international journal of engineering and advanced technology · 2019. 1. 18. · international...

29
International Journal of Engineering and Advanced Technology International Journal of Engineering and Advanced Technology International Journal of Engineering and Advanced Technology International Journal of Engineering and Advanced Technology ISSN : 2249 - 8958 Website: www.ijeat.org e d c T e n c a h v n d o A l o d g n y a g n i r e e n i I n g t n e E r n f a o l ti o a n n r a u o J l IJEat IJEat Exploring Innovation www.ijeat.org Volume-8 Issue-2, DECEMBER 2018 Volume-8 Issue-2, DECEMBER 2018 Published by: Blue Eyes Intelligence Engineering and Sciences Publication Published by: Blue Eyes Intelligence Engineering and Sciences Publication E X P L O R I N G I N N O V A T ION

Upload: others

Post on 22-Aug-2021

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

International Journal of Engineering and Advanced Technology

International Journal of Engineering and Advanced Technology

International Journal of Engineering and Advanced Technology

International Journal of Engineering and Advanced Technology

ISSN : 2249 - 8958Website: www.ijeat.org

edc Ten ca hv nd oA l od gn ya g

nire

eni Ing tn eE r nf ao l tioan nr auoJ l

IJEatIJEat

Exploring Innovation

www.ijeat.org

Volume-8 Issue-2, DECEMBER 2018Volume-8 Issue-2, DECEMBER 2018

Published by: Blue Eyes Intelligence Engineering and Sciences Publication

Published by: Blue Eyes Intelligence Engineering and Sciences Publication

EXPLORING INNOVA

TION

Page 2: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Editor-In-Chief Chair Dr. Shiv Kumar

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE

Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal

(M.P.), India

Associated Editor-In-Chief Chair Dr. Dinesh Varshney

Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota

Ph.D. (CSE), MCA, MSc (Mathematics)

Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

Ph.D(CSE), MS(CSE), BSc(EE)

Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime

Transport, Egypt

Dr. Mayank Singh

PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT

Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-

Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker

Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)

Stamford, USA.

Dr. Shanmugha Priya. Pon

Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East

Africa, Tanzania

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,

China.

Dr. Fadiya Samson Oluwaseun

Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

Cyprus, Turkey.

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra

Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair Dr. Deepak Garg

Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue

Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Page 3: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura, Egypt.

Dr. Hugo A.F.A. Santos

ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia

Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg

Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng

Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas

Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov

Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr. Ch.V. Raghavendran

Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang

Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,

Hochiminh, Vietnam.

Dr. Wilson Udo Udofia

Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Convener Chair Mr. Jitendra Kumar Sen

Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India

Editorial Chair Dr. Sameh Ghanem Salem Zaghloul

Department of Radar, Military Technical College, Cairo Governorate, Egypt.

Editorial Members Dr. J. Gladson Maria Britto

Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad (Telangana), India.

Dr. Sunil Tekale

Professor, Dean Academics, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad

(Telangana), India.

Dr. K. Priya

Professor & Head, Department of Commerce, Vivekanandha College of Arts & Sciences for Women (Autonomous, Elayampalayam,

Namakkal (Tamil Nadu), India.

Dr. Pushpender Sarao

Professor, Department of Computer Science & Engineering, Hyderabad Institute of Technology and Management, Hyderabad

(Telangana), India.

Dr. Nitasha Soni

Assistant Professor, Department of Computer Science, Manav Rachna International Institute of Research and Studies, Faridabad

(Haryana), India.

Page 4: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

S.

No

Volume-8 Issue-2, December 2018, ISSN: 2249-8958 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Page

No.

1.

Authors: Dina M. Ibrahim

Paper Title: Protocol Converter between Mobile IP and WATM Wireless Networks

Abstract: This paper is concerned with the problem of designing and verifying internetworking protocol converters on

the basis of timed Petri nets. The Petri net protocol conversion designated between the Mobile Internetworking Protocol

(Mobile IP) and the Wireless Asynchronous Transfer Mode (WATM) protocol is investigated. Due to protocol

complexity in this case, we propose a routing arrangement scheme for either protocol and for the intended protocol

converter, in order to facilitate the derivation of the various traces involved. Petri net-based converter between Mobile

IP and WATM protocols is constructed and verified. The converter is verified by simulation to guarantee liveness,

safety, and responsiveness.

Keywords: Mobile IP, Petri Nets, Protocol Converters, Wireless Network Protocols.

References: 1. Lee, Y. M., and Park, K, H., A Protocol Converter for Nonblocking Protocols, INTEGRATION, The VLSI Journal, vol.33, pp. 71-88,

2002…..27

2. Saleh, K., and Jaragh, M., Synthesis of Communications Protocol Converters Using The Timed Petri Net Model, The Journal of Systems and

Software, vol. 47, pp. 53-69, 1999. ….37

3. Green, P. E., Protocol Conversion, IEEE Trans. on Communications, vol. 34, pp. 257-268, 1986. …19 4. R. Sinha, "Conversing at Many Layers: Multi-layer System-on-Chip Protocol Conversion," 2015 20th International Conference on Engineering

of Complex Computer Systems (ICECCS), Gold Coast, QLD, , pp. 170-173, 2015. doi: 10.1109/ICECCS.2015.25

5. R. Narayanan and C. S. R. Murthy, "A Probabilistic Framework for Protocol Conversions in IIoT Networks With Heterogeneous Gateways," in IEEE Communications Letters, vol. 21, no. 11, pp. 2456-2459, Nov. 2017. doi: 10.1109/LCOMM.2017.2730859

6. Siddiqui, F., and Zeadally, S., Mobility Management Across Hybrid Wireless Networks: Trends and Challenges, Computer Communications

Journal, pp. 1-23, 2005…..39 7. Andrews, J. G., Ghosh, A., and Muhamed R., 'Fundamentals of WiMAX: Understanding Broadband Wireless Networking,' Prentice Hall, 2007.

8. Eom, D. S., Lee, H., Sugano, M., Murata, M., and Miyahara, H., Improving TCP Handoff Performance in Mobile IP Based Networks, Computer

Communications Journal, vol. 25, pp. 635-646, 2002. ….13 9. S. N. Mane, N. V. Mane and D. G. Khairnar, "Performance of mobile node between different MANET with Mobile IP," 2015 International

Conference on Industrial Instrumentation and Control (ICIC), Pune, pp. 1662-1664, 2015. doi: 10.1109/IIC.2015.7151017

10. O. Arafat, M. A. Gregory and M. M. A. Khan, "Interworking architecture between 3GPP IMS, Mobile IP and WiMAX in OPNET," 2014 2nd International Conference on Electrical, Electronics and System Engineering (ICEESE), Kuala Lumpur, pp. 48-53, 2014.

doi: 10.1109/ICEESE.2014.7154602

11. M. Alnas, I. Awan and D. R. Holton, "Handoff mechanism in Mobile IP," 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Zhangijajie, pp. 176-179, 2009.

doi: 10.1109/CYBERC.2009.5342167

12. Anschuetz, H., HPSim, Petri Net Simulator, Version 1.1, available on: http://www.winpesim.de/default.html, 2011. 13. S. V. Vambase and S. R. Mangalwede, "ATM based WMN architecture for Distributed Generation systems in electrical networks," 2015

International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, pp. 119-123, 2015. doi:

10.1109/ICGCIoT.2015.7380441 14. Kim, D., and Cho, Y., A Lossy Handover Scheme in The Wireless ATM Networks, Proceedings of IEEE, pp. 52-57, 2000.

15. Crazzolara, F. and Winskel, G., Petri Nets with Persistence, Electronic Notes in Theoretical Computer Science (Journal), vol.121, pp. 143-155,

2005.

1-6

2.

Authors: Steven Valentino E. Arellano, Kierven R. de Mesa, Lawrence Alexis P. Desuasido

Paper Title: Child Detector Android Application using Bluetooth Low Energy (BLE) Beacon Technology

Abstract: The Child Detector Android Application through Smartphone Using Bluetooth Low Energy (BLE) Beacon

Technology was developed to prevent the child from getting lost. The researcher mainly utilized beacon and Android

application in developing the system. Smartphone with installed application will detect and display the distance of the

child, and it will also alert whether the child is going far from the user. The beacon is detected through smartphone’s

Bluetooth within 30-meter range proximity, while it is attached to the child. The objective of this study was to

determine the effectiveness of the system and satisfaction level of the users. This was tested to Grade One students of

one of the private schools in the Philippines were the parents, teachers, and school administrators served as respondents

to the conducted survey. Obtained results indicated that the Android application were effective for child detection.

Overall, this would be a new security Android application for children.

Keywords: Android Application, Bluetooth Low Energy, Beacon

References: 1. Bluetooth. (2016, August 21), Bluetooth Low Energy [Online]. Available: https://www.bluetooth.com/what-is-bluetooth-technology/

2. Bluetooth-technology-basics/low-energy. 3. F. Stroud. (2016, August 21), Beacon [Online]. Available: http://www.webopedia.com/TERM/B/beacon.html.

4. M. Scheuerman. (2016). “7 Reasons To Use Beacon Technology On Campuses” [Online]. Available: https://elearningindustry.com/beacon

5. -Technology-on-campuses-7-reasons-to-use. 6. C. L. G. Cabanban. (2013). “Development of Mobile Learning Using Android Platform” [Online]. Available:

http://ijitcs.com/volume%209_No_1/Sadaaki.pdf.

7. S. Aseniero, A. Buena, D. Carreon, J. De Luna, M. Simangan, and M. B. Apsay, “E-Learning for Programming Languages on Android Devices”, International Journal of Scientific & Technology Research, vol. 2 (9), 2013, pp. 253-255.

8. Kontakt. (2016). “Eddystone: 5 key facts about the new open beacon format from Google” [Online]. Available: https://kontakt.io/blog/what-is-

eddystone/. 9. Google. (2016). Eddystone Google Beacon [Online]. Available: https://developers.google.com/beacons/.

10. Google. (2016, August 24), Android Database SQLite [Online]. Available: https://developer.android/reference/android/database/sqlite

11. /package-summary.html.

7-12

Page 5: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

3.

Authors: S. Gopinath, N. A. Natraj, N. Suresh Kumar

Paper Title: An Effective Reliable Secure Data Gathering and Intrusion Detection Scheme for WSN

Abstract: Wireless Sensor Network is a indivisible part of network where it has no infrastructure. In the past, Intrusion

detection systems were used to detect intrusions in network effectively. Most of the systems are able to detect intrusions

with high false alarm rate. In this paper, we propose a Effective Trust based Intrusion Detection System (ETIDS) for

detecting malicious activities and providing authentication as well as data integrity. To achieve this, Cluster based

routing is established based on trust vector of neighbor nodes in random topology. Trust based Recommendation and

key based authentication protocol is integrated with clock based verification method to identify malicious nodes.

Simulation results shows that the ETIDS provides better detection efficiency, packet delivery ratio, low end to end

delay, successful certification rate and low overhead than existing schemes.

Keywords: WSN, Intrusion Detection System, Data Gathering, Malicious, Mobility, packet delivery ratio, Detection

efficiency and delay.

References: 1. T G. Kannan and T. Sree Renga Raja, “Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network”,

Egyptian Informatics Journal, Vol.16, 2015, pp.167–174.

2. Shivkumar S. Jawaligi, G. S. Biradar, “ Single Mobile Sink Based Energy Efficiency and Fast Data Gathering Protocol for Wireless Sensor

Networks”, Wireless Sensor Network, 2017, Vol.9, pp.117-144. 3. Sarmad Rashed and Mujdat Soyturk, “Analyzing the Effects of UAV Mobility Patterns on Data Collection in Wireless Sensor Networks”,

Sensors, Vol.413,2017, pp.1-21.

4. Wenjun Liu, Jianxi Fan, Shukui Zhang, Xi Wang, “Relay Hop Constrained Rendezvous Algorithm for Mobile Data Gathering in Wireless Sensor Networks”, Springer, Lecture Notes in Computer Science, LNCS-8147, pp.332-343, 2013,

5. Ching-Hsien Hsu; Xiaoming Li; Xuanhua Shi; Ran Zheng. 10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China.

6. Alhasanat, K. Alhasanat and M. Ahmed, “Range based data gathering algorithm with a mobile sink in Wireless Sensor Networks”, International

Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 6, December 2015, pp.1-13. 7. Shilpa Mahajan , Jyoteesh Malhotra , Sandeep Sharma, “An energy balanced QoS based cluster head selection strategy for WSN”, Egyptian

Informatics Journal, Vol.14, 2014, pp.189-199.

8. Mohamed Benaddy*, Brhim El Habil, Othmane El Meslouhi, Salah-ddine. Krit, “A Mutlipath Routing Algorithm for Wireless Sensor Networks Under Distance and Energy Consumption Constraints for Reliable Data Transmission”, International Journal of Sensors and Sensor Networks,

2017, Vol.5, No.5-1, pp.32-35.

9. Gopi Saminathan Arumugam and Thirumurugan Ponnuchamy, “EE-LEACH: development of energy-efficient LEACH Protocol for data gathering in WSN”, EURASIP Journal on Wireless Communications and Networking, 2015, Vol.76, pp.1-9.

10. Vinotha and Senthil Kumar, “ An Effectual Data Gathering Approach Using Sink Repositioning For WSN”, SSRG International Journal of

Electronics and Communication Engineering, 2017, pp.146-153. 11. Saliha Büyükçoraky, Günes Karabulut Kurt, Abbas Yongaçoglu, “An Empirical Study on Gamma Shadow Fading Based Localization”,

European Signal Processing Conference, 2017, pp.2778-2782.

12. C.Dhatchayani and S.Kannan, “Agent Based Efficient Data Gathering Scheme for Wireless Sensor Networks with a Mobile Sink”, International

Journal of Emerging Technology in Computer Science & Electronics, Vol.24, Issue 4, 2017, pp.10-15.

13. Ez-Zaidi Asmaa and RAKRAK Said, “Mobility for an Optimal Data Collection in Wireless Sensor Networks”, International Journal of

Advanced Computer Science and Applications, Vol. 8, No.7, 2017, pp.353-360. 14. Mariam Alnuaimi, Khaled Shuaib, Klaithem Alnuaimi and Mohammed Abdel-Hafez, “Ferry-Based Data Gathering in Wireless Sensor

Networks with Path Selection”, The 6th International Conference on Ambient Systems, Networks and Technologies, 2015, Vol.52, pp.286-293.

15. Rumpa Dasgupta and Seokhoon Yoon, “Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors”, Sensors, 2017, pp.1-23.

16. Chao Wu, Yuan'an Liu, Fan Wu, Wenhao Fan and Bihua Tang, “Graph-Based Data Gathering Scheme in WSNs With a Mobility-Constrained

Mobile Sink”, Special Section on Emerging Trends, Issues, and Challenges in Energy-Efficient Cloud Computing, IEEE Access, Vol.5, 2017, pp.19463-19477.

13-17

4.

Authors: M. Karthik, Nikhil Singh, Eshan Sinha, Bharani S. Anand, Gowreesh S. S.

Paper Title: Design and Development of Unmanned Chemical Spraying Rover for Agriculture Application

Abstract: There is an increase in usage of Unmanned Ground Vehicle (UGV) in the field of agriculture, specifically

for the purpose of spraying fertilizers and pesticides. However despite existing technologies, no such platform has been

created so far which aims to provide rover chemical spraying that can be used in a high risk areas at a low cost for

extended periods of time. The principal objective of the present work is to Design and Develop a Unmanned Chemical

Spraying Rover, to be able to overcome any kind of obstacle on the agricultural field, and a simple yet indigenous low

cost mechanism for precise spraying agricultural enhancers such as fertilizers, pesticides, and insecticides. These

primary objectives must be realized in a platform costing lower than similar alternatives in the market. The user can

achieve controllable motion and variable flow of the enhancer by a suitable tethered, ground based remote control

interface. Objective of the present work also aims to develop a multi-purpose rover machine, which can be used in

tortuous terrain, crops and plantations of diverged heights. The Rover is maneuvered with the help of six geared motors

each attached to one wheel. The rover’s movement will be controlled using Bluetooth remote control, where the

transmitter will be a smart phone.

Keywords: Bluetooth Controlled Rover, Fertilizer Spraying Rover, Geared and Servo Motor, Mini-Hydraulic Pump,

Rocker Bogie Mechanism, Solid works.

References: 1. Mifune, H., Saitoh, S., Kaneda, T., Tomokiyo, S., Adachi, T., Tanaka, T. and Furudate, T., Tomokiyo White Ant Co Ltd, 1995. Intellectual

working robot of self controlling and running. U.S. Patent 5,465,525.

2. Jindal, H., Stair Climbing Robot. coordinates, 1, p.2

3. Raval, M., Dhandhukia, A. and Mohile, S., Development and Automation of Robot with Spraying Mechanism for Agricultural Applications.

4. Siegwart, R., Lamon, P., Estier, T., Lauria, M. and Piguet, R., 2002. Innovative design for wheeled locomotion in rough terrain. Robotics and

Autonomous systems, 40(2-3), pp.151-162.

18-21

Page 6: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

5. Falcone, E., Gockley, R., Porter, E. and Nourbakhsh, I., 2003. The Personal Rover Project: The comprehensive design of a domestic personal

robot. Robotics and Autonomous Systems, 42(3-4), pp.245-258

5.

Authors: Mohammed Nazeer, Garimella Rama Murthy

Paper Title: Cognitive Cross-Layer, Energy Efficient MAC Protocol in Mobile Wireless Sensor Networks

Abstract: In the region of mobile wireless sensor network, getting least energy consumption is a very important

research problem. A number of energy proficient protocols have been implemented for static wsn, generally built on a

layered design approach, i.e. they are motivated on designing ideal strategies for “single” layer by considering the

sensor nodes as static. In proposed paper, we consider a cross-layer design. A new MAC protocol termed MAC-

SWITCH is proposed. In this new approach, the communication between MAC and routing layers are fully exploited to

achieve energy efficiency for various paradigms of mobile wireless sensor networks. More surely, in the proposed

MAC-SWITCH algorithm, routing and data information at the network layer is used by the MAC layer such that it can

reduces number of contention for channel and perform protocol switching based upon type of data. The performance of

the proposed MAC-SWITCH is evaluated by quantification and simulation. The quantification is done by using gauss

lattice point theorem and simulation by using the NS-2 simulator. It has been evident that the proposed MAC-SWITCH

outperforms the existing aloha and SMAC protocols in terms of energy efficiency, number of contention, packet

transmission and network lifetime.

Keywords: MAC, Energy Efficiency, Routing, Wireless Sensor Networks.

References: 1. Changsu Suh, Young-BaeKo, and Dong-Min Son “An Energy Efficient Cross-Layer MAC Protocol for Wireless Sensor Networks”.

2. Mohammed Nazeer, G.Rama Murthy, RPratapsingh, Leveling and Sectoring Algorithm: Lattice Point Problem(Quantification of Energy

Savings).ACM IML conference, United Kingdom 2017, (2017) 3. George E Andrews. 1994. Number theory. Courier Corporation.

4. Mohammed Nazeer, Garimella Rama Murthy “Protocols in mobile cognitive wireless sensor networks” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 12 (2018) pp. 10268-10275 © Research India Publications.

http://www.ripublication.com

5. Demirkol, C. Ersoy, and F. Alagoz, “MAC Protocols for Wireless Sensor Networks: a Survey,” in IEEE Communications Magazine, 2005. 6. Xin Yang, Ling Wang, and JianXie “Energy Efficient Cross-Layer Transmission Model for Mobile Wireless Sensor Networks” Mobile

Information Systems Volume 2017, Article ID 1346416, 8 pages Publication: Hindawihttps://doi.org/10.1155/2017/1346416

7. Sanjeev,C. Keshavamurthy “A Cross Layered Network Condition Aware Mobile WSN Routing Protocol for Vehicular Communication Systems” international Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 9, September 2016

8. Marwan Al-Jemeli; Fawnizu A. Hussin “An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile Wireless

Sensor” IEEE Sensors Journal ( Volume: 15 , Issue: 2 , Feb. 2015 ) 9. Md. Imran HossainJony, Mohammad Rakibul Islam“Energy Efficient Cross-Layer Approach for Wireless Sensor Networks” International

Journal of Computer Applications Volume 127 - Number 10 Year of Publication: 2015 10.5120/ijca2015906519

10. Anurag Patro, Suchismita Chinara, Manu Elapila, ” A Dynamic Contention MAC Protocol for Wireless Sensor Networks” Proceedings of the International Conference on High Performance Compilation, Computing and Communications Pages 97-101Kuala Lumpur, Malaysia — March

22 - 24, 2017 ACM New York, NY, USA©2017 ISBN: 978-1-4503-4868-3 doi>10.1145/3069593.3069604.

11. Saptarshi Debroy,Swades De, Mainak Chatterjee “Contention based Multi-channel MAC Protocol for Distributed Cognitive Radio Networks” Published : 2013 IEEE Global Communications Conference (GLOBECOM)Date of Conference:9-13 Dec. 2013 Publisher: IEEE Conference

Location: Atlanta, GA, USA

12. Mohammed Nazeer, Garimella Rama Murthy” Energy Efficient, Data Centric Routing Algorithm in Mobile Wireless Sensor Nodes (Energy Savings Quantification)”International Journal of Computer Sciences and Engineering, page 127-135, Vol.-6, Issue-10, Oct. 2018.

22-28

6.

Authors: Mahmoud Maher El-Sayed Mohammed, M. Elgazzar

Paper Title: Hardware Threat Effect on Parallel CORDIC in IoT Devices

Abstract: Internet of Things (IoT) devices starts to spread all over the world. IoT revolution makes the devices smarter

and improves the performance of the devices. The devices can now exchange information between each other and

distribute data analysis effort between each other or send it to data analysis center. As a prediction from Cisco, the

number of IoT devices will be 50 billion IoT device connected together in 2020. This enormous number will make us

think about immunity of these IoT devices against the Hardware attacks. We propose in this paper the effect of inserting

Hardware Threat in Coordinate Rotation Digital Computer (CORDIC). Methods are presented in this paper to identify

Hardware Trojan and its effect on the CORDIC performance.

Keywords: Internet-of-Things (IoT), Denial of Service, Side-Channel Analysis,Hardware Attack, CORDIC.

References: 1. J. Dofe, J. Frey, and Q. Yu, “Hardware security assurance in emerging iot applications,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), May

2016, pp. 2050–2053.

2. P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” in Proc. Crypto’99, pp.388-397, 1999. . 3. E. Brier, C. Clavier, and F. Olivier, “Correlation power analysis with a leakage model,” in Proc. Lecture Notes in Computer

Science, vol. 3156, pp. 16–29. Springer, Berlin, 2004.

4. G. T. Becker, F. Regazzoni, C. Paar, and W. P. Burleson, “Stealthy dopant-level hardware Trojans,” Proceedings of the 15th Internatinal Conference on Cryptographic Hardware and Embedded Systems (CHES) 2013, pp. 197-214.

5. Rajendran, J., Gavas, E., Jimenez, J., Padman, V. & Karri, R. (2010) Towards a comprehensive and systematic classification of

hardware Trojans, in Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on, pp. 1871 –1874. 6. Dave Evans, “The Internet of Things How the Next Evolution of the Internet Is Changing Everything,” Cisco White Paper, April

2011.

7. Soumya, V., et al. "Design and Implementation of a Generic CORDIC 8. Processor and its Application as a Waveform Generator." Indian Journal of Science and Technology 8.19 (2015).

9. Beaumont, Mark, Bradley Hopkins, and Tristan Newby. HardwareTrojans-prevention, detection, countermeasures (a literature review). No.

DSTO-TN-1012. Defence Science and Technology Organisation Edinburgh (Australia) Command Control Communications and Intelligence Div., 2011.

10. VOLDER, J. E. (2000). The Birth of CORDIC. Journal of VLSI Signal Processing , 101-105.

29-33

Page 7: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

7.

Authors: Alaa M. Ali

Paper Title: Effect of Type and Percentage of Unconventional Mineral Fillers on the Performance of Hot Mixed

Asphalt

Abstract: There were several studies, analysis and research projects concerning the performance, practicability and

environmental suitableness of using recycled products in highway construction. There are plenty of local waste

materials that might be utilized effectively as mineral filler in hot mix asphalt concrete (HMA) rather than traditional

limestone dust. The main objective of this study is to explore through an experiment the effect of amount and quality

of appending three different unconventional types of mineral filler include waste glass beads (WGB), local loam

redbrick dust (LRD) and coal fly ash (CFA) as proposed alternative materials instead of the traditional limestone

powder (LSP). for this purpose, a comprehensive laboratory-testing program was performed to determine the effect of

different sorts and amounts of those fillers on the engineering and mechanical properties of HMA, and then verify the

consequents on design properties and performance of the surface layer of flexible pavement. Based on this

investigational program, it is verified that fillers comprise important influence on the properties of HMA mixtures. In

addition, inclusion of theses non-conventional fillers could be utilized efficiently in asphalt-concrete mixture as a

replacement in terms of stability, deformation and voids characteristics.

Keywords: Mineral Filler, Waste Materials, Hot Mixed Asphalt, Flexible Pavement.

References: 1. Puzinauskas VP (1999), Filler in asphalt mixtures.The Asphalt Institute Research Report 69-2, Lexington, Kentucky.

2. Tunniclif, D. G. (1992). “A Review of Mineral Filler” Proceedings of Asphalt Association of Paving Technologists. v. 31, pp. 118 – 150. 3. Kim, Little and Song, “Mechanistic evaluation of mineral fillers on fatigue resistance and fundamental material characteristics,” TRB

Annual Meeting, Paper no. 03-3454, 2003.

4. "Glasphalt utilization dependent upon availability" Roads & Bridges, February 1993. 5. D. Whiteoak, The Shell Bitumen Handbook, Thomas Telford, London, UK, 1991.

6. Moghadas F, Azarhoosh AR, Hamedi GH. Influence of using nonmaterial to reduce the moisture susceptibility of hot mix asphalt. Constr Build

Mater 2012;31:384–8. 7. Kok BV, Yilmaz M. The effects of using lime and styrene–butadiene–styrene on moisture sensitivity resistance of hot mix asphalt. Constr. Build

Mater 2009; 23:1999–2006.

34-38

8.

Authors: Ritu Maheshwari, Anil Rajput, Anil K. Gupta

Paper Title: “VCPHCF-RTT” Estimation in Private Virtual Cloud Infrastructure

Abstract: For the security of proposed model of Private Virtual Cloud Infrastructure model, Security Agent

technique has been designed to fight against IP-Spoofing based DDoS Attacks. Virtualization Enhancement has been

done in Cloud using proposed and designed Security Agent VCPHCF-RTT. Performance Parameters have been

analysed after introspection to existing cloud security mechanisms and tried to resolve focussed Research Problem,

Issues and Challenges. VCPHCF-RTT improves the efficiency of the probabilistic HCF technique using HCF for virtual

intermediate nodes between the Virtual Machines of Client VM and Server VM along with RTT. It helps in reducing

the probability of guessing the RTT and VCHCF parameter values at the intermediate virtual routers by the attackers.

VCPHCF-RTT technique has been examined to lessen down the probability of random IP spoofed packets correctly,

efficiently and effectively. Through this, detection rate of the malicious packets have been improved up to 99% which is

80-85% improved for probabilistic Hop Count Filtering approach and 90% improved for conventional i.e. CHCF

approach. It prevents the VM server from the IP spoofed DDoS attacks and it also eradicates the CPU cycles wastage.

VCPHCF-RTT focuses on lessening down IP spoofing based attacks. The computation time has been reduced

comparatively. Detection rate of malicious packets has been improved tremendously up to 99.7%.

Keywords: Distributed Denial of Service (DDoS), Clouds, Virtual Machines (VM), Filter, Hop Count Filtering (HCF),

Time-to-live (TTL), Virtual Cloud PHCF with RT Time (VCPHCF-RTT)

References: 1. L. Chi-Chun, H. Chun-Chieh, K. Joy, “A Cooperative Intrusion Detection System Framework for Cloud Computing Networks,” IEEE 39th

International Conference on Parallel Processing Workshops, pp. 280-284, 2010.

2. K. Kourai, T.Azumi, S. Chiba, “A Self-Protection mechanism against Stepping Stone Attacks for IaaS Clouds,” IEEE 9th International

Conference on Ubiquitous Intelligence and Computing, pp. 539-546, 2012. 3. R. Shrivastava, R. Sharma, A. Verma, “MAS based Framework to protect Cloud Computing against DDoS Attack,” International Journal of

Research in Engineering and Technology, IJRET, vol. 2(12), pp. 36-40, December, 2013.

4. L. Sheng-Wei, Y. Fang, “Securing KVM – based Cloud Systems via Virtualization Introspection,” IEEE 47th Hawaii International Conference on System Science, pp. 5028-5037, 2014.

5. A. Kumara M.A., C.D. Jaidhar, “Hypervisor and Virtual Machine Dependent Intrusion Detection and Prevention System for Virtualized Cloud

Environment,” 1st International Conference on Telematics and Future Generation Networks, pp. 1-6, 2015. 6. B.R. Swain, Bibhudatta Sahoo, “Mitigating DDoS attack and Saving Computational Time using a Probabilistic approach and HCF method,”

IEEE International Conference on Advance Computing, NIT, Rourkela, India, pp. 1170-1172, 6-7, March 2009

7. R. Maheshwari, C. Rama Krishna, M. Sridhar Brahma “Defending Network System against IP Spoofing based Distributed DoS attacks using DPHCF-RTT Packet Filtering Technique,” IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques,

KIET, Ghaziabad, India, pp. 211-214, 8th February 2014.

8. P. Jayashree, K.S. Easwarakumar, V. Anandharaman, K. Aswin, S. Raja Vijay, “A Proactive Statistical Defense Solution for DDOS Attacks in Active Networks,” 1st IEEE International Conference on Emerging Trends in Engineering & Technology, Anna University, Chennai, India, pp.

878-881, 16-18, July, 2008.

9. J. Sen, “A Robust mechanism for defending distributed denial of service attacks on web servers,” International Journal of Network Security and its Applications, vol. 3 (2), pp. 162-179, March 2011.

10. Q. Wu, R. Zheng, J. Pu, Shibao Sun, “An Adaptive Control Mechanism for Mitigating DDoS Attacks,” IEEE International Conference on

Automation and Logistics, Henan University of Science and Technology, Luoyang, China, pp. 1760-1764, 5-7, August, 2009.

11. H. Wang, C.Jin and K. Shang, “Defense Against Spoofed IP Traffic Using Hop-Count Filtering,” IEEE Transaction on Networking, vol. 15 (1),

pp. 40-53, February, 2007.

39-45

Page 8: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

12. F. Zhang, J. eng, Z. Qin, M. Zhou, “Detecting the DDoS Attacks Based on SYN proxy and Hop-Count Filter,” IEEE International Conference on Communications, Circuits and Systems, University of Electronic Science and Technology, China, pp. 457-461, 11-13, July, 2007.

13. I. B. Mopari, S.G. Pukale, M.L. Dhore, "Detection and defense against DDoS attack with IP spoofing," IEEE International Conference on

Computing, Communication and Networking, Vishwakarma Institute of Technology, Pune, India, pp. 1-5, 18-20, December, 2008. 14. C. Jin, H. Wang, K. G. Shin, “Hop-count filtering: an effective defense against spoofed traffic,” 2003, [Online]. Available:

http://www.citeseerx.ist.psu.edu

15. A. Mukaddam, I. H. Elhajj, “Hop count variability,” 6th IEEE International Conference on Internet Technology and Secured Transactions, American University of Beirut, Lebanon, pp. 240-244, 11-14, December , 2011.

16. B. Krishna Kumar, P.K. Kumar, R. Sukanesh, "Hop Count Based Packet Processing Approach to Counter DDoS Attacks," International

Conference on Recent Trends in Information, Telecommunication and Computing, PET Engineering College, Thirunelvelli, India, pp. 271-273, 12-13, March, 2010.

17. [17] A Wang, Xia, Li Ming, Li Muhai, "A scheme of distributed hop-count filtering of traffic," International Communication Conference on

Wireless Mobile and Computing, pp. 516-521, 7-9 Dec.2009. 18. [18] B. Krishna Kumar, P.K. Kumar, R. Sukanesh, "Hop Count Based Packet Processing Approach to Counter DDoS Attacks," International

Conference on Recent Trends in Information, Telecommunication and Computing, PET Engineering College, Thirunelvelli, India, pp. 271-273,

12-13, March, 2010.

9.

Authors: Khin Zezawar Aung, Nyein Nyein Myo

Paper Title: Lexicon Based Sentiment Analysis of Open-Ended Students’ Feedback

Abstract: Sentiment analysis is helpful in finding the opinion of writer’s feeling towards a specific topic. Teaching

evaluation is a useful tool of assessment for teaching and courses at many universities, colleges and schools. Mostly

close-ended questions and open- ended questions are used in teaching evaluation process. This paper used open-ended

questions to provide the opinion result for teachers’ effectiveness of teaching and over all course condition. In this

paper, teaching sentiment lexicon, Afinn lexicon and Opinion lexicon are used to get the scores of opinion words in

feedback comments. The students’ feedback comments are analyzed by using three methods and display the opinion

result as positive, negative and neutral class. According to the experimental results, the intensifier words are needed to

consider in some feedbacks to get the correct opinion result. The accuracy of Method 1 using teaching sentiment

lexicon is better than other two methods.

Keywords: Lexicon Based, Opinion Mining, Sentiment Analysis, Students’ Feedback.

References: 1. AFINN word database an affective lexicon by Finn Årup Nielsen,

http://www2.imm.dtu.dk/pubdb/views/edoc_download.php/6010/zip/imm6010.zip.

2. B. Liu “Sentiment analysis and opinion mining”. Synthesis Lectures on Human Language Technologies, May 2012, pp. 1–167. 3. C. Pong-inwong and W. Songpan (Rungworawut), “TeachingSenti- Lexicon for Automated Sentiment Polarity Definition in Teaching

Evaluation”. 10th International Conference on Semantics, Knowledge and Grids (SKG), Beijing: IEEE, 2014, pp. 84 – 91.

4. Finn Arup Nielsen, "A new ANEW: Evaluation of a word list for sentiment analysis in microblogs", ESWC2011 Workshop on Making Sense of Micro posts: March 2011, pp. 93-98.

5. G. G. Esparza, Alejandro de-Luna, Alberto Ochoa Zezzatti, Alberto Hernandez, Julio Ponce, Marco Alvarez, Edgar Cossio and Jose de Jesus

Nava, “A Sentiment Analysis Model to Analyze Students Reviews of Teacher Performance Using Support Vector Machines”, 14th International Conference on Distributed Computing and Artificial Intelligence (DCAI 2017, June, 2017, ), pp. 157-164.

6. http://www.cs.uic.edu/~liub/FBS/opinion-lexicon-English.rar

7. K. Z. Aung and N. N. Myo, “Sentiment Analysis of Students’ Comment Using Lexicon Based Approach”, 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), May, 2017, pp. 149-154.

8. L. V. Avanco, M.G.V.Nunes, “Lexicon-based Sentiment Analysis for Reviews of Products in Brazillian Portugues”, 2014 IEEE Brazillian

Conference on Intelligent Systems, pp. 277-281, 2014. 9. M. El-Masri, N. Altrabsheh, H. Mansour, A. Ramsay, “A web-based tool for Arabic sentiment analysis”, 3rd International Conference on Arabic

Computational Linguistics, ACLing 2017, November, 2017.

10. M. Hu and B. Liu, “Mining and summarizing customer reviews,” ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2004, pp. 168-177.

11. M. Taboada, J. Brooke, M. Tofiloski, K. Voll and M. Stede, “Lexicon-based methods for sentiment analysis”, Association for Computational Linguistics, 37(2), 2011, pp. 267-307.

12. M. Wen, D. Yan and C. P. Rose, “Sentiment Analysis in MOOC Discussion Forums: What does it tell us?”, Proceedings of Educational Data

Mining, 2014, pp. 1-8. 13. N. Altrabsheh, M. Cocea and S. Fallahkhair, “Sentiment analysis: towards a tool for analyzing real-time students feedback”, 2014 IEEE 26th

Internationaal Conference on Tools with Artificial Intelligence, 2014, pp.419-423.

14. P. Kaewyong, A. Sukprasert, N. Salim and F.A. Phang, “The possibility of students’ comments automatic interpret using Lexicon based sentiment analysis to teacher evaluation”, 3rd International Conference on Artificial Intelligence and Computer Science (AICS2015), 2015, pp.

179-189.

15. Q. Rajput, S. Haider and S. Ghani, “Lexicon-Based Sentiment Analysis of Teacher’s Evaluation”, Applied Computational Intelligence and Soft Computing, Hindawi Publishing Corporation, vol. 2016, September 2016.

19. Z. Nasim, Q. Rajput and S. Haider , “Sentiment analysis of student feedback using machine learning and lexicon based approaches”,

International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, Malaysia, July, 2017.

46-51

10.

Authors: Tushar Kaushik, Sarthak Singhal, Jayant Mandan, Kamlesh Sharma

Paper Title: Social Networking Analysis: A case study in Tools

Abstract: Social network sites like Twitter, fb, and Google Hangouts appear like the highest visited sites at the net.

They contain a large volume of dependent, semi-dependent and unstructured information about the users and

additionally the relationships amongst them. The analysis of such great amount of knowledge could be a difficult issue.

huge information forms an easy/straightforward means through that it becomes easy to scale, diversify, and

interactively analyze this vast quantity of knowledge that has many billions of rows and columns among the tables. To

perform cost-efficient method of such sizable quantity of information, special graph based tools for mining are required

so one can definitely shape the social web. A lot of such tools for analysisare accessible with their own alternatives and

advantages. Selecting associate degree applicable tool for a selected task is tough to make your mind up. This paper

focuses on numerous graphics tools which could be used to extract/analyze a great amount of knowledge.

46-51

Page 9: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Keywords: Component; Formatting; Style; Styling; Insert (Key Words)

References: 1. Mislove Alan, MarconMassimiliano,P.GummadiKrishna,”Measurement and Analysis of Online Social Networks“, Max Planck Institute for

Software Systems

2. For a historical overview of the development of social network analysis, see: Carrington, Peter J. & Scott, John "Introduction". The Sage Handbook of Social Network Analysis. SAGE.p. 1. ISBN 978-1-84787-395-8.(2011)

3. CombeDavid, LargeronChristine, Egyed-ZsigmondEl˝od and GeryMathias, “A comparative study of social network analysis tools”,

International Workshop on Web Intelligence and Virtual Enterprises 2 (2010). 4. Huisman, Mark; van Duijn, M.A.J. / Software for social network analysis. Models and methods in social network analysis. ed. / P J Carrington;

J Scott; S Wasserman. New York : Cambridge University Press, pg. 270 – 316,2005.

5. Graph and Network Analysis Dr. Derek Greene Clique Research Cluster, University College Dublin, Web Science Doctoral Summer School 2011.

6. Monclar, Rafael Studart, et al. "Using social networks analysis for collaboration and team formation identification." Computer Supported Cooperative Work in Design (CSCWD), 2011 15th International Conference on. IEEE, 2011.

7. AkhtarNadeem, JavedHira, SengarGitanjali, "Analysis of Facebook Social Network", IEEE International Conference on Computational

Intelligence and Computer Networks (CICN), Mathura, India, 27-29 September, 2013. 8. Zelenkauskaite, Asta, et al. "Interconnectedness of complex systems of internet of things through social network analysis for disaster

management." Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference on. IEEE, 2012.

9. Social Networks Overview: Current Trends and Research Challenges “November 2010 Coordinated by the ―NextMEDIA CSA. 10. Li, Jianfeng, Chen Yan, and Lin Yan. "Research on traffic layout based on social network analysis." Education Technology and Computer

(ICETC), 2010 2nd International Conference on.Vol.1, IEEE, 2010.

11.

Authors: Rakshita R, Daniel C*, Vincent Sam Jebadurai S, Sarala L, Arun Raj E, Hemalatha G

Paper Title: Influence of Stiffness and Mass Parameters on Seismic Damping of Structures

Abstract: The fundamental objective of this paper is to determine the dynamic response of the structure by the

influence of stiffness and mass parameters. In this paper, we are presenting time stepping methods to obtain solutions

for nonlinear dynamic problems in structural engineering using numerical evaluation. A benchmark structure having

three degrees of freedom is considered and analyzed using Newmark’s method for nonlinear system by implementing

the El Centro Ground acceleration and time values. The results of the study detail the reduction in displacement of the

structure for the arbitrary increase in percentage of the mass and stiffness of the system to obtain the optimum mass and

stiffness that can be additional to the damping devices.

Keywords: Damper, Displacement, Earthquake, Newmark’s.

References: 1. Fajfar, P. (2000). A nonlinear analysis method for performance-based seismic design. Earthquake spectra, 16(3), 573-592. 2. Deierlein, G. G., Reinhorn, A. M., & Willford, M. R. (2010). Nonlinear structural analysis for seismic design. NEHRP seismic design technical

brief, 4, 1-36.

3. Vamvatsikos, D., & Cornell, C. A. (2002). Incremental dynamic analysis. Earthquake Engineering & Structural Dynamics, 31(3), 491-514. 4. Neuenhofer, A., & Filippou, F. C. (1997). Evaluation of nonlinear frame finite-element models. Journal of structural engineering, 123(7), 958-

966.

5. Ramlan, R., Brennan, M. J., Mace, B. R., & Kovacic, I. (2010). Potential benefits of a non-linear stiffness in an energy harvesting device. Nonlinear dynamics, 59(4), 545-558.

6. Zhang, N. (1995). Dynamic condensation of mass and stiffness matrices. Journal of Sound and Vibration, 188(4), 601-615.

7. Vamvatsikos, D., & Fragiadakis, M. (2010). Incremental dynamic analysis for estimating seismic performance sensitivity and uncertainty. Earthquake engineering & structural dynamics, 39(2), 141-163.

8. Richardson, M. H. (1977). Derivation of mass, stiffness and damping parameters from experimental modal data. Hewlett Packard Company,

Santa Clara Division, 1, 1-6. 9. Flanigan, C. C. (1998, February). Model reduction using Guyan, IRS, and dynamic methods. In proceedings-spie the international society for

optical engineering (Vol. 1, pp. 172-176).

10. Bao, Y., & Kunnath, S. K. (2010). Simplified progressive collapse simulation of RC frame–wall structures. Engineering Structures, 32(10), 3153-3162.

11. Kidder, R. L. (1973). Reduction of structural frequency equations. AIAA journal, 11(6), 892-892.

12. Aschheim, M. (2002). Seismic design based on the yield displacement. Earthquake spectra, 18(4), 581-600. 13. Ramsey, K. A. (1975). Effective measurements for structural dynamics testing. Sound and Vibration, 9(11), 24-34.

14. Aschheim, M., Tjhin, T., Comartin, C., Hamburger, R., & Inel, M. (2004). The scaled nonlinear dynamic procedure. In Structures 2004:

Building on the Past, Securing the Future (pp. 1-8).

15. Kalkan, E., & Kunnath, S. K. (2007). Assessment of current nonlinear static procedures for seismic evaluation of buildings. Engineering

Structures, 29(3), 305-316.

16. Yoshida, O., & Dyke, S. J. (2004). Seismic control of a nonlinear benchmark building using smart dampers. Journal of engineering mechanics, 130(4), 386-392.

52-62

12.

Authors: Metaga Jeremi SOGOBA, Badié DIOURTÉ, Lamissa DIABATÉ

Paper Title: Vibration Analysis-Based Diagnosis of High-Power Diesel Generator Turbocharger

Abstract: The diesel engine of a high-power generator is equipped with two turbochargers. These are mounted on the

gas exhaust above the diesel engine. Most investigative studies on vibration analysis of diesel power generators

typically focused on the main bearing line in the diesel engine, on alternator rotor [1]. Turbochargers, however, play a

very important role in the working of diesel engine. This article reports a study on the turbochargers of high-power

diesel generator. A diesel engine and its turbochargers do not bear the same mechanic loads. While the diesel engine is

the seat of violent shocks brought about by explosions in cylinders, the turbochargers are driven by the action of

exhaust gas from explosions, without being affected by explosion shocks. Despite its limitations in diesel engine

diagnosis, FFT method is adequate for a correct diagnosis of turbochargers. As a result, following several campaigns of

measurements we experimentally defined minimal admissible vibration values for turbochargers, and we detected a

defect in bearing among the turbochargers tested.

63-66

Page 10: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Keywords: Diesel generator, FFT method, high-power, turbocharger, vibration.

References: 1. Williams, J. (1996). An overview of misfiring cylinder engine diagnostic techniques based on crankshaft angular velocity measurements. SAE

paper n°960039.

2. D. CARREAU. « Surveillance des roulements par l’analyse des vibrations » - CETIM Information N° 115 3. Cours CETIM « Vibrations »

4. S.BRAUN, “Mechanical Signature Analysis” – Academic Press

5. M.SIDAHMED, Y.GRENIER, « Le traitement du signal en mécanique » - Recueil de conférences, CETIM 6. JC. LECOUFLE, « Objectif Zéro panne » - CETIM Informations N° 109

7. A. BOULENGER, « Vers le Zéro panne avec la maintenance conditionnelle » - Ed. AFNOR

8. norme ISO 95 9. BELLANGER M. (1987) : Traitement numérique du signal, Masson Paris, 643

10. CASTANIE F. (1997) : Traitement Numérique du Signal. 2. Méthodes Avancées, Édition ENSEEIHT, 546 11. Metaga Jeremi S. (2016) : Diagnostic de groupes électrogènes diesels de forte puissance par analyse des vibrations, thèse de doctorat, 161

13.

Authors: Anurag Tamrakar, V. B. Reddy

Paper Title: An Associative Binary Particle Swarm Optimization for the Diagnosis of Transformer Failure

Abstract: In this paper an associative binary particle swarms optimization (BPSO) for the diagnosis of transformer

failure. In this approach transformer oil gas have been considered for the fault diagnosis so that proper functionality of

transformer can be enhanced and the efficiency of transformer can be improved. For this dissolve gas analysis (DGA)

and IEC standards have been used for weight assignment of different gas ratios. Rule mining have been applied where

these standards fails in the weight assignments. Finally based on the rules associates with different gas ratios have been

analyzed separately for each clusters. Finally based on BPSO faults have been diagnosed in several iterations. The

results clearly indicate that our approach has better fault diagnosis and individual gas associations.

Keywords: BPSO, Associations Rules, DGA and IEC Standards.

References: 1. DiGiorgio JB. Dissolved gas analysis of mineral oil insulating fluids. DGA Expert System: A Leader in Quality, Value and Experience. 2005;

1:1-7. 2. Netam G, Yadav A. Fault detection, classification and section identification on distribution network with D-STATCOM using ANN.

International Journal of Advanced Technology and Engineering Exploration. 2016 Oct 1; 3(23):150.

3. Sarma DS, Kalyani GN. ANN approach for condition monitoring of power transformers using DGA. In TENCON 2004. 2004 IEEE Region 10 Conference 2004 Nov 21 (Vol. 100, pp. 444-447). IEEE.

4. Mansour AM. Decision tree-based expert system for adverse drug reaction detection using fuzzy logic and genetic algorithm. International

Journal of Advanced Computer Research. 2018 May 1; 8(36):110-28. 5. Mohamed MH, Waguih HM. A proposed academic advisor model based on data mining classification techniques. International Journal of

Advanced Computer Research. 2018 May 1; 8(36):129-36.

6. Khinchi A, Prasad MP. Control of electronic throttle valve using model predictive control. International Journal of Advanced Technology and Engineering Exploration. 2016 Sep 1; 3(22):118.

7. Quach XH, Hoang TL. Dealing with fuzzy ontology integration problem by using constraint satisfaction problem. International Journal of

Advanced Computer Research. 2017 May 1; 7(30):81. 8. Wu S. A PID controller parameter tuning method based on improved PSO. International Journal of Advanced Computer Research.

2018;8(34):41-6.

9. Bhaskar SV. A study on exhaust gas temperature and emission characteristics of a compression ignition engine fueled with transesterified rice bran oil. International Journal of Advanced Technology and Engineering Exploration. 2018; 5(44): 195-200.

10. Elkader SA, Elmogy M, El-Sappagh S, Zaied AN. A framework for chronic kidney disease diagnosis based on case based reasoning.

International Journal of Advanced Computer Research. 2018 Mar 1; 8(35):59-71. 11. Lin CH, Wu CH, Huang PZ. Grey clustering analysis for incipient fault diagnosis in oil-immersed transformers. Expert Systems with

Applications. 2009 Mar 1; 36(2):1371-9.

12. Da Silva AC, Castro AR, Miranda V. Transformer failure diagnosis by means of fuzzy rules extracted from Kohonen Self-Organizing Map. International Journal of Electrical Power & Energy Systems. 2012 Dec 1; 43(1):1034-42.

13. Sun HC, Huang YC, Huang CM. Fault diagnosis of power transformers using computational intelligence: A review. Energy Procedia. 2012 Jan

1; 14:1226-31. 14. Yu S, Zhao D, Chen W, Hou H. Oil-immersed power transformer internal fault diagnosis research based on probabilistic neural network.

Procedia Computer Science. 2016; 83:1327-31.

15. Doostan M, Chowdhury BH. Power distribution system fault cause analysis by using association rule mining. Electric Power Systems Research.

2017; 152:140-7.

16. Bandara DU, Kumara JR, Fernando MA, Kalpage CS. Possibility of blending sesame oil with field aged mineral oil for transformer

applications. InIndustrial and Information Systems (ICIIS), 2017 IEEE International Conference on 2017 (pp. 1-4). IEEE. 17. Kalathiripi H, Karmakar S. Fault analysis of oil-filled power transformers using spectroscopy techniques. InDielectric Liquids (ICDL), 2017

IEEE 19th International Conference on 2017 Jun 25 (pp. 1-5). IEEE.

18. Sekar K, Mohanty NK. Data mining-based high impedance fault detection using mathematical morphology. Computers & Electrical Engineering. 2018 Jul 31; 69:129-41.

19. Ayalew Z, Kobayashi K, Matsumoto S, Kato M. Dissolved Gas Analysis (DGA) of Arc Discharge Fault in Transformer Insulation Oils (Ester

and Mineral Oils). In 2018 IEEE Electrical Insulation Conference (EIC) 2018 Jun 17 (pp. 150-153). IEEE.

67-71

14.

Authors: V. Kakulapati

Paper Title: Prioritization of Key Objectives During Floods

Abstract: Now a day social networks generates large volume of data per sec and one of such network is Twitter.

Twitter is one of the popular public platforms with an extract of openly express user’s opinion. Our work aims focus on

tweets generated in regard to floods and especially the tweets posed by those affected by floods so that we may

prioritize objectives in order to facilitate aid and relief to those affected people. This task is accomplish by identifying

the needs and requirements of the survivors of these calamities using responses via twitter analysis, these needs and

requirements are certain objectives such as provisioning of food, tents for people, etc., all of these objectives can be

prioritize based on certain words used by the survivors and transforming into tokens. These token are called as lexical

72-75

Page 11: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

normalization. In this work we analyze the lexical normalization of data generated by twitter by applying various

techniques and visualize the investigations as the techniques are applied to process raw data from Twitter.

Keywords: Priority, Lexical, Tweets, Floods, Token, Opinion.

References: 1. Brooks, Nick, and W. Neil Adger. "Country level risk measures of climate-related natural disasters and implications for adaptation to climate

change Nick Brooks and W. Neil Adger Tyndall Centre for Climate Change." (2013).

2. Datar, Ashlesha, Jenny Liu, Sebastian Linnemayr, and Chad Stecher. "The impact of natural disasters on child health and investments in rural

India." Social Science & Medicine 76 (2013): 83-91. 3. Chung, D.S., Nah, S.: Media credibility and journalistic role conceptions: views on citizen and professional journalists among citizen

contributors. J. Mass Media Ethics 28(4), 271–288 (2013)

4. Li, R., Lei, K.H., Khadiwala, R., Chang, K.-C.: TEDAS: a Twitter-based event detection and analysis system. In: Proceedings of 28th International Conference on Data Engineering, pp. 1273–1276 (2012)

5. Lingad, J., Karimi, S., Yin, J.: Location extraction from disaster-related microblogs. In: Proceedings of the 22nd International World Wide Web

Conference Companion, pp. 1017–1020 (2013). 6. Unankard, S., Li, X., Sharaf, M., Zhong, J., Li, X.: Predicting elections from social networks based on sub-event detection and sentiment

analysis. In: Benatallah, B., Bestavros, A., Manolopoulos, Y., Vakali, A., Zhang, Y. (eds.) WISE 2014. LNCS, vol. 8787, pp. 1–16. Springer,

Heidelberg (2014). doi:10.1007/978-3-319-11746-1 1. 7. M. Hu and B. Liu, “Mining and Summarizing Customer Reviews,” in Proceedings of the Tenth ACM SIGKDD International Conference on

Knowledge Discovery and Data Mining, 2004, pp. 168–177.

8. Sakaki, T., Okazaki, M., Matsuo, Y.: Tweet analysis for real-time event detection and earthquake reporting system development. IEEE Trans. Knowl. Data Eng. 25(4), 919–931 (2013).

9. X. Ding, B. Liu, and P. S. Yu, “A Holistic Lexicon-based Approach to Opinion Mining,” in Proceedings of the 2008 International Conference on

Web Search and Data Mining, 2008, pp. 231–240. 10. M. Taboada, J. Brooke, M. Tofiloski, K. Voll, and M. Stede, “Lexicon-Based Methods for Sentiment Analysis,” Computational Linguistics, vol.

37, no. 2, pp. 267–307, 2011.

11. M. Z. Asghar, A. Khan, S. Ahmad, M. Qasim, and I. A. Khan, “Lexicon-enhanced sentiment analysis framework using rule-based classification scheme,” PLOS ONE, vol. 12, no. 2, pp. 1–22, 2017.

12. Z. Jin, Y. Yang, X. Bao and B. Huang, "Combining user-based and global lexicon features for sentiment analysis in twitter," 2016 International

Joint Conference on Neural Networks (IJCNN), Vancouver, BC, 2016, pp. 4525-4532. 13. Turney, P.D., Littman, and M.L.: Measuring Praise and Criticism: Inference of Se-mantic Orientation from Association. ACM Transactions on

Information Systems (2003) 315–346

14. Kamps J., Marx, M., Mokken, R.J.,: Using WordNet to Measure Semantic Orientation of Adjectives. LREC vol. IV (2004) 1115–1118. 15. https://x.company/loon/

16. http://www.southoxon.gov.uk/services-and-advice/environment/ severe-weather/flooding/flood-plans-0”

15.

Authors: K. Lakshmi Prasanna, Jangala. Sasi Kiran, K Sreerama Murthy

Paper Title: Significance of Metadata and Data Modeling of Metadata by using Mark Logic

Abstract: Metadata means data about data which illustrates, traces, and is simple to locate a resource. Metadata has

been impacting almost every firm. It has become mandatory for organizations to know the data flow across business

processes to take strategic decisions. But, collecting metadata across departments/business processes and putting into a

commonality is very difficult by using conventional databases. We need to concentrate on the metadata managing

technologies. There are data models that are designed which work on NOSQL database. Envelope pattern in Marklogic

provide commonality for the metadata across processes. The data that is gathered across different processes need to be

managed in a consistent way. We want to verify metadata management in banking domain. In this paper, we have

ingested metadata across multiple departments in banking domain and verified the performance of search results.

Keywords: Metadata; Data modeling; Mark logic; envelope pattern.

References: 1. Alink, W. "XIRAF: An XML-IR Approach to Digital Forensics." Master's Thesis,UOT, 2005.

2. Alink, W., et.al. "XIRAF – XML-Based Indexing and Querying for Digital Forensics." Digital Investigation (2006): S50-S58. 3. Pete et.al. “A Final ‘Word’: Part 6 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. January 22, 2008.

http://xqzone.marklogic.com/columns/smallchanges/”

4. Pete. et.al. “Running (a.k.a. -ing) with Word: Part 4 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. December 18, 2007. http://developer.marklogic.com/smallchanges/2007-12-18.xqy.

5. Simon et.al. "Information Leakage Caused by Hidden Data in Published Documents." IEEE Security and Privacy 2, no. 2 (2004): 23-27.

6. Menoti, David. “Segmentation of Postal Envelopes for Address Block Location: an approach based on feature selection in wavelet space”. January 10, 2003. IEEE 10.1109/ICDAR.

7. S, Decker.”The Semantic Web: the roles of XML and RDF”, IEEE Internet Computing Volume: 4, Issue: 5, Sep/Oct 2000.

8. Aven, Pete. “Excel-ing with XQuery: Part 2 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. December 4, 2007. http://xqzone.marklogic.com/columns/smallchanges/2007-12-04.xqy.

9. Ding, Ying. “The Research on data semantic description framework using RDF/XML”. 2005 First International Conference on Seman tics,

Knowledge and Grid, 10.1109/SKG.2005.127. 10. Aven, Pete. “A Final ‘Word’: Part 6 in a series on MarkLogic Server and Office 2007.”

11. Chauha, Hitesh.” Error Handling Framework for Data Lakes”.

12. Caloyannides, Michael A. "Digital 'Evidence' Is Often Evidence of Nothing." In Digital Crime and Forensic Science in Cyberspace, edited by Panagiotis Kanellis, 334-39. Hershey, PA: Idea Group, 2006.

13. Caloyannides, Michael A., Michael A. Caloyannides. Privacy Protection and Computer

14. Forensics. 2nd ed, Artech House Computer Security Series. Boston: Artech House, 2004. [Seeespecially: 8-22, 32-44.] 15. Carrier, Brian. File System Forensic Analysis. Boston, MA: Addison-Wesley, 2005. [Seeespecially: "Computer Foundations" (17-45), "Hard

Disk Data Acquisition" (47-66), and "FileSystem Analysis (173-210).]

16. Casey, Eoghan. "Error, Uncertainty, and Loss in Digital Evidence." International Journal of Digital Evidence 1, no. 2 (2002). [See especially the discussions of clock offsets and log files.]

17. Chaski, Carole. "The Keyboard Dilemma and Authorship Identification." In Advances in Digital Forensics III: IFIP International Conference on

Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28-January 31, 2007, edited by Philip Craiger and Sujeet Shenoi. New York, NY: Springer, 2007.

72-75

16. Authors: M. Sugunadevi, S. P. Jeyapriya

Page 12: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Paper Title: Experimental Study on Piles with Pile Cap at Varying Position under Different Loading Conditions

Abstract: High rise buildings and offshore structures are usually constructed over foundation which comprises of

several number of piles connected together using pile cap. These piles and pile caps frequently are subjected to a

mixture of lateral, vertical as well as twisting forces. Conventional method tends to emphasis predominantly on

foundation resistance under vertical loading. The piles are essential subjected to horizontal loads along with vertical

loads. Resistance to the vertical and the lateral loading is generally provided by base and side friction, pile-soil-pile cap

interaction between pile and surrounding soil, position of the pile cap, number of piles and piles arrangement with

respect to the loading direction. In this study, the piles are placed in the sand with pile cap i) above the soil surface at a

height of 35mm ii) pile cap bottom resting on surface of soil medium iii) pile cap top placed at the surface of soil and

iv) pile cap placed below soil surface to a depth of about 35mm. Experimental analysis were carried out for all the

above cases under vertical, lateral and combined loading conditions. Parameters like position of the pile cap, quantity of

piles and their arrangements were varied and analysed. The test results reveal that the pile cap placed below the soil

surface increases lateral resistance capacity of the piles in the range of 56% to 66% compared with pile cap placed

above the soil surface under both independent and combined loading conditions in cohesionless soil.

Keywords: Cohesion less Soil, Lateral Resistance Capacity, Pile Foundations, Pile cap, Pile - Soil - Pile Cap

Interaction

References: 1. Y. K. Chow and C. I. Teh “Pile-Cap-Pile-Group Interaction in Nonhomogeneous Soil”, Journal of Geotechnical Engineering, Vol. 117, No. 11,

1991, pp. 1655-1668.

2. P. J. Hararika and U.K. Nath, “Finite Element Analysis of Pile-Soil-Cap Interaction under Lateral Load”, Indian Geotechnical Conference, GEOtrendz, 2010, pp. 809-812.

3. B. Jegatheeswaran and K. Muthukkumaran, “Behavior of Pile due to Combined Loading with Lateral Soil Movement”, International Journal of

Geo-Engineering, 2016, pp. 1-10. 4. S. Karthigeyan, V. V. G. S. T. Ramakrishna and K. Rajagopal, “Numerical Investigation of the Effect of Vertical Load on the Lateral Response

of Piles”, Journal of Geotechnical and Geoenvironmental Engineering, Vol. 133, 2007, pp. 512-521.

5. J. B. Kim, R. J. Brungraber and L. P. Lai, “Pile Cap Soil Interaction from Full-Scale Lateral Load Tests”, Journal of Geotechnical Engineering, ASCE, Vol. 105, No. 5, 1979, pp.643-653.

6. Michael C. McVay, Limin Zhang, Sangjoon Han and Peter Lai, “Experimental and Numerical Study of Laterally Loaded Pile Groups with Pile

Caps at Variable Elevations”, Transportation Research Record, 2003, pp. 12-18. 7. R. L. Mokwa and J. M. Duncan, “Experimental Evaluation of Lateral-Load Resistance of Pile Caps”, International Journal of Geotechnical

Engineering, Vol. 27, No. 2, 2001, pp.185-192.

8. R. L. Mokwa,” Investigation of the Resistance of Pile Caps to Lateral Loading”, Ph. D thesis, Virginia Polytechnic Institute and State University, Blacksburg, USA,1999.

9. U. K. Nath and P. J. Hazarika, “Lateral Resistance of Pile Cap-An Experimental Investigation”, International Journal of Geotechnical

Engineering, Vol. 7, No. 3, 2013, pp. 266-272. 10. S. Narashimha Rao, V. G. S. T. Ramakrishna and M. Babu Rao, “Influence of Rigidity on Laterally Loaded Piles Groups in Marine Clay”,

Journal of Geotechnical and Geoenvironmental Engineering, Vol. 124, 1998, pp.5 42-549.

11. H. G. Polous and E. H. Davis, “Pile foundation analysis and design”, John Wiley & Sons, Inc. New York, 1971. 12. K. M. Rollins and E. Stenlund, “Laterally loaded pile cap connections”, Revised Final Report, Brigham Young University, Provo, UT, USA.

13. Utpal K. Nath and Palash J. Hazarika, “Study of Pile Cap Lateral Resistance Using Artificial Neural Networks”, International Journal of

Computer Applications, Vol. 21, No. 1, 2011, pp. 20-25. 14. Varun Maru and M. G. Vanza, “Lateral Behaviour of Pile Under the Effect of Vertical Load”, Journal of Information, Knowledge and

Research in Civil Engineering, Vol. 4, No. 2, 2017, pp. 482-485.

79-83

17.

Authors: Arun Solomon.A, Hemalatha.G

Paper Title: Experimental Investigation of Insulated Concrete Form (ICF) Wall Panels under Quasi Static Cyclic

Load

Abstract: Insulated Concrete Form (ICF) is a promising construction technique that provides fast construction, energy

efficient, cost effective, sound proof and disaster resistant building. ICF is made from expanded polystyrene (EPS) and

reinforced concrete. EPS occupies permanent position on the surface of concrete wall that offers insulation and

structural benefits to the building. In this study, quasi-static cyclic load behavior of ICF wall panels were examined and

test results were reported. ICF wall panels were made with 60 mm thick core concrete and 100 mm thick of 12, 20

kg/m3 density EPS provided as a facesheet. The specimens were tested in 100 T capacity loading frame under

horizontal quasi-static cyclic load. The experimental results were analyzed with hysteresis loops and load-deflection

curves. From the study of cyclic load behavior and literature, ICF wall panel is recommended for the construction of

seismic resistant buildings.

Keywords: Energy Dissipation, EPS, ICF, Hysteresis Loops, Load-deflection Curve

References: 1. I. Ricci, M. Palermo, G. Gasparini, S. Silvestri, and T. Trombetti, “Results of pseudo-static tests with cyclic horizontal load on cast in situ

sandwich squat concrete walls,” Eng. Struct., vol. 54, pp. 131–149, 2013. 2. J. S. Joseph, H. Gladston, and V. Vellapandi, “Development of Link Column Frame System for Seismic Resistance of Reinforced Concrete

Structures,” Adv. Civ. Eng. Mater., vol. 7, no. 3, p. 20170106, 2018.

3. S. A. Mousavi, S. M. Zahrai, and A. Bahrami-Rad, “Quasi-static cyclic tests on super-lightweight EPS concrete shear walls,” Eng. Struct., vol. 65, pp. 62–75, 2014.

4. P. Dusicka and T. Kay, “Seismic Evaluation of a Green Building Structural System:ICF Grid Walls,” Proc. 2009 Struct. Congr. - Don’t Mess

with Struct. Eng. Expand. Our Role, pp. 2475–2481, 2009. 5. P. Dusicka and T. Kay, “In-Plane Lateral Cyclic Behavior of Insulated Concrete Form Grid Walls,” J. Struct. Eng., vol. 137, no. 10, pp. 1075–

1084, 2011. 6. A. Arun Solomon and G. Hemalatha, “Inspection of properties of Expanded Polystyrene (EPS), Compressive behaviour, bond and analytical

examination of Insulated Concrete Form (ICF) blocks using different densities of EPS,” Int. J. Civ. Eng. Technol., vol. 8, no. 1, pp. 209–221,

2017. 7. T.N.Salonikios, A.J.Kappos, I.A.Tegos and G.G.Penelis, "Cyclic Load Behavior of Low-Slenderness Reinforced Concrete Walls: Design Basis

84-88

Page 13: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

and Test Results" ACI structural Journal, pp. 649-660

18.

Authors: Arunraj E, Hemalatha G, Ramya M, Arun Solomon A, Elizabeth Amudhini Stephen

Paper Title: Optimization of Regular Lattice Structure for Maximum Shear Capacity

Abstract: The present study was undertaken to optimize the shear strength of the regular hexagonal, triangle and

square lattice structure which can be used in the exterior beam column joint. Here, shear strength and shear stress values

are compared to the normal exterior beam column joint which is detailed as per IS13920:2016 and IS456:2000.

Optimization of the shape of the unit cell was carried out to obtain maximum shear stress. The optimum shear stress of

lattice unit cell is found by varying the thickness and length of lower limit and upper limit. The unit cell of 10mm is

taken as a maximum length and the thickness is varied for various shapes. Genetic Algorithm which is a non –

traditional optimization is used for optimizing the shear stress.

Keywords: Regular lattice; Genetic algorithm; Shear strength

References: 1. Gibson, L.J, Ashby.M.F, “Cellular Solids: Structure and properties”, second ed., Cambridge University Press, Cambridge, 1997.

2. Evans, A.G, “Lightweight materials and structures”, Materials Research Bulletin 26(2001), 790–797.

3. Pan, Shi-Dong, Lin-Zhi Wu, and Yu-Guo Sun. "Transverse shear modulus and strength of honeycomb cores." Composite Structures 84.4 (2008), 369-374.

4. Kelsey, S, R. A. Gellatly, B. W. Clark, “The shear modulus of foil honeycomb cores: A theoretical and experimental investigation on cores used

in sandwich construction”, Aircraft Engineering and Aerospace Technology 30.10 (1958): 294-302.

5. Masters, I. G., and K. E. Evans. "Models for the elastic deformation of honeycombs." Composite structures 35.4 (1996), 403-422.

6. Sorohan, Ştefan, et al, “Estimation of Out of Plane Shear Moduli For Honeycomb Cores With Modal Finite Element Analyses”, Ro.J.Techn

Sci,Appl Mechanics, Vol. 61(2016), 71-88. 7. Ingle, R. K., and Sudhir K. Jain. "Explanatory examples for ductile detailing of RC buildings." IITK-GSDMA Project Report on Building Codes,

I IT, Kanpur, India, 2005. 8. Young, Warren Clarence, and Richard Gordon Budynas. Roark's formulas for stress and strain. Vol. 7, McGraw-Hill, New York, 2002.

9. Wang, A-J, and D. L. McDowell, “In-plane stiffness and yield strength of periodic metal honeycombs”, Journal of engineering materials and

technology 126.2 (2004): 137-156. 10. Cote, François, Vikram Deshpande, and Norman Fleck, “The shear response of metallic square honeycombs." Journal of Mechanics of Materials

and Structures 1.7 (2006), 1281-1299.

11. Xie, H., et al, “Study on the out of plane shear properties of super alloy honeycomb core”, 18th Int. Conf. on Composite Materials. 12. Andrews, E.W, et al, “Size effects in ductile cellular solids. Part II: experimental results”, International Journal of Mechanical Sciences 43.3

(2001), 701-713.

13. Ashby, Michael F, and RF Mehl Medalist. “The mechanical properties of cellular solids”, Metallurgical Transactions 14.9 (1983), 1755-1769. 14. R. Akbari Alashti, S. A. Latifi Rostami and G. H. Rahimi, “Buckling Analysis of Composite Lattice Cylindrical Shells With Ribs Defects”, IJE

Transactions A: Basics Vol. 26, No. 4 (April 2013) 411-420.

15. Indian Standard, IS 456: 2000, Plain and Reinforced Concrete Code of Practice (2000). 16. IS 13920: 2016, Ductile Design and detailing of reinforced concrete structures subjected to seismic forces Code of practice.

17. Amiri GG, Massah SR, Boostan A. “Seismic response of 4-legged self-supporting telecommunication towers”. International Journal of

Engineering. 2007 Aug;20(2). 18. J.Zhang and M.F.Ashby, “The out-of-plane properties of honeycombs”, International Journal of Mechanical Sciences, 34.6(1992), 475-489.

19. S.D.Pan, L.Z.Wu, Y.G.Sun. “Transverse shear modulus and strength of honeycomb cores”, Composites Structures, 84.4(2008): 369-374.

20. S.D.Pan, L.Z.Wu, Y.G.Sun, Z.G.Zhou and J.L.Qu, “Longitudinal shear strength and failure process of honeycomb cores”, Composites Structures, 72.1(2006): 42-46.

21. Rastgar, M., and H. Showkati. "Field Study and Evaluation of Buckling Behavior of Cylindrical Steel Tanks with Geometric Imperfections under

Uniform External Pressure." International Journal Of Engineering 30, no. 9 (2017): 1309-1318.

89-94

19.

Authors: M. Sivaram, D. Yuvaraj, Amin Salih Mohammed, V. Porkodi, V. Manikandan

Paper Title: The Real Problem Through a Selection Making an Algorithm that Minimizes the Computational

Complexity

Abstract: Computational complexity issues are gaining increasing attention as information search, retrieval and

extraction techniques and methodologies mature. This paper presents the theoretical approach of computational

complexity reduction which supports information related operations in an effective and efficient manner. Three-step

approach to design paradigm will have different costs (time), will consume different amount of resource (space) and

will have some inherent risk or uncertainty. To capture these aspects, we need economic models of software that

take into account costs, space, uncertainty and schedule implications. To address this need for economic decision

making, we have proposed a method of economic modeling of information-related operations centered on an

analysis of their architecture. Although we consider that the computation problem belongs to the class of np-

complete. In this paper, our objective is to solve the real problem by an decision making algorithm that minimizes

the computational complexity.

Keywords: Hierarchical Modeling Methodology, Partitioning,

References: 1. DouglasC.Schmidt, “An overview of IP Multicasting” ,Unix Network Programming. 2. Ian Ferrel, Adrian Mettler, Edward Miller, and Ran Libeskind-Hadas, Virtual Topologies for Multicasting With Multiple Originators in

WDM Networks, IEEE/ACM Transactions on Networking, Vol. 14, NO. 1, February 2006

3. Padmini Vellore,Paul Gillard, Ramachandran,Venkatesan, Delivery Analysis of Multicasting in BitTorrent Enabled AdHoc Network (MBEAN) Routing, IWCMC’06, July 3–6, 2006, Vancouver, British Columbia, Canada.

4. K.Batri, M. Sivaram “Testing the Impact of Odd and Even Point Crossover of Genetic Algorithm Over the Data Fusion in Information

Retrieval” Volume 74, Issue Number 4, Pages643-649,European Journal of Scientific Research,2012. 5. Dhivakar B, Saravanan SV, Sivaram M, Krishnan RA. Statistical Score Calculation of Information Retrieval Systems using Data Fusion

Technique. Computer Science and Engineering. 2012;2(5):43-5.

95-100

20.

Authors: Harikrishna Bommala, S. Kiran, K. Mani Deep, Vadde Sunil Babu

Paper Title: Client Authentication as a Service in Microsoft Azure

Page 14: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Abstract: In today's Technological World, Information Security is an essential aspect for the internet applications.

Cloud computing is an increasing current class of services for any type of users of the internet. In every modern

technology like Cloud, authentication is very serious problem. So, many researchers apply various cryptography

techniques to protect the sensitive data in the cloud systems. In this research work proposed on Client-

Authentication-Verification Algorithm, Client–One- Time-Password-Authentication Algorithm, and Client -

Authentication-Storage Algorithm for security and authentication in the cloud Model. These proposed algorithms

have to provide strongest authentication mechanism to a cloud client. These techniques easily fit into any type of

service in the cloud system.

Keywords: Security, Authentication, Cryptography, Microsoft Azure Cloud.

References: 1. BH Krishna, S Kiran, G Murali, RPK Reddy “Security issues in service model of cloud computing environment” Procedia Computer

Science, 2016, published Elsevier page no: 246-251, volume no 87.

2. https://azure.microsoft.com/en-in/tools/ 3. Yu J, Wang G, Mu Y, Gao W. “An efficient generic framework for three-factor authentication with provably secure instantiation” IEEE

Transactions on Information Forensics and Security. 2014; 9(12):1–12.

4. Harikrishna Bommala, Dr.S.kiran, RPK Reddy, K.Mani Deep, “Network as a Service Model in Cloud Authentication by HMAC Algorithm” Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3623-3631 (2018) ISSN: 0975-0290.

5. B. Harikrishna, S. Kiran, R. Pradeep Kumar Reddy, “Protection on sensitive information in cloud Cryptography algorithms”, IEEE digital

Library 10.1109/CESYS.2016.7889894. 6. Lee S, Kim TY, Lee HJ. “Mutual authentication scheme for cloud computing” Future Information Communication Technology and

Applications. 2013; 235:149–57.

7. Jiang R. “Advanced secure user authentication framework for cloud computing” International Journal of Smart Sensing and Intelligent Systems. 2013 Sep; 6(4):1700–24.

8. https://visualstudio.microsoft.com/vs/features/azure/

9. Harikrishna Bommala, “https://www. scholars- press.com/catalog/details/store/gb/book /978- 620 - 2-30024-7/computer-programming-in-c?search=978-6202300247”published date 2017/8/4.

10. Kataria S, Syal R. “Secure mutual authentication for cloud environment”, International Journal of Computer Science Engineering and

Technology. 2015 Jul; 5(7):214–18. 11. Jiang R. “Advanced secure user authentication framework for cloud computing” International Journal of Smart Sensing and Intelligent

Systems. 2013 Sep; 6(4):1700–24.

12. Soni P, Sahoo M. Multi-factor authentication security framework in cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering. 2015 Jan; 5(1):1065–71.

13. Kumar DG, Rajasekaran S, Prabu R. PB verification and authentication for server using multi communication. Indian Journal of Science

and Technology. 2016 Feb; 9(5):1–6. DOI: 10.17485/ijst/2016/v9i5/87154.

101-105

21.

Authors: Aman Dubey, Sandhya Tarar

Paper Title: Evaluation of Approximate Rank-Order Clustering using Matthews Correlation Coefficient

Abstract: In this postulation, we proposed a technical review of different strategies that are generally used to

evaluate the accuracy of calculations, accuracy and F measure. We briefly discussed the points of interest and

detriments of each approach. For grouping errands, we firstly made neighbors of each picture in dataset utilizing

KD Tree and afterward bunching them utilizing Approximate Rank Order Clustering. Algorithm and watched and

demonstrate a few outcomes relating accuracy, sensitivity, specificity, F-measure and after that used Matthews

Correlation Coefficient (MCC). Since MCC is based on the four components formed in confusion matrix it is more

accurate to get the overall understanding of any algorithm over some dataset.

Keywords: Face Recognition, Face Clustering, Deep Learning, Scalability, Cluster Validity.

References: 1. C. Otto, D. Wang, and A. K. Jain, “Clustering Millions of Faces by Identity” in IEEE Transactions on Pattern Analysis and Machine

Intelligence, Volume 40, Issue 2, 2018. 2. Zhu, F. Wen, and J. Sun, “A rank-order distance based clustering algorithm for face tagging,” in IEEE Computer Vision and Pattern

Recognition, 2011, pp. 481–488.

3. Xiang Wu, Ran He, Zhenan Sun, Tieniu Tan, “A Light CNN for Deep Face Representation with Noisy Labels”, in IEEE Transactions on Information Forensics and Security, Volume 13, Issue 11, 2018. 28–28.

4. B. W. Matthews, "Comparison of the predicted and observed secondary structure of T4 phage lysozyme". Biochimica et Biophysica Acta

(BBA) - Protein Structure, 1975, pp. 442–451. 5. D. M. W. Powers, "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation", Journal of

Machine Learning Technologies, 2011 ,pp 37–63.

6. S. Boughorbel, F. Jarray, M. El-Anbari,"Optimal classifier for imbalanced data using Matthews Correlation Coefficient metric." PLoS ONE, 2017

7. D. Chicco, "Ten quick tips for machine learning in computational biology". BioData Mining, December 2017, pp 1–17.

8. G.B.Huang, M.Ramesh, T.Berg, and E.Learned-Miller, “Labeled faces in the wild: A database for studying face recognition in unconstrained environments,” University of Massachusetts, Amherst, October 2007, Tech. Rep. 07-49.

9. A.K. Jain, “Data clustering: 50 years beyond k-means,” Pattern Recognition Letters, vol. 31, no. 8, 2010, pp. 651–666.

10. J. Wang, J. Wang, G. Zeng, Z. Tu, R. Gan, and S. Li, “Scalable k-NN graph construction for visual descriptors,” in IEEE Computer Vision and Pattern Recognition. IEEE, 2012, pp. 1106–1113.

11. ] F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in IEEE Computer

Vision and Pattern Recognition, 2015. 12. ] T. Liu, C. Rosenberg, and H. A. Rowley, “Clustering billions of images with large scale nearest neighbor search,” in Proc. IEEE Winter

Conference on Applications of Computer Vision, 2007, pp. 28–28.

13. J. J. Foo, J. Zobel, and R. Sinha, “Clustering near-duplicate images in large collections,” in Proc. of the International Workshop on Multimedia Information Retrieval. ACM, 2007, pp. 21 -30.

14. [14] J. Chen, H. Fang, and Y. Saad, “Fast approximate k-NN graph construction for high dimensional data via recursive lanczos bisection,”

The Journal of Machine Learning Research, vol. 10, pp. 1989–2012, 2009. 15. C. Silpa-Anan and R. Hartley, “Optimised kd-trees for fast image descriptor matching,” in IEEE Conference on Computer Vision and

Pattern Recognition, 2008, pp. 1–8.

16. D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” arXiv preprint arXiv:1411.7923, 2014.

106-113

Page 15: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

17. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.

18. K. C. Gowda and G. Krishna, “Agglomerative clustering using the concept of mutual nearest neighbourhood,” Pattern Recognition, vol. 10,

no. 2, pp. 105–112, 1978 19. C. Muja and D. G. Lowe, “Scalable nearest neighbor algorithms for high dimensional data,” IEEE Transactions on Pattern Analysis and

Machine Intelligence, vol. 36, 2014.

20. Mythili S , Madhiya E, “An Analysis on Clustering Algorithms in Data Mining”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 1, January 2014, pg.334 – 340.

21. A.K. Jain and R. C. Dubes,"Algorithms for Clustering Data.". Prentice Hall, 1988.

22. Z. Cao, Q. Yin, X. Tang, and J. Sun, “Face recognition with learning based descriptor,” in Proc. Computer Vision and Pattern Recognition. IEEE, 2010, pp. 2707–2714.

23. V. Kazemi and J. Sullivan, “One millisecond face alignment with an ensemble of regression trees,” in IEEE Computer Vision and Pattern

Recognition, 2014, pp. 1867– 1874.

22.

Authors: Nazar Imam, Sandhya Tarar

Paper Title: Cluster Optimization using Appropriate Nearest Neighbour

Abstract: In this postulation, presents the clustering of facial images using machine learning algorithm such as

nearest neighbor and approximate rank order clustering. Clustering is a technique for classifying similar kind of

object based on their trait. Clustering of images is challenging problems and there is still a considerable measure of

work that needs to be done in this area. Problems in clustering large dataset is to choose the quantity of clusters and

evaluating the obtained clusters. Clustering regard as the most important unsupervised learning as it manages

finding a structure in an accumulation of unlabeled information. A loose meaning of clustering could be "the way

toward sorting out articles into clusters whose people are nearby one means or another. A cluster in this manner is

an accumulation of items which are "comparable" amongst them and are "divergent" to the articles which are place

with different cluster. This thesis presents a work to improve clustering method to decrease the number of clusters

in a LFW (Labeled face in wild) dataset. Previous work uses kd tree a nearest neighbor method and approximate

rank order clustering method to find cluster on LFW dataset. our proposed method implement ball tree a better

nearest neighbor algorithm to reduce the number of clusters created by previous method.

Keywords: Face Recognition, Face Clustering, Deep Learning, Scalability, Cluster Validity.

References: 1. Charles Otto, Dayong Wang, and Anil K. Jain. Clustering millions of faces by identity. arXiv preprint arXiv:1604.00989 , 2016.

2. Dayong Wang, Charles Otto, and Anil K Jain. Face search at scale. IEEE Trans. on PAMI , 2016.

3. Timo Ahonen, Abdenour Hadid, and Matti Pietikainen. Face description with local binary patterns: Application to face recognition. IEEE Trans. on PAMI , 28(12), 2006.

4. David Arthur and Sergei Vassilvitskii. k-means++: The advantages of careful seeding. In Proc. of the Eighteenth Annual ACM-SIAM

Symposium on Discrete Algorithms , 2007 5. Ting Liu, Charles Rosenberg, and Henry A Rowley. Clustering billions of images with large scale nearest neighbor search. In Proc.

WACV, 2007.

6. Duane M. Blackburn, Mike Bone, and Jonathon P. Phillips. Face recognition vendor test 2000: evaluation report. Technical report, DTIC Document http://www.dtic.mil/ dtic/tr/fulltext/u2/a415962.pdf, 2001.

7. Jie Chen, Hawren Fang, and Yousef Saad. Fast approximate k-NN graph construction for high dimensional data via recursive lanczos

bisection. The Journal of Machine Learning Research , 10, 2009. 8. Charles Otto, Brendan Klare, and Anil Jain. An efficient approach for clustering face images. In Proc. ICB , 2015.

9. Chanop Silpa-Anan and Richard Hartley. Optimised kd-trees for fast image descriptor matching. In Proc. CVPR , 2008.

10. K. He, X. Zhang, S. Ren, and J. Sun. Delving deep into rectifiers: Surpassing humanlevel performance on Imagenet classification. arXiv preprint arXiv:1502.01852 , 2015.

11. Vinod Nair and Geoffrey E Hinton. Rectified linear units improve restricted boltzmann machines. In Proc. International Conference on

Machine Learning , 2010. 12. J. Wan, D. Wang, S. Hoi, P. Wu, J. Zhu, Y. Zhang, and J. Li. Deep learning for contentbased image retrieval: A comprehensive study.

ACM Multimedia , 2014. 13. Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z Li. Learning face representation from scratch. arXiv preprint arXiv:1411.7923 , 2014.1.

Charles Otto, Dayong Wang, and Anil K. Jain. Clustering millions of faces by identity. arXiv preprint arXiv:1604.00989 , 2016.

14. Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for largescale image recognition. arXiv preprint arXiv:1409.1556 , 2014.

15. Vahdat Kazemi and Josephine Sullivan. One millisecond face alignment with an ensemble of regression trees. In Proc. CVPR , 2014.

16. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in

Neural Information Processing Systems , 2012.

17. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. Dropout: A simple way to prevent neural

networks from overfitting. The Journal of Machine Learning Research, 15(1), 2014. 18. Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. Labeled faces in the wild: A database for studying face recognition

in unconstrained environments. Technical Report 07-49, University of Massachusetts, Amherst, October 2007.

19. Paul Viola and Michael J Jones. Robust real-time face detection. International Journal of Computer Vision , 57(2), 2004. 20. Anil K Jain. Data clustering: 50 years beyond k-means. Pattern Recognition Letters , 31(8), 2010.

21. C. Zhu, F. Wen, and J. Sun. A rank-order distance based clustering algorithm for face tagging. In Proc. CVPR , 2011.

22. C. Zhu, F. Wen, and J. Sun. A rank-order distance based clustering algorithm for face tagging. In Proc. CVPR , 2011. 23. Marius Muja and David G. Lowe. Scalable nearest neighbor algorithms for high dimensional data. IEEE Trans. on PAMI , 36, 2014.

24. P. Grother and M. Ngan. Face recognition vendor test (FRVT): Performance of face identification algorithms. NIST Interagency Report

8009 , 2014. 25. Cheng Cheng, Junliang Xing, Youji Feng, Deling Li, and Xiang-Dong Zhou. Bootstrapping joint bayesian model for robust face

verification. In Proc. ICB, 2016.

114-121

23.

Authors: Rahul. K. Bhoyar, Sandeep.M. Pimpalgaonkar, Swapnil.J. Bhadang

Paper Title: Adjustable Height Belt Conveyor for Small-Scale Food Processing Unit

Abstract: In Small-scale Food processing units, material handling is taken by manually due to high capital

required for an advanced material handling system. These small units are looking a conveyor system which will

reduce manpower, space, money, and time for production. In many materials handling equipment’s, belt conveyors

122-130

Page 16: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

are popular. This paper describes a new design and development of adjustable height belt conveyorsystem which

works satisfactorily to meet design point of view. It is reliable, compact, adjustable, saves working man-hours and

increasing profitability of small units engaged in material handling. These transports are versatile and it tends to be

adjusted by the activity and its needA legitimate structuring of the adjustable height belt conveyor will influence its

productivity, working, and life expectancyOur current attempt is towards fabricating an economical adjustable belt

conveyor material unloaded by adopting the existing simple design procedure.

Keywords: Adjustable height, belt conveyor, food processing, Funnel shape hopper.

References: 1. R.K. Bhoyar, Dr. C.C. Handa,” Design Consideration of Adjustable Height and Radial Belt Conveyor System”, International Journal of

Engineering Trends and Technology, Vol. 4, pp.4377-4382, October 2013.

2. R K Bhoyar and C C Handa,” Design Consideration for radial adjustable belt conveyor system”,International. Journal of Mechanical

Engineering & Robotics. Research, Vol. 2, pp.342-347, October 2013. 3. A.M. Guthrie and J.R. Pilcher,” The design of belt conveyors for bulk sugar handling”proceedings of the south African sugar

technologists’, Moreland Technical and Engineering Consultants Ltd, pp.81-90,April 1968.

4. A.W. Roberts,” Design and application of feeders for the controlled loading of bulk solids onto conveyor belts”,The South African Institute of Materials Handling.

5. G. M. Mir, Sheikh Idrees and Nadeem Bashir, “Expanding Pitch Type Conveyor Belt for Grading, an Alternative for Walnut Processing

Industries”, An International Journal of Research & Innovation,Vol. 2, pp.177-181, June 2015. 6. M El-Gindy. M. A Baiomy, M. M Abdelhamed, and Sahar, A Mosa,” Design and fabrication of a simplified mechanical handling system of

rice straw baling operation to reduce environment pollution, Misr Journal of Agricultural Engineering, Vol 26, pp. 667- 685, April 2009.

7. Martin Bohner, Isabel Barfuss, Albert Heindl, Joachim Muller,” Improving the airflow distribution in a multi-belt conveyor dryer for spice

plants by modifications based on computational fluid dynamics” biosystems Engineering, Vol. 115, pp.339 -345, May 2013.

8. A. Daniyan *, A. O. Adeodu and O. M. Dada,” Design of a Material Handling Equipment: Belt Conveyor System for Crushed Limestone

Using 3 roll Idlers”, Journal of advancement in engineering and technology, Vol,01, pp.1-7, January 2014. 9. Lu Hong-sheng, “Shell strength of conveyor belt pulleys: theory and design” International Journal of Mechanical Science. Pergamon Press

plc,Vol. 30, No. 5, pp. 333-345, 1988.

10. Tobias Heidrich, Aria Alimi, Leon Grothues, Jens Hesselbach, Olaf Wünsch,” Cross-flowing displacement ventilation system for conveyor belts in the food industry”,Energy & Buildings, in press, September 2018.

11. S. S. Vanamane, P.A. Mane, K. H. Inamdar,” Design and its Verification of Belt Conveyor System used for Cooling of Mould using Belt

Comp Software”, International Journal of Applied Research in Mechanical Engineering, Vol.1, 2011. 12. Ramesh, P. Karunaker and L. Ramesh,” Design and Analysis of Discharging of Dust in Pneumatic Conveying System by a Screw

Conveyor Shafts “, Advance Research and Innovations in Mechanical, Material Science, Industrial Engineering and Management ,2014.

24.

Authors: K. Amarnath, G. Sanjeev, P. Surendernath, V. Kumar

Paper Title: Modelling and Scheduling of Flexible Manufacturing System

Abstract: Production scheduling of an FMS is formulated as a multi-level integer program. The structure

proposed includes machine loading, part input sequence and operation scheduling. Flexible manufacturing system is

the better option to meet the effective utilization of resources, for which scheduling is the only solution. A simple

numerical problem approach is proposed, and some computational results of simulation are analyzed and an attempt

is made in arriving general conclusions.

Keywords: The Structure Proposed Includes Machine Loading,

References: 1. Ulusoy G, and Bilge U, “Simultaneous Scheduling of machines and automated guided vehicles”, International Journal of Production

Research, Vol.31, No.12, 1993, pp 2857-2873. 2. Ilkyeong M, and Lee J, “Genetic Algorithm Application to the Job Shop Scheduling Problem with Alternative Routings”, BK21 Logistics

Team, Industrial Engineering, Pusan National University, 2000, pp 1-19. 3. Nasr N. and Elsayed E A, "Job Shop Scheduling with Alternative Machines", International Journal of Production Research, Vol. 28, No. 9,

1990, pp 1595-1609.

4. Raman N, Talbolt F B, Rachamadugu R V, “Simultaneous scheduling machines and material handling devices in automated manufacturing”, Proceedings of the second ORSA/TIMS Conference on Flexible Manufacturing Systems, 1986, pp 455-466.

131-134

25.

Authors: Liji R F, M. Sasikumar

Paper Title: An Exploration of Digital Image Inpainting Techniques

Abstract: This paper gives an overview of different digital Image Inpainting techniques used contemporarily for

image restoration and enhancement process. Inpainting, dis-occlusion, image completion, retouching and filling-in

are different terms for the same task: if an image is given with a missing section, the values in the missing area has

to be restored by its values in an undetectable way. The patches are filled in from the neighbouring pixels.

Inpainting can be used for removal of objects from an image also. Inapainting techniques are made more

sophisticated by applying Neural Network and Fuzzy logic for fast and accurate filling of patches.

Keywords: Image Inpainting, Partial Differential Equation, Curvature Driven Diffusion, Examplar- Based,

MAP, SOM.

References: 1. M. Bertalmio, G. Sapiro, C. Ballester ,V. Caselles, “Image Inpainting”. Proceedings of Siggraph, 2000,pp 417- 424.

2. T. Chan, J. Shen, “Mathematical Models For Local Deterministic Inpaintings”, Technical Report, Cam00-11, IPRG, Ucla, 2000. 3. Zhongyu Xu, Xiaoli Lian, Lili Feng, “Image Inpainting Algorithm Based on Partial Differential Equation”, ISECS, 2008.

4. M. Bertalmio, A. L. Bertozzi, G. Sapiro, Navier-Stokes, “Fluid Dynamics and Image and Video Inpainting”, IEEE, pp 355 – 362, 2001.

5. D J Florinabel, S E Juliet, Dr. V Sadasivam, “Multi Echelon Gabor Orientation Driven Morphological Inpainting based Recovery of

Digitized paintings”, IE(I) Journal – CP, Volume 90, 2009.

6. M.J. Fadili, J. L. Starck and F. Murtagh, “Inpainting And Zooming Using Sparse Representations”, The Computer Journal Advance Access

, 2007.

135-138

Page 17: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

7. George Papandreou, Petros Maragos, Anil Kokaram, “Image inpainting with a Wavelet Domain Hidden Markov Tree Model”, IEEE,2008, pp 773-776.

8. Marcelo Bertalmio, Stanley Osher, Luminita Vese, Guillermo Sapiro, “Simultaneous Structure and Texture Image Inpainting”, IEEE

Transactions on IP, Volume 12, No.8, 2003,pp 0882- 0889. 9. Eftychios, A. Pnevmatikakis and Petros Maragos, “An Inpainting System For Automatic Image Structure – Texture Restoration with Text

Removal”. ICIP,2008, pp. 2616 -2619.

10. Xiaowei Shao, Zhengkai Liu, Houqiang Li, “An Image Inpainting Approach Based on the Poisson Equation”, Computer Society IEEE, 2006.

11. Huanfeng Shen and Liangpei Zhang, “A MAP based algorithm for destriping and Inpainting of remotely sensed images”. IEEE

Transactions On Geoscience And Remote Sensing, Volume. 47, No. 5, 2009, pp 01492- 01502. 12. Timothy K Shih., Rong Chi Chang, Liang Chen Lu, Wen Chieh Ko, Chun Chia, “Adaptive Digital Image Inpainting”, Computer Society

IEEE, 2004.

13. A. Efros and T. Leung, “Texture Synthesis by non-parametric sampling”, ICCV,1997 , pp 1033-1038. 14. Alexander Wong And Jeff Orchard, “A Nonlocal Means Approach To Exemplar-Based Inpainting”, IEEE ICIP, 2008.

15. Zongben Xu and Jian Sun, “Image Inpainting by Patch propagation Using Patch Sparsity.” Transaction on IP IEEE, Volume 19, Issue

5,2010, pp 1153 – 1165. 16. Julien Mairal, Michael Elad, and Guillermo Sapiro, “Sparse representation for color image restoration”, IEEE 2008.

17. Jason C. Hung, “Exemplar-Based Image Inpainting Based On Structure Construction”, Journal Of Software, Volume 3, 2008, pp 57-63.

18. Elad, M., Starck, J.-L., Querre, P. and Donoho, D. “Simultaneous cartoon and texture image Inpainting”. ACHA, 2005,pp 340–358. 19. Dong Liu, Xiaoyan Sun, Feng Wu, Shipeng Li, and Ya-Qin Zhang, “Image Compression With Edge-Based Inpainting”, IEEE Trans. On

Cir. And Syst For Video Tech., Volume 17, Issue 10,2007, pp. 1273 – 1288.

20. Chen Bo, Wang Zhaoxia, Bai Ming, Wang Quan, Sun Zhen, “A Structure first Image Inpainting Approach Based on Self Organizing Map (SOM)”, IEEE 2010.

21. Q Wang, Z Wang, C S Chang, T Yang, “Multilayer Image Inpainting Approach Based on Neural Networks”, 5th ICNC, 2009,pp 459 – 462.

22. Rong –Chi Chang, Nick C Tang, Chia Cheng Chao, “Application of Inpainting Technology to Video Restoration”, IEEE,2008, pp 359 –

364.

23. Haomian Wang, Houquiang Li, Baoxin Li, “Video Inpainting for largely occluded moving Human”, ICME , IEEE, 2007,pp 1719 – 1722.

24. Li and Zheng, “Patch-Based Video Processing: A Variational Bayesian Approach”, IEEE Trans. Circ. Sys. Vid. Tech., Volume 19, Issue 1, 2009.

25. Dongwook Cho and Tien D.Bui, “Image Inpainting using Wavelet-based Inter and Intra Scale Dependency”, IEEE, 2008.

26. Zhaozhong Wang and Y F Li, “Watershed-Guided Inpainting for image Magnification”, IEEE, 2008.

26.

Authors: Ashish Bansal, Neha Gupta

Paper Title: Adaptive Watermarking using PSO and Fuzzy Logic Approach

Abstract: Digital Watermarking with PSO and Fuzzy Logic is an attempt to find suitable locations for inserting

watermark bits using PSO and Fuzzy Logic, by looking at the surrounding pixels and adaptively adjusting the pixel

intensity values to encode the watermark bits. The result obtained in this technique indicate that following adaptive

insertion on the pixels after finding location by PSO is even more effective to obtain better fidelity and robustness.

The inverse tradeoff between robustness and fidelity is also demising.

Keywords: Digital Watermarking, Fuzzy Logic, PSO, Robustness, Fidelity, Digital Security.

References: 1. R.Schyndel, A.Tirkel and C.Osborne, “A Digital Watermark” in Proc. IEEE International conference on Image Processing, 1994, vol.2,

pp.86-92.

2. Xia-Mu Niu and Sheng-He Sun, “Multiresolution Digital Watermarking for Still Image” in Proc. IEEE Neural Networks for Signal Processing, 2000, vol.2,

3. Ping Dong, Jovan G.Brankov, Nilolas Palastsanos, Yongyi Yang, Franck Davoine, “Signal Compression Digital Watermarking Robust

Geometric Distortions”, IEEE Transaction on image processing, December 2005, vol.14(12). 4. Charkari N.M. and Chahooki M.A.Z., “A Robust High Capacity Watermarking Based on DCT and Spread Spectrum” in IEEE International

Symposium of Signal Processing and Information Technology, 2007, pp.194-197.

5. Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong ShihandYan- Wei Lee, “A Robust Watermark Scheme for Copyright Protection” in MUE International Conference on Multimedia and Ubiquitous Engineering, 200 pp 132-137.

6. Larijani H.H.and Rad G.R., “A New Spatial Domain Algorithm for Gray Scale Images Watermarking” “ICCCE International conference

on computer and communication engineering”, 2008, pp. 157-161. 7. Fredric M.Ham and Ivica Kostanic, “Principles of Neurocomputing for Science & Engineering”, Mc.GrawHill, Singapore, 2001, pp. 136-

140.

8. Yu,P.T., Tsai H.H., and Lin J.S., “Digital Watermarking based on Neural Networks for Color Images, Signal processing, vol.81, pp.663-671.

9. J.R.Hernandez, F.Perez Gonzalez and J.M.Rodriguez, “Data Hiding for Copyright Protection of Still Images”, National conference in

image processing, Faislabad,2001. 10. Hwang M.S., Chang C.C. and Hwang K.F.,” Digital Watermarking of Images using Neural Networks”, Journal of electronic imaging,

2000, vol. 9,pp.548-555.

11. CharrierM., Cruz,D.S. and Larsson M., “JPEG 2000 , the Next Millennium Compression Standard for Still Images” in Proc. IEEE International Conference.

12. Zhang Zhi Ming, Li Rong-Yan and Wang Lei, “Adaptive Watermark Scheme with RBF Neural Networks” in Proc. 2003 of International

Conf. Neural Networks and Signal Processing,2003,vol 2. pp. 1517-1520 13. J.R.Hernandez, F.Perez Gonzalez and J.M.Rodriguez, “Data Hiding for Copyright Protection of Still Images”, National conference in

image processing, Faislabad, 2017.

139-142

27.

Authors: Sunita Panda, Padma Charan Sahu

Paper Title: Equalization of Supervised Data Trained RBFNN using MSFLA

Abstract: In order to avoid the channel distortion in signal processing recently, RBFNN based equalizers is

mentioned. Hit and trail method is the main provocation problem for design of RBFNN Equalizer. Here the

initiation is start with use of the population based optimization algorithm trained RBFNN equalizer, such as

Shuffled Frog-Leaping Algorithm as well as its modified forms. The observation is made on the basis of its

performance as compared to the other equalizers.

Keywords: RBFNN, Equalization Technique, SFLA.

143-145

Page 18: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

References: 1. Burse K., Yadav R. N., and Shrivastava S. C., 2010, Channel Equalization Using Neural Networks: A Review, IEEE Trans. On Systems,

man and cybernetics-Part C: Applications and Reviews, Vol. 40, No. 3, pp.352-357.

2. Subramanian K, Savitha R, Suresh M, 2014, A complex-valued neuro-fuzzy inference system and its learning mechanism, Neurocomputing, Vol. 123, pp. 110-120.

3. Ruan X, Zhang Y, 2014, Blind sequence estimation of MPSK signals using dynamically driven recurrent Neural Networks,

Neurocomputing, Vol. 129, pp. 421-427 4. Cui M, Liu H, Li Z, Tang Y and Guan X, 2014, Identification of Hammerstein model using functional link artificial Neural Networks,

Neurocomputing, Vol. 142, pp. 419-428

5. Chen S, Mulgrew B, Grant P. M, 1993, A Clustering Technique for Digital Communications Channel Equalization Using Radial Basis

Function Networks, IEEE Transactions on Neural Networks, Vol 4, pp, 570-579 6. Gan, M., Peng, H. and Chen, L. 2012, Global–local Optimization Approach to Parameter Estimation of RBF-type Models. Information

Sciences. Vol.197, pp.144-160

7. Çivicioğlu P., Alç M and Beṣdok E, 2005, Using an Exact Radial Basis Function Artificial Neural Network for Impulsive Noise Suppression

from Highly Distorted Image Databases, Lecture Notes in Computer Science, Vol. 3261, pp 383-391 8. Schilling RJ, Carroll JJ Jr and Al-Ajlouni AF, 2001, Approximation of Nonlinear Systems with Radial Basis Function Neural Networks,

IEEE Transactions on Neural Network, Vol. 12, No. 1, pp.1-15.

9. Yavuz, O. and Yildirim, T., 2008, Design of digital filters with bilinear transform using neural networks," 16th IEEE Conference on Signal Processing, Communication and Applications, pp.1-4.

28.

Authors: Albert Eddy Husin, Bernadette Detty Kussumardianadewi

Paper Title: Cost Performance Review on Value Engineering Optimized Floor Cover Finishing Work of High Rise

Office Building

Abstract: The need for office space in urban areas could be considered really high because of the economic

activities involved and because of its role in global economic growth. While Jakarta may seem to already possess a

lot of office buildings, it turns out that they are not enough to compensate the growing demand for office spaces,

with the demand reaching 6,928,500 m2 of rental office space at the end of 2013. Floor cover finishing is a

generalized term for the permanent cover of the floor and the works involved. Floor cover itself is a term used to

illustrate every finishing materials that would be applied on the floor structure to provide walking surfaces. The goal

of this research is to acquire any work items that are viable to be value engineered. The floor cover finishing work

is considered as the limitation of this research by the consideration of the said work to be the highest cost

contribution to the interior architecture and could be the key factor in defining the image of the company that uses

the office building. After the implementation of value engineering, the cost saving reached 12%, reducing the cost

contribution of the floor cover finishing work to 4.7% from the initial 5.4%.

Keywords: Floor cover finishing, High rise office building, Value Engineering.

References: 1. Warszawski, A., & Asce, F. (2003). “Analysis of Costs and Benefits of Tall Buildings”,

2. Miraj, Perdana, Yusuf Abdurachman, Erwin Tobing, and Antonius Ivan (2015). Developing Conceptual Design of High-Speed Railway Using Value Engineering Method: Creating Optimum Project Benefits

3. Berawi, M.A1, Miraj, P2, Gunawan3 & Husin ( 2014). Conceptual Design of Sunda Strait Bridge Using Value Engineering Approach

4. Si Hwa Bae, Sung Moon Jung (2004). A Study on the Satisfaction with Work Space in High rise Office Building. 5. Rahman, Herawati Zetha. 2013. Integrating Quality Management and Value Management Methods: Creating Value Added for Building

Projects. 6. Simanjuntak, M. R. A. (2017). The Analysis of Important Variables of The Value Engineering Model On Residential High Rise Buildings

In DKI Jakarta, Indonesia.

7. Min Seok Kim, Seung Kyu Yoo, Ju Hyung Kim, and Jae Jun Kim 2014). Study on The Major Delay Factors in Finishing Works Before Completion of Construction

8. Husin, A. E., Berawi, M. A., Dikun, S., Ilyas, T., & Berawi, A. R. B. (2015). Forecasting demand on mega infrastructure projects:

Increasing financial feasibility International Journal of Technology, 6(1), 73–83 9. Zuhaili Mohamad Ramly, Geoffrey Qiping Shen, and Ann T. W. Yu (2015). Critical Success Factors for Value Management Workshops in

Malaysia

10. Shen, Q., & Liu, G. (2003). Critical Success Factors for Value Management Studies in Construction. 11. Rajgor, M., Paresh, C., Dhruv, P., Chirag, P., & Dhrmesh, B. (2016). RII & IMPI: Effective Techniques for Finding Delay in Construction

Project. International Research Journal of Engineering and Technology (IRJET),

12. Mohammed Ali Berawi1, Teuku Yuri M. Zagloel1, Abdur Rohim Boy Berawi1, Yusuf Abdurachman (2015). Feasibility Analysis of

Trans-Sumatera Toll Road Using Value Engineering Method.

13. Francisco Loforte Ribeiro(2015). Appraisal of Value Engineering in Design Portugal

14. Amanda Cooper and Keith Potts (2015) Implementing Innovation Through Value Engineering Observations on U.K Civil Engineering Constructors.

15. Akoud, H. (1998). Value Engineering For The Practice of Architecture. New Jersey Institute of Technology.

16. SAVE International Value Society (2007). Value Standard and Body of Knowledge. 17. Ning, L. (2015). Cost Control Application Research of Value Engineering in the Design Phase of Construction Project

18. Yaman, H., & Taş, E. (2007). A building cost estimation model based on functional elements,

19. Akoud, H. (1998). Value Engineering For The Practice of Architecture. New Jersey Institute of Technology. 20. Mohammed Ali Berawi, Bambang Susantono, Perdana Miraj, Abdur Rohim Boy Berawi, Herawati Zetha Rahman, Gunawan, Albert Husin

(2014). Enhancing Value for Money of mega Infrastructure Projects Development Using Value Engineering Metho

21. Borza, J. (2011). FAST Diagrams : The Foundation for Creating Effective Function Models. Trizcon 2011, 1–10. 22. Mohammerd Ali Berawi, Bambang Susantono, Perdana Miraj, Gunawan, Abdur Rohim Boy Berawi, & Albert Husin (2015). Financial

Feasibility of The Sunda Strait Bridge Conceptual Design Using The Value Engineering Method

146-154

29.

Authors: Agil Lukose, AVN Krishna

Paper Title: Performance Evaluation of Diesel Engine using Genetic Algorithm

Abstract: Engine analysis and optimization is not a new approach to the field of automobiles. It has always been a

keen focus in the research of experts domestically as well as internationally, the control of Air-Fuel Ratio (AFR) in

transient operating conditions of engine. For the last few decades, the industry and economic expansion of

155-158

Page 19: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

developed countries has showed a clean increase in the vehicle production as well as transport volume. Global

warming, acid rain, greenhouse effect and air pollution problems related to emission of CO2, NOx, PM, CO and

unburned HC, together with the consumption of fossil fuels, unite to create serious problems at a global level.

Therefore it is a research study considering all these current issues and taking it to a new level of optimization for

the output of a better efficiency, better economy and less pollution. Performance of Diesel Engine is evaluated by

parameters like Power, Torque and Specific Fuel Consumption.

Keywords: Diesel Engine, Exhaust Gas, Genetic Algorithm,. Performance Evaluation

References: 1. T.K.Chan, C.S.Chin, ”Data Analysis to Predictive Modeling of Marine Engine Performance using Ma-chine Learning”, 2016 IEEE Region

10 Conference (TENCON)-Proceedings of the International Confer-ence, pp. 2076-2080, 2016.

2. Tayarani-N, Mohammad-H and Bennett, Adam Prugel¨ and Xu, Hongming and Yao, Xin, ”Improving the performance of evolutionary

engine calibration algo-rithms with principal component analysis”, 2016 IEEE Congress on Evolutionary Computation (CEC), pp. 5128-5137, 2016.

3. Yang, Yong and Xu, Man and Zhao, Kegang and Zhou, Sijia, ”An identification method of characteristic pa-rameters for single-cylinder

engine fuel film based on genetic algorithm”, Proceedings of the 35th Chinese Control Conference, July 27-29, 2016, Chengdu, China 4. Fangxiao, Cheng and Xudong, Liu and Xiaomei, Lin, ”Simulation Study of Optimization of GA for Vehicle Power Train”, 2011

International Conference on Internet Computing & Information Services (ICICIS), pp. 330-333, 2011.

5. Shatnawi, Yousef and Al-Khassaweneh, Mahmood, ”Fault diagnosis in internal combustion engines using extension neural network”, IEEE Transactions on Indus-trial Electronics, vol. 61, no. 3, pp. 1434-1443, 2014.

30.

Authors: Aniu Wang, Jianqiang Xu, Xingya Rui, Liufen Li

Paper Title: Study on Heat Insulation Clothing Based on Parabolic Differential Model

Abstract: With the development of industry, high temperature operation becomes a necessary work. To ensure the

safety of the work, the need for thermal insulation of clothing. In this paper, a parabolic differential model is

established to analyze the thermal insulation of professional clothing. The optimal thickness of the heat insulation

clothing is obtained under different conditions by establishing the finite difference model to solve the differential

equation. Hereby” there are some ways to design the performance of heat protective clothing to make sure that the

cost is the lowest as possible in the case of effective heat insulation.

Keywords: Parabolic differential model, Heat conduction, Simulation model.

References: 1. Artamonov, Vladimir S., Denis M. Gordienko, and Anatoly S. Melikhov. "Fire safety of ground-based space facilities on the spaceport

“Vostochny”.", Acta Astronautica, 135 (2017): 83-91. 2. Ilott, Sarah. "“We are here to speak the unspeakable”: voicing abjection in Raj Kamal Jha’s Fireproof.", Journal of Postcolonial Writing,

50.6 (2014): 664-674.

3. Todorova, Bogdana. "The new challenges on the Silk Road.", Journal of Literature and Art Studies, 5.10 (2015): 911-916. 4. Zhu, Yun Pei, et al. "Surface and interface engineering of noble-metal-free electrocatalysts for efficient energy conversion processes.",

Accounts of chemical research 50.4 (2017): 915-923.

5. Vojvodic, Aleksandra, et al. "Exploring the limits: A low-pressure, low-temperature Haber–Bosch process.", Chemical Physics Letters, 598 (2014): 108-112.

6. Binder, Maximilian, et al. "Automated Manufacturing of Sensor‐Monitored Parts: Enhancement of the laser beam melting process by a

completely automated sensor integration.", Laser Technik Journal, 15.3 (2018): 36-39.

7. Nakata, Shogo, et al. "Wearable, flexible, and multifunctional healthcare device with an ISFET chemical sensor for simultaneous sweat pH

and skin temperature monitoring.", ACS sensors, 2.3 (2017): 443-448.

159-162

31.

Authors: S. Vaishnavi Devi, D. Vignesh D. M.

Paper Title: Public Transportation Management Strategy for Temple City

Abstract: The bus Transport industry has a lion’s share in India’s economic development. Due to easy accessibility,

flexibility of operations, door to door service, the bus transportation is a boon to the public. In fact, the progress of a

nation and progress of its transport industry is complementary to each other. India has the world's fastest growing

economies today, which increased thrust on development of infrastructure in the country to reduce the traffic

congestion due to increased traffic demand. Nowadays, various mode of transportation is being used in metro cities

such as Chennai, Mumbai, Delhi, etc [2]. Comparing other modes of transportations bus transportation in India

supports for the poor and the lower middle class as an easy and affordable mode of transport. The contribution of

bus transport in GDP to the nation is of about 1.2% which is 25% of contribution of all the transportation sectors in

India [1]. Hence, to use the bus transportation effectively, bus management and depot management is necessary.

Madurai is a lotus shaped city built around the Meenakshi temple with the city streets in concentric circles. Madurai

is well versed with air transport, rail transport and bus transport network but most of the people use two wheelers

and buses for transportation. The city’s bus transportation is contributed by 16 depots totally with five depots in

zone I, two depots in zone II, three depots in zone III and six depots in zone IV to spread the bus service throughout

the city. This paper, in prior concentrates only on bus transportation, though 70% of Madurai population uses bus

transport to migrate. A study of category analysis among the depot in Madurai has described in this paper.

Keywords: Bus; Category analysis; Depot; Madurai .

References: 1. Dirk D.L. Van Oudheusden et al.,(2015), “Reducing depot-related costs of large bus operators a case study in Bangkok’’ , European

Journal of Operational Research 96 (1996) pp 45-53.

2. M.A. Forbes, J.N. Holt and A.M. Watts (2016), “An exact algorithm for multiple depot bus scheduling’’, European Journal of Operational

Research 72 (1994) pp 115-124. 3. Minzhong Xiang and Shaun Hardcastle (2013) “Bus Priority Option Tests in Microsimulation with SCATS”, Journal of traffic and

163-167

Page 20: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

transportation studies, pp 540-552. 4. OP Agarwal, (2015) “Public bus transport management systems: some international examples”, Journal of quarterly review of Regulatory

developments, pp 120-124

5. Prof.D.Srividya, Dr.R.Velkennedy, G.Sathya (2015), “Prioritization of Urban Transport system for Madurai City”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 1, Volume 2.

6. Ugur Eliiyi, Efendi Nasibov (2012), “Minimization of fuel consumption in city bus transportation: A case study for Izmir”, Procedia-Social

and Behaviour Sciences 54 (2012) 231 – 239. 7. Makrand Wagal,Ajit Pratab Singh and Srinivas Arkatkar (2013), “Real –Time Optimal Bus for a City using a DTR Model”, Procedia-

Social and Behaviour Sciences 104 (2013)845-854.

8. Mohamed Hamdouni, Francois Soumis, Guy Desaulniers (2007), “ Parking buses in a depot with stochastic arrival times”, European Journal of Operational Research 183 (2007) 502-515.

9. Senthilkumar K., (2007) “A study on risk in traffic flow and effective safety management”, Management sciences.

10. Alagappan V.,(2008) “A study on TNSTC Madurai(DIV-II). 11. TNSTC website.

32.

Authors: Arti M. Sorte, A. N. Burile, K. V. Madurwar

Paper Title: Study of Performance of Steel and Polypropylene Fiber Reinforced Concrete

Abstract: In this paper, we studied the performance of fiber reinforced concrete (FRC) with steel and

polypropylene fibers. Here M 40 grade of concrete reinforced with different percentage of steel and polypropylene

fibers was experimentally investigated for the compressive strength and tensile strength of FRC. The percentage

variation of steel fiber is taken as 0.5%, 1.0% and 1.5% by volume of concrete for steel fiber reinforced concrete

(SFRC). The percentage variation of polypropylene fiber is taken as 0.1%, 0.2% and 0.3% by volume of concrete

for polypropylene fiber reinforced concrete (PPFRC).The practical results obtained has been studied and analyzed

by comparing it with a control sample specimen (0% fiber). The relationship of compressive strength, tensile

strength vs. percentage of fiber, has been represented graphically. Observations clearly shows the significant

improvement in 28 and 45 days compressive strength and tensile strength for M 40 grade of concrete on addition of

fibers along with enhanced properties of fiber reinforced concrete.

Keywords: Compressive Strength, Polypropylene Fibers, Reinforced Concrete, Steel Fibers, Split Tensile

Strength.

References: 1. Hamid Pesaran Behbahani, Behzad Nematollahi, Majid Farasatpour, “Steel Fiber Reinforced Concrete: A Review” Conference:

Proceedings of the International Conference on Structural Engineering Construction and Management , At Kandy, Sri Lanka, 2011. 2. Milind V. Mohod , “Performance of Steel Fiber Reinforced Concrete” , Journal of Mechanical and Civil Engineering, Vol. 12, Iss.1, PP 28-

36, 2015, DOI: 10.9790/1684-12112836.

3. Reeta, Manoj, Karandeep, Mr. Amit Singhal, “Fiber Reinforced Concrete”, Int. Journal of All Research Education and Scientific Methods (IJARESM), Volume 4, Issue 7,pp155-160, 2016.

4. Ragavendra S., Praveen Reddy, Dr. Archanaa Dongre “fiber reinforced concrete- a case studys”. 33rd national Convention of Architectural

Engineers and National Seminar on ‘Architectural Engineering Aspect for sustainable building envelopes’ ArchEn-BuildEn-2017, by Institution of Engineers India in Association with Indian Association of structural Engineers, At Institution of Engineers, Khairatabad,

Hyderabad.

5. Project synopsis on "Effect of blast furnace slag on strength of gi fiber reinforced polymer concrete”, Posted 19th February 2013 by kumar mayank. (http://itskumar-mayank.blogspot.com/)

6. Muhammad Akram Akhund, Abdullah Sannd, Uroosa Memon, Shamotra Jai Oad, “Utilization of Soft Drink Tins as Fiber Reinforcement

in concrete”, Engineering science and technology international research journal, vol.1, issu. 2, pp 47-52, 2017. 7. https://www.quora.com/What-is-fiber-reinforced-concrete.

8. Nitin Kumar, Sangeeta “A Review study on use of Steel Fiber as Reinforcement Material with Concrete”, Journal of Mechanical and Civil

Engineering, Volume 12, Issue 4, PP 95-98, 2015, DOI: 10.9790/1684-12439598. 9. A.R.Pradeep , M.I.Basava, lingana Gowda “A Case Study on Strength Properties of Partially Replaced Recycled Aggregate and Steel

Fibers to A Nominal Concrete” Journal of Mechanical and Civil Engineering,Volume 13, Issue 3, PP 52-58, 2016, DOI: 10.9790/1684-

1303075258. 10. Hamid Reza Chaboki, Mansour Ghalehnovi, Arash Karimipour, Jorgede Brito,“Experimental study on the flexural behaviour and ductility

ratio of steel fibers coarse recycled aggregate concrete beams”, Construction and Building Materials,Volume 186, Pages 400-422, 2018,

https://doi.org/10.1016/j.conbuildmat.2018.07.132. 11. F.B.Varona, F.J.Baeza, D.Bru, S.Ivorra,“Evolution of the bond strength between reinforcing steel and fiber reinforced concrete after high

temperature exposure” J. of Construction and Building Materials,Volume 176, 10 July 2018, Pages 359-370,

https://doi.org/10.1016/j.conbuildmat.2018.05.065.

12. F. B. Varona, F. J. Baeza, D.Bru, S. Ivorra, “Influence of high temperature on the mechanical properties of hybrid fiber reinforced normal

and high strength concrete”, Construction and Building Materials, Volume 159, Pages 73-82, 20 January 2018.

https://doi.org/10.1016/j.conbuildmat.2017.10.129. 13. Prof. Priti A. Patel “Improvement of Shear Strength using Triangular Shape fiber in Concrete” , NBM&CW, a civil engg magzine, Aug

2010.

14. Joshua A.McMahon, Anna C. Birely, “Service performance of steel fiber reinforced concrete (SFRC) slabs” Engineering Structures, Volume 168, Pages 58-68, 2018. https://doi.org/10.1016/j.engstruct.2018.04.067.

15. ChandraSekhar Das, Tanish Dey, Ramkrishna Dandapat, Bibhuti Bhusan Mukharjee, Jitendrakumar, “Performance evaluation of

polypropylene fiber reinforced recycled aggregate concrete”, Construction and Building Materials, Volume 189, Pages 649-659, 2018, https://doi.org/10.1016/j.conbuildmat.2018.09.036.

16. Ali Mardani Aghabaglou, Suleyman Ozen, and Muhammet Gokhan Altun, “Durability performance and dimensional stability of

polypropylene fiber reinforced concrete”, Journal of Green Building, Vol. 13, No. 2, pp. 20-41, 2018. https://doi.org/10.3992/1943-4618.13.2.20.

17. Mohammed S. Imbabi, Collette Carrigan, Sean McKenna, “Trends and developments in green cement and concrete technology”,

International Journal of Sustainable Built Environment, vol. 1, pp- 194–216, 2012, DOI: 10.1016/j.ijsbe.2013.05.001. 18. Abdul Ahad, Zishan Raza Khan, Shumank Deep Srivastava, “Application of Steel Fiber in Increasing the Strength, Life-Period and

Reducing Overall Cost of Road Construction by Minimizing the Thickness of Pavement” World Journal of Engineering and

Technology,vol 3, 240-250, 2015, http://dx.doi.org/10.4236/wjet.2015.34025. 19. Rui D. Neves and Joao C. O. Fernandes de Almeida, “Compressive behaviour of steel fiber reinforced concrete”, structural concrete, pp

1464-4177, 2005. 20. BOOK-fiber Reinforced Cementitious Composites, Second Edition By Arnon Bentur, Sidney Mindess, ch steel fibers, pp 273.

21. Sharath M. Y., Sanjith J., Manjunath H. R. “Experimental Investigation on Steel Fiber Reinforced Concrete” International Journal of

168-174

Page 21: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Scientific Development and Research,Volume 2, Issue 6, pp-204-210, 2017. 22. BiaoLi,LihuaXu,YuchuanShi,YinChi,QiLiu, ChangingLi , “Effects of fiber type, volume fraction and aspect ratio on the flexural and

acoustic emission behaviors of steel fiber reinforced concrete”,Construction and Building Materials, Volume 181, Pages 474-486, 2018.

https://doi.org/10.1016/j.conbuildmat.2018.06.065. 23. https://www.seminarsonly.com/Civil_Engineering/Polymer_Modified_Steel_fiber_Reinforced_Concrete.php, Published on Feb 14, 2016.

24. IS 8112:2013, 43 Grade Ordinary Portland Cement – Specification (First Revision), Bureau of Indian Standards, New Delhi, India, 1989.

25. IS 383:1970, Specification for coarse and fine aggregates from natural sources for concrete (second revision), Bureau of Indian standards, New Delhi, India, 1970.

26. IS 456-2000, Code of Practice for Plain and Reinforced Concrete, Bureau of Indian Standards, New Delhi, India, 2000.

27. IS 10262-2009, Recommended Guidelines for Concrete Mix Design, Bureau of Indian Standards, New Delhi, India, 2009.

28. IS: 516-1959, Indian standard methods of tests for strength of concrete, Bureau of Indian Standards, New Delhi, India, 1959. 29. IS 5816-1999, Method of Test for Splitting Tensile Strength of Concrete., Bureau of Indian Standards, New Delhi, India, 1999.

33.

Authors: Vishavdeep Jindal, Jashandeep Singh

Paper Title: A Chemically Customized Ester Fluid- A More Effective Liquid for Insulation

Abstract: Mineral transformer liquids are used as dielectric liquids from a long time and preferred by power

utilities worldwide because of its good physical, mechanical & dielectric properties, ease of accessibility and low

cost. But due to environmental constraints, non-biodegradability nature and less fire resistive nature of it proves to

be destructive for surroundings as well as to the manpower dealing with it. Number of alternatives were suggested

by researchers have been implemented in distribution and power transformers. In current research work,

biodegradable modified synthetic ester fluid is proposed as an alternative to mineral transformer oil because of its

electrochemical properties such as; dielectric strength, resistivity, flash and fire point, acidity and water content

which have been practically analyzed in laboratory. Analysis reveals that ester oil has astounded fire resistive

properties and moisture tolerant liquid over mineral oil.

Keywords: Oil Insulation, Synthetic Ester (SE), Mineral Oil (MO), Fire Point, Pour Point, Breakdown Voltage

(BDV), Water Content.

References: 1. Fofana, I, Wasserberg, V., Borsi, H., and Gockenbach, E., “Challenge of mixed insulating liquids for use in high-voltage

transformers. Part 2: Investigations of mixed liquids impregnated paper insulation”, IEEE Electr. Insul. Mag.18 (04) 2002, pp. 5-16. 2. Fernandez, I., Ortiz, A., Delgado, F., Renedo, C. and Perez, S., “Comparative evaluation of alternative fluids for power transformers”,

Elect. Power Syst. Res., vol. 98, 2013, pp.58-69.

3. Aggarwal, T., Jindal, V. and Singh, J., “A review of conditioning monitoring assessment of power transformers insulation”, Int. J. Adv. Res, 4 (10), 2016, pp.1664-1674.

4. Kraweic, S., “Review of recent changes to mineral insulating oil specifications” Proc. IEEE Electr. Insul. Conf., 2009, pp. 363-367.

5. Fofana, I., Wasserberg, V., Borsi, H. and Gockenbach, E., “Challenge of mixed insulating liquids for use in high voltage transformers. Part 1: Investigation of mixed liquids”, IEEE Electr. Insul. Mag., 18 (3), 2002, pp. 18–31.

6. Liu, R., Törnkvist, C., Chandramouli, V., Girlanda, O., and Pettersson, L.A.A., “Ester fluids as alternative for mineral oil: the

difference in streamer velocity and LI breakdown voltage”, Proc. IEEE Electr. Insul. and Dielectr. Pheno. Conf., 2009, pp. 543–548.

7. Eberhardt, R., Muhr, H.M., Lick, W., Wieser, B., Schwarz, R. and Pukel, G., “Partial discharge behaviour of an alternative insulating

liquid compared to mineral oil”, Proc. IEEE Int. Electr. Insul. Symp., 2010, pp. 1–4.

8. Pukel, G.J., Eberhardt, R., Muhr, H.M., Baumann, F. and Lick, W., “Large power transformers for alternative insulating fluids”, Proc. 16th Int. High Voltage Engineering Symp, 2009, pp.1–4.

9. Oommen, T.V., Claiborne, C.C. and Walsh E.J., “Introduction of a new fully biodegradable dielectric fluid”, Proc. IEEE Tech. Annu.

Textile, Fiber and Film Industry Conf., 1998, pp.3/1–3/4. 10. Oommen T.V., “Vegetable oils for liquid-filled transformers”, IEEE Electr. Insul. Mag., 18 (1), 2002, pp. 6–11.

11. Martin, R., Athanassatou, V, et al., “New experiences in service with new insulating liquids”, CIGRE publication. CIGRE WG A2-35.

Brochure No. 436. 12. Abeysundara, D.C., Weerakoon, C., Lucas, J.R., Gunatunga, K.A.I. and Obadage, K.C., “Coconut oil as an alternative to transformer oil”,

Engg. Res. Unit. Symp., 2001, pp. 1–8.

13. Borsi, H., “Dielectric behaviour of silicone and ester fluids for use in distribution transformer”, IEEE Trans. Dielectr. Electr. Insul., 26 (4), 1991, pp.755–762.

14. Kuwahara, H., Tsuruha, K., Munemura, H. and Ishii, T., “Partial discharge characteristics of silicone liquids, IEEE Trans. Dielectr. Electr.

Insul., vol. 11, 1975, pp. 86–91. 15. McShane, C.P, Gauger, G. and Luksich, J., “Fire resistant natural ester dielectric fluid and novel insulation system for its use”, In

IEEE/PES Transmission & Distribution Conference, 1999, pp. 1–5.

16. IS: 6792: 1992 Reaffirmed 2003, “Indian standard, Method of determination of Electric Strength of insulating fluids”, First revision,

second reprint February 1998, UDC 621.315.615.2:621.17.333.6, BIS 1992.

17. Mehta, D.M., Kundu, P., Chowdhury, A., Lakhiani, V.K. and Jhala, A.S., “A review on critical evaluation of natural ester vis-à-vis mineral

oil insulating liquid for use in transformers: Part-1”, IEEE Trans. Dielectr. Electr. Insul., 23 (2), 2016, pp. 873–880. 18. Martin, R., “Esters–Their Structure and Their Properties”, CPRI National Conf. on environmental friendly insulating Liquids (EFIL), 2013,

pp. 1-16.

19. Rao, U. M., Sood, Y. R. and Jarial, R. K., “Performance analysis of alternate liquid dielectrics for power transformers”, IEEE Trans. Dielectr. Electr. Insul., 23 (4), 2016, pp.2475–2483.

20. IEEE Guide for Acceptance and Maintenance of Insulating Oil in Equipment, IEEE STD. C57.106 – 2006.

21. Cooper Power Systems, Bulletin 00092 – Product Information – Envirotemp TM FR3TM Fluid – Description, 2001. 22. Rao, U. M., Sood, Y. R. and Jarial, R. K., “Oxidation stability enhancement of a blend of mineral oil and synthetic ester”, IEEE Electr.

Insul. Mag., 32 (2), 2016, pp. 43-47.

23. Fluids for Electro-technical Applications - Unused Mineral Insulating Oils for Transformers and Switchgear, IEC 60296 - Edition 4.0 - 2012-02.

24. IS: 6792: 1992 Reaffirmed 2003, “Indian standard, Method of determination of Electric Strength of insulating fluids”, First revision,

second reprint February 1998, UDC 621.315.615.2:621.17.333.6, BIS 1992. 25. IS: 6103: 1971 Reaffirmed 2001, “Indian standard, Method of test for specific resistance (resistivity) of electrical insulating liquids”, Fifth

reprint august 1996, UDC 621.315.615:621.317.332.3, BIS 1972.

26. Mehta, D.M., Kundu, P., Chowdhury, A., Lakhiani, V.K. and Jhala, A.S., “A review on critical evaluation of natural ester vis-à-vis mineral oil insulating liquid for use in transformers: Part 1”, IEEE Trans. Dielectr. Electr. Insul. 23 (2), 2016, pp. 873–880.

27. IS: 1448 [P:21]: 2012 ISO 2719:2002, “Indian standard, Methods of test for petroleum and its products, Determination of flash point- Pensky- Martens closed cup method”, Third revision, ICS 75.080, BIS 2012.

28. Moore, S. P., Wangard, W., Rapp, K. J., Woods, D. L. and Vecchio, R. M. D., “Cold Start of a 240-MVA Generator Step-Up Transformer

filled with Natural Ester Fluid”, IEEE Trans. Power Del., 2014, pp. 256- 263.

175-181

Page 22: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

29. IS: 1448 [P:10]- 1970 Reaffirmed 2003, “Indian standard, Method of test for petroleum and its products, Cloud point and Pour point”, First revision, sixth reprint December 1998, UDC 665.6/.7:536.421.2, BIS 1971.

30. IS: 1448 [P:2] 2007 ISO 6619:1988, “Indian standard, Methods of test for petroleum and its products, Petroleum products and lubricants-

neutralization number- Potentiometric Titration Method”, Second revision, ICS 75.160.30, BIS 2007. 31. IS 13567:1992 Reaffirmed 2003, “Indian standard, Determination of water in insulating liquids and in oil- impregnated paperand

pressboard by automatic coulometric Karl Fischer titration- method of test”, UDC 621.315.615/ 621.315.64/65: 543.812, BIS 1992.

32. IS: 335: 1993 Reaffirmed 2005, “Indian standard, New Insulating Oils- specification”, Fourth revision, third reprint September 1998, UDC 621.315.615.2, BIS 1993.

33. Darwin, A., Perrier, C. and Folliot, P., “The use of natural ester fluids in transformers”, MatPost, III Europian Conf. on HV & MV

substation equipment.

34.

Authors: S. Karthik, M. Sudha

Paper Title: A Survey on Machine Learning Approaches in Gene Expression Classification in Modelling

Computational Diagnostic System for Complex Diseases

Abstract: In recent days, the survivability of people around the world has increased in a higher rate. The notable

reason is the impact of the evolution of new technologies in medical systems that are invented to provide and

improve healthcare for peoples. But still, there are some diseases, which may be identified also can be controlled.

But there isn’t any permanent solution for them such as cancer, psychiatric disorders etc. For those diseases,

medical practitioners finds some way to discover medicine by analyzing the patient’s genetic information such as

DNA. Microarray technology is helpful in capturing biological genetic information to computer data.

Computational techniques can be applied on those large set of genetic data of every individuals with or without

disease, so that the genes that are responsible for the disease occurrence can be pointed out. Differentially Expressed

Genes (DEG) are identified using many techniques. Machine Learning (ML) algorithms plays a significant role in

identifying the distinction between normal genes and unhealthy genes, extracted from human genome. This paper is

focusing on providing an in depth overview on different techniques on ML that are used to analyze and classifies

the gene expression profiles of various diseases are discussed

Keywords: Gene Expression, Healthcare Systems, Machine Learning, Microarray data, Pattern Recognition..

References: 1. Alshamlan, H.M., Badr, G.H. and Alohali, Y.A., 2015. Genetic Bee Colony (GBC) algorithm: A new gene selection method for microarray

cancer classification. Computational biology and chemistry, 56, pp.49-60.

2. Alzubi, R., Ramzan, N. and Alzoubi, H., 2017, August. Hybrid feature selection method for autism spectrum disorder SNPs. In Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2017 IEEE Conference on(pp. 1-7). IEEE.

3. Ansel, A., Rosenzweig, J.P., Zisman, P.D., Melamed, M. and Gesundheit, B., 2017. Variation in gene expression in autism spectrum

disorders: an extensive review of transcriptomic studies. Frontiers in neuroscience, 10, p.601. 4. Aragona, M. and Blanpain, C., 2017. Gene therapy: Transgenic stem cells replace skin. Nature, 551(7680), p.306.

5. Aruna, d. And nandakishore, d., 2013. Hybrid ensemble gene selection algorithm for identifying biomarkers from breast cancer gene expression profiles.

6. Begum, S., Chakraborty, D. and Sarkar, R., 2015, December. Cancer classification from gene expression based microarray data using SVM

ensemble. In Condition Assessment Techniques in Electrical Systems (CATCON), 2015 International Conference on (pp. 13-16). IEEE. 7. Bennet, J., Ganaprakasam, C. and Kumar, N., 2015. A Hybrid Approach for Gene Selection and Classification using Support Vector

Machine. International Arab Journal of Information Technology (IAJIT), 12.

8. Bharathi, A. and Natarajan, A.M., 2010, December. Microarray gene expression cancer diagnosis using Machine Learning algorithms. In Signal and Image Processing (ICSIP), 2010 International Conference on (pp. 275-280). IEEE.

9. Bolón-Canedo, V., Sánchez-Marono, N., Alonso-Betanzos, A., Benítez, J.M. and Herrera, F., 2014. A review of microarray datasets and

applied feature selection methods. Information Sciences, 282, pp.111-135. 10. Bouazza, S.H., Hamdi, N., Zeroual, A. and Auhmani, K., 2015, March. Gene-expression-based cancer classification through feature

selection with KNN and SVM classifiers. In Intelligent Systems and Computer Vision (ISCV), 2015 (pp. 1-6). IEEE.

11. Brazma, A., Parkinson, H., Sarkans, U., Shojatalab, M., Vilo, J., Abeygunawardena, N., Holloway, E., Kapushesky, M., Kemmeren, P., Lara, G.G. and Oezcimen, A., 2003. ArrayExpress—a public repository for microarray gene expression data at the EBI. Nucleic acids

research, 31(1), pp.68-71.

12. Chen, H., Zhao, H., Shen, J., Zhou, R. and Zhou, Q., 2015, June. Supervised machine learning model for high dimensional gene data in colon cancer detection. In Big Data (BigData Congress), 2015 IEEE International Congress on(pp. 134-141). IEEE.

13. Chuang, L.C. and Kuo, P.H., 2017. Building a genetic risk model for bipolar disorder from genome-wide association data with random forest

algorithm. Scientific Reports, 7, p.39943. 14. Cross, A.J., Lampe, J.W., Rock, C.L. and Boushey, C.J., 2017. Biomarkers and their use in nutrition intervention. In Nutrition in the

Prevention and Treatment of Disease (Fourth Edition)(pp. 217-234).

15. Cutler, A., Cutler, D.R. and Stevens, J.R., 2012. Random forests. In Ensemble machine learning (pp. 157-175). Springer, Boston, MA.

16. Dashtban, M., Balafar, M. and Suravajhala, P., 2018. Gene selection for tumor classification using a novel bio-inspired multi-objective

approach. Genomics, 110(1), pp.10-17.

17. Dayan, P., Sahani, M. and Deback, G., 1999. Unsupervised learning. The MIT encyclopedia of the cognitive sciences. 18. de Freitas, R.C.C., Bortolin, R.H., Lopes, M.B., Hirata, M.H., Hirata, R.D.C., Silbiger, V.N. and Luchessi, A.D., 2016. Integrated analysis of

miRNA and mRNA gene expression microarrays: Influence on platelet reactivity, clopidogrel response and drug-induced

toxicity. Gene, 593(1), pp.172-178. 19. Dipnall, J.F., Pasco, J.A., Berk, M., Williams, L.J., Dodd, S., Jacka, F.N. and Meyer, D., 2016. Fusing data mining, machine learning and

traditional statistics to detect biomarkers associated with depression. PloS one, 11(2), p.e0148195.

20. Dong, K., Zhang, F., Zhu, W., Wang, Z. and Wang, G., 2014. Partial least squares based gene expression analysis in posttraumatic stress disorder. Eur Rev Med Pharmacol Sci, 18(16), pp.2306-2310.

21. Edgar, R., Domrachev, M. and Lash, A.E., 2002. Gene Expression Omnibus: NCBI gene expression and hybridization array data

repository. Nucleic acids research, 30(1), pp.207-210. 22. Elyasigomari, V., Mirjafari, M.S., Screen, H.R. and Shaheed, M.H., 2015. Cancer classification using a novel gene selection approach by

means of shuffling based on data clustering with optimization. Applied Soft Computing, 35, pp.43-51.

23. Gentleman, R., Carey, V., Huber, W., Irizarry, R. and Dudoit, S. eds., 2006. Bioinformatics and computational biology solutions using R and Bioconductor. Springer Science & Business Media.

24. Gour, D.K., Jain, Y.K. and Pandey, G.S., 2011. The Classification of Cancer Gene using Hybrid Method of Machine Learning. International

Journal of Advanced Research in Computer Science, 2(2).

25. Gunavathi, C. and Premalatha, K., 2015. Cuckoo search optimisation for feature selection in cancer classification: a new

approach. International journal of data mining and bioinformatics, 13(3), pp.248-265.

26. Hameed, S.S., Hassan, R. and Muhammad, F.F., 2017. Selection and classification of gene expression in autism disorder: Use of a combination of statistical filters and a GBPSO-SVM algorithm. PloS one, 12(11), p.e0187371.

182-191

Page 23: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

27. Hartigan, J.A. and Wong, M.A., 1979. Algorithm AS 136: A k-means clustering algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics), 28(1), pp.100-108.

28. Hijazi, H. and Chan, C., 2013. A classification framework applied to cancer gene expression profiles. Journal of healthcare engineering, 4(2),

pp.255-283. 29. Hinton, G.E. and Salakhutdinov, R.R., 2006. Reducing the dimensionality of data with neural networks. science, 313(5786), pp.504-507.

30. Hira, Z.M. and Gillies, D.F., 2015. A review of feature selection and feature extraction methods applied on microarray data. Advances in

bioinformatics, 2015. 31. Hu, H.P., Niu, Z.J., Bai, Y.P. and Tan, X.H., 2015. Cancer classification based on gene expression using neural networks. Genetics and

Molecular Research, 14(4), pp.17605-17611.

32. Huynh, P.H., Nguyen, V.H. and Do, T.N., 2018. A Coupling Support Vector Machines with the Feature Learning of Deep Convolutional Neural Networks for Classifying Microarray Gene Expression Data. In Modern Approaches for Intelligent Information and Database

Systems (pp. 233-243). Springer, Cham.

33. Jain, A.K., Mao, J. and Mohiuddin, K.M., 1996. Artificial neural networks: A tutorial. Computer, 29(3), pp.31-44. 34. Kalaiselvi, N. and Inbarani, H.H., 2013. Fuzzy soft set based classification for gene expression data. arXiv preprint arXiv:1301.1502.

35. Kar, S., Sharma, K.D. and Maitra, M., 2015. Gene selection from microarray gene expression data for classification of cancer subgroups

employing PSO and adaptive K-nearest neighborhood technique. Expert Systems with Applications, 42(1), pp.612-627. 36. Karabulut, E.M. and Ibrikci, T., 2017. Discriminative deep belief networks for microarray based cancer classification. Biomedical

Research, 28(3).

37. Karthik, S., Perumal, R.S. and Mouli, P.C., 2018. Breast Cancer Classification Using Deep Neural Networks. In Knowledge Computing and Its Applications (pp. 227-241). Springer, Singapore.

38. Kelleher, J.D., Mac Namee, B. and D'Arcy, A., 2015. Fundamentals of machine learning for predictive data analytics: algorithms, worked

examples, and case studies. MIT Press. 39. King, B.F., 2018. Artificial Intelligence and Radiology: What Will the Future Hold?. Journal of the American College of Radiology.

40. Kotsiantis, S.B., Zaharakis, I. and Pintelas, P., 2007. Supervised machine learning: A review of classification techniques. Emerging artificial

intelligence applications in computer engineering, 160, pp.3-24.

41. KR, S., 2011. Microarray data classification using support vector machine. International Journal of Biometrics and Bioinformatics

(IJBB), 5(1), p.10.

42. Kumar, G. and Bhatia, P.K., 2014, February. A detailed review of feature extraction in image processing systems. In Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on (pp. 5-12). IEEE.

43. Leska, V., Bei, E.S., Petrakis, E. and Zervakis, M., 2016. Gene Expression Data Analysis for Classification of Bipolar Disorders. In XIV

Mediterranean Conference on Medical and Biological Engineering and Computing 2016 (pp. 500-506). Springer, Cham. 44. Littman, M.L., 2015. Reinforcement learning improves behaviour from evaluative feedback. Nature, 521(7553), p.445.

45. Liu, Y.X., Zhang, N.N., He, Y. and Lun, L.J., 2015. Prediction of core cancer genes using a hybrid of feature selection and machine learning

methods. Genetics and Molecular Research, 14(3), pp.8871-8882. 46. Loganathan, C. and Girija, K.V., Investigations on Hybrid Learning in Anfis in Microarray Gene Expression Classification.

47. Logotheti, M., Pilalis, E., Venizelos, N., Kolisis, F. and Chatziioannou, A., 2016. Studying Microarray Gene Expression Data of

Schizophrenic Patients for Derivation of a Diagnostic Signature through the Aid of Machine Learning. Biom Biostat Int J, 4(5), p.00106. 48. Mehridehnavi A, Ziaei L. Minimal gene selection for classification and diagnosis prediction based on gene expression profile. Advanced

Biomedical Research. 2013;2:26. doi:10.4103/2277-9175.107999. 49. Montgomery, D.C., Peck, E.A. and Vining, G.G., 2012. Introduction to linear regression analysis (Vol. 821). John Wiley & Sons.

50. Motieghader, H., Najafi, A., Sadeghi, B. and Masoudi-Nejad, A., 2017. A hybrid gene selection algorithm for microarray cancer

classification using genetic algorithm and learning automata. Informatics in Medicine Unlocked, 9, pp.246-254. 51. Nath, A., Kumari, P. and Chaube, R., 2018. Prediction of Human Drug Targets and Their Interactions Using Machine Learning Methods:

Current and Future Perspectives. In Computational Drug Discovery and Design (pp. 21-30). Humana Press, New York, NY.

52. Nie, Y., Chen, V., Shannon, C.P., Andiappan, A.K., Lee, B., Rotzschke, O., Castaldi, P.J., Hersh, C.P., Fishbane, N., Ng, R.T. and McManus, B., 2017. Network-based analysis reveals novel gene signatures in peripheral blood of patients with chronic obstructive

pulmonary disease. Respiratory research, 18(1), p.72.

53. Nilashi, M., bin Ibrahim, O., Ithnin, N. and Sarmin, N.H., 2015. A multi-criteria collaborative filtering recommender system for the tourism domain using Expectation Maximization (EM) and PCA–ANFIS. Electronic Commerce Research and Applications, 14(6), pp.542-562.

54. Oh, D.H., Kim, I.B., Kim, S.H. and Ahn, D.H., 2017. Predicting Autism Spectrum Disorder Using Blood-based Gene Expression Signatures

and Machine Learning. Clinical Psychopharmacology and Neuroscience, 15(1), p.47. 55. Piao, Y., Piao, M., Park, K. and Ryu, K.H., 2012. An ensemble correlation-based gene selection algorithm for cancer classification with gene

expression data. Bioinformatics, 28(24), pp.3306-3315.

56. Quinlan, J.R., 1986. Induction of decision trees. Machine learning, 1(1), pp.81-106. 57. Rajeswari, P. and Reena, G.S., 2011. Human liver cancer classification using microarray gene expression data. International Journal of

Computer Applications, 34(6), pp.25-37.

58. Ram, M., Najafi, A. and Shakeri, M.T., 2017. Classification and Biomarker Genes Selection for Cancer Gene Expression Data Using Random Forest. Iranian Journal of Pathology, 12(4), pp.339-347.

59. Reich, M., Liefeld, T., Gould, J., Lerner, J., Tamayo, P. and Mesirov, J.P., 2006. GenePattern 2.0. Nature genetics, 38(5), p.500.

60. Ruiz, R., Riquelme, J.C. and Aguilar-Ruiz, J.S., 2006. Incremental wrapper-based gene selection from microarray data for cancer classification. Pattern Recognition, 39(12), pp.2383-2392.

61. Salem, H., Attiya, G. and El-Fishawy, N., 2017. Classification of human cancer diseases by gene expression profiles. Applied Soft

Computing, 50, pp.124-134.

62. Saylan, C.C. and Yılancıoğlu, K., 2016. Classification of Schizophrenia and Bipolar Disorder by Using Machine Learning Algorithms. The

Journal of Neurobehavioral Sciences, 3(3), pp.92-95.

63. Simon, R., Lam, A., Li, M.C., Ngan, M., Menenzes, S. and Zhao, Y., 2007. Analysis of gene expression data using BRB-array tools. Cancer informatics, 3, p.117693510700300022.

64. Smoot, M.E., Ono, K., Ruscheinski, J., Wang, P.L. and Ideker, T., 2010. Cytoscape 2.8: new features for data integration and network

visualization. Bioinformatics, 27(3), pp.431-432. 65. Soe, H.J., Yong, Y.K., Al-Obaidi, M.M.J., Raju, C.S., Gudimella, R., Manikam, R. and Sekaran, S.D., 2018. Identifying protein biomarkers

in predicting disease severity of dengue virus infection using immune-related protein microarray. Medicine, 97(5).

66. Song, N., Wang, K., Xu, M., Xie, X., Chen, G. and Wang, Y., 2015. Design and analysis of ensemble classifier for gene expression data of cancer. Journal of Clinical & Medical Genomics, pp.1-7.

67. Tajari, H. and Beigy, H., 2012. Gene Expression Based Classification using Iterative Transductive Support Vector Machine. International

Journal of Machine Learning and Computing, 2(1), p.76. 68. Tarek, S., Elwahab, R.A. and Shoman, M., 2017. Gene expression based cancer classification. Egyptian Informatics Journal, 18(3), pp.151-

159.

69. Tomasetti, C., Li, L. and Vogelstein, B., 2017. Stem cell divisions, somatic mutations, cancer etiology, and cancer prevention. Science, 355(6331), pp.1330-1334.

70. Vanitha, C.D.A., Devaraj, D. and Venkatesulu, M., 2015. Gene expression data classification using support vector machine and mutual

information-based gene selection. procedia computer science, 47, pp.13-21. 71. Van't Veer, L.J. and Bernards, R., 2008. Enabling personalized cancer medicine through analysis of gene-expression

patterns. Nature, 452(7187), p.564.

72. Vapnik, V., 1998. Statistical learning theory. 1998. Wiley, New York 73. Vergara, J.R. and Estévez, P.A., 2014. A review of feature selection methods based on mutual information. Neural computing and

Page 24: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

applications, 24(1), pp.175-186. 74. Ware, B.R., McVay, M., Sunada, W.Y. and Khetani, S.R., 2017. Exploring chronic drug effects on microengineered human liver cultures

using global gene expression profiling. Toxicological Sciences, 157(2), pp.387-398.

75. Weinstein, J.N., Collisson, E.A., Mills, G.B., Shaw, K.R.M., Ozenberger, B.A., Ellrott, K., Shmulevich, I., Sander, C., Stuart, J.M. and Cancer Genome Atlas Research Network, 2013. The cancer genome atlas pan-cancer analysis project. Nature genetics, 45(10), p.1113.

76. Yilancioglu, K. and Konuk, M., 2015. Classification of Schizophrenia Patients by Using Genomic Data: A Data Mining Approach. The

Journal of Neurobehavioral Sciences, 2(3), pp.102-104. 77. Zhang, H., Xie, Z., Yang, Y., Zhao, Y., Zhang, B. and Fang, J., 2017. The correlation-base-selection algorithm for diagnostic schizophrenia

based on blood-based gene expression signatures. BioMed research international, 2017.

78. Zhang, L., Yang, T., Yi, J., Jin, R. and Zhou, Z.H., 2016, February. Stochastic Optimization for Kernel PCA. In AAAI(pp. 2315-2322). 79. Zhao, G. and Wu, Y., 2016. Feature subset selection for cancer classification using weight local modularity. Scientific reports, 6, p.34759.

80. Zhong, W., 2014. Feature selection for cancer classification using microarray gene expression data (Doctoral dissertation, University of

Calgary). 81. Zhou, X. and Belkin, M., 2014. Semi-supervised learning. In Academic Press Library in Signal Processing (Vol. 1, pp. 1239-1269). Elsevier

35.

Authors: Krishna Moorthy V*, Uma, Jaanaki S.M, N. M. Hariharan, S. Kasthurirengan

Paper Title: Simulation and Experimental Studies of Twin Thermoacoustic Prime Mover

Abstract: Thermo acoustic prime mover (TAPM) converts thermal energy to acoustic energy and it is one of the

alternative method to replace traditional compressor which will drive any cryocooler . The advantages of TAPM are

the absence of moving components and they can be driven by solar energy, waste heat etc. In order to develop

TAPMs their design and fabrication should be guided by numerical modeling and this may be done by several

methods such as solving the energy equation, enthalpy flow model CFD, Delta EC etc. We studied the TAPMs

with CFD technique, and Delta EC methods since it provides a better insight into the velocity and temperature

profiles. In this article we discuss the influence of working gas (helium, argon and its mixtures). The theoretical

results and experimental results are compared and they are in reasonably good agreement

Keywords: CFD, Thermoacoustic, Delta EC,

References: 1. Thermoacoustic engines, J Acoust Soc Am 84(4) (1988) 1145-1180. 2. Krishna Moorthy V, Uma Praveen, Jaanaki S.M, N.M.Hariharan, S.Kasthurirengan “Simulation of Standing wave Thermoacoustic prime

mover using DeltaEC”, international journal of research and analytical reviews, volume 5, Issue 3, July– sept 2018, page no: 522-526

3. Kasthurirengan, S; Behera, Upendra; Gangradey, Ranjana; Udgata, Swarup; Krishnamoorthy, V. “Studies of cryocooler based cryosorption pump with activated carbon panels operating at 11K” Journal of Physics: Conference Series vol. 390 issue 1 November 05, 2012. p.

012068-012068.

4. X.H. Hao, Y.L. Ju, Upendra Behera, S. Kasthurirengan. "Influence of working fluid on the performance of a standing-wave thermoacoustic prime mover", Cryogenics, 2011

192-194

36.

Authors: K. S. Meena, M. Rajeswari, Krishnadas J, Soumya Varma, Deepa Devassy

Paper Title: Emerging Trends in Computing: Reliability Design for A VANET with WUGFT Subject To Time and

Cost Constraints

Abstract: Reliable and quick communication is of prime importance in VANETs. Introducing clustering technique

will ensure a robust data exchange in VANET. The emphasis on this work is to select the reliable cluster that make

an appreciable communication in VANET with in a fixed time and cost. Hence this work considers the Cluster Head

(CH) selection using Bully algorithm and Lamport time stamp. Furthermore, the traffic in the network is modelled

using Weighted Universal Generating Function Technique (WUGFT). This will diminish the computation burden in

reliability calculation. Reliability of VANET is defined as the probability of a successful delivery of data from

source to destination. Reliability ratio has been considered to identify the efficient reliable cluster. A Simulation is

carried out in NS – 2 with respect to delay, packet delivery ratio, and throughput and packet drop ratio. Simulation

results indicate that our proposed method produces optimal results on the defined parameters.

Keywords: VANET, RSU, WUGFT, Bully Algorithm, Reliability, Clustering

References: 1. Ahammed, F, Taheri, J & Zomaya, A 2011, ‘LICA: robust localization using cluster analysis to improve GPS coordinates’, In: First ACM

International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 39–46.

2. Bali, RS, Kumar, N, & Rodrigues, JPC 2014, ‘Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions’, Vehicular Communications, vol. 1, no. 3, pp. 134-152.

3. Fan, W, Shi,Y, Chen, S & Zou, L 2011, ‘A mobility metric based dynamic clustering algorithm (DCA) for VANETs’, In: International

Conference on Communication Technology and Application, Beijing, pp. 752–756. 4. Jin-Jia Chang, Yi-HuaLi, WanjiunLiao& Ing-chauchang, 2012, ‘Intersection based routing for urban vehicular communications with traffic

light considerations’, IEEE wireless Communications, vol. 19, no. 1, pp. 82-88.

5. Paramodh Kavisha Dharmawardena and Zhanjie Wang,“Cluster head selection based routing protocol for VANET bully algorithm and Lamport timestamp’,International Journal of Computer Theory and Engineering, Vol. 9, No. 3, June 2017, pp.219-24.

6. Meena KS Vasanthi T’ 2015, ‘ Reliability Design for a MANET with Cluster Head Gateway Routing Protocol’, Communication in

Statistics-Theory and Methods 2015;45(13):3094-3918. DOI: 10.1080/03610926.2014.911908. 7. Meena, KS & Vasanthi, T 2015, 'The Performance Assessment of a MANET using WUGF', Research Journal of Applied Sciences,

Engineering and Technology, vol. 10, no.8 , pp. 942-950.

8. Meena KS Vasanthi T. Reliability Analysis of Mobile Adhoc Networks using Universal Generating Function Quality and Reliability Engineering International 2016; 32(1):111-122.

9. Meena KS Vasanthi T Uma Maheswari P Rajeswari M Reliability Analysis of MANET with RCFP: Reliable Cluster Forming Protocol.

International Journal of Applied Engineering Research 2016; 11(1): 440-447. 10. Meena KS Bhargava EN Vasanthi T. Reliable Cluster Forming Protocol in VANET.World Journal of Engineering research and

Technology 2017; 3(3):390-321. DOI: 10.1080/03610926.2014.911908.

11. Rajeswari M Uma Maheswari Assessing the Reliability of Adhoc Network using UGF: Probabilistic approach. Asian Journal of Information Technology 2016; 15(3):563-566.

12. Rajeswari M Siva Mani C Meena KS. A noval approach to the performability of VANET: VBRCP with UGFT. journal of Web Engineering Technology 2018 Accepted Manuscript.

195-200

Page 25: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

13. Santos, RA, Edwards, RM, & Seed, NL 2003,‘Inter vehicular data exchange between fast moving road raffic using an ad-hoc clusterbased location routing algorithm and 802.11b direct sequence spread spectrum radio’, In: Post Graduate Networking Conference.

14. Tian, D, Wang, Y, Lu, G, Yu,G 2010, ‘A VANETs routing algorithm based on Euclidean distance clustering’, In: 2nd IEEE International

Conference on Future Computer and Communication, Wuhan, pp.V1183–V1-187. 15. Uma Maheswari P Rajeswari M Meena KS Vasanthi T. Reliability calculation of VANET with RSU using UGFT. International Journal of

Advance Foundation and Research in Computer 2015; 2(12):7-17.

16. Zhengming li, Congyiliu&Chunxiaochigan 2013, ‘On Secure VANET Based Ad Dissemination with Pragmatic Cost and Effect Control’, IEEE transactions on intelligent transportation systems.

17. Ziahmoud Hashem Eiza& Qiang Ni 2013, ‘An Evolving Graph-Based Reliable Routing Scheme for VANETs’, IEEE Transactions on

Vehicular Technology, vol. 62, no. 5, pp. 1493-1504.

37.

Authors: Burhan Aslam Arain*, Muhammad Farrukh Shaikh, Bharat Lal Harijan, Tayab Din Memon, Imtiaz

Hussain Kalwar

Paper Title: Design of PID Controller Based on PSO Algorithm and Its FPGA Synthesization

Abstract: A Proportional-Integral-Derivative (PID) controller make its appearance in various control mechanism

due to its adaptively, applicability and simple structure. The tuning for parameters KP, KD and KI selection for PID

is a tedious task. A Particle-Swarm-Optimization (PSO) algorithm is an evolutionary method that simulates the

particles to provide best solutions in a given search-space based on fitness value. It provides another design of

optimization for PID controller that provides better gain parameters, fast convergence and quick computation, in

this paper, an efficient designed PSO based PID controller is then synthesized with the help of Xilinx SYSGEN. To

evaluate the effectiveness and usefulness of PSO the DC motor based system response is figured and compared it

with conventional method.

Keywords: PSO algorithm, PID controller, FPGA synthetization, PID optimization, PSO-PID controller

References: 1. G. Rajeshkanna, "Modern Speed Control of Separately Excited Dc Motor by Boost Converter Fed Field Control Method," In International

Conference on Computer Communication and Informatics (ICCCI -2013), Coimbatore, India, 2013.

2. S. Vijay and V.K. Garge, "A Comparative Study On Speed Control Of D.C. Motor Using Intelligence Techniques," International Journal Of

Electronic And Electrical Engineering, Vol. Volume 7, No. Number 4, Pp. 431-436, 2014. 3. T. Yucelen, O. Kaymakci, S. Kurtulan, "Self-Tuning PID Controller Using Ziegler-Nichols Method For Programmable Logic Controllers,"

In IFAC Proceeding Volumes, 2006.

4. N. Kundariya And J. Ohri, "Design Of Intelligent PID Controller Using Particle Swarm," International Journal Of Scientific & Engineering Research, Vol. 4, No. 7, July 2013.

5. S. Banerjee and A. Sinha, "Performance Analysis of Different DSP Algorithms on Advanced Microcontroller and FPGA," In IEEE

International Conference, ACTEA, 2009.

6. S. K. Guman, V. K. Giri, "Speed Control Of Dc Motor Using Optimization Techniques Based PID Controller," In 2nd IEEE International Conference On Engineering And Technology (ICETECH), Coimbatore India, March 2016.

7. A. H. Al-Mter and S. Lu, "A Particle Swarm Optimization Algorithm Based On Uniform Design," International Journal of Data Mining &

Knowledge Management Process (IJDKP), Vol. 6, No. 2, March 2016. 8. Geramipour, Arezou, M. Khazaei, A. Marjaninejad, and M. Khazaei., "Design Of FPGA-Based Digital PID Controller Using Xilinx

SYSGEN For Regulating Blood Glucose Level Of Type-I Diabetic Patients," International Journal Of Mechatronics, Electrical And

Computer Technology, Vol. 3, No. 7, Pp. 56-69, April 2013. 9. B. L. Harijan, M. F. Shaikh, B. A. Arain, T. D. Memon And I. H. Kalwar, "FPGA Based Synthesize Of PSO Algorithm And Its Area-

Performance Analysis," International Journal Of Advanced Computer Science And Applications (IJACSA), Vol. 9, No. 6, 2018.

10. J. Ciganek, M. Kocur And S. Kozak, "Hardware Realization Of Advanced Controller Design Methods Using FPGA," IFAC-Papers Online, Volume, Vol. 49, No. 5, Pp. 163-168, 2016.

11. R. Eberhart and J. Kennedy, "Particle Swarm Optimization," Proceedings of the IEEE Int. Conf. on Neural Networks, Vol. 4, P. 1942–1948,

1995. 12. H. Tim, "Fitness Estimation and the Particle Swarm Optimization Algorithm," In IEEE Congress on Evolutionary Computation, 2007.

13. V. Gupta, K. Khare And R. P. Sigh, “Efficient FPGA Implementation Of 2nd Order Digital

Controllers Using Matlab/Simulink”, ARPN Journal of Engineering And Applied Sciences, Vol. 6, No. 8, August

2011

14. X. Hu, "Http://Www.Swarmintelligence.Org.

15. B. Jena and S. Kumar, “Tuning Of PID Controller by Bioinspired Techniques”, Thesis, Department of ECE NIT, Rourkela, 2011

201-207

38.

Authors: G Ramprabu, T Saravanan, G Saritha

Paper Title: Wireless Audio Signal Communication using Li-Fi Technology

Abstract: As a next generation signal processing method, Visible Light Communication (VLC) is developing for

low distance signal processing applications. Two archetype wireless audio data processing techniques are execute

and describe using VLC. For stream and process data, software design is urbanized and it is linked with a hardware

element, by encouraging free-space VLC canal, over a Universal Serial Bus (USB) to serial interface. An especially

appealing element of our framework is that it utilizes generally accessible, minimal effort elements by empowering

its execution in ordinary purposes. The scheme incorporates both transmission and reception section. The

transmission section comprises of voice playback with a system contribution from which the voice is transmitted by

means of lift transmission and the voice gets got in a lift reception and opened up in audio amplifier.

Keywords: Visible Light Communication, LED, LCD, Wi-Fi and Li-Fi..

References: 1. Ramprabu G, Saranya J & Swathi R, (2017) “Stereo Audio Streaming using Li-Fi Technology”, International Journal of Computer

Application, Vol.7(2), pp.44-48.

2. Kulkarani Shivaji, Amogh Darekar Pavan Joshi Amogh, (2016) “A Survey on Li-Fi Technology”, IEEE International Conference on

WiSPNET. 3. Saini Sunita, Sharma Yogesh Kumar, (2016) “Li-Fi the most recent innovation in Wireless Communication”, International Journal of

208-210

Page 26: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Advanced Research in Computer Science and Software Engineering, Vol.6(2), pp. 347-351. 4. Karthika R, Balakrishnan S, (2015) “Wireless Communication using Li-Fi Technology”, SSRG International Journal of Electronics and

Communication Engineering, Vol.2(3), pp.32-40.

5. Sarkar Anurag, Agarwal Shalabh, Nath Asoke, (2015) “Li-Fi Technology: Data Transmission through Visible Light”, International Journal of Advance Research in Computer Science and Management Studies, Vol.3 (6), pp. 1-10.

6. Singh Jitender, Vikash, (2014) “A New Era in Wireless Technology using light fidelity”, International Journal of Recent Development in

Engineering and Technology, Vol.2 (6), pp-46-49.

39.

Authors: Baili Rachida, Mili Mustafa, Gourja Bouchra, Tridane Malika

Paper Title: A Study of the Impact of Scrap on Ground Water: The Case of Scrap Essaada in Meknes–Morocco

Abstract: The purpose of this research is to investigate a subject that is little approached in environmental circles

in Morocco. It concerns the domain of scrap considered as an informal sector of important economic and industrial

activities. Scrap yards which are generally poorly fitted out and populated spaces are scenes for activities that may

cause risks, often ignored, to the natural environment as well as the human health. Indeed, waste stemming from

activities of the scrap may present harmful effects on grounds, on groundwater, and on flora and fauna. This study is

concerned with the impact of the activities of the Essaâda scrap of Meknes on the groundwater. This site constitutes

a representative sample of scrap yards in Morocco for they all have (more or less) the same characteristics. To

conduct this research, we collected water samples of subterranean waters of wells situated inside and outside of the

scrap yard in December, March and May. The collected samples are studied by determining the existence of the

compounds of hydrocarbons. Hence the need of the implementation of a device of environmental management. The

products used in these environments are hydrocarbons: this includes detergents, antifreeze, liquids for clutches and

brakes, (lubricants) engine oils, greases, polyester putties, diluents cellulosic. The majority of these junkyards are

poorly designed and are part of the informal sector. However, work there remains generally precarious in very bad

sanitary and safety conditions beyond any control of the public authorities: inhuman work and hygiene conditions

along with negative externalities are observed in this sense. These externalities, particularly, those related to the

landscape, public health and the air should be a concern of policy makers to outsource them or limit them

(DJEMACI, 2013). And yet this scrap is neglected: no study, no monitoring and no reaction from the Government

departments concerned. This research aims at studying the impact of the activities of scrap on the environment and

on human health. . (This is how the questions call out to us.)

Keywords: Scrap – Hydrogeology- Hydrocarbons- Water

References: 1. L.C Briand, J. Daly, and J, Wüst., A unified framework for coupling measurement in object oriented systems, IEEE Transactions on

Software Engineering, 25, 1, January 1999, pp. 91-121.

2. J. I .Maletic, M.L, Collard, and A, Marcus, Source Code Files as Structured Documents, in Proceedings 10th IEEE International Workshop

on Program Comprehension (IWPC'02), Paris, France, June 27-29 2002, pp. 289-292.

3. A, Dupot, A, Hydrocarbure urbaine (Paris : EYROLLES, 1986).

4. S. Bouchonnet, La spectrométrie de masse en couplage avec la chromatographie en phase gazeuse, (Paris : TEC& DOC, 2009).

5. C.Bocard, marées noires et sols pollués par des hydrocarbures enjeux environnementaux et traitement des pollutions, (Paris, France:

technip, 2006).

6. J.A, Hertig, J.-A, Etudes d'impact sur l'environnement (éd. 2ème, Vol. 23), (Lausane: Presse polytechnique universitaire romandes, 2006).

7. B. Lemiere, J.Seguin, C.Le Guern, D. Guyonnet, D.Barnger, C. Le Guern, D. Guyonnet, P. Baranger, & A, Saada, Guide sur le

comportement des polluants dans les sols et les nappes, (BRGM, Éd, Orleans Cedex, 2001), in ( http://infoterre.brgm.fr/rapports/RP-50662-FR.pdf), Consulté le 03/02/2015.

8. M.Musy, Une ville verte : Les rôles du végétal en ville, (Amazon France: Quae, 2014).

9. C.NOWAK, & S.Van Der Ham, Rapport d'expertise: Contamination des eaux souterraines par des hydrocarbures à proximité du site

SMCA de PARAY VIEILLE POSTE, (Paray Vieille Poste Essone: Brgm, 2010).

10. WIKI.AUREA, Les hydrocarbures, (in wiki.aurea: https://wiki.aurea.eu/index.php/Les_hydrocarbures, 2006). Consulté le 20 Octobre 2016,

211-214

40.

Authors: Maruthachalam D., Sugunadevi M., Sowmiya A. B., Sushmithaa P.

Paper Title: Investigation of Corrosion Damage and Repair System to Strengthen the Critical Infrastructure

Abstract: This project provides a detailed study on the repair and strengthening of beams made up of concrete by

Carbon Fiber Reinforced Polymer [CFRP] sheets. Mostly, structures fail due to the steel corrosion in the concrete.

Corrosion remains primarily owing to the chloride ion intrusion in aggressive environment. The defected concrete

will affect the strength of the structures. They can be treated with CFRP sheets so that the strength of the structure

could be improved to withstand the design loads. The defects of the structures include - spalling of concrete,

cracking, honey- combing etc., resulting in the reduction of strength. To strengthen the defected structure, we have

implemented an idea of wrapping the corroded concrete with CFRP sheets. Reinforced concrete prisms will be

casted and they will be grouped under four categories. First category of specimens will be kept as control specimens

and another two groups of concrete specimen will be subjected to accelerated corrosion initiation test. The range of

corrosion will be monitored through Half Cell Potential Mapping, after the crack formation on the surface of the

specimens. Third group of prisms will be treated with CFRP sheets in one, two and three layers of the sheets. The

last set of prisms will be treated with the CFRP sheets in one, two and three layers of the sheets without giving any

chloride intrusion. Finally, the comparative study will be made on the strengths of all the three category specimens.

We have selected M30 concrete grade and OPC53 grade of cement. All values are based upon IS 456:2000 and IS

10262:2009.

Keywords: CFRP sheets, Chloride intrusion, Corrosion, Repair, Strengthening, Half Cell Potential Mapping

215-220

Page 27: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

References: 1. Kasimzade A. A. and Tuhta S., Analytical, Numerical and Experimental Examination of Reinforced Composites Beams Covered with

Carbon Fiber Reinforced Plastic, Journal of Theoretical and Applied Mechanics, Sofia, 42(1), 2012, 55–70.

2. ACI Committee 440, ACI 440.2R-08. Guide for the design and construction of externally bonded FRP systems for strengthening concrete

structure, 38800 Country Club Dr., Farmington Hills, MI 48331-3439, USA. American Concrete Institute, 2008. 3. Ahmed Shaban Abdel-Hay, Partial Strengthening of R.C Square Columns using CFRP, HBRC Journal, 10, 279–286, 2014.

4. Aitcin P.C., The durability characteristics of high performance concrete: a review, Cement & Concrete Composites, 25, 409–420, 2003.

5. Andrade C, Alonso C, On-site measurements of corrosion rate of reinforcements, Construction and Building Materials, 15, 141-145, 2001. 6. Antonio Bossio, Tullio Monetta, Francesco Bellucci, Gian Piero Lignola, Andrea Protaio Bossio, Modeling of Concrete Cracking due to

Corrosion Process of Reinforcement Bars, Cement and Concrete Research, 71, 78–92, 2015.

7. ASTM C876, Standard Test Method for Corrosion Potentials of Uncoated Reinforcing Steel in Concrete, West Conshohocken, United States; American Society for Testing & Materials, 2009.

8. Dias S.J.E., Barros J.A.O., NSM Shear Strengthening Technique with CFRP Laminates Applied in High-Strength Concrete Beams with or without Pre-Cracking, Composites: Part B 43, 290–301, 2012.

9. Hawileh R.A., Nawaz W., Abdalla J.A., Saqan E.I., Effect of Flexural CFRP Sheets on Shear Resistance of Reinforced Concrete Beams,

Composite Structures, 122, 468–476, 2015. 10. Hui Yu, Xianming Shi, William H. Hartt, Baotong Lu, Laboratory investigation of reinforcement corrosion initiation and chloride threshold

content for self-compacting concrete, Cement and Concrete Research, 40, 1507–1516, 2010.

11. IS: 10262 – 2009, Concrete Mix Proportioning – Guidelines, Manak Bhavan, New Delhi 110002. Bureau of Indian Standards. 12. IS: 456 – 2000, Plain and Reinforced Concrete Code of Practice, Manak Bhavan, New Delhi 110002. Bureau of Indian Standards.

13. IS: 516 – 1959 (Reaffirmed 2004), Methods of Tests for Strength of Concrete, Manak Bhavan, New Delhi 110002. Bureau of Indian

Standards. 14. John P. Broomfield, Kevin Davies, Karel Hladky, The use of permanent corrosion monitoring in new and existing reinforced concrete

structures, Cement & Concrete Composites, 24, 27–34, 2002.

15. Kesavan K., Ravisankar K., Senthil R., Farvaze Ahmed A.K., Experimental Studies on Performance of Reinforced Concrete Beam

Strengthened with CFRP under Cyclic Loading using FBG Array, Measurement, 46, 3855–3862, 2013.

16. Massimiliano Bocciarelli, Christian di Feo, Nicola Nisticò, Marco Andrea Pisani, Carlo Poggi, (2013), Failure of RC Beams Strengthened

in Bending with Unconventionally Arranged CFRP Laminates, Composites: Part B 54, 246–254, 2013. 17. Mohamed H. Mahmoud, Hamdy M. Afefy, Nesreen M. Kassem, Tarek M. Fawzy, Strengthening of Defected Beam–Column Joints using

CFRP, Journal of Advanced Research, 5, 67–77, 2014.

18. Mohammad Ismail, Bala Muhammad, Mohamed El Gelany Ismail, Compressive strength loss and reinforcement degradations of reinforced concrete structure due to long-term exposure, Construction and Building Materials, 24, 898–902, 2010.

19. Murad M. Bhunga, Dr. N. K. Arora, Comparative Study of ER-FRP Laminated Beam Design with ACI-440-2r-08 and IS Method,

International Journal of Advanced Engineering Technology, E-ISSN 0976-3945, 2012. 20. Muralidharan S, Saraswathy V., Madhavamayandi A, Thangavel K, Palaniswamy N, Evaluation of embeddable potential sensor for

corrosion monitoring in concrete structures, Electrochimica Acta, 53,7248–7254, 2008.

21. Muthulingam S., Rao B.N., Non-uniform Corrosion States of Rebar in Concrete under Chloride Environment, Corrosion Science, 93, 267–282, 2015.

22. Norazman Mohamad Nor, Mohd Hanif Ahmad Boestamam, Mohammed Alias Yusof, Carbon Fiber Reinforced Polymer (CFRP) as

Reinforcement for Concrete Beam, International Journal of Emerging Technology and Advanced Engineering, 3(2), 2013. 23. Oral Buyukozturk, Oguz Gunes, Erdem Karaca, Progress on understanding debonding problems in reinforced concrete and steel members

strengthened using FRP composites, Construction and Building Materials, 18, 9–19, 2004.

24. Priyanka Sarker, Mahbuba Begum and Sabreena Nasrin, Fiber reinforced polymers for structural retrofitting: A review, Journal of Civil Engineering (IEB), 39 (1), 49-57, 2011.

25. Ratan Kharatmol, Pankaj Sananse, Rohit Tambe, Ms.Raksha J.Khare, (2014), Strengthening of Beams Using Carbon Fibre Reinforced

Polymer International Journal of Emerging Engineering Research and Technology, 2(3), 119-125, 2014. 26. Shamsad Ahmad, Reinforcement corrosion in concrete structures, its monitoring and service life prediction––a review, Cement & Concrete

Composites, 25, 459–471, 2003.

27. Szweda Zofiaa, Zybura Adam, Theoretical Model and Experimental Tests on Chloride Diffusion and Migration Processes in Concrete, Sciverse Science Direct, Procedia Engineering, 57 1121 – 1130, 2013.

28. Tara Sen, H.N. Jagannatha Reddy, Strengthening of RC Beams in Flexure using Natural Jute Fibre Textile Reinforced Composite System

and its Comparative Study with CFRP and GFRP Strengthening Systems, International Journal of Sustainable Built Environment 2, 41–55, 2013.

29. Van der Zanden A.J.J., Taher A., Arends T., (2015), Modelling of Water and Chloride Transport in Concrete during Yearly Wetting/Drying

Cycles, Construction and Building Materials, 81, 120–129, 2015. 30. Wonga H.S, Zhao Y.X, Karimi A.R, Buenfeld N.R, Jin W.L., On the penetration of corrosion products from reinforcing steel into concrete

due to chloride-induced corrosion, Corrosion Science 52, 2469–2480, 2010.

31. Xianming Shi, Ning Xie, Keith Fortune, Jing Gong, Durability of steel reinforced concrete in chloride environments: An overview, Construction and Building Materials, 30, 125–138, 2012.

32. Yinzhi Zhou, Hualin Fan, Kebin Jiang, Mingkang Gou, Ning Li, Pengcheng Zhu, Yiqiang Tu, Experimental Flexural Behaviors of CFRP

Strengthened Aluminum Beams, Composite Structures, 116, 761–771, 2014.

41.

Authors: Bharat Lal, Sandeep Sagar, Misbah Arain, Burhan Aslam Arain, Farrukh Shaikh

Paper Title: Automation and Monitoring of Reverse Osmosis Water Treatment Plant

Abstract: The world is suffering from an eminent water crisis. Safe and pure drinking water is the necessity and

right of everyone. The use of reverse osmosis-based water treatment plants has become a common method for

providing clean water in many areas as the global demand for water increases. Automation and monitoring is an

important task for such plants at remote distance. A system is needed to prevent difficulties when one needs to

control and monitor important parameters such as Total Dissolved Solids (TDS), Water Level, Flow rate manually.

Manually operated RO plants have failed due to lack of proper monitoring and maintenance. Designed system in

this article is equipped with Arduino microcontroller which controls the operation of system, water level sensors for

water level monitoring in particular tank, water flow sensors to measure the flow rate of water during run, pH sensor

for product water quality monitoring and a wireless connectivity module, which is used to establish communication

between user/operator and the RO system at remote areas. The system not only allows user to monitor the important

parameters of RO plant which influence the performance, but also allow to control the plant at remote distance. The

system gives the measurement report upon a request message and also alerts the user automatically if any critical

situation occurs at plant site. The system can be placed at any location where GSM based wireless connectivity is

available and can be controlled from a single location.

221-225

Page 28: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

Keywords: Reverse Osmosis, Water quality, Remote Monitoring, Wireless GSM Control.

References: 1. O. M. Torky, I. Elamvazuthi, and N. H. Hanif, “PC based SCADA System for Reverse Osmosis Desalination Plants,” IEEE Student

Conference on Research and Development, November 2009, Malaysia.

2. A. Abdulrazaqa Jassim, N. Abdulrazaq, and A. S. Kahdim, “Automation of Reverse Osmosis,” Seventh International Water Technology

Conference, April 2003, Egypt. 3. M. Gowri Shankar, R. Nadhiya, A. P. Priya, and R. Selvi, “Automation for Industrial Reverse Osmosis System Using SCADA Controller,”

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, No. 1, March 2016, India.

4. M. Saraswati, E. Kuantama, and P. Mardjoko, “Design and Constructionof Water Level Measurement System Accessible through SMS”, Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, November 2012 Malta.

5. A. Zilouchian, and M. Jafar, “Automation and Process Control of Reverse Osmosis Plants using Soft Computing Methodologies,”

International Conference on Seawater Desalination Technologies on the Threshold of the New Millennium, November 2000, Kuwait. 6. M. S. Prajapati, and A. G. Patel, “PLC & SCADA Based Automation of Industrial Reverse Osmosis Desalination Plants,” International

Journal of Engineering Research & Technology, Vol. 3, No. 3, March 2014.

7. Raj Shah, Aditya Vadalkar, Omkar Bengrut, and M.P.Sardey, “Automation of Water Treatment Plant,” International Journal for Technological Research In Engineering, Vol. 1, No. 8, April-2014.

8. Faras Ghani, ‘Tharparkar: Pakistan's ongoing catastrophe’, 2016. [Online]. Available:

https://www.aljazeera.com/indepth/features/2016/06/tharparkar-pakistans-ongoing-catastrophe 160629111410198.html. 9. Hanif Samoon, ‘Several RO plants found 'out of order' in Tharparkar’, 2015. [Online]. Available: https://www.dawn.com/news/1223762.

10. Sofia Khaliq Alvi, Uzma Asghar, Madhia Parve, and Faroque Ahmed Khan, “Ground Water Quality of District Tharparkar, Sindh,

Pakistan,” Center of Environment Studies, PCSIR Laboratories Complex Karachi, Vol. 30, No 3, 2008, Pakistan. 11. A. S. Dil, Ishtiaq A. Qazi, M. A. Baig, E. A. Khan, and A. Tahir, “National Standards for Drinking Water Quality,” Pakistan

Environmental Protection Agency, June, 2008.

12. Rhowel Dellosa, J. Edward Hernandez, Richard Mangay, and Rockie Robles, “Microcontroller Based Wastewater Management System,”

International Journal of Scientific and Technology Research, Vol. 3, No. 10, October 2014.

42.

Authors: Ukwuaba, Samuel Ifeanyi, Agberegha, Orobome Larry, Mohammed, Bello Ahmed

Paper Title: Analysis and Performance Evaluation of Gas Turbine by Incorporating a Wetted Evaporative Media

Cooler

Abstract: Gas turbine shows great inverse effect on ambient air temperature. The efficiency and net power output

of the gas turbine increases with decrease in ambient air temperature. Nigeria with an average ambient air

temperature of 31°C tends to experience a drop in gas turbine efficiency and net power output. It has been proven

that by employing wetted evaporative media cooler to the inlet of the compressor, the gas turbine plant performance

can be maximized; this employed devise reduces the inlet temperature. An open cycle gas turbine Frame 9E in

Ihovbor power plant Benin Edo State, Nigeria generating electricity at a capacity of 450MW was used as a

retrofitted study for the research by using Aspen HYSY V9 simulation one software model. The results, from plots

of graphs, when interpreted, depicts a direct proportionality between ambient air temperature and compressor work;

an inverse proportionality between ambient air temperature and net power output of the turbine; a direct

proportionality between ambient air temperature and specific fuel consumption; an inverse proportionality between

ambient air temperature and plant efficiency. The numerical value for the drop in ambient air temperature

consequent upon the use of evaporative cooler is 11.250C. Since the gas turbine is a thermal engine, its inlet

temperature – ambient temperature – has significant effect on the aforementioned parameters; so that, results from

the study, shows; the evaporative cooler results in a drop in ambient temperature of 11.25°C, showing an increase of

about 3.7% efficiency and 11.56MW net power output of the turbine. Drop in specific fuel consumption is

0.024kg/KWh. From the research, it is deduced that gas turbine plants perform better in temperate regions than

tropical regions. Therefore, to maximize the performance of a gas turbine plants in high temperature climates,

retrofitting it with an air cooler will lower the temperature to a value close to the design temperature before

compression takes place and it will tend to improve gas turbine performance in tropical country like Nigeria.

Keywords: Gas turbine, efficiency, ambient temperature, net power output, simulation

References: 1. Farzaneh-Gord, M., Deymi-Dashtebayaz, M. (2011). The various methods of air conditioning gas inlet turbine performance, energy ,

vol. 36, pp. 1196-1205

2. Society of Heating, Refrigeration and Air Conditioning Engineers of America (2008), "SHARAE Hand book-systems of HVAC and

equipment (SI) CD Rom, Atlanta, GA 3. Zuniga, MO.V, (2005). Admission system for industrial gas turbine "cranfield university, United Kingdom. Vol. 21, pp. 4– 7

4. Johnson RS (1989). The theory and operation of evaporative cooler for industrial gas turbine. Journal of Eng. Gas Turbine Power, 111,

pp.327-334 5. Hosseini, R., Beshkani A. and Soltani M. (2007). Improves the performance of Fars gas turbines. (Iran), combined cycle power plant by air

intake cooling using a media evaporative cooler, Ener. Conver. Manage, vol. 48, pp. 1055-1064

6. Zadpoor A.A., and Golshan A.H. (2006). Improvement of the performance of a gas turbine cycle using a desiccant evaporative cooling system, J. Energy., Vol. 31, p. 2652-2664

7. Alhazmy M.M., and Najjar Y.S.H. (2004). Increase in the performance of the gas turbine using air. Coolers of Applied Thermal

Engineering, 24, pp.415-429. 8. Bhargava R.K., Branchini L., Melino F. and Peretto A. (2001). Gas turbine available and future.Power increase technologies: technical-

economic analysis in selected climatic conditions. J Eng power gas turbine, 134 (10)

9. Ifedi V. (2005). Electrical reform and electrical generation. Pp.12- 12 10. Ibrahim T.K .., Rahman M.M. and Abdalla A.N (2010). Study on the effective gas parameter.turbine model with intercooling compression

process ", Scientific Research and Essays Vol. 5 (23), pp. 3760-3770

11. Shi X., Agnew B., Che D. and Gao J. (2010). Improvement of the performance of conventional combinations. Energy plant cycle by inlet air cooling, partial cooling and cold energy utilization of LNG, Applied thermal engineering 30, pp.2003-2010.

12. Sanjay O., Muku, A. and Rajay, Y. (2009). Energy Analysis and Exergy of the Brayton-Diesel Cycle. Proceedings of the 2009 World

Engineering Congress, London, 2 (1), pp.1-6

13. Global Energy Observation, (2011). History of edits for Ihovbor open circle Gas turbine Power Plant Nigeria

14. Manuel Colera, Ángel Soria, Javier Ballester (2019), A numerical scheme for the thermodynamic analysis of gas turbines, Applied Thermal

Engineering, Volume 147, Pages 521-536

226-232

Page 29: International Journal of Engineering and Advanced Technology · 2019. 1. 18. · International Journal of Engineering and Advanced Technology International Journal of Engineering

15. Hyun Min Kwon, Tong Seop Kim, Jeong Lak Sohn, Do Won Kang, Performance (2018), upgrading of the gas turbine combined cycle power plant by dual cooling of the inlet air and turbine coolant using a gas cooler Absorption, Energy, Volume 163, Pages 1050-1061

16. Hiwa Khaledi, Roozbeh Zomorodian, Mohammad, Bagher Ghofrani. "Effect of air cooling of entry by Absorption chiller in gas turbine and

combined cycle performance ", Advanced Energy Systems, 2005 17. Rahim, M. A .. "Analysis of performance and sensitivity of a combined-cycle gas turbine power plant by several input air cooling systems",

Minutes of the Mechanical Engineers' Institution, Part A, Energy Diary and Energy, 2012