara, and H. Fujita, “Deep learning of the sectional appearances of 3D CT images for anatom ical
structure segmentation based on an FCN voting method,” Medical Physics., vol. 44, no. 10, pp. 5221–5233, 2017.
15. Y. W. B, Y. Zhou, P. Tang, W. Shen, E. K. Fishman, and A. L. Yuille, Medical Image Computing and Computer-Assisted Intervention –
MICCAI 2013, vol. 8150. Springer International Publishing, 2013.
16. H. Kaur, “Reinforced Fast Marching Method and Two Level Thresholding Algorithm for Cloud Detection,” 2016 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 693–698, 2016.
17. H. Kaur and N. Sohi, “Cloud Detection : A Systematic Review and Evaluation,” In Advances in Computer and Computational Sciences,
Advances in Intelligent Systems and Computing, pp 217-229, Springer Natur Singapore Publisher, 2018.
18. R.C Gonzalez and R.E. Woods, Digital Image Processing, 3rd ed., India: Dorling Kindersley, pp. 689–743, 2008
19. R. Kandwal, A. Kumar, and S. Bhargava, “Existing Image Segmentation Techniques,” International Journal of Advanced Research in
Computer Science and Software Engineering., vol. 4, no. 4, pp. 153–156, 2014
20. M. Zand, S. Doraisamy, A. Abdul Halin, and M. R. Mustaffa, “Ontology-Based Semantic Image Segmentation Using Mixture Models and
Multiple CRFs,” IEEE Transaction on Image Processing, vol. 25, no. 7, pp. 3233–3248, 2016.
21. Y. F. Riti, H. A. Nugroho, S. Wibirama, B. Windarta, and L. Choridah, “Feature extraction for lesion margin characteristic classification
from CT Scan lungs image,” Proceedings - 2016 1st International Conference on Information Technology, Information Systems and
Electrical Engineering, ICITISEE 2016, pp. 54–58, 2016.
22. S. Dara and G. K. Tumma, Priyanka , NR Eluri, “Feature Extraction In Medical Images by Using Deep Learning Approach,” International
Journal of Pure and Applied Mathematics, vol. 120, no. 6, pp. 305–312, 2018.
23. J.Long, E.Shelhamer, T.Darrel, “Imperforated Anus in Calves and its Surgical Treatment,” Intas Polivet, vol. 10, no. 2, pp. 227–228, 2009.
24. Z.-W. Yuan and J. Zhang, “Feature extraction and image retrieval based on AlexNet,” Eighth International Conference on Digital Image
Processing (ICDIP 2016), vol. 10033, pp. 100-105, 2016.
25. L. Ding, H. Li, C. Hu, W. Zhang, and S. Wang, “Alexnet feature extraction and multi-kernel learning for object-oriented classification,”
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives, vol. 42, no. 3, pp.
277–281, 2018.
26. Franky, “Using Keras’ Pre-trained Models for Feature Extraction in Image Clustering.” [Online]. Available:
https://medium.com/@franky07724_57962/using-keras-pre-trained-models-for-feature-extraction-in-image-clustering-a142c6cdf5b1.
[Accessed: 23-Oct-2019].
27. K. Simonyan and A. Zisserman, “Very Deep Convolutional Networks for Large-Scale Image Recognition,” 3rd International Conference
on Learning Representations ICLR 2015, pp. 1–14, 2014.
28. Y. Guo, Y. Liu, T. Georgiou, and M. S. Lew, “A review of semantic segmentation using deep neural networks,” International Journal of
Multimedia Information Retrieval., vol. 7, no. 2, pp. 87–93, 2018.
29. H. Roth et al., "An application of cascaded 3D fully convolutional networks for medical image segmentation", Computerized Medical
Imaging and Graphics, vol. 66, pp. 90-99, 2018.
30. Y. Zhou et al., “Semi-supervised 3D abdominal multiorgan segmentation via deep multi-planar co-training,” Proceedings - 2019 IEEE
Winter Conference on Applications of Computer Vision, WACV 2019, pp. 121–140, 2019.
31. Y. Zhang and F. Kahl, “DeepSeg : Abdominal Organ Segmentation Using Deep Convolutional Neural Networks.” In Proceedings Larsson
2016, pp 1-5, 2016.
32. P. Hu, F. Wu, J. Peng, Y. Bao, F. Chen and D. Kong, "Automatic abdominal multiorgan segmentation using deep convolutional neu ral
network and time-implicit level sets", International Journal of Computer Assisted Radiology and Surgery, vol. 12, no. 3, pp. 399-411,
2016.
Paper Title: Multi-Loop PID Controller Design for MIMO Processes Based On SIMC Fractional Order Filter
Abstract: This paper presents a multiloop control for the different dimensional multivariable processes which
are having the strong interrelation amid its variables. The objective of this discussion is to enhance the overall
performance of the system by reducing the effects of interrelation of process variables. The prerequisite for design
of multi loop control is to determine the best pair of controlled variables. In this paper the pair of variables is
identified by using the relative gains of the process variables. Based on these, the pair of possible control loops is
identified and their FOPDT models are approximated. Then to improve the servo operation (for set point changes in
input) the PID controller parameters are calculated for these models using Simplified IMC tuning formulas. To
798. minimize the effects of interrelations fractional order filter is used. With this combination, the overall objective of
the control system is fulfilled i.e., tracking the set point and lessening the interaction. To show the effectiveness, the 4595-
two examples are considered with different dimension, interaction and controller is designed. The results show that 4600
the SIMC algorithm improved the performance of the system.
Keyword : Interrelations of variables, time delay, servo operation, Simplified IMC, fractional order filter, multi
loop control.
References:
1. Luan, Xiaoli, Qiang Chen, and Fei Liu. "Centralized PI control for high dimensional multivariable systems based on equivalent transfer
function." ISA transactions 53.5 (2014): 1554-1561.
2. Xiong, Qiang, Wen-Jian Cai, and Mao-Jun He. "Equivalent transfer function method for PI/PID controller design of MIMO
processes." Journal of Process Control 17.8 (2007): 665-673.
3. Bristol, Edgar. "On a new measure of interaction for multivariable process control." IEEE transactions on automatic control 11.1 (1966):
133-134.
4. He, Mao-Jun, et al. "RNGA based control system configuration for multivariable processes." Journal of Process Control 19.6 (2009):
1036-1042.
5. Morari, Manfred, and Evanghelos Zafiriou. Robust process control. Morari, 1989.
6. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "Control configuration selection and controller design for multivar iable
processes using normalized gain." World Acad Sci Eng Technol Int J Electr Comput Electron Commun Eng8.10 (2014).
7. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "Loop Interaction and It’s Influence in Multivariable Process
Control." Emerging Trends in Electrical, Communications and Information Technologies. Springer, Singapore, 2017. 361-368.
8. Chekari, Tassadit, Rachid Mansouri, and Maamar Bettayeb. "IMC-PID fractional order filter multi-loop controller design for multivariable
systems based on two degrees of freedom control scheme." International Journal of Control, Automation and Systems 16.2 (2018): 689-
701.
9. Skogestad, Sigurd. "Simple analytic rules for model reduction and PID controller tuning." Journal of process control 13.4 (2003): 291-309.
10. Luyben, William L. "Simple method for tuning SISO controllers in multivariable systems." Industrial & Engineering Chemistry Process
Design and Development 25.3 (1986): 654-660.
Keyword : Cloud computing, DDIC: Distant Data Integrity Checking, Operation-record-table, Data
Dynamics, Homomorphic-hash-functions
References:
1. Hao Yan, Jiguo Li, Jinguang Han, Member, IEEE and Yichen Zhang, “A Novel Efficient Remote Data Possession Checking Protocol
in Cloud Storage”, IEEE 2017.
2. Ari Juels and Michael Szydlo, “Attribute-Based Encryption: Using Identity-Based Encryption for Access Control”, RSA
Laboratories Bedford, MA 01730, 17 June 2004.
3. Meenal Jain and Manoj Singh, “Identity Based and Attribute Based Cryptography: A Survey”, International Journal of Engineerin g,
Management & Sciences (IJEMS) ISSN-2348 – 3733, Volume-2, Issue-5, May 2015.
4. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg and I. Brandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype, and
Reality for Delivering Computing as the 5th Utility,” Future Generation Computer Systems, Vol. 25, No. 6, 2009, pp. 599-616
5. John Oredo, James Njihia, XN Iraki. The Role of Organizing Vision in Cloud Computing Adoption by Organizations in
Kenya. American Journal of Information Systems. 2017; 5(1):38-50. doi: 10.12691/ajis-5-1-6.
799. 6. Encryption with Immediate Attribute Revocation for FineGrained Access Control in Cloud Storage”, School of Computer Science
and Engineering, University of Electronic Science and Technology of China, No.2006, Xiyuan, IEEE, 2013.
7. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini and Gene Tsudik, “Scalable and Efficient Provable Data Possession”, 2008. 4601-
8. inguang Han, Willy Susilo, Yi Mu and Jun Yan, “PrivacyPreserving Decentralized Key-Policy Attribute-Based Encryption”, IEEE 4605
Transactions on Parallel and Distributed systems, VOL. 23, NO. 11, NOVEMBER 2012
9. Ning Cao, Cong Wang, Ming Li, Member, KuiRen and Wenjing Lou, Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, VOL. 25, NO. 1, JANUARY 2014.
10. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud computing and emerging IT platforms: Vision, hype, and
reality for delivering computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599 – 616, 2016.
11. H. Qian, J. Li, Y. Zhang and J. Han, “Privacy preserving personal health record using multi-authority attribute-based encryption with
revocation,” Int. J. Inf. Secur., vol. 14, no. 6, pp. 487-497, 2015.
12. H. Qian, J. Li, Y. Zhang and J. Han, “Privacy preserving personal health record using multi-authority attribute-based encryption with
revocation,” Int. J. Inf. Secure., vol. 14, no. 6, pp. 487-497, 2015. J. Li, X. Lin, Y. Zhang and J. Han, “KSF-OABE: outsourced
attribute-based encryption with keyword search function for cloud storage,” IEEE Trans. Service Comput., DOI: 10.1109/TSC.2016.
2542813.
13. J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,” Int. J.
Commun. Syst., DOI: 10.1002/dac.2942.
14. J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” IEEE
Transactions on Parallel and Distributed Systems, vol. 23, no.11, pp. 2150-2162, 2012
15. R. Mukundan, S. Madria and M. Linderman, ‘‘Efficient integrity verification of replicated data in cloud using homomorphic
encryption,’’ Distrib. Parallel Dat., vol. 32, no. 4, pp. 507-534, 2014.
16. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,’’ in Proc. 16th AC M Conf. on
Comput. And Commun. Security (CCS), 2009, pp. 213-222.
17. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, ‘‘MR-PDP: Multiple-replica provable data possession,’’ in Proc. 28th IEEE Conf.
on Distrib. Comput. Syst. (ICDCS), 2008, pp. 411-420.
18. J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” IEEE
Transactions on Parallel and Distributed Systems, vol. 23, no.11, pp. 2150-2162, 2012
19. Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over
encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015.
20. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high-availability and integrity layer for cloud storage,” in Proc. 16th ACM Conf. on
Comput. andCommun. Security (CCS), 2009, pp. 187–198.
21. E. Zhou and Z. Li, ‘‘An improved remote data possession checking protocol in cloud storage,’’ in Proc. 14th Int'l Conf. on Al gs.
andArchs. for Parall Proc. (ICA3PP), 2014, pp. 611-617
22. T.J. Ren, J. Shen,J. G. Wang, “Mutual verifiable provable data auditing in public cloud storage”.
23. K. Kiran Kumar, K. Padmaja, P. Radha Krishna, “Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud
Computing”, International Journal of Computer science and Technology, vol. 3 pp, ISSN. 0976-8491(Online), pp. 936-940, ISSN:
2229- 4333 (Print), March 2012
24. Dhiyanesh “A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing”, International Journal of Advanced
Research in Technology, vol. 1,no. 1, pp. 29-33, ISSN: 6602 3127, 2011
25. XU Chun-xiang, HE Xiao-hu, Daniel Abraha, “Cryptanalysis of Auditing protocol proposed by Wang et al. for data storage security
in cloud computing”, http://eprint.iacr.org/2012/115.pdf.
Samandarov Bunyod G’ayratovich, Matqurbanov To’lqin Alimboevich, Yangiboeva Madina
Authors:
Rustamovna
Paper Title: Developing methods of allocation resource in the servers of IMS subsystem.
Abstract: Nowadays, users of the internet are becoming increasingly popular, because of this rising load
packets of network and delay requests. In this paper, we offer a method to improve allocation resource in the IMS
servers. Implementation of technology for balancing of loading in practice allows to optimize the decision of
distribution tasks of signal and information flows on telecommunication networks. In case of uniform loading of
the IMS servers and routers of a backbone network (devices of the network), the average time of a time delay of
signal and information packets is minimum. Uniformity of loading of network devices is reached due to the
uniform distribution of a flow of packets. The criterion of efficiency of methods of distribution of flows is the
average square deviation (a balanced index) of congestion of network devices. AnyLogic 7 agent system toolbox is
used to simulate the proposed system.
Keyword : CSCF(The Call Session Control Functions), IMS (Ip Multimedia subsystem), IPTV, MPLS,
PSTN, SIP.
800. References:
1. G Mesud Hadžialić, Mirko Škrbić, Nerma Šečić, Mirza Varatanović, Elvedina Zulić, Nedim Bijedić University of Sarajevo, Problem
of IMS modeling – Solving Approaches, CTRQ 2012
4606-
2. Malindi Mashologu, Performance optimization of IP Multimedia Subsystem, Dissertation.com, Boca Raton, Florida 2010 4609
3. V.S. Abhayawardhana, R. Babbage, A Traffic Model for the IP Multimedia Subsystem (IMS), 2007 IEEE
4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
5. C. Chi Bell Laboratories, Alcatel-Lucent chic, Hao Bell Laboratories, Alcatel-Lucent D.Wang Bell Laboratories, Alcatel-Lucent Z.
Cao Institute of Information Science Beijing Jiaotong University,
6. Modelling IMS Presence Server: Traffic Analysis &Performance, 2008 IEEE
7. Muhammad T. Alam, Graduate Student Member IEEE, Zheng Da Wu, Member IEEE Admission Control Approaches in the IMS,
Presence Service, international journal of computer science volume 1 number 1 2006
8. Improving traffic performance on IMS network, BA Alassane, OUYA Samuel, FARSI Sidi Mohamed, May 2013
9. Giuseppe Carella et al, Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based
Architectures/4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal.
10. The Building of Multimedia Communications Network based on Session Initiation Protocol, Han Yuexiao , Zhang Yanfu, 2012
International Conference on Solid State Devices and Materials Science
11. A Survey on Femtocells: Benefits Deployment Models and Proposed Solutions, S.A. Mahmud1, G.M. Khan1, H. Zafar, K.
Ahmad and N Behttani, Journal of Applied Research and Technology, Volume 11, Issue 5, October 2013, Pages 733 -754
12. Amirsaidov U. - Models and methods for calculating the network characteristics taking into account the fractal nature of traffic. "The
Society of Digital Policy & Management”, 2014, Korea, p.301-307.
13. Usmanova N. - Agent-based modeling of distributed environment: assigning properties to agent. Eighth World Conference on
Intelligent Systems for Industrial Automation, Proceedings. WCIS 2014, 25-27 November 2014, Tashkent. (70с.)
801. Keyword : Commissioners Board, Audit Committee, Board of Directors, Return on Asset, Return on Equity
References: 4610-
14. R. D. Retno and D. Priantinah, “The effect of Good Corporate Governance dan Corporate Social Responsibility Disclosure on Company 4613
Value” Jurnal Nominal, vol. 1, no. 1, pp. 84-103, 2014.
15. W. Ardimas and Wardoyo, “The effect of Financial Performance and CSR on Company Value on Banking Industry,” Jurnal Manajemen
dan Bisnis, vol. 18, no. 1, pp. 57-66, 2014.
16. M. Monika, “The Impact of Financial Performance on Company Value in Manufacturing Industry,,” Jurnal Manajemen dan Bisnis, vol.
12, no. 1, pp. 1-16, 2014.
17. Almilia and L. Spica, “Factors Affecting CSR Disclosure, and the Impact of Company Size” Fokus Ekonomi, vol. 10, no. 1, pp. 50-68,
2011.
18. Imam Ghozali, Multivariate Analysis Using SPSS 23. Semarang: Badan Penerbit Universitas Diponegoro, 2016.
19. P. S. Anjarsari and H. N. Andriati, “The Effect of Good Corporate Governance and Environmentsl Performance on Comapny Value”
Jurnal Akuntansi dan Keuangan Daerah, vol. 11, no. 2, pp. 52-59, 2016.
20. F. Fiadicha and R. Hanny, “ The Impact of Good Corporate Governance, Corporate Social Responsibility and Financila Performance on
Company Value,” Jurnal Akuntansi Manajerial, vol. 1, no. 1, pp. 22-45, 2016.
21. W. Sucuahi and J. M. Cambarihan, “Influence of Profitability to the Firm Value of Diversified Companies in the Philippines,” Accounting
and Finance Research, vol. 5, no. 2, pp. 149-153, 2016.
22. I. P. M. J. S. Putra and N. M. R. Juniariani, “An Analyisi on Financial Performance Ratio Towards Company,” Jurnal Riset Akuntansi, vol.
7, no. 2, pp. 143-150, 2017.
Keyword : Watermarking, Exponential, Computational time, Bulk data and Security analysis.
References:
1. Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu and Yixian Yang, “A Novel Digital Watermarking Based on General Non -Negative
Matrix Factorization,’’ IEEE Transactions on Multimedia, Vol.20, No.8, pp. 1973-1986, 2018
2. Mehran Andalibi and Damon M. Chandler, “Digital Image Watermarking via Adaptive Logo Texturization,’’ IEEE Transactions on Image
Processing, Vol.24, No.12, pp. 5060-5073, 2015
3. Prajwalasimha S N et. al., “Performance analysis of DCT and successive division based digital image watermarking scheme,” Indonesian
Journal of Electrical Engineering and Computer Science, Vol. 15, No. 2, pp. 750-757, 2019
4. Prajwalasimha S N and Basavaraj L, “Performance Analysis of Transformation and Bogdonov Chaotic Substitution based Imag e
Cryptosystem,” International Journal of Electrical and Computer Engineering, Vol. 10 , No. 1, 2020, pp. 188-194
5. Anupama Shetter et. al.,“Image de-noising algorithm based on filtering and histogram equalization,” Proceedings of the International
Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2018, pp. 325-338
6. Prajwalasimha S N and Basavaraj L, “Design and Implementation of Transformation and non-Chaotic Substitution based Image
Cryptosystem,” International Journal of Engineering and Advanced Technology, Vol. 8, Issue 6, pp.1079-1083, 2019
7. Prajwalasimha S.N., Sowmyashree A.N., Suraksha B., Shashikumar H.P. (2019) Logarithmic Transform based Digital Watermarking
Scheme. In: Pandian D., Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational
Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30.
Springer, Cham
8. Prajwalasimha S N and Pavithra A C, “Digital Image Watermarking based on Successive Division,” Proceedings of IEEE International
Conference on Communication and Electronics Systems, pp. 31-35, 2018
9. Prajwalasimha S N et al.,“ Digital Image Watermarking Based on Sine Transformation with Constant Co-Efficient,” Proceedings of the
International Conference on Inventive Research in Computing Applications, pp. 21-24, 2018
10. Prajwalasimha S.N., Sonashree S., Ashoka C.J., Ashwini P. (2019) Digital Image Watermarking Using Sine Transform Technique. I n:
Pandian D., Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-
Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, Vol 30. Springer, Cham
11. Prajwalasimha S N et. al, “Performance Analysis of Combined Discrete Fourier Transformation (DFT) and Successive Division based
Image Watermarking Scheme,” International Journal of Recent Technology and Engineering, Vol. 8, Issue 3, 2019, pp. 34 -39
12. Prajwalasimha S N et. al., “Digital Image Watermarking based on Sine Hyperbolic Transformation,” Proceedings of 3rd IEEE
International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1245-1250, 2019
13. Prajwalasimha S N et. al., “Design and Implementation of Image Watermarking Scheme based on Exponential Function,” International
Journal of Innovative Technology and Exploring Engineering, Vol. 8, Issue 12, 2019, pp.5789-5792
14. Prajwalasimha S.N. (2019) Pseudo-Hadamard Transformation-Based Image Encryption Scheme. In: Krishna A., Srikantaiah K., Naveena
C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Spring er,
Singapore
15. Prajwalasimha S N and Bhagyashree S R, “ Image Encryption using Discrete Radon Transformation and Non chaotic Substitution,” Proc.
of IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 842-846, 2017
16. Prajwalasimha S N and Usha Surendra, “Multimedia Data Encryption based on Discrete Dyadic Transformation,” Proc. of IEEE
International conference on Signal processing and Communication, pp. 492-496, 2017
17. Prajwalasimha S N et. al., “Design and analysis of pseudo hadamard transformation and non-chaotic substitution based image encryption
scheme,” Indonesian Journal of Electrical Engineering and Computer Science, Vol. 15, No. 3, 2019, pp. 1297-1304
18. Prajwalasimha S N et. al., “On the Sanctuary of a Combined Confusion and Diffusion based scheme for Image Encryption,” International
Journal of Engineering and Advanced Technology, Vol. 9, Issue 1, pp.3258-3263, 2019
19. Azz El Arab El Hossaini and Mohamed El Aroussi, “A New Robust Blind Watermarking Scheme based on Steerable pyramid and DCT,”
Journal of Computers, Vol. 9, pp. 2315-2327, 2014.
20. Yong-Seok Lee, et al., “Digital blind watermarking based on depth variation prediction map and DWT for DIBR free-viewpoint image,”
Signal Processing: Image Communication, Vol. 70,pp. 104–113, 2019
21. Di Fan, et al., “A blind watermarking algorithm based on adaptive quantization in Contourlet domain,” Multimedia Tools and
Applications, pp. 1-15, 2019
22. Sunesh Malik, et al., “Histogram and entropy based digital image watermarking scheme,” Information Technology, Vol. 11, No. 2 2, pp.
373-379, 2019
23. Tanya Koohpayeh Araghi, et al., “A Secure Blind Discrete Wavelet Transform based Watermarking Scheme Using Two -level Singular
Value Decomposition,” ESWA, Elsevier, vol. 6, pp. 23733-23746, 2018
24. Zhuhong Shao et al.,“ Robust Watermarking using Orthogonal Fourier-Mellin Moments and Chaotic Map for Double Images,”
International journal of Signal Processing, Vol. 120, pp. 522-531, 2016
Yusri Yakub, Sadzali Hassan, Asmadi Ishak, Siti Hartini Azmi, Rozaireen Muszali, Yusop Ahmad &
Authors:
Zulakbal Abd Karim
The Influence of Infrastructure, Accountability and Teacher Competency towards Teaching Process
Paper Title:
Implementation in Physical Education and Health
Abstract: The purpose of this study is to look and review the implementation of Physical Education and
Health (PJK) teaching in secondary schools as well as factors that support teaching and learning. This PJK subject
in school covers aspects of infrastructure and equipment as well as teachers' accountability and competency
involved in the implementation of the teaching for this subject. The results showed that there was a significant
relationship between teacher competency, accountability and teaching experience, options and graduation. The
806. findings also show that there is a significant relationship between school facilities in the teaching and learning
process of PJK. In conclusion, the effectiveness of the teaching and learning process in Physical Education and 4637-
Health subjects depends on the competency, accountability of teachers and school infrastructure in planning well 4639
teaching sessions.
807. Keyword : P-I controller, I-P controller, FOPTD model, HOPTD model, peak overshoot, Jietae Lee et al tuning
formulas. 4640-
References: 4644
1. Seborg, D. E.; Mellichamp, D. A.; Edgar, T. F.; Doyle, F. J., III. Process Dynamics and Control, 3rd ed.; Wiley: Hoboken, NJ, 2011.
2. Marlin, T. E. Process Control: Designing Processes and Control Systems for Dynamic Performance, 2nd ed.; McGraw-Hill: New York,
1995.
3. Ziegler, J. G.; Nichols, N. B. Optimum Settings for Automatic Controllers. Trans. ASME 1942, 64,759−768.
4. Cohen, G. H.; Coon, G. A. Theoretical Considerations of Retarded Control. Trans. ASME 1953, 75,827−834.
5. Lee, J.; Lee, Y.; Yang, D. R.; Edgar, T. F. Half Order Plus Time Delay (HOPTD) Models to Tune PI Controllers. AIChE J. 2017, 63,
601−609.
6. Lee, J.; Lee, Y.; Yang, D. R.; Edgar, T. F. Simple Proportional Integral Controller Tuining Rules for FOPTD and HOPTD Models Based on
Matching Two Asymptotes. ACS J. 2018, 57, 2905-2916.
7. Skogestad, S. Simple Analytic Rules for Model Reduction and PID Controller Tuning. J. Process Control 2003, 13,291−309.
8. F. Ahmed, A. Tobshy, A. Mahfouz, M. Ibrahim. "PI and IP controllers in a closed loop for DC motor drives."Power Conversion
Conference-Nagaoka 1997.,Proceedings of the. Vol. 2. IEEE, 1997.
Paper Title: Managing Inrush Current using Hot Swap and OR-ing FET
Abstract: Critical, high availability systems will always rely on redundant power for continuous operation
when the default power fails or becomes unavailable. When the back-up system kicks in, there will be a huge
inrush current depending on load. The consequences of inrush current can be reduction of output voltage, tripping
of protective devices, damage to sensitive devices either on at the load or on the back-up system itself and
eventually system failure. This dissertation studies the effects of inrush current on an already existing Redundant
Power Distribution System (RPDS). A review of existing technique to control inrush current is presented. A new
solution has been implemented on the Redundant Power Distribution System such that the functionality of overall
system is preserved. Finally, performance of existing solution on RPDS and new solution are compared.
808.
Keyword : inrush current, RPDS 4645-
4649
References:
1. E. J. Lee, et al., “Comparative Analysis of Active Inrush Current Limiter for High-Voltage DC Power Supply System” Oct 2012, 2012
IEEE Vehicle Power and Propulsion Conference( VPPC ).
2. C. S. Mitter, “Active Inrush Current Limiting Using MOSFETs”, Motorola Inc. 1995
3. Vrej Barkhordian, “Power MOSFET Basics”, International Rectifier, 2003
4. Alek Kaknevicius and Adam Hoover, “Managing Inrush Current”, Texas Instruments, Aug 2014
5. OrCAD Capture 16.6, fast, intuitive PCB schematics design solution.
6. “How to stop Inrush Current”, Ametherm
7. LTC4371, Negative Voltage Ideal Diode OR-ing Controller
8. LTC4252, Negative Voltage Hot-Swap Controller .
Paper Title: Design Improvement of Four Bar Linkages Using Different Soft-Computing Methods
Abstract: Modeling of optimized flexible four bar mechanism considering joint clearances are developed at
first. The dynamic analysis such as Moment, Torque, Energy and structural analysis such as Deformation, different
mode of Stress are done by considering load in coupler point of optimized flexible four bar linkage. The
deformation and stress are compared by considering different materials. Lagrange's equation is used to define the
direction of the joint clearance. Differential evolution algorithm is used to optimize the length of links which
reduce the gap between the desirable and actual path.
Keyword : Optimized linkage; dynamic and structural analysis; Lagrange’s equation; differential evolution
References:
1. S. Erkaya and I. Uzmay, Determining link parameters using genetic algorithm in mechanisms with joint clearance, Mechanism and
810. Machine Theory 44 (2009), 222-234.
2. S. D. Yu and W.L. Cleghorn, Dynamic instability analysis of high speed flexible four-bar mechanism, Mechanism and Machine Theory 37 4653-
(2002), 1261-1285. 4656
3. Mihai Dupac and David G. Beale, Dynamic analysis of a flexible linkage mechanism with cracks and clearance, Mechanism and Machine
Theory 45 (2010), 1909-1923.
4. Yue Qing Yu and Bin Jiang, Analytical and experimental study on the dynamic balancing of flexible Mechanisms, Mechanism and
Machine Theory 42 (2007), 626-635.
5. M. J. Tsai and T.H. Lai, Kinematic sensitivity analysis of linkage with joint clearance based on transmission quality, Mechanism and
Machine Theory 39 (2004) 1189-1206.
6. T. Furuhashi, N. Morita and M. Matsurra, Research on dynamics of four-bar linkage with clearances at turning pairs (1st report, General
theory of continuous contact model), Bulletin of the JSME 21 (1978), 518-523.
7. N. Morita, T. Furuhashi and M. Matsurra, Research on dynamics of four-bar linkage with clearances at turning pairs (2nd report, Analysis
of crank level mechanism with clearance at joint of crank and coupler using continuous contact model), Bulletin of the JSME 21 (1978),
1284-1291.
8. Hong-Sen Yan and Ren-chung Soong, Kinematic and dynamic design of four-bar linkages by links counter weighing with variable input
speed, Mechanism and Machine Theory 36 (2001), 1051-1071.
9. B. Feng, N. Morita and T. Torii, A new optimization method for dynamic design of planar linkage with clearances at joints - Optimizing
the mass distribution of links to reduce the change of joint forces, Transactions of the ASME (2002).
10. Ruby Mishra, T. K. Naskar and Sanjib Acharya, Synthesis of coupler curve of a four-bar linkage with joint clearances, International
Journal of Engineering Research and Application (IJERA), ISSN: 2248-9622 (2003), 1193-1199.
Ruby Mishra, T. K. Naskar and Sanjib Acharya, Path synthesis of four-bar linkages with joint clearances using DE algorithm, Proceedings
of the National Conference on Trends and Advances in Mechanical Engineering (2012).
Paper Title: Nano Power Current Reference Circuit consisting of Sub-threshold CMOS Circuits
Abstract: a low voltage CMOS Nano power current reference circuit has been presented in this paper and also
the circuit simulation performance in 180-nm UMC CMOS technology. Most of the MOSFETs operate in sub-
threshold region consisting of bias-voltage, start-up and current-source sub-circuits. A stable reference current of 4-
nA lying in supply voltage range of 1 V-1.8 V has been generated with line sensitivity of 0.203% /V. Within the
temperature range of 0°C to 100 °C, and the voltage level of 1.8 V, the temperature coefficient was 7592ppm/°C.
At the same voltage supply, the power dissipation was found out to be 380 NW. It is suitable to use this circuit in
sub threshold power aware large scale integration.
Paper Title: Flexural, Impact and Tensile Properties of Banana/ PLA Composite
Abstract: In this work, the common fiber picked as banana fiber. Unidirectional mats were created and
layered up, course of action with PLA gum network. The overlay is fabricated utilizing hand lay-up system. The
Mechanical properties, for example, rigidity, flexural quality and effect quality are broke down on the created
material. Too Miniaturized scale structure of the composite is examined utilizing checking electron magnifying lens
(SEM). Specimens were cut from the created cover as indicated by the ASTM models for various analyses. For
Tensile test and flexural test tests were cut fit as a fiddle and level bar shape separately. After that investigation is
performed under UTM. Impact, Flexural and Tensile quality were watched and contrasted with base estimations of
PLA polymer to see the adjustment in quality. SEM investigation was done to discover the method of
disappointment.
Paper Title: Experimental Research on Roselle / Glass Fibre Hybrid Polymer Composites
Abstract: Varieties in tractable and sway properties of Roselle fiber strengthened polyester composites
brought about by the expansion of glass fiber have been investigated. Roselle fiber in mix with glass is magnificent
for making economically savvy composite materials. The impact of the plan of glass and Roselle fiber in the
readiness of composites have likewise been examined. Direct increment in rigidity is noted because of the
expansion of glass. Be that as it may, when lower volume portion of glass is utilized, a cozy blend of Roselle fiber
and glass demonstrates the most elevated rigidity. The effect quality demonstrates the most noteworthy worth when
a glass volume part of 0.12 is utilized.
Paper Title: Solutions to Overcome Ipv4/Ipv6 Compatibility Issues In Vehicular Adhoc Networks
Abstract: Researchers found that Internet Protocol Version 6 (IPv6) can be considered since it is the
important communication protocol for internet access during driving, location privacy in Vehicular Adhoc
Networks (VANET). TCP/IP allows devices to interact online. A unique IP address allows each device to
communicate with each other over the internet. From the desktop computers to tablets, to PS4s, to mobile phones,
to cars, to airplanes, to IP enabled washers and dryers, lot of things will be connected online. It needs a lot more
addresses than that are available today. IPv6 was created in the mid-’90s to make the internet grow. It is not
backward compatible with IP version 4, but both IPv4 and IPv6 protocols can run simultaneously over the same
wires. This requires a transition from IPv4 to IPv6 and vice-versa. The IPv6 layer is a vital issue in the field of
Intelligent Transportation System (ITS). The vehicles possess heterogeneous devices like sensors, Global
Positioning System (GPS), IPv4 addressing and IPv6 addressing. IPv4 addresses are depleting and IPv6 addressing
came into existence. When the Road Side Unit (RSU) communicate with gateway and with vehicular cloud using
IPv4 and IPv6 addressing, compatibility issues occur. This paper mainly focuses on the IPv4/IPv6 compatibility
issues and the possible solutions to overcome the compatibility issues during the dissemination of data in VANET.
Authors: Chesnov K.S., Chanchina A. V.Fedorova A.N., Zanozin N.V., Makeeva A., Bystrova N.V., Trostin V.L.
Paper Title: Program and Methodological Support of the Educational Process in the Magistracy
Abstract: The article is devoted to the issues of program and methodological support of the educational
process in the preparation of undergraduates. In accordance with the requirements of educational standards for
magistracy, the author considers a competency-based approach to the educational process in a university. The
effectiveness of the developed electronic-methodical complexes according to the programs of educational training
of the magistracy is noted. The author also describes the developed electronic courses.
Keyword : software and methodological support, magistracy, educational process, methodological support.
References:
1. V.N., Dobudko E.S., Zhuranova N.A. Realization of the didactic potential of the informatics project activity within the framework of
cooperation of school-pedagogical university (2017) Balkan Scientific Review 2017 No. 1 pp.5-8.
2. Bogorodskaya, O.V., Golubeva, O.V., Gruzdeva, M.L., Tolsteneva, A.A., Smirnova, Z.V.Experience of approbation and introduction of
the model of management of students’ Independent .work in the university(2018) Advances in Intelligent Systems and Computing, 622,
pp. 387-397
3. Ilyashenko, L.K., Smirnova, Z.V., Vaganova, O.I., Chelnokova, E.A., Kaznacheeva, S.N.Methods of conducting practical training on the
subject "power sources for welding"(2019) International Journal of Mechanical Engineering and Technology, 10 (2), pp. 908 -917.
4. Gruzdeva, M.L., Vaganova, O.I., Kaznacheeva, S.N., Bystrova, N.V., Chanchina, A.V.Modern Educational Technologies in Professional
Education(2020) Lecture Notes in Networks and Systems, 73, pp. 1097-1103.
5. Fedorov, A.A., Sedykh, E.P., Mialkina, E.V.University of education: Structure and main components of management(2019) European
Journal of Educational Research, 8 (4), pp. 1257-1268.
6. Smirnova, Z.V., Vaganova, O.I., Chanchina, A.V., Koldina, M.I., Kutepov, M.M.Development of Research Activity of Future Econo mists
in the University(2020) Lecture Notes in Networks and Systems, 73, pp. 371-379.
818. 7. Zhytukhina K. P. Realization of the pedagogical condition for improving the process of formation of responsible attitude to future
profession in students of pedagogical universities (2017) Scientific Vector of the Balkans 2017 No. 1 pp.26-30. 4691-
8. Bezliudnyi O.I., Kobulianska T.V. Model of formation of preparation of future psychologists to work with teen families in the professional 4694
training process (2017) Balkan Scientific Review 2017 No. 1 pp. 9-14.
9. Prokhorova M.P., Semchenko A.A. Involving of trainees-future teachers of professional training in project activities in the discipline.
Vestnik of Minin University. 2018. vol. 6, no. 2. p. 6. DOI: 10.26795/2307-1281-2018-6-2-6.
10. Linkov A.Y., Klinkov G.T.Person-oriented learning based on its sociological derivation (2018) Scientific Vector of the Balkans 2018 No.
1 pp.5-7.
11. Vaganova, O. I., Smirnova, Zh. V., Markova, S. M., Chaikina, Zh. V., & Bulaeva, M. N. (2019). Organization of partnerships fo r
additional educational services on the example of the interaction of the educational institution with the health and cultural centre.
Perspektivy nauki i obrazovania – Perspectives of Science and Education, 39 (3), 500-514. doi: 10.32744/pse.2019.3.38
12. Kobernyk O.M., Stetsenko N.M., Boichenko V.V., Pryshchepa S.M. Improving professional and pedagogical training of future teachers by
moodle platforms (On the example of the course "Pedagogy") (2018) Scientific Vector of the Balkans 2018 No. 1 pp.5-7.
13. Chirva A.N., Chirva O.G. Contents and method of professionally oriented training of informatic disciplines of future teachers of
technologies (2018) Scientific Vector of the Balkans 2018 No. 1 pp.27-31.
14. Bartkiv O. S., Durmanenko E. A. Interactive methods in the process of future teachers’ training for the higher education institutions
modeling (2018) Humanitarian Balkan Research 2018. No. 1 pp.30-32.
15. Smirnova Zh.V., Krasikova O.G. Modern tools and technologies for assessing learning outcomes. Vestnik of Minin University. 2018. Vol.
6, no. 3. Р. 9. DOI: 10.26795/2307-1281-2018-6-3-9.
16. Oros I.I. Formation and development of the system of continuous education of adults in different countries of the world (2017 ) Balkan
Scientific Review 2017 No. 1 pp. 19-24.
17. Ihnatenko H.V., Ihnatenko K.V. Formation of self-dependence as a professional ly-important personality trait of a future vocational
education teacher by means of case-technology (2018) Humanitarian Balkan Research 2018. No. 1 pp. 40-42.
18. Sazhienko A. P. Characteristics of components, criteria and levels of faculty competence in the future bacalaurs of computer technologies
(2017) Scientific Vector of the Balkans 2017 No. 1 pp.22-35.
19. Myalkina E.V., Sedhyh E.P., Zhitkova V.A., Vaskina V.A., Isaykov O.I. University resource center as an element of social development of
the region // Vestnik of Minin University. 2018. Vol. 6, no. 3. Р. 1. DOI: 10.26795/2307-1281-2018-6-3-1.
20. Denysenko S.M. Application of quest technology in the professional training OF Bachelor of Publishing and Polygraphy in Higher School
(2018) Balkan Scientific Review 2018 No. 1 pp. 29-33.
21. Vaganova O.I., Ilyashenko L.K. The main directions of implementation technologies of student-centered education in high school. Vestnik
of Minin University. 2018. vol. 6, no. 3. p.2 DOI: 10.26795 / 2307-1281-2018-6-3-2.
22. Garnevska S.M. opportunities for forming communication technology images in training in technology and entrepreneurship (2018 )
Balkan Scientific Review 2018 No. 1 pp. 34-37.
23. Sedykh, EP; Zanfir, LN; Vaganova, OI; Smirnova, ZV; Bulayeva, MN Use of training technology in the preparation of students of
engineering specialties (2019) AMAZONIA INVESTIGA Vol. 8 Núm. 18: 461-470.
24. Vaskovskaya G.A. Features of implementation of pedagogical technologies of profile training (2018) Balkan Scientific Review 2018 No. 1
pp. 76-79.
25. Filimonova I.A. Using of innovative technologies in the process of professional competencie’s forming of the future food tech nologies
bachelors (2017) Humanitarian Balkan Research 2017. No. 1 pp.5-8.
26. Vaganova, O. I., Smirnova, Zh. V., Markova, S. M., Chaikina, Zh. V., & Bulaeva, M. N. (2019). Organization of partnerships for
additional educational services on the example of the interaction of the educational institution with the health and cultural centre.
Perspektivy nauki i obrazovania – Perspectives of Science and Education, 39 (3), 500-514. doi: 10.32744/pse.2019.3.38
27. Kustov Yu. A. Livshits Yu. A., The connection of training with production as a leading factor in the formation of reference o f the
university (2017) Scientific vector of the Balkans 2017 No. 1 pp.14-17.
Authors: Chandra Mani Sharma, Alaknanda Ashok, Alok Kumar Singh Kushwaha
Paper Title: Human Action Recognition using Rule based Fuzzy Motion Feature Templates
Abstract: This paper proposes a technique for human activity recognition in a video stream. To achieve high
accuracy in activity recognition results, the method in its initial step deploys temporal template matching to
recognize activities. As temporal templates are susceptible to get affected by speed, style and performance pattern
of activity, so it becomes difficult to accurately differentiate among closely similar activities (e.g walking, running
and jogging). The confusion in recognizing activities is reconciled by subsequent rule based activity distinction.
The proposed method recognizes the human activities in video on various bench-marked data sets including KTH
Dataset and Weizmann Dataset. Experimental results demonstrate the novelty of method with a wide spectrum of
varied conditions. The average accuracy of the method is 97.20% under standard conditions.
Keyword : Human activity recognition, computer vision, rule based approach, video content management and
analysis, motion feature templates.
References:
1. Vishwakarma, S., & Agrawal, A. (2013). A survey on activity recognition and behavior understanding in video surveillance. Int. J.
The Visual Computer, 29(10), pp 983-1009.
819. 2. Robertson, N., & Reid, I. (2006). A general method for human activity recognition in video. Computer Vision and Image
Understanding, 104(2-3), 232-248.
3. Kushwaha, A. K. S., Sharma, C. M., Khare, M., Srivastava, R. K., & Khare, A. (2012). Automatic multiple human detection and 4695-
tracking for visual surveillance system. In 2012 IEEE International Conference on Informatics, Electronics & Vision (ICIEV) , pp. 4700
326-331
4. Chaquet, J. M., Carmona, E. J., & Fernández-Caballero, A. (2013). A survey of video datasets for human action and activity
recognition. Computer Vision and Image Understanding, 117(6), pp 633-659.
5. Kushwaha, A. K. S., Sharma, C. M., Khare, M., Prakash, O., & Khare, A. (2014). Adaptive real-time motion segmentation technique
based on statistical background model. The Imaging Science Journal, 62(5), pp 285-302.
6. Johansson, G. (1973). Visual perception of biological motion and a model for its analysis. Perception & psychophysics, 14(2), pp
201-211.
7. Sharma, C. M., Kushwaha, A. K. S., Nigam, S., & Khare, A. (2011, September). On human activity recognition in video sequences .
In 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011), pp. 152-158
8. Bobick, A. F., & Davis, J. W. (2001). The recognition of human movement using temporal templates. IEEE Transactions on Patter n
Analysis & Machine Intelligence, (3), pp 257-267.
9. Sharma, C. M., Singh Kushwaha, A. K., Nigam, S., & Khare, A. (2011, July). Automatic human activity recognition in video using
background modeling and spatio-temporal template matching based technique. In Proceedings of the ACM International Conference
on Advances in Computing and Artificial Intelligence (pp. 97-101)
10. Kumar, P., Ranganath, S., Weimin, H., & Sengupta, K. (2005). Framework for real-time behavior interpretation from traffic video.
IEEE Transactions on Intelligent Transportation Systems, 6(1), 43-53.
11. Ahad, M. A. R., Tan, J. K., Kim, H., & Ishikawa, S. (2012). Motion history image: its variants and applications. Machine Vision and
Applications, 23(2), 255-281.
12. Kim, K., Chalidabhongse, T. H., Harwood, D., & Davis, L. (2005). Real-time foreground–background segmentation using codebook
model. Real-time imaging, 11(3), 172-185.
Authors: Sharberi, S. N. M., Yee, M. H., Ibrahim, M. R., Kok, B. C., Yeo, K. J.
Module Development of Teaching Soft Skills Application in Learning and Facilitating Theory Class for
Paper Title:
Technical
Abstract: Nowadays, Malaysia is moving towards being a developed nation in which it has worked hard to
develop the country, especially in the field of Technical and Vocational Education Training (TVET) which is
strongly emphasized in producing first-class human capital. The application of seven (7) elements of soft skills (KI)
which are communication skills, leadership skills, skills work skills, professional entrepreneurship, morals and
820. ethics, continuous learning and information management, critical thinking and problem solving skills should be
emphasized to the students. Mastering soft skills is very important to technical students as it is demanded by the
4701-
industry. Hence, the purpose of this study is to develop the Soft Skill Implementation Teaching Module in
4705
Teaching and Learning Theory Class for Technical Lecturers. The objective of this study is to identify the
suitability of the format, content and functionality of the module based on the feedback of the technical lecturers.
The development of this module uses the Sidek model while the content of the module is based on UTHM
publisher guidelines. The researcher chose the Sidek model as the module development model because it has
systematic steps to develop the module. The Sidek model has two phases where the first phase is the draft phase
and the second phase is the testing and evaluation phase. Each module built is considered a draft before it is
evaluated and tested for its effectiveness. In addition, this study uses the quantitative approach involving ten (10)
technical lecturers at FPTV, UTHM. The data were descriptively analyzed and presented in the form of frequency
and percentages. The findings have shown that 97.27% of technical lecturers agree with the design format, 98%
agree with the suitability of the module content and 100% agree with the functionality of the Soft Skill
Implementation Teaching Module in Teaching and Learning Theory Class for Technical Lecturers. In conclusion,
this module is suitable to be used by technical lecturers as a guidance and references in applying soft skills
systematically.
Keyword : Animal Detection, Animal Vehicle Collision Accident Prevention, Sensors, Road Safety
References:
1. D. MOHAN, “Road Accidents in India,” IATSS Res., vol. 33, no. 1, pp. 75–79, 2009
2. Druta C., Alden A., Evaluation of a Buried Cable Roadside Animal Detection System, Virginia Transportation Research
Counsil,2015 “http://www.virginiadot.org/vtrc/main/online_reports/pdf/15-r25.pdf”
3. Cattle—The Real Menace on Indian Highways, [Online]. Available: http://www.team-bhp.com/forum/streetexperiences/144117-
cattle-real-menace-indian-highways.html accessed on Oct 31, 2019.
4. L. ANNE , “Detection Systems Reduce Collisions with Wildlife on Rural Highways,”
821. https://www.photonics.com/Article.aspx?AID=39644 , accessed on Oct 31, 2019.
5. Cram, Randall S., Roadside deer warning method and system 17 Aug 1999 Patent number US5939987 4706-
6. Hykawy, H., Roadside Animal Detection and Warning System, Oct. 10, 2002, Patent number US 20020145519A1
7. Sugimoto, T., Ohkawa, S. et al., Passive Type Moving Object Detection System, Oct. 24, 1995, Patent number 5,461,231 4710
8. Wishart, J., Infrared Animal Detector and Driver Warning System, May 6,1997, Patent number 5,627,518.
9. M. P. Huijser, a. Kociolek, P. McGowen, a. Hardy, a. P. Clevenger, and R. Ament, “Wildlife-Vehicle Collision and Crossing
Mitigation Measures: A Toolbox for the Montana,” no. April, pp. 1–112, 2007.
10. https://www.itsrm.org/itd-exploring-wildlife- detection-system-in-northern-idaho-to-improve-driver-safety/ [accessed online 29-10-
2019]
11. Wood, C. Roadside Systems Detect Wildlife to Prevent Collisions. http://www.govtech.com/public-safety/Roadside-Systems-Detect-
Wildlife-to-Prevent-Collisions.html , August, 2017, accessed on Oct 31, 2019.
12. Sharma, S.U. and Shah, D.J., A Practical Animal Detection and Collision Avoidance System Using Computer Vision
Technique.2017, IEEE Access, 5, pp.347-358.
13. http://www.camrix.net/alert.html, accessed on Oct 31, 2019.
14. Christiansen, P.; Steen, K.A.; Jørgensen, R.N.; Karstoft, H. Automated detection and recognition of wildlife using thermal cameras.
Sensors 2014, 14, 13778–13793
15. J. Chen, H. Xu, J. Wu, R. Yue, C. Yuan, and L. Wang, “Deer Crossing Road Detection with Roadside LiDAR Sensor,” IEEE
Access, vol. 7, pp. 65944–65954, 2019.
16. Z. Zhang, Z. He, G. Cao and W. Cao, "Animal Detection from Highly Cluttered Natural Scenes Using Spatiotemporal Object Region
Proposals and Patch Verification," in IEEE Transactions on Multimedia, vol. 18, no. 10, pp. 2079-2092, Oct. 2016.
17. Z. Zhang, T. X. Han and Z. He, "Coupled ensemble graph cuts and object verification for animal segmentation from highly cluttered
videos," 2015 IEEE International Conference on Image Processing (ICIP), Quebec City, QC, 2015, pp. 2830-2834.
18. Verma G.K., Gupta P. (2018) Wild Animal Detection Using Deep Convolutional Neural Network. In: Chaudhuri B., Kankanhalli M.,
Raman B. (eds) Proceedings of 2nd International Conference on Computer Vision & Image Processing. Advances in Intelligent
Systems and Computing, vol 704. Springer, Singapore
19. M. A. Sharafsaleh, M. P. Huijser, T. Kuhn, J. Spring, and J. Felder, “Evaluation of an Animal Warning System Effectiveness,” no.
April, 2012.
20. A. Mukherjee, S. Stolpner, X. Liu, U. Vrenozaj, C. Fei, and A. Sinha, “Large animal detection and continuous traffic monitoring on
highways,” Proc. IEEE Sensors, no. 2011, pp. 2–4, 2013.
Keyword : fuzzy inference system, power quality index, total harmonic distortion wavelet packet transform
References:
1. Sinha.P, Goswami.S,Debnath.S"Harmonic source identification in distribution system using non active power quantities"Int.J.power
&energyconversion,vol8,no1,2017 Inderscience Enterprises Ltd
2. Morsi.W.G , El-Hawary.M.E, “Reformulating power components definitions contained in the IEEE Standard 1459-2000 using
Discrete Wavelet Transform”,IEEE Trans. Power Del., vol. 22, no. 3, July 2007.
3. Barbaro, P. V., Cataliotti, A., Cosentino, V., & Nuccio, S. (2007). A novel approach based on nonactive power for the identification
of disturbing loads in power systems. IEEE Transactions on Power Delivery, 22(3), 1782-1789.
4. Balc ..M.E, Hocaglu.M.H Comparison of power definition for reactive power compens ation non sinusoidal in non sinusoidal
condition ,11 th International conference on harmonic & quality of power 2004.
5. Karthik, N., Gafoor, S. A., & Surya Kalavathi, M. (2012). Classification of Power quality problems by wavelet Fuzzy expert system.
822. In Advanced Materials Research (Vol. 463, pp. 1573-1578). Trans Tech Publications. Karthik.N, Gafoor.S, Kalavathi.M
6. Nath.S,P.Sinha.P," Measurement ofPower Quality under Nonsinusoidal condition using Wavelet and Fuzzy Logic " , Third 4711-
International Conference on Power Systems, Kharagpur, INDIA December 27-29
7. Morsi.W.G, El-Hawary.M.E," Fuzzy-Wavelet-Based Electric Power Quality Assessment of Distribution Systems Under Stationary
4717
and Nonstationary Disturbances" IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 24, NO. 4, OCTOBER 2009
8. Morsi.W.G, El-Hawary.M.E"Power quality evaluation in smart grids considering modern distortion in electric power systems,
Elsevier,Electric Power Systems Research 81 (2011) 1117–1123
9. Morsi.W.G, El-Hawary.M.E, Wavelet Packet Transform-Based Power Quality Indices for Balanced and Unbalanced Three-Phase
Systems Under Stationary or Nonstationary operating Conditions, IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 24,
NO. 4, OCTOBER 2009
10. Sinha.P,Debnath.S,Goswami.S"A new wavlet and fuzzy based power quality index for distribution system under stationary and
non stationary disturbances"MFIIS ,2015 sept,ISBN: 978-1-78561-186-5
11. Cataliotti, A., & Cosentino, V. (2009). A single-point approach based on IEEE 1459-2000 for the identification of detection of
prevailing harmonic sources in distorted three phase power systems. Proc. of the Metrology and Measurement Systems, 16(2), 209-
218. ISSN 0860-8229
12. Frunt, J., Kling, W. L., & Ribeiro, P. F. (2011). Wavelet decomposition for power balancing analysis. IEEE Transactions on Power
Delivery, 26(3), 1608-1614.
13. . Ghaemi A. H., Abyaneh H. A., Mazlumi K., Harmonic indices assessment by Wavelet Transform. Electr Power Energy Syst.2011;
33: 1399-1409.
14. Vatansever F., Ozdemir A., Power Parameter calculation based on Wavelet Packet transform. Electr Power Energy Syst.2009; 31:
596-603.
15. Lin T., Domijan. On Power Quality Indices and Real Time Measurement. IEEE Trans Power Deliv. 2005; 20(4): 2552- 2562.
16. Willems J.L., Reflections on Apparent Power and Power Factor in Nonsinusoidal and Polyphase Situations.IEEE Trans Power Deliv.
2004; 19(2): 835-839.
17. J.Huang, Zhuhan Ji ang "Power quality assessment of different load catagories",Energy Procedia 141(2017) 345 -351,CPESE
2017,Elesevier
18. Lee B., Sohn D., Kim K.M. (2016) Development of Power Quality Index Using Ideal Analytic Hierarchy Process. In: Kim K.,
Joukov N. (eds) Information Science and Applications (ICISA) 2016. Lecture Notes in Electrical Engineering, vol 376. Springer,
Singapore
19. Urbina-Salas.I, Razo-Hernandez.R, Granados-Lieberman.D, Valtierra-Rodriguez.M, Torres-Fernandez .E"Instantaneous Power
Quality Indices Based on Single-Sideband Modulation and Wavelet Packet-Hilbert Transform" IEEE TRANSACTIONS ON
INSTRUMENTATION AND MEASUREMENT, VOL. 66, NO. 5, MAY 2017
Keyword : Key Generation, Quartic Polynomial, Polynomial Randomization, Key Frame Similarity,
Similarity Region Extractor, Adaptive Progression, Time Restricted Encryption, Time Restricted Decryption.
References:
1. C. Tikkinen-Piri, A. Rohunen, J. Markkula, "EU general data protectionregulation: Changes and implications for personal data
collecting companies", Comput. Law Secur. Rev., vol. 34, pp. 134-153, Feb. 2018.
2. G. Pillai, Caught on Camera: You are Filmed on CCTV 300 Times a Day in London, May 2012, [online] Available:
https://www.ibtimes.co.uk/britain-cctv-camera-surveillance-watch-london-big-312382.
3. Dey NS, Gunasekhar T (2019) A comprehensive survey of load balancing strategies using hadoop queue scheduling and virtual
machine migration. In: IEEE Access
4. A. Cavallaro, "Privacy in video surveillance", IEEE Signal Process. Mag., vol. 24, no. 2, pp. 166-168, Mar. 2007.
5. Q. M. Rajpoot, C. D. Jensen, V. Kumar, J. Svenson, "Video surveillance: Privacy issues and legal compliance" in Promoting Social
Change and Democracy Through Information Technology, Hershey, PA, USA:IGI Global, pp. 69-92, 2015.
6. C. Babel, Privacy and the EU GDPR US and UK Privacy Professionals, 2017, [online] Available:
http://www.corporatecomplianceinsights.com/wp-content/uploads/2017/11/TrustArc-Privacy-and-the-EU-GDPR-Research-Report-
09.26.17.pdf.
7. T. Naga Raja, Dr V.V. Venkata Ramana, A. Damodharam, Video Summarization using Adaptive Thresholding by Machine Learning
for Distributed Cloud Storage, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249-8958, Volume-
8 Issue-5, June 2019
8. G. Mainard, Data Protection Issues, Jun. 2018, [online] Available: https://www.localenterprise.ie/DublinCity/Start-or-Grow-your-
Business/Knowledge-Centre/eBusiness/Data-Protection-Issues/.
9. D. George, K. Reutimann, A. Tamò-Larrieux, "GDPR bypass by design? Transient processing of data under the GDPR", SSRN
Electron. J., Aug. 2018.
10. G. Petro, Facebook’s Scandal and GDPR are Creating New Opportunities for Retail, Jul. 2018, [online] Available:
https://www.forbes.com/sites/gregpetro/2018/05/27/facebooks-scandal-and-gdpr-are-creating-new-opportunities-for-
retail#481601a6626c.
11. Anonymisation and pseudonymisation | Data Protection Commissioner, Feb. 2018, [online] Available:
https://www.dataprotection.ie/en/guidance-landing/anonymisation-and-pseudonymisation.
12. S. Stalla-Bourdillon, A. Knight, "Anonymous data v. personal data-false debate: An EU perspective on anonymization
pseudonymization and personal data", Wisconsin Int. Law J., vol. 34, no. 2, pp. 284-322, 2017.
13. S. Gilad-Gutnick, E. S. Harmatz, K. Tsourides, G. Yovel, P. Sinha, "Recognizing facial slivers", J. Cogn. Neurosci., vol. 30, no. 7,
pp. 951-962, Jul. 2018.
14. In the Picture: A Data Protection Code of Practice for Surveillance Cameras and Personal Information Version 1.2., Jul. 2019,
[online] Available: https://ico.org.uk/for-organisations/guide-to-data-protection-1998/encryption/scenarios/cctv/.
15. R. Dasari, Y. Prasanth, O. Naga Raju, An analysis of most effective virtual machine image encryption technique for cloud security,
International Journal of Applied Engineering Research 12(24):15501-15508, January 2017
16. Sonal Sharma et al.,RSA algorithm using modified subset sum cryptosystem, 2011 2nd International Conference on Computer and
Communication Technology (ICCCT-2011).
Paper Title: Defected Ground Structure Printed Antenna with Triangular Slot
Abstract: Double Layer Single Feed dual resonant frequency patch antenna is presented in this paper. After
design the patch, we are etched triangular and rectangular slots at the top and bottom layer of the patch. After
design the antenna structure, we got a remarkable result and the operating frequencies are used for the various
applications of microwave Communication. Two triangular slots are designed at the top layer from the both sides of
the patch with one rectangular slot from the bottom layer and also one h-type slot is introduced at the middle
portion from the rest at bottom layer to obtain the desired resonant frequency. The different shapes of the patch
used to improve the gain bandwidth performance of the antenna. We get two operating frequencies for this
triangular shaped printed antenna. 1st frequency is applicable for microwave radiometry from aircraft to measure
824. ocean wind speed and rain characteristics in hurricanes and the other is used to design BeO POWER CHIP
RESISTOR which is applicable for Microwave and RF high power communication, microwave amplifiers and 4726-
power dividers. This paper includes an extensive analysis of simulated results for this above mentioned microstrip 4729
printed patch antenna. All results are simulated and verified by the network analyzer. Due to the basic
characteristics of proposed printed antenna, it is suitable for the applications in long distance radio
telecommunication systems. It is also applicable for satellite communication and microwave relay systems.
Keyword : Compact, Ground Plane, Layer and Feed, Operating Frequency, Slot.
References:
1. I. Sarkar, P. P. Sarkar, S. K. Chowdhury A new compact printed antenna for mobile communication. 2009 Loughborough Antennas
& Propagation Conference 16-17 Nov. 2009, Loughborough, UK.
2. Samiran Chatterjee, Joydeep Paul, Kalyanbrata Ghosh, P. P. Sarkar, D.Chanda (Sarkar) and S. K. Chowdhury “A Compact
Microstrip Antenna for WLAN Communication”, National Conference of Electronics, Communication and Signal Processing, 2011,
Paper ID: 116
3. U. Chakraborty, S. Chatterjee, S. K. Chowdhury, and P. P. Sarkar, “Triangular Slot Microstrip Patch Antenna for Mobile
Communication”, India Conference (INDICON), 2010 Annual IEEE, pp 4-7, Paper ID: 511
4. J. -Y. Jan and L. -C. Tseng, “Small planar monopole Antenna with a shorted parasitic inverted-L wire for Wireless communications
in the 2.4, 5.2 and 5.8 GHz bands” , IEEE Trans. Antennas and Propag., VOL. 52, NO. 7, July 2004, pp -1903-1905.
5. S. Chatterjee, U. Chakraborty, I.Sarkar, S. K. Chowdhury, and P. P. Sarkar, “A Compact Microstrip Antenna for Mobile
Communication”, India Conference (INDICON), 2010 Annual IEEE, pp 1-3, Paper ID: 510
6. Danideh, A., R. S. Fakhr, and H. R. Hassani, “Wideband coplanar microstrip patch antenna,” Progress In Electromagnetics Research
Letters, PIER 4, 81–89, 2008.
7. Samiran Chatterjee, Joydeep Paul, Kalyanbrata Ghosh, P. P. Sarkar and S. K. Chowdhury “A Printed Patch Antenna for Mobile
Communication”, Convergence of Optics and Electronics conference, 2011, Paper ID: 15, pp 102-107
8. J. Bahl and P. Bhartia, “Microstrip Antennas”, Artech House, Dedham, MA, 1980.
9. P Ravali, S Chatterjee, KR Reddy, N Raju, AR Kumar,” Size Deduced Printed Antenna for W-LAN Applications” - Advances in
Decision Sciences, Image Processing …, 2020, Springer book Series
10. U. Chakraborty, S. Chatterjee, S. K. Chowdhury, and P. P. Sarkar, "A compact microstrip patch antenna for wireless
communication," Progress In Electromagnetics Research C, Vol. 18, 211-220, 2011
11. R.Fallahi, A.-A.Kalteh, M. Golparvar Roozbahani, "A novel UWB elliptical slot antenna with band-notched characteristics,"
Progress In Electromagnetics Research C, Vol. 18, 211-220, 2011
12. Samiran Chatterjee, Santosh Kumar Chowdhury, Partha Pratim Sarkar and Debasree Chanda Sarkar, “Compact Microstrip Patch
Antenna for Microwave Communication”, Indian Journal of Pure & Applied Physics, Vol. 51, November 2013, pp 800-807.
13. Werner, D.H and S.Ganguly, “An overview of fractal antenna engineering research”, IEEE Antennas and Propagation Magazine,
Vol. 45, No. 1, 38-57, 2003
14. A.Aggarwal and M.V.Kartikeyan, “Pythagoras Tree: A Fractal Patch Antenna for multi-frquency and ultra-Band-Width Operations”,
Progress in Electromagnetics Research C, Vol. 16, 25-35, 2010
15. Gianvittorrio, J.P and Y. Rahmat-Samii, “Fractal Antennas: A novel antenna miniaturization technique and applications”, IEEE
Antennas and Propagation Magazine, Vol. 44, No. 1, 20-36, 2002
16. Carles Puente Baliarda, Jordi romeu and Angel Cardama, “The Koch Monopole: A small fractal antenna”, IEEE T ransactions on
antennas and propagation, Vol. 48, No. 11, 1773-1781, November-2000
17. M. Saed and R. Yadla, “Microstrip fed low profile and compact dielectric resonator antenna”, Progress in Electromagnetics
Research, PIER-56, 151-162, 2006
18. Aldo Petosa and Apisak Ittipiboon, “Dielectric Resonator Antennas: A Historical review and the current state of the Art”, IEEE
Antennas and Propagation Magazine, Vol. 52, No. 5, pp 91-116, October 2010
19. Zeland Software Inc. IE3D: MOM-Based EM Simulator. Web: http://www.zeland.com
Paper Title: Finite Element Method of Nickel Chromium and Nickel Vanadium for Alternative CNC Machine Tool
Abstract: CNC tool is generally made of high speed steel (HSS) which has shorter life due to the increasing
depth of cut. The steel shank wears within a short life time by the chips produced during machining process. And
even the tool material cannot withstand a large amount of load. The damaged tool material is analysed and an
alternate material is used to manufacture the tool. Alternate material used to manufacture the CNC tool which
would have properties superior than HSS. The objective of this paper is to analyze the temperature increase & the
thermal deformation of different materials like nickel-chromium and nickel-vanadium using Finite Element
Analysis.
Paper Title: Personality Trait Analysis by Graphology Technique using Machine Learning
Abstract: Graphology is a technique for analyzing an individual’s personality based on the given sample of
their handwriting. Graphology considers the fact that the movement of our hand is directly related to the state of our
brain. This paper implements the techniques of graphology using machine learning. The pre-defined data about the
826. analysis of handwriting is given as learning data set for the machine. An image of a handwritten text document in
jpg format is given as input to this machine. The processed output gives the personality of the individual 4734-
corresponding to the input handwriting.
4737
Keyword : Graphology, SVM algorithm, personality, analysis, sample of handwriting, pre-defined data set.
References:
1. Andrew W. Senior and Anthony J. Robinson, “An Off-Line Cursive Handwriting Recognition System”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, Vol. 20, No. 3, March 1998.
2. Bouchra El qacimy, Mounir Ait kerroum and Ahmed Hammouch, “Handwritten Digit Recognition based on DCT features and SVM
Classifier”, 2014 IEEE.
3. C. Hertel and H. Bunke, “A Set of Novel Features for Writer Identification,” Proc. Int’l Conf. Audio- and Video-Based Biometric Person
Authentication, pp. 679-687, 2003.
4. Cho, S. B. “Neural-network classifiers for recognizing totally unconstrained handwritten numerals,” IEEE Transactions on Neural
Networks, Volume 8, Issue 1, 1997, pp.43–53.
5. C.L. Liu, K. Nakashima, H. Sako, and H. Fujisawa, “Handwritten digit recognition: benchmarking of state-of-the-art techniques,” Pattern
Recognition, vol. 36, no. 10, pp. 2271–2285, 2003.
6. Dharam Veer Sharma, Geeta Saini, Mohit Joshi, “Statistical Feature Extraction Methods for Isolated Handwritten Gurumukhi Script”, Vol.
2, Issue 4, July-August 2012, pp.380-384.
7. D. M. Monro, S. Rakshit, and D. Zhang, “Dct-based iris recognition,” Pattern Analysis and Machine Intelligence, IEEE Transactions on,
vol. 29, no. 4, pp. 586–595, 2007.
8. D.Y.C. Leung, C.H. Liu, “Limitations of the relative standard deviation of win percentages for measuring competitive balance in sports
leagues” Economics Letters, Volume 109, Issue 1, October 2010, pp. 38-41.
9. Effective Multiple-features Extraction for Off-line SVM-Based Handwritten Numeral Recognition. By Shen-Wei Lee and Hsien-Chu Wu.
2012 IEEE.
10. H.Bunke, M. Roth, and E.G. Schukat-Talamazzini, “Off-Line Cursive Handwriting Recognition Using Hidden Markov Models,” Pattern
Recognition, vol. 28, no. 9, pp. 1399-1413, 1995.
11. Hu Guosheng, Zhang Guohong, “Comparison on neural networks and support vector machines in suppliers' selection,” Journal of Systems
Engineering and Electronics, Volume 19, Issue 2, April 2008, pp. 316̽ 320.
12. Jaime Melendez, Miguel Angel Garcia, Domenec Puig, Maria Petrou. “Unsupervised texture-based image segmentation through pattern
discovery,” Computer Vision and Image Understanding, Volume 115, Issue 8, 2011,pp. 11211133.
13. J.C. Simon and O. Baret, “Regularities and Singularities in Line Pictures,” Int’l J. Pattern Recognition and Artificial Intelligence, vol. 5,
nos. 1-2, pp. 57-77, 1991.
14. J.F. Canny, “A Computational Approach to Edge Detection,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 8, pp. 679–698,
1986.
15. Krishna S. Nathan, Homayoon S. M. Bezgi, Jayashree Subrahmonia, Gregory J. Clary and Hzroshz Maruyama, “Real-time online
unconstrained handwriting recognition using statistical methods”, Handwriting Recognition Group IBM Research, T.J. Watson Cen ter,
Yorktown Heights, NY 10598
16. L. Deng, “The mnist database of handwritten digit images for machine learning research,” IEEE Signal Processing Magazine, vol. 29, no.
6, pp. 141– 142, 2012.
17. Ni, J., Zhang, C., & Yang, S. X. “An adaptive approach based on KPCA and SVM for real-time fault diagnosis of HVCBs,” IEEE
Transactions on Power Delivery, 2011, pp. 1960–1971.
18. Richard J. Klimoski and Anat Rafael, “Inferring personal qualities through handwriting analysis”, Journal of Occupational Psy choloxy,
1983,56, I9 1-202.
19. Prof. Seema Kedar, Ms Vaishnavi Nair and Ms. Shweta Kulkarni, “Personality Identification through Handwriting Analysis: A Review”,
International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 1, January 2015.
20. Shen-Wei Lee, Hsien-Chu Wu, “Effective Multiple-features Extraction for Off-line SVM-Based Handwritten Numeral Recognition”, 2012
IEEE.
21. Tal Steinherz, David Doermann, Ehud Rivlin and Nathan Intrator, “Offline Loop Investigation for Handwriting Analysis”, IEEE
transactions on pattern analysis and machine intelligence, vol. 31, no. 2, February 2009
22. V. Govindaraju and R.K. Krishnamurthy, “Holistic Handwritten Word Recognition Using Temporal Features Derived from OffLine
Images,” Pattern Recognition Letters, vol. 17, no. 5, pp. 537-540, 1996.
23. V. Govindaraju, D. Wang, and S.N. Srihari, “Using Temporal Information in Off-Line Word Recognition,” Proc. US Postal Service Fifth
Advanced Technology Conf., pp. 529-543, 1992.
24. Vlad Atanasiu, “Surveys and projects in handwriting analysis”, MIT Postdoctoral fellow, Department of Brain and Cognitive Sciences 77,
Massachusetts Av., Cambridge MA 02139, USA.
25. X.-T. Yuan and B.-G. Hu, “Robust feature extraction via information theoretic learning,” in Proceedings of the 26th Annual International
Conference on Machine Learning. ACM, 2009, pp. 1193–1200.
26. Y. LeCun, L. Jackel, L. Bottou, A. Brunot, C. Cortes, J. Denker, H. Drucker, I. Guyon, U. Muller, E. Sackinger et al., “Compa rison of
learning algorithms for handwritten digit recognition,” in International conference on artificial neural networks, vol. 60, 1995.
27. Ying-Ming Wang, Ying Luo, “Integration of correlations with standard deviations for determining attribute weights in multiple attribute
decision making,” Mathematical and Computer Modelling, Volume 51, Issues 1–2, January 2010.
Keyword : PCM - Possibilistic c means clustering, PFCM-Possibilistic Fuzzy c means clustering, RCM-
827. Rough c means clustering.
4738-
References: 4743
1. Keh-Shih Chuang, Hong-Long Tzeng, Sharon Chen, Jay Wu and Tzong-JerChen, Fuzzy C-Means Clustering with Spatial
Information for Image Segmentation, Journal of Computerized Medical Imaging and Graphics, vol. 30, pp. 9–15, (2006)
2. K.T.Atanassov,Intuionistic fuzzy sets, VII ITKR’s Session,Sofia,983 (Deposed in Central Science – Technology Library of Bulgaria
Academy of Science – 1697/84).
3. J.Bezdek,” Pattern Recognition with Fuzzy Objective Function Algorithms.” New York: Planum,1981.
4. C.W.Huang,K. P. Lin,M. C. Wu, K. C. Hung,G .S. Liu,,C. H.Jen.,”Intuionistic fuzzy c means clustering algorithm with
neighborhood attraction in segmenting medical image” Springer,SoftComput 2015.
5. T. Chaira., “ A novel intuionistic fuzzy c means clustering algorithm and its application to medical images” Elsevier, 2010
6. Krinidis, S., and Chatzis, v.: ' A robust fuzzy local information Cmeans clustering algorithm', Image Processing, IEEE Transactions
on, 2010,19, (5), pp. 1328-1337
7. Songcan Chen and DaoqiangZhang, Robust Image Segmentation using FCM with Spatial Constraints Based on New Kernel-Induced
Distance Measure,IEEE Transactionon Systems, Man and Cybernetics-Part B, vol. 34(4), August (2004).
8. S.Bharathi and P.Venkatesan,’ A survey on Image Segmentation by Fuzzy C Means Clustering Techniques’,in proc. 2nd
International Conference on Applied and Theoretical Computing and Communication technology of IEEE,2016 pages 613-617
9. Maji, P. and Pal, S.K. ,” RFCM: A Hybrid Clustering Algorithm using rough and fuzzy set”, Fundamenta Informaticae 80.4 (2007) ,
pp.475- 496G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed.
vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
10. Tripathy, B. K., Tripathy, A., & Rajulu, K. G. (2014). Possibilistic rough fuzzy C-means algorithm in data clustering and image
segmentation. 2014 IEEE International Conference on Computational Intelligence and Computing Research.
11. A. Halder.,”Kernel based rough fuzzy c means clustering optimized using particle swarm optimization” (2015) International
Symposium on Advanced Computing and Communication .
Paper Title: Performance Analysis of Very Sparse Matrix Converter Using Indirect Space Vector Modulation
Abstract: In this p aper, Matrix Converter is which converts the AC to AC in a single stage. The merits of the
matrix converter is its able to deliver variable output voltage with unrestricted input and output frequency, the lack
of electrolytic capacitors, and the potential to raise the power density, decrease the size, less weight and better input
power quality. In whatever way, application of these converters are restricted because of some issues such as
different control strategies, high susceptibility to input power disturbances, common mode voltage effects and less
voltage transfer ratio. Recently, matrix converters have gained a resurgence of importance due to the improvements
in the semiconductor device industry and the increasing of processor technologies, which promises real
implementation of matrix converters in the control of drives. The real effect of indirect space vector modulation
scheme for very sparse matrix converter performance will be measures by testing of computationally for using
indirect space vector modulation strategies with the passive R load and active load .
830.
Keyword : indirect space vector modulation (ISVM), Matrix converter, Total Harmonics Distortion (THD)
4756-
References: 4762
1. Hashem, GM & Darwish, MK 2004, ‘Generalized symmetrical angle pwm technique for ac voltage controller’, Proceedings of 39th
IEEE Universities Power Engineering Conference, pp. 898-901.
2. Han Zhao & LI Sheng-min 2015, ‘The SVPWM Modulation Strategy of Matrix Converter Base on Multi inverters Reconstruction’,
pp. 1339-1343
3. Wiechmann, E, Ziogas, P & Stefanovic, V 1985, ‘A novel bilateral power conversion scheme for variable frequency static power
supplies’, IEEE Transaction on Industry Applications, vol. IA-21, no.5, pp.1226-1233.
4. Holtz, J & Boelkens, U 1989, ‘Direct frequency converter with sinusoidal line currents for speed variable motors’, IEEE Transactions
on Industrial Electronics, vol. 36, no. 4, pp. 475-479.
5. Neft, CL & Schauder, CD 1992, ‘Theory and design of a 30-hp matrix converter’, IEEE Transactions on Industry Applications, vol.
28, no. 3, pp. 248 – 253
6. Javier Riedemanna, Ivan Andradeb, Ruben Penab, Ramon Blasco-Gimenezc, Jon Clared, Pedro Melína & Marco Riverae 2016,
‘Modulation strategies for an open-end winding induction machine fed by a two-output indirect matrix converter’
7. Klumpner, C & Blaaberg, F 2002, ‘A new cost-effective multi-drive solution based on a two-stage direct power electronic conversion
topology’, Proceedings of Industry Applications Conference, pp. 444 – 452.
8. Kolar, JW, Baumann, M, Schafmeister, F & Ertl, H 2002, ’Novel three-phase AC- DC-AC sparse matrix converter’, Proceedings of
Applied Power Electronics Conference and Exposition, pp. 777 – 791.
9. Wei, L & Lipo, TA 2001, ‘A novel matrix converter topology with simple commutation’, Proceedings of industry Applications
Conference, pp. 1749 – 1754.
10. Maamoun, A 2000, ‘Development of cycloconverters’, Proceedings of IEEE Canadian Conference on Electrical and Computer
Engineering, Quebec, Canada, pp. 521-524.
11. Saravanan.m,2016, ‘Three Phase Dual Input Direct Matrix Converter for Integration of Two AC Sources from Wind Turbines’,
Circuits and Systems, 2016, 7, pp.3807-3817.
12. A.Sathish Kumar, ‘Control of Robot Manipulator Error using FPDI – IQGA in Neural Network’, International Journal of
Computational and Theoretical Nanoscience, Vol.13(3), March 2016, pp. 1740-1748(9).
Authors: Amrut Anilrao Purohit, Mohammed Riyaz Ahmed, R. Venkata Siva Reddy
Area Optimization using Structural Modeling for Gate Level Implementation of SPI for
Paper Title:
Microcontroller
Abstract: The need for miniaturization has been the driving force in chip manufacturing. The proliferation of
IoT, robotics, consumer electronics and medical instruments pose unprecedented demands on the embedded system
design. The area optimization can be achieved either by reducing the size of transistors or by optimizing (reducing)
the circuit at the gate level. The first solution has attracted many researchers while the later has not been explored
to its full potential. The aim is to design a System on Chip (SoC) to satisfy the dynamic requirements of disruptive
technologies while occupying the lesser area. The design and testing of communication interfaces such as Serial
Peripheral Interface (SPI), Inter-IC Communication (I2C), Universal Asynchronous Receiver and Transmitter
(UART) are very crucial in the area optimization of microcontroller design. Since SPI being an important
communication protocol, this work reports the preliminary research carried in the design and verification of it. In
this work, Verilog is used for the design and verification of the SPI module. The results show that there is a drastic
reduction in the number of Look-Up-Tables (LUTs) and slices required to build the circuit. We conclude that
sophisticated optimization techniques of the circuit at the gate level has the potential to reduce the area by half.
Keyword : Area Optimization, Communication Protocol, Serial Peripheral Interface, Structural Modeling.
References:
1. Gal, R., Golda, A., Frankiewicz, M., & Kos, A. (2011, June). FPGA implementation of 8-bit RISC microcontroller for embedded systems.
In Proceedings of the 18th International Conference Mixed Design of Integrated Circuits and Systems-MIXDES 2011 (pp. 323-328).
831. IEEE.
2. Sandya, M., & Rajasekhar, K. (2012). Design and verification of serial peripheral interface. Int. J. Eng. Trends Technol, 3(4), 522-524. 4763-
3. Anand, N., Joseph, G., Oommen, S. S., & Dhanabal, R. (2014, January). Design and implementation of a high speed Serial Peripheral
Interface. In 2014 International Conference on Advances in Electrical Engineering (ICAEE) (pp. 1-3). IEEE.
4768
4. KUMAR, K. A., & KRISHNA, M. S. (2015). Design and Functional Verification of A SPI Master Slave Core using UVM.
5. Chen, R., Huang, S. Z., Lin, W., & Li, L. (2009, December). Design and implementation of a reused interface. In 2009 First International
Conference on Information Science and Engineering (pp. 2603-2605). IEEE.
6. Kaneriya, H., & Jagpat, S. (2015). Design of I2C Master with Multiple Slave. IJRSTCC, 3, 2890-2893.
7. Oudjida, A. K., Berrandjia, M. L., Liacha, A., Tiar, R., Tahraoui, K., & Alhoumays, Y. N. (2010, June). Design and test of ge neral-purpose
SPI Master/Slave IPs on OPB bus. In 2010 7th International Multi-Conference on Systems, Signals and Devices (pp. 1-6). IEEE.
8. Jain, N., & Jain, P. Implementation of Serial Peripheral Interface Protocol for LCD.
9. Leens, F. (2009). An introduction to I 2 C and SPI protocols. IEEE Instrumentation & Measurement Magazine, 12(1), 8-13.
10. Liu, T., & Wang, Y. (2011, June). IP design of universal multiple devices SPI interface. In 2011 IEEE International Conference on Anti-
Counterfeiting, Security and Identification (pp. 169-172). IEEE.
11. Kundu, M., & Kumar, A. (2014). Implementation of Low Power SPI Protocol with Clock Domain Crossing. IJRIT, 1(2), 26-29.
Authors: Alexi Delgado, Ricardo Cuba, Henry Jamanca, Ana Sampen, Chiara Carbajal
Paper Title: Social Impact Assessment in La Oroya, Peru Applying the Grey Clustering Method
Abstract: The social conflict presented in the city of La Oroya, of a national government issue type, is
considered by the Ombudsman's Office as a latent social conflict during the month of April 2019; therefore,
analyses, agreements, meetings and dialogue tables are presented, which allow subjective evaluations of the
problematic reality, complicating the correct decision making. For which, the application of the Grey Clustering
method is proposed to quantify the social impact presented in the city of La Oroya; the surveys were conducted on
Sunday, June 2, 2019, containing 08 questions (same number of criteria to evaluate) that were answered by 20
settlers, such answers were evaluated with the Grey Clustering method obtaining as a result that the social impact in
the city of La Oroya is of normal level.
Paper Title: Acoustic Insulation Design of Noise in Welding Plant through Screens
Abstract: Noise is one of the industrial hygiene agents of greatest concern, which explains the large amount
of regulations and literature that attempt to reduce it. In most industries in Peru and the world the welding process
is indispensable as part of their production process, nevertheless this activity involves several risks for people, not
only for those who perform the activity but also those who are adjacent to it, within these risks, exposure to high
834. levels of noise is one of the most difficult to control because the control at the source of noise is almost, one of the
great passive controls in noise reduction is the use of screens or acoustic curtains. It is for this reason that the
objective of this article is to propose a design of acoustic barriers through screens, responding to the problem of 4776-
noise generated in welding workshops. The stages in the process of designing acoustic screens for a welding plant 4779
are presented in chronological order.
Keyword : About Active contour model, Disease diagnosis, Lung Segmentation, Lesion Detection.
References:
1. Damodar Dipika A, Prof. Krunal Panchal, “A Survey of Lung Tumor Detection on CT Images”, December 2015, Volume 2, Issue 12,
JETIR (ISSN-2349-5162).
2. Dao Qiang Zhanga & Song Can Chena, ‘A novel kernelized fuzzy C-means algorithm with application in medical image
segmentation’,Artificial Intelligence in Medicine Elsevier, vol. 32, no. 1, pp. 37-50
3. Deepthy Janardhanan, Dr.R.Satishkumar, “Lung Cancer Detection Using Active Contour Segmentation Model “International Journal of
Innovative Research in Advanced Engineering (IJIRAE)ISSN: 2349-2163 Issue 03, Volume 4 (March 2017) Special Issue .
4. Hongwei Ji, Jiangping He, Xin Yang, Rudi Deklerck, and Jan Cornelis, Senior Member, IEEE, “ACM-Based Automatic Liver
Segmentation From 3-D CT Images by Combining Multiple Atlases and Improved Mean-Shift Techniques”, IEEE JOURNAL OF
BIOMEDICAL AND HEALTH INFORMATICS, VOL. 17, NO. 3, MAY 2013.
5. Jun Lai, Ming Ye, “Active Contour Based Lung Field Segmentation”, 2009 International Conference on Intelligent Human-Machine
Systems and Cybernetics.
6. Karoui,I, Fablet,R, Boucher,J & Augustin, J 2007, ‘Unsupervised region-based image segmentation using texture statistics and levelset
methods’, Proceedngs of WISP IEEE International Symposium on Intelligent Signal Processing, pp. 1-5
7. M Lavanya, P Muthukumaran, “Lung Lesion Detection in CT Scan Images Using the Fuzzy Local Information Cluster Means (FLICM)
Automatic Segmentation Algorithm and Back Propagation Network Classification”, Article 32, Volume 18, Issue 12, December 2017.
8. Minu George, GopikaS, A Survey on Lung Nodule Detection in CT-Images, International Journal of Scientific & Engineering Research,
Volume 6, Issue 12, December-2015 ISSN 2229-5518
9. Pohle, R & Toennies, KD 2001, ‘Segmentation of medical images using adaptive region growing’, International Society for Optic s and
Photonics in Medical Imaging, pp. 1337-1346.
10. S. Kalaivani, Ms. T. Sathiya, Dr. B. Sathiyabhama, “ACM based Segmentation of pulmonary lung nodule in CT images”, ISSN: 1995-
0772 Published BY AENSI Publication EISSN: 1998-1090 2017 May 11(7): pages 592-601.
11. Temesguen Messay a, Russell C. Hardie a, Timothy R. Tuinstra b,” Segmentation of pulmonary nodules in computed tomography using a
regression neural network approach and its application to the Lung Image Database Consortium and Image Database Resource Initiative
dataset”, Medical Image Analysis 22 (2015) 48–62.
12. Withey, DJ & Koles, ZJ 2007,’Three generations of medical image segmentation: Methods and available software’, International Journal
of Bioelectromag, vol. 9, no. 2, pp. 67-68.
Paper Title: Beamforming with Precoders Based Millimeter Wave Communication System
Abstract: The 5G communications are used with baseband Precoders and Beamforming. The Technology is
needed to update, all available characteristics in the present Wireless Communication System (WCS). The Hybrid
Beamforming systems are across in the RF and Digital domain. In the mmWave MIMO system, the numbers of
antennas has increased to improve the Spectral Efficiency of the system. The proposed algorithms observe that
system performance for different SNR range.
Paper Title: Test Case Generation Process using Soft Computing Techniques
Abstract: Software testing is the SDLC's important and most expensive step. Software testing is difficult and
time-consuming work requiring a great deal of money for software development. Testing is both an operation that
842. is static and adaptive. Software testing process deals with the creation of test cases, checking and validating either
passed or failed test cases. It is unidealistic to check only the discerning parts of the material as a whole at once. It 4824-
is not possible to test the whole system once, so selected parts of the code are considered for analysis. Since the 4831
input space of the Product Under Test (PUT) can be very large, it is important to analyze a representative subset of
test cases. During software testing, the most important task is to build appropriate test cases. An effective set of test
cases can detect more errors. Software testing always requires high deficiencies. Test cases are constructed using
the test data. In the automation of software testing, the important task is to generate test data according to a given
level of competence. The improved test data are determined using the test case development methodology and the
test data adequacy criterion being applied. For increase the level of automation and performance, these aspects of
test case development need to be studied. This paper studies the various test case generation techniques using soft
computing techniques like Genetic Algorithm, Artificial Bee colony methods. Further an evaluation criterion for
the test case generation process, empirical study of Code Coverage and its importance is discussed.
Keyword : Program Under Test, Test case Generation, Test data, Soft computing, Genetic Algorithm,
Artificial Bee Colony
References:
1. Sommerville, I., 2000. “Software Engineering”. 6th Edn., Addison-Wesley, England.
2. Bertolino, A., 2003. Software testing research and practice. Proceedings of the 10th International Workshop on Abstract State Machines,
March 3-7, Taormina, Italy, 244-262.
3. Antonio, P.Salas and B.K. Aichernig, 2006. Automatic test case generation for OCL: A mutation approach, Proceedings of 5th
International Conference Quality Software, January 2006, IEEE Computer Society, pp: 64-71.
4. Kaner, J.D.C., 2003.’ What is a Good Test Case’, Florida Institute of Technology, USA.
5. Jia,X.and H.Liu,2002,Rigorous and Automatic testing of web applications, Proceedings of 6th IASTED International Conference o n
Software Engineering and Applications, May 2002,Honolulu,USA
6. Tran H.2001,Test generation using model checking. European Conference on Software Maintenance and
Reengineering,CSMR2001,http://www.cs.toronto.edu/~chechik/ courses00/csc2108/projects/4.pdf
7. Rayadurgam, S. and M.P.E. Heimdahl, 2001. Test-sequence generation from formal requirement models. Proceedings of the 6th IEEE
International Symposium on High Assurance Systems Engineering, Oct. 22-24, Boca Raton, Florida, pp: 23-23.
8. Ryser, J. and M. Glinz, 2000. SCENT: A method employing scenarios to systematically derive test cases for system test. Technical
Report, http://portal.acm.org/citation.cfm?id=901553.
9. Nilawar, M. and S. Dascalu, 2003. A UML-based approach for testing web applications. M.Sc. Thesis, University of Nevada, Reno.
10. Sinha, A., and C.S. Smidts, 2005. Domain specific test case generation using higher ordered typed languages from specification. Ph.D.
Thesis, University of Maryland.
11. Jaya Srivastaval and Twinkle Dwivedi,SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING
CONDITIONAL COVERAGE METHOD,International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.3, May
2015
12. Beydeda, S. and V. Gruhn, 2003. BINTEST-Binary search-based test case generation. Proceedings of Computer Software and
Applications Conference, November 2003, Leipzig Univ., Germany, pp: 28-33.
13. Turner, D.A., M. Park, J. Kim and J. Chae, 2008. An activity oriented approach for testing web applications. Proceedings of the 23rd
IEEE/ACM International Conference on Automated Software Engineering, Sept. 15-19, Washington, USA .pp: 411-414.
14. Nicha Kosindrdecha and Jirapun Daengdej, A Test Case Generation Process and Technique, Journal of Software Engineering, 265 -287,
2010.
15. Hajar Homayouni, Hossein Shirazi, Automatic Software Test Case Generation, Article in Journal of Software Engineering 5(3):91-101,
March 2011 Academic Journals Inc.
16. Namita Khurana, RS Chillar, Test Case Generation and Optimisation using UML Models and Genetic Algorithm ICRTC-2015,Published
by Elsevier
17. Rijwan Khan, Mohd. Amjad,2015 IEEE UP Section Conference on Electrical Computer and Electronics (UPCON) Automatic test case
generation for unit software testing using genetic algorithm and mutation analysis
18. Mahesh Shirole, and Rajeev Kumar,A Hybrid Genetic Algorithm Based Test Case Generation Using Sequence
Diagrams,International Conference on Contemporary Computing,IC3 2010:Contemporary Computing pp 53-63
19. Shveta Parnami,Krishna Swaroop Sharma,Empirical Validation of Test Case Generation based on All- Edge Coverage Criteria,
International Journal of Computer Applications,September 2015.
20. Dr. Velur Rajappa, Arun Biradar, Satanik Panda, Efficient Software Test Case Generation Using Genetic Algorithm Based Graph
Theory, First International Conference on Emerging Trends in Engineering and Technology,2008.
21. Ahmed Mateen, Marriam Nazir, Salman Afsar Awan,Optimization of Test Case Generation using Genetic Algorithm (GA),International
Journal of Computer Applications (0975 – 8887),Volume 151 – No.7, October 2016.
22. Yuehua Dong, & Jidong Peng. (2011). Automatic generation of software test cases based on improved genetic algorithm. 2011
International Conference on Multimedia Technology. doi:10.1109/icmt.2011.6002999
23. Huang, M., Zhang, C., & Liang, X. (2014). Software test cases generation based on improved particle swarm optimization. Proceedings of
2nd International Conference on Information Technology and Electronic Commerce. doi:10.1109/icitec.2014.7105570.
24. Panichella, A., Kifetew, F. M., & Tonella, P. (2018). Automated Test Case Generation as a Many-Objective Optimisation Problem with
Dynamic Selection of the Targets. IEEE Transactions on Software Engineering, 44(2), 122–158.
25. Arrieta, A., Wang, S., Markiegi, U., Sagardui, G., & Etxeberria, L. (2018). Employing Multi-Objective Search to Enhance Reactive Test
Case Generation and Prioritization for Testing Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Informatics, 14(3),
1055–1066.
26. Shahbazi, A., & Miller, J. (2016). Black-Box String Test Case Generation through a Multi-Objective Optimization. IEEE Transactions on
Software Engineering, 42(4), 361–378.
27. He, W., Zhao, R., & Zhu, Q. (2015). Integrating Evolutionary Testing with Reinforcement Learning for Automated Test Generation of
Object-Oriented Software. Chinese Journal of Electronics, 24(1), 38–45.
28. Pires, J. P., & Brito e Abreu, F. (2018). Knowledge Discovery Metamodel-Based Unit Test Cases Generation. 2018 IEEE 11th
International Conference on Software Testing, Verification and Validation (ICST).
29. Ali, M. S. A. R., Othman, R. R., Yahya, Z. R., Ahmad, M. Z. Z., & Ramli, N. (2016). Implementation of artificial bee colony algorithm
for T-way testing. 2016 3rd International Conference on Electronic Design (ICED).
30. Khalid Alemerien and Kenneth Magel, Examining the Effectiveness of Testing Coverage Tools: An Empirical Study, International
Journal of Software Engineering and Its Applications,2014.
843. Abstract: Complexity & Criticality have made the latest state of the art Military/Aerospace systems more and
more I/O and data intensive. Demand for huge chunk of signal information drives the innovation in the technology
4832-
to make the systems capable of transforming the data at higher and higher speeds. So, computers and
4850
communication devices use VPX technology to communicate with other devices because, VPX support multi
Gigabit communication and it is very rugged, compact and portable. So switching systems used for communication
in military and aerospace should also support VPX connectivity. Characterizing switch, which gives connectivity
on VPX and which communicate through VPX switched fabric backplane with other devices on same backplane is
difficult and tedious task. In switch there are many stress points, which may cause switch goes down in network. To
characterize these stress points, we designed VPX based test card and characterize data plane performance of
switch by measuring some parameters and analyzing transmitted and received frames. Also by preparing setup for
environmental characterization we can test performance for different environmental conditions. Also using
environmental chambers, we characterize for environmental parameters at different ruggedized levels.
Paper Title: Design of Centralized PI Control System for Two Variable Processes based on Root Locus Technique
Abstract: This paper describes the design of centralized controller for two variable processes. The two
variable process structures are somehow different from the single variable processes. This difference is occurred
because of interrelations between the variables present in the process. Hence, when a controller is planned for such
systems, the relations amid the variables must be taken into consideration. This process is done in decentralized
control system design. But decentralized control system works well when the interrelations between the variables
are simple. If the interaction is strong, then the centralized control system is preferred since it uses a controller for
each pair of input and output variables. The controller used in main diagonal works for improving the servo
performance and off diagonal controller reduces the interrelation effect. So the performance is improved by
minimizing the interrelation effects. The design process is easy to understand by field engineers working in
industries. The simulation results are included in this paper to specify the efficacy of the proposed scheme.
Keyword : Two variable process, decentralized control, centralized control, interrelation effects, single
variable process, servo performance.
844. References:
1. Q. Xiong, W.-J. Cai, M.-J. He, A practical loop pairing criterion for multivariable processes, Journal of Process Control 15 (2005) 4851-
741–747. 4855
2. Qiang xiong,Wen-Jian Cai, Mao-Jun He, Equivalent transfer function method for PI/PID controller design of MIMO processes,
J.Process control 17(2007) 665-673.
3. Q. Xiong, W.-J. Cai, Effective transfer function method for decentralized control system design of multi-input multi-output
processes, Journal of Process Control 16 (2006) 773–784.
4. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "Control configuration selection and controller design for
multivariable processes using normalized gain." World Acad Sci Eng Technol Int J Electr Comput Electron Commun Eng8.10
(2014).
5. Truong Nguyen Luan Vu and Moonyong Lee,”Independent design of Multiloop PI/PID controllers for Multi-delay processes”,
world academy science, Engineering and technology,(60)2009,PP 703-708.
6. Tavakoli, Saeed, Ian Griffin, and Peter J. Fleming. "Tuning of decentralised PI (PID) controllers for TITO processes." Control
engineering practice 14.9 (2006): 1069-1080.
7. Wang, Qing-Guo, Bin Huang, and Xin Guo. "Auto-tuning of TITO decoupling controllers from step tests." ISA transactions39.4
(2000): 407-418.
8. Naik, R. Hanuma, DV Ashok Kumar, and K. S. R. Anjaneyulu. "A Comparative Study of Decoupler Design Techniques for TITO
Control Processes." Emerging Trends in Electrical, Communications and Information Technologies. Springer, Singapore, 2017. 293-
301.
9. Seborg, Dale E., et al. Process dynamics and control. John Wiley & Sons, 2010.
10. Wutthithanyawat, Chananchai, and Santi Wangnipparnto. "Design of decentralized PID controller with the root locus method based
on inverted decoupling for a TITO system." Journal of Thai Interdisciplinary Research 13.2 (2018).
845. Paper Title: Power Quality Improvement of Grid Connected Photovoltaic Solar Systems using 3 level Inverter
Abstract: This paper demonstrate simulation modeling of grid-tied SPV systems with a 3 level inverter for 4846-
power quality improvement using SVPWM. To extract maximum power MPPT is used. Three level inverters are 4859
used in high power and high voltage application with reduced harmonic contents. The grid tied PV system using
three levels inverter has less harmonic contents as comparison of the conventional system or without a three level
inverter. The simulation study reveals that the system with three-level inverter using the SVPWM technique
generates less THD compared to the conventional system.
Paper Title: From Classroom to Real World: Application of Outcomes-Based Assessment in English Courses
Abstract: Quality Assurance (QA) has become one of the current concerns in higher education worldwide.
Learning outcomes are seen as central QA processes since the outcomes provide key benchmarks for maintaining
standards and enhancing teaching and learning. Outcomes-based assessment (OBA) necessitates a change in
educational practices, to a focus on what students have to learn rather than what educators have to teach. Moreover,
it is connected with purposeful planning for the delivery and evaluation of intended outcomes. According to this,
the purposes of this study were to investigate the expected learning outcomes of English courses for undergraduate
students so that grading criteria can be established. In addition, the concurrent validity or investigation to prove
whether students achieved the expected outcomes established from the expected language standards was
846. implemented. Hence, the students’ study results and the scores obtained from an English language standard
(TOEIC) were computed. The findings can be significant in several ways. Theoretically, the findings can contribute 4860-
to a better understanding of expected learning outcomes. This information can assist English language instructors in 4865
developing their teaching and course evaluation. Finally, the assessment of the concurrent validity can be useful to
the interpretation of the study results due to the measurements performed by the evaluating instruments and by the
standard instruments. Therefore, the scores obtained from the study results can be compared with the standardized
scores. This allows classroom evaluation to be connected with more meaningful standards outside the classroom.
Keyword : concurrent validity; English courses; expected learning outcomes; outcomes-based assessment
References:
1. El-Maaddawy, T., & Deneen, C. (2017). Outcomes-Based Assessment and Learning: Trialling Change in a Postgraduate Civil Engineering
Course. Journal of University Teaching & Learning Practice, 1-19.
2. Rattananuntapat, M. (2015). Quality Assurance Policies in Thai Higher Education. Pittsburgh: University of Pittsburgh.
3. Carless, D. (2015). Excellent in university assessment: Learning from award-winning practice. Abingdon, UK: Routledge.
4. Bachman, L. F. (2004). Statistical Analyses for Language Assessment. Cambridge: Cambridge University Press.
5. k12academics. (2019, May 5). Advantages and Limitations. Retrieved from k12academics: https://www.k12academics.com
6. FairTest. (2019, May 20). Norm-referenced Achievement Tests. Retrieved from Fairtest: http://www.fairtest.org
7. Centre for Higher Education Research and Teaching. (2012). A Brief Guide to Outcome-based Assessment. Grahamstown: Rhodes
University.
8. Mahbub, M. A. (2018). English Teaching in Vocational High School: A Need Analysis. JEELS, 229-258.
9. Khunmontri, S., Trakulkasemsuk, W., & Bunsom, T. (2014). Vocational College English Teachers' Awareness of Establishment of the
ASEAN Community and Its Impact on English Language Teaching. Journal of Liberal Arts, Ubon Ratchathani University, 77-106.
10. Bresciani, M. J. (2011). Identifying Barriers in Implementing Outcomes-based Assessment Program Review: A Grounded Theory
Analysis. Research & Practice in Assessment, 5-16.
11. Anwar, M. A., Ahmed, N., & Al Ameen, A. (2012). An Outcome-Based Assessment and Improvement System for Measuring Student
Performance and Course Effectiveness. Contemporary Issues in Education Research, 279-294.
12. Wheaton, A., & Parry, J. (2012, March 20-23). Using the Angoff Method to Set Cut Scores. Retrieved from questionmark:
www.questionmark.com
13. Dornyei, Z. (2011). Researcch Methods in Applied Linguistics. New York: Oxford University.
14. Clark, D. (2015, January 12). Bloom's Taxonomy of Learning Domains. Retrieved from Big Dog & Little Dog's Performance
Juxtaposition: www.nwlink.com/donclark/hrd/bloom.html
15. ETS. (2011). Correlation Table TOEIC Listening and Reading Scores Descriptors and the CEFR levels. Retrieved from ETS: GLOBAL,
A subsidiary of Educational Testing Service: www.etsglobal.org
16. Lin-L, W., & Yao, G. (2014). Encyclopedia of Quality of Life and Well-Being Research. Retrieved from Springer Link:
www.link_springer.com
Keyword : Energy Efficiency, Machine Learning, Node Selection, Route Discovery, WSN
References:
1. K. Cengiz and T. Dag, "Energy Aware Multi-Hop Routing Protocol for WSNs," in IEEE Access, vol. 6, pp. 2622-2633, 2018.
2. M. Sefuba and T. Walingo, "Energy-efficient medium access control and routing protocol for multihop wireless sensor networks," in IET
Wireless Sensor Systems, vol. 8, no. 3, pp. 99-108, 6 2018.
3. X. Ding, Y. Tian, and Y. Yu, “A Real-Time Big Data Gathering Algorithm Based on Indoor Wireless Sensor Networks for Risk Analysis
847. of Industrial Operations,” IEEE Transactions on Industrial Informatics, vol. 12, no. 3, pp. 1232–1242, 2016.
4. J. Yan, M. Zhou, and Z. Ding, “Recent advances in energy-efficient routing protocols for wireless sensor networks: A review,” IEEE 4866-
Access, vol. 4, pp. 5673–5686, 2016. 4875
5. S. Zidi, T. Moulahi and B. Alaya, "Fault Detection in Wireless Sensor Networks Through SVM Classifier," in IEEE Sensors Journal, vol.
18, no. 1, pp. 340-347, 1 Jan.1, 2018.
6. G. Künzel, G. P. Cainelli, I. Müller, and C. E. Pereira, “Weight Adjustments in a Routing Algorithm for Wireless Sensor and A ctuator
Networks Using Q-Learning,” IFAC-PapersOnLine, vol. 51, no. 10, pp. 58–63, 2018.
7. Shakeel PM. Neural Networks Based Prediction Of Wind Energy Using Pitch Angle Control. International Journal of Innovations in
Scientific and Engineering Research (IJISER). 2014;1(1):33-7.
8. F. Ishmanov and Y. B. Zikria, “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and
Open Research Issues,” Journal of Sensors, vol. 2017, pp. 1–16, 2017.
9. Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks,” IEEE Transactions on
Information Forensics and Security, vol. 11, no. 9, pp. 2013–2027, 2016.
10. A. Ahmed, K. A. Bakar, M. I. Channa, A. W. Khan, and K. Haseeb, “Energy-aware and secure routing with trust for disaster response
wireless sensor network,” Peer-to-Peer Networking and Applications, vol. 10, no. 1, pp. 216–237, 2015.
11. H. Huang, H. Yin, G. Min, J. Zhang, Y. Wu and X. Zhang, "Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in
Wireless Sensor Networks," in IEEE Transactions on Mobile Computing, vol. 17, no. 6, pp. 1339-1352, 1 June 2018.
12. X. Lai, X. Ji, X. Zhou and L. Chen, "Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks," in IEEE Sensors Journal,
vol. 18, no. 2, pp. 837-848, 15 Jan.15, 2018.
13. X. Shao, C. Wang, C. Zhao and J. Gao, "Traffic Shaped Network Coding Aware Routing for Wireless Sensor Networks," in IEEE Access,
vol. 6, pp. 71767-71782, 2018.
14. J. Qiao and X. Zhang, "Polar Coordinate-Based Energy-Efficient-Chain Routing in Wireless Sensor Networks Using Random Projection,"
in IEEE Access, vol. 6, pp. 21275-21286, 2018.
15. W. M. Elsayed, S. F. Sabbeh, and A. M. Riad, “A Distributed Fault Tolerance Mechanism for Self-Maintenance of Clusters in Wireless
Sensor Networks,” Arabian Journal for Science and Engineering, vol. 43, no. 12, pp. 6891–6907, 2017.
16. Z.-X. Wang, M. Zhang, X. Gao, W. Wang, and X. Li, “A clustering WSN routing protocol based on node energy an d multipath,” Cluster
Computing, 2017.
17. C. Hong, Y. Zhang, Z. Xiong, A. Xu, H. Chen, and W. Ding, “FADS : Circular/Spherical Sector based Forwarding A rea Division a nd
Adaptive Forwarding Area Selection routing protocol in WSNs,” Ad Hoc Networks, vol. 70, pp. 121–134, 2018.
18. J. Huang, D. Ruan, and W. Meng, “An annulus sector grid aided energy-efficient multi-hop routing protocol for wireless sensor networks,”
Computer Networks, vol. 147, pp. 38–48, 2018.
19. K. A. Darabkh, N. J. Al-Maaitah, I. F. Jafar, and A. F. Khalifeh, “EA-CRP: A Novel Energy-aware Clustering and Routing Protocol in
Wireless Sensor Networks,” Computers & Electrical Engineering, vol. 72, pp. 702–718, 2018.
20. A. Attiah, M. F. Amjad, M. Chatterjee, and C. Zou, “An evolutionary routing game for energy balance in Wireless Sensor Networks,”
Computer Networks, vol. 138, pp. 31–43, 2018.
21. S. He, K. Xie, W. Chen, D. Zhang and J. Wen, "Energy-Aware Routing for SWIPT in Multi-Hop Energy-Constrained Wireless Network,"
in IEEE Access, vol. 6, pp. 17996-18008, 2018.
22. B. Sun and D. Li, “A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs,” IEEE Access, vol. 6, pp. 4725–
4741, 2018.
23. L. Yang, Y. Lu, S. Liu, T. Guo, and Z. Liang, “A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in
Wireless Sensor Networks,” IEEE Access, vol. 6, pp. 71404–71412, 2018.
Authors: L. Cardoso
Education, Curriculum and Technology Landmarks: The Renewed Concept of the “Classroom of the
Paper Title:
Future”
Abstract: One of the most debated concepts in Education and Technology is the “Classroom of the Future”,
not only because classrooms changed, but first of all because students, society and teachers have changed. This is a
global challenge for Higher Education: to prepare future teachers for these new ages of technology-based
classrooms, students who master digital and informational tools and pedagogy that needs to be enhanced in order to
follow all these simultaneous mutations.Our main objective is to discuss how Universities need to focus on new
pedagogical approaches for the “Classroom of the Future”, combining Education, Curricula and Technology,
preparing future teachers and drawing the path for teaching and learning success.
Paper Title: Defect Repairing Cost and Its Bond on Apartment Building in Relation to Lawsuit Parties
Abstract: An appropriateness of defect repairing cost for apartment is being challenged in Korea. The
problem is that there is no detailed prescriptions or specifications about the defect repairing cost other than
849. calculating standard of the defect repairing bond in the applicable laws. There is also not even a proper base in
establishing the standard itself. In order to specify the standard of defect repairing bond and to make it serve as a
4882-
realistic system, it is necessary to discuss how much is the actual scale of the defect repairing cost and how it is
4887
reasonable to establish the calculation system of defect repairing bondin the apartment buildings. The researchers
have proposed a ratio of about 1.5% to the current standard of 3% of the construction cost as per the analysis of
actual data in the previous study. However, it is necessary to supplement this scale considering the facts that the
scale of lawsuit for defect is huge and the recent trend of litigation for the defect repairing has changed. Therefore,
this study approaches the relationship between defect repairing cost and bond at a new point of view by analyzing
the existing cases again. The builder for apartment construction makes agreement with the developer, therefore the
builder has responsibility of defect repairing. It also becomes an auxiliary party in the lawsuit for defect in the
resulting construction. In this study, we have categorized all the parties involved in the construction and defect
repairing cost. Type A is the case where the litigant has a construction capacity rank of 1-10, Type B of rank 11-30,
type C refers to the construction capacity rank other than type A and Type B, and for the case where the lawsuit
party is not a builder but a guarantee company, it is categorized as type D.And then, the differences in the defect
repairing cost rates in each category were reviewed. This review was conducted because the builders at upper group
are generally excellent in terms of technology and quality, but it is not known in detail that how much they are good
in counteracting the defect. The result of the case analysis by type showed that the rate of the defect repairing cost
by the builder of upper rank was relatively low. In addition, the minimum repairing cost ratio was relatively small
between the types, but the maximum repair cost showed great differences between the types. On the other hand,
only two cases showed excess of 3% of the defect repairing bond rate among the total of 49 cases. This big
difference might have caused large defect cost bond rate in the type A and Type B. The results of this study suggest
the following points. First, 47 cases out of 49 cases showed the defect repair bond rates below 3%, which speaks
that the current standard is not being practiced. Second, considering the fact that average defect repair bond rate is
lowest and the maximum and minimum deviation of defect repair cost rate is also the lowest in the type B, the type
B offers the lowest defect repair cost bond among other types of lawsuit cases.
Keyword : apartment building, defect lawsuit, defect repairing bond, defect repairing cost, lawsuit parties,
References:
1. J. Park, and D. Seo, “Basic Study on Standard Process Model for Defect Consulting in Korea,” Advanced Science and Technology Letters,
pp.33-38, vol. 55, 2014.
2. J. Park, and D. Seo, “Basic Study on Influence Factors for Defect Repairing Cost of Apartment Building in Korea,” In Proceedings of
International Conference on Applied Mathematics and Mechanics, 2016, pp. 185-189.
3. J. Park, and D. Seo, “Basic Study on Term of Warranty Liability for Window and Door Work Defect in Apartment Building,” In
Proceedings of International Conference on Research & Innovation in Environment, Civil and Architecture Engineering, 2017.
4. J. Park, and D. Seo, “Analytic Study on Term of Warranty Liability for Roofing and Waterproofing Work Defect in Apartment Bui lding
based on Performance Data,” In Proceedings of the 2017 icEAAC, pp. 200, 2017.
5. J. Park, and D. Seo, “Basic Study on Term of Warranty Liability for Finish Work Defect in Apartment Building,” International Journal of
Research in Chemical, Metallurgical and Civil Engineering, vol. 4, no. 1, pp. 7-12, February 2017.
6. J. Park, and D. Seo, “Comparative Review on Occurred Defect Data and Term of Warranty Liability to Telecommunication, Signal, and
Emergency Equipment Work in Apartment Building,” Asia Life Sciences, vol. 15, no. 3, pp. 1781-1791, June 2018.
7. J. Park, and D. Seo, “Suggestion on Estimating Rate for Defect Repairing Deposit through Case Study of Defect Lawsuit in Kore an
Apartment Building,” Journal of Advanced Research in Dynamical and Control Systems, vol. 10, no. 4, pp. 213-217, May 2018.
8. J. Park, and D. Seo, “Suggestion on Annual Refund Ratio of Defect Repairing Deposit in Apartment Building through Defect Laws uit
Case Study,” International Journal of Research in Chemical, Metallurgical and Civil Engineering, vol. 4, no. 1, pp. 13-17, February 2017.
9. J. Park, and D. Seo, “Comparative Review on Propriety of Estimating Rate for Defect Repairing Deposit through Apartment Build ing
Scale,” In Proceedings of the Third NZAAR International Event Series on Natural and Built Environment, Cities, Sustainability and
Advanced Engineering, New Zealand Academy of Applied Research Ltd, 2017, pp. 89-98.
Paper Title: A Mediator Leadership Practices for Organisational Development Through Data Screening
Abstract: This paper explored the data collected regarding the study on mediating effect of organizational
innovation in the relationship between leadership practices and organisational performance. Seventy universities
operating in Saudi Arabia participated in the study. The survey was completed by 248 principal officers on behalf
of their respective universities. The results were then analysed using version 22 of the software package of the
Statistical Package for the Social Sciences (SPSS). An initial data testing and preliminary review were conducted to
ensure that the multivariate analysis assumptions were not broken. The analysis was carried out in this study
explicitly with the missing values, outliers, regular test and multi-linearity testing. We concluded that the data were
sufficient for further study.
Keyword : Driver Help System (DAS), Deep Convolution Neural Network(DCNN), Earth Worm- Crow
Search Algorithm (EW-CSA), etc.
References:
1. Umar Ozgunalp, Rui Fan, Xiao Ai, and Naim Dahnoun, "Multiple Lane Detection Algorithm Based on Novel Dense Vanishing Point
Estimation", IEEE Transactions On Intelligent Transportation Systems, Vol. 18, No. 3, March 2017.
2. Apurba Das, Member, Siva Srinivasa Murthy, and Upendra Suddamalla, "Enhanced Algorithm of Automated Ground Truth
Generation and Validation for Lane Detection System by M2BMT", IEEE Transactions On Intelligent Transportation Systems, Vol.
18, No. 4, April 2017.
3. Soonhong Jung, Junsic Youn, and Sanghoon Sull, "Efficient Lane Detection Based on Spatiotemporal Images", IEEE Transactions
851. On Intelligent Transportation Systems, January 2015.
4. Ju Han Yoo, Seong-Whan Lee, Sung-Kee Park, and Dong Hwan Kim, “A Robust Lane Detection Method Based on Vanishing 4892-
Point Estimation Using the Relevance of Line Segments", IEEE Transactions On Intelligent Transportation Systems", vol.18, no .12, 4901
February 2017.
5. Xinxin Du, and Kok Kiong Tan, "Comprehensive and Practical Vision System for Self-Driving Vehicle Lane-Level Localization",
IEEE Transactions On Image Processing, Vol. 25, No. 5, May2016.
6. Jianwei Niu , JieLu , Mingliang Xu , PeiLv , and Xiaoke Zhao, "Robust Lane Detection using Two-stage Feature Extraction with
Curve Fitting", Pattern Recognition, vol 59, pp.225-233, November 2016.
7. Heba Aly, Anas Basalamah, and Moustafa Youssef, "Robust and ubiquitous smartphone-based lane detection", Pervasive and Mobile
Computing, 2015.
8. Son Lam Phung, Manh Cuong Le , and Abdesselam Bouzerdoum, "Pedestrian lane detection in unstructured scenes for assistive
navigation", Computer Vision and Image Understanding, vol.149, pp.186–196, 2016.
9. Rasmussen, C., Korah, T.: On-vehicle and aerial texture analysis for vision-based desert road following. In: CVPR workshop on
machine vision for intelligent vehicles. (2005) III: 66{66
10. Montemerlo, M., et al.: Junior: The Stanford entry in the Urban Challenge. Journal of Field Robotics 25(8) (2008) 569{597 25
11. Gao, T., Aghajan, H.: Self lane assignment using egocen- tric smart mobile camera for intelligent GPS navigation. In: Workshop on
Egocentric Vision. (2009) 57{62
12. Jiang, Y., Gao, F., Xu, G.: Computer vision-based multiple- lane detection on straight road and in a curve. In: ImageAnalysis and
Signal Processing. (2010) 114{117
13. Wu, S., Chiang, H., Perng, J., Chen, C.,Wu, B., Lee, T.: The heterogeneous systems integration design and implementation for lane
keeping on a vehicle. IEEE Transactions on Intelligent Transportation Systems 9 (2008) 246{263
14. Hofmann, U., Rieder, A., Dickmanns, E.: Radar and vision data fusion for hybrid adaptive cruise control on highways. Machine
Vision and Applications 14 (2003) 1, 42{49
15. Batavia, P.H.: Driver-adaptive lane departure warning sytems. CMU-RI-TR-99-25 (1999)
16. Meng-Che Chuang, Jenq-Neng Hwang, and Kresimir Williams", A Feature Learning and Object Recognition framework for
underwater fish images", IEEE transactions on image processing, vol.25, no.4, pp.1862-1872, 2016.
17. Yuichi Saito, Makoto Itoh, and Toshiyuki Inagaki,"Driver Assistance System with a Dual Control Scheme: Effectiveness of
Identifying Driver Drowsiness and Preventing Lane Departure Accidents",IEEE transactions on human-machine systems, March
2016.
18. K. Bengler, K. Dietmayer, B. Farber, M. Maurer, C. Stiller, and H. Winner, “Three decades of driver assistance systems: Review and
future perspectives,” IEEE Intelligent Transportation Systems Magazine, vol. 6, no. 4, pp. 6–22, April 2014.
19. Ju Han Yoo, Seong-Whan Lee, Sung-Kee Park, and Dong Hwan Kim, “A Robust Lane Detection Method Based on Vanishing
Point Estimation Using the Relevance of Line Segments", IEEE Transactions On Intelligent Transportation Systems", vol.18, no .12,
February 2017.
20. Gurveen Kaur, and Dinesh Kumar,"Lane Detection Techniques: A Review", International Journal of Computer Applications,
vol.112, no 10, pp.0975 – 8887, February 2015.
21. Seokju Lee, Junsik Kim, Jae Shin Yoon, Seunghak Shin,OleksandrBailo, Namil Kim Tae-Hee Lee, Hyun Seok Hong, Seung-Hoon
Han, and In So Kweon, "VPGNet: Vanishing Point Guided Network for Lane and Road MarkingDetection and Recognition", In
Proceedings of the IEEE International Conference on Computer Vision, pp. 1947-1955, 2017.
22. Alexander Rakhlin, Alexey Shvets, Vladimir Iglovikov, and Alexandr A. Kalinin, "Deep Convolutional Neural Networks for Breast
Cancer Histology Image Analysis", In proceedings of International Conference on Image Analysis and Recognition ICIAR, Image
Analysis and Recognition, pp. 737-744, 2018.
23. Jun Li, XueMei, Danil Prokhorov, and Dacheng Tao,"Deep Neural Network for Structural Predictionand Lane Detection in Traffic
Scene",IEEE transactions on neural networks and learning systems, January 2016.
24. Mane, V.M. and Jadhav, D.V., "Holoentropy enabled-decision tree for automatic classification of diabetic retinopathy using retinal
fundus images," Biomedical Engineering/Biomedizinische Technik, vol.62, no.3, pp.321-332, 2017.
25. The KITTI Vision Benchmark Suite taken from, “http://www.cvlibs.net/datasets/kitti/eval_road.php”, accessed on August 2018.
26. Umar Ozgunalp, Rui Fan, Xiao Ai, and NaimDahnoun, "Multiple Lane Detection Algorithm Based on Novel Dense Vanishing Point
Estimation", IEEE Transactions On Intelligent Transportation Systems, Vol. 18, No. 3, March 2017.
27. M. A. Sotelo, F. J. Rodriguez, L. Magdalena, L. M. Bergasa, and L. Boquete, “A color vision-based lane tracking system for
autonomous driving on unmarked roads,” Automotive Robotics , vol. 16, no. 1, pp. 95–116, January 2004.
28. López, J. Serrat, C. Cañero, F. Lumbreras, and T. Graf, “Robust lane markings detection and road geometry computation,”
International Journal of Automotive Technology, vol. 11, no. 3, pp. 395–407, 2010.
29. D. Schreiber, B. Alefs, and M. Clabian, “Single camera lane detection and tracking,” in Proceedings on IEEE Transactions on
Intelligent Transportation Systems, 2005, pp. 302–307.
30. Y. Wang, N. Dahnoun, and A. Achim, “A novel system for robust lane detection and tracking,” Signal Processing, vol. 92, no. 2, pp.
319–334, 2012.
31. Y. Wang, E. K. Teoh, and D. Shen, “Lane detection and tracking using B-snake,” Image and Vision Computing., vol. 22, no. 4, pp.
269–280, 2004.
32. Y. Wang, L. Bai, and M. Fairhurst, “Robust road modeling and tracking using condensation,” IEEE Transactions on Intelligent
Transportation Systems, vol. 9, no.4, pp. 570–579, Dec. 2008.
33. C. Rasmussen, “Grouping dominant orientations for ill-structured road following,” in Proceedings on IEEE CVPR, 2004, vol. 1, pp.
I-470–I-477.
34. https://www.google.com/search?tbm=isch&sxsrf=ACYBGNSBkOTQLJChugxKa7CA0kul6erzXg%3A1570211788010&sa=1&ei=z
IeXXcQkwtrPuw_q8LDgCQ&q=road+lane+detection+system&oq=road+lane+detection+system&gs_l=img.3...144860.151727..152
637...0.0..0.236.3182.0j14j3......0....1..gws-wiz-
img.......0i8i30.YDdoTXHMPAE&ved=0ahUKEwjEuuLeloPlAhVC7XMBHWo4DJwQ4dUDCAY&uact=5#imgrc=z7Sk3PYmPaO
h7M:
35. https://www.google.com/search?tbm=isch&sxsrf=ACYBGNSMq07HXnjeFV49L8uCIcEftEy91g%3A1570211951491&sa=1&ei=b4
iXXZbOHZH7z7sPi5aOoAM&q=crow+search+algorithm+%28ew-
csa%29%2C&oq=cro&gs_l=img.3.0.35i39j0i67l9.251018.251574..253792...0.0..0.742.1139.0j1j1j6-1......0....1..gws-wiz-
img.......0.xafvuLc0QmM#imgrc=XvRC-FwhTbkMlM:
36. https://www.google.com/search?tbm=isch&sxsrf=ACYBGNTBKB6KyvqBAULkIfkAJX8toGtI_A%3A1570212211199&sa=1&ei=
c4mXXd_mC7Xfz7sP27KUqA0&q=lastest+warning+lane&oq=lastest+warning+lane&gs_l=img.3...112836.120562..120676...0.0..0
.421.3890.0j8j9j0j1......0....1..gws-wiz-
img.......35i39j0j0i67j0i10j0i10i24.sw8P29hFHO0&ved=0ahUKEwif7MeomIPlAhW173MBHVsZBdUQ4dUDCAY&uact=5#imgrc
=a2b1aN3eEDJS4M:
37. Recent Progress in Road and Lane Detection - A survey by Aharon Bar Hillel ¢ Ronen Lerner ¢ Dan Levi ¢ Guy Raz
Keyword : Ocean Energy, Marine Renewable Energy, Wave Energy Converter, Overtopping Device,
Computational Fluid Dynamic (CFD)
852. References:
1. J. P. Kofoed, “Model Testing of the Wave Energy Converter Seawave Slot-Cone Generator,” Hydraul. Coast. Eng. No .18, 2005. 4902-
2. B. J. Larsen and J. P. Kofoed, “Model Test Setup and Program for Experimental Estimation of Surface Loads of the SSG Kvitsøy Pilot Plant
from Extreme Wave Conditions,” Civ. Eng., no. phase 4, 2005.
4911
3. J. P. Kofoed, “Wave Overtopping of Marine Structures - Utilization of Wave Energy,” PhD Thesis, Aalborg University, 2002.
4. J. P. Kofoed, “Model study of overtopping of marine structures for a wide range of geometric parameters,” in The 27th International
Conference on Coastal Engineering : ICCE 2000, 2000.
5. L. Margheritini, D. Vicinanza, and P. Frigaard, “Sea Slot Cone Generator Overtopping Performance in 3D Conditions,” in ISOPE-
International Offshore and Polar Engineering Conference. Proceedings, 2008, p. 18.
6. L. Margheritini, L. Victor, J. P. Kofoed, and P. Troch, “Geometrical Optimization for Improved Power Capture of Multi-level Overtopping
Based Wave Energy Converters,” Isope, vol. 1. International Society of Offshore and Polar Engineers, Osaka, Japan, pp. 339–344, 01-Jul-
2009.
7. M. Buccino, D. Vicinanza, F. Ciardulli, M. Calabrese, and J. Peter, “Wave Pressures and Loads on a Small Scale Model of the Svåheia SSG
pilot project,” in 9th European Wave and Tidal Energy Conference, 2011, pp. 1–7.
8. L. Margheritini, V. Stratigaki, and P. Troch, “Geometry Optimization of an Overtopping Wave Energy Device Implemented into th e New
Breakwater of the Hanstholm Port Expansion,” in International Offshore and Polar Engineering Conference, 2012, pp. 593–600.
9. J. W. Van der Meer and W. Janssen, “Wave run-up and wave overtopping at dikes and revetments,” 1994.
10. J. . de Wall and J. . van der Meer, “Wave runup and overtopping on coastal structures,” in Proceedings of the twenty -third coastal
engineering conference, 1992, pp. 1758–1771.
11. J. W. Van der Meer, Wave run-up and overtopping. Dikes and Revetments: Design, Maintenance and Safety Assessment, ed. KW Pilarczyk
(AA Balkema, Rotterdam, The Netherlands). A.A. Balkema, 1998.
12. L. Méhauté, R. C. Y. Koh, and L. Hwang, “A Synthesis on Wave Run-Up,” J. Waterw. Harb. Div., vol. 94, no. 1, pp. 77–92, 1968.
13. L. Margheritini, D. Vicinanza, and P. Frigaard, “SSG wave energy converter: Design, reliability and hydraulic performance of an innovative
overtopping device,” Renew. Energy, vol. 34, no. 5, pp. 1371–1380, May 2009.
14. D. Vicinanza, P. Contestabile, Q. H. N. Jørgen, and T. Lykke Andersen, “Innovative rubble mound breakwaters for overtopping w ave
energy conversion,” Coast. Eng., vol. 88, pp. 154–170, Jun. 2014.
15. I. Flow Science, FLOW-3D Documentation Release 10.1.0. 2012.
16. L. Franco, J. Geeraerts, R. Briganti, M. Willems, G. Bellotti, and J. De Rouck, “Prototype measurements and small-scale model tests of
wave overtopping at shallow rubble-mound breakwaters: the Ostia-Rome yacht harbour case,” Coast. Eng., vol. 56, no. 2, pp. 154–165,
2009.
17. B. MacVicar and J. Best, “A flume experiment on the effect of channel width on the perturbation and recovery of flow in straight pools and
riffles with smooth boundaries,” J. Geophys. Res. Earth Surf., vol. 118, no. 3, pp. 1850–1863, 2013.
Paper Title: A Metallurgic and Mechanical Differentiation to Friction Stir Welding (FSW)
Abstract: The objective of this research was to measure the material properties as well as the forces to
orthodox friction stir welding (FSW) performed in air of AA6061. These results were compared by using ultimate
tensile strength (UTS) and weld root properties such as joint line residue length at the crossing point between the
welded aluminum alloy which allows crack initiation. Metallurgic cross sections of the AA6061 welds were
prepared and the weld nugget hardness between the welding parameters was compared as well. Experiments such
as this one and others enumerating the forces and process parameters must be achieved. A steady state model of
temperature distribution has been put forward and is shown to precisely forecast trends in heat input using heat
generation equations from [1,2]. Temperature distribution was measured and correlated to data by use of Micron
Thermal Imaging camera.
Keyword : Friction stir welding, Tensile strength, Ttemperature distribution, Hardness, Grain size.
853. References:
1. Arbegast W. et al. “Friction Stir Spot Welding”. 6th International Symposium on Friction Stir Welding. Session 4B. 2006.
2. Arbegast W. “A flow-partitioned deformation zone model for defect formation during friction stir welding”. Scripta Materialia. 58
4912-
(2008) 372- 376. 4915
3. Bloodworth T., Cook G., Strauss A. “Properties and forces of immersed friction stir welded AA6061-T6”. 8th International
Conference of Trends in Welding Technology. Pine Mountain, GA. (2008). 1-5.
4. Bunker E., Fleming P., Bloodworth T. “Friction Stir Welding Manual”. Vanderbilt University Welding Automation Laboratory.
2007.
5. Clark T., “An analysis of microstructure and corrosion resistance in underwater friction stir welded 304L stainless steel”. MS.
Brigham Young University. 2005.
6. Colegrove P., Shercliff H. “Development of Trivex friction stir welding tool: Part 1 – two-dimensional flow modeling and
experimental validation.” Science and Technology of Welding and Joining. 9 (2003). 345-351.
7. Colegrove P., Shercliff H. “Development of Trivex friction stir welding tool: Part 2 – three-dimensional flow modeling”. Science
and Technology of Welding and Joining. 9 (2004). 352-361.
8. Crawford R. “Parametric quantification of friction stir welding”. MS. Vanderbilt University. 2005.
9. Crawford R., “A mechanistic study of the friction stir welding process”. PhD. Dissertation. Vanderbilt University. 2006.
10. Crawford R., Bloodworth T., Cook G., Strauss A. “High speed friction stir welding process modeling”. 6th International Sympo sium
on Friction Stir Welding. Saint Sauveur, Canada. 2006.
11. Dubourg L., Dacheux P. “Design and properties of FSW tools: a literature review”. 6th International Symposium on Friction St ir
Welding. Session 01 paper 62. 2006.
Paper Title: Fog Based Sensing and Transmission Mechanisms of Vital Bio-Signals
Abstract: Internet of Things (IoT) makes everything interconnected to communicate and perform tasks.
Some IoT examples to quote are smart city, smart house, smart bus etc. The main focus of this paper is to make a
survey and propose a system that automates bio-signal sensing in healthcare industry. The data which are recorded
should be accurate and should reach the destination in time for decision making. This can be achieved by using
precision microcontrollers enhanced with IoT and fog computing. Using IoT in healthcare industry makes these
processes faster and more accurate. Keeping the existing systems in mind we propose system which is a
combination of IoT and fog computing. The proposed system can be divided into 4 layers: data gathering, data
transmission, data storage and data retrieval. Usage of proposed system in healthcare industry can improve the
efficiency of transmitting vital data to healthcare centers during emergency.
Keyword : IoT, Fog Computing, Biomedical Sensors, e-Health, Bio-signal, Microcontrollers, Arduinos.
References:
1. “IOT Definition.” [Online]. Available: https://www.happiestminds.com/Insights/internet-of-things/.
2. V. M. Rohokale, “A Cooperative Internet of Things ( IoT ) for Rural Healthcare Monitoring and Control,” 2011.
3. A. A. Gurjar and N. A. Sarnaik, “Heart Attack Detection By Heartbeat Sensing using Internet Of Things : IoT,” pp. 3 –6, 2018.
4. S. Monisha, R. Niranjana, M. Sabitha, and V. Sowmiya, “Iot based earlier stroke prediction,” vol. 6, no. 03, pp. 118–122, 2019.
5. N. R. M, V. Prabu, R. Kumar, and M. Y. Ahamed, “IOT BASED EPILEPSY MONITORING AND DETECTION USING
AMBULATORY SYSTEM,” vol. 6, no. 03, pp. 2017–2019, 2019.
6. R. Harikrishnan, S. Keerthini, S. V Varshan, and R. Rahul, “IOT BASED SYSTEM DESIGN FOR DETECTING URINARY
BLADDER LEVEL,” vol. 6, no. 03, pp. 2017–2020, 2019.
7. B. N. Karthik, L. D. Parameswari, R. Harshini, and A. Akshaya, “Survey on IOT & Arduino Based Patient Health Monitoring Syste m,”
855. vol. 3, no. 1, pp. 1414–1417, 2018.
8. K. Yeh and S. Member, “A Secure IoT-Based Healthcare System With Body Sensor Networks,” IEEE Access, vol. 4, pp. 10288–10299,
2017. 4922-
9. A. Mukhopadhyay, B. Xavier, S. Sreekumar, and M. Suraj, “Real-Time ECG Monitoring over Multi-Tiered Telemedicine Environment 4928
using Firebase,” 2003.
10. D. N, R. K, R. Krishnan, and M. Ramesh, “A Low Cost Remote Cardiac Monitoring Framework for Rural Regions,” Proc. 5th EAI Int.
Conf. Wirel. Mob. Commun. Healthc. - "Transforming Healthc. through Innov. Mob. Wirel. Technol., 2015.
11. J. S. Kumar, “A Survey on Internet of Things : Security and Privacy Issues,” vol. 90, no. 11, pp. 20–26, 2014.
12. C. Doukas and I. Maglogiannis, “Bringing IoT and cloud computing towards pervasive healthcare,” Proc. - 6th Int. Conf. Innov.
Mob. Internet Serv. Ubiquitous Comput. IMIS 2012, pp. 922–926, 2012.
13. M. Hassanalieragh et al., “Health Monitoring and Management Using Internet-of-Things (IoT) Sensing with Cloud-Based Processing:
Opportunities and Challenges,” Proc. - 2015 IEEE Int. Conf. Serv. Comput. SCC 2015, pp. 285–292, 2015.
14. “IoT products.” [Online]. Available: https://econsultancy.com/internet-of-things-healthcare/.
15. “Benefits of IOT in Health care.” [Online]. Available: https://www.archer-soft.com/en/blog/5-benefits-internet-things-hospitals-and-
healthcare.
16. “Fog computing Definition.” [Online]. Available: https://internetofthingsagenda.techtarget.com/definition/fog-computing-fogging.
17. T. Patel and K. Jariwala, “Fog computing in iot 1 1,” pp. 17–21, 2018.
18. J. Abdelaziz, M. Adda, and H. Mcheick, “An Architectural Model for Fog Computing,” vol. 10, no. 1, pp. 21–25, 2018.
19. R. Mahmud, K. Ramamohanarao, and R. Buyya, “Latency-Aware Application Module Management for Fog Latency-aware Application
Module Management for Fog Computing Environments,” no. March, 2018.
20. [20] G. Lee, W. Saad, and M. Bennis, “An Online Secretary Framework for Fog Network Formation with Minimal Latency,” pp. 1 –6,
2017.
21. S. Sarkar, S. Member, S. Chatterjee, and S. Member, “Assessment of the Suitability of Fog Computing in the Context of Internet of
Things,” vol. 7161, no. c, pp. 1–14, 2015.
22. M. Chiang and T. Zhang, “Fog and IoT: An Overview of Research Opportunities,” IEEE Internet Things J., vol. 3, no. 6, pp. 854–864,
2016.
23. Y. N. Krishnan, C. N. Bhagwat, and A. P. Utpat, “Fog Computing- Network Based Cloud Computing,” no. Icecs, pp. 250–251, 2015.
24. T. N. Gia, M. Jiang, A. M. Rahmani, T. Westerlund, P. Liljeberg, and H. Tenhunen, “Fog computing in healthcare Internet of Th ings: A
case study on ECG feature extraction,” Proc. - 15th IEEE Int. Conf. Comput. Inf. Technol. CIT 2015, 14th IEEE Int. Conf. Ubiquitous
Comput. Commun. IUCC 2015, 13th IEEE Int. Conf. Dependable, Auton. Se, pp. 356–363, 2015.
25. T. N. Gia et al., “Fog Computing in Body Sensor Networks : An Energy Efficient Approach,” IEEE Int. Body Sens. Networks Conf., no.
August, 2015.
26. “MAX30100.” [Online]. Available: https://www.instructables.com/id/How-to-Wire-MAX30100-Heart-Rate-Monitor-With-Ardui/.
27. “Myoware muscle sensor.” [Online]. Available: https://randomnerdtutorials.com/9-biometric-sensors-arduino-compatible/.
28. “Difference between Arduino and Raspberry pi.” .
29. S. Anand and A. Rr, “A Protocol for The Effective Utilization of Energy in Wireless Sensor Network,” vol. 7, pp. 93–98, 2018.
30. S. Anand and P. A. Radhakrishna, “A Protocol for the Effective Utilization of Energy in Wireless Sensor Network,” vol. 7, pp. 82–86,
2018.
Keyword : vibration, multi dimension alchaotic processes, Tsallis entropy, Poincare recurrence, stability,
Lyapunov exponents
References:
1. Ismailov B.I. (2018). Analysis and Control of Dynamic Processes in Mechanical Parts of Power Equipment. International Journal of
Mechanical and Production Engineering Research and Development (IJMPERD). Pp. 347-352.
2. Loskutov A.YU. (2001). Problemynelinejnojdinamiki II. Podavleniehaosaiupravleniedinamicheskimisistemami. VestnikMoskovskogo
Un-ta. Seriya 3. Fizika. Astronomiya, №3.- s. 3-21.
3. .Malineckij G.G., Potapov A.B. (2002).Sovremennyeproblemynelinejnojdinamiki. M.: Editorial URSS. 360 s.
4. Ismailov B.I. (2017). Thermodynamic – Informational Paradigm in the Context of the Formation of a Mathematical Model of Transient
856. Processes in an Open System. European Journal of Engineering Research and Science Vol. 2, No. 10.Pp. 17-20.
5. Hegari A.S., Matouk A.E. (2011). Dynamical behaviors and synchronization in the fractional order hyperchaotic Chen system. Applied
Mathematics Letters 24.Pp. 1938-1944. 4929-
6. Han Qiang at al. (2013). A four-dimension fractional order hyperchaotic system derived from Liu-system and its circuit research. Chinese 4932
Physics B. Volume 22, Number 2. Pp. 1-6.
7. Sprott J.C. (2003). Chaos and Time Series Analysis, Oxford University Press, Oxford. P. 507.
8. Panaggio Mark J. (2015). Chimera states: coexistence of coherence and incoherence in networks of coupled oscillators. IOP Publishing.
Nonlinearity 28. R67–R87. doi:10.1088/0951-7715/28/3/R67.
9. Shanahan Murray. (2010). Metastable chimera states in community-structured oscillator networks. Chaos 20.Pp. 1-5.
10. Poincare A. (1912). Calcul des Probabilities. Paris: Gouthier-Villars.
11. Eckmann J. at al. (1987).Recurrence plots of dynamical systems //Europhys. Lett., 4. Pp. 973-977.
12. Bruce Hobbs and Alison Ord (2018). Nonlinear dynamical analysis of GNSS data: quantification, precursors and synchronization.
Progress in Earth and Planetary Science. 35p.
13. Vladimirskij E.I., Ismajlov B.I. (2011).Nelinejnyjrekurrentnyjanalizkakmatematicheskaya model' upravleniyahaoticheskimiprocessami.
Informacionnyetekhnologii, №5, (177). s. 42-45.
14. Ismailov B.I. (2012). The Visual Control of Vibration Dynamic System. Eastern-European Journal of Enterprise Technologies. №5.
Pp.25-30.
15. Vladimirskiy E.I. (2005). Otobrazhenieprintsipovrefleksii v matematicheskoymodeliprinyatiyaudovletvoritelnyihresheniy. Tr. IV Mezhd.
Konferentsii «Identifikatsiyasistemizadachiupravleniya», SICPRO’05. Moskva 25-28 yanvarya. M.: Institut problem upravleniyaim.
V.A.Trapeznikova RAN. Pp. 1681-1688.
16. Zeleny L.M., Milovanov A.V. (2004).Fraktalnayatopologiyaistrannayakinetika: otteoriiperkolyatsii k
problemamkosmicheskoyelektrodinamiki. [Tekst]// UFN, t. 174, №8, s. 810-850.
17. Anishchenko V.S., Astakhov S.V. (2013) TeoriyavozvratovPuankareieyoprilozheniye k zadachamnelineynoyfiziki. [Tekst] //UFN 183
1009–1028.
18. Vladimirsky E.I. (2012). Poincare Returns Times in the Interaction of Chaotic and Stochastic Systems. Eastern-European Journal of
Enterprise Technologies. №6/4 (60). Pp.4-8.
19. Vladimirsky E., Ismailov B. (2014). Fractional Structure « MIXING - TRANSPORT » as Open System. Eastern-European Journal of
Enterprise Technologies. №4/4 (70). Pp.4-9.
20. Laskin N. at al. (2002). Fractional Levy Motion and Its Applications to Network Traffic Modeling. [Text].// Computer Networks, vol. 40,
issue 3, pp. 363-375. Doi>10.1016/S1389-1286(02)00300-6.
Paper Title: Analysis of Thermal Protection System in Flex Seal of a Rocket Motor
Abstract: A Thermal protection system is used to protect the rocket from the heat generated by the hot gases.
A thermal boot is used as the thermal protection system at the outside of the nozzle to protect the flex seal. The
objective of the present work is to design the thermal protection system for flex seal using different composite
857. materials for single time of flight and to study the ablation of the materials. The problem is modelled using
commercial ANSYS software. 3-D Axi-symmetric transient thermal analysis is performed for the flex seal along
4933-
with thermal protection system made of composite materials. The initial and boundary conditions are applied to
4936
meet the industrial requirement. From this analysis, thermal protection system made of different composite
materials is studied and one is suggested based on ablation and weight reduction.
Authors: Venkata Sai Mounik Yerubandi, Praveen Mathi, Kali Prasad Varma Namburi
858.
Keyword : lean, six sigma, methodologies, variations, continuous improvement, DMAIC.
4937-
References: 4940
1. https://www.isixsigma.com/methodology/.
2. S.K. Bhattacharyya and Zillur Rahman, (2004), "Capturing the customer's voice, the centerpiece of strategy making", European Business
Review, Vol. 16 Iss 2 pp. 128 – 138.
3. H. Brian Hwarng, Cynthia Teo, (2001), "Translating customer's voices into operations requirements", International Journal of Quality
& Reliability Management, Vol. 18 Iss 2 pp. 195-226.
4. Jiju Antony and E. V. Gijo, and S.J. Childe, (2012) Case study in six sigma methodology: manufacturing quality improvement and
guidance for managers. Production Planning and Control, 23 (8). pp. 624-640.
5. Niraj G. Pai Bhale, P.K. Srividhya, V. Mariappan, Amol N. Patil, and M. Prabhakaran, International Journal of Performability
Engineering, Vol. 13, No. 1, January 2017, pp. 19-28.
6. George, M.L, Lean Six Sigma for Services, 2003.
7. Alessandro Laureani and Jiju Antony, Lean six sigma in a call center: a case study, International Journal of Productivity and Performance
Management, Vol. 59 No. 8, 2010 pp. 757-768.
8. Salah Deeb, Hind bril-EI Haouzi, Alexis Aubry, Michele Dassisti, “A generic framework to support the implementation of six sigma
approach in SMEs”, IFAC PapersOnLine 51-11 (2018) 921–926.
Paper Title: Advance Automatic Toll Collection & Vehicle Detection using Iot
Abstract: In our step by step life we as often as possible go through toll square.There is a blockage wastage
of time as well as fuel at toll gates. To vanquish above issues, it becomes critical to quicken the method near toll
861. court. From now on to overcome the issues saw toll court RFID based toll gathering structure is used. The planning
time required by RFID Toll Collection System is extensively not exactly but manually toll amassing structure. 4953-
Manually toll gathering structure in like manner prompts human botches which may incite erroneous toll 4955
aggregation. We furthermore every now and again find the opportunity to hear that the amount of endeavor at
murder cases is extending well ordered. There may even be a loss of life. It’s difficult to get the liable party in
endeavor at homicide cases. It is seen that in case of stolen vehicle it is incredibly difficult to pursue the vehicle. It
is critical to control all these above issues. Thusly, systems similarly has additional function of distinguishing the
stolen vehicles and disaster cases that are enlisted. It is seen that over-troubling the vehicles may incite accident and
besides hurt the boulevards. This issue is adds address for system by measuring items passing on vehicle and blame
them for excess toll if it is over-trouble so they won't over-load again. Structure moreover makes portion system
straightforward by making all trade. An assessment in field of usage of RFID structure is developing giant scale.
Keyword : Internet of things; IOT , Smart Roadways, digital technology , public transport problem .
References:
1. N. Jeevagan, P. Santosh, R. Berlia, S. Kandoi, “RFID Based Vehicle Identification ” IEEE Global Humanitarian Technology Confe rence
2018.
2. R. Kalantri, A. Parekar, A. Mohite, R. Kankapurkar, “RFID based toll collection system,” International Journal of Comp uter Science and
Information Technologies, Vol. 5 (2) 2018.
3. R.B. Takbhate,S.D. Chavan “Automated Toll Booth System,” International Journal of Research Studies in Computer Science and
Engineering, Vol. 1 (3), July2018 .
4. T.Aphale, R. Chaudhari, J. Bansod “Automated Toll Plaza Using RFID and GSM” International Journal on Recent and Innovation Trends
in Computing and Communication Volume: 2 Issue: 9, September 2018 .
5. G.K. Andurkar, V.R. Ramteke,”Smart Highway Electronic Toll Collection System,” International Journal of Innovative Research in
Computer and Communication EngineeringVol. 3, Issue 5, May 2018.
6. M.Rajeswari ,S.Chandana,D.VPruthvi, SarithaS.P,Ramya “Collision Detection And Avoidance Using Intelligent Vehicle Communication
Protocol,” National Conference on Recent Advances in Information & Communication Engineering (NCRAICE-2018)
7. R.Aishvarya, S.Poornima, K.Pradeepa, T.Subashini4, K.P.Lavanya “Automatic and Effective Tracking of Hit & Run Misbehavior Dri ver
with Emergency Ambulance Support,”International Journal of Advanced Research in Electrical, Electronics and Instrumentation
Engineering Vol. 5, Issue 3, March 2018.
Keyword : Amorphous silicon(a-Si), crystalline silicon (c‐Si), Cadmium Tellurium(CdTe) Dye- Sensitized
solar cells (DSSC), Gallium arsenide (GaAs), Galliun Indium Phosphide(GaInP), multicrystalline silicon (mc‐Si).
References:
862. 1. Ahmed Hossam Eldin , Mostafa Refaey , Abdelrahman Farghly “A Review on Photovoltaic Solar Energy Technology and its Efficiency”.
Research Gate, 22nd December 2015.
2. R.R.King, P.C.Coller, D.E.Joslin, D.D.Krut, N.H.Karam and Sarah Kurtz, “High Voltage , Low Current Gain GaInP/GaAs/GaIn NAs/Ge 4956-
Solar Cells”. Conference Record of the Twenty-Ninth IEEE Photovoltaic Specialistics Conference, 2002 on 22 April 2003. 4960
DOI:10.1109/PVSC.2002.1190713
3. K.Yarnamoto, M.Yoshimi, T.Suzuki, T.Nakat,T.Sawada, A. Nakajima and K.Hayashi, “Large Area and High Efficiency a-Si/Poly-Si
Stacked Solar Cell Submodule” Conference Record of 28 th IEEE PV conference 2000 in 06 August 2002.
DOI:10.1109/PVSC.2000.916161
4. Douglas M Bishop, Teodor Todorov, Yun Seog Lee, Oki Gunawan , Richard Haight, “Record Efficiencies for Selenium Photovoltaics and
Application to Indoor Solar Cells” 2.17 IEEE 4 th PVSC on 05 November 2018. DOI:10.1109/PVSC.2017.8366455
5. Kjell Cnops, Eszter Voroshazi, Carl Hart de Ruijter, Paul Heremans, David Chenyns, “Organic photovoltaic cell relying on en ergy
transfer with over 20% efficiency in indoor lighting”. 2104 IEEE 40 th PVSC
6. Monika Freunek, Michael Freunek, M.Reindl, “ Maximum efficiencies of Indoor Photovoltaic Devices”. IEEE Journel of Photovolta ics
on Jan 2013. DOI:10.1109/JPHOTOV.2012.2225023
7. C. Deline, J.Del Cueto, D.S.Albin, C.Petersen, L.Tyler, “Transient Response Of Cadmium Telluride Modules To Light Exposure”. 2011
37th IEEE Photovoltaic Specialists Conference, 19 April 2012. DOI:10.1109/PVSC.2011.6186602
8. Ian Matthews, Paul.J.King, Frank Stafford and Ronan Frizzell, “Performance of III–V Solar Cells as Indoor Light Energy Harvesters”
IEEE Journal of Photovoltaics, 26 October 2015. DOI:10.1109/JPHOTOV.2015.2487825
9. K.Luczak, C.P.Lund, P.J.Jennings and J.C.L.Cornish, ”Recovery Of Light Induced Degradation In Amorphous Silicon Solar Cells And
Modules”, 2006 IEEE 4 th World Conference o Photovoltaic Energy Conference, 15 January 2007. DOI:10.1109/WCPEC.2006.279923
10. Di Zhang, Abdul Hzi Alami, Muhammed Tawalbeh, Kamilia Aokal, Alya Alhammadi, “Effeciency and High Temperature response of
DSSC using natural dyes extracted from calotropis”
Authors: Sabir S. Sayyed, Anand B. Tapase, Ravindra P. Patil, A. C. Attar, Piyush G. Chandak
Paper Title: Performance Evaluation of Flexible Pavement for Critical Parameters Causing Premature Failure
Abstract: The present study focusses on the performance of flexible pavement at a different temperature. The
865. analysis is carried out using 2D axisymmetric finite element model for a combination of varying thicknesses of a
bituminous layer with base and sub-base. The study is very much useful to know the behaviour of flexible 4969-
pavement under varying climatic conditions along with loading and material properties. The critical parameters are 4976
examined to know the cause of failure of the existing pavement structure. The study evaluates different pavement
distresses in terms of rutting and fatigue life.
Keyword : Rutting, Fatigue, Premature Failure, Flexible Pavement
References:
1. American Association of State Highway Officials AASHTO (1993). AASHTO guide for the design of pavement structures.
AASHTO, Washington, D.C.
2. Andrew Chiasson, Cenk Yavuzturk, Khaled Ksaibati (2008). “Linearized approach for predicting thermal stresses in asphalt
pavements due to environmental conditions.” Journal of Materials in Civil Engineering. ASCE, 20(2), 118-127. doi: 10.1061/
(ASCE)0899-1561(2008)20:2 (118).
3. Animesh, Das, Pandey, B.B. (1999). “The m-e design of bituminous road: An Indian perspective.” Journal of Transportation
Engineering, ASCE, 125(5), 463-471. doi: 10.1061/ (ASCE) 0733-947X (1999)125:5(463).
4. Armando Orobioa and John P. Zaniewskib (2013). “Sensitivity of the mechanistic-empirical pavement design guide to traffic inputs:
a space-filling approach." Road Materials and pavement design, Taylor & Francis, 14(3), 735–746, doi:
10.1080/14680629.2013.816248.
5. Arpan Ghosha A. Padmarekhab J. Murali Krishnanc (2013) “Implementation and Proof-Checking of Mechanistic-Empirical
Pavement Design for Indian Highways Using AASHTOWARE Pavement ME Design Software.” Procedia-Social and Behavioral
Sciences 119–128 doi: 10.1016/j.sbspro.2013.11.104
6. Diefenderfer, B. K., Al-Qadi, I. L., and Diefenderfer, S. D. (2006). Model to predict pavement temperature profile: development and
validation. Journal of Transportation Engineering, ASCE, 132(2), 162-167.
7. Guangming Wang and Reynaldo Roque (2011). “Evaluation of truck tyre types on near-surface pavement response based on finite
element analysis.” International Journal of Pavement Research and Technology, 4(4), 203-211.
8. Helwany, Sam, Dyer, John, Joeleidy (1998). “Finite element analysis of flexible pavement.” Journal of Transportation Engineering,
ASCE, 124(5), 491-499. doi: 10.1061/(ASCE)0733 947X(1998)124:5(491).
9. Huang H.Yang (2008). Pavement analysis and design, Pearson Education Inc, and Dorling Kindersley Publishing, Inc, second
edition.
10. Immanuel, S., and Timm, D. H. (2006). Measured and Theoretical Pressures in Base and Subgrade Layers under Dynamic Truck
Loading. Proceeding, 2006 Airfield and Highway Pavement Specialty Conference, American Society of Civil Engineers, 155-166.
11. IRC: 37-2012. Guidelines for the design of flexible pavements. Indian Roads Congress, New Delhi.
12. Maha A. El-shaib, Sherif M. El-Badawy, El-Sayed A. Shawaly (2017). “Comparison of AASHTO 1993 and MEPDG considering the
Egyptian climatic conditions.” Innovative Infrastructure Solution. Springer International Publishing Switzerland. doi: 2(18),
doi:10.1007/s41062-017-0067-6.
13. Mohd Rosli Mohd Hasan, Jacob E. Hiller and Zhanping You (2015) “Effects of mean annual temperature and mean annual
precipitation on the performance of flexible pavement using ME design.” International Journal of Pavement Engineering,
doi.org/10.1080/10298436.2015.1019504.
14. NCHRP (2007). Evaluation of mechanistic-empirical design procedure. National Cooperative Highway Research Program, NCHRP
Project 1-37A, National Research Council, Washington.
15. Omran Maadani and A. O. Abd El Halim, (2017) “Environmental Considerations in the AASHTO Mechanistic-Empirical Pavement
Design Guide: Impacts on Performance.” Journal of Cold Regions Engineering, ASCE, ISSN 0887-381X
16. Piyush G. Chandak, Anand B. Tapase, Sabir S. Sayyed, Abdulrashid C. Attar (2017). “A State-of-the-Art Review of Different
Conditions Influencing the Behavioral Aspects of Flexible Pavement.” Advancement in the Design and Performance of Sustainable
Asphalt Pavements, Springer International Publishing, 300-312, doi: 10.1007/978-3-319-61908-8_22.
17. R.M. Mulungye, P.M.O. Owende and K. Mellon (2007). “Finite element modeling of flexible pavement on soft soil subgrades.”
Materials and Design. Elsevier. (28), 739-756.
18. Rahman M.T, Mahmud K and Ahsan S (2011). Stress-Strain characteristics of flexible pavement using finite element analysis.
International Journal of Civil and Structural Engineering, 2(1), 233-240.
19. Raj V. Siddharthan, Peter E. Sebaaly, Magdy El-Desouky, Dan Strand and David Huft (2005). “Heavy off-road vehicle tyre-
pavement interaction and response.” Journal of Transportation Engineering, ASCE, 131(3), 239-247. Doi: 10.1061/ (ASCE) 0733-
947X (2005) 131:3(239).
20. Ranadive, M.S and Anand B. Tapase (2016). “Parameter sensitive analysis of flexible pavement.” International Journal of Pavem ent
Research and Technology (IJPRT), Elsevier, Special Issue on Sustainability on Pavement Engineering.
doi:10.1016/j.ijprt.2016.12.001.
21. Ranadive, M.S. & Tapase, A. (2016). “Pavement performance evaluation for different combinations of temperature conditions and
bituminous mixes.” Innovative Infrastructure Solutions, Springer 1 (40), doi: 0.1007/s41062-016-0040-9.
22. Ranadive, M.S., Tapase, A.B. (2013). “Investigation of behavioral aspects of flexible pavement under various conditions by finite
element method.” Constitutive modeling of geomaterials, doi: 10.1007/978-3-642-32814-5_100
23. Ripunjoy Gogoi, Animesh Das and Partha Chakraborty (2013). “Are fatigue and rutting distress modes related?.” International
Journal of Pavement Research and Technology, 6(4), 269-273.
24. Sanaa Masad, Dallas Little and Eyad Masad (2006). “Analysis of flexible pavement response and performance using isotropic and
anisotropic material properties.” Journal of Transportation Engineering, ASCE, 132(4), 342-349.
25. Tapase A.B., Ranadive M.S. (2017) “Predicting Performance of Flexible Pavement Using Finite Element Method.” Advancement in
the Design and Performance of Sustainable Asphalt Pavements. Sustainable Civil Infrastructures. Springer, doi.org/10.1007/978 -3-
319-61908-8_11.
26. Tapase A, Ranadive M (2016). “Performance evaluation of flexible pavement using finite element method.” Material, Design,
Construction, Maintenance and testing of pavement, doi: 10.1061/9780784480090.002.
27. Xu Yang, Zhanping You, Jacob Hiller and David Watkins (2015) “Sensitivity of flexible pavement design to Michigan’s climatic
inputs using pavement ME design.” International Journal of Pavement Engineering, Taylor & Francis
doi.org/10.1080/10298436.2015.1105373
28. Yuhong Wang and Dan Chong (2015) “Long-Life Flexible Pavement: Myth, Reality, and the Way Forward.” ASCE New Frontiers in
Road and Airport Engineering, 268-283.
29. Zuo, G., Drumm, E. C., and Meier, R. W. (2007). “Environmental effects on the predicted service life of flexible pavements.” J.
Transp. Eng., 133(1), 47-56.
Authors: Siddhartha Dhar Choudhury, Shashank Pandey, Kunal Mehrotra, Christhu Raj, Rajeev S
Paper Title: Reducing Regression Time in Neural Network using Nth Absolute Root Mean Error
Abstract: Neural networks require a large dataset to learn features, and this takes high computational power,
even using high end Graphical Processing Units (GPUs) some use cases might require days of continuous training.
This can be solved either by making hardware specific changes to code or by replacing the algorithm used. In this
paper we propose a novel loss function called Nth Absolute Root Mean Error (NARME) which speeds up the
training process for a set of supervised learning problems, specifically regression (which is a problem in which we
predict value of a continuous variable). In this function, we take nth root of the absolute difference between the
predicted and the actual output, then calculate the mean over the entire set of data points available in the dataset,
thus in a way starting at a much lower point in the gradient descent curve than other commonly used regression
losses. The loss function (NARME) places the value of loss after the first iteration to a point that is closer to the
minima (which is the goal of the training process), and then takes small number of descent steps in the n-
dimensional space to reach the global minima. NARME has been found to work with commonly used neural
network architectures and is shown to work exceptionally well with Neural Arithmetic and Logic Unit cell type
867. networks. The usage of this type loss function in regression problems helps speed the training process by a factor of
ten in most of the cases, due to the small number of steps it requires to reach the minima.
4981-
4985
Keyword : Loss function, regression, neural network, training time.
References:
1. Andrew Trask, Felix Hill, Scott Reed, Jack Rae, Chris Dyer, Paul Blunsom, Neural Arithmetic and Logic Unit, in CoRR, 2018.
2. Kalyan Das, Jiming Jiang, J N K Rao, Mean Squared Error of Empirical Predictor, Ann. Statist. 32 (2004), no. 2, 818--840. , pp. 123–135.
3. Jacopo Cavazza, Vittorio Murino, Active Regression with adaptive Huber loss, in CoRR, 2016.
4. Vasileios Belagiannis, Christian Rupprecht, Gustavo Carneiro, Nassir Navab, Robust Optimization for Deep Regression, in CoRR, 2015.
5. Jose Hernandez-Orallo, Soft (Gaussian CDE) regression models and loss functions, in CoRR, 2012.
6. Hang Zhao, Orazio Gallo, Iuri Frosio, Jan Kautz, “Loss Functions for Image Restoration with Neural Networks,” IEEE Transactions on
Computational Imaging, March 2017.
7. Donald F Specht, A General Regression Neural Network, IEEE Transactions on Neural Networks, November 1991.
8. Xin Yao, “Evolving Artificial Neural Networks,” IEEE, September 1999.
9. Leon Bottou, Stochastic Gradient Descent Tricks, Springer Neural Networks, 2012.
10. Sebastian Ruder,An overview of gradient descent optimisation algorithms, CoRR, 2016.
11. Jiang Wang, Yi Wang, Junhua Mao, Zhiheng Huang, Chang Huang, Wei Xu,CNN-RNN: A Unified Framework for Multi-Label Image
Classification, IEEE CPVR, 2016.
12. Yann LeCun, Yoshua Bengio, Geoffrey Hinton, Deep Learning, Nature, 2015.
Keyword : Apache Spark, Feed-Forward Neural Network, Gauss-Newton Method, Gradient Descent, Machine
learning, Parkinson’s disease.
References:
1. Parkinson’s Foundation. (Accessed on 2 Jan 2019). Available: https://www.parkinson.org/Understanding-Parkinsons/Statistics.
2. Hardy, J., Cai, H., Cookson, M.R., Gwinn‐Hardy, K. and Singleton, A. (2006). Genetics of Parkinson's disease and parkinsonism.
Annals of neurology, 60(4), pp.389-398.
3. Ghassemi, M., Naumann, T., Schulam, P., Beam, A. L., & Ranganath, R. (2018). Opportunities in Machine Learning for Healthcare .
arXiv preprint arXiv:1806.00388.
4. Gupta, M., & Gupta, B. (2018, February). A Comparative Study of Breast Cancer Diagnosis Using Supervised Machine Learning
Techniques. In 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (pp. 997 -1002).
IEEE.
5. Guo, P.F., Bhattacharya, P. and Kharma, N. (2010, June). Advances in detecting Parkinson’s disease. In International Conferen ce on
Medical Biometrics (pp. 306-314). Springer, Berlin, Heidelberg.
6. Sriram, T.V., Rao, M.V., Narayana, G.S., Kaladhar, D.S.V.G.K. and Vital, T.P.R. (2013). Intelligent Parkinson disease prediction
using machine learning algorithms. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2, pp.44-52.
7. Tsanas, A., Little, M.A., McSharry, P.E., Spielman, J. and Ramig, L.O. (2012). Novel speech signal processing algorithms for high-
accuracy classification of Parkinson's disease. IEEE transactions on biomedical engineering, 59(5), pp.1264-1271.
8. Little, M.A., McSharry, P.E., Hunter, E.J., Spielman, J. and Ramig, L.O. (2009). Suitability of dysphonia measurements for
telemonitoring of Parkinson's disease. IEEE transactions on biomedical engineering, 56(4), pp.1015-1022.
9. Sapir, S., Ramig, L.O., Spielman, J.L. and Fox, C. (2010). Formant centralization ratio: A proposal for a new acoustic measure of
dysarthric speech. Journal of speech, language, and hearing research, 53(1), pp.114-125.
10. Tsanas, A., Little, M.A., McSharry, P.E. and Ramig, L.O. (2011). Nonlinear speech analysis algorithms mapped to a standard me tric
achieve clinically useful quantification of average Parkinson's disease symptom severity. Journal of the Royal Society Interface,
8(59), pp.842-855.
11. Aich, S., Younga, K., Hui, K. L., Al-Absi, A. A., & Sain, M. (2018, February). A nonlinear decision tree-based classification
approach to predict the Parkinson's disease using different feature sets of voice data. In Advanced Communication Technology
(ICACT), 2018 20th International Conference on (pp. 638-642). IEEE.
12. Nilashi, M., Ibrahim, O., Ahmadi, H., Shahmoradi, L., & Farahmand, M. (2018). A hybrid intelligent system for the prediction of
Parkinson's Disease progression using machine learning techniques. Biocybernetics and Biomedical Engineering, 38(1), 1-15.
13. Ho, A.K., Iansek, R., Marigliani, C., Bradshaw, J.L. and Gates, S. (1999). Speech impairment in a large sample of patients with
Parkinson’s disease. Behavioural neurology, 11(3), pp.131-137.
14. Harel, B., Cannizzaro, M. and Snyder, P.J. (2004). Variability in fundamental frequency during speech in prodromal and incipient
Parkinson's disease: A longitudinal case study. Brain and cognition, 56(1), pp.24-29.
15. Tsanas, A., Little, M. A., McSharry, P. E., & Ramig, L. O. (2010a). Accurate telemonitoring of Parkinson's disease progressio n by
noninvasive speech tests. IEEE transactions on Biomedical Engineering, 57(4), 884-893.
16. Tsanas, A., Little, M.A., McSharry, P.E. and Ramig, L.O. (2010b), March. Enhanced classical dysphonia measures and sparse
regression for telemonitoring of Parkinson's disease progression. In Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE
International Conference on (pp. 594-597). IEEE.
17. Luchsinger, J.A., Tang, M.X., Stern, Y., Shea, S. and Mayeux, R. (2001). Diabetes mellitus and risk of Alzheimer's disease an d
dementia with stroke in a multiethnic cohort. American journal of epidemiology, 154(7), pp.635-641.
18. Chen, J., Li, K., Tang, Z., Bilal, K., Yu, S., Weng, C. and Li, K. (2017). A parallel random forest algorithm for big data in a spark
cloud computing environment. IEEE Transactions on Parallel & Distributed Systems, (1), pp.1-1.
19. Ozcift, A. (2012). SVM feature selection-based rotation forest ensemble classifiers to improve computer-aided diagnosis of
Parkinson disease. Journal of medical systems, 36(4), pp.2141-2147.
20. Das, R. (2010). A comparison of multiple classification methods for diagnosis of Parkinson disease. Expert Systems with
Applications, 37(2), pp.1568-1572.
21. Kaladhar, D.S.V.G.K., Nageswara, R.P.V. and Ramesh, N.R.B.L.V. (2010). Confusion matrix analysis for evaluation o f speech on
Parkinson disease using Weka and MatLab. International Journal of Engineering Science and Technology, 2(7), pp.2734-2737.
22. Anaissi, A., Goyal, M., Catchpoole, D. R., Braytee, A., & Kennedy, P. J. (2016). Ensemble feature learning of genomic data using
support vector machine. PloS one, 11(6), e0157330.
23. Hardmeier, C. (2017). Predicting Pronouns with a Convolutional Network and an N-gram Model. In Proceedings of the Third
Workshop on Discourse in Machine Translation (pp. 58-62).
24. Güneş, F., Wolfinger, R. and Tan, P.Y. (2017). Stacked Ensemble Models for Improved Prediction Accuracy.
25. Shanthi, S. and Kumar, D. (2012). Prediction of blood glucose concentration ahead of time with feature based neural network.
Malaysian Journal of Computer Science, 25(3), pp.136-148.
26. Svozil, D., Kvasnicka, V. and Pospichal, J. (1997). Introduction to multi-layer feed-forward neural networks. Chemometrics and
intelligent laboratory systems, 39(1), pp.43-62.
27. Dash, R. (2017). Performance analysis of an evolutionary recurrent Legendre Polynomial Neural Network in application to FOREX
prediction. Journal of King Saud University-Computer and Information Sciences.
28. Jabban, T.M., Alali, M.A.E., Mansoor, A.K.Z. and Hamoodi, A.N. (2012). Enhancing the step response curve for rectifier current of
HVDC system based on artificial neural network controller. Journal of King Saud University-Engineering Sciences, 24(2), pp.181-
192.
29. Ramachandran, P., Zoph, B., & Le, Q. V. (2018). Searching for activation functions.
30. Nasrabadi, N. M. (2007). Pattern recognition and machine learning. Journal of electronic imaging, 16(4), 049901.
31. Clevert, D. A., Unterthiner, T., & Hochreiter, S. (2015). Fast and accurate deep network learning by exponential linear units (elus).
arXiv preprint arXiv:1511.07289.
32. Gower, R.M. and Gower, A.L. (2016). Higher-order reverse automatic differentiation with emphasis on the third-order. Mathematical
Programming, 155(1-2), pp.81-103.
33. Harrell, F. E. (2015). Ordinal logistic regression. In Regression modeling strategies (pp. 311-325). Springer, Cham.
34. Cox, D. R. (2018). Analysis of binary data. Routledge.
35. Ozcift, A. (2012). SVM feature selection-based rotation forest ensemble classifiers to improve computer-aided diagnosis of
Parkinson disease. Journal of medical systems, 36(4), pp.2141-2147.
36. Schlkopf, B., Smola, A. J., & Bach, F. (2018). Learning with kernels: Support vector machines, regularization, optimization, and
beyond.
37. Parkinson’s Data Set. (Accessed April 2018). Available:
https://archive.ics.uci.edu/ml/datasets/Parkinson+Speech+Dataset+with++Multiple+Types+of+Sound+Recordings.
38. Gelman, A., Goodrich, B., Gabry, J., & Vehtari, A. (2018). R-squared for Bayesian regression models. The American Statistician,
(just-accepted), 1-6.
39. Galdi, P., & Tagliaferri, R. (2018). Data Mining: Accuracy and Error Measures for Classification and Prediction. Reference Mo dule
in Life Sciences, no. January, Elsevier, 1-14.
40. Song, Q., Jiang, H., & Liu, J. (2017). Feature selection based on FDA and F-score for multi-class classification. Expert Systems with
Applications, 81, 22-27.
41. Arlot, S., & Celisse, A. (2010). A survey of cross-validation procedures for model selection. Statistics surveys, 4, 40-79.
References:
1. Arumugam S., Thangapandi Issac A., Somasundaram A., “Complex Analysis”, 9 th Reprint, Scitech Publications (India) Pvt. Ltd. ,
December 2007.
2. 2.Ponnusamy S., “ Foundations of Complex Analysis”, Second edition, Narosa Publishing House, New Delhi.
3. 3.Bosma W., Bastiaan cijsouw, “Complex Continued Fraction Algorithms”, Thesis, Radboud University, November 2015.
4. 4.Shalit J.O., Integer Functions and Continued fractions”, A.B. Thesis, Princeton University, 1979.
Paper Title: The Learning Design and Student’s Response to Physics Online Learning In Rural School of Indonesia
Abstract: The implementation of e-learning on science learning in Indonesia is a critical issue, especially in
the context of implementing a curriculum oriented towards the competency of students in today's digital era. The
problem faced by educators is in the social presence; in how to manage effective interaction between teachers-
students and students-students. This study aims to innovate e-learning which is Edmodo as a learning management
system (LMS) that is suitable for science learning requirements (Light and Optics) in junior high school students.
The research method used was a mix of qualitative and quantitative methods. The process of developing learning
design was arranged through focus group discussion approach (which involves LMS experts, learning evaluation
experts, learning strategists, physicists, and teachers) iteratively to obtain learning designs embedded in the
Edmodo. The sound learning design was then tested in a small group consisting of eighth-grade students.
Responses were measured using a USE questionnaire containing four aspects, i.e., usefulness, ease of use, ease of
learning, and satisfaction aspects. The results of the trial in the small group will indicate that LMS and learning
activities carried out meet student learning needs. These results provide optimism that mobile learning with
appropriate strategies can meet the learning needs of science, including in schools that have never used this
technology before.
Keyword : e-learning, learning design, learning innovation, learning management system, learning strategy,
mobile learning, social presence.
References:
1. J. G. S. Goldie, “Connectivism: A knowledge learning theory for the digital age?” Medical teacher, vol. 38, no. 10, pp. 1064-1069, 2016.
2. C. H. Tu, “On-line learning migration: from social learning theory to social presence theory in a CMC environment,” Journal of network
and computer applications, vol. 23, no. 1, pp. 27-37, 2000..
870. 3. J. C. Richardson, E. Besser, A. Koehler, J. Lim, and M. & Strait, “Instructors’ perceptions of instructor presence in online learning
environments,” The International Review of Research in Open and Distributed Learning, vol 17, no. 4, pp. 82-103, 2016.
4. D. Sulisworo, D. A. Kusumaningtyas, E. Nursulistiyo, and T. Handayani, “Mobile learning infusion through enhancing teachers’ 4999-
perception: Case study in eastern of Indonesia,” In International Conference on Science, Technology, Education, Arts, Culture and 5006
Humanity-" Interdisciplinary Challenges for Humanity Education in Digital Era"(STEACH 2018), (pp. 85-88). Atlantis Press, 2019.
5. I. Kožuh, Z. Jeremić, A. Sarjaš, J. L. Bele, V. Devedžić, and M. Debevc, “Social presence and interaction in learning environments: The
effect on student success,” Journal of Educational Technology & Society, vol. 18, no. 1, pp. 223-236, 2015.
6. O. Poquet, V. Kovanović, P. de Vries, T. Hennis, S. Joksimović, D. Gašević, and S. Dawson, “Social presence in massive open online
courses,” International Review of Research in Open and Distributed Learning, vol. 19, no. 3, pp. 43-68, 2018.
7. J. C. Richardson, A. A. Koehler, E. D. Besser, S. Caskurlu, J. Lim, and C. M. Mueller, “Conceptualizing and investigating instructor
presence in online learning environments,” The International Review of Research in Open and Distributed Learning, vol. 16, no. 3, pp.
256-297, 2015.
8. M. B. Horzum, “Interaction, Structure, Social Presence, and Satisfaction in Online Learning,” Eurasia Journal of Mathematics, Science &
Technology Education, vol. 11, no. 3, pp. 505-512, 2015.
9. J. Richardson, K. Swan, P. Lowenthal, and P. Ice, “Social presence in online learning: Past, present, and future,” In Global Learn (pp. 477-
483). Association for the Advancement of Computing in Education (AACE), April 2016.
10. J. Yuan, and C. Kim, “Guidelines for facilitating the development of learning communities in online courses,” Journal of Computer
Assisted Learning, vol. 30, no. 3, pp. 220-232, 2014.
11. Y. Mor, R. Ferguson, and B. Wasson, “Learning design, teacher inquiry into student learning and learning analytics: A call for action,”
British Journal of Educational Technology, vol. 46, no. 2, pp. 221-229, 2015.
12. S. M. Lee, “The relationships between higher order thinking skills, cognitive density, and social presence in online learning,” The Internet
and Higher Education, vol. 21, pp. 41-52, 2014.
13. S. Joksimović, D. Gašević, V. Kovanović, B. E. Riecke, and M. Hatala, “Social presence in online discussions as a process predictor of
academic performance,” Journal of Computer Assisted Learning, vol. 31, no. 6, pp. 638-654, 2015.
14. J. Bowers, and P. Kumar, “Students' perceptions of teaching and social presence: A comparative analysis of face-to-face and online
learning environments,” International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 10, no. 1, pp. 27-44,
2015.
15. M. T. Cole, D. J. Shelley, and L. B. Swartz, “Online instruction, e-learning, and student satisfaction: A three year study,” The International
Review of Research in Open and Distributed Learning, vol. 15, no. 6, pp. 111-131, 2014.
16. J. A. Gray, and M. DiLoreto, ”The effects of student engagement, student satisfaction, and perceived learning in online learning
environments,” International Journal of Educational Leadership Preparation, vol. 11, no. 1, pp. 1-20, 2016.
17. J. C. Dunlap, and P. R. Lowenthal, “The power of presence: Our quest for the right mix of social presence in online courses,” In Real life
distance education: Case studies in practice, 41-66, Information Age Publishing, 2014.
18. J. Costley, “The effects of instructor control on critical thinking and social presence: Variations within three online asynchronous learning
environments,” Journal of Educators Online, vol. 13, no. 1, pp. 109-171, 2016.
19. J. Ma, X. Han, J. Yang, and J. Cheng, “Examining the necessary condition for engagement in an online learning environment based on
learning analytics approach: The role of the instructor," The Internet and Higher Education, vol. 24, pp. 26-34, 2015.
20. K. Plante, and M. E. Asselin, “Best practices for creating social presence and caring behaviors online,” Nursing Education Perspectives,
vol. 35, no. 4, pp. 219-223, 2014.
21. D. Sulisworo, L. Yunita, and A. Komalasari, “Which Mobile Learning is More Suitable on Physics Learning in Indonesian High School?”
International Journal of Recent Contributions from Engineering, Science & IT (iJES), vol. 5, no. 1, pp. 97-104, 2017.
22. D. Sulisworo, and K. Permprayoon, “What is the Better Social Media for Mathematics Learning? A Case Study at A Rural School in
Yogyakarta, Indonesia,” International Journal on Emerging Mathematics Education, vol. 2, no. 1, pp. 39-48, 2018.
23. A. M. Lund, “Measuring usability with the use questionnaire,” Usability interface, vol. 8, no. 2, pp. 3-6, 2001.
24. R. A. Croxton, “The role of interactivity in student satisfaction and persistence in online learning,” Journal of Online Learning and
Teaching, vol. 10, no. 2, pp. 314-324, 2014.
25. L. C. Yamagata-Lynch, “Blending online asynchronous and synchronous learning,” The International Review of Research in Open and
Distributed Learning, vol. 15, no. 2, pp. 189-212, 2014.
Keyword : Wireless body area network, Medical applications, Quality of Service (QoS), Fireflies Ant
optimized reliable quality awareness energy efficient routing protocol.
References:
1. Dong L., Wu J.K., Chen X. Real Time Physical Activity Monitoring by Data Fusion in Body Sensor Networks. Proceedings of the 1 0th
International Conference on Information Fusion; Quebec, QC, Canada. 9–12 July 2007.
2. Aida E., Massoud H., Pejman K. Using Relay Network to Increase Life Time in Wireless Body Area Sensor Networks. Proceedings o f
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops; Kos, Greece. 15–19 June 2009;
pp. 1–6.
3. Daisuke T., Xiao Y., Hu F., Chen J.M., Sun Y.X. Temperature-aware routing for telemedicine applications in embedded biomedical sensor
networks. EURASIP J. Wirel. Commun. Netw. 2008;2008 doi: 10.1155/2008/572636.
4. Hachisuka K., Nakata A., Takeda T., Terauchi Y., Shiba K., Sasaki K., Hosaka H., Itao K. Development and Performance Analysis of an
Intra-Body Communication Device. Proceedings of the 12th International Conference on Transducers, Solid-State Sensors, Actuators and
871. Microsystems; Boston, MA, USA. 8–12 June 2003;
5. Wegmueller M.S., Kuhn A., Froehlich J., Oberle M., Felber N., Kuster N., Fichter W. An attempt to model the human body as a
communication channel. IEEE Trans. Bio-Med. Eng. 2007;54:1851–1857. 5007-
6. Xiaochen Lai, Quanli Liu, Xin Wei, Wei Wang, Guoqiao Zhou, and Guangyi Han, “A Survey of Body Sensor Networks”, Sensors (Basel). 5012
2013 May; 13(5): 5406–5447.
7. Javed Iqbal Bangash, Abdul Hanan Abdullah, Mohammad Hossein Anisi, and Abdul Waheed Khan, “A Survey of Routing Protocols in
Wireless Body Sensor Networks”, Sensors (Basel). 2014 Jan; 14(1): 1322–1357.
8. Zahoor Khan, Nauman Aslam , Shyamala Sivakumar , William Phillips, “Energy-aware Peering Routing Protocol for indoor hospital Body
Area Network Communication”, Procedia Computer Science,Volume 10, 2012.
9. Sharma, Vyas, Thakker, Mulvaney,Datta, “Wireless Body Area Network for health monitoring”, International Conference on Biomed ical
Engineering and Informatics (BMEI), Volume:4 ,2011.
10. Shyamal Patel, Hyung Park, Paolo Bonato, Leighton Chan and Mary Rodgers, “A review of wearable sensors and systems with application
in rehabilitation”, Journal of NeuroEngineering and Rehabilitation20129:21
11. Wei Quan , Fu-Teo Zhao,Jian-Feng Guan, Chang-Qiao XU, and Zhang Hongke,“An Integrated Ling Quality Estimation-Based Routing
For Wireless Sensor Networks,”Trans. on ELSEVIER, pp.28-33, 2011
12. DjamelDjenouri and Ilangko Balasingham,“Traffic- Differentiation-Based Modular
QOS Localized Routing For Wireless Sensor Networks,”IEEE Transactions on
Mobile Computing,vol.10,no.6,pp.797-809, 2011
13. Mellal, M. A., & Williams, E. J. (2018). A survey on ant colony optimization, particle swarm optimization, and cuckoo algorithms.
In Handbook of research on emergent applications of optimization algorithms (pp. 37-51). IGI Global. DOI:10.4018/978-1-5225-2990-
3.ch002
14. Rashedi, E., Nezamabadi-Pour, H., & Saryazdi, S. (2009). GSA: a gravitational search algorithm. Information sciences, 179(13): pp. 2232-
2248.
15. A. Rahim, N. Javaid, M. Aslam, Z. Rahman, U. Qasim, Z. A. Khan, “A Comprehensive Survey of MAC Protocols for Wireless Body Area
Networks”, available at.,
http://arxiv.org/pdf/1208.2351.pdf
16. Shiva Murthy G, R.J.DSouza, and Varaprasad G, “Reliability Analysis of Route
Redundancy Model for Energy Efficient Node Disjoint Multipath Routing in
Wireless sensor networks,”Trans. on ELSEVIER, in proc. ICMOC,pp.1487-1494,
2012.
17. DjamelDjenouri and Ilangko Balasingham,“Traffic- Differentiation-Based Modular
QOS Localized Routing For Wireless Sensor Networks,”IEEE Transactions on
Mobile Computing,vol.10,no.6,pp.797-809, 2011
18. Shiva Murthy G, R.J.DSouza, and Varaprasad G, “Reliability Analysis of Route
Redundancy Model for Energy Efficient Node Disjoint Multipath Routing in
Wireless sensor networks,”Trans. on ELSEVIER, in proc. ICMOC,pp.1487-1494,
2012.
Paper Title: Intrusion Detection System using Datamining Based Enhanced Framework
Abstract: With the significant increase in the use of computers over the network and the development of
applications on different platforms, the focus is on network security. The identification of multiple attacks is
actually an important element of network security. The role of the IDS is to track and prevent unauthorized use or
damage to network resources and systems. An intrusion detection system using Datamining Based Enhanced
Framework (DEF) is presented in this paper. The model is assisted by the K-mean Clustering and Decision Tree
(DT) classification techniques in which genetic algorithms (GA) for clusters, max runs and confidence can be used.
The experimental results shows the promising outcome of the proposed Datamining Based Enhanced Framework
(DEF).
Keyword : Datamining, Network Security, Genetic Algorithms, Intrusion Detection System (IDS)
References:
1. Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network
and Computer Applications, 36(1), 16-24.
2. Ko, C. W., & Rho, J. (2004). U.S. Patent No. 6,789,202. Washington, DC: U.S. Patent and Trademark Office.
3. Moffie, M., Kaeli, D., Cohen, A., Aslam, J., Alshawabkeh, M., Dy, J., & Azmandian, F. (2014). U.S. Patent No. 8,719,936.
Washington, DC: U.S. Patent and Trademark Office.
4. Lin, C. C., & Wang, M. S. (2008). Genetic-clustering algorithm for intrusion detection system. International Journal of Information
and Computer Security, 2(2), 218-234.
5. Fu, T. C., & Lui, C. L. (2007). Agent-oriented network intrusion detection system using data mining approaches. International
Journal of Agent-Oriented Software Engineering, 1(2), 158-174.
6. Zhang, J., Huang, M. L., & Hoang, D. (2013). Visual analytics for intrusion detection in spam emails. International Journal of Grid
and Utility Computing, 4(2-3), 178-186.
872. 7. MuhammedShafi. P,Selvakumar.S*, Mohamed Shakeel.P, “An Efficient Optimal Fuzzy C Means (OFCM) Algorithm with Particle
Swarm Optimization (PSO) To Analyze and Predict Crime Data”, Journal of Advanced Research in Dynamic and Control Systems, 5013-
Issue: 06,2018, Pages: 699-707
8. Xiang, C., Yong, P. C., & Meng, L. S. (2008). Design of multiple-level hybrid classifier for intrusion detection system using
5017
Bayesian clustering and decision trees. Pattern Recognition Letters, 29(7), 918-924.
9. Porouhan, P., & Premchaiswadi, W. (2017). Pattern mining and process modelling of collaborative interaction data in an online
multi-tabletop learning environment. International Journal of Knowledge Engineering and Data Mining, 4(2), 114-144.
10. Baskar, S., Periyanayagi, S., Shakeel, P. M., & Dhulipala, V. S. (2019). An Energy persistent Range-dependent Regulated
Transmission Communication Model for Vehicular Network Applications. Computer
Networks.https://doi.org/10.1016/j.comnet.2019.01.027
11. Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis
and building hybrid efficient model. Journal of Computational Science, 25, 152-160.
12. Shakeel, P. M., Arunkumar, N., & Abdulhay, E. (2018). Automated multimodal background detection and shadow removal process
using robust principal fuzzy gradient partial equation methods in intelligent transportation systems. International Journal of Heavy
Vehicle Systems, 25(3-4), 271-285
13. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. Ieee
Access, 5, 21954-21961.
14. Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart
cities. Ad Hoc Networks, 90, 101842.
15. Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: a study on QoS security threats and countermeasures using
intrusion detection system approach. International Journal of Communication Systems, 25(9), 1189-1212.
16. Ramdane, C., & Chikhi, S. (2014). A new negative selection algorithm for adaptive network intrusion detection system. International
Journal of Information Security and Privacy (IJISP), 8(4), 1-25.
17. Kavitha, B., Karthikeyan, S., & Maybell, P. S. (2012). An ensemble design of intrusion detection system for handling uncertai nty
using Neutrosophic Logic Classifier. Knowledge-Based Systems, 28, 88-96.
18. HyungGeun, O. H., Seung-Hyun, P. A. E. K., Cheolho, L. E. E., & Lee, D. (2012). U.S. Patent No. 8,181,248. Washington, DC: U.S.
Patent and Trademark Office.
19. Idhammad, M., Afdel, K., & Belouch, M. (2018). Distributed intrusion detection system for cloud environ ments based on data
mining techniques. Procedia Computer Science, 127, 35-41.
20. Foroushani, Z. A., & Li, Y. (2018, February). Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique.
In Proceedings of the 2018 7th International Conference on Software and Computer Applications (pp. 119-123). ACM.
Paper Title: Adaptive Fuzzy Sliding Mode Controller for Robot Manipulator: Effect on External Interferences
Abstract: In the previous decades, the SMC approach has attained unique consideration as this technique
offers a systematic model to maintain robust performance and asymptotic stability. As robotic manipulators turn out
to be gradually more significant in industrial automation, robotic manipulators by means of SMC have raised as a
significant region of research. Hence, this paper intends to model and establish an adaptive sliding mode controller
(SMC) for robotic manipulator. As it is not feasible to match up the SMC functions with the system model each
time, this paper implements a Fuzzy Inference System (FIS) to replace the system model. It effectively achieves the
experimentation in two phases. Accordingly, in the first phase, it attains the accurate features of the system model
based on varied samples to characterize the robotic manipulator. Consequently, it derives the obtained features as
fuzzy rules. In the subsequent phase, it signifies the derived fuzzy rules depending on adaptive fuzzy membership
functions. Moreover, it establishes the self-adaptiveness using Grey Wolf Optimization (GWO) to attain the
adaptive fuzzy membership functions. The analysis distinguishes the efficiency of the adopted technique with the
optimal investigational scheme and the traditional schemes such as SMC, Fuzzy SMC (FSMC) and GWO-SMC.
Moreover, the comparative analysis is also performed by including the external disturbances and noise and
validates the effectiveness of the proposed and conventional models.
874. Keyword : Sliding Mode Control; Robot manipulators; Controller; Load variation, External Disturbances
References: 5024-
1. Nabanita Adhikary, Chitralekha Mahanta, “Sliding mode control of position commanded robot manipulators”, Control Engineering 5031
Practice, vol. 81, pp. 183-198, December 2018.
2. Abbas Karamali Ravandi, Esmaeel Khanmirza, Kamran Daneshjou, “Hybrid force/position control of robotic arms manipulating in
uncertain environments based on adaptive fuzzy sliding mode control”, Applied Soft Computing, vol. 70, pp. 864-874, September
2018.
3. M. Vijay, Debashisha Jena, “PSO based neuro fuzzy sliding mode control for a robot manipulator”, Journal of Electrical Systems and
Information Technology, vol. 4, pp. 243-256, no. 1, May 2017.
4. Sanjoy Mondal, Chitralekha Mahanta, “Adaptive second order terminal sliding mode controller for robotic manipulators”, Journa l of
the Franklin Institute, vol. 351, no. 4, pp. 2356-2377, April 2014.
5. Yassine Kali, Maarouf Saad, Khalid Benjelloun, Abdelilah Fatemi, “Discrete-time second order sliding mode with time delay control
for uncertain robot manipulators”, Robotics and Autonomous Systems, vol. 94, pp. 53-60, August 2017.
6. Mohd Salim Qureshi, Pankaj Swarnkar, Sushma Gupta, “A supervisory on-line tuned fuzzy logic based sliding mode control for
robotics: An application to surgical robots”, Robotics and Autonomous Systems, vol. 109, pp. 68-85, November 2018.
7. Luis Gracia, J. Ernesto Solanes, Pau Muñoz-Benavent, Alicia Esparza, Josep Tornero, “Cooperative transport tasks with robots using
adaptive non-conventional sliding mode control”, Control Engineering Practice, vol. 78, pp. 35-55, September 2018.
8. M. Vijay, Debashisha Jena, “Backstepping terminal sliding mode control of robot manipulator using radial basis functional neural
networks”, Computers & Electrical Engineering, vol. 67, pp. 690-707, April 2018.
9. Manjusha Bhave, S. Janardhanan, L. Dewan, “Configuration Control of Planar Underactuated Robotic Manipulator using Termin al
Sliding Mode”, IFAC-PapersOnLine, vol. 49, no. 1, pp. 148-153, 2016.
10. J. Ernesto Solanes, Luis Gracia, Pau Muñoz-Benavent, Jaime Valls Miro, Josep Tornero, “Human-robot cooperation for robust
surface treatment using non-conventional sliding mode control”, ISA Transactions, vol. 80, pp. 528-541, September 2018.
11. Zhiqiang Ma, Guanghui Sun, “Dual terminal sliding mode control design for rigid robotic manipulator”, Journal of the Franklin
Institute, 4 February 2017.
12. Minh-Duc Tran, Hee-Jun Kang, “Adaptive terminal sliding mode control of uncertain robotic manipulators based on local
approximation of a dynamic system”, Neurocomputing, vol. 228, pp. 231-240, 8 March 2017.
13. Mehran Rahmani, Ahmad Ghanbari, Mir Mohammad Ettefagh, “Hybrid neural network fraction integral terminal sliding mode
control of an Inchworm robot manipulator”, Mechanical Systems and Signal Processing, vol. 80, pp. 117-136, 1 December 2016.
14. Magdy M. Abdelhameed, “Enhancement of sliding mode controller by fuzzy logic with application to robotic manipulators”,
Mechatronics, vol. 15, no. 4, pp. 439-458, May 2005.
15. Seong Ik Han, Jangmyung Lee, “Finite-time sliding surface constrained control for a robot manipulator with an unknown deadzone
and disturbance”, ISA Transactions, vol. 65, pp. 307-318, November 2016.
16. Srinivasan Alavandar and M.J. Nigam, "Fuzzy PD + I control of a six DOF robot manipulator" Industrial Robot: An International
Journal, vol. 35, no.2, pp. 125–132, 2008.
17. Seyedali Mirjalili, Seyed Mohammad Mirjalili, and Andrew Lewis, "Grey Wolf Optimizer" Advances in Engineering Software, vol.
69, pp. 46–61, March 2014.
18. B. Armstrong, O. Khatib, and J. Burdick, "The explicit dynamic model and inertial parameters of the PUMA 560 arm," Proceeding s.
1986 IEEE International Conference on Robotics and Automation, pp. 510-518, 1986.
19. Ruey-Jing Lian, "Enhanced adaptive grey-prediction self-organizing fuzzy sliding-mode controller for robotic systems", Information
Sciences, vol. 236, pp. 186-204, 1 July, 2013.
Keyword : Mobile Web, Performance Optimization, Accelerated Mobile Pages, AMP convertor.
875. References:
1. carblogindia. https://www.carblogindia.com/new-2017-
2. hyundai-verna/. Accessed: 2018-03-30 5032-
3. Huffington post. https://www.huffingtonpost.in/akanksha- 5037
4. sharma/photoblog-my-journey-to-the-end-of-the- world a 22137387. Accessed: 2018-03-30
5. Agababov, V., Buettner, M., Chudnovsky, V., Cogan, M.,
6. Greenstein, B., McDaniel, S., Piatek, M., Scott, C., Welsh, M., Yin, B.: Flywheel: Google’s data compression proxy for
the mobile web. In: NSDI, vol. 15, pp. 367–380 (2015)
7. Agarwal, A., Gupta, G., Mishra, H., Kumar, M.:
8. Packyard-data compression proxy for mobile web (2017)
9. Butkiewicz, M., Wang, D., Wu, Z., Madhyastha, H.V., Sekar, V.: Klotski: Reprioritizing web content to improve
user experience on mobile devices. In: NSDI, vol. 1, pp. 2–3 (2015)
10. Elgazzar, K., Martin, P., Hassanein, H.: Mobile web ser-
11. vices: state of the art and challenges. Int. J. Adv. Comput. Sci. Appl. 5(3), 173–188 (2014)
12. Firtman, M.: High Performance Mobile Web: Best Prac-
13. tices for Optimizing Mobile Web Apps. ” O’Reilly Media, Inc.” (2016)
14. MINÁRIK, D.: Accelerated mobile pages. Ph.D. thesis,
15. Masarykova univerzita, Fakulta informatiky (2017)
876. Keyword : Particle size analysing, copper oxide, XRD, SEM, FTIR, silica, sulphuric oxide, Nano particles..
5038-
References: 5040
1. S. U. S. Choi, Y. I. Cho, and K. E. Kasza, Degradation effects of dilute polymer solutions on turbulent friction and heat transfer
behavior, Journal of Non-Newtonian Fluid Mechanics, 41(1992), 289–307.
2. Ziye Ling, Zhenbin He, Tao Xu, Xiaoming Fang, Xuenong Gao and Zhengguo Zhang, Experimental and Numerical Investigation on
Non-Newtonian Nanofluids Flowing in Shell Side of Helical Baffled Heat Exchanger Combined with Elliptic Tubes, 7 (2017) 48-50.
3. M. E. Burnett and S. Q. Wang, Current sunscreen controversies: Acritical review, Photo dermatology, Photo immunology& Photo
medicine, 27 (2011) 58–67.
4. K. Maier-Hauff, R. Rothe, and R. Scholz, Intracranial thermos therapy using magnetic nanoparticles combined with external beam
radiotherapy: results of a feasibility study on patients with glioblastoma multiforme, Journal of Neuro-Oncology, 81 (2007) 53–60.
5. D. P. Kulkarni, D. K. Das, and R. S. Vajjha, Application of nanofluids in heating buildings and reducing pollution, Applied Energy,
86 (2009) 2566–2573.
6. L. V´ek´as, D. Bica, and M. V. Avdeev, Magnetic nanoparticles and concentrated magnetic nanofluids: synthesis, properties and
some applications, China Particuology, 5 (2007) 43–49.
7. T. Sharma, A. L. M. Reddy, T. S. Chandra, and S. Rama prabhu, Development of carbon nanotubes and nanofluids based microbial
fuel cell, International Journal of Hydrogen Energy, 33 (2008) 6749–6754.
8. L. SyamSundar a, Md. Hashim Farooky, Experimental thermal conductivity of ethylene glycol and water mixture based low volume
concentration of Al2O3 and CuO nanofluids, International Communications in Heat and Mass Transfer 41 (2013) 41–46.
9. M. Gupta, V. Singh, R. Kumar, and Z. Said, A review on thermophysical properties of nanofluids and heat transfer applications,
Renewable & Sustainable Energy Reviews, 74 (2017) 638–670.
10. Seow, Z. L. S., A. S. W. Wong, V. Thavasi, R. Jose, S. Ramakrishna and G.W. Ho, controlled synthesis and application of Zn O
nanoparticles, nanorods and nanospheres in dye-sensitized solar cells. Nanotechnology, Vol. 20. 10. 1088/ 0957-4484/ 20/ 4/
045604/ meta, 2008.
Authors: Thangavel R
Keyword : Cementing efficiency factors, Rice husk ash, Ground granulated blast furnace slag, RHA, GGBFS
References:
1. K Ganesh Babu and V Sree Rama Kumar , Efficiency of GGBS in Concrete , Science Direct –Cement and Concrete Research (2000),pp-
1031-1036
2. V Srinivasa Reddy, M V Seshagiri Rao, S Shrihari,” Appraisal of Processing Techniques for Recycled Aggregates in Concrete”,
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8 Issue-6, August 2019, Retrieval
Number F8407088619/2019©BEIESP, DOI: 10.35940/ijeat.F8407.088619, pp.1661-1665
3. K Ganesh Babu and G S N Rao and P V S Prakash, Efficiency of pozzolans in cement composites, Concrete 2000(1993),pp. 497-509
Dundee
4. K Ganesh Babu and G S N Rao, Efficiency of fly ash in concrete, Cement Concrete Composites (1993),pp. 223-229
5. Shrihari, S and Seshagiri Rao, M V and Reddy, V Srinivasa, Evaluation of Cementing Efficiency in Quaternary Blended Self-Compacting
Concrete (March 2019). International Journal of Civil Engineering and Technology 10(3), 2019, pp. 83–90. Available at
SSRN: https://ssrn.com/abstract=3453705
6. C. Chandana Priya, M. V. Seshagiri Rao and V. Srinivasa Reddy, “Studies On Durability Properties Of High Strength Self-Compacting
Concrete –A Review”, International Journal of Civil Engineering & Technology (IJCIET) - SCOPUS indexed, Volume 9, Issue 11,
(November 2018), pp. 2218–2225, Article ID: IJCIET_09_11_219, ISSN Print: 0976 – 6308, ISSN Online: 0976 – 6316, (SCOPUS
indexed)
Paper Title: Cross Breed Clustering Algorithm for High Dimensional Data
Abstract: Clustering plays a major role in machine learning and also in data mining. Deep learning is fast
growing domain in present world. Improving the quality of the clustering results by adopting the deep learning
algorithms. Many clustering algorithm process various datasets to get the better results. But for the high
dimensional data clustering is still an issue to process and get the quality clustering results with the existing
clustering algorithms. In this paper, the cross breed clustering algorithm for high dimensional data is utilized.
Various datasets are used to get the results.
Paper Title: OTA Firmware Update for Texas Instruments C2000 Controllers
Abstract: Firmware updates are necessary to enhance the embedded systems performance and to remove the
bugs. But it’s not an efficient manner to be installed it by the technician in the field. For c2000 controllers of Texas
instruments dynamic memory allocation is not possible. So, using the proposed method we can maintain both
updated firmware and current running firmware for the continuity of the system operation without dynamic
880. memory allocation requirement. In this over the air (OTA) firmware update method, both application and the
secondary boot loader (SBL) handles the update process without intervention of the technician. When there is any
5053-
update the current running application copies the incoming updated firmware using its linker file. After the update
5056
process when there is a system reset the SBL calculates the checksum of the updated application, if it matches with
the received checksum it executes the updated firmware else it executes the current running firmware without
interrupting the application operation.
Authors: Arvind K. Sharma, Avinash Sharma, Aditya Saini, Paluck Arora, S.K. Mittal
DNS Aegis, Authentication with Digital Signature using Hash Functions and Various Attacks:
Paper Title:
KARKOFF
Abstract: DNS have a crucial role in adequate functioning/performance of the Internet. Even though every
single internet applications rely/trust on ‘Domain-Name-System’ for the ‘Name-Resolutions’ yet in this particular
infrastructure have numerous ‘Security-Vulnerabilities’ with specific severity level and influenced by many attacks
such as: ‘BIT SQUATTING REDIRECTION’, ‘CACHE POISONING’, ‘DNS REBINDING’, ‘TYPO
SQUATTING REDIRECTION’ etc. Suppose what will happen if ‘DNS-Server’ or ‘DNS-Services’ gonna
compromised? Answer will be all the resources which belong to Internet/Intranet/Extranet influenced, has a result
adverse effect not only for the resources used but to confidential data too. One important point is ‘DNS’ aren’t just
gonna used for having ‘Domain-Names’ w.r.t. logical addresses, but it is also utilize to Restrict Unauthorized/Un-
Authenticated traffic too. So in cyber security arena manageable, trust worthier infrastructure of DNS is must.
883. Authors: O.R. Obanla, J.D. Udonne, O.O. Ajani, M.E. Ojewumi O.J. Omodara
Paper Title: Oxirane Ring Opening of Rubber (Hevea Brasiliensis) Seed Oil by Perfomic Acid
Abstract: Studies on the epoxidation of rubber (Hevea brasiliensis) seed oil, a renewable source with formic
acid was performed in the presence of 30% hydrogen peroxide at a of temperature 40, 50,60,70 oC. The process is
favoured by an increase in temperature forming a product with high oxirane content which is as a result of mole
ratios of formic acid and hydrogen peroxide. Products of high oxirane content are commercialy viable in the
production of polyvinyl chloride (PVC). Natural rubber and other products can be obtained from this in- situ
technique. Studies in this research shows that the rate of epoxidation increases with an increase in
temperature.Oxirane values of 2.30, 3.62 and 4.73 for the various temperature. However high oxirane content of
6.22 was obtained at 70 oC which is in line with literature. FTIR analysis was also carried out on the epoxidized
rubber seed oil which shows the peaks of oxirane cleavage.
Keyword : Epoxidation, oxirane content, performic acid and rubber seed oil.
References:
1. Abdullah B.M. and Salimon J. (2009). Physicochemical characteristics of Malaysian rubber (Hevea brasiliensis) seed oil. Eur J Sci
Res. 31(3):437–445
2. Adhvaryu, A., Liu Z. and Erhan, S.Z. (2002). Epoxidized Soybean oil as a potential source of high temperature lubricants. Ind Crops
Prod. 15(1): 247-254
3. Aigbodion, A.I, Okieimen, F.E. and Bakare, I.O. (2001). Investigation of oxirane ring opening reaction in epoxidized rubber seed oil
quality assessment and authentication. Journal oil Technology Association Indian 33(3): 16-19.
4. Aigbodion, A.I, Pillai, K.S.C., Bakare, I.O. and Yahaya, L. E. (2001). Synthesis, characterization and evaluation of heated r ubber
seed oil modified alkyd resins as binders in surface coatings. Indian J. of chemical technology. 8(2): 378-384. 5070-
5. Aigbodion, A.I, Okieimen, F.E. and Bakare, I.O. (1999). In situ epoxidation of rubber seed oil by peracetic acid. Nigeria Jou rnal of 5073
applied Sci. 17(2): 27-36
6. Aigbodion, A.I, Menon, A.R.R and Pillai, C.K.S. (2000). Processability characteristics and physico-mechanical properties of natural
rubber modified with rubber seed oil and epoxidized rubber seed oil. J Appl Polym Sci. 77(5):1413–1418. doi: 10.1002/1097-
4628(20000815)77:7<1413::AID-APP23.0.CO;2-7.
7. Blayo, A. Gandini, J.F. and Nest L.E. (2001). Chemical and rheological characterization of some vegetable oils derivatives
commonly used in printing inks. Ind. crops Prod. 14(2):155-167
8. Canakci M, Van Gerpen J (2001). Biodiesel production from oils and fats with high free fatty acids.Transactions of ASAE.
44(6):1429-1436
9. Ikwuagwu, O.E., Ononogbu, I.C. and Njoku, O.U. (2000). Production of biodiesel using rubber seed oil. Ind. Crops. Prod. 12(1) :57-
62
10. Iyayi A.F, Akpata P.O, Ukpeoyibo U (2008). Rubber seed processing for value added latex production in Nigeria. Afri. J. Agri. Res.
3(7):505-509.
11. Joseph R, Madhusoodhanan, K.N., Alex, R, Varghese, S., George, K.E., and Kuriakose B. (2004). Studies on epoxidized rubber se ed
oil as secondary plasticizer/stabilizer for PVC, plastics, rubber and composites. 33(3):217–222. doi: 10.1179/146580104225020974.
12. Obanla, O.R., Udonne, J.D., Ajani, O.O., Omodara, O.J. and Omolewa, D.A. (2018). Extraction, comparative study and property
evaluation synthesized bar soap from locally sourced rubber (Hevea Brasiliensis) seed oil and palm kernel oil. International
13. Journal of Mechanical Engineering and Technology (IJMET) 9(12):308-319
14. Onyeike, E.N. and Acheru, G.N. (2002). Chemical composition of selected Nigerian oil seeds and physicochemical properties
of the oil extracts. Food Chem. 77:431–437. doi: 10.1016/S0308-8146(01)00377-6.
15. Ramadhas, A.S., Jayaraj, S and Muraleedharan, C. (2009). Biodiesel production from high FFA rubber seed oil fuel. 84(4):335-340
16. Salimon, J. and Abdullah, B.M. (2009). A study on the thermal properties and solid fat content of Malaysian rubber seed oil. The
Malaysian Journal of analytical Sciences. 13(2): 1–7.
17. Udonne, J. D. and Alade, B.O. (2016). Development of biobased lubricant from locust bean seed oil. International Journal of
Scientific & Engineering Research. 7(3): 491-500
Authors: Ramanand singh, Piyush Shukla, Paresh Rawat, Prashant Kumar Shukla
Invisible Medical Image Watermarking using Edge Detection And Discrete Wavelet Transform
Paper Title:
Coefficients
Abstract: Protection and authentication of medical images is essential for the patient’s disease identification
and diagnosis. The watermark in medical imaging application needs to be invisible and it is also required to
preserve the low and high frequency features of image data which makes watermarking a difficult assignment.
Within this manuscript an unseen medical image watermarking approach is projected apply edge detection in the
discrete wavelet transform domain. The wavelet transform is brought into play to decay the medical picture
interested in multi-frequency secondary band coefficients. The edge detection applies to high frequency wavelet
group in the direction of generating the boundary coefficients used as a key. The Gaussian noise pattern is utilized
as watermark as well as embedded within the edge coefficients around the edges. To add the robustness scaled
dilated edge coefficient is added with the edge coefficients to generate the watermarked image. Preserving the
884. small frequency secondary band fulfills the information requirement of the medical imaging application. At the
same time as adding together the watermark during high frequency sub-bands improve the watermark invisibility. 5074-
To add additional robustness the dilation is applied on the edged coefficient before being embedded with sub band 5080
coefficients. presentation of the technique is experienced on the dissimilar set of medical imagery as well as
evaluation of the proposed watermarking method founds it robust not in favor of the different attacks such at the
same time as filtering, turning round plus resizing. Parametric study foundation going on Mean Square Error along
with Signal to Noise Ratio shows that how good method performs for invisibility.
Keyword : Medical Images, Watermarking, Discrete Wavelet Trasform, Edge Detection, Dilation,
Invisibility.
References:
1. John N. Ellinas, A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection, IEEE Journal on image processing, pp. 197-208
2008.
2. Yingli Wang, Xue Bai,, Shuang Van “Digital Image Watermarking Based on Texture Blocl< and Edge Detection in the Discre te Wavelet
Domain” IEEE International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS) pp.
170-174, 2013.
3. J. N. Ellinas, D. E. Manolakis, “A robust watermarking scheme based on edge detection and contrast sensitivity function,” in VISAPP Proc.
Int. Conf. Computer Vision Theory and Applications, Barcelona, 2007.
4. Narong Mettripun, “Robust Medical image watermarking based on DWT for Patient Identification”, IEEE 13th international conference on
electrical engineering/electronics, computer, telecommunications and information technology (ECTI-CON) July 2016.
5. Apeksha Tiwari, Virendra Singh “Digital Image Watermarking Using DWT and Shift Invariant Edge Detection “International Journa l of
Computer Technology and Electronics Engineering (IJCTEE) Volume 3, Issue 6, December 2013.
6. Nai-Kuei Chen, Chung-Yen Su, Che-Yang Shih, Yu-Tang Chen “Reversible Watermarking for Medical Images Using Histogram Shifting
with Location Map Reduction”, IEEE international Conference on Industrial Technology (ICIT) 2016.
7. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Pr ocessing,
vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
8. J. M. Zain and A. R. M. Fauzi, "Medical image watermarking with tamper detection and recovery", in Proceedings of the 28th IEEE EMBS
Annual International Conference, pp.3270- 3273, 2006.
9. S. C. Liew and J. M. Zain, “Reversible medical image watermarking for tamper detection and recovery”, 3 RD IEEE International
Conference on Computer Science and Information Technology (ICCSIT), pp. 417-420, 2010.
10. Smita Agrawal, Manoj Kumar, “”Reversible Data Hiding for Medical Images using Integer-to-Integer Wavelet Transform”, In IEEE
Students’ Conference on Electrical, Electronics and Computer Science, (SCEECS) 2016.
11. R. Dugad, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” in IEEE Proc. Int. Conf. Image
Processing, USA, pp. 419-423, 1998.
12. J. R. Kim, and Y. S. Moon, “A robust wavelet-based digital watermarking using level-adaptive thresholding,” in IEEE Proc. Int. Conf.
Image Processing, Japan, 1999, pp. 226-230.
13. P. V. V. Kishore , S. R. C. Kishore , E. Kiran Kumar , K. V. V. Kumar , P. Aparna, “Medical image Watermarking with DWT-BAT
algorithm”, IEEE international conference on Signal Processing and Communication Engineering Systems (SPACES) 2015.
14. R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perceptual water-marks for digital images and video,” in SPIE Proc. Int. Conf. Security
and watermarking of multimedia contents, USA, 1999, pp. 40-51.
15. R. J. Beattie, 1984, “Edge detection for semantically based early visual processing, “dissertation, Univ. Edinburgh, Edinburgh, U.K.
16. Vikas Tyagi “Data Hiding in Image using least significant bit with cryptography”, International Journal of Advanced Research in
Computer Science and Software Engineering, Vol. 2, Issue 4, April 2012.
17. S. Mallat, S. Zhong, 1992, “Characterization of signals from multistage edges,”, IEEE Trans. Pattern Anal. Machine Intell., vol.14, no.7, pp.
710-732.
18. Xia Xiang-Gen, Boncelet, C.G., Arce, G.R., “A multiresolution watermark for digital images”, in the proceedings of IEEE International
Conference on Image Processing, Vol. 1, pp 549 – 551, Oct 1997.
19. Tao, P & Eskicioglu, “A Robust Multiple Watermarking Scheme in the Discrete Wavelet Transform Domain”, in Symposium on Intern et
Multimedia Management Systems V, Philadelphia, PA, 2004.
Keyword : WBSN, Secure Routing, Privacy Preservation, Data Security, TALWSR, RCP, QoS.
885.
References:
1. Tao Yang, Xu Xiangyang, “A secure routing of wireless sensor networks based on trust evaluation model”, Elsevier, Computer science, 131 5081-
(2018) 1156–1163, 2018. 5085
2. Farruh Ishmanov , “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research
Issues”, Hindawi, Journal of Sensors, 2017.
3. Hassan Oudani, “Energy Efficient in Wireless Sensor Networks Using Cluster-Based Approach Routing” , IJSSN, 5(1),6-12, 2017.
4. NidhiSharma ,”Privacy Preservation in WSN for Healthcare Application”, Elsevier, Computer science, 132(2018), 1243-1252, 2018.
5. Mian Ahmad Jan ,”Moving Towards Highly Reliable and Effective Sensor Networks”, Ad Hoc & Sensor Wireless Networks, 40, pp. 1 63–
168, 2018.
6. Seyed Mahmood Hashemi, “Secure Routing of WBAN with Monarchy Butterfly Optimization”, ACM, ICCIS, pages 155-158,2017.
7. Farzad Kiani , “Reinforcement Learning Based Routing Protocol for Wireless Body Sensor Networks”, ISCSC, 2017.
8. Lin Li and Donghui Li , “An Energy-Balanced Routing Protocol for a Wireless Sensor Network”, Hindawi, Journal of Sensors, 2018.
9. Yating Qu ,”A Survey of Routing Protocols in WBAN for Healthcare Applications, Sensors, 19(7), 2019.
10. Ghufran Ahmed , “Thermal and energy aware routing in wireless body area networks”, IJDSN, 2019.
11. Rahat Ali Khan, “An energy efficient routing protocol for wireless body area sensor networks”, JWPC, 99(4), 2018.
12. “EEHRT: Energy Efficient Technique for Handling Redundant Traffic in Zone-Based Routing for Wireless Sensor Networks”, Hindawi,
WCMC, 2019, 2019.
13. V.kavidha, S.anandakumaran, “Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink”, Springer,
Peer-to-Peer Networking and Applications, 2018.
14. Fouad El Hajji, “Adaptive Routing Protocol for Lifetime Maximization in Multi-Constraint Wireless Sensor Networks”, Springer, JCIN,
3(1), 67–83, 2018.
15. Sohail Jabbar, “Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network”, Hindawi, WCMC, 2018.
Keyword : civil law, loan agreement, Civil Code of the Russian Federation, history, Code of laws of the
Russian Empire.
References:
1. Khabirov A.I. The system of rights and obligations of the parties to a loan obligation in modern law // Law and Management. X XI
Century. - 2019. -- P. 18-24
2. Arslanov K. M. On the importance of comparative legal studies of foreign law for the development of Russian private law //
Comparative Law in the Integration of States: Proceedings of the II International Congress of Comparative Law (Moscow, Decemb er
3, 2012) / ch. ed. Yu.A. Tikhomirov, V.I. Lafitsky. - M.: Institute of Legislation and Comparative Law under the Government of the
Russian Federation: INFRA-M, 2013. - P. 126-131.
3. Arslanov K.M. The formation of the Kazan School of Civil Law and its impact on the development of modern Russian civil law /
Kazan Law Schools: the evolution of educational and scientific traditions in modern jurisprudence. - M., 2016. -- P. 204-217. 5086-
4. Comparative Law. An Introduction to the Comparative Method of Legal Study and Research. By Gutteridge H. C., K.C., LL.D.
(Cambridge Studies in International and Comparative Law, Vol. I.) - London: Cambridge University Press. The Cambridge Law 5089
Journal. - 1947. - 9 (3). - P. 386 - 387.
5. Dale, William. Legislative Drafting: A New Approach: a Comparative Study of Methods in France, Germany, Sweden and the
United Kingdom. - London: Butterworths, 1977. -- 341 p.
6. Arslanov K.M., Khabirov A.I. About the Weak Party of the Loan Contract // Astra Salvensis, Review of History and Culture
Supplement. - 2017. -- P.323-330.
7. Siems, M., & Mac Síthigh, D. Mapping legal research. The Cambridge Law Journal. - 2012. -- 71 (3). - P.651 - 676.
8. Davies, P. Rectification versus interpretation: the nature and scope of the equitable jurisdiction. - The Cambridge Law Journal. -
2016. -- 75 (1). - P.62-85.
9. Khabirov A.I., Khamitova G.M. On The Issue of the Place of a Loan Commitment in the System of the Russian Law of Obligations //
The Journal of Social Sciences Research. 2018. - Special Issue - 5. - P. 421-424.
10. Meyer D. I. Russian civil law [Electronic resource]: 2 Parts, 2003. URL: http://civil.consultant.ru/elib/books/45/page_67.html
(accessed: 05/12/2019)
11. Romanets Yu. V. System of contracts in the civil law of Russia / Yu. V. Romanets. - 2nd ed., Revised. and add. - M.: Norma: Infra-
M, 2013. -- 496 p.
12. Karapetov A.G. Freedom of contract and its limits. T. 2: The limits of freedom to determine the terms of the contract in foreign and
Russian law / A.G. Karapetov, A.I. Savelyev. - M.: Statute, 2012. -- 453 p.
13. Arslanov K.M. On the bilaterally binding nature of the loan agreement // Seventh Perm Congress of Legal Scientists: All-Russian
materials. scientific-practical conf. Perm, 2016.P. 85-87.
14. Braginsky M.I. Contract Law / M.I. Braginsky, V.V. Vitryansky. - Prince 5, t. 1: Loan, bank loan and factoring agreements.
Agreements aimed at creating collective entities. - M.: Statute, 2006. -- 734 p.
15. Rasooli, M., & Abedini, M. The Relationship between Organizational Support and Job Satisfaction of Experts and Managers of
Islamic Azad University of Qeshm and Subsidiaries (International Units, Medical, Sama, Hormuz and Khamir). Dutch Journal of
Finance and Management, 1(2), (2017).42. https://doi.org/10.29333/djfm/5818
16. Gamarra, M., Zurek, E., & San-Juan, H. Addendum for: A Study of Image Analysis Algorithms for Segmentation, Feature Extraction
and Classification of Cells. Journal of Information Systems Engineering & Management, 3(1), (2018).05
17. García-Santillán, A. An Algorithm to Renegotiate Debt through Equivalent Equations and Transaction Costs: A Proposal for the
Field of Financial Education. International Electronic Journal of Mathematics Education, 14(1), (2019). 123-136.
https://doi.org/10.12973/iejme/3981
18. Novikova, I. N., Popova, L. G., Shatilova, L. M., Biryukova, E. V., Guseva, A. E., & Khukhuni, G. T. Lexical and semantic
representation of the linguistic and cultural concept “Rest” in the English, German, and Russian languages. Opción, 34(85 -2), (2018).
237-256
Keyword : association, associative field, concept, linguistic and cultural character type, conceptual component.
References:
1. Karasik V.I. Language circle: personality, concepts, discourse. Volgograd: Peremena, 2002.447 p.33
2. Regina F. Frey, Angela Fink, Michael J. Cahill, Mark A. McDaniel, Erin D. Solomon. Peer-Led Team Learning in General
Chemistry I: Interactions with Identity, Academic Preparation, and a Course-Based Intervention. Journal of Chemical Education
2018, 95 (12)
3. Douglas J. Simpson John Dewey's Concept of the Studentanadian Journal of Education / Revue canadienne de l’éducation Vol. 26,
No. 2 pp. 183-200, 2001
4. Shaiakhmetova L., Shayakhmetova L., Mukhametzyanova L.The Way Concept In The Author's Picture Of The World (By Example
Of The Story A Warn Path By Eudora Welty)//Modern Journal Of Language Teaching Methods.Vol.7, Is.9. - P.652-656. 2017
5. Boydston, J. A. The school and society. Carbondale, IL: Southern Illinois University Press.1980
6. Burnett, J. R.. Preface. In J. A. Boydston, (Ed.) The school and society Carbondale, IL: Southern Illinois University Press. 1980
7. Shao-Liang Zheng, Michael G. Campbell. Connecting Key Concepts with Student Experience: Introducing Small-Molecule
Crystallography to Chemistry Undergraduates Using a Flexible Laboratory Module. Journal of Chemical Education, 95 (12), 2018
8. Karasik V.I., Slyshkin G.G. Linguocultural concept as a unit of research / V.I. Karasik, G.G. Slyshkin // Methodological prob lems of
cognitive linguistics. Voronezh: Voronezh State University, 2001. Pp. 75-80
9. Shamsutdinov R., Mukharlyamova L., Zharkynbekova Sh., Ashrapova A. Semantic Field of `Wish / Desire 'in the Tatar Language //
Tarih Kultur Ve Sanat Arastirmalari Dergisi-Journal of History Culture And Art Research.Vol.6, Is.6. - P.117-124. 2017
10. Mokienko V.M. From everyday meaning to an artistic image // Bulletin of the Kemerovo State University.2016. Number 3. P. 164 -
169
11. Phraseological Dictionary of the Russian Literary Language / Edited by A.I. Fedorova.M.: Astrel AST, 2008. 880 p.
12. Solokhina A.S. The concept of "freedom" in the English and Russian linguistic cultures: a thesis for the degree of candidate of
philosophical sciences. Volgograd, 2004.189 p.
13. Zhanpeisova N.M., Zhumakhanova A.Zh. The concept of "freedom" in the English, Russian and Kazakh linguistic cultures //
Science: yesterday, today, tomorrow: a collection of papers based on the materials of the XIII international scientific and p ractical
conference. No. 6 (13).Novosibirsk: Sibak, 2014
14. Sayko O.A. Joy // Anthology of concepts. Edited by V.I. Karasik, I.A. Sternin. Vol. 7. Volgograd: Paradigm, 2009. Pp. 18-34
15. Ozhegov S.I. and Shvedova N.Yu. Explanatory Dictionary of the Russian Language: 80,000 words and phraseological expressions /
Russian Academy of Sciences. V.V. Vinogradov Russian Language Institute. 4th edition, amended. M.: LLC "A TEMP", 2006. 944
p.
16. Steshina E.G. Wealth and poverty // Anthology of concepts. Edited by V.I. Karasik, I.A. Sternin. Vol. 7 Volgograd: Paradigm, 2009.
Pp. 138-154
17. Dimitrova E.V. Longing // Anthology of concepts. Edited by V.I. Karasik, I.A. Sternin. Vol. 1. Volgograd: Paradigm, 2005. Pp. 268-
273
18. R. R. Zamaletdinov, F. H. Gabdrakhmanova, G. F. Zamaletdinova. The Language Nomination And The Turkic Conceptual System
(On The Material Of The Tatar Language). Herald NAMSCA 3, 2018. рр. 896-898.
19. Kuznetsova A. A., Svirina L. O., Iliasova L. G., Relevant Topics Motivating Learners Of English To Produce Meaningful
Utterances//Ad Alta-Journal Of Interdisciplinary Research. Vol.8, Is.1. - P.203-205. 2018
20. Sadeghpour, F., Far, M. G., Khah, A. R., & Akbardokht Amiri, M. A. Marketing Strategic Planning and Choosing the Right Strategy
using AHP Technique (Case Study: Ghavamin Bank Mazandaran). Dutch Journal of Finance and Management, 1(2), 45. (2017).
https://doi.org/10.29333/djfm/5821
21. Oliveira, F. K. D., Oliveira, M. B. D., Gomes, A. S., & Queiros, L. M. Identifying User Profiles from Statistical Grouping Me thods.
Journal of Information Systems Engineering & Management, 3(1), 06. (2018).
22. Alkhateeb, M. Multiple Representations in 8th Grade Mathematics Textbook and the Extent to which Teachers Implement Them.
International Electronic Journal of Mathematics Education, 14(1), 137-145. (2019). https://doi.org/10.12973/iejme/3982
23. Shatilova, L. M., Borisova, V. V., & Kasatkina, O. A. Representation of the linguistic and cultural concept “lie” in the Fren ch and
Russian language picture of the world. Opción, 34(85-2), 257-276. (2018).
889. References:
1. Izvestia [Izvestia]. 1992. Ianvar' – dekabr'. No.1 – 281. (In Russian)
2. Harkova, E.V., Shigapova, F.F. (2014). Functional features of metaphoric and metonymic euphemisms in media discourse. European 5097-
Journal of Science and Theology. Vol.10. No.6, pp. 105-113. 5100
3. Muhametzyanova, L.R., Mardieva, L.A. (2017). The Polyfunctuanality in The Names Of Newspapers And Magazines. Revista San
Gregorio, Spec. Edit., pp. 148-153.
4. Sheigal, E.I. (2000). [Semiotics of Political Discourse]: dis. … d-ra filol. nauk. 431 p. Moscow. (In Russian)
5. Yapparova, V.N., Ageeva, Ju.V., Agmanova, A.Y. (2018). Pre-Election Discourse as a Special Type of Institutional Discourse.
HELIX. Vol. 8, Is.1, pp.2324-2327.
6. Budaev, E.V., Chudinov, A.P. (2009). [Linguistic Sovietology]. 291 p. Ekaterinburg. (In Russian)
7. Dunn, J. (1995). The transformation of Russian from a language of the Soviet type to a language of the Western type.In J. Dunn (ed.),
Language and Society in Post-Communist Europe.Selected Papers from the 5th World Congress of Central and Eastern European
Studies.Warsaw, pp. 3–22.
8. Koteyko, N. (2014). Language and Politics in Post-Soviet Russia: A Corpus Assisted Approach. London: Palgrave Macmillan, XI,
191 p.
9. Erol, N. (1993). Ideology as political discourse: a case study of print media discourses on Glasnost and Perestroika. East La nsing:
Michigan State University.
10. Klushina, N.I. (1996). [Speech Means Mythologization in Modern Newspaper Language]. Russkaya rech'. No.5. Moscow, pp. 36 -42.
(In Russian)
11. Malysheva, E.G. (2009). [Ideolodeme as a Cultural Phenomenon: Definition and Classification]. Politicheskaya lingvistika. No.4
(30), pp. 32–40. (In Russian)
12. Robinson, N. (1995). Ideology and the collapse of the Soviet system. A critical history of Soviet ideological discourse. Alde rshot:
Edward Elgar, X, 227 p.
13. Shevchenko, A.R., Nasrutdinova, L.H., Dubrovskaja, S.A. (2017). Mythologization of the soviet reality and istorization of «the
soviet myth» in the russian prose of the end of the XX century. Journal of history culture and art research, pp. 174-176.
14. Issers, O.S. (2008). [Communicative Strategies and Tactics of Russian Speech]. 288 p. Moscow. (In Russian)
15. Tsuladze, A.M. (2003). [Political Mythology]. 384 p. Moscow. (In Russian)
16. Baranov, A.N. (1990). [Linguistic Argumentation Theory (Cognitive Approach)]. Avtoref. dis. … d-ra filol. nauk. Moscow. (In
Russian)
17. Mardani, M., & Fallah, R. Comparison of Financial Leverage Ratio before and after the Use of Off-Balance Sheet Financing in Firms
Listed in the Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(2), (2018).53.
https://doi.org/10.29333/djfm/5829
18. Martínez-Alcalá, C. I., Ramírez-Salvador, J. A., Rosales-Lagarde, A., & Jiménez-Rodríguez, B. Assistance and Support of Primary
Caregivers through an eService Platform. Journal of Information Systems Engineering & Management, 3(1), (2018). 09.
19. Kor, L., Teoh, S., Binti Mohamed, S. S. E., & Singh, P. Learning to Make Sense of Fractions: Some Insights from the Malaysian
Primary 4 Pupils. International Electronic Journal of Mathematics Education, 14(1), (2019). 169-182.
https://doi.org/10.29333/iejme/3985
20. Nuriyev, M., Sovetkanova, D., & Seysenbayeva, Z. Achievements and new challenges in the area of education of independent
Kazakhstan. Opción, 34(85-2), (2018). 337-352.
Paper Title: Author’s Transformations and Their Translation In “The Plumed Serpent” By D.H. Lawrence
Abstract: The article is devoted to the analysis of phraseological units (hereinafter referred to as PU) with
author’s transformation found in “The Plumed Serpent” by D.H. Lawrence, the peculiarities of their translation into
Russian are also considered. Phraseological units with the author’s transformations are analyzed in accordance with
the classification of the latter developed by leading linguists from the Kazan Linguistic School. Each type of the
author’s transformation of PU was illustrated by numerous examples from the given piece of literature in the
original language, as well as in the language of translation. Each case of translation was classified as for the used
translation techniques, preservation of the author’s transformation of PU and retaining the original figurativeness of
the statements; English-Russian versions of PU were compared thoroughly. The result of such an analysis enabled
us to estimate the quality of Russian translation of “The Plumed Serpent” by D.H.Lawrence, done by an official
translator Valeriy Minushin.
891. Paper Title: Sketch Engine in Building a Lexical Minimum for Children
Abstract: Our article deals with such an aspect of computational linguistics as the construction of lexical 5105-
minima cases using the Sketch Engine program as an example. The advent of computational linguistics has played 5108
an important role in the process of learning foreign languages. Thanks to computer technology, the process of
learning foreign languages is greatly simplified and becomes more accessible. Among the many programs for
learning foreign languages, we chose the Sketch Engine program, since it is a case manager and a tool for analyzing
linguistic buildings, that is, collections of texts selected and processed according to certain rules, which are used as
the basis for language research. This resource is software that combines a specialized search engine and a lot of
buildings in different languages. We describe the program through the prism of corpus linguistics, consider the
functions and capabilities of this program Sketch Engine in drawing up the lexical minimum for primary school age
in English, Russian and German. In this paper, we conducted an experiment on drawing up a lexical minimum for
schoolchildren, which consisted in selecting 300 most used words of the English language and saturating them with
examples from the cases of the Sketch Engine program.
Paper Title: Digitalisation Trends and Blended Learning Visualisation in Modern Digital Education
Abstract: The article under review actualizes the problem of using digital computer technologies in the process
of blended learning. The notion of «blended learning» is determined and specified according various sources.
Various models and ways of organizing this kind of work as an alternative to the standard form of learning are
presented. The article presents the positive experience of using blended learning technology. Attention is paid to
visualization as one of teaching tool to create educational materials for blended learning. Synthesis of verbal
(especially word) and visual elements (pictures, graphic notes, animations, films, plots and diagrams, etc.) within
892. the limits of one text’s space is an instrument of optimization of the process of semantic perception and
understanding text information. All benefits of this modern technology allows to establish a holistic adoption of this 5109-
model by students and the positive direction for the development of blended learning as an innovative teaching 5111
technology.
Keyword : distance individual learning; lifelong education, learning process, electronic resource, information
systems.
893.
References:
1. Blokhovtsova G.G., Malikova T.L., Simonenko A.A. New science: Strategies and development vectors. 2016. No. 118 -3. P. 89-92.
5112-
2. Ilyin Aleksandr, Ibatova Aygul Orientation of the modern educational process on the concept of truth // National academy of 5114
managerial staff of culture and arts herald. – 2017 .-- Vol., Is. 2. - P.184-187.
3. Pashkina A. G. Distance learning as a means of individual work of a teacher with a student // Pedagogical education in Altai. 2014.
No. 1. P. 201-203.
4. Spiros, R. K. (2003). Individual differences in motivation during distance training: The influence of goal orientation and self-efficacy
on learning outcomes (Doctoral dissertation, ProQuest Information & Learning).
5. Ibatova A.Z., Ilyin A.G. The study of the effectiveness of MOOCs in the modern educational space // Azimuth of scientific research:
pedagogy and psychology. 2019.Vol. 8. No. 1 (26). P. 126-127.
6. Tarr, M. (1998). Distance learning-bringing out the best in training. IndustrialandCommercialTraining, 30 (3), 104-106.
7. Berge, Z. L., Muilenburg, L. Y., & Haneghan, J. V. (2002). Barriers to distance education and training: Survey results. The Quarterly
Review of Distance Education, 3 (4), 409-418.
8. Semenova I.N., Markelova E.S. Fundamentals of modeling individual educational trajectories of students with disabilities in distance
learning // Pedagogical education in Russia. 2016. No. 7. P. 77-81.
9. Keegan, D. (2003). Distance training: Taking stock at a time of change. Routledge
10. Smirnova N. A. Learning management systems in distance education // Proceedings of the SIC Sociosphere conference. 2014. No.
25. P. 129-131
11. Suleri, J., & Cavagnaro, E. Promoting pro-environmental printing behavior: The role of ICT barriers and sustainable values.
International Journal of Education and Development using ICT, (2016). 12(2).
12. Kvet, M., & Matiasko, K. Temporal Data Performance Optimization using Preprocessing Layer. Journal of Information Systems
Engineering & Management, (2018). 3(2), 13.
13. Abdul Rahman, S. Example Construction as a Devise to Reveal Awareness of Calculus Integration. International Electronic Journal
of Mathematics Education, 14(1), (2019).233-241. https://doi.org/10.29333/iejme/3999
14. Abayeva, G. Modern teacher role for increasing the students’ competence in pedagogical specialty. Opción, 34(85 -2), (2018). 415-
440.
Keyword : electronic educational resources, foreign language professional competence, future philologists.
References:
1. Galiya M. Gatiyatullina, Aleksander S. Kiselnikov, Fanuza Kh. Tarasova, Dilyana D. Sungatullina, Elzara V. Gafiyatova Text Co mplexity
Modification By Means Of It-Technologies//Modern Journal of Language Teaching Methods. Vol. 8, Issue 10, October 2018- pp. 396-401.
(WoS)
2. Liliya R. Mukharlyamova, Alsu Kh. Ashrapova, Svetlana Alendeeva Borrowed words in language teaching (on the economic term sys tem
of the Russian language in the XXI century) // Journal of Language and Literature, ISSN: 2078-0303, Vol. 7. No. 2. May, 2016 P.163-168.
3. Erofeeva Anna A., Yusupova Zulfiya F., Actual problems of teaching russian language as the language of the specialty of foreign students
// Revista Publicando. – 2018. – Vol.5, Is. 16. – P. 324-331.
4. Kuzmina E.K, Nazarova G.I, Nizamieva L.R, Innovative technologies of teaching business French//International Journal of Engin eering
and Technology(UAE). – 2018. – Vol.7, Is.4. – P.85-87.
5. Badarch, D., Tokareva N.G., Tsvetkova M.S. Mass open online course: reconstruction of higher education [Electronic resource] / D.
Badarch // Higher education in Russia. - 2014. - No. 10. - URL: https://cyberleninka.ru/article/n/mook-rekonstruktsiya-vysshego-
obrazovaniya (accessed: 01.03.2018).
5115-
6. Kolesova, T.V. Organization of the environment for independent study of English by means of information and computer technolo gies in a 5118
university / T.V. Kolesova // Education and self-development. - Kazan: Centre for Innovative Technologies, 2013. - No. 2 (36). - S. 18-24.
7. Krivitsky, B.Kh. About systematization of educational computer means / B.Kh. Krivitsky // Educational Technology & Society. - – 2000. -
Volume 3 (3) - 548-556 pp.
8. Canale, M. On some dimensions of language skill / M. Canale, J.V. Oller (editor) // Proceedings of the study of language testing. - Rowley,
Mass.: Ed.Newbury House, 1983. - Pp. 332-342.
9. Dragunova, A.A. Educational Internet resources as a means of forming professional foreign language communicative competence of
students / A.A. Dragunova // Yaroslavl Pedagogical Bulletin. - 2011. - No. 1. - Pp. 163-167.
10. Palkova, A.V. Application of Web 2.0 services in teaching foreign languages / A.V. Palkova // Teaching foreign language s in
multimedia space: a collection of scientific articles - Tver: Tver State University, 2012. – Pp. 69-85.
11. Kayumova G.F, Makarova V.F, Galiullin R.R, Moral education of high school students in national (TurkiC) schools through liter ature //
International Journal of Mechanical Engineering and Technology. – 2018. – Vol. 9, Is. 10. – P.1467-1475.
12. Aleksandra E. Massalova, Julia V. Rzhanikova, Elena V. Dziuba. Formation of Motivation for Studying Russian as a Foreign Language
in Cadets of a Military Engineering University Through Audiovisual Visibility // Astra Salvensis – review of history and culture, year
VI, Supplement no. 1, 2018.
13. Marianthi Karatsiori, Kris Gritter. European profile for language teacher education: Meeting the challenge for sharing common
competences, knowledge, strategies and values // Journal Cogent Education. Volume 3, 2016. – Issue 1. – Р. 1-29.
14. Deniz Yalçınkaya. Why is Blended Learning for Vocationally Oriented Language Teaching? // Procedia – Social and Behavioral
Sciences 174:1061-1068. February 2015 with 52 Reads. DOI: 10.1016/j.sbspro.2015.01.795.
15. Mark Warschauer. Computer Assisted Language Learning: an Introduction (1996) «Computer Assisted Language Learning: an
Introduction». In Fotos S. (ed.) Multimedia language teaching, Tokyo: Logos International: 3-20.
16. Mishina Nadezda, Javgildina Zilia, Mishina Anastasia, Design Practice as a Method of Professional Orientation of Teenagers in the
System of Supplementary Education // Tarih Kultur Ve Sanat Arastirmalari Dergisi-Journal of History Culture and Art Research. – 2018.
– Vol.7, Is.4. – P. 132-137.
17. Luo, C., Li, M., Peng, P., & Fan, S. How Does Internet Finance Influence the Interest Rate? Evidence from Chinese Financial Markets.
Dutch Journal of Finance and Management, 2(1), (2018). 01.
18. Torquato, M., Araujo, J., Umesh, I. M., & Maciel, P. SWARE: A Methodology for Software Aging and Rejuvenation Experiments.
Journal of Information Systems Engineering & Management, 3(2), (2018). 15.
19. Marbán, J. M., & Mulenga, E. M. Pre-service Primary Teachers’ Teaching Styles and Attitudes towards the Use of Technology in
Mathematics Classrooms. International Electronic Journal of Mathematics Education, 14(2), (2019). 253-263.
https://doi.org/10.29333/iejme/5649
20. Feizuldayeva, S., Ybyraimzhanov, K., Mailybaeva, G., Ishanov, P., Beisenbaeva, A., & Feizuldayeva, S. Vocational training of f uture
elementary school teacher by means of realization of inter-subject continuity. Opción, 34(85-2), (2018). 479-516
Keyword : information and communication technologies, bachelor-designer, graphic design, art and design
competence.
References:
1. Galeeva Zukhra N., Yao Michail K., Emanova Juliana G. Project thinking as the basis of professional competence of the designer //
Amazonia Investiga. - 2018.- Vol. 7, Is.15. - P.133-138
2. Klara K. Karamova, Irina M. Mayorova, Gulnaz H. Myhtarova, Rezeda.A Fakhrutdinova, Adnan M. Hakki. Development of creative
activity of students-designers method of metaphorical associative cards (MAC)" "Amazonia oS"
http://www.udla.edu.co/revistas/index.php/amazonia-investiga/article/view/947 p.279-286
3. Grigoriev, S.G. Possibilities of using information and communication technologies in open education [Electronic resource] / S.G.
Grigoriev, V.V. Grinshkun URL.: http://www.ido.rudn.ru/Open/ikt/3.htm (accessed date: 8.01.2013)
4. Makarova T.V. The structure and content of information and communication technologies, the competence of engineers of the
specialty "Information technology in design" / T.V. Makarova // Omsk Scientific Herald. - 2007. - No. 2 (56). - P. 175-178
5. Koroleva L.Y., Khayrullina E.R. The role of information technology in the development of creativity of a future designer //
Fundamental Research. - 2014. - No. 9. - P. 658-662
6. Fomin, A.P. Pedagogical consciousness in the conditions of virtualization of social reality // A.P. Fomin. Abstract of a thesis for the
degree of the Doctor of Philosophy. 2009. –38 p.
7. Brown, A. Technology-enhanced learning: strengthening links with practitioners / A. Brown, J. Bimrose // Book of abstracts 12-th
International conference on technology supported learning and training. Berlin, 2006. - P.36
8. E-Learning: Erfolgsfaktoren und Einsatzkonzepte mit interaktiven Medien / ed.U. Dittler.Muenchen; Wien: Oldenbourg Verl., 2002.
- P. 318
9. Kayumova G.F., Makarova V.F., Galiullin R.R and Khaziev R.I., Yuldybaeva G.V. and Abdrafikova G.Kh. Moral education of high
school students in national (Turkic) schools through literature. - International Journal of Mechanical Engineering and Technology
(IJMET) Volume 9, Issue 10, October 2018, pp. 1467–1475
10. Janet Hanson Displaced but not replaced: the impact of e-learning on academic identities in higher education / Janet Hanson //
Teaching in Higher Education.-2009. Vol. 14, № 5. – P.553-564
11. Mohr, A. T. Learning style preferences and the perceived usefulness of e-learning / A. T. Mohr, D. Holtbriigge, N. Berg. // Teaching
in Higher Education. 2012. - Vol. 17, № 3. – P.309-322
12. Ameen, A. M., Ahmed, M. F., & Hafez, M. A. A. The Impact of Management Accounting and How It Can Be Implemented into the
Organizational Culture. Dutch Journal of Finance and Management, 2(1), (2018).02.
13. Carreto, C., Gêgo, D., & Figueiredo, L. An Eye-gaze Tracking System for Teleoperation of a Mobile Robot. Journal of Information
Systems Engineering & Management, 3(2), (2018). 16.
14. Peranginangin, S. A., Saragih, S., & Siagian, P. Development of Learning Materials through PBL with Karo Culture Context to
Improve Students’ Problem Solving Ability and Self-Efficacy. International Electronic Journal of Mathematics Education, 14(2),
(2019). 265-274. https://doi.org/10.29333/iejme/5713
15. Kondubaeva, M. R., Bekalay, N. K., Aubakirova, A. K., Ongarbaeva, A. T., & Tolkinbayev, A. K. The problem of correctness and
reliability of the study in trilingual education. Opción, 34(85-2), (2018). 517-543.
Paper Title: Students Healthy Lifestyle and the Strategy of Adaptation to the University Environment
Abstract: The article substantiates the sociological approach to health-saving behavior as the most promising
direction of strengthening students' health. Despite the wide possibilities of motivation for the health-saving
behavior of students, the problems of its formation, which are due to both social and cultural characteristics,
currently remain. The health of students is largely determined by the prevalence of self-preservation practices. The
article discusses the problem of the relationship of students' attitudes regarding a healthy lifestyle and their self-
preservation practices and the impact of the need to adapt to learning at the university. The empirical basis of the
study is the materials of author's research, firstly, mass representative farrowings of students of Kazan Federal
University (Kazan, Russia) (N = 12468 in 2017 and N = 2712 in 2018), and secondly, a series of focus groups (N =
896. 8).
Sports and other physical activity, along with nutrition and sleep, are recognized by most students as important
5123-
factors determining health and beauty. It is significant that it is these factors that are largely determined only by the
5126
efforts of the person himself that the students are aware of. As part of the adaptation period, students usually make
new friends and gain experience in drinking. However, most students successfully cope with a difficult period and
do not acquire bad habits, it is even considered not fashionable. On the contrary, students learn to plan their day
wisely, find time for sports, prepare healthy meals for the whole day, and try to take care of their own
psychological mood, taking responsibility for their own health.
Keyword : students, self-preserving behavior, self-destructive behavior, health-saving behavior, health, healthy
lifestyle, student, youth.
References:
1. S. A. Vangorodskaya, “Self-preserving behavior: the problem of the content of a concept in Russian sociology”, Central Russian
Journal of Social Sciences, 2017, No. 4. URL: https://cyberleninka.ru/article/n/samosohranitelnoe-povedenie-problema-
soderzhaniya-ponyatiya-v-otechestvennoy-sotsiologii
2. O.V. Myltasova, “Specificity of Russian Students”, Materials of the XX International Conference in Memory of prof. L.N. Kogan
“Culture, personality, society in the modern world: methodology, experience of empirical research”, 2017. P. 845-856.
3. S. Yu. Roshchin, V.N. Rudakov, “Combining study and work by students of Russian universities”, Education Issues, 2014. No. 2.
4. URL:https://cyberleninka.ru/article/n/sovmeschenie-ucheby-i-raboty-studentami-rossiyskih-vuzov
5. F.F. Ishkineva, “Everyday Practices of Student Self-Preservation Behavior,” Kazan Social and Humanitarian Bulletin, 2018, No. 6.
P. 34-38.
6. Haase, A. Steptoe, J.F. Sallis, J. Wardle. “Leisure-time physical activity in university students from 23 countries: associations with
health beliefs, risk awareness, and national economic development”, Preventive Medicine, 2004 Jul; 39(1), P.182-90.
7. N. Ibrahim, D. Al-Kharboush, L. El-Khatib, A. Al-Habib, D. Asali. “Prevalence and Predictors of Anxiety and Depression among
Female Medical Students in King Abdulaziz University, Jeddah, Saudi Arabia”, Iranian Journal of Public Health. 2013 Jul 1; 42(7),
P. 726-36.
8. K. Papier, F. Ahmed, P. Lee, J. Wiseman, “Stress and dietary behaviour among first-year university students in Australia: sex
differences”, Nutrition, 2015 Feb; 31(2), P. 324-30.
9. S. Yubero, R. Navarro, E. Larranaga, M. Esteban, J. Gutiérrez, M. Elche, “Health Contributing Factors in Higher Education Students:
The Importance of Family and Friends”, Healthcare (Basel). 2018 Dec; 6(4), P.147.
10. L.J. Friedlander, G. J. Reid, N. Shupak, R. Cribbie, “Social Support, Self-Esteem, and Stress as Predictors of Adjustment to
University among First-Year Undergraduates”, Journal of College Student Development, 2007, vol. 48, №3, P. 259-274.
11. M. Von Bothmer, F. Bengt, “Gender differences in health habits and in motivation for a healthy lifestyle among Swedish University
students”, Nursing & health sciences, 2005, 7, P. 107-118.
12. Muyambiri, B., & Chabaefe, N. N. The Finance–Growth Nexus in Botswana: A Multivariate Causal Linkage. Dutch Journal of
Finance and Management, 2(2), (2018). 03.
13. Kanashiro, L., Ribeiro, A., Silva, D., Meirelles, P., & Terceiro, A. Predicting Software Flaws with Low Complexity Models based on
Static Analysis Data. Journal of Information Systems Engineering & Management, 3(2), (2018). 17.
14. Kosko, K. W., & Singh, R. Children’s Coordination of Linguistic and Numeric Units in Mathematical Argumentative Writing.
International Electronic Journal of Mathematics Education, 14(2), (2019). 275-291. https://doi.org/10.29333/iejme/5714
15. Mussabekov, G., Auyezov, B., Tasova, A., Sultanbekova, Z., Akhmetova, Z., & Kozhakhmetova, G. Formation of readiness of futur e
teachers to creative activity in school. Opción, 34(85-2), (2018). 569-599.
897. Keyword : indigenous peoples; human rights, the right of peoples to self-determination; development policy.
References: 5127-
1. Morris G. T. In Support of the Right of Self-Determination for Indigenous Peoples under International Law. German Yearbook of 5129
International Law. Vol. 29. Berlin, 1986.
2. Nettheim G. Peoples and Populations – Indigenous peoples and the Rights of Peoples. The Rights of Peoples. Ed. by James Crawford.
Oxford: Clarendon Press, 1988.
3. United Nations Declaration on the Rights of Indigenous Peoples. Adopted by General Assembly resolution 61/295 dated September 13,
2007 [Electronic resource] // URL: https://www.un.org/en/documents/decl_conv/declarations/indigenous_rights.shtml. (Access da te: 1
June 4, 2019).
4. Kingsbury B. Reconciling Five Competing Conceptual Structures of Indigenous Peoples’ Claims in International and Comparative Law in
Philip Alston (ed). Peoples’ Rights. New York: Oxford University Press, 2001.
5. Corntassel J. J., Primeau T. H. Indigenous ‘Sovereignty’ and International Law: Revised Strategies for Pursuing ‘Self-Determination’.
Human Rights Quarterly. Vol. 17. № 2. 1995.
6. Anaya J. S. Indigenous Peoples in International Law. Sec. ed. Oxford University Press, 2000.
7. Garipov R.Sh. Protection of indigenous peoples in international law.Monograph. Kazan: Center for Innovative Technologies, 2012.
8. Nuttall M. Self-Rule in Greenland: Towards the World's First Inuit State? Indigenous Affairs. Vol. 3-4. 2008.
9. This regulation is reflected in Cl.1 of Additional Protocol I dated 1977; The UN Charter and the Declaration of Principles of International
Law Relating Friendly Relations and Cooperation between States in accordance with the 1970 UN Charter.
10. Ananidze F. R. International legal problems of the protection of the rights of indigenous peoples. Thesis for the degree of candidate of
legal sciences. Moscow. 1996.
Authors: Raniya R. Kayumova, Elena A. Dyganova, Gulnara I. Batyrshina, Armine Suren Baghdasaryan
Paper Title: Formation of Visual Culture in Teenagers by Teaching Them Photographic Art
Abstract: Currently, the vector of modern culture is shifted from verbal to the visual aspect. Visually
898. represented and superficial information often disguises phenomena that require special analysis to identify them.
Today, the younger generation, namely adolescents, is the most prone to massive informational “visual attack”. 5130-
Realizing that immersion in a low-grade visual environment is not harmless for a young, not yet fully formed the 5133
personality of a teenager; the formation of their visual culture is a pedagogical problem.
As a result of the study, the authors clarified the definition of “visual culture of personality”, revealed its
structural composition, determined the component content and substantiated its significance in the creative
development of a teenager.
Based on the methodological foundations of personal-pragmatist, culturological, and pragmatist approaches, as
well as the integrated application of theoretical and empirical methods, the researchers identified the possibilities of
photographic art which acts as a pedagogical means of solving the problem. In order to realize the pedagogical
potential of photographic art in educational practice, the authors developed a pedagogical model for the formation
of visual culture as part of the target, methodological, substantive-procedural and diagnostic-effective components.
The introduction of the authoring in the educational process has allowed us to obtain positive results
Keyword : visual culture, photographic art, art photography, art pedagogy, teenagers.
References:
1. Selivanova, E. (2014) The origins of the formation of visual culture. Observatory of Culture. 2, pp. 50-55.
2. Baudrillard, J. (1981) Simulacra and simulations. Paris. p.56.
3. Mishina, A., Javgildina, Z., Mishina, N. (2016) The art and project activity as a means of pre-professional development of teenagers'
graphical skills. The Turkish Online Journal of Design, Art and Communication - TOJDAC. November Special Edition. pp. 2427-
2432 tojdac_v060NVSE140.pdf
4. Freedman K., Heijnen E., Kallio-Tavin M., Kárpáti A., Papp L. (2013) Visual Culture Learning Communities: How and What
Students Come to Know in Informal Art Groups. Studies in Art Education: A Journal of Issues and Research, 54 (2), pp. 103-115
5. Wilson, B. (2003). Of diagrams and rhizomes: Visual culture, contemporary art, and the impossibility of mapping the content of art
education. Studies in Art Education, 44(3), pp.214-229.
6. Daniel, S. (2006). The art of seeing. Moscow: Amphora. p. 206.
7. Serikova, T. (2010). The transformation of the concepts “visual” and “artistic” images in modern culture. News of Altai State
University. 1-2, pp. 152-155.
8. Zeki, S. (1992). The visual image in the mind and in the brain. In the world of science. 11, pp. 33-41.
9. Kodzhaspirova, G. (2000). Pedagogical dictionary. Moscow: Academy, 176 p.
10. Rozin, V. (2009). Visual culture and perception: how a person sees and understands the world. Moscow: LIBROCOM, 274 p.
11. Mishina A.V., Blinova J.L., Belomoeva O.G. (2018) Multimodal art therapy for overcoming negative emotional conditions of
teenagers implementers in out-of-class work. Helix. 8(1), pp.2307 - 2311.
12. Van Dijck, J. (2008). Digital photography: communication, identity, memory. Visual Communication, 7(1), pp. 57-76.
https://doi.org/10.1177/1470357207084865
13. Akhmetshina, E. G., & Kadyjrova, L. H. (2017). Pedagogical Approaches to the Development System of Artistic Culture of
Individual. Revista San Gregorio, 20, Special Edition, December, pp: 189-193.
14. Akhmetshina G.R., Borodina S.D., Salakhova R.I. (2017). Information and Bibliographic Resources on the Design Theory. The
Turkish Online Journal of Design, Art and Communication. Special Edition. - Vol. 7., pp: 1294-1298. tojdac_v070DSE105.pdf
15. Rasooli, M., & Abedini, M. (2017). The Relationship between Organizational Support and Job Satisfaction of Experts and Manage rs
of Islamic Azad University of Qeshm and Subsidiaries (International Units, Medical, Sama, Hormuz and Khamir). Dutch Journ al of
Finance and Management, 1(2), 42. https://doi.org/10.29333/djfm/5818
16. Mwaniki, P., & Ondiek, C. O. (2018). Evaluation of the Effects of SaaS on SMEs in Nairobi County, Kenya. Journal of Information
Systems Engineering & Management, 3(3), 20.
17. Siagian, M. V., Saragih, S., & Sinaga, B. (2019). Development of Learning Materials Oriented on Problem-Based Learning Model to
Improve Students’ Mathematical Problem Solving Ability and Metacognition Ability. International Electronic Journal of
Mathematics Education, 14(2), 331-340. https://doi.org/10.29333/iejme/5717
18. Semin, A. N., & Kurdymov, A. V. (2018). International food security regulation. Opción, 34(85-2), 628-651.
Keyword : forms of training organization, blended learning, virtual learning environment, learning management
system, cognitive independence, teaching foreign languages, translation of business correspondence.
References:
1. Carneiro, R., Lefrere, P., Steffens, K., Underwood, J. (2011). Self-Regulated Learning in Technology Enhanced Learning
Environments. Rotterdam: Sense Publishers. 31 p.
2. Farkhaeva, A.I., Fazlyeva, Z.Kh., Sheinina, D.P. (2016). Computer Technologies in Assistance to Second Language Hig h School
Study // Modern Journal of Language Teaching Methods. 6(8). P. 70-75.
3. Dufour, H. (2014). La classe inversée // Technologie. N°193, septembre-octobre 2014. Р. 44-47.
4. Abdullina, L.R, Ageeva, A.V, Gabdreeva, N.V. (2019). Using the “Flipped classroom” model in the teaching of the theoretical
disciplines (French language) at the university [Technologie de la classe inversée dans l'enseignement des disciplines théoriques
(FLE) aux étudiants des universités] // XLinguae. Vol.12. Is.1XL. P. 161 – 169.
5. Bonk, C.J., Graham, C.R. (2006). Handbook of blended learning: Global Perspectives, local designs. San Francisco, CA: Pfeiffer
Publishing. 624 р.
6. Frydrychova Klimova, B., Hubackova, S., Semradova, I. (2011). Blended learning in a foreign language learning // Procedia Soc.
Behav. Sci. 28. Р. 281–285.
7. Varlamova, M.Yu, Bochina, T.G, Miftakhova, A.N. (2016). Interactivity in teaching a foreign language // Journal of Language a nd
Literature. 7(3). P. 190-194.
8. Bergmann, J., Smith, E. (2017). Flipped Learning 3.0: The Operating System for the Future of Talent Development. Chicago IL:
FLGlobal. 248 р.
9. Sharipova, D.Y., Khuziakhmetov, A.N., Nasibullov, R.R, Yarullin, I.F. (2017). Improving the quality of professional training of
students in the distance learning // Man in India. 97(3). P. 401-416.
10. Kuzmina, E.K, Nazarova, G.I, Nizamieva, L.R, Leblanc, C. (2018). Innovative technologies of teaching business French //
International Journal of Engineering and Technology (UAE). 7(4). P. 85-87.
11. Andrianova, N.S., Vassilieva, V.N., Ostroumova, O.F., Broussois, G. (2018). Integrative Use Of Modern Technologies For Teaching
Foreign Languages // Modern Journal of Language Teaching Methods. 8(10). P.271-275.
12. Rachimova, A.E, Varlamova, E.V, Tulusina, E.A. (2016). Advantages of computer technologies use in training in foreign languages
at the present stage of an education system modernization // Modern Journal of Language Teaching Methods. Special Issue
(December 2016). P. 97-101.
13. Klimova, B. (2017). Evaluation of the Blended Learning Approach in the Course of Business English – A Case Study // Huang TC.,
Lau R., Huang YM., Spaniol M., Yuen CH. (eds) Emerging Technologies for Education. SETE 2017. Lecture Notes in Computer
Science, vol 10676. Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-71084-6_37.
14. Rivera, J. (2019). Blended Learning-Effectiveness and Application in Teaching and Learning Foreign Languages // Open Journal of
Modern Linguistics. 9. Р. 129-144. DOI: 10.4236/ojml.2019.92013.
15. Kord, H., Noushiravani, Y., Bahadori, M. D., & Jahantigh, M. Review and Analysis of Telework Perspective in the Administrative
Systems. Dutch Journal of Finance and Management, 1(2), (2017).44. https://doi.org/10.29333/djfm/5820
16. Galvão, M., & Henriques, R. Forecasting Movie Box Office Profitability. Journal of Information Systems Engineering &
Management, 3(3), (2018). 22.
17. Somasundram, P., Akmar, S. N., & Eu, L. K. Pattern Generalisation by Year Five Pupils. International Electronic Journal of
Mathematics Education, 14(2), (2019). 353-362. https://doi.org/10.29333/iejme/5719
18. Kabayeva, Z., Mussabaev, S., & Madalieva, Z. The formation way of independent Kazakhstan from the individualism and
collectivism perspective. Opción, 34(85-2), (2018).706-728.
900.
Keyword : art education, career orientation, the formation of career orientation, a systematic approach,
principles, adolescents. 5138-
5141
References:
1. Roccas, S. The big five personality factors and personal values /S. Roccas, L. Sagiv, S.H. Schwartz, A. Knafo// Personality and
Social Psychology Bulletin. – 2002. – № 28. – P. 189-201.
2. Kosaretsky, S. Specific Features of Children Involvement in Supplementary Education Depending on Cultural, Educational and
Financial Status of Families and Place of Living / S. Kosaretsky, B. Kupriyanov, D. Filippova // Educational studies. – 2016. - № 1.
Р. 168-190.
3. Akbariva, G.N. The development of readiness of teenagers to the project activity by means of fine arts / G.N. Akbariva, L.P.
Yephimova, Z. M. Yavgildina // Social Sciences (Pakistan), 2015. - 10 (5), pp. 639-645.
4. Akhmetshina E. G. Pedagogical approaches to the development system of the artistic culture of individual / E.G. Akhmetshina, L. H.
Kadyjrova // Revista san gregorio. – 2017. - №20 (special edition, December) ISSN: 1390-7247; eISSN: 2528-7907. - Р.189-193
5. Valeeva, R.A. Distance learning for aesthetic education - Informed professional development and life-long learning of student
teachers / R.A. Valeeva, S.V. Karkina, A.I. Starcic //ACM International Conference Proceeding Series. - 2018. - Vol. 2 - P.597-603.
6. Salakhov R.F, Esthetic education of children with special needs by means of computer art / R.F. Salakhov, R.I. Salakhova, R.R .
Nasibullov // International Journal of Environmental and Science Education. - 2016. - Vol. 11, Is.6, Р. 1137-1148.
7. Afanasyev, V.G. Society, systematicity, cognition, management [Text] / V.G. Afanasyev. - M.: Politizdat, 1981. - 250 p.
8. Uemov, A.I. System approach and the general theory of systems [Text] / A.I. Uemov. - M.: Thought, 1978. - 272 p.
9. Bespalko, V.P. Components of educational technology [Text] / V.P. Pespalko. - M.: Pedagogy, 1989. -- 190 p.
10. Slastenin, V.A. Pedagogy [Text]: a textbook for pupils of higher educational institutions / V.A. Slastenin, I.F. Isaev, E.N. Shiyanov;
edited by V.A. Slenin. - 6th edition, stereotyped. - M.: Publishing Centre "Academy", 2007. - 576 p.
11. Mardani, M., & Fallah, R. Comparison of Financial Leverage Ratio before and after the Use of Off-Balance Sheet Financing in Firms
Listed in the Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(2), (2018). 53.
https://doi.org/10.29333/djfm/5829
12. Dominguez, L., D’Amato, J. P., Perez, A., Rubiales, A., & Barbuzza, R. A GPU-Accelerated LPR Algorithm on Broad Vision
Survillance Cameras. Journal of Information Systems Engineering & Management, 3(3), (2018). 24.
13. Ulandari, L., Amry, Z., & Saragih, S. Development of Learning Materials Based on Realistic Mathematics Education Approach to
Improve Students’ Mathematical Problem Solving Ability and Self-Efficacy. International Electronic Journal of Mathematics
Education, 14(2), (2019). 375-383. https://doi.org/10.29333/iejme/5721
14. Nebessayeva, Z., Bekbolatova, K., Mussakulov, K., Zhanbirshiyev, S., & Tulepov, L. Promotion of entrepreneurship development by
art and design by pedagogy. Opción, 34(85-2), (2018). 729-751.
Keyword : names of newspapers and magazines, onomastic media space, ideology and language, keywords, key
meanings.
References:
901. 1. Vezhbitskaya A. Understanding of cultures through the use of keywords. M.: Languages of Slavic culture, 2001. 288 p.
2. Maidanova L.M., Solomatov S.I., Fedotovskikh T.G., Chudinov A.P. The word and key meanings in modern media texts. Ekaterinbur g: 5142-
Publishing House of Ural University, 2004. 229 p.
3. Muhametzanova L.R., Mardieva L.A. The titles of newspapers and magazines of the Kazan governorate: lexico-semantic analysis'//
5145
Modern Journal of Language Teaching Methods. Vol. 8, Issue 11, November 2018. Pp.118 – 122.
4. Lewin-Jones, Jenny; Webb, Mike. Ideology in Disguise: Place Name Metonyms and the Discourse of Newspaper Headlines //
SOCIOLOGICAL RESEARCH ONLINE. 2013. Vol. 18 Issue 4 Article Number: 18 Published: NOV 29.
5. Adams, Michael. The American Blade: Etymologies of a Newspaper Name // Names-a journal of onomastics. 2013. Vol. 61. Issue: 3
Pp. 140-149.
6. Anikin E.E., Budaev E.V., Chudinov A.P.
7. Historical Dynamics of Metaphoric Systems in Russian Political Communication// Voprosy Kognitivnoy Lingvistiki. 2015. № 3 (44). P.
26-32
8. Gizatullina, A., Gumerova M., Vinogradova T., Grachev M. Post-Perestroika Ideologemes Survey (Based on the Newspaper “Izvestiya”)//
Helix, 2017. Vol. 8(1). Рp. 2270 – 2274.
9. Muhametzyanova L. R., Mardieva L. A., Elena S. Kara-Murza. Name of the newspaper: communicative-functional approach // National
Academy of Managerial Staff of Culture and Arts. 2017. № 4 (2). Рp. 90 – 93.
10. Shkurko V. Ju., Mardieva L.A., Shchuklina T. Yu., Chudinov A. P. Poster images in a new linguistic and extralinguistic contex t//
Amazonia Investiga. 2018. Vol. 7, Núm. 12 (2018). 320-324.
11. Philosophical Dictionary / Ed. I.T. Frolov. M.: Publishing house of political literature, 1986. 590 p.
12. Dahl V. Explanatory Dictionary of the Great Russian Language: in 4 volumes, V. 4. St. Petersburg, Moscow, 1882. 704 p.
13. Dictionary of the Russian language: in 4 volumes / Academy of Sciences of the USSR, Institute of Russian language; Ed. A.P. Evgenieva.
V.4. 3rd ed., stereotyped. M.: Russian language, 1988. 800 p.
14. Pakdel, M., & Talebbeydokhti, A. The Effect of Adjustment Announcement of Predicted Profit on Price and Trading Volume of Listed
Companies in Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(1), (2018). 49. https://doi.org/10.29333/djfm/5825
15. Melo, R., Sobrinho, V. D. P. F. M., Filho, I. J. D. M., Feliciano, F., & Maciel, P. R. M. Redundancy Mechanisms Applied in Video
Streaming Service on Eucalyptus Cloud Computing Infrastructures. Journal of Information Systems Engineering & Management, 3(3 ),
(2018). 25.
16. Ayebo, A., & Mrutu, A. An Exploration of Calculus Students’ Beliefs about Mathematics. International Electronic Journal of Mathematics
Education, 14(2), (2019). 385-392. https://doi.org/10.29333/iejme/5728
17. Kasteyeva, M. Belgium priority as a partner for the Republic of Kazakhstan. Opción, 34(85-2), (2018). 752-772.
Paper Title: English and Russian Somatic Phraseological Units: Differentiating Outcomes
Abstract: This paper deals with the outcomes of a comparative analysis of English and Russian somatic
phraseological units, namely the lexical, structural and semantic levels have been involved; the total number of
somatic phraseological units is more than 300 units.
902. Somatic phraseological units (further as PhUs) represent a wide group in any language. The lexical and semantic
group of somatic PhUs is regarded an independent subsystem within Phraseology of any language. This system is 5146-
comprised of PhUs whose key constituent parts include human body part names (from Greek soma means human 5150
body or a body part). It should be noted that the most frequent PhUs include somatisms. This circumstance can
hardly be explained by interlinguistic reasons only. The somatic components correspond both to sensual (eye) and
logic (head) level of knowledge and a criterion of its validity-practice (hand). PhUs with somatisms in their
structure appeared in different languages at different time due to the development of the language, culture, social
and political contacts of the nation with other nations. However, PhUs with somatisms have some general basis for
the use of any human body parts, to express physical and psychological states, feeling and emotions of people.
Somatic PhUs belong to a highly-frequent zone of lexical structure, to its oldest, primordial, and socially significant
part. As a rule, they are polysemantic words, their separate transferred meaning to a greater or lesser extent are
noticeable in phraseological meanings of separate PhUs. Nevertheless, the main, primary and direct meanings (of a
body part) play the decisive role in the formation and use of any somatic PhUs.
Keyword : Somatic phraseological unit, somatism, comparative analysis, lexical and structural peculiarities, full
equivalence, partial equivalence, zero equivalence.
References:
1. Sulkarnayeva А.R. Otsomaticheskaya vtorichnaya nominatciya v tekhnicheskoy termonologii [in Russian]. – Аstana, 2009. – 146 p.
2. Amosova N. Osnovy angliyskoy frazeologii [in Russian]. - Lnd., 1962. – 228 p.
3. Gabdrakhmanova, F.H., Mukhametzyanova, L.R., Shayakhmetova, L.Kh. Associative experiment is an effective method of research
of the national character (on the material of tatar and Russian liguistic cultures) (2015) Mediterranean Journal of Social Sciences, 6
(3), pp. 296-300.
4. Ayupova R.A., Bashirova M.A., Bezuglova O.A., Kuznetsova A.A., Sakhibullina K.A. Ornythonym component and phraseological
meaning. Life Science Journal. 2014, 11(11), pp. 290-293.
5. Vinogradov V.V. Leksikologiya I leksikografiya [in Russian]. М. 1977. - 349 p.
6. Shaiakhmetova L., Shayakhmetova L., Ashrapova A., Zhuravleva Y. Using Songs in Developing Intercultural Competence, 2017,
Tarih kultur ve sanat arastirmalari dergisi-journal of history culture and art research, V. 6, pp. 639-646.
7. Jennifer Seidl, W. McMordie. English Idioms and How to Use Them. – M.,1993. -356 c.
8. Cowie, A.P. and R. Mackin and I.R. McCaig. Oxford Dictionary of English Idioms. (previously published as Oxford Dictionary of
Current idiomatic English Volume 2) - Oxford., 1998.-pp 542.
9. Kunin А.V. Anglo-russkiy frazeologicheskiy slovar. - М.,1967.- 588 p.
10. Smith L. «Words and Idioms» - Lnd. 1998. –pp 465.
11. Webster’s New World Dictionary of American English. - N.Y.1978.-pp 540.
12. Cowie A. P. and R. Mackin. Oxford Dictionary of Current Idiomatic English.
13. Apresyan Yu.D. Novyi bolshoy Anglo-Russkiy slovar. - M.,1987.- 365 p.
14. Sazesh, A., & Siadat, S. A. (2018). The Relationship between Quantum Management and Organizational Agility in Ministry of
Roads and Urban Development of Golestan Province, Iran. Dutch Journal of Finance and Management, 2(2), 51.
https://doi.org/10.29333/djfm/5827
15. Guzmán, S. A., Fóster, P. F., Ramírez-Correa, P., Grandón, E. E., & Alfaro-Perez, J. Information Systems and their Effect on
Organizational Performance: An Inquiry into Job Satisfaction and Commitment in Higher Education Institutions. Journal of
Information Systems Engineering & Management, 3(4), (2018). 26.
16. Putri, S. K., Hasratuddin, & Syahputra, E. Development of Learning Devices Based on Realistic Mathematics Education to Improv e
Students’ Spatial Ability and Motivation. International Electronic Journal of Mathematics Education, 14(2), (2019). 393-400.
https://doi.org/10.29333/iejme/5729
17. Sailaukyzy, A., Shakuova, R., Sak, K., & Lebedeva, T. (2018). Contemporary view to the history of Kazakhstan's democratic
journalism and publicism. Opción, 34(85-2), 774-799.
Keyword : linguodidactics, speech culture, noun, category of gender, Russian language, principle of
communicative approach.
References:
1. Lu Y, Yusupova Z.F, Kadyrkulova U.K, Study of the grammal standards of use of Russian pronouns in a foreign language
auditorium//Astra Salvensis. - 2017. - Vol.2017, Is. - P.273-278.
2. Еrofeeva I.V. Place of derivative adjectives with suffixes -ьн- and -ьск- in the Old Russian language (based on chronicles material) //
Przegląd Wschodnioeuropejski. – IX/1. – 2018. – С.251-261.
3. Victoriya Yuryevna Shkurko, Yulia Konstantinovna Lukoyanova, Ekaterina Sergeeva, Using Fictional Texts In Teaching Russian As
A Second Native Language // Modern Journal of Language Teaching Methods. - 2017. - Vol.7, Is.10. - P.59-63.
4. Volskaya A.S., Chupryakova O.A., Safonova S.S., Karipzhanova G.T. Semantico-functional features of expressive derivatives in the
artistic discourse of V. Makanin // International Journal of Engineering & Technology, 2018, Vol. 7, Is. 4.36, pp. 983–985.
5. Rakhimova D.I, Yusupova Z.F, Korneyeva T.A., Olympiad in Russian language as a form of bilingual student linguistic
development//Journal of Language and Literature. - 2016. - Vol.7, Is.3. - P.145-148.
6. Matveeva N.N., Fatkhutdinova V.G. National component in Russian word-formation: linguodidactic aspect // Journal of Language
and Literature. Vol.7. No 2. May, 2016. pp: 233-236.
7. Kozyrev, V. A., Cherniak, V. D. (2012). Modern language situation and speech culture: study guide. 184 p. Moscow: FLINTA:
Science
8. Shcherbakov, V.S. (1966). Gender category in Russian (functional and grammatical characteristics). 25 p. Samarkand.
9. Laskova, M. V. (2001). Grammatical category of gender in the aspect of gender linguistics. Monograph. 192 p. Rostov on Don:
Rostov State Economic University.
10. Gin, Yа.I. (1992). Poetics of grammatical gender. 168 p. Petrozavodsk: Karelian State Pedagogical Institute.
11. Vezhbickaia, A. (1997). Semantics, Culture, and Cognition. 416 p. Moscow, Russian dictionaries.
12. Akishina, A.A. (2002). Learning to teach: for teachers of Russian as a foreign language. 256 p. Moscow: Russian language.
13. Sadeghpour, F., Far, M. G., Khah, A. R., & Akbardokht Amiri, M. A. (2017). Marketing Strategic Planning and Choosing the Righ t
Strategy using AHP Technique (Case Study: Ghavamin Bank Mazandaran). Dutch Journal of Finance and Management, 1(2), 45.
https://doi.org/10.29333/djfm/5821
14. Machado, A. D. B., Souza, M. J., & Catapan, A. H. (2019). Systematic Review: Intersection between Communication and
Knowledge. Journal of Information Systems Engineering & Management, 4(1).
15. Puspitasari, L., In'am, A., & Syaifuddin, M. (2019). Analysis of Students’ Creative Thinking in Solving Arithmetic Problems.
International Electronic Journal of Mathematics Education, 14(1), 49-60. https://doi.org/10.12973/iejme/3962
16. Kurmanali, A., Suiyerkul, B., Aitmukhametova, K., Turumbetova, Z., & Smanova, B. (2018). Analysis of the proverbs related to the
lexemes" tongue/language". Opción, 34(85-2), 97-115.
Paper Title: On The Role of Modern Doctrines on Human Rights (International Legal Examination)
Abstract: The modern doctrines on human rights, which are proposed to be considered in the context of their
implementation in international legal practice, are the subject of theoretical and legal analysis in the paper. It is
noted that human rights have come a long way in their formation, design and subsequent genesis, and they have
finally formed by the end of the last century, and it seems that now all the necessary conditions have been created
for their philosophical, legal, axiological analysis and relevant rational consideration of human rights.
The advantages of international law in the field of human rights are listed; namely, it is noted that international
human rights standards are universal in nature and are binding based on which states are obliged to ensure a
minimum standard of those rights and freedoms that are enshrined in international acts,
There are listed in the paper advantages of international legal regulation regarding human rights and freedoms,
such as the supranational, mandatory and imperative nature of international acts; guarantees of protection and the
possibility of restoring violated rights and freedoms of citizens; a man-centred approach in resolving disputes and
conflicts arising in international practice. The role of international bodies such as the International Criminal Court,
the International Tribunal for the Law of the Sea, the Court of the European Union, the European Court of Human
Rights, the International Tribunals for Rwanda and the Former Yugoslavia, and the Special Court for Sierra Leone,
is emphasized.
Particular attention is paid to the principle of presumption of innocence, which has fundamental and quintessential
904. characteristics in the field of human rights.
5155-
Keyword : doctrine, human rights, international law, the principle of the presumption of innocence, priorities, 5158
rights and freedoms, judicial practice.
References:
1. Ebzeev B.S. Constitution. Democracy. Human rights. - Moscow - Cherkassk, 1992. P.120-121.
2. Hegel G.V.F. The philosophy of law. - M., 1990. P.385.
3. History of the Ancient World. Textbook and workshop for academic undergraduate // https://books.google.ru.
4. Boldyreva O. M. Protection of human rights in the history of international law // Bulletin of the Prikamsky So cial Institute.2018. No. 1
(79). P. 14-20.
5. Brown R.E. The history of American Justice. – N.Y.; Boston, 2001. – Р. 127.
6. Gilmullin A. R. Sobre los elementos estructurales de una doctrina legal de presunción de inocencia / Ainur Gilmullin, Alexand er Pogodin,
Vagip Abdrashitov // Revista Dilemas Contemporáneos: Educación, Política y Valores. ― Año: VI. ― Número: Edición Especial. ―
Artículo no.:17. ― Diciembre 2018. ― P. 1―12.
7. Allen D. Russian tomorrow: Justice and Corts. – L.; Roma, 1999. – P. 38.
8. Triber W. L. Methodology and Criteria in Due Process. – N. Y., 1978. – Р. 153.
9. Maitland F. W. The Constitutional history of England. – Р. 314.
10. Resolution by the Plenum of the Supreme Court of the Russian Federation dd. October 25, 1996 No. 10 // ppvs.rf / 1996 / posta novlenie-
plenuma-vs-rf / N10-ot-25.10.1996.html.
11. Vereshchetin V.S. Some aspects of the correlation between international and national law in the practice of the UN Internatio nal Court of
Justice // Russian Journal of Law. - 2007. - N 3. - P. 19-26.
12. Ferrazzini vs. Italy. European Court of Human Rights. 2001 // https://www.echr.coe.int/Documents/FS_Taxation_RUS.pdf.
13. Schenk vs Switzerland. (Shenk vs. Switzerland. The judgment of the European Court of Human Rights of July 12, 1988. Ser. A N.140.
Keyword : artificial intelligence; robot; intellectual technologies; digital economy; machine learning;
technological singularity; superintelligence; legal regulation; information law; law; legislation; Asilomar principles.
References:
1. Shoham Y., Perrault R., Brynjolfsson E., Clark J., Manyika J., Niebles J.C., Lyons T., Etchemendy J., Grosz B., Bauer Z. The AI Index
2018. Annual Report. AI Index Steering Committee. Human-Centred AI Initiative, Stanford University, Stanford, CA, December 2018.
2. Kuznetsova N. Investments in artificial intelligence are breaking records / N. Kuznetsova // Invest-Foresight. Business magazine. - May
29, 2018. - URL: https://www. if24. ru/investitsii-v-iskusstvennyj-intellekt-byut-rekordy/
3. Neznamov A. Laws of robotics. How to regulate artificial intelligence / A. Neznamov // Forbes. - URL: https://www. forbes.
ru/tehnologii/355757-zakony-robototehniki-kak-regulirovat-iskusstvennyy-intellekt
4. Bostrom N. Superintelligence: Paths, Dangers, Strategies / N. Bostrom. – Oxford : Oxford University Press, 2014. – 390 p.
5. Kurzweil R. The singularity is near: when humans transcend biology / R. Kurzweil. – Duckworth, 2010. – 1012 p.
6. Bostrom N. Strategic Implications of Openness in AI Development / N. Bostrom. – Future of Humanity Institute, University of Oxford,
2017. – 14 p. – URL: https://nickbostrom.com/papers/openness.pdf
7. Pagallo U. The Laws of Robots: Crimes, Contracts, and Torts / U. Pagallo. – Dordrecht : Springer, 2013. – 200 p.
8. Leach R. Political ideology in Britain / R. Leach. – 2nd ed. – London : Palgrave Macmillan, 2009. – 282 p.
9. Ibragimov R. Law of machines. How to hold a robot accountable ?/ R. Ibragimov, E. Suragina // Corporate Lawyer. - 2017. - No. 11. - P.
10-17.
10. Yoav Shoham, Raymond Perrault, Erik Brynjolfsson, Jack Clark, James Manyika, Juan Carlos Niebles, Terah Lyons, John Etchemendy,
Barbara Grosz and Zoe Bauer, «The AI Index 2018 Annual Report», AI Index Steering Committee, Human-Centered AI Initiative,
Stanford University, Stanford, CA, December 2018.
11. Smith B., Shum H. The Future Computed: Artificial Intelligence and its role in society, Microsoft, 2018. – URL:
https://blogs.microsoft.com/uploads/2018/02/The-Future-Computed_2.8.18.pdf
12. Burgess J. P. et al., Ethics Advisory Group Report 2018. – URL: https://edps.europa.eu/sites/edp/files/publication/18-01-
25_eag_report_en.pdf
13. Simachev Y., Sokolov A. New Principles and individual practices in legal regulation amid technological revolutions. Report of Centre of
Development Institute, the Institute for Statistical Studies and Economics of Knowledge, the Skolkovo HSE Institute for Law and
Development, Institute of Legal Regulation, the Institute for Transport Economics and Transport Policy Studies and the Institute of
Education of National Research University Higher School of Economics. (2018). International forum “Development of parliamentarism”.
– 18 p.
14. Komissina I. I. The current state and prospects for the development of artificial intelligence technologies in China / I. I. Komissina //
Problems of the national strategy. - 2019. - No. 1. - P. 137–159.
15. Rezaei, M., & Nemati, K. The Impact of Purchase Intent, Word of Mouth Advertising and Skill Domain of Seller on Quality of Cu stomer
Relationship to Sale Life and Savings Insurance Policies (Case Study: Dana Insurance Co., Bushehr Province). Dutch Journal o f Finance
and Management, 1(2), (2017). 43. https://doi.org/10.29333/djfm/5819
16. Fujo, M. H., & Dida, M. A. Centralized Admission System for Advanced Level Private Schools: Case of Kilimanjaro Region, Tanzania.
Journal of Information Systems Engineering & Management, 4(1). (2019).
17. Saidi, S. S., & Siew, N. M. Assessing Students’ Understanding of the Measures of Central Tendency and Attitude towards Statis tics in
Rural Secondary Schools. International Electronic Journal of Mathematics Education, 14(1), (2019). 73-86.
https://doi.org/10.12973/iejme/3968
18. Baykalova, E. D., Artyna, M. K., Dorzhu, N. S., Ochur, T. K., & Mongush, D. S. Morphological interference in the process of mastering
English speech in conditions of interaction of Tuvan, Russian and English as a foreign language. Opción, 34(85-2), (2018). 35-60.
Authors: Irina N. Fardeeva, Indira A. Shakirova, Elena N. Maltseva, Valentina I. Kuzmenko, Elena V. Smirnova
Keyword : social networks, communication, remote education, teaching methods, information environment.
References:
1. Aygul Z. Ibatova – Iskandar G. Mukhametgaliyev. (2018). New ways of professional language thesaurus formation among students of
engineering specialties. XLinguae, Volume 11, Issue 4, October 2018, ISSN 1337-8384, eISSN 2453-711X
2. Caci, B., Cardaci, M., & Miceli, S. (2019). Development and Maintenance of Self-Disclosure on Facebook: The Role of Personality Traits.
SAGE Open, 9(2), 2158244019856948.
3. Hershkovitz, A., Elhija, M. A., & Zedan, D. (2019). WhatsApp Is the Message: Out-of-Class Communication, Student-Teacher
Relationship, and Classroom Environment. Journal of Information Technology Education, 18.
4. Chandler, P., & Redman, C. (2012). Teaching teachers for the future: Modelling and exploring immersive personal learning networks.
Australian Computers in Education Conference.
5. Williams, P. (2005). Lessons from the future: ICT scenarios and the education of teachers. Journal of Education for Teaching, 31(4), 319-
339.
6. Çevik, Y. D., Çelik, S., & Haşlaman, T. (2014). Teacher training through social networking platforms: A case study on Facebook.
Australasian Journal of Educational Technology, 30(6).
7. Facundo FROMENT, Alfonso Javier GARCÍA GONZÁLEZ, Rocío BOHÓRQUEZ The Use of Social Networks as a Communication
Tool between Teachers and Students: A Literature Review TOJET: The Turkish Online Journal of Educational Technology – October
2017, volume 16 issue 4
8. Aydin, S. (2014). Foreign Language Learners’ Interactions with their Teachers on Facebook. System, 42, 155-163.
doi:10.1016/j.system.2013.12.001
9. Smith, E. E. (2016). “A Real Double-edged Sword:” Undergraduate Perceptions of Social Media in their Learning. Computers &
Education, 103, 44-58. doi:10.1016/j.compedu.2016.09.009
10. Abella, V., & Delgado, V. D. (2015). Aprender a usar Twitter y usar Twitter para aprender. Profesorado, Revista de Currículum y
Formación del Profesorado, 19(1), 364-378. Retrieved from https://recyt.fecyt.es/index.php/profesorado/article/view/41046/23330
11. Mardani, M., & Fallah, R. Comparison of Financial Leverage Ratio before and after the Use of Off-Balance Sheet Financing in Firms
Listed in the Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(2), (2018). 53. https://doi.org/10.29333/djfm/5829
12. Barreto, D. M., & Alturas, B. Quality-in-use app evaluation: case of a recruitment app for Portuguese SMEs. Quality-in-use app
evaluation: case of a recruitment app for Portuguese SMEs, (1). (2018).
13. Radhy, Z. H. Application of Multiply Regression Linear Model and New Technology Method in Estimating Learning and Education o f
Students. International Electronic Journal of Mathematics Education, 14(1), (2019). 87-90. https://doi.org/10.12973/iejme/3978
14. Merkibayev, T., Seisenbayeva, Z., Bekkozhanova, G., Koblanova, A., & Alikhankyzy, G. Oppositions in the conceptual and linguistic
category of time. Opción, 34(85-2), (2018). 116-148.
Paper Title: Deflationary Truth and the Problem of Relativistic Grounds of Emotivism
Abstract: The article discusses the Frege-Geach problem, which is considered one of the most serious
difficulties for emotive meta-ethics. The paper describes how recognition of an emotive content by moral
statements in the form of attitudes leads to the emergence of the Frege-Geach problem. The essence of the problem
is explained, which consists in the impossibility to make a logical conclusion in a situation of mixed contexts, when
the antecedent has a value meaning, and the consequent is descriptive. The authors consider one way to solve this
problem, which involves the use of a deflationary theory of truth. It is proved that the adoption of deflationism
about the truth makes it possible to draw a logical conclusion in mixed contexts. They also raise the question of
whether the application of deflationary truth concept is sufficient to avoid the relativistic effects of emotivism on
normative ethics. The authors note that the synthesis of deflationism and emotivism is not able to explain the
internalism of moral statements, which always have a hidden prescriptive modality. The conclusion is made that
deflationism does not allow emotivism to avoid relativistic consequences in the field of normative ethics.
Therefore, the authors conclude that emotivism should be called the nihilistic theory of the rationale for moral
statements.
Keyword : Metaethics, Relativism, Emotivism, Attitude, Deflationary truth, The Frege-Geach problem.
907.
References:
1. S. Satris, “Ethical Emotivism”, Springer, pp. 26-51, 1987. 5166-
2. A. Ayer, “Language, Truth and logic”, Dover Publications, p. 107, 1946. 5168
3. J. Lemos, “The Problems with Emotivism”, Journal of Philosophical Research, № 25, pp. 285-309, 2000.
4. J. Lyou, “A Critical Study on A. J. Ayer’s Emotivism”, Journal of Ethics, № 1 (111), pp. 1-30, 2016.
5. V. Ogleznev. “The Frege-Geach problem and ascriptive statements”, Philosophy of Science, No. 1 (60), p. 41, 2014.
6. L. Lamberov, “Noncognitivism in ethics and deflationism: the problem of general methodological foundations”, Scientific Bulletin of the
Omsk Academy of the Ministry of Internal Affairs of Russia, No. 3 (50), p. 36, 2013.
7. Ya. Shramko. “The predicate of truth in counterfactual contexts: for defense of deflationism”. Epistemology & Philosophy of Science, No.
2, p. 81, 2011.
8. L. Lamberov. “Deflationism as a metaphysical concept”. Bulletin of Tomsk state university. Philosophy. Sociology. Political Science, No.
4 (24), p. 34, 2013.
9. K. Swan, “Emotivism and deflationary truth”, Pacific Philosophical Quarterly, № 83(3), p. 276, 2002.
10. L. Lamberov. “The Frege-Geach problem: (I) on the possibility of solution in the deflationary vein,” Vestnik NSU. Series: Philosophy,
Vol. 11. Vol. 3, p. 9, 2013.
11. Pakdel, M., & Talebbeydokhti, A. The Effect of Adjustment Announcement of Predicted Profit on Price and Trading Volume of Lis ted
Companies in Tehran Stock Exchange. Dutch Journal of Finance and Management, 2(1), 49. https://doi.org/10.29333/djfm/5825(2018).
12. Melo, R., Bezerra, M. C., Dantas, J., Matos, R., de Melo Filho, I. J., Oliveira, A. S., ... & Maciel, P. R. M. Sensitivity an alysis techniques
applied in cloud computing environments. In 2017 12th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-7).
IEEE. (2017, June).
13. Tejeda, S., & Dominguez, A. Influence of Interactions in the Collaborative Solving of a Velocity Problem. International Electronic Journal
of Mathematics Education, 14(1), 91-108. (2019).https://doi.org/10.12973/iejme/3979
14. Shayakhmetova, D., & Chaklikova, A. Development of the intermediator of intercultural communication based on public argumenta tive
speech. Opción, 34(85-2), 149-185. (2018).
Keyword : dystopia, humanism, transhumanism, NBIC convergence, general eschatology, technology, social
risks.
References:
1. Vinge Vernor. The Coming Technological Singularity. VISION-21 Symposium, NASA Lewis Research Center and the Ohio Aerospace
Institute, March 30-31, 1993. - URL: https://www.accelerating.org/articles/comingtechsingularity.html
2. Ellul J. The Technological Order / J. Ellul // The Technological Order. Ed. C.F. Stover. Detroit: Wayne State Univ. Press, 1963, 10–37 pp.
910. 3. Leontiev G.D. Anti-utopianism of postmodernism or utopian post-modern? / G.D. Leontiev // News of Ural Federal University. Series No.
3. Social sciences. - 2017. V.12. – № 2 (164). - pp. 78-86. 5176-
4. Leontyev, G. D. Dialectics of freedom and alienation in the space of the internet / G. D. Leontyev, A. M. Safina, L. F. Gaynullina, L.S.
Leontieva et al. // Revista ESPACIOS (ISSN 0798 1015 -Venezuela-Scopus). Vol. 39 (Nº27) Year 2018. Page 8. – URL:
5179
http://www.revistaespacios.com/a18v39n27/18392708.html
5. Malinetsky G. Designing the future and modernization of Russia / G. Malinetsky // Friendship of Peoples. - 2010. - No. 9. - pp. 167–187.
6. Kurzweil Ray. How to Create a Mind: The Secret of Human Thought Revealed. Penguin Books, 2013. - 352 р.
7. Masuda, Y. The Information Society as Postindustrial Society / Y. Masuda. – Wash.: World Future Soc., 1983. – 419 p.
8. Castells M. Information Age: Economics, Society and Culture / M. Castells; translation from English under scientific ed. by O.I.
Shkaratan. - M.: SU-HSE, 2000. - 608 p.
9. Fukuyama Francis. Our Posthuman Future: Consequences of the Biotechnology Revolution.- New York: Farrar, Straus, and Giroux, 2002.
– 256 pp.
10. Kurashov V.I. Ecology and eschatology (Fates of human existence from a religious and scientific point of view) / V.I. Kurashov // Issues
of Philosophy No. 3 - 1995. - pp. 29-36.
11. Kurashov V.I. The origins of pragmatic anthropology. - M.: KDU, 2007. - 304 p.
12. Kurashov V.I. Ecology and Eschatology // Russian Studies in Philosophy, Winter 1998-99.-Vol. 37, № 3. - pp. 8-19.
13. V. Arshinov “Network Path” of modern nano-techno-scientific practice / V.I. Arshinov // Scientific and journalistic journal NBICS-Nauka.
Technology. - 2017 (1). - No. 1. - pp. 66–76.
14. Dubrovsky D.I. The biological roots of the anthropological crisis. What's next? / D.I. Dubrovsky // Man. - 2012. - No. 6. - pp. 51-54.
15. Dobrynin S. Service people of Mikhail Kovalchuk // Radio Liberty. 01/26/2016. - URL: https://www.svoboda.org/a/27511650.html
16. Bensaude-Vincent B. Technoscience and Convergence: A Transmutation of Values? // Summerschool on Ethics of Converging
Technologies. Dormotel Vogelsberg, Omrod/Alsfeld, Germany. 2008.- рр.10.- URL: https://halshs.archives-
ouvertes.fr/file/index/docid/350804/filename/06BBV.pdf
17. Alekseeva I. Yu., Arshinov V.I., Chekletsov V.V. “Techno-humans” versus “posthumans”: NBIKS-revolution and the future of man /
I.Yu. Alekseeva, V.I. Arshinov, V.V. Chekletsov // The issues of philosophy. - 2013.– No. 3. - pp. 12–21.
18. Suleri, J., & Cavagnaro, E. Promoting pro-environmental printing behavior: The role of ICT barriers and sustainable values. International
Journal of Education and Development using ICT, (2016). 12(2).
19. Gamarra, M., Zurek, E., & San-Juan, H. Addendum for: A Study of Image Analysis Algorithms for Segmentation, Feature Extraction and
Classification of Cells. Journal of Information Systems Engineering & Management, 3(1), (2018). 05.
20. Alkhateeb, M. Multiple Representations in 8th Grade Mathematics Textbook and the Extent to which Teachers Implement Them.
International Electronic Journal of Mathematics Education, 14(1), (2019). 137-145. https://doi.org/10.12973/iejme/3982
21. Taubaye, Z., Rivers, W., Mussabekova, U., & Alimbayeva, A. Peculiarities and problems of eponyms (on the material of Kazakhstani
periodicals). Opción, 34(85-2), (2018). 221-236
Authors: Anvar A. Gafarov
Educational Policy of the Russian Empire in the Turkistan Region (The Second Half of the XIXTH -
Paper Title:
the Beginning of the XXTH Century)
Abstract: The expansion of the Russian Empire was accompanied by a steady increase of its ethnocultural
diversity. The weak integration of Russian society prompted the ruling circles to search for effective ways of the
annexed people introduction to the sociocultural values that dominate in the country. The problem of acculturation
was most difficult in Central Asia, annexed to Russia only in the second half of the 19th century. School policy was
recognized as the most important means of foreigner adaptation to the all-Russian cultural space. However, it had a
rather differentiated character in different regions of the empire. The aim of the undertaken research is to identify
the main trends in the formation and development of Russian educational policy in Turkestan, to identify its
specifics and general aspects with politics in other Muslim regions. The analysis of legislative acts, paperwork,
historical and ethnographic, statistical collections, periodical press materials, as well as the works of prominent
adherents of foreign education allowed the author to draw a conclusion about the unity of the goal-setting principles
and established traditions of state educational policy regarding the Muslim population. Its most important trend was
school policy aimed at local people integration into the public education system. At the same time, the weak
“development” of the Central Asian region prompted the authorities to apply more cautious forms of educational
policy in comparison with other, relatively integrated parts of the country.
Keyword : Turkestan, Russian Empire, educational policy, XIXth - the beginning of XXth century.
References:
1. Khalid A. The politics of Muslim cultural reform: Jadidism in Central Asia / A. Khalid. – Berkeley: University of California Press,
1998. – 300 p.
2. Kotyukova T.V. Turkestan trend of the Duma policy of Russia (1905-1917) / T.V. Kotyukova. - M.: Enter-Graphics, 2008. - 201 p.
3. Gafarov A.A. Russian Muslims Lifestyle Renovation Problems in the Modernistic Literature of the Late 19th and Early 20th Century
// Journal of Sustainable Development. - 2015. - Vol. 8, No. 7. - pp. 178-184.
4. Nabiyev R.A., Gafarov A.A. Phenomenon of Religious Revival in the Context of the Experience of Modernization of the Muslim
Community in the Late XIX - Early XX Centuries // Journal of Sustainable Development. - 2015. - Vol. 8, No. 4. - pp. 253-259.
5. Gafarov A.A., Nabiyev R.A., Fazliev A.M., Nafikov I.Z. “Muslim matter” in the mirror of public discussion (XIX – beginning of XX
century) / A.A. Gafarov, R.A. Nabiyev, A.M. Fazliev, I.Z. Nafikov // Journal of Fundamental and Applied Sciences. – 2017. - No.
9(7S). – pp. 1257-1265.
6. Nazarievsky I.T. Historical outline of the legislation on primary education in Russia / Nazarevsky I.T. // Journal of public education
for 1905 - Part CCCLVII. - February. - pp. 149-186.
911. 7. Ostroumov N. Oscillations in the views on the education of natives in the Turkestan region / N.P. Ostroumov. - Tashkent, 1910. - pp.
1-6, 145-160.
8. Ostroumov N.P. Sarts. Ethnographic materials. Third supplemented version. - Tashkent, 1908. - 288 p.
5180-
9. Turkestan native newspaper. 1885. No. 1. January 12, No. 20. June 5, No. 21. June 12, No. 28. July 31, No. 33. September 7; N o. 43. 5183
November 16; 1886. No. 39. October 18, No. 48. December 20; 1887. No. 1. January 10, No. 2. January 17, No. 7. February 21, No.
8. February 28, No. 11. March 21, No. 13. April 3, No. 14. April 18, No. 15. April 25, No. 16. May 2, No. 18. May 18, No. 19. May
26, No. 29. July 28, No. 31. August 14, No. 33. August 28, No. 35. September 12, No. 36. September 21, No. 47 December 5, No.
49. December 22; 1888. No. 24. June 20, No. 26. July 5, No. 36. September 20, No. 37. September 26.
10. Collection of resolutions on the Ministry of Public Education. V. X. 1885-1888. - SPb., 1894. - 1490 col., 130 col. Eastern Outlook.
1883. No. 38. September 22.
11. Vishegorsky A. Higher Muslim education in Fez / A. Vyshegorsky // Wanderer. - 1890. - March. - pp. 481-488, April. - pp. 660-671.
12. Bobrovnikov N.A. Russian-native schools, mektebs and madrassas of Central Asia. Travel notes / N.A. Bobrovnikov. - SPb., 1913. -
90 p.
13. Syr-Daria region. Description, compiled by E. Smirnov according to official sources. - SPb., 1887. - 355 p.
14. Ostroumov N. Muslim maktabs and Russian-native schools in the Turkestan region / N.P. Ostroumov // Journal of the Ministry of
Public Education. - 1906. - Part I. - January. - pp. 113-166.
15. Gramenitsky S. Essay on the development of public education in the Turkestan region / S.M. Gramenitsky. - Tashkent, 1896. - 86 p.
16. Gramenitsky S. 25th anniversary of academic affairs in the Turkestan region / S.M. Gramenitsky. - Tashkent, 1901. - 26 p. Turkestan
statements. 1875. No. 16. April 22.
17. Bartold V.V. The history of the cultural life of Turkestan / V.V. Barthold. - L.: Publishing House of the Academy of Sciences of the
USSR, 1927. - 256 p.
18. Potanin Gr. In the yurt of the last Kyrgyz prince (From the trip to Kokchetayevsky district) / G.N. Potanin // Russian wealth. - 1896. -
No. 8. - pp. 60-88.
19. N.I. Ilminsky letters to the public prosecutor Konstantin Petrovich Pobedonostsev. - Kazan: Edition of the Editorial Board of the
Orthodox Interlocutor, 1895. - 414 p.
20. Collection of documents and articles on the issue of the education of foreigners. - SPb.: Publishing house of the Partnership "Public
benefit", 1869. - 522 p.
21. The rules on primary schools for foreigners living in eastern and southeastern Russia. - Kazan, 1906. - 13 p.
22. The rules on primary schools for foreigners living in eastern and southeastern Russia, approved by the Ministry of Public Education
on March 31, 1906 and amended on January 2, 1907 - Kazan, 1907. - 6 p.
23. Lobão, J., & Pereira, C. Looking for Psychological Barriers in nine European Stock Market Indices. Dutch Journal of Finance and
Management, 1(1), (2016). 39.
24. Oliveira, F. K. D., Oliveira, M. B. D., Gomes, A. S., & Queiros, L. M. Identifying User Profiles from Statistical Grouping Me thods.
Journal of Information Systems Engineering & Management, 3(1), (2018). 06.
25. Godino, J. D., Rivas, H., Burgos, M., & Wilhelmi, M. R. Analysis of Didactical Trajectories in Teaching and Learning Mathematics:
Overcoming Extreme Objectivist and Constructivist Positions. International Electronic Journal of Mathematics Education, 14(1),
(2019). 147-161. https://doi.org/10.12973/iejme/3983
26. Novikova, I. N., Popova, L. G., Shatilova, L. M., Biryukova, E. V., Guseva, A. E., & Khukhuni, G. T. (2018). Lexical and sema ntic
representation of the linguistic and cultural concept “Rest” in the English, German, and Russian languages. Opción, 34(85 -2), 237-
256
Authors: Igor I. Bikeev, Sergey G. Nikitin, Ildar R. Begishev, Zarina I. Khisamova, Alexandra Yu. Bokovnya
912. Experience of Civil Government of Russian Federation Subjects with Institutions of Civil Society in the
Paper Title:
Sphere of Corruption Counteraction
Abstract: The anti-corruption principles established by the legislation of Russia are represented by state
cooperation with civil society institutions, international organizations and individuals. This work gives the author's
interpretation of “civil society institution” concept. In order to disclose and implement the provisions of the law,
they formulate the criteria to classify various associations of citizens as civil society institutions.
The study describes the possible trends of joint activities of regional government bodies of the Russian
Federation and civil society institutions on anti-corruption issues.
According to the Decree of the President of Russia, specialized anti-corruption bodies have been created in each
constituent entity of the Russian Federation - the commissions for coordination of efforts to combat corruption,
which are endowed with serious powers described in the work. The composition of these commissions may include
the representatives of public chambers, scientific and educational organizations, as well as public organizations
whose statutory tasks is to participate in the fight against corruption. Such a solution makes it possible to increase
the transparency of government body activities and improve public control over it.
Based on the results of the work, they formulate main conclusions, proposals and recommendations for state bodies
and civil society institutions. The thesis is proved that the principle of cooperation between the state and civil
society institutions in the activities of the commissions for anti-corruption work coordination in a number of
Russian regions is not implemented or is implemented formally. The statement is substantiated that the inclusion of
civil society institution representatives in the commissions is often takes place on the basis of loyalty (“convenient
sampling”).
Keyword : corruption, civil society institutions, involvement rate, subjects of the Russian Federation.
References:
1. Coskun, Can Aktan. Political Corruption: An Introductory Study On Terminology And Typology // International Journal Of Social
Sciences And Humanity Studies. 2015. Vol. 7. №1. pp. 47-66.
2. Gorsira, Madelijne, Denkers, Adriaan and Huisman, Wim. Both Sides of the Coin: Motives for Corruption Among Public Officials and
Business Employees // Journal of Business Ethics. 2018. Vol. 151. pp. 179-194. Available at: https://doi.org/10.1007/s10551-016-3219-2
3. Teachout, Zephyr. Love, Equality, and Corruption // Fordham Law Revue. 2015. Vol. 84. Iss. 2. Article 5. pp. 453 -461. Available at:
http://ir.lawnet.fordham.edu/flr/vol84/iss2/5 5184-
4. Ouziel, Lauren M. The Regulatory Challenge of Public Corruption // Journal of Criminal Law and Criminology. 2018. Vol. 108. I ss. 3.
Article 7. pp. 639-652. Available at: https://scholarlycommons.law.northwestern.edu/jclc/vol108/iss3/7 5187
5. Medina, Jessica. When Rhetoric Obscures Reality: The Definition of Corruption and Its Shortcomings // Loyola of Los Angeles Law
Review. 2015. Vol. 48. Iss. 3. Pp. 597-650. Available at: https://digitalcommons.lmu.edu/llr/vol48/iss3/3
6. Lessig, Lawrence What an Originalist Would Understand “Corruption” to Mean // California Law Review. 2014. Vol. 102. Iss. 1. Article
1. pp. 1-24. Available at: https://doi.org/10.15779/Z38DF8D
7. Collection of the Russian Federation legislation. - 2015. - No. 29 (part II). - Art. 4477.
8. Greate encyclopedic dictionary. V. 1. / Ed. in charge A.M. Prokhorov. - M.: Soviet Encyclopedia, 1991. - p. 333.
9. Campbell, Kaycea. A Statistical Analysis of Public Sector Corruption and Economic Growth, // LUX: A Journal of Transdisciplinary
Writing and Research from Claremont Graduate University. 2013. Vol. 2: Iss. 1, Article 6. pp. 1 -20. Available at:
http://scholarship.claremont.edu/lux/vol2/iss1/6
10. Quah, Jon S.T. Combating Asian Corruption: Enhancing The Effectiveness Of Anti-Corruption Agencies // Contemporary Asian Studies
Series. 2017, October. pp. 1-83.
11. Meyer Michael, Moder Clara, Neumayr Michaela, Vandor Peter. Civil Society and Its Institutional Context in CEE // International Society
for third-sector Research. Voluntas. 2019. 11 March. pp. 1-17. Available at: https://doi.org/10.1007/s11266-019-00106-7
12. Coskun, Can Aktan. Ethics In Government: Anti-Corruption Measures // International Journal Of Social Sciences And Humanity Studies.
2015. Vol. 7. №2. pp. 63-89.
13. Scheimer, Michael. Introduction Symposium: Russia and the Rule of Law: New Opportunities In Domestic and International Affairs //
American University International Law Review. 2010. Vol. 25. Iss. 2. Symposium: Russia and the Rule of Law: New Opportunities in
Domestic and International Affairs. Article 1. pp. 199-211.
14. Michale, Bryane. Issues in Anti-Corruption Law: Drafting Implementation Regulations for Anti-Corruption Conventions in Central Europe
and the Former Soviet Union // Journal of Legislation. 2010. Vol. 36. Iss. 2. Article 12. pp. 272-296.
15. Woodruff, David M. Law’s Authorizations And Rule Of Law Ideals: Lessons From Russia // GA. J. INT’L & COMP. Law. 2012. Vol. 4 1.
pp. 157-185.
16. Kuhner, Timothy K. The Corruption of Liberal and Social Democracies // Fordham Law Review. 2016. Vol. 84. Iss. 6. Article 3. pp. 2453-
2476.
17. Luo, C., Li, M., Peng, P., & Fan, S. How Does Internet Finance Influence the Interest Rate? Evidence from Chinese Financial Markets.
Dutch Journal of Finance and Management, 2(1), (2018). 01.
18. Araújo, C., Henriques, P. R., & Martini, R. G. Virtual Learning Spaces Creation Based on the Systematic Population of an Onto logy.
Journal of Information Systems Engineering & Management, 3(1), (2018). 07.
19. Escalera Chávez, M. E., Moreno García, E., & Rojas Kramer, C. A. Confirmatory Model to Measure Attitude towards Mathematics in
Higher Education Students: Study Case in SLP Mexico. International Electronic Journal of Mathematics Education, 14(1), (2019) . 163-
168. https://doi.org/10.29333/iejme/3984
20. Shatilova, L. M., Borisova, V. V., & Kasatkina, O. A.. Representation of the linguistic and cultural concept “lie” in the French and Russian
language picture of the world. Opción, 34(85-2), (2018). 257-276.
Paper Title: Legal Aspects of the Need to Create Dna Database for Military Personnel
Abstract: The relevance of this problem is conditioned by the prevailing political situation in the world
community. Both world and local wars almost always entail many deaths, there are the cases of mass burial of the
dead. In such cases, dead can often be determined only by genomic identification. Indirect DNA diagnostics are
being used now, but the use of direct methods is more economical and faster, which requires the creation of a
genomic data-base of all people who will be on the battlefield.
In the armed forces of the Russian Federation, soldiers carry an aluminum token on their chest, on which in-
formation about the name and blood type is stamped. This method was used back in World War II to determine the
identity of a soldier at his death. Of course, this method is not particularly effective, since it is quite difficult to
"identify" a person by such small fragments. In this case, the help of geneticists is needed. The 124th Central Medi-
cal Identification Research Laboratory of the Ministry of Defense of the Russian Federation, located in Rostov-on-
Don, which was engaged in the identification of people in the Chechen Republic, has extensive identification
experience.
At first, during the first Chechen campaign, the names of 700 dead servicemen were identified thanks to special
laboratory methods. Further, the number of identified persons was already about 3 thousand, and this was not due
to the fact that the number of losses increased.
Research is still ongoing. And, despite the fact that geneticists did a great job to identify the dead, there are still
914. inscriptions on the graves: "Unknown soldier." A number is put in the place of the name with the hope that
someday it will still be possible to identify this fighter [1].
5192-
5194
Keyword : DNA examination, identification of military men, unidentified soldiers, genomic registration, ge-
nomic base, DNA base, DNA material, identification of people .
References:
1. Ruslan Kadrmatov. Under his own name // Independent newspaper [Electronic resource]. - URL: http://nvo.ng.ru/notes/2003-08-
29/8_selfname.html (reference date: 5.03.18).
2. Olga Artemyeva, Vladimir Litvinov. This is the face of war // Gazeta.ru [Electronic resource]. URL:
https://www.gazeta.ru/social/2014/09/23/6233273.shtml (reference date: 03/14/18).
3. Byazrova K.P., Tokmakov D.S. To the issue of genome registration use in the investigation of crimes // Actual problems of
jurisprudence: a collection of articles based on the materials of the Vth international scientific-practical conference No. 5 (5). -
Novosibirsk: SibAK, 2017. - pp. 6-11. (reference date: 03/05/18).
4. Comparative Law. An Introduction to the Comparative Method of Legal Study and Research. By Gutteridge H. C., K.C., LL.D.
(Cambridge Studies in International and Comparative Law, Vol. I.) – London: Cambridge University Press. The Cambridge Law
Journal. – 1947. – 9(3). – pp. 386-387.
5. Dale, William. Legislative Drafting: A New Approach: a Comparative Study of Methods in France, Germany, Sweden and the United
Kingdom. – London: Butterworths, 1977. – 341 p.
6. Artur I. Khabirov, Gulnara M. Khamitova. On The Issue of the Place of a Loan Commitment in the System of the Russian Law of
Obligations // The Journal of Social Sciences Research. –2018. – Special Issue – 5. – pp. 421-424.
7. Siems, M., & Mac Síthigh, D. Mapping legal research. The Cambridge Law Journal. – 2012. – 71(3). – pp. 651-676.
8. Davies, P. Rectification versus interpretation: the nature and scope of the equitable jurisdiction. – The Cambridge Law Journal. – 2016.
– 75(1). – pp. 62-85.
9. Khabirov Artur. On the issue of the consensual construction of a loan agreement // National Academy of Managerial Staff of Culture
and Arts Herald. – 2018. – № 3. – pp. 70-73.
10. Khabirov A. I., Khamitova Gulnara M. Legal problems of vaccinal prevention // DILEMAS CONTEMPORANEOS-EDUCACION
POLITICA Y VALORES. - 2018. - Vol.6, Is. - Art. №39.
11. Victoria Safronova. About a hundred years later, a mammoth will run in our zoo. // Russian planet [Electronic resource]. URL: https:
//rusplt.ru/info/about-copy/ (reference date: 5.03.18).
12. A.A. Panova, A.F. Sokolov. Generic Genomic Registration: pro et contra. // Encyclopedia of forensics [Electronic resource]. - URL:
http://www.proexpertizu.ru/general_questions/616/ (reference date: 5.03.18).
13. Muyambiri, B., & Chabaefe, N. N. The Finance–Growth Nexus in Botswana: A Multivariate Causal Linkage. Dutch Journal of Finance
and Management, 2(2), (2018). 03.
14. Martínez-Alcalá, C. I., Ramírez-Salvador, J. A., Rosales-Lagarde, A., & Jiménez-Rodríguez, B. Assistance and Support of Primary
Caregivers through an eService Platform. Journal of Information Systems Engineering & Management, 3(1), (2018).09.
15. Koskenoja, M. Factors Supporting and Preventing Master Thesis Progress in Mathematics and Statistics – Connections to Topic and
Supervisor Selection. International Electronic Journal of Mathematics Education, 14(1), (2019). 183-195.
https://doi.org/10.29333/iejme/3986
16. Zhatkin, D. Russian literary-critical reception of Burns at turning of the XIX–XX centuries. Opción, 34(85-2), (2018). 277-300
Keyword : ontology, aspect level polarity, semantic network, SentiWordNet, SenticNet, sentiment analysis.
References:
1. Padmaja, S., & Fatima, S. S. (2013). Opinion mining and sentiment analysis-an assessment of peoples' belief: A survey. International
Journal of Ad hoc, Sensor & Ubiquitous Computing, 4(1), 21.
2. Jagtap, V. S., & Pawar, K. (2013). Analysis of different approaches to sentence-level sentiment classification. International Journal of
Scientific Engineering and Technology, 2(3), 164-170.
3. Vivekanandan, K., & Aravindan, J. S. (2014). Aspect-based opinion mining: A survey. International Journal of Computer
Applications, 106(3).
4. Ravi, K., & Ravi, V. (2015). A survey on opinion mining and sentiment analysis: tasks, approaches and applications. Knowledge-Based
Systems, 89, 14-46.
5. Kolkur, S., Dantal, G., & Mahe, R. (2015). Study of different levels for sentiment analysis. International Journal of Current Engineering
and Technology, 5(2), 768Ű770.
6. Devika, M. D., Sunitha, C., & Ganesh, A. (2016). Sentiment analysis: A comparative study on different approaches. Procedia Computer
Science, 87, 44-49.
7. Kharde, V., & Sonawane, P. (2016). Sentiment analysis of twitter data: a survey of techniques. arXiv preprint arXiv:1601.06971
8. Mäntylä, M. V., Graziotin, D., & Kuutila, M. (2018). The evolution of sentiment analysis—A review of research topics, venues, and top
cited papers. Computer Science Review, 27, 16-32.
9. Borth, D., Ji, R., Chen, T., Breuel, T., & Chang, S. F. (2013, October). Large-scale visual sentiment ontology and detectors using
adjective noun pairs. In Proceedings of the 21st ACM international conference on Multimedia (pp. 223-232). ACM.
10. Kreutzer, J., & Witte, N. (2013). Opinion Mining Using SentiWordNet. Uppsala University.
11. Mukherjee, S., & Joshi, S. (2013). Sentiment aggregation using ConceptNet ontology. In Proceedings of the Sixth International Joint
Conference on Natural Language Processing (pp. 570-578).
12. Nithish, R., Sabarish, S., Kishen, M. N., Abirami, A. M., & Askarunisa, A. (2013, December). An Ontology based Sentiment Analysis
for mobile products using tweets. In Advanced Computing (ICoAC), 2013 Fifth International Conference on (pp. 342-347). IEEE.
13. Singh, V. K., Piryani, R., Uddin, A., & Waila, P. (2013, March). Sentiment analysis of movie reviews: A new feature-based heuristic for
aspect-level sentiment classification. In Automation, computing, communication, control and compressed sensing (iMac4s), 2013
international multi-conference on (pp. 712-717). IEEE.
14. Cambria, E. (2013, November). An introduction to concept-level sentiment analysis. In Mexican international conference on artificial
intelligence (pp. 478-483). Springer, Berlin, Heidelberg.
15. Kontopoulos, E., Berberidis, C., Dergiades, T., & Bassiliades, N. (2013). Ontology-based sentiment analysis of twitter posts. Expert
systems with applications, 40(10), 4065-4074.
16. Cambria, E., Schuller, B., Xia, Y., & Havasi, C. (2013). New avenues in opinion mining and sentiment analysis. IEEE Intelligent
Systems, 28(2), 15-21.
17. Freitas, L. A., & Vieira, R. (2013, May). Ontology based feature level opinion mining for portuguese reviews. In Proceedings of the
22nd International Conference on World Wide Web (pp. 367-370). ACM.
18. Najmi, E., Hashmi, K., Malik, Z., Rezgui, A., & Khanz, H. U. (2014, November). ConceptOnto: An upper ontology based on
Conceptnet. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on(pp. 366-372). IEEE.
19. Haider, S. Z. (2012). AN ONTOLOGY BASED SENTIMENT ANALYSIS: A Case Study
20. Lau, R. Y., Li, C., & Liao, S. S. (2014). Social analytics: Learning fuzzy product ontologies for aspect-oriented sentiment
analysis. Decision Support Systems, 65, 80-94.
Paper Title: (Bio)Social Collectives and Social Media: Acid Attack Survivors in India
918. Abstract: With the increase in social media usage in contemporary times, there is formation of new collectives
and identities. Social media had been trending due to its influence and reach in the community creating a space for 5210-
the ‘voice’ for many disadvantaged groups. With the help of Paul Rabinow’s concept of biosocialities, this study 5214
had identified certain collectives and their networks of acid attack survivors. In-depth interviews were conducted
with survivors, civil society members and surgeons. Narrative analysis was done to understand the negotiations of
survivors for their self and to form their collectives such as advocacy groups, interest from international
communities and advancements in medical techniques.
Keyword : Reverse Water Gas Shift Reaction, High-pressure Reactor, Nanocatalyst, Combustion Synthesis.
References:
1. http://www.brainyquote.com/quotes/keywords/climate_change.html.
2. http://www.preservearticles.com/201101032332/harmful-effects-of-carbon-dioxide.html.
3. http://www.livescience.com/37057-global-warming-effects.html.
4. http://teeic.indianaffairs.gov/er/carbon/carboninfo/reduce/index.html.
5. Kim S.S., Park K.H., and HongS.C., ‘A study of the selectivity of the reverse-water-gas-shift reaction over Pt/TiO2 catalysts’, Fuel
Process. Techno., Vol.108, 2013, pp 47-54.
6. Khirsariya P. and Raju K.M., ‘Single-step oxidation of methane to methanol–towards better understanding’, Procedia Engg., Vol.51, 2013,
pp 409-415.
7. Yang R., Yu X., Zhang Y., Wenze Li, and Noritatsu Tsubaki,’ A new method of low-temperature methanol synthesis on Cu/ZnO/Al2O3
catalysts from CO/CO2/H2’, Fuel, Vol. 87, 2008, pp 443-450.
8. Vibhatavata P., Borgard J.M., Tabarant M., Bianchi D., and Mansilla C., ‘Chemical recycling of carbon dioxide emissions from a cement
plant into dimethyl ether, a case study of an integrated process in France using a reverse water gas shift (RWGS) step’, Int. J. Hydrogen
Energy, Vol. 38, 2013, pp. 6397-6405.
9. Jadhav S.G., Vaidyaa P.D., Bhanage B.M., and Joshi J.B., ‘Catalytic carbon dioxide hydrogenation to methanol: A review of recent
studies’, Chem. Engg. Res. Des., Vol. 92, 2014, pp. 2557–2567.
10. A. Gharibi Kharaji and A. Shariati, ‘Performance of Co-Mo/Al2O3 nanocatalyst for CAMERE process in a batch reactor’ Chem. Biochem.
Engg. Q., Vol. 27 (3), 2013, pp. 275-278.
11. Wennersten R., Sun Q. and Li H., “The future potential for carbon capture and storage in climate change mitigation - an overview from
perspectives of technology, economy, and risk”, J. Cleaner Prod., 2014, pp. 1-13.
Paper Title: Automation using Plc and IIOT Monitoring in Jaggery Preparation
Abstract: Jaggery is a natural sugar which a sweetening agent and is also called as gur or panela. It is first
made into a semisolid paste by evaporating the sugarcane juice. The aim of this paper is to develop an automated
process for Jaggery preparation using PLC and monitored by IIOT (Industrial Internet Of Things). The process
consists of pushbuttons, Temperature sensor (LM35), Level sensor (Ultrasonic level transmitter), IR sensor as input
devices which are interfaced with the Siemens PLC(CPU314-2C). The PLC controls the following output devices
such as crusher motor, conveyor motor, scum motor and valves (pneumatic actuator control valve).The process
parameters are uploaded into the cloud for monitoring using IIOT. The trend graphs are generated using
MindSphere software (MindConnect Nano). The system also provides fault detection through alert messages and e-
mails. The protocol used for IIOT is Transmission Control Protocol (TCP). All the five stages such as crushing,
921. filtering, heating, cooling and molding of the Jaggery preparation process are automated. Thus, a hygienic and fully
automatic PLC based Jaggery production system with fault detection capability is developed through this project.
5227-
5230
Keyword : PLC, IIOT, MindSphere, MindConnect Nano, Trend plot, Fault detection, TCP.
References:
1. Abhishek Jain , Rohit Parakh Jain and Sanjana Lamba (2017)”APPLICATION OF PLC AND SCADA IN HIGH QUALITY
MEDIUM SCALE JAGGERY PRODUCTION PROCESS” - International Journal of Latest Trends in Engineering and Technology
(IJLET)
2. Prof. Niranjan M Madhukar N Ashwini A Muddsar J Saish M (2017) “IOT Based Industrial Automation” - IOSR Journal of
Computer Engineering (IOSR-JCE) National Conference
3. Prof. Yogesh Shankar kumbhar (2016) “Design & Manufacturing of Automation system for Jaggery Plant” - International Research
Journal of Engineering and Technology (IRJET)
4. F.D. Petruzella, Programmable Logic Controllers, Tata Mc-Graw Hill, Third edition, 2010.
5. Hwaiyu Geng, "THE INDUSTRIAL INTERNET OF THINGS (IIoT)," in Internet of Things and Data Analytics Handbook , , Wiley,
2017, pp.41-81
Paper Title: A Method in Collaborative Hybrid Routing Protocol for Next Generation WSN by using Fuzzy Logic
Abstract: Remote sensor systems will be frameworks of free halfway fact points castoff for inspecting a state
of affairs. Specialists of WSNs face troubles that rise up out of correspondence interface disillusionments, memory
and computational goals, and confined imperativeness. Various issues in WSNs are point by point as
multidimensional streamlining issues, and moved closer through bio pushed strategies. There are various strategies
which are fundamental, fruitful, and computationally capable improvement estimation. It has been associated with
location WSN issues, for instance, perfect association, center constrainment, Clustering, and statistics
accumulation. Thusly, this proposition work plots problems in WSNs, well-knownshows usually energized figuring
which assist us hip improving the freestyle lifespan of the Feeler middle points, and appears at its fittingness for
WSN bids. It furthermore affords a short audit way the usually impelled estimations are uniquely suited to deal
with these issues. Bio breathed lifestyles into upgrade strategies are computationally succesful picks in preference
924. to logical systems.
Sensors are seen as imperative pieces of electronic contraptions. In much use of remote sensor frameworks
5237-
(WSNs), imperative and essential information must be passed on to the sink in a multi-bob and essentialness
5245
successful way. See that the essentialness of sensor center points is limited; hauling out framework lifetime in
WSNs is seen as a fundamental issue. In order to extend the framework lifetime, authorities should consider
imperativeness use in directing shows of WSNs. In this paper, another essentialness capable guiding show (EERP)
has been proposed for WSNs using A-star figuring. The proposed coordinating arrangement improves the
framework lifetime by sending data distributes the perfect most restricted way. The perfect way can be found as for
the most extraordinary outstanding imperativeness of the accompanying hop sensor center, high association quality,
support inhabitance and least skip counts. Amusement results show that the proposed arrangement improves
compose lifetime in connection with A-star and feathery logic(A&F) show.
Keyword : Wireless Network, Fuzzy Routing Protocols, Energy efficiency, routing optimization.
References:
1. I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci. An outline on sensor frameworks. IEEE Communications Magaz ine,
40(8):102– 114, Aug 2002.
2. J. N. Al-Karaki and A. E. Kamal.Routing strategies in remote sensor orchestrates: an examination. IEEE Wireless Communications,
11(6):6– 28, Dec 2004.
3. Giuseppe Anastasi, Marco Conti, Mario Di Francesco,and Andrea Passarella. Essentialness protection in remote sensor organizes : A
survey. Unrehearsed Networks, 7(3):537 – 568, 2009.
4. David Braginsky and Deborah Estrin. Talk coordinating algorthim for sensor orchestrates In Proceedings of the first ACM International
Workshop on Wireless Sensor Networks and Applications, WSNA '02, pages 22– 31, New York, NY, USA, 2002. ACM.
5. N. Bulusu, J. Heidemann, and D. Estrin.Gps-less insignificant exertion outside repression for little contraptions. IEEE Personal
Communications, 7(5):28– 34, Oct 2000.
6. AnshumanChhabra and Mariam Kiran.Grouping elephant and mice streams in quick coherent networksclassifying flows.pdf.Gotten to:
2018-05-16.
7. Matthew Ettus. Structure cutoff, inertness, and power usage in multihop-guided ss-cdma remote frameworks. In Radio and Wireless
Conference, 1998.RAWCON 98.1998 IEEE, pages 55– 58.IEEE, 1998.
8. JayavardhanaGubbi, RajkumarBuyya, SlavenMarusic, and MarimuthuPalaniswami. Web of things (iot): A fantasy, basic parts, and future
direction. Future Generation Computer Systems, 29(7):1645 – 1660, 2013.
9. Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan.Vitality beneficial correspondence show for remote
microsensornetworks.In System sciences, 2000. Strategies of the 33rd yearly Hawaii worldwide gathering on, pages 10 – pp. IEEE, 2000
10. Wendi RabinerHeinzelman, Joanna Kulik, and HariBalakrishnan.Versatile shows for information dispersal in remote sensor frameworks.
In Proceedings of the fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom '99, pages 174–
185, New York, NY, USA, 1999. ACM.
11. DC Hoang, R Kumar, and SK Panda. Fleecy c-suggests grouping show for remote sensor frameworks. In Industrial Electronics (ISIE),
2010 IEEE International Symposium on, pages 3477– 3482.IEEE, 2010.
12. Jun Huang, Yu Meng, Xuehong Gong, Yanbing Liu, and QiangDuan. A story association scheme for green trap of things. IEEE Internet of
Things Journal, 1(2):196– 205, 2014.
13. JieJia, Jian Chen, Guiran Chang, and Zhenhua Tan.Vitality capable consideration control in remote sensor frameworks reliant o n multi-
objective innate estimation. PCs and Mathematics with Applications, 57(11):1756 – 1766, 2009. Strategies of the International Conference.
14. Sumit Kumar and Siddhartha Chauhan.A survey on booking estimations for remote sensor systems.Global Journal of Computer
Applications, 20(5), 2011.
15. Andreas Savvides, Chih-Chieh Han, and Mani B. Strivastava.Dynamic fine-grained limitation in extraordinarily delegated frameworks of
sensors. In Proceedings of the seventh Annual International Conference on Mobile Computing and Networking, MobiCom '01, pages 166–
179, New York, NY, USA, 2001. ACM.
16. Curt Schurgers and Mani B Srivastava.Vitality successful directing in remote sensor frameworks. In Military exchanges meeting , 2001.
MILCOM 2001.Interchanges for framework driven exercises: Creating the information compel.IEEE, volume 1, pages 357– 361.IEEE,
2001.
17. Faisal KarimShaikh, SheraliZeadally, and Ernesto Exposito.Empowering progressions for green snare of things. IEEE Systems Jou rnal,
11(2):983– 994, 2017.
18. K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie. Shows for selforganization of a remote sensor mastermind. IEEE Personal
Communications, 7(5):16– 27, Oct 2000.
19. L. Subramanian and R. H. Katz.An building for structure selfconfigurable systems. In 2000 First Annual Workshop on Mobile and Ad Hoc
Networking and Computing. MobiHOC (Cat. No.00EX444), pages 63– 73, 2000.
20. Fan Ye, A. Chen, Songwu Lu, and Lixia Zhang. An adaptable response for least cost sending in immense sensor frameworks. In
Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495), pages 304– 309, 2001.
21. Chunsheng Zhu, Victor CM Leung, Lei Shu, and Edith C-H Ngai.Green web of things for quick world. IEEE Access, 3:2151– 2162, 2015.
22. M Bahrololum and M Khaleghi. Irregularity interference disclosure system using gaussian mix illustrate. In Convergence and Hybrid
Information Technology, 2008.ICCIT'08. Third International Conference on, volume 1,pages 1162– 1167. IEEE, 2008.
23. Xiaohong Sheng, Y-H Hu, and ParameswaranRamanathan. Appropriated molecule channel with gmm infer for different targets
constrainment and following in remote sensor sort out. In Information Processing in Sensor Networks, 2005.IPSN 2005. Fourth
International Symposium on, pages 181– 188. IEEE, 2005.
24. ChhabraAnshuman, VashishthVidushi, and Sharma Deepak Kumar. A feathery reason and delight speculation based adaptable procedu re
for confirming spearheading frameworks against dull hole attacks. Worldwide Journal of Communication Systems, 31(4):e3487. e3 487
IJCS-17-0453.R1.
25. A. Chhabra, V. Vashishth, and D. K. Sharma. A delight theory based secure model against dim hole attacks in quick frameworks. In 2017
51st Annual Conference on Information Sciences and Systems (CISS), pages 1– 6, March 2017.
26. R. Di Pietro, S. Guarino, N.V. Verde, and J. Domingo-Ferrer.Security in remote uniquely designated frameworks 2013 a review.˘
Computer Communications, 51:1 – 20, 2014.
27. A. Chhabra, V. Vashishth, and D. K. Sharma.Seir: A stackelberg redirection based technique for imperativeness careful and helped
coordinating in extremist spearheading frameworks. In 2017 51st Annual Conference on Information Sciences and Systems (CISS), pages
1– 6, March 2017.
28. C. Yu, W. Guo, and G. Chen.Vitality balanced lay arranging subject to atom swarm streamlining in remote sensor organize. In 2012 IEEE
26th International Parallel and Distributed Processing Symposium Workshops PhD Forum, pages 1249– 1255, May 2012.
29. J. Kennedy, "Atom swarm improvement," in Encyclopedia of AI. Springer, 2011, pp. 760– 766.
30. [30] I. F. Akyildiz , Weilian Su , Y. Sankarasubramaniam , E. Cayirci, An outline on sensor frameworks, IEEE Communications
Magazine, v.40 n.8, p.102-114,
31. M. Li, C. Hua, C. Chen, X. Guan, "Application-driven virtual network embedding for industrial wireless sensor networks", 2017 IEEE
International Conference on Communications (ICC) Ad-Hoc and Sensor Networking Sumposium, 21-25 May 2017.
32. R. Rajagopalan , P. K. Varshney, Data-total systems in sensor organizes: an overview, IEEE Communications Surveys and Tutorials, v.8
n.4, p.48-63
33. TossapornSrisooksai , KamolKeamarungsi , PoonlapLamsrichan , Kiyomichi Araki, Practical information pressure in remote sensor
arranges: A study, Journal of Network and Computer Applications, v.35 n.1, p.37-59,
34. V. Katiyar, N. Chand, S. Soni, "Grouping calculations for heterogeneous remote sensor arrange: a study", International Journal of Applied
Engineering Research, Dindigul, Volume 1, No 2, 2010, pp. 273- - 287.
35. F. Alfayez, M. Hammoudeh, A. Abuarqoub, "A Survey on MAC conventions for obligation cycled remote sensor systems", International
Conference on Advanced Wireless Information and Communication Technologies (AWICT 2015), Science Direct, Procedia Computer
Science, Volume 73. 2015, PP: 482- - 489.
36. J. N. Al-Karaki , A. E. Kamal, Routing procedures in remote sensor organizes: a study, IEEE Wireless Communications, v.11 n.6, p.6-28,
37. N. A. Pantazis, S. A. Nikolidakis, D. D. Vergados, "Vitality productive steering conventions in remote sensor organizes: a review", IEEE
Communications Surveys and Tutorials (Volume: 15, Issue: 2), pp. 551- - 591. 2013.
38. Wajgi, N. V. Thakur., "Burden adjusting calculations in remote sensor organize: a review", IRACST - International Journal of Computer
Networks and Wireless Communications ISSN: 2250- - 3501. Vol.2, No 4, August 2012, pp. 456- - 460
39. Faisal B. Hussain , YalcinCebi , Ghalib A. Shah, A multievent blockage control convention for remote sensor systems, EURASIP Journal
on Wireless Communications and Networking,
40. G. A. Shah, M. Bozyiğit, Ö. B. Akan, "Multi-occasion versatile bunching (MEAC) convention for heterogeneous remote sensor systems",
Proc. The MP Fifth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2006), pp. 30- - 37
41. A. V. Sutagundar, S. S.Manvi, "Area mindful occasion driven multipath steering in Wireless Sensor Networks: Agent based
methodology". Egyptian Informatics Journal, Volume 14, Issue 1, March 2013, pp. 55- - 65
42. C. F. García-Hernández, P. H. Ibargüengoytia-González, J. García-Hernández, J. A. Pérez-Díaz, "Remote sensor systems and applications:
an overview". IJCSNS International Journal of Computer Science and Network Security, Vol.7 No.3, March 2007, pp. 264 - - 273
43. MauriKuorilehto , Marko Hännikäinen , Timo D. Hämäläinen, A study of use dispersion in remote sensor systems, EURASIP Journal on
Wireless C[39] Faisal B. Hussain , YalcinCebi , Ghalib A. Shah, A multievent clog control convention for remote sensor systems,
EURASIP Journal on Wireless Communications and Networking,
44. G. A. Shah, M. Bozyiğit, Ö. B. Akan, "Multi-occasion versatile bunching (MEAC) convention for heterogeneous remote sensor systems",
Proc. The MP Fifth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2006), pp. 30- - 37
45. A. V. Sutagundar, S. S.Manvi, "Area mindful occasion driven multipath directing in Wireless Sensor Networks: Agent based
methodology". Egyptian Informatics Journal, Volume 14, Issue 1, March 2013, pp. 55- - 65
46. C. F. García-Hernández, P. H. Ibargüengoytia-González, J. García-Hernández, J. A. Pérez-Díaz, "Remote sensor systems and applications:
a review". IJCSNS International Journal of Computer Science and Network Security, Vol.7 No.3, March 2007, pp. 264 - - 273
47. MauriKuorilehto , Marko Hännikäinen , Timo D. Hämäläinen, A study of use dissemination in remote sensor systems, EURASIP Journal
on Wireless Communications and Networking, v.2005 n.5, p.774-788, October 2005
48. Dongjin Son , BhaskarKrishnamachari , John Heidemann, Experimental investigation of simultaneous transmission in remote sensor
systems, Proceedings of the fourth universal gathering on Embedded organized sensor frameworks, October 31-November 03, 2006
49. J. Rang, Y. Zhang, B. Nath, "Start to finish Channel Capacity Measurement for Congestion Control in Sensor Networks", In Proceedings
of the second International Workshop on Sensor an Actor Network Protocols and Applications (SANPA '04), Boston, MA, USA, 22
August 2004. communications and Networking, v.2005 n.5, p.774-788, October 2005
50. Dongjin Son , BhaskarKrishnamachari , John Heidemann, Experimental investigation of simultaneous transmission in remote senso r
systems, Proceedings of the fourth worldwide gathering on Embedded organized sensor frameworks, October 31-November 03, 2006
51. J. Rang, Y. Zhang, B. Nath, "From beginning to end Channel Capacity Measurement for Congestion Control in Sensor Networks", In
Proceedings of the second International Workshop on Sensor an Actor Network Protocols and Applications (SANPA '04), Boston, M A,
USA, 22 August 2004.
52. M. Radi, B. Dezfouli, K. A. Bakar, M. Lee, "Multipath steering in remote sensor organizes: a review and research difficulties ", Sensors
ISSN 1424-8220, 2012, 12, pp. 650- - 685.
53. M. Masdari, M. Tanabi., "Multipath directing conventions in remote sensor arranges: a review and investigation", International Journal of
Future Generation Communication and Networking, Vol.6, No.6, 2013, pp. 181- - 192.
54. Budhaditya Deb , SudeeptBhatnagar , BadriNath, ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks,
Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks, p.406, October 20-24, 2003
55. M. Cherian, T. R. G. Nair "Multipath Routing with Novel Packet Scheduling Approach in Wireless Sensor Networks", International
Journal of Computer Theory and Engineering 3(5), pp. 666- - 670, 2011
56. T. Cinar and M. BulentOrencik, "A submerged acoustic channel demonstrate utilizing beam following in ns-2," in Proceedings of the 2009
second IFIP Wireless Days (WD 2009), pp. 1– 6
57. M. Ayaz and A. Abdullah, "Submerged remote sensor systems: Routing issues and future difficulties," in Proceedings of seventh
International Conference on Advances in Mobile Computing and Multimedia, pp. 370– 375
58. L. Liu, S. Zhou, and J. H. Cui, “Prospects and problems of wireless communication for underwater sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 8, pp. 977–994, 2008.
59. G. Zaibi, N. Nasri, A. Kacouri, and M. Samet, “Survey of temperature variation effect on underwater acoustic wireless
transmission,” ICGST-CNIR Journal, vol. 9, 2009.
60. Y. Luo, L. Pu, M. Zuba, “Challenges and opportunities of underwater cognitive acoustic networks,” IEEE Transactions on Emerging
Topics in Computing, vol. 2, no. 2, pp. 198–211, 2014.
61. X.- P. Gu, Y. Yang, and R.- L. Hu, "Breaking down the execution of station in Underwater Wireless Sensor Networks(UWSN)," in
Proceedings of the 2011 International Conference on Advanced in Control Engineering and Information Science, CEIS 201 1, pp. 95– 99,
China, August 2011.
62. J. Kong, M. Gerla, and S. Zhou, Challenges: Building Scalable and Distributed Underwater Wireless Sensor Networks (UWSNs) for
Aquatic Applications, 2005.
63. S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic, "Improved bundle measure determination in submerged remote sensor organize
correspondences," IEEE Journal of Oceanic Engineering, vol. 37, no. 3, pp. 1– 337, 2012.
64. S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic, "Streamlining system execution through bundle discontinuity in multi-bounce
submerged correspondences," in Proceedings of the OCEANS'10 IEEE Sydney, OCEANSSYD 2010, pp. 1– 7, Australia, May 2010.
65. S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic, "Picking the parcel estimate in multi-bounce submerged systems," in Proceedings
of the OCEANS'10 IEEE Sydney, OCEANSSYD 2010, pp. 1– 9, Australia, May 2010.
66. M. Ayaz, L. T. Jung, A. Abdullah, and I. Ahmad, "Solid information conveyances utilizing parcel advancement in multi-jump submerged
sensor systems," Journal of King Saud University - Computer and Information Sciences, vol. 24, no. 1, pp. 41– 48, 2012.
67. N. Li, J.-F. Martínez, J. M. M. Chaus, and M. Eckert, “A survey on underwater acoustic sensor network routing protocols,” Sensors, vol.
16, no. 3, p. 414, 2016.
68. M. Faheem, G. Fish, and V. C. Gungor, "QERP: Quality-of-Service (QoS) Aware Evolutionary Routing Protocol for Underwater Wireless
Sensor Networks," IEEE Systems Journal, 2017.
69. C. Zidi, F. Bouabdallah, and R. Boutaba, "Directing structure dodging vitality openings in submerged acoustic sensor systems," Wireless
Communications and Mobile Computing, vol. 16, no. 14, pp. 2035– 2051, 2016.
70. N. Z. Zenia, M. Aseeri, M. R. Ahmed, Z. I. Chowdhury, and M. Shamim Kaiser, "Vitality effectiveness an d dependability in MAC and
directing conventions for submerged remote sensor organize: A review," Journal of Network and Computer Applications, vol. 71, pp. 72–
85, 2016
930. Keyword : Russia, Ukraine, East, orientalism, epistolary heritage, the Islamic world.
5271-
References: 5275
1. Institut rukopisi Natsional'noi biblioteki Ukrainy imeni V.I. Vernadskogo (IR NBUV), fond І, dela 22664–22671 [Pis'ma V.V. Bartol'da –
A. Y. Krymskomu] (Institute of Manuscripts of V.I. Vernadsky National Library of Ukraine, f. I, № 22664–22671 [Letters of V.V.
Bartold to A. Y. Krymsky]).
2. Institut rukopisi Natsional'noi biblioteki Ukrainy imeni V.I. Vernadskogo (IR NBUV), fond XXXVI, delo 194 [Pis'ma V.V. Bartol 'da –
A. Y. Krymskomu] (Institute of Manuscripts of V.I. Vernadsky National Library of Ukraine, f. XXXVI, № 194 [Letter of V.V. Bartold to
A.E. Krymsky]).
3. Institut rukopisi Natsional'noi biblioteki Ukrainy imeni V.I. Vernadskogo (IR NBUV), fond XXXVI, delo 366 [Pis'ma V.V. Bartol 'da –
A. Y. Krymskomu] (Institute of Manuscripts of V.I. Vernadsky National Library of Ukraine, f. XXXVI, № 366 [Letter of N.A. Mednikov
to A. Y. Krymsky]).
4. Sankt-Peterburgskii filial Arkhiva Rossiiskoi akademii nauk (SPb ARAN), fond 68, op. 2, d. 128 [Pis'ma A. Y. Krymskogo – V.V.
Bartol'du] (St. Petersburg Branch of the Archive of the Russian Academy of Sciences, f. 68, inventory 2, № 128 [Letters to A. Y.
Krymsky to V.V. Bartold]).
5. Bartold V.V. “Ani”. Bartold V.V. Sochineniya. T. III. Raboty po istoricheskoi geografii (“Ani”. Bartold V.V. Works. Vol. III. Works on
Historical Geography). Moscow, 1965. Pp. 327-330.
6. Bartold V.V. “Karl Velikii i Kharun ar-Rashid”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i Arabskogo khalifata
(“Charlemagne and Harun al-Rashid”. Bartold V.V. Works. Vol. VI. Works on the History of Islam and the Arab Caliphate). Moscow,
1966. Pp. 342-364.
7. Bartold V.V. “Khalif i sultan”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i Arabskogo khalifata (“The Caliph and the
Sultan”. Bartold V.V. Works. Vol. VI. Works on the History of Islam and the Arab Caliphate). Moscow, 1966. Pp. 15-80.
8. Bartold V.V. “K voprosu o franko-musul'manskikh otnosheniyakh”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i
Arabskogo khalifata (“On the Issue of Franco-Muslim Relations”. Bartold V.V. Works. Vol. VI. Works on the History of Islam and the
Arab Caliphate). Moscow, 1966. Pp. 432-461.
9. Bartold V.V. “Otzyv o trudakh N.Y. Marra po issledovaniyu drevnostei Ani”. Bartold V.V. Sochineniya. T. IV. Raboty po arkheol ogii,
numizmatike, epigrafike i etnografii (“Review of Works of N.Y. Marr on the Study of the Antiquities of Ani”. Bartold V.V. Works. Vol.
IV. Works on Archeology, Numismatics, Epigraphy and Ethnography). Moscow, 1966. Pp. 202-235.
10. Bartold V.V. “Persidskaya nadpis' na stene Aniiskoi mecheti Manuche”. Bartold V.V. Sochineniya. T. IV. Raboty po arkheologii,
numizmatike, epigrafike i etnografii (“A Persian Inscription on the Wall of the Mosque Manuche Ani”. Bartold V.V. Works. Vol. IV.
Works on Archeology, Numismatics, Epigraphy and Ethnography). Moscow, 1966. Pp. 313-338.
11. Bartold V.V. “Teokraticheskaya ideya i svetskaya vlast' v musul'manskom gosudarstve”. Bartold V.V. Sochineniya. T. VI. Raboty po
istorii islama i Arabskogo khalifata (“The Theocratic Idea and Secular Power in the Muslim State”. Bartold V.V. Works. Vol. VI. Works
on the History of Islam and the Arab Caliphate). Moscow, 1966. Pp. 303-319.
12. Bartold V.V.Turkestan v epokhu mongol'skogo nashestviya. Ch. 1. Teksty(Turkestan in the Era of the Mongol Invasion. Part 1. T exts).
St. Petersburg, 1898.Ch. 2.Issledovanie (Part 2. Research). St. Petersburg, 1900.
13. Clouston W.A. Narodni kazky ta vygadky, ikh vandrivky ta pereminy (Popular Tales and Fictions, their Migrations and Transformations).
Transl. from English by A. Y. Krymsky. Lvov, 1896.
14. Khalidov A.B. “Predislovie”. Bartold V.V. Sochineniya. T. VI. Raboty po istorii islama i Arabskogo khalifata (“Preface”. Bartold V.V.
Works. Vol. VI. Works on the History of Islam and the Arab Caliphate). Moscow, 1966. Pp. 5-13.
15. Krymsky A. Y. Istoriya Persii, ee literatury i dervisheskoi teosofii (History of Persia, Its Literature and Dervish Theosophy). Vol. 1. Issue
I. Moscow, 1901.
16. “Perepiska akademikov A. Y. Krymskogo i I.Y. Krachkovskogo 1920–1930-kh godov. (Publikatsiya I.M. Smilyanskoi) “. Neizvestnye
stranitsy otechestvennogo vostokovedeniya (“Correspondence of the Academicians A. Y. Krymsky and I.J. Krachkovsky in the 1920 –
1930s. (Publication of I.M. Smilyanskaya)”. Unknown Pages of the Russian Oriental Studies). Moscow, 1997. Pp. 155-368.
17. Clouston W.A. Popular Tales and Fictions, their Migrations and Transformations. London, 1887.
18. Le Strange, Guy.The Lands of the Eastern Caliphate: Mesopotamia, Persia and Central Asia from the Muslim Conquest to the Time of
Timur. Cambridge, 1905.
Paper Title: Optimization of Load Frequency Control using Nature Inspired Algorithum
Abstract: This paper describes about load frequency control problem in power systems by using multi-verse
optimization algorithm (MVO). This paper compares the controlling of LFC with PID and PID+MVO controllers.
In this paper four area hydrothermal networks was represented.MVO algorithm was introduced in this paper for
tuning the secondary controllers. The concept of MVO is runs on white hole, black hole and warm hole. Inflation
rates of universe can be calculated and implemented in PID. This paper was implemented in simulator
(MATLAB/SIMULINK) software.
Keyword : This paper compares the controlling of LFC with PID and PID+MVO controllers
931.
References:
1. John H (1992) Holland, adaptation in natural and artificial systems. MIT Press, Cambridge.
2. S.K. Sinha Surya Prakash a,∗, ‘Simulation based neuro-fuzzy control hybrid intelligent PI control approach in four-area load 5276-
frequency control of interconnected power system’ Applied Soft Computing 23 (2014) 152–164. 5281
3. V.D.M. Kumar, “Intelligent controllers for automatic generation control,” IEEE Region 10 International Conference on Global
Connectivity in Energy, Computer, Communication and Control, TENCON ‘98, vol. 2, pp. 557-574,
4. Prakash, S., Sinha, S.K.: ‘Simulation based neuro-fuzzy hybrid intelligent PI control approach in four-area load frequency control of
interconnected power system’, Appl. Soft Comput., 2014, 23, pp. 152–164
5. Kennedy J, Particle swarm optimization. In:Proceedings of IEEE international conference on neural net-works, pp 1942–1948.
6. Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179:2235–2248.
7. Saikia, L.C ,Raju, M.,., Sinha, N.: ‘Automatic generation control of a multiarea system using ant lion optimizer algorithm based PID
plus second order derivative controller’, Int. J. Elect. Power Energy Syst., 2016, 80, pp. 52–63
8. Tripathy, S.C., Bhatti, T.S..: ‘automatic generation control analysis with reheat steam turbines and governor dead band effects’, IEEE
Trans. Power Apparatus Syst., 1984, PAS-103, (5), pp. 1045–1051
9. Saxsena, S., Hote, Y.V.: ‘Load frequency control problems through internal model control scheme and model order reduction’, IEEE
Trans. Power Syst., 2013, 28, (3), pp. 2749–2757
10. Duneshfar, F., Bevrani] Daneshfar,, H.: Load frequency control using genetic algorithms’, Electrical. Power Energy Syst., 201 1, 42,
pp. 257–263.
Paper Title: An Efficient Spatial Temporal Provenance Mechanism for Adhoc Mobile Users
Abstract: Location-based services rectangle measures quickly
changing into vastly in different style. Additionally to services supported users' current location, several potential
932. services believe users' currentlocation history, or their spatial-temporal place of origin.Malicious users might idle
their spatial-temporal place of originwhile not a rigorously designed security system for users toprove their past 5282-
locations. during this system, we tends to gift theSpatial-Temporal place of origin Assurance with Mutual Proofs 5285
theme. STAMP is meant for ad-hoc mobile usersgenerating location system proofs for every different in an
exceedinglydistributed settings. However, it will simply accommodate trustyworthy mobile users and wireless
access points. STAMP ensures theintegrity and non-transferability of the placement proofs andprotects users'
privacy. A semi-trusted Certification Authority isemployed to distribute specific keys in addition as guard users
against collusion by a light-weight entropy-based trust analysisapproach. Our image implementation is based on the
Andriod platformshows that STAMP is low cost in terms of procedure and storageresources. Intensive simulation
experiments show that ourentropy-based trust model is in a position to attains high collusion to detects the
accuracy.
Authors: Gopi Battineni, Nalini Chintalapudi, Francesco Amenta, Seyed Khosrow Tayebati
Report on Market Analysis and Preventions Need to Provide Medications for Rural Patients of Italy
Paper Title:
using ICT Technologies
Abstract: Access to healthcare services is critical to good health, yet residents of internal areas face a variety of
access barriers. The obstacles faced by health care providers and patients in rural areas are vastly different from
those in urban areas. This might be caused by economic factors, cultural and social differences, educational
shortcomings, lack of recognition by legislators and the sheer isolation of living in internal areas all conspire to
create health care disparities and impede people living in internal areas in their struggle to lead normal healthy
lives. Italy’s indicators of health system outcomes and quality are consistently good. This is despite levels of health
spending below other high-income countries like Germany, France, and other EU nations. However, Italy is lagging
in some areas, like long-term care and prevention of non-communicable diseases. Based on available analyses,
further progress is called for to promote appropriateness of care, address geographic imbalances in health care use
and prevent the spread of risk factors including chronic diseases and regular health issues. To eradicate these issues,
it is essential to develop a system that will help internal areas patients by using contemporary technologies. The
improved system could assist patients also without the presence in the same place of a doctor that will generate
corresponding prescriptions, which authenticated by physicians will be stored in the database.
933.
5286-
Keyword : Healthcare, Rural area patients, Artificial Intelligence, Pathologies, ICT
5289
References:
1. K. Källander et al., “Mobile health (mhealth) approaches and lessons for increased performance and retention of community health
workers in lowand middle-income countries: A review,” Journal of Medical Internet Research. 2013.
2. G. Messina, F. Vencia, S. Mecheroni, S. Dionisi, L. Baragatti, and N. Nante, “Factors affecting patient satisfaction with emergency
department care: an Italian rural hospital,” Glob. J. Health Sci., 2015.
3. R. Papp et al., “Perceptions of quality in primary health care: Perspectives of patients and professionals based on focus group discussions,”
BMC Fam. Pract., 2014.
4. J. Gómez, B. Oviedo, and E. Zhuma, “Patient Monitoring System Based on Internet of Things,” in Procedia Computer Science, 2016.
5. J. P. Mackenbach et al., “Socioeconomic inequalities in health in 22 European countries,” N. Engl. J. Med., 2008.
6. S. Allender, P. Scarborough, V. Peto, and M. Rayner, “European cardiovascular disease statistics 2008 edition,” Health Econ., 2008.
7. World Health Organisation, “Status Report on Alcohol and Health in 35 European Countries,” Who, 2013.
8. V. Torchilin, “Tumor delivery of macromolecular drugs based on the EPR effect,” Advanced Drug Delivery Reviews. 2011.
9. T. Peregrin, “Personal and Electronic Health Records: Sharing Nutrition Information across the Health Care Community,” J. Am. Diet.
Assoc., 2009.
10. A. G. Hirsch et al., “The electronic health record audit file: The patient is waiting,” J. Am. Med. Informatics Assoc., 2017.
11. S. K. Mishra, L. Kapoor, and I. P. Singh, “Telemedicine in India: Current Scenario and the Future,” Telemed. e-Health, 2009.
12. R. M. Warner, C. Bastianpillai, B. W. Lamb, N. Sevdalis, and J. S. A. Green, “Health services research,” J. Clin. Urol., 2018.
Authors: Mohammad Dehghani, Zeinab Montazeri, Om Parkash Malik, Gaurav Dhiman, Vijay Kumar
Keyword : Binary, Binary Orientation Search Algorithm Orientation Search, optimization. Retrieval Number:
Retrieval Number
References:
1. M. DEHGHANI, Z. MONTAZERI, and O. P. MALIK, "DGO: Dice Game Optimizer," Gazi University Journal of Science, vol. 32,
pp. 871-882, 2019.
2. M. Dehghani, Z. Montazeri, and O. Malik, "Energy commitment: a planning of energy carrier based on energy consumption,"
935. Электротехника и электромеханика, 2019.
3. Z. Montazeri and T. Niknam, "OPTIMAL UTILIZATION OF ELECTRICAL ENERGY FROM POWER PLANTS BASED ON
FINAL ENERGY CONSUMPTION USING GRAVITATIONAL SEARCH ALGORITHM," 2018, p. 4, 2018-08-17 2018. 5306-
4. S. Dehbozorgi, A. Ehsanifar, Z. Montazeri, M. Dehghani, and A. Seifi, "Line loss reduction and voltage profile improvement in 5310
radial distribution networks using battery energy storage system," in 2017 IEEE 4th International Conference on Knowledge-Based
Engineering and Innovation (KBEI), 2017, pp. 0215-0219.
5. M. Dehghani, M. Mardaneh, Z. Montazeri, A. Ehsanifar, M. Ebadi, and O. Grechko, "Spring search algorithm for simultaneous
placement of distributed generation and capacitors," Электротехника и электромеханика, 2018.
6. M. Dehghani, Z. Montazeri, A. Ehsanifar, A. Seifi, M. Ebadi, and O. Grechko, "Planning of energy carriers based on final energy
consumption using dynamic programming and particle swarm optimization," Электротехника и электромеханика, 2018.
7. Z. Montazeri and T. Niknam, "Energy carriers management based on energy consumption," in Knowledge-Based Engineering and
Innovation (KBEI), 2017 IEEE 4th International Conference on, 2017, pp. 0539-0543.
8. S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, "Optimization by simulated annealing," science, vol. 220, pp. 671-680, 1983.
9. M. Dehghani, Z. Montazeri, A. Dehghani, N. Nouri, and A. Seifi, "BSSA: Binary spring search algorithm," in Knowledge-Based
Engineering and Innovation (KBEI), 2017 IEEE 4th International Conference on, 2017, pp. 0220-0224.
10. M. Dehghani, Z. Montazeri, A. Dehghani, and A. Seifi, "Spring search algorithm: A new meta-heuristic optimization algorithm
inspired by Hooke's law," in Knowledge-Based Engineering and Innovation (KBEI), 2017 IEEE 4th International Conference on,
2017, pp. 0210-0214.
11. M. Dehghani, M. Mardaneh, and O. Malik, "FOA:‘Following’Optimization Algorithm for solving Power engineering optimization
problems," Journal of Operation and Automation in Power Engineering, 2019.
12. M. Dehghani, M. Mardaneh, O. P. Malik, and S. M. NouraeiPour, "DTO: Donkey Theorem Optimization," in 2019 27th Iranian
Conference on Electrical Engineering (ICEE), 2019, pp. 1855-1859.
13. M. Dehghani, Z. Montazeri, O. P. Malik, A. Ehsanifar, and A. Dehghani, "OSA: Orientation Search Algorithm," International
Journal of Industrial Electronics, Control and Optimization, pp. -, 2018.
Paper Title: Thermal Performance of Plastic Bottles Walls Reused in Building Construction for Waste Reduction
Abstract: The research aims at studying the potential of reusing plastic water bottles as a building material and
an alternative to traditional bricks, in a way that can minimize waste and hence reduce ecological imbalance.
The research compares the energy performance of building with traditional bricks and building with plastic bottle
blocks.
The researchers built digitally two sample rooms: (3 meter width*3 meter length*3 meter Height) with both
936.
materials, Then they took on-site measurements for energy performance of the rooms.
The rooms were built on DesignBuilder software in order to help in environmental analysis of buildings, and 5311-
compare the efficiency of the two materials of sample rooms. 5315
Results showed that building with plastic water bottles has some environmental benefits other than reuse of a
material that hardly decomposes. It has its effects on energy saving and thermal comfort. Further research and
experiments is encouraged as the plastic residue dilemma grows more in modern societies and affects the ecological
balance and wild life.
Keyword : Environmentally friendly, Plastic Bottles, Reuse, Thermal Comfort.
References:
1. The data collection method involved sorting and weighing the wastes from one house consecutively for seven days, observations, and
interview with the chief of waste collection and environmental services in the company for the reconstruction and tourism
development. “ Municipal Waste Management in Egypt: An Investigation Study of Collection and Generation Process in Alexandria
City, Egypt”.
2. El Gazzar R. et al., “Municipal Waste Management in Egypt: An Investigation Study of Collection and Generation Process in
Alexandria City, Egypt”, International Journal of Scientific and Engineering Research 5(6):3, July 2014.
3. Hoornweg D. et al., What a Waste - A Global Review of Solid Waste Management”, Urban Development Series, Knowledge Papers,
No. 15, The World Bank, March 2012.
4. New center for Integrated studies of Land & Environment (NILE) , “Annual Report for solid waste management in Egypt”, Ministry
of State for Environmental Affairs, 2013.
5. Shoubi M., “Investigating the Application of Plastic Bottle as a Sustainable Material in the Building Construction”, January 2013.
6. Rawat A. et al., “PET Bottles as Sustainable Building Material: A Step Towards Green Building Construction”, August 2014.
7. Sajane A. et al., “Construction of houses using plastic bottles”, International Journal of Engineering Technology Science and
Research, ISSN 2394 – 3386, Volume 4, Issue 4, April 2017.
8. Patela P. et al., “Waste plastic bottles offering innovative building materials with sustainable application”, International Journal of
Innovative and Emerging Research in Engineering, Volume 3, Issue 3, 2016.
9. ASHRAE. (2010). ASHRAE Standard 55-2010 - Thermal Environmental Conditions for Human Occupancy. 1791 Tullie Circle NE,
Atlanta, GA 30329.
10. DesignBuilder. (n.d.). Output Options. Retrieved June 11, 2019,from
https://designbuilder.co.uk/helpv4.7/Content/Output_Options.htm
11. Polyethylene terephthalate - Material information. (n.d.). Retrieved May 15, 2019, from http://www.goodfellow.com/E/Polyethylene-
terephthalate.html
12. The Berkey. (n.d.). What numbers of plastic are safe for water bottles. The Numbers Behind Water Bottles. Retrieved from
https://theberkey.com/blogs/water-filter/what-numbers-of-plastic-for-water-bottles-are-safe-for-you-the-numbers-behind-plastic-
bottles.
Keyword : Internet of things; IOT; Reduced electricity consumption; Saving the cost and resources; Smart cities;
Wireless connection
References:
Authors: Uma Hombal, Dayananda R.B.
Paper Title: Secure and Optimized Data Sharing Model Group in Healthcare Cloud Environment
Abstract: The cloud computing provides convenient on-demand access of the data. Sharing of data in the cloud
computing will enable several users to easily handle the data that is being shared. The medical-field finds more
advantages by the cloud-computing technology as the data can be accessed anywhere and anytime by the patients
as well as this data can be shared with other medical-practitioners. This alarms for the security issues as the huge
amount of sensitive data is being shared. The data must not be available to malicious-attackers. In this paper, we
propose the block-design based key agreement protocol in order to share the data securely and the design provides
fault-detection and fault-tolerance. The group-data model PSM is given with the block-based design, which decides
how the sharing of the data is done by grouping and giving positions to users in particular blocks and the column.
938. The (np,i+1,1) design is proposed in our paper, which gives the technique for positioning of the users. The
encryption and decryption of data is done and their times cost according to file size is found. The comparison of the 5320-
time-cost for our model and existing models is compared with respect to different number of simulations. 5326
Keyword : Dynamic Wireless Mesh Network, Residual Energy, Sink Nodes, Priority Based Interference Aware
Bandwidth Reservation, Interference Aware Bandwidth Reservation
References:
1. I. F. Akyildiz and X. Wang, “A survey on wireless mesh networks,” IEEE Commun. Mag., vol. 43, no. 9, pp. 23 –30, Sept. 2005.
2. D. Benyamina, A. Hafid, and M. Gendreau, “Wireless mesh networks design–a survey,” IEEE Commun. Surveys & Tutorials, vol. 14, no.
2, pp. 299–310, 2nd Quarter 2012.
3. Mathonsi, Topside E, and Okuthe P. Kogeda. "Enhanced Bandwidth Sharing Scheme for Small and Medium Enterprises." Proceedings of
the World Congress on Engineering and Computer Science. Vol. 2. 2014.
4. A. P. Subramanian, H. Gupta, S. R. Das, and J. Cao, “Minimum interference channel assignment in multiradio wireless mesh netw orks,”
IEEE Trans. Mobile Comput., vol. 7, no. 12, pp. 1459–1473, Dec. 2008.
5. A. Capone, G. Carello, I. Filippini, S. Gualandi, and F. Malucelli, “Routing, scheduling and channel assignment in wireless m esh
networks: Optimization models and algorithms,” Ad Hoc Networks, vol. 8, no. 6, pp. 545–563, Aug. 2010.
6. D. Passos and C. V. N. Albuquerque, “A joint approach to routing metrics and rate adaptation in wireless mesh networks,” IEEE /ACM
Trans. Networking, vol. 20, no. 4, pp. 999–1009, Aug. 2012.
7. D. Gupta, P. Mohapatra, C. Chuah, Seeker “A Bandwidth-Based Association Control Framework For Wireless Mesh Networks”, Wireless
Networks (2011).
8. Ko, Bong-Jun, et al. "Distributed Channel Assignment in multi-radio 802.11 mesh networks." Wireless Communications and Networking
Conference, WCNC (2007).
9. Tu, Xiaoyu, Hai Wang and Zhimin Li. "Channel Vector: An overhead reduced broadcast in Multichannel Wireless Mesh Networks.
"Communications (ICC), 2015 IEEE International Conference on. IEEE, 2015.
10. Bakhshi, Bahador, SiavashKhorsandi, and Antonio Capone. "On-line joint QoS routing and channel assignment in multi-channel multi-
radio wireless mesh networks." Computer Communications 34.11, (2011).
11. Kaan Bur and CemErsoy, “Ad hoc quality of service multicast routing”, Computer Communications, Volume 29 , Issue 1, 2005.
12. Bosheng Zhou, Alan Marshall and Tsung-Han Lee, “A CrossLayer Architecture for DiffServ in Mobile Ad-hoc Networks”, International
Conference on Wireless Networks, Communications and Mobile Computing, WIRELESSCOM, 2005.
13. Bo Wang and Matt Mutka, “QoS-aware fair rate allocation in wireless mesh networks”, Elsevier, Computer Communications 31, 2008
14. Gahng-SeopAhn, Andrew T. Campbell, AndrasVeres and Li-Hsiang Sun, “SWAN: Service Differentiation in Stateless Wireless Ad Hoc
Networks”, In the Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM,
2002.
15. Ko, Bong-Jun, et al. "Distributed Channel Assignment in multi-radio 802.11 mesh networks." Wireless Communications and Networking
Conference, WCNC (2007).
16. Y. Song, C. Zhang, and Y. Fang, “Joint channel and power allocation in wireless mesh networks: A game theoretical perspective ,” IEEE J.
Select. Areas Commun., vol. 26, no. 7, pp. 1149–1159, Sept. 2008.
17. J. Luo, C. Rosenberg, and A. Girard, “Engineering wireless mesh networks: Joint scheduling, routing, power control, and rate adaptation,”
IEEE/ACM Trans. Networking, vol. 18, no. 5, pp. 1387– 1400, Oct. 2010.
18. L. X. Cai, Y. Liu, T. H. Luan, X. S. Shen, J. W. Mark, and H. V. Poor, “Adaptive resource management in sustainable energy powered
wireless mesh networks,” in Proc. IEEE GLOBECOM’11, Houston, TX, USA, Dec. 5–9 2011, pp. 1–5.
19. L. Lin, N. B. Shroff, and R. Srikant, “Asymptotically optimal energy-aware routing for multihop wireless networks with renewable energy
sources,” IEEE/ACM Trans. Networking, vol. 15, no. 5, pp. 1021–1034, Oct. 2007.
20. [20] J. Tang, G. Xue, and W. Zhang, “Maximum throughput and fair bandwidth allocation in multi-channel wireless mesh networks,” in
Proc. IEEE INFOCOM’06, Barcelona, Spain, Apr. 23–29 2006, pp. 1–10.
Paper Title: Content Based Image Retrieval based on Domain Knowledge Acquisition
Abstract: Enormous growth has been noted in digital technology over the years and this has led to massive
growth in data mainly images and videos, hence with the volume of the data has also increased. Moreover,
searching and retrieval of the accurate image from the huge dataset has become eminent as well as one of the
challenging issue. In order to solve mainly two technique were used i.e. based on text and content. Moreover,
content based is technique that is more efficient. In past several technique were used but they lack from the
efficiency. Hence, in this paper we have proposed a methodology based named as DKA (Domain Knowledge
Acquisition), DKA focuses on two main goals first is learning the similarities across the varied domain and other is
learning on complex objects. The main advantage of DKA is the whether the object is whether from same domain
or the other the retrieval process is very smooth. Moreover In order to evaluate the performance we have retrieved
the top 5 response of query image and later it is compared with the several state-of-art technique and the existing
method based on the precision parameter.
941.
5336-
Keyword : CBIR, DKA, Image retrieval 5349
References:
1. S. Li, S. Chen, S. Su, D. Duh and S. Li, "Graphics/Image Retrieval Method," 2011 International Conference on Technologies and
Applications of Artificial Intelligence, Chung-Li, 2011, pp. 19-24.
2. P. Wilkins, P. Ferguson, A. F. Smeaton and C. Gurrin, "Text based approaches for content-based image retrieval on large image
collections," The 2nd European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, 2005. EWIMT
2005. (Ref. No. 2005/11099), London, 2005, pp. 281-288.
3. Long F., Zhang H., Feng D.D. (2003) Fundamentals of Content-Based Image Retrieval. In: Feng D.D., Siu WC., Zhang HJ. (eds)
Multimedia Information Retrieval and Management. Signals and Communication Technology. Springer, Berlin, Heidelberg.
4. G. Schaefer, "An introduction to content-based image retrieval," Eighth International Conference on Digital Information Management
(ICDIM 2013), Islamabad, 2013, pp. 4-6.
5. P. S. Hiremath and J. Pujari, "Content Based Image Retrieval Using Color, Texture and Shape Features," 15th International Conference on
Advanced Computing and Communications (ADCOM 2007), Guwahati, Assam, 2007, pp. 780-784.
6. Lingaraj, Haldurai. (2015). Parallel Indexing on Color and Texture Feature Extraction using R-Tree for Content Based Image Retrieval.
International Journal of Computer Sciences and Engineering. 3. 11-15.
7. Joseph, T., Cardenas, A. F., “PICQUERY: A High Level Query Language for Pictorial Database Management”,May 1988 , vol. 14
no. 5, pp. 630-638 .
8. Eden, M., Unser, M., “Multiresolution feature extraction and selection for texture segmentation”, IEEE Transactions, Jul
1989, Volume : 11 Issue : 7, 717 to 728
9. M. Mohammadpour and S. Mozaffari, "A method for Content-Based Image Retrieval using visual attention model," 2015 7th Conference
on Information and Knowledge Technology (IKT), Urmia, 2015, pp. 1-5.
10. Figueiredo, M.A.T.,Hong-Jiang Zhang, Jain, A.K., Vailaya, A., “Image classification for content-based indexing “,IEEE
Transactions, 2001.
11. Wei Song, Yubing Zhang, Fei Liu, Zhilei Chai, Feng Ding, Xuezhong Qian, Soon Cheol Park,Taking advantage of multi-regions-based
diagonal texture structure descriptor for image retrieval,Expert Systems with Applications,Volume 96,2018,Pages 347-357,ISSN 0957-
4174.
12. Ghebreab, S., Jaffe, C.C., Smeulders, A.W.M., ”Population-based incremental interactive concept learning for image retrieval by
stochastic string segmentations”, IEEE Transactions , 2004.
13. S. -. Chen, S. H. Rubin, M. -. Shyu and C. Zhang, "A Dynamic User Concept Pattern Learning Framework for Content-Based Image
Retrieval," in IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 36, no. 6, pp. 772-783, Nov.
2006.
14. Lin Feng, Jun Wu, Shenglan Liu, Hongwei Zhang,Global Correlation Descriptor: A novel image representation for image retrieval,Journal
of Visual Communication and Image Representation,
a. Volume 33,2015,Pages 104-114,ISSN 1047-3203.
15. W. Jiang, G. Er, Q. Dai and J. Gu, “Similarity‐Based Online Feature Selection in Content‐ Based Image Retrieval”, IEEE
Trans. on Image Processing, vol. 15, no. 3, pp. 101‐104, March 2006.
16. Mutasem K. Alsmadi, Query-sensitive similarity measure for content-based image retrieval using meta-heuristic algorithm,Journal of King
Saud University - Computer and Information Sciences,Volume 30, Issue 3,2018,Pages 373-381.
17. Basak, J., Bhattacharya, K., Chaudhury, S., “Multiple Exemplar-Based Facial Image Retrieval Using Independent
Component Analysis”, IEEE Transactions, Dec 2006.
18. Chai J. Y., C. Zhang, R. Jin, “An Empirical Investigation of User Term Feedback in Textbased Targeted Image Search”,
ACM Transaction, Inform. Systems, Vol. 25, 2007, No 1.
19. Ye, L., Zang, J., “Content Based Image Retrieval Using Unclean Positive Examples”, Image
a. Processing, IEEE Transactions, Oct 2009.
20. Davis, L.S., Zhe Lin, “ Document Title : Shape-Based Human Detection and Segmentation via Hierarchical Part-Template
Matching”, Pattern Analysis and Machine Intelligence, IEEE Transactions, Apr 2010.
21. Abbadeni, N., “Computational Perceptual Features for Texture Representation and Retrieval”, IEEE Transactions, Jan 2011.
22. Dacheng Tao_3;Dongquan Liu_2;Hock Soon Seah_4;Jun Yu, “ On Combining Multiple Features for Cartoon Character
Retrieval and Clip Synthesis”, IEEE Transactions, Oct 2012.
23. G.-H. Liu, L. Zhang, Y.-K. Hou, Z.-Y. Li, and J.-Y. Yang, ``Image retrieval based on multi-texton histogram,'' Pattern Recognit., vol. 43,
pp. 2380-2389, Jul. 2010.
24. G.-H. Liu, Z.-Y. Li, L. Zhang, and Y. Xu, ``Image retrieval based on microstructure descriptor,'' Pattern Recognit., vol. 44, no. 9, pp. 21 23-
2133,2011.
25. G.-H. Liu and J.-Y. Yang, ``Content-based image retrieval using color difference histogram,'' Pattern Recognit., vol. 46, pp. 188-198, Jan.
2013.
26. X. Wang and Z. Wang, ``A novel method for image retrieval based on structure elements' descriptor,'' J. Vis. Commun. Image Represent.,
vol. 24, pp. 63-74, Jan. 2013.
27. L. Feng, J. Wu, S. Liu, and H. Zhang, ``Global correlation descriptor:A novel image representation for image retrieval,'' J. Vis. Commun.
Image Represent., vol. 33, pp. 104-114, Nov. 2015.
28. M. Subrahmanyam, Q. M. J. Wu, R. P. Maheshwari, and R. Balasubramanian, ‘‘Modified color motif co -occurrence
matrix for image indexing and retrieval,’’ Comput. Elect. Eng., vol. 39, no. 3,pp. 762–774, 2013.
29. A. Raza, H. Dawood, H. Dawood, S. Shabbir, R. Mehboob and A. Banjar, "Correlated Primary Visual Texton Histogram Features for
Content Base Image Retrieval," in IEEE Access, vol. 6, pp. 46595-46616, 2018.
Paper Title: Knowledge based Medical Decision Support System using Data Mining
Abstract: 0Medical0 0Decision0 0Support0 0System0 (0MDSS0)[7] is a system where information 0of0 the
patient for1promising1diagnostic and1treatment paths are depicted. It can1be developed either1as the system
for1Knowledge base or the system for1Learning base[2]. Knowledge-based systems[3] are the mappings which
0are0 0human0-0engineered0 0from0 the 0best0 0medical0 0practices0 0and0 0patient0 0data0
0recommendations0 [1]. The mapping is derived by Learning-based systems using various techniques of data
mining, machine learning.. 0Knowledge0-0based0 0and0 0Learning0-0based0 0systems0 are integrated 0to0
0provide0 a powerful 0solution0 0to0 0the0 0information0 0challenge 0in0 0the0 0existence0 0of0 incomplete
facts. This work designs a framework and implements 0an0 ontological representation for 0Integrated0 Medical
0Decision0 0Support0 0System0 which assists Medical Professionals in making clinical decisions for drug
prescription. It employs Knowledge base system for drug prescription 0to0 0the0 0patients. If0 0the0 0available0
0data0 0is0 0incomplete, 0it0 uses concept of 0machine0 0learning0 to produce solution for the given 0query0 [5].
942. 0It0 0is0 best suited 0for0 0different0 0healthcare0 environment 0and0 0many0 0different0 0users0 including
physicians, nurses and other staff who serve in medical field. The skeleton is 0query0-0based0 which 0can0 0be0 5350-
adjusted 0for0 0use0 0with0 0many0 0different0 interfaces on the user-end 0including0 0Desktop, 0Web-based0 5355
browsers and Mobile 0applications.
Paper Title: Health Monitoring using Edge Cognitive Computing Based Smart Health Care
Abstract: With an enhancement in technology and development of sensors, they have decided to concern the
latest technology in particular areas to increases the Quality of their life. One of the important section of research
that has seen an agreement of the latest technology is the healthcare. the people who need healthcare services they
have to suffer for long process, to reduce the problem As a result, basically this complete technology would try to
resole the healthcare issues.
The main goal of the project is to develop a remote healthcare system. It have three main parts. The first and
most important section in this process is to detecting the patient current health status using this sensors.
second important thing is sending data to cloud storage and the last section is to get the detected data for remote
viewing. Remote viewing of the data provided to the doctor will able to monitor a patients health progress aboard
from hospital places.
The Edge-Cognitive- Computing-based (ECC-based) smart healthcare system. This technology is able to check also
distinguish and detect the current status of patient using this sensors. It also accommodate the computing resource
appropriation of the complete edge computing network expansive to the health different percentage of each user.
The experiments show that the ECC-based healthcare system provide a exceed user background and try to
improvement the computing resources moderately, as well as consequentially improving in the durability rates of
943. patients in emergency.
5356-
Keyword : Cognitive computing, Edge computing, Health care 5361
References:
1. The Internet of Things in healthcare: an overview https://scholar.google.com/citations?userY4opLB8AAAA
2. Envisioning inclusive futures: technologybased assistive sensory and action substitution
https://www.infona.pl/resource/bwmeta1.element.elsevie 3d45bfddfe55- 359f-84e4-674a21cae024
3. A multiple communication standards compatible IoT system for medical usage http://ieeexplore.ieee.org/document/6577775/?reload=true
4. Ubiquitous data accessing method in IoT-based information system for emergency medical services
https://www.deepdyve.com/lp/institute-ofelectrical- and-electronics- engineers/ubiquitous-data-accessing-methodin-iot-based-information-
system-for- YCZzyY5W9g
5. Implementation of a medical support system considering P2P and IoT technologies
https://www.computer.org/csdl/proceedings/cisis/2014/4325/00/4325a101- abs.html
6. Acquisition and management of biomedical data using Internet of Things concepts http://ieeexplore.ieee.org/document/7050625/ Real time
internet application with distributed ow environment for medical Io
https://csdl.computer.org/csdl/proceedings/icgciot/2015/7910/00/07380578-abs.html
7. Secure end-to-end communication for constrained devices in IoT-enabled am- bient assisted living systems
https://www.computer.org/csdl/proceedings/wfiot/ 2015/0366/00/07389141-abs.html
8. S. Iyengar, F. T. Bonda, R. Gravina, A. Guerrieri, G. Fortino, A. Sangiovanni- Vincen- telli, A framework for creating healthcare
monitoring applications using wireless body sensor networks, in: Proceedings of the ICST 3rd international conference on Body area
networks, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008, p. 8.
9. M. Chen, S. Gonzalez, A. Vasilakos, et al. Body area networks: A survey. Mobile networks and applications, 2011, 16(2): 171 -193.
Paper Title: Cell-Free DNA Pattern Identification and its Classification using Convolution Neural Network
944. Abstract: Circulating cell DNA (cfDNA) design identification assumes a cardinal job in fetal drug,
transplantation and oncology. Be that as it may, it has additionally demonstrated to be a biomarker for different
5362-
maladies. There are numerous order strategies by which the acknowledgment and arrangement should be possible. 5364
So as to have a superior time unpredictability and improve the precision further, this strategy targets distinguishing
and arranging the general DNA examples and ailments related with them utilizing cfDNA Images in a Convolution
Neural Network. A probabilistic method is used for cfDNA image feature extraction, fragmentation and
interpretation. Graphical User Interface is the platform where this method is employed since it uses visual
indicators in place of text-based interface. The aftereffects of this test demonstrate that the Convolution Neural
Network calculation can perceive cfDNA successions accurately and successfully with no dubiety. Prepared with
examples, the CNN can effectively characterize the picture surrendered to coordinated and unparalleled examples
with numerical highlights.
Keyword : cfDNA, Convolution Neural Network, Graphical User Interface, GLCM feature extraction,
Bioinformatics.
References:
1. Z. Xizhi, "The Application of Wavelet Transform in Digital Image Processing," 2008 International Conference on MultiMedia and
Information Technology, Three Gorges, (2008), pp. 326-329. doi:10.1109/MMIT.2008.134
2. Sriram KB, Relan V, Clarke BE, Duhig EE, Windsor MN, Matar KS, et al. (2012). “Pleural fluid cell-free DNA integrity index to
identify cytologically negative malignant pleural effusions including mesotheliomas”. BMC Cancer12:428.
3. Liimatainen SP, Jylhv J, Raitanen J, Peltola JT, Hurme MA. (2013). “The concentration of cell-free DNA in focal epilepsy”. Epilepsy
Res 105(3):292-8.
4. Chen, Shifu& Liu, Ming & Zhang, Xiaoni& Long, Renwen& Wang, Yixing& Han, Yue& Zhang, Shiwei&Xu, Mingyan&Gu, Jia.
(2017). “A Study of Cell-free DNA Fragmentation Pattern and Its Application in DNA Sample Type Classification”.IEEE/ACM
Transactions on Computational Biology and Bioinformatics. PP. 1-1. 10.1109/TCBB.2017.2723388.
5. Khier S, LohanL. “Kinetics of circulating cell-free DNA for biomedical applications: critical appraisal of the literature”. Future Sci
OA. 2018;4(4):FSO295. Published 2018 Feb23.doi:10.4155/fsoa-2017-014.
Paper Title: Decision Tree-based Machine Learning Algorithms to Classify Rice Plant Diseases
Abstract: Rice is one of the most important foods on earth for human beings. India and China are two countries
in the world mostly depend on rice. The output of this crop depends on the many parameters such as soil, water
supply, pesticides used, time duration, and infected diseases. Rice Plant Disease (RPD) is one of the important
factors that decrease the quantity and quality of rice. Identifying the type of rice plant disease and taking corrective
action against the disease in time is always challenging for the farmers. Although the rice plant is affected by many
diseases, Bacterial Leaf Blight (BLB), Brown Spot (BS), and Leaf Smut (LS) are major diseases. Identification of
this disease is really challenging because the infected leaf has to be processed by the human eye. So in this paper,
we focused on machine learning techniques to identify and classify the RPD. We have collected infected rice plant
data from the UCI Machine Learning repository. The data set consists of 120 images of infected rice plants in
which 40 images are BLB, 40 are BS, and 40 are LS. Experiments are conducted using Decision tree-based
machine learning algorithms such as RandomForest, REPTree, and J48. In order to extract the numerical features
from the infected images, we have used ColourLayoutFilter supported by WEKA. Experimental analysis is done
using 65% data for training and 35% data for testing. The experiments unfold that the Random Forest algorithm is
exceptional in predicting RPD.
945.
Keyword : Rice plant disease, J48, Machine Learning, Classification.
5365-
References: 5368
1. J. P. Shah, H. B. Prajapati, and V. K. Dabhi, “A survey on detection and classification of rice plant diseases,” 2016 IEEE
International Conference on Current Trends in Advanced Computing of Rice Leaf Diseases Based on Morphological Changes,"
International Journal of Information and Electronics Engineering, vol. 2, pp. 460-463, May 2012(ICCTAC), 2016.
2. S. Phadikar, J. Sil, and A. K. Das, "Classification of Rice Leaf Diseases Based on Morphological Changes," International Journal of
Information and Electronics Engineering, vol. 2, pp. 460-463, May 2012.
3. H. B. Prajapati, J. P. Shah, and V. K. Dabhi, “Detection and classification of rice plant diseases,” Intelligent Decision Technologies,
vol. 11, no. 3, pp. 357–373, 2017.
4. M. S. T. Kumbhare, “Detection and Classification of Diseases on Rice and Sugarcane: A Review,” International Journal for
Research in Applied Science and Engineering Technology, vol. 7, no. 4, pp. 2927–2929, 2019.
5. J. W. Orillo, T. M. Amado, N. M. Arago, and E. Fernandez, “Rice Plant Disease Identification And Detection Technology Through
Classification Of Microorganisms Using Fuzzy Neural Network,” Jurnal Teknologi, vol. 78, no. 5-8, 2016.
6. V. K. Shrivastava, M. K. Pradhan, S. Minz, and M. P. Thakur, “Rice Plant Disease Classification Using Transfer Learning Of Deep
Convolution Neural Network,” ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information
Sciences, vol. XLII-3/W6, pp. 631–635, 2019.
7. H. B. Prajapati, J. P. Shah, and V. K. Dabhi, “Detection and classification of rice plant diseases,” Intelligent Decision Technologies,
pp. 1–18, 2018.
8. M.A. Kahar, S. Mutalib, A. Rahman, "Early Detection and Classification of Paddy Diseases with Neural Networks and Fuzzy
Logic", Recent Advances in Mathematical and Computational Methods, pp. 248-257.
9. C.K.Charliepaul, "classification of rice plant leaf using feature matching", International Journal On Engineering Technology and
Sciences vol. 1, pp. 290-295, 2014.
Keyword : About four key words or phrases in alphabetical order, separated by commas.
References:
1. Marius-Constantin O.S. Popescu and Nikos E. Mastorakis, “The use of MIMO technologies in wireless communication networks”,
3rd International Conference on Communication and Information Technology, pp. 139-145.
2. J. Mietzner, R. Schober, L. Lampe, W. H. Gerstacker, and P. A. Hoeher, “Multiple-antenna techniques for wireless
communications—A comprehensive literature survey,” IEEE Commun. Surv. Tuts., vol. 11, no. 2, pp. 87–105, Jun. 2009.
3. S. Sugiura, S. Chen, and L. Hanzo, “A universal space-time architecture formultiple-antenna aided systems,” IEEE Commun. Surv.
Tuts., vol. 14, no. 2, pp. 401–420, Jan. 2012.
4. A. Chockalingam and B. S. Rajan, Large MIMO Systems. Cambridge,U.K.: Cambridge Univ. Press, 2014.
5. Thomas L Marzetta, “Non cooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas” IEEE Trans. Comm.,
vol. 9, no. 11, pp.3590– 3600, November 2010.
6. Heshani Gamage, NandanaRajatheva and Matti Latva-aho, “Performance and PAPR Analysis of Single-Carrier Massive MIMO
Systems with Channel Imperfections”, Vehicular Technology Conference (VTC-Fall), 2017.
7. F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE
Commun. Mag., vol. 52, no. 2, pp. 74–80, Feb. 2014.
8. E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next-generation wireless systems,” IEEE Commun.
Mag., vol. 52, no. 2, pp. 186–195, Feb. 2014.
9. Ping Yang, Yue Xiao and Yong Liang Guan, “Single-Carrier SM-MIMO: A Promising Design for Broadband Large-Scale Antenna
Systems”, IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 1687-1716, Feb. 2016.
10. Sven Jacobsson, Giuseppe Durisi, Mikael Coldrey and Christoph Studer, “Massive MU-MIMO-OFDM Downlink with One-Bit
DACs and Linear Precoding”, IEEE Global Communications Conference, Dec. 2017.
11. Stefano Buzzi, Carmen D’Andrea, Tommaso Foggi, Alessandro Ugolini and Giulio Colavolpe, “Single-Carrier Modulation versus
OFDM for Millimeter-Wave Wireless MIMO”, in IEEE Transaction on Communications, vol.66, no. 3, pp. 1335-1348, Nov. 2017.
12. Sajjad Ali, Zhe Chen and Fuliang Yin, “Eradication of pilot contamination and zero-forcing precoding in the multi-cell TDD massive
MIMO systems”, IET Communications, vol.11, no. 13, pp. 2017-2034, Oct. 2017.
13. Jubin Jose, Alexei Ashikhmin, Thomas L. Marzetta and Sriram Vishwanath, “Pilot Contamination and Precoding in Multi-Cell TDD
Systems”, IEEE Transactions on Wireless Communications, vol. 10, no. 8, Aug. 2011.
14. AntoniosPitarokoilis, Saif Khan Mohammed and Erik G. Larsson, “On the Optimality of Single-Carrier Transmission in Large-Scale
Antenna Systems”, IEEE Wireless Communications Letters, vo. 1, no. 4, Aug. 2012.
15. Mohammed Ali Mohammed MOQBEL, Wangdong,and Al-marhabi Zaid Ali, “MIMO Channel Estimation Using the LS and MMSE
Algorithm”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), vol. 12, no. 1, pp. 13-22, Feb. 2017.
16. J.P. Coon and M. A. Beach, “An Investigation of MIMO Single-Carrier Frequency-Domain MMSE Equalization”, London
Communications Symposium, pp. 237-240, 2002.
17. Weiheng Ni, and Xiaodai Dong, “Hybrid Block Diagonalization for Massive Multiuser MIMO Systems”, IEEE TRANSACTIONS
ON COMMUNICATIONS, vol. 64, no. 1, pp:201-211, Jan 2016.
18. [18] Peng Xu, Jiang Zhou Wang and Jinkuan Wang, “Multi-cell H-inf Precoding in Massive MIMO Systems”, IEEE ICC 2014 -
Signal Processing for Communications Symposium, pp:4472-4476.
947.
Keyword : Human Action Recognition, Feature Extraction, Classification, Spatio-temporal interest points,
Trajectories, Support Vector Machine, Deep Learning, action datasets. 5376-
5384
References:
1. YangY,AloimonosY., 2015, “Robot learning manipulation action plans by watchingunconstrained videos from the world wide web”,
pp.3686–3693.
2. Kru¨gerV, KragicD, 2007,“The meaning of action: a review on action recognition andmapping”, Advanced Robotics 21
(13),pp.1473–1501.
3. NiitsumagM., Hashimoto H, 2007, “Spatial memory as an aid system for human activity inintelligent space”,pp.1122–1131.
4. Khan Z. A.Sohn W, 2011, “Abnormal human activity recognition system based on r-transform and kerneldiscriminant technique for
elderly home care”,pp.1843–1850.
5. Bobick A. and Davis J, 2001,“The recognition of human movement using temporal templates”, pp. 257–267.
6. RyooM. S., 2011, “Human activity prediction: Early recognition of ongoing activities from streaming videos”, pp.1-5.
7. FeichtenhoferC, PinzA, 2017, “Spatiotemporal multiplier networks for video action recognition”, 7445–7454.
8. RamezaniM. and YaghmaeeF, 2016, “A review on human action analysis in videos for retrieval applications”, pp. 485–514.
9. Xia L. andAggarwal J,2013,”Spatio-temporal depth cuboid similarity features for activity recognition using depth camera”.
10. Koppula H. S. and Saxena A,2016, “Anticipating human activities using object affordances for reactive robotic response”,pp. 1 4–29.
11. Li K. and Fu Y, 2014, “Prediction of human activity by discovering temporal sequence patterns”,pp.1644–1657.
12. C. Sch¨uldt, I. Laptev, and B. Caputo Recognizing human actions: Alocal SVM approach,in IEEE ICPR, 2004.
13. Blank M., Gorelick L., ShechtmanE, 2005, “Actionsas space-time shapes”,in Proc. ICCV, 2005.
14. Weinland D, RonfardR, andBoyer E, 2006,“Free viewpoint action recognitionusing motion history volumes”,page no. 2-3.
15. RyooM. S. and. K J. Aggarwal, 2010, “UT-Interaction Dataset, ICPRcontest on Semantic Description of Human Activities
(SDHA)”,http://cvrc.ece.utexas.edu/SDHA2010/HumanInteraction.
16. MonfortM., Zhou B, S. A. Bargal, T. Yan, “Momentsin time dataset: one million videos for event understanding”.
17. Khurram Soomro A. R. Z. and Shah M, 2012, “Ucf101: A dataset of 101human action classes from videos in the wild”.
18. Kuehne H., Zhuang H., and Serre T, 2011,“HMDB: Alarge video database for human motion recognition”.
19. Laptev I., MarszalekM, and RozenfeldB,2008,“Learningrealistic human actions from movies”.
20. W. Li, Z. Zhang, and Z. Liu, Action recognition based on a bag of 3dpoints,in CVPR workshop, 2010.
21. KarpathyA, TodericiG, Shetty S., and L. Fei-Fei, 2014, ”Large-scale video classification with convolutional neuralnetworks”,in
CVPR, 2014.
22. H.Wang, A. Klaaser, C. Schmid, and C. L. Liu, “Dense trajectories andmotion boundary descriptors for action recognition”, IJCV,
vol. 103, no.60-79, 2013.
23. H. Wang, A. Kl¨aser, C. Schmid, and C.-L. Liu, “Action Recognitionby Dense Trajectories”,in IEEE Conference on Computer
Vision & Pattern Recognition, Colorado Springs, United States, Jun. 2011, pp.3169–3176.
24. I. Laptev and T. Lindeberg, “Space-time interest points”,in ICCV, 2003,pp. 432–439.
25. M. Bregonzio, S. Gong, and T. Xiang “Recognizing action as clouds ofspace-time interest points”,in CVPR, 2009.
26. A. Klaser, M. Marszalek, and C. Schmid, “A Spatio-temporal descriptorbased on 3d-gradients”,in BMVC, 2008.
27. Cutler, R.; Turk, M. “View-based interpretation of real-time optical flow for gesture recognition”. In Proceedings
28. of the Third IEEE International Conference on IEEE, “Automatic Face and Gesture Recognition”, Nara, Japan,14–16 April1998; pp.
416–421.
29. [28] Jiang, Y.G.; Dai, Q.; Xue, X.; Liu, W.; Ngo, C.-W. “Trajectory-based modeling of human actions with motionreference points”.
In European Conference on Computer Vision; Springer: Berlin, Germany, 2012; pp. 425–438.
30. Dalal, N., Triggs, B.: “Human detection using oriented histograms of flow and appearance”. In: ECCV. (2006)
31. H. Wang and C. Schmid, “Action recognition with improvedtrajectories”,in IEEE International Conference on Computer
Vision,Sydney, Australia, 2013.
32. Hamim A. Abdul Azim and E. E Hemayed, “Human action recognition using trajectory-based representation”, Egyptian informatics
journal, Volume 16, Issue 2, July 2015, Pages 187-198.
33. Dalal, N.; Triggs, B. “Histograms of oriented gradients for human detection”. In Proceedings of the CVPR2005 IEEE Computer
Society Conference on Computer Vision and Pattern Recognition, San Diego, CA, USA,20–26 June 2005; Volume 1, pp. 886–893.
34. H. Wang, D. Oneata, J. Verbeek, and C. Schmid, “A robust and efficientvideo representation for action recognition”,IJCV, 2015.
35. P. Dollar, V. Rabaud, G. Cottrell, and S. Belongie, “Behavior recognitionvia sparse Spatio-temporal features”,in ICCV VS-PETS,
2005.
36. M. Bregonzio, S. Gong, and T. Xiang “Recognizing action as clouds ofspace-time interest points”,in CVPR, 2009.
37. G. Willems, T. Tuytelaars, and L. Gool, “An efficient dense and scale-invariantSpatio-temporal interest point detector”,in ECCV,
2008.
38. A. Klaser, M. Marszalek, and C. Schmid, “A Spatio-temporal descriptorbased on 3d-gradients”,in BMVC, 2008.
39. N Li, Xu Cheng, S. Zhang, Zhejiang Wu, “Realistic human action recognition by Fast HOG3D and self-organization feature map”,
2014, pp.1793-1812.
40. Ivo Everts, Jan C. van Gemert and Theo Gevers, “Evaluation of Color STIPs for Human Action Recognition”, 2013.
41. H. Wang, M. M. Ullah, A. Kl aser, I. Laptev, and C. Schmid, “Evaluationof local Spatio-temporal features for action recognition”,in
BMVC,2008.
42. Ye, M.; Zhang, Q.; Wang, L.; Zhu, J.; Yang, R.; Gall, J. “A survey on human motion analysis from depthdata”, October 2012; pp.
149–187.
43. Oreifej, O.; Liu, Z. HON4D: “Histogram of Oriented 4D Normals for Activity Recognition from DepthSequences”,June 2013, pp.
716–723.
44. Papadopoulos, G.T.; Axenopoulos, A.; Daras, P. “Real-time skeleton-tracking-based human action recognition using Kinect data”,
January 2014; pp. 473–483.
45. Presti, L.L.; Cascia, M.L. 3D “Skeleton-based Human Action Classification: A Survey”. Pattern Recognit. 2016,53, 130–147.
46. Pazhoumanddar, H.; Lam, C.P.; Masek, M. Joint “movement similarities for robust 3D action recognition using skeletal data”. J . Vis.
Commun. Image Represent. 2015, 30, 10–21.
47. Vemulapalli, R.; Arrate, F.; Chellappa, R. “Human Action Recognition by Representing 3D Skeletons as Points in a Lie Group”,
June 2014; pp. 588–595.
48. Miao, J.; Jia, X.; Mathew, R.; Xu, X.; Taubman, D.; Qing, C. “Efficient action recognition from compresseddepth maps”, Septem ber
2016; pp. 16–20.
49. Chen, C.; Jafari, R.; Kehtarnavaz, N. “Action Recognition from Depth Sequences Using Depth MotionMaps-Based Local Binary
Patterns”, January 2015; pp. 1092–1099.
50. Rahmani, H.; Mahmood, A.; Huynh, D.Q.; Mian, A. “Real-time action recognition using histograms of depth gradients and random
decision forests”, March 2014; pp. 626–633.
51. Yang, X.; Zhang, C.; Tian, Y.L. “Recognizing actions using depth motion maps-based histograms oforiented gradients”, November
2012; pp. 1057–1060.
52. Shotton, J.; Sharp, T.; Fitzgibbon, A.; Blake, A.; Cook, M.; Kipman, A.; Finocchio, M.; Moore, R. “Real-Timehuman pose
recognition in parts from single depth images”. Commun. ACM 2013, 56, 116–124.
53. Hany ElGhaish, Mohamed E. Hussien, Amin Shoukry, andRikioOnai, “Human Action Recognition Based on IntegratingBody Pose”,
Part Shape, and Motion, IEEE Access, Volume 6, 2018, pp. 49040-49055.
54. S. Jetley and F. Cuzzolin,“3D activity recognition using motion historyand binary shape templates”, Springer, 2014, pp. 129 -144.
55. Nazir, S.; Yousaf, M.H.; Velastin, S.A. “Evaluating a bag-of-visual features approach using Spatio-temporalfeatures for action
recognition”,2018.
56. Gaidon, A.; Harchaoui, Z.; Schmid, C. “Activity representation with motion hierarchies”. Int. J. Comput. Vis.2014, 107, 219 –238.
57. K. G. ManoshaChathuramali, Ranga Rodrigo, “Faster Human Activity Recognition with SVM”, The International Conference on
Advances in ICT for Emerging Regions – ICTer 2012: 197-203.
58. D. Tran, A. Sorokin, and D. Forsyth, “Human activity recognitionwith metric learning”, 2008, pp. 549–562.
59. Jalal A.Nasiri, NasrollahMoghadamCharkari, KouroshMozafari, “Energy-based model of least squares twin Support Vector
Machines for human action recognition”, November 2014, Pages 248-257.
60. M Arun Kumar, M Gopal, “Least squares twin support vector machines for pattern classification”, May 2009, Pages 7535-7543.
61. L Gonzalez, S.A. Velastin, G. Acuna, “silhouette based human action recognition with a multi-class support vector
machine”, 2018 page (5 pp.)
62. A. A. Chaaraoui, P. Climent-Pérez, and F. Flórez-Revuelta, “A review on vision techniques applied to Human Behavior Analysis for
Ambient-Assisted Living”, Expert Systems with Applications, vol. 39, no. 12, pp. 10873–10888, 2012.
63. M D. Praveen and C K Niranjan, “Human Action Detection and Recognition Using SIFT and SVM”, International Conference on
Cognitive Computing and Information Processing, CCIP 2017, pp.475-491.
64. YongxiongWang, YuboShiGuoliangWei, “A novel local feature descriptor based on energy information for human activity
recognition”, Neurocomputing, Volume 228, 8 March 2017, Pages 19-28.
65. SamehMegrhi, MarwaJmal, WidedSouidene, AzeddineBeghdadi, “Spatio-temporal action localization and detection for human
action recognition in big dataset”, November 2016, Pages 375-390.
66. HanlingZhang, PingZhong, JialeHe, ChenxingXia, “Combining depth-skeleton feature with sparse coding for action recognition”,
Neurocomputing, Volume 230, 22 March 2017, Pages 417-426.
67. Vikas Tripathi, DurgaprasadGangodkar, Ankush Mittal, Vishnu Kanth, “Robust Action Recognition framework using Segmented
Block and Distance Mean Histogram of Gradients Approach”,August 2017, Cochin, India.
68. Donahue, J.; Hendricks, L.A.; Rohrbach, M.; Venugopalan, S.; Guadarrama, S.; Saenko, K.; Darrell, T,“Long-Term Recurrent
Convolutional Networks for Visual Recognition and Description”,IEEE Trans. Pattern Anal. 2017, 39, 677–691.
69. Tran, D.; Bourdev, L.D.; Fergus, R.; Torresani, L.; Paluri, M,“Learning Spatiotemporal Features with 3DConvolutional Networks”.
In Proceedings of the IEEE International Conference on Computer Vision 2015, Las Condes, Chile, 11–18 December 2015; pp.
4489–4497.
70. Simonyan, K.; Zisserman, A. “Two-Stream Convolutional Networks for Action Recognition in Videos”, December 2014; pp. 568–
576.
71. Feichtenhofer, C.; Pinz, A.; Zisserman, A. “Convolutional Two-Stream Network Fusion for Video ActionRecognition”. In
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition(CVPR), Las Vegas Valley, NV, USA, 27–
30 June 2016; pp. 1933–1941.
72. Wang, L.; Xiong, Y.;Wang, Z.; Qiao, Y.; Lin, D.; Tang, X.; Gool, L.V. “Temporal Segment Networks: TowardsGood Practices for
Deep Action Recognition”. In Proceedings of ECCV; Springer: Cham, Switzerland, 2016;pp. 20–36.
73. Lan, Z.; Zhu, Y.; Hauptmann, A.G.; Newsam, S. “Deep Local Video Feature for Action Recognition”.In Proceedings of the 2017
IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 21–26 July 2017; pp.
1219–1225.
74. Zhou, B.; Andonian, A.; Torralba, A. “Temporal Relational Reasoning in Videos”. arXiv2017, arXiv:1711.08496.
75. Goyal, R., Kahou, S., Michalski, V., Materzy´nska, J., Westphal, S., Kim, H., Haenel, V., Fruend, I., Yianilos, P., Mueller-Freitag,
M., et al.: “The something-something video database for learning and evaluating visual common sense”. Proc. ICCV (2017)
76. “Twentybn jester dataset: a hand gesture dataset”.https://www.twentybn.com/datasets/jester (2017)
77. Sigurdsson, G.A., Varol, G., Wang, X., Farhadi, A., Laptev, I., Gupta, A.: Hollywood in homes: “Crowdsourcing data collection for
activity understanding”. In: European Conference on Computer Vision, Springer (2016) 510–526.
78. Cheng Bin Jin, Shengzhe Li,Trung Dung Do, and Hakil Kim, “Real-Time Human Action RecognitionUsing CNN Over Temporal
Images for StaticVideo Surveillance Cameras”, Springer International Publishing Switzerland, pp. 330–339, 2015.
79. T.H. Yu, T K. Kim, and R. Cipolla, 2013, “Unconstrained Monocular 3D Human Pose Estimation by Action Detection and
Cross-modality Regression Forest”.
80. Ji Shuiwang, XuWei, Yang Ming, Member, IEEE, and Kai Yu, “3D Convolutional Neural Networks for Human Action
Recognition”.
81. Huang Xin, WeiGang, and AValery. “PetrushinShot Boundary Detection and High-level Features Extraction for the TREC Video
Evaluation”, 2003, Accenture Technology Laboratories.
82. Tran D., BourdevL., Fergus R., L. Torresani, and M. Paluri. “Learning spatiotemporal features with 3d convolutional networks”,
December 2015.
83. K. Derpanis, M. Lecce, K. Daniilidis, and R. Wildes. “Dynamic scene understanding: The role of orientation features in space and
time in scene classification”. In CVPR, 2012.
84. N. Shroff, P. K. Turaga, and R. Chellappa. “Moving vistas: Exploiting motion for describing scenes”. In CVPR, 2010.
85. Orit Kliper-Gross, Tal Hassner, Lior Wolf, “The Action Similarity Labeling Challenge”, IEEE Transactions On Pattern Analysis And
Machine Intelligence, Vol. X, No. X, X 201X.
86. J.Arunnehru, G.Chamundeeswari, S. PrasannaBharathi, “Human Action Recognition using 3D Convolutional Neural Networks with
3D Motion Cuboids in Surveillance Videos”, Proceida computer science, Volume 133, 2018, Pages 471-477.
Paper Title: Grid Synchronisation of Photovoltaic Distributed Generation Using Hybrid FUZZY-PI Controller
Abstract: The power generation of the world has to be increased every year as the demand increases rapidly.
The high power generations are done by hydro, thermal and atomic. The power production cant is increased every
year as the cost of power production increases due to this constraint and increase in high power generation
increases pollutions. So the distribution side generation are used, and the PV based power generations are used
mostly as the maintenance is less comparatively. The power control in PV power generation is done by DQ
technique which is most widely used. It has a PI controller to regulate the real power. In this paper, the fuzzy logic
control which is combined with the PI controller is used to increase the controllability of the power system. The
MATLAB 2017b is used to do the simulation of the applied technique and the results are discussed with
improvements.
Keyword : Hybrid FUZZY-PI Controller, Distributed Generator, Grid Synchronization , Photovoltaic Generator,
d-q technique
948.
References: 5385-
1. R. Guerrero-Lemus, & et.al. “A simple big data methodology and analysis of the specific yield of all PV power plants in a power 5390
system over a long time period”, Renew. Sustain. Energy Rev. 2019, 107, 123–132.
2. Han, P, Lin, Z & et.al. “A Survey on Equivalence Modeling for Large-Scale Photovoltaic Power Plants”. Energies 2018, 11, 1463.
3. la Parra, I & et.al. “PV performance modeling: A review in the light of quality assurance for large PV plants”, Renew. Sustain.
Energy Rev. 2017, 78, 780–797.
4. Mehrasa, & et.al, “Control technique for the operation of grid-tied converters with high penetration of renewable energy resources”,
Electr. Power Syst. Res. 2019, 166, 18–28.
5. Mehrasa, M., & et.al, “Virtual Inertia, and Mechanical Power-Based Control Strategy to Provide Stable Grid Operation under High
Renewables Penetration”. Appl. Sci. 2019, 9, 1043–1058.
6. Wang, D., & et.al. “Coordinated Dispatch of Virtual Energy Storage Systems in LV Grids for Voltage Regulation”, IEEE Trans. Ind.
Inform. 2018, 14, 2452–2462.
7. Refaat, S.S. & et.al. “ A. Impact of a grid-tied large-scale photovoltaic system on dynamic voltage stability of electric power grids”,
IET Renew. Power Gener. 2018, 12, 157–164.
8. Y. Chaibi, A. & et.al. “Annual performance analysis of different maximum power point tracking techniques used in photovoltaic
systems,” Protection and Control of Modern Power Systems, vol. 4, no. 1, 2019.
9. Hanan A. Mosalam, & et.al, “Fuzzy logic control for a grid-connected PV array through Z-source-inverter using maximum constant
boost control method”, Ain Shams Engineering Journal, Volume 9, Issue 4, 2018, Pages 2931-2941.
10. Harsha Anantwar, & et.al, “Fuzzy self-tuning PI controller based inverter control for voltage regulation in off-grid hybrid power
system”, Energy Procedia, Volume 117, 2017, Pages 409-416.
11. H. W. D. Hettiarachchi, “Review of Applications of Fuzzy Logic in Multi-Agent-Based Control System of AC-DC Hybrid
Microgrid”, IEEE Access, 2018.
Keyword : finite state machine, probabilistic automaton, discrete automaton, transition matrix, technological
process, technological circuit cell.
949. References:
1. Blyumin S.L., Korneev A.M. Discrete modeling of automation and control systems: Monograph. - Lipetsk: LEGI. - 2005 .- 132 p.
2. Korneev A.M. Modeling complex production systems with using iterative networks / А.М. Korneev, A.M.M. Nagi, T.A. Smetannikova //
5391-
Fundamental Research. - 2016. No.5-2. - P.260-263. 5394
3. Blumin, S.L. Linear cell machines: the state space approach / S.L. Blumin, R.G. Farajev // Automation and Telemechanics. - 1982. - No.2.
- P.125-162.
4. Butkovsky, A.G. Structural theory of distributed systems / A.G. Butkovsky. - M .: Nauka, 1977 .- 320 p.
5. Korneev A.M. Optimization of the database structure of multi-stage production systems / A.M. Korneev, L.S. Abdullah, V.A. Lysikov // In
the book. New technologies in scientific research, design, management, production: Proceedings of the international scientific-practical
conference. - 2017. - P.300-304.
6. Korneev A.M. Evaluation of the effectiveness of the functioning modes of complex systems, taking into account the costs of production /
A.M. Korneev, T.A. Smetannikova, A.M. Vasyukov // Bulletin of the Lipetsk State Technical University. - 2015. - No. 2 (24) - P.15-19.
7. Korneev A.M. Search for optimal functioning modes of complex industrial systems / А.М. Korneev, G.M. Al-Sabri // Modern high
technology. - 2016. - No. 9-2 - P.233-236.
8. Sakarovitch, Jacques. Elements of automata theory / Jacques Sakarovitch. – Cambridge University Press, 2009. – р. 758.
9. Bukharaev, R.G. Fundamentals of the theory of probabilistic automata / R.G. Bukharaev. - Nauka, 1985 .- 288 p.
10. Korneev A.M. Search strategy for optimal technological modes in discrete cell-hierarchical systems / А.М. Korneev, T.A. Smetannikova,
G.M. Al-Sabri, A.M. Nagi // Modern problems of science and education. - 2015. - No. 2-2 - p.150.
11. Korneev, A.M. The use of iterative chains to describe multi-stage spatially distributed production systems / А.М. Korneev, V.N. Kid, T.A.
Smetannikova // Bulletin of the Peoples' Friendship University of Russia. Series: Engineering Research. - 2012. - No. 2. - P.78-84.
Paper Title: Prediction of Crops based on Environmental Factors using IoT & Machine Learning Algorithms
Abstract: India being an agricultural country, the most part of economy is depends on yield growth.
Agriculture is largely dependent on rainwater and also relies on different soil variables such as aspects of nitrogen,
phosphorus, potassium and climate such as temperature, precipitation, etc. The technological growth in agriculture
will increase the crop productivity. Remote sensing systems like IOT systems are being more widely used in smart
farming systems, these systems produce generous amount of data. Machine learning is an ongoing work that has
been filed to forecast the plant based on data trends. The proposed system would integrate sensors such as Ph.,
Moisture, Rainfall, Temperature and Humidity to analyze the information from these sensors and to implement
machine learning algorithms: Linear Regression, Decision Trees, Random Forest, and GDBoost. The most
desirable crops are predicted according to the current environment. This work gives farmers a better prediction to
plant what kind of crops in their farm field based on the criteria listed above in order to improve Smart Farming's
productivity.
950.
Keyword : Agriculture, IoT, Machine Learning, Data Analytics, Prediction
5395-
References: 5401
1. M.K. Gayathri, Dr.G.S. Anandha Mala, J Jayasakthi, “Providing Smart Agricultural Solutions to Farmers for better yielding using
IoT”, TIAR 2015.
2. Patil, S., and S. R. “INTERNET OF THINGS BASED SMART AGRICULTURE SYSTEM USING PREDICTIVE ANALYTICS”.
Asian Journal of Pharmaceutical and Clinical Research, Vol. 10, no. 13, Apr. 2017, pp. 148-52,
doi:10.22159/ajpcr.2017.v10s1.19601.
3. Thomas Truong; Anh Dinh; Khan Wahid. An IoT environmental data collection system for fungal detection in crop fields [M]//2017
IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)
4. D, Rajesh. (2011). Application of Spatial Data mining for Agriculture. International Journal of Computer Applications. 15.
10.5120/1922-2566.
5. YOU, J.; LI, X.; LOW, M.; LOBELL, D.; ERMON, S.. Deep Gaussian Process for Crop Yield Prediction Based on Remote Sensing
Data. AAAI Conference on Artificial Intelligence, North America, feb. 2017.
6. Anna Chlingaryan, Salah Sukkarieh, Brett Whelan, Machine learning approaches for crop yield prediction and nitrogen status
estimation in precision agriculture: A review, Computers and Electronics in Agriculture, Volume 151, 2018, Pages 61 -69, ISSN
0168-1699.
7. K. A. Patil and N. R. Kale, "A model for smart agriculture using IoT," 2016 International Conference on Global Trends in Signal
Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, 2016, pp. 543-545.
8. https://www.electronicscomp.com/soil-moisture-sensor-module-india.
9. https://www.mouser.com/ds/2/758/DHT11-Technical-Data-Sheet-Translated-Version-1143054.pdf.
10. https://www.rhydolabz.com/sensors-weather-sensors-c-137_147/raindrop-sensor-module-p-2336.html
11. https://scidle.com/how-to-use-a-ph-sensor-with-arduino/
12. Georg Ruß, Rudolf Kruse, Martin Schneider, and Peter Wagner. Estimation of neural network parameters for wheat yield prediction.
In Max Bramer, editor, Artificial Intelligence in Theory and Practice II, volume 276 of IFIP International Federation for Information
Processing, pages 109–118. Springer, July 2008.
13. Iv´an Mej´ıa-Guevara and ´Angel Kuri-Morales. Evolutionary feature and parameter selection in support vector regression. In
Lecture Notes in Computer Science, volume 4827, pages 399–408. Springer, Berlin, Heidelberg, 2007.
14. Breiman, L. (2001) Random Forests. Machine Learning, 45, 5-32.
15. https://towardsdatascience.com/understanding-gradient-boosting-machines-9be756fe76ab
Paper Title: Two Step Algorithm Implementation Forintelligent Street Light System
Abstract: This paper presents an algorithm for the automation of street lights for existing urban roads in India.
In thiscase study a two kilometre lane in Chennai, India is taken under consideration. The paper proposes replacing
953. the existingHigh Pressure Sodium VapourLamps (HPS) with Light Emitting Diodes (LED). A smart algorithm is
fed into the system design incorporating phototransistor and Infrared sensors. The opera- tion time of the street
5419-
lights can be categorised as High Passerby Frequency(HPF)andLowPasserbyFrequency(LPF)period.The Dynamic
5423
Intensity Modification (DIM) system operates during LPF duration hence, when passerby is detected the street is
illuminated to maximal intensity which otherwise is maintained at low intensity consuming low power resulting in
low cost.For the 2 km stretch, the results highlight that replacing all existing lamps with LEDs and dimming light
intensity in the absence of users in the vicinity of the lamp-post is convenient and provides minimum of 65.74%
and a maximum of 72.9% relative reduction in cost for a period of twenty years for this specific case study.
However, the DIM algorithm is generic and can be implemented across any Indianroadway.
Keyword : Urban Roads, Infrared Sensors, Phototransistors, Intensity Modulation, Automated Switching, Street
Lights.
References: