international journal of innovative technology and ... · dr. gamal abd el-nasser ahmed mohamed...

191

Upload: others

Post on 04-Jul-2020

23 views

Category:

Documents


0 download

TRANSCRIPT

Editor-In-Chief Dr. Shiv Kumar

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE

International Journal of Recent Technology and Engineering (IJRTE)

Associated Editor-In-Chief Chair Prof. MPS Chawla

Member of IEEE, Professor-Incharge (head)-Library, Associate Professor in Electrical Engineering, G.S. Institute of Technology &

Science Indore, Madhya Pradesh, India, Chairman, IEEE MP Sub-Section, India

Dr. Vinod Kumar Singh

Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Dr. Rachana Dubey

Ph.D.(CSE), MTech(CSE), B.E(CSE)

Professor & Head, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE),

Bhopal (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota

Ph.D. (CSE), MCA, MSc (Mathematics)

Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

Ph.D(CSE), MS(CSE), BSc(EE)

Department of Computer and Information Technology, Port Training Institute, Arab Academy for Science ,Technology and Maritime

Transport, Egypt

Dr. Mayank Singh

PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT

Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-

Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker

Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)

Stamford, USA.

Prof. (Dr.) Nishakant Ojha

Principal Advisor (Information &Technology) His Excellency Ambassador Republic of Sudan& Head of Mission in New Delhi, India

Dr. Shanmugha Priya. Pon

Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East

Africa, Tanzania

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,

China.

Dr. Fadiya Samson Oluwaseun

Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

Cyprus, Turkey.

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra

Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair Dr. Deepak Garg

Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue

Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura, Egypt.

Dr. Hugo A.F.A. Santos

ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia

Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg

Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng

Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas

Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov

Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr.Ch.V. Raghavendran

Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang

Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,

Hochiminh, Vietnam.

Dr. Wilson Udo Udofia

Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Dr. Ch. Ravi Kumar

Dean and Professor, Department of Electronics and Communication Engineering, Prakasam Engineering College, Kandukur (Andhra

Pradesh), India.

Dr. Sanjay Pande MB

FIE Dip. CSE., B.E, CSE., M.Tech.(BMI), Ph.D.,MBA (HR)

Professor, Department of Computer Science and Engineering, G M Institute of Technology, Visvesvaraya Technological University

Belgaum (Karnataka), India.

Manager Chair

Mr. Jitendra Kumar Sen Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair Prof. (Dr.) Rahul Malhotra

Director – Principal, Department of Electronics & Communication, Swami Devi Dyal Institute of Engineering and Technology,

Barwala (Haryana), India.

Editorial Members Dr. Wameedh Riyadh Abdul-Adheem

Academic Lecturer, Almamoon University College/Engineering of Electrical Power Techniques, Baghdad, Iraq

Dr. T. Sheela

Associate Professor, Department of Electronics and Communication Engineering, Vinayaka Mission’s Kirupananda Variyar

Engineering College, Periyaseeragapadi (Tamil Nadu), India

Dr. Manavalan Ilakkuvan

Veteran in Engineering Industry & Academics, Influence & Educator, Tamil University, Thanjavur, India

Dr. Shivanna S.

Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. H. Ravi Kumar

Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. Pratik Gite

Assistant Professor, Department of Computer Science and Engineering, Institute of Engineering and Science (IES-IPS), Indore (M.P),

India

Dr. S. Murugan

Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi (Tamil Nadu), India

Dr. S. Brilly Sangeetha

Associate Professor & Principal, Department of Computer Science and Engineering, IES College of Engineering, Thrissur (Kerala),

India

Dr. P. Malyadri

Professor, ICSSR Senior Fellow Centre for Economic and Social Studies (CESS) Begumpet, Hyderabad (Telangana), India

Dr. K. Prabha

Assistant Professor, Department of English, Kongu Arts and Science College, Coimbatore (Tamil Nadu), India

Dr. Liladhar R. Rewatkar

Assistant Professor, Department of Computer Science, Prerna College of Commerce, Nagpur (Maharashtra), India

Dr. Raja Praveen.N

Assistant Professor, Department of Computer Science and Engineering, Jain University, Bengaluru (Karnataka), India

Dr. Issa Atoum

Assistant Professor, Chairman of Software Engineering, Faculty of Information Technology, The World Islamic Sciences & Education

University, Amman- Jordan

Dr. Balachander K

Assistant Professor, Department of Electrical and Electronics Engineering, Karpagam Academy of Higher Education, Pollachi

(Coimbatore), India

Dr. Sudhan M.B

Associate Professor & HOD, Department of Electronics and Communication Engineering, Vins Christian College of Engineering,

Anna University, (Tamilnadu), India

Dr. T. Velumani

Assistant Professor, Department of Computer Science, Kongu Arts and Science College, Erode (Tamilnadu), India

Dr. Subramanya.G.Bhagwath

Professor and Coordinator, Department of Computer Science & Engineering, Anjuman Institute of Technology & Management

Bhatkal (Karnataka), India

Dr. Mohan P. Thakre

Assistant Professor, Department of Electrical Engineering, K. K. Wagh Institute of Engineering Education & Research Hirabai

Haridas Vidyanagari, Amrutdham, Panchavati, Nashik (Maharashtra), India

Dr. Umar Lawal Aliyu

Lecturer, Department of Management, Texila American University Guyana USA.

Dr. K. Kannan

Professor & Head, Department of IT, Adhiparasakthi College of Engineering, Kalavai, Vellore, (Tamilnadu), India

S.

No. Volume-8 Issue-9S, July 2019, ISSN: 2278-3075 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication Page No.

1.

Authors: Hari Shankar, Ankush Kansal

Paper Title: MGF-based Analysis of Maximum Ratio Combining Receiver over Fisher-Snedecor

Composite Fading Channel

Abstract: Fisher Snedecor composite fading model is the combination of Nakagami-m and

inverse Nakagami-m distribution. The Nakagami-m is used to characterize the small scale

fading, whereas shadowing is modeled by inverse Nakagami-m distribution. In this paper,

the closed-form expression for moment generating function (MGF) of instantaneous signal

to noise ratio (SNR) over independent identically distributed (i.i.d) Fisher-Snedecor

composite fading channel using maximum ratio combining (MRC) diversity technique is

derived. By using newly derived MGF expression, we derive the closed-form expressions of

average bit error rate (ABER) or average symbol error rate (ASER) for different binary and

multilevel modulation schemes. The expressions for average channel capacity (ACC) under

two adaptive transmission protocols like optimum rate adaption (ORA) and channel

inversion with fixed rate (CIFR) are also derived using proposed MGF. Further, the

numerical results of newly derived expression are presented and compared with the results

of Rayleigh and Nakagami-m distribution which is the special case of Fisher Snedecor

composite fading model.

Keyword: Fading, shadowing, maximum ratio combining, channel capacity, error

probability.

References: 1. P.M. Shankar, Fading and Shadowing for Wireless system. New York: Springer, 2005.

2. M.K. Simon, M.S. Alouini, Digital Communication over Fading Channels. New York: John Wiley & Sons,

2005. 3. M.K. Simon, M.S. Alouini, A unified approach to the performance analysis of digital communication over

generalized fading channels. Proceedings of the IEEE, 1999; 86(9): 1860-1877.

4. M.S. Alouini, A. J. Goldsmith. (1999). A unified approach for calculating error rates of linearly modulated signals over generalized fading channels. IEEE Trans. commun. 47(9), pp.1324-1334.

5. K.A. Hamdi. (2008). Capacity of MRC on correlated Rician fading channels. IEEE Trans. commun. 56(5), pp.

708-711. 6. M.D. Renzo, F. Graziosi, F. Santucci. (2010). Channel capacity over generalized fading channels: A novel

MGF-based approach for performance analysis and design of wireless communication systems. IEEE Trans.

Veh. Technol. 59(1), pp. 127-149. 7. A. Abdi, M. Kaveh. (1998). K-distribution: an appropriate substitute for Rayleigh-lognormal distribution in

fading- shadowing wireless channels. Electron. Lett. 34(9), pp. 851-852.

8. P.M. Shankar. (2004). Error rates in generalized shadowed fading channels. Wirel. Pers. Commun. 3, pp. 233–38.

9. S.K. Yoo, S.L. Cotton, P.C. Sofotasios, S. Freear. (2016). Shadowed Fading in Indoor Off-Body

Communication Channels: A Statistical Characterization Using the κ-μ/gamma Composite Fading Model. IEEE Trans. Wirel. Commun. 15(8), pp. 5231-5244.

10. S.K. Yoo, S.L. Cotton, P.C. Sofotasios, M. Matthaiou, M. Valkama, G.K. Karagiannidis. (2017). The Fisher-

Snedecor F distribution: A Simple and Accurate Composite Fading Model. IEEE Commun Lett. 21(7), pp. 1661-1664.

11. T. Aldalgamouni, M.C. Ilter, O.S. Badarneh, H. Yanikomeroglu. Performance analysis of Fisher-Snedecor F

composite fading channels. IEEE Middle East and North Africa Communications Conference

(MENACOMM). Jounieh, Lebanon, 2018.

12. H.A. Hmood, Performance of cognitive radio systems over κ-µ shadowed with integer µ and Fisher-Snedecor F

fading channels. International Iraqi Conference on Engineering Technology and its Applications. Al-Najaf, Iraq, 2018.

13. J. Gong, H. Lee, J. Kang. (2018). Generalized moment generating function-based secrecy performance analysis

over Fisher-Snedecor composite fading channels. Electron. Lett. 54 (24), pp. 1381-1383. 14. S. Chen, J. Zhang, G.K. Karagiannidis, B. Ai. (2018). Effective rate of MISO systems over Fisher–Snedecor F

Fading Channels. IEEE Commun. Lett. 22 (12), pp. 2619-2622.

15. L. Kong, G. Kaddoum. (2018). On physical layer security over the Fisher- Snedecor F wiretap Fading Channels. IEEE Access. 6, pp. 39466-39472.

16. F.S. Almehmadi, O.S. Badarneh. (2018). On the effective capacity of Fisher–Snedecor F fading channels.

Electon. Lett. 54(18), pp. 1068-1070. 17. S.K. Yoo, P. C. Sofotasios, S.L Cotton, S. Muhaidat, F.J. Lopez-Martinez, J.M. Romero-Jerez, G.K.

Karagiannidis. (2019). A comprehensive analysis of the achievable channel capacity in F composite fading

1-9

channels. IEEE Access. 2019.

18. O.S. Badarneh, D.B. da Costa, P. C. Sofotasios, S. Muhaidat, S.L. Cotton. (2018). On the sum of Fisher-

Snedecor F variates and its application to maximal-ratio combining. IEEE Wirel. Commun. Lett. 7(6), pp.

966-969. 19. I.S. Gradshteyn, I.M. Ryzhik. Table of Integrals, Series, and Products. Academic Press, New York, 2007.

20. K.P. Peppas, H.E. Nistazakis, G.S. Tombras. An overview of the physical insight and the various

performance metrics of fading channels in wireless communication systems. Advanced Trends Wirel. Commun. In Tech. 2011.

21. S.P. Singh, S. Kumar. (2016). A MGF based closed form expressions for error probability and capacity over

EGK fading for interference limited system. Wirel pers commun. 91(2), pp. 577-816. 22. A. Hamed, M. Alsharef, R.K. Rao. MGF based performance analysis of digital wireless system in urban

shadowing environment. Proceedings of the world congress on engineering and computer science

(WCECS), San Francisco, USA, 2015

2.

.

Authors: Khushmeen Brar, Ashima Kalra, Piyush Samant

Paper Title: An Improved Technique to Diagnose Skin Cancer using Advanced Image Processing

and Machine Learning Techniques

Abstract: Skin cancer is being classified among the mortal and exaggerating forms of cancer

since decade. Notwithstanding, the early diagnosis of skin cancer is very important and it is

an extravagant procedure. The presence of human skin is tough to examine and to model.

This is because of its complex surface. The difficulty of the irregular edge, tone, appearance

of thick hair and other alleviating features generate the skin tough to be analyzed. Human

skin has some non-identical sorts of textures that diseased skin can characterize between the

textures of the healthy one. In consequence, considerable achievements have not been

brought into the evolution of diagnosis approach for skin cancer. On the other hand, skin

cancer diagnosis in dermoscopic portrayals is an exceptionally troublesome chore.

Notwithstanding, the early diagnosis of skin cancer is very important and it is an extravagant

procedure. In consequence, considerable achievements have not been brought into the

evolution of diagnosis approach for skin cancer. For precise diagnosis and categorization of

skin cancer, particular features are recommended that one may categorize benign and

malignant illustration. A midst analysts, governing the efficacious mechanism of skin cancer

diagnosis is an all-important matter of contention. Ascertaining the more proficient methods

of diagnosis to minimize the amount of errors is a crucial subject among analysts. Image

processing is used to recognize the affected area by disease, its form and color etc. The

reason behind it is to minimize the percentage of miscalculations. Computer vision can bring

about influential contribution in skin cancer detection. Computer Aided Diagnosis provides

support in the premature diagnosis of skin cancer. Programmed skin abrasion segregation is a

stimulating chore because of the low contrast between abrasion and encompassing skin and

asymmetrical periphery. In this paper we present an amalgamation of statistical features,

GLCM features and GLRLM features. The recommended methodology is enacted on 100

images from PH2 database. In this work 2 segmentation tactics namely Otsu’s thresholding

and Region growing have been explored. The performance of two systems is measured in

terms of sensitivity, specificity, accuracy, precision, recall and f-measure.

Keywords: Biomedical image processing, Skin cancer, Gray-level Co-occurrence Matrix,

Grey-level Run Length Matrix, Region Growing, Otsu thresholding, supervised classification

References: 1. A. Rajesh, “Classification of malignant melanoma and Benign Skin Lesion by using back propagation

neural network and ABCD rule,” Cluster Comput., pp. 1–8, 2018.

2. S. Jain, V. Jagtap, and N. Pise, “Computer aided melanoma skin cancer detection using image processing,” Procedia Comput. Sci., vol. 48, no. C, pp. 736–741, 2015.

3. P. Dubai, S. Bhatt, C. Joglekar, and S. Patii, “Skin cancer detection and classification,” Proc. 2017 6th

Int. Conf. Electr. Eng. Informatics Sustain. Soc. Through Digit. Innov. ICEEI 2017, vol. 2017–Novem, pp. 1–6, 2018.

4. H. Alquran et al., “The melanoma skin cancer detection and classification using support vector machine,” 2017 IEEE Jordan Conf. Appl. Electr. Eng. Comput. Technol. AEECT 2017, vol. 2018–Janua, pp. 1–5,

2018.

5. S. M. Jaisakthi, P. Mirunalini, and C. Aravindan, “Automated skin lesion segmentation of dermoscopic

10-17

Authors: Kanupriya Verma, Sahil Bhardwaj, Resham Arya, Mir Salim Ul Islam, Megha

Bhushan, Ashok Kumar, Piyush Samant

Paper Title: Latest Tools for Data Mining and Machine Learning

Abstract: Nowadays, Data Mining is used everywhere for extracting information from the

data and in turn, acquires knowledge for decision making. Data Mining analyzes patterns

which are used to extract information and knowledge for making decisions. Many open

source and licensed tools like Weka, RapidMiner, KNIME, and Orange are available for

Data Mining and predictive analysis. This paper discusses about different tools available for

Data Mining and Machine Learning, followed by the description, pros and cons of these

tools. The article provides details of all the algorithms like classification, regression,

characterization, discretization, clustering, visualization and feature selection for Data

images using GrabCut and k-means algorithms,” IET Comput. Vis., vol. 12, no. 8, pp. 1088–1095, 2018.

6. P. Bumrungkun, K. Chamnongthai, and W. Patchoo, “Detection skin cancer using SVM and snake

model,” 2018 Int. Work. Adv. Image Technol. IWAIT 2018, pp. 1–4, 2018.

7. S. Joseph and J. R. Panicker, “Skin lesion analysis system for melanoma detection with an effective hair segmentation method,” in International Conference on Information Science, ICIS, 2016, pp. 91–96.

8. N. Petrellis, “Using Color Signatures for the Classification of Skin Disorders,” 2018 7th Int. Conf. Mod.

Circuits Syst. Technol., pp. 1–4, 2018. 9. A. Fidalgo Barata, E. Celebi, and J. Marques, “Improving Dermoscopy Image Classification Using Color

Constancy,” IEEE J. Biomed. Heal. Informatics, vol. 2194, no. c, pp. 1–1, 2014.

10. M. N. Islam, J. Gallardo-Alvarado, M. Abu, N. A. Salman, S. P. Rengan, and S. Said, “Skin disease recognition using texture analysis,” 2017 IEEE 8th Control Syst. Grad. Res. Colloquium, ICSGRC 2017

- Proc., vol. 1, no. August, pp. 144–148, 2017.

11. C. Barata, M. Ruela, M. Francisco, T. Mendonca, and J. S. Marques, “Two systems for the detection of melanomas in dermoscopy images using texture and color features,” IEEE Syst. J., vol. 8, no. 3, pp. 965–

979, 2014.

12. O. Abuzaghleh, B. D. Barkana, and M. Faezipour, “Automated skin lesion analysis based on color and shape geometry feature set for melanoma early detection and prevention,” 2014 IEEE Long Isl. Syst.

Appl. Technol. Conf. LISAT 2014, 2014.

13. N. F. M. Azmi, H. M. Sarkan, Y. Yahya, and S. Chuprat, “ABCD rules segmentation on malignant tumor

and Benign skin lesion images,” 2016 3rd Int. Conf. Comput. Inf. Sci. ICCOINS 2016 - Proc., pp. 66–70,

2016.

14. A. N. Hoshyar, A. Al-Jumaily, and R. Sulaiman, “Review on automatic early skin cancer detection,” 2011 Int. Conf. Comput. Sci. Serv. Syst. CSSS 2011 - Proc., pp. 4036–4039, 2011.

15. A. N. Hoshyar, A. Al-Jumaily, and A. N. Hoshyar, “The beneficial techniques in preprocessing step of

skin cancer detection system comparing,” Procedia Comput. Sci., vol. 42, no. C, pp. 25–31, 2014. 16. F. Adjed, S. J. Safdar Gardezi, F. Ababsa, I. Faye, and S. Chandra Dass, “Fusion of structural and

textural features for melanoma recognition,” IET Comput. Vis., vol. 12, no. 2, pp. 185–195, 2018.

17. R. Sumithra, M. Suhil, and D. S. Guru, “Segmentation and classification of skin lesions for disease diagnosis,” Procedia Comput. Sci., vol. 45, no. C, pp. 76–85, 2015.

18. R. Maurya, S. K. Singh, A. K. Maurya, and A. Kumar, “GLCM and Multi Class Support vector machine

based automated skin cancer classification,” 2014 Int. Conf. Comput. Sustain. Glob. Dev., pp. 444–447, 2014.

19. T. M. P. M. Ferreira1 and J. S. M. A. R. S. M. J. R. Abstract—The, “PH2 - A dermoscopic image

database for research and benchmarking*,” J. ACM, vol. 14, no. 4, pp. 677–682, 1967. 20. C. Hima Bindu and K. Satya Prasad, “An Efficient Medical Image Segmentation Using Conventional

OTSU Method,” Int. J. Adv. Sci. Technol., vol. 38, pp. 67–74, 2012.

21. S. Kamdi and R. K. Krishna, “Image Segmentation and Region Growing Algorithm,” Int. J. Comput.

Technol. Electron. Eng., vol. 2, no. 1, pp. 2249–6343, 2012.

22. J. Virmani and R. Agarwal, “ScienceDirect Effect of despeckle filtering on classification of breast tumors

using ultrasound images,” Integr. Med. Res., pp. 1–21, 2019. 23. P. Samant and R. Agarwal, “Machine learning techniques for medical diagnosis of diabetes using iris

images,” Comput. Methods Programs Biomed., vol. 157, pp. 121–128, 2018.

24. Kriti, Jitendra Virmani and Ravinder Agarwal, "Effect of despeckle filtering on classification of breast tumors using ultrasound images", Biocybernetics and Biomedical Engineering, Vol. 39, No. 2, pp. 536-

560, 2019.

25. Jitendra Virmani, Vinod Kumar, Naveen Kalra and Niranjan Khandelwal, "Neural network ensemble based CAD system for focal liver lesions using B-mode ultrasound", Journal of Digital Imaging, Vol. 27,

No. 4. Pp. 520-537, 2014.

26. Jitendra Virmani, Vinod Kumar, Naveen Kalra and Niranjan Khandelwal, "SVM-based characterization of liver cirrhosis by singular value decomposition of GLCM matrix", International Journal of Artificial

Intelligence and Soft Computing, Vol. 3, No.3, 2013, pp. 276-296. 27. P Samant, R Agarwal, "Comparative analysis of classification based algorithms for diabetes diagnosis

using iris images", journal of Medical Engineering & Technology, vol. 42, 2018.

3.

Mining and Machine Learning tools. It will help people for efficient decision making and

suggests which tool is suitable according to their requirement.

Keywords: Data mining, Open source tools, Licensed tools, Machine learning

References: 1. U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, “From data mining to knowledge discovery in databases,” in

AI Magazine, 1996, vol. 17, no. 3, pp. 37–54. 2. J. Alcala-Fdez et al. “KEEL: a software tool to assess evolutionary algorithms for data mining problems,” in

Soft Computing, 2009, vol. 13, pp. 307-318.

3. R. Mikut, and R. Markus, “Data mining tools," in Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 2011, vol. 1, pp. 431-443.

4. A. M. Hirudkar, and SS. Sherekar, “Comparative analysis of data mining tools and techniques for evaluating

performance of database system,” in International Journal of Computer Science Appllications, 2013, vol. 6, pp. 232-237.

5. N. Sharma, A. Bajpai, and R. Litoriya, “Comparison the various clustering algorithms of weka tools,” in

facilities, 2012, vol.4, pp. 78-80.

6. https://rapidminer.com/glossary/data-mining-tools/

7. Q. M. Yas, A.A. Zaidan, B.B. Zaidan, B. Rahmatullah and H.A. Karim,“Comprehensive insights into

evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions,” in Measurement,2018, vol. 114, pp. 243-260

8. A. Jovic, B. Karla, and B. Nikola, “An overview of free software tools for general data mining,” in IEEE 37th

International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014, pp. 1112-1117.

9. N. Borude, C. Maher, V. Sarda, and A. Santra, “Generic binary classifier tool for diagnosis of patients

suffering from brain disorders in R,” in International Conference on Computing, Analytics and Security Trends (CAST), 2016, IEEE pp. 173-178.

10. B. Radim, K. Jan, S. Zdeněk, U. Václav, and D. Otto, “Rapidminer image processing extension: A platform

for collaborative research,” in 33rd International Conference on Telecommunication and Signal Processing, TSP, 2010, pp. 114-118.

11. R.M. Rahman, and F. Afroz, “Comparison of various classification techniques using different data mining

tools for diabetes diagnosis,” in Journal of Software Engineering and Applications, 2013, vol. 6, p. 85. 12. H. Solanki, “Comparative study of data mining tools and analysis with unified data mining theory,” in

International Journal of Computer Applications,2013, vol. 75, pp. 23-28.

13. K. Rangra, and K. L. Bansal, “Comparative study of data mining tools,” in International journal of advanced research in computer science and software engineering, 2014, vol. 4.

14. X. Wu, X. Zhu, G.Q. Wu, and W. Ding, “Data mining with big data,” in IEEE Transactions on Knowledge

and Data Engineering, 2013, vol. 26, pp. 97-107. 15. DK. Tayal, A. Jain, S. Arora, S. Agarwal, T. Gupta, and N. Tyagi, “Crime detection and criminal

identification in India using data mining techniques,” in AI & society, 2015, vol. 30, pp. 117-127.

16. FP. Steinmetz, CL. Mellor, T. Meinl, and MT. Cronin, “Screening Chemicals for Receptor‐Mediated

Toxicological and Pharmacological Endpoints: Using Public Data to Build Screening Tools within a KNIME

Workflow,” in Molecular informatics, 2015, vol. 34, pp. 171-178. 17. D. Chopra , N. Joshi , and I. Mathur, “Improving Quality of Machine Translation Using Text Rewriting,” in

Computational Intelligence & Communication Technology (CICT), Second International Conference on

IEEE, 2016, pp. 22-27. 18. S. Slater, S. Joksimovic, V. Kovanovic, RS. Baker, D. Gasevic, “Tools for educational data mining: A

review,” in Journal of Educational and Behavioral Statistics, 2017, vol. 42 ,pp. 85-106.

19. D. Wilk-Kolodziejczyk, K. Regulski, G. Gumienny, B. Kacprzyk, S. Kluska-Nawarecka, K. Jaskowiec, “Data mining tools in identifying the components of the microstructure of compacted graphite iron based on the

content of alloying elements,” in The International Journal of Advanced Manufacturing Technology, 2018,

vol. 95, pp. 3127-3139. 20. T. Siddiqui, and A. Ausaf, “Data mining tools and techniques for mining software repositories: A systematic

review,” in Big Data Analytics. Springer, Singapore, 2018, pp. 717-726.

21. R. Alcalá, MJ. Gacto, J. Alcalá‐Fdez “Evolutionary data mining and applications: A revision on the most

cited papers from the last 10 years (2007–2017),” in Wiley Interdisciplinary Reviews: Data Mining and

Knowledge Discovery, 2018 ,vol. 8 , e1239. 22. S. Yefimenko, “Advances in GMDH-based Predictive Analytics Tools for Business Intelligence Systems,” in

International Conference Proceedings, ACIT, 2018, pp. 254-257.

23. https://www.softwareadvice.com/bi/dundas-bi-profile/

18-23

Authors: Shagun Sharma, Mamta Nanda, Raghav Goel, Aashrey Jain, Megha Bhushan,

Ashok Kumar

Paper Title: Smart Cities using Internet of Things: Recent Trends and Techniques

4.

Abstract: A Smart Cities focuses on the way we live. Smart governments are also

acknowledged as augmentations of electronic governments based on the Internet of Things

(IoT). There are many existing challenges in the environment such as, research in gadgets,

framework and programming etc. Particularly, the Smart Cities are facing difficulties with

IoT frameworks, systems administration, independent registration, wearable sensors,

gadgets and systematization of aggregates including human beings as well as programming

specialists. This paper incorporates role of Smart Cities in various domains such as smart

infrastructure, smart building, smart security and so on. Moreover, the work depicts the IoT

technologies for Smart Cities and the primary components along with the features of Smart

Cities. This paper is based on technologies for Smart Cities which will benefit citizens by

facilitating a platform for integrating all the resources and prompt communication of

information. Furthermore, merits, demerits and main challenges of Smart Cities are

discussed.

Keyword: Smart Cities, IoT, Sensor System Integration, Smart technology, Smart citizens

References: 1. Scuotto, Veronica, Alberto Ferraris, and Stefano Bresciani. "Internet of Things: Applications and

challenges in Smart Cities: a case study of IBM Smart Cities projects." Business Process Management Journal 22.2 (2016): 357-367.

2. Fazio, M., Paone, M., Puliafito, A., & Villari, M. (2012, July). Heterogeneous sensors become homogeneous things in Smart Cities. In 2012 Sixth International Conference on Innovative Mobile and

Internet Services in Ubiquitous Computing (pp. 775-780). IEEE.

3. Bresciani, S., Ferraris, A., & Del Giudice, M. (2018). The management of organizational ambidexterity through alliances in a new context of analysis: Internet of Things (IoT) Smart Cities

projects. Technological Forecasting and Social Change, 136, 331-338.

4. Chatterjee, S., Kar, A. K., & Gupta, M. P. (2018). Success of IoT in Smart Cities of India: an empirical

analysis. Government Information Quarterly, 35(3), 349-361.

5. Zhu, H., Chang, A. S., Kalawsky, R. S., Tsang, K. F., Hancke, G. P., Bello, L. L., & Ling, W. K. (2017, October). Review of state-of-the-art wireless technologies and applications in Smart Cities. In IECON

2017-43rd Annual Conference of the IEEE Industrial Electronics Society (pp. 6187-6192). IEEE.

6. Arasteh, H., Hosseinnezhad, V., Loia, V., Tommasetti, A., Troisi, O., Shafie-Khah, M., & Siano, P.

(2016, June). Iot-based Smart Cities: a survey. In 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC) (pp. 1-6). IEEE.

7. Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for Smart

Cities. IEEE Internet of Things journal, 1(1), 22-32.

8. Deakin, Mark, and Husam Al Waer. "From intelligent to Smart Cities." Intelligent Buildings

International 3.3 (2011): 140-152.

9. AlEnezi, A., AlMeraj, Z., & Manuel, P. (2018, April). Challenges of IoT based smart-government development. In 2018 21st Saudi Computer Society National Computer Conference (NCC) (pp. 1-6).

IEEE.

10. Balsamo, D., Merrett, G. V., Zaghari, B., Wei, Y., Ramchurn, S., Stein, S., & Beeby, S. (2017,

September). Wearable and autonomous computing for future Smart Cities: Open challenges. In 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) (pp. 1-

5). IEEE.

11. Fan, Y. J., Yin, Y. H., Da Xu, L., Zeng, Y., & Wu, F. (2014). IoT-based smart rehabilitation

system. IEEE transactions on industrial informatics, 10(2), 1568-1577.

12. Roman, Rodrigo, Jianying Zhou, and Javier Lopez. "On the features and challenges of security and privacy in distributed internet of things." Computer Networks 57.10 (2013): 2266-2279.

13. Balakrishna, Chitra. "Enabling technologies for Smart Cities services and applications." 2012 sixth

international conference on next generation mobile applications, services and technologies. IEEE, 2012.

14. Winters, John V. "Why are Smart Cities growing? Who moves and who stays." Journal of regional

science 51.2 (2011): 253-270.

24-28

Authors: Harbinder Singh, P.N. Hrisheekesha, Gabriel Cristobal

Paper Title: Infrared and Visible Image Fusion Based on Nonparametric Segmentation

Abstract: Image fusion is a process of combining an image sequence of the same scene into

a single image for better human perception & targeting. The thermal energy reflected from

outstanding objects under poor lighting conditions and visible information that yield spatial

details needs to be fused for improving the performance of surveillance systems. In this

paper, we present a fusion technique that is helpful in surveillance systems for detecting

5.

targets when the background and the targets are of the same color. A nonparametric

segmentation based weight map computation technique is proposed to extract target details

from infrared (IR) imagery. The optimal threshold based on local features is selected

automatically for target detection. With this, the extracted salient information of targets is

blended to visible image without introducing distortions. The main advantage of the new

technique is that it is based on a single-scale binary map (SSBM) fusion approach. The

binary weight maps are computed for the fusion of separable IR target with visible imagery.

An extension to IR and visible color image fusion is also suggested for target localization.

Several simulation results are demonstrated for different data sets to support the validity of

the proposed technique.

Keyword: Infrared, visible image, night vision, image fusion, segmentation, histogram.

References: 1. A. Toet, J.K. IJspeert, A.M. Waxman, and M. Aguilar, “Fusion of visible and thermal imagery improves

situational awareness,” Displays, 18, pp. 85—95, 1998.

2. Kalman Tihanyi, Monash University, Archived from the original on 24 October 2003. Retrieved 15 March 2013.

3. Y. Niu, S. Xu, L. Wu, and W. Hu, “Airborne infrared and visible image fusion for target perception based

on target region segmentation and discrete wavelet transform,” Mathematical Problems in Engineering, vol. 2012, Article ID 275138, 10 pages, 2012.

4. H. Singh, V. Kumar, and S. Bhooshan, “Anisotropic diffusion for details enhancement in multiexposure

image fusion,” ISRN Signal Processing, vol. 2013, Article ID 928971, 18 pages, 2013. 5. S. Li, X. Kang, J. Hu, and B. Yang, “Image matting for fusion of multi-focus images in dynamic scenes,”

Information Fusion, vol. 14, no. 2, pp. 147–162, 2013.

6. P. K. Saho, S. Soltani, and A. K. C. Wong, “A Survey of Thresholding Techniques,” Computer Vision, Graphics, and Image Processing, vol. 41, pp. 233-260, 1988.

7. N. Otsu, "A Threshold Selection Method from Gray-Level Histograms," in IEEE Transactions on

Systems, Man, and Cybernetics, vol. 9, no. 1, pp. 62-66, Jan. 1979. 8. R. C. Gonzalez, and R.E. Woods, Digital Image Processing, 3rd edition, Prentice Hall, 2008.

9. C. Yang, J. Ma, S. Qi, J. Tian, S. Zheng, and X. Tian, “Directional support value of Gaussian

transformation for infrared small target detection,” Applied Optics, vol. 54, no. 9, pp. 2255-2265, 2015. 10. H. Singh, V. Kumar, and S. Bhooshan, “Weighted Least Squares Based Detail Enhanced Exposure

Fusion,” ISRN Signal Processing, vol. 2014, Article ID 498762, 18 pages, 2014. H. Singh, V. Kumar, and

S. Bhooshan, “Weighted Least Squares Based Detail Enhanced Exposure Fusion,” ISRN Signal Processing, vol. 2014, Article ID 498762, 18 pages, 2014.

11. Zhiqiang Zhou, Mingjie Dong, Xiaozhu Xie, Zhifeng Gao “Fusion of infrared and visible images for

night-vision context enhancement,” Appl Opt., vol. 55, no. 23, pp. 6480–6490, 2016. 12. D. P. Bavirisetti and R. Dhuli, "Fusion of Infrared and Visible Sensor Images Based on Anisotropic

Diffusion and Karhunen-Loeve Transform," in IEEE Sensors Journal, vol. 16, no. 1, pp. 203-209, Jan.1,

2016. 13. Durga Prasad Bavirisetti and Ravindra Dhuli “Two-scale image fusion of visible and infrared images

using saliency detection,” Infrared Physics & Technology, ISSN: 1350-4495, vol. 76, pp. 52-64, 2016.

14. H Singh, H. Fatima, S. Sharma and D. Arora, "A Novel Approach for IR Target Localization Based on IR and Visible Image Fusion," IEEE 4th International Conference on Signal Processing, Computing and

Control (ISPCC 2017), pp. 235 – 240, September 21-23, 2017.

15. Zi-Jun Feng, Xiao-Ling Zhang, Li-Yong Yuan, and Jia-Nan Wang, “Infrared Target Detection and Location for Visual Surveillance Using Fusion Scheme of Visible and Infrared Images,” Mathematical

Problems in Engineering, vol. 2013, Article ID 720979, 7 pages, 2013.

29-35

Authors: Misha Kakkar, Sarika Jain, Abhay Bansal, P.S.Grover

Paper Title: Fuzzy Logic based model to predict per phase software defect

Abstract: Software reliability is expressed as the probability of software to function

properly under specified condition for a specified time period. A basic method to evaluate

the software reliability is to check the presence of defects in the software. The presence of

defect can be calculated as defect density measured defined as total number of defects

present in the software divided by the size of the software. The paper proposes a fuzzy logic

based model to predict per phase software defect density. The model uses 3 relevant

software metrics per SDLC phase. Defect density prediction is a useful measure, which

indicates the critical modules of the project and helps software teams to plan their resources

in an efficient manner. The proposed model results are better in comparison with existing

literature in the same domain when compared using MRE performance measure on 20

6.

project dataset.

Keyword: Defect Prediction, Fuzzy logic, Metrics, Phase-wise, SDLC.

References: 1. M. Xie and M. R. Lyu, “Handbook of software reliability engineering,” Software Testing, Verification and

Reliability, vol. 222, pp. 59–60, 1996.

2. IEEE. IEEE Standard Glossary of Software Engineering Terminology, Inst. of Electrical and Electronical Engineers, vol. 121990, 1990.

3. K.Y. Cai, C.Y. Wem, M.L. Zhang, “A critical review on software reliability modeling”, Reliab. Eng. Syst.

safety vol. 32, no 3, pp 357-371, 1991. 4. Kaner, C., & Bond, W.P. “Software Engineering Metrics: What Do They Measure and How Do We Know?”,

2004.

5. N. E. Fenton and M. Neil, “A critique of software defect prediction models,” IEEE Transactions on Software Engineering, vol. 25, no. 5, pp. 675–689, 1999.

6. T. Hall, S. Beecham, D. Bowes, D. Gray, and S. Counsell, “A Systematic Literature Review on Fault

Prediction Performance in Software Engineering,” IEEE Transactions on Software Engineering, vol. 38, no. c, pp. 1–31, 2011.

7. Y. Jiang, B. Cukic, T. Menzies, and J. Lin, “Incremental Development of Fault Prediction Models,”

International Journal of Software Engineering and Knowledge Engineering, vol. 23, no. 10, pp. 1399–1425, 2013.

8. H. B. Yadav and D. K. Yadav, “A fuzzy logic based approach for phase-wise software defects prediction

using software metrics,” Information and Software Technology, vol. 63, pp. 44–57, 2015. 9. W. W. Agresti, W. M. Evanco, "Projecting software defects from analyzing software designs", IEEE Trans.

Software Engineering, vol. 18, pp. 988-997, Nov. 1992. 10. C. Smidts, M. Stutzke, R. W. Stoddard, "Software reliability modeling: An approach to early reliability

prediction", IEEE Trans. Reliability, vol. 47, pp. 268-278, Sept. 1998.

11. V. Cortellessa, H. Singh, and B. Cukic, “Early reliability assessment of UML based software models,” Proceedings of the third international workshop on Software and performance - WOSP ’02, no. May 2014, p.

302, 2002.

12. N. Fenton, M. Neil, W. Marsh, P. Hearty, Ł. Radliński, and P. Krause, “On the effectiveness of early life cycle defect prediction with Bayesian nets,” Empirical Software Engineering, vol. 13, no. 5, pp. 499–537,

2008.

13. Z. A. Rana, M. A. Mian, and S. Shamail, “Improving Recall of software defect prediction models using association mining,” Knowledge-Based Systems, vol. 90, pp. 1–13, 2015.

14. A. Tosun, A. Bener, B. Turhan, and T. Menzies, “Practical considerations in deploying statistical methods for

defect prediction: A case study within the Turkish telecommunications industry,” in Information and Software Technology, 2010, vol. 52, no. 11, pp. 1242–1257.

15. K. Dejaeger, T. Verbraken and B. Baesens, "Toward Comprehensible Software Fault Prediction Models

Using Bayesian Network Classifiers," in IEEE Transactions on Software Engineering, vol. 39, no. 2, pp. 237-257, Feb. 2013.

16. A. K. Pandey and N. K. Goyal, “Fault Prediction Model by Fuzzy Profile Development of Reliability

Relevant Software Metrics,” International Journal of Computer Applications, vol. 11, no. 6, pp. 975–8887, 2010.

17. G. Abaei, Z. Rezaei and A. Selamat, "Fault prediction by utilizing self-organizing Map and Threshold," 2013

IEEE International Conference on Control System, Computing and Engineering, Mindeb, 2013, pp. 465-470. 18. K. Gao, T. M. Khoshgoftaar, H. Wang, and N. Seliya, “Choosing software metrics for defect prediction: An

investigation on feature selection techniques,” Software - Practice and Experience, vol. 41, no. 5, pp. 579–

606, 2011. 19. M. Kakkar and S. Jain, “Feature selection in software defect prediction: A comparative study,” in

Proceedings of the 2016 6th International Conference - Cloud System and Big Data Engineering, Confluence

2016, 2016.

20. L. Ming and C. S. Smidts, “A ranking of software engineering measures based on expert opinion,” IEEE

Transactions on Software Engineering, vol. 29, no. 9, pp. 811–824, 2003.

36-41

Authors: Dr. Harpal Singh, Kanika Chhabra, Dr. Rinkesh Mittal

Paper Title: Resistivity Based Low Cost Mastitis Level Detection System

Abstract: Mastitis is universally considered the most wide spread and costly disease of the

dairy industry. It can be defined as an inflammation of mammary glands in the udder tissue.

Mastitis is a disease complex due to different causes, various degrees of intensity, variation

in disease duration and residual effect. India has ranked as the highest milk producing

country among the world. In a survey conducted by FAO for top milk producing countries,

it is estimated that by the year 2021 India will be ranked as the number one country for milk

production. In small areas of Punjab and Haryana where the farmers are illiterate and are not

7.

aware about the proper health conditions of cattle, then there are ultimate chances of cattle

to have mastitis. In this work we present low cost solution for detection of mastitis level on

the basis of resistivity of milk. The survey conducted in three different regions of Punjab

(Bathlana, Mansa, Badmajara) where cattle with mastitis and their milk was tested, tests

were also presented. It was found that milk production rate has been declined by the

unawareness of the dairy holders, as they don’t know much about the causes of mastitis. The

presented method provides comparable results for the detection of mastitis level at low cost

based on ionic concentration of milk.

Keyword: Mastitis, Resistivity, milk samples

References: 1. Marcuss Henningnson, Karin Ostergren and Petr Dejmek, “The electrical conductivity of milk – the effect of

dilution and temperature”, international journal of food and agriculture, vol 8,15-22,2005. 2. Ming-Chih Chen, Chein-HsingChen, and Chong-YuSiang, “Design of Information system for Milking Dairy

Cattle and Detection of Mastitits”, Mathematical Problems in Engineerig, Article ID 759019, 2014.

3. Francesca Gabriele, Thorgeir Lawrence, “Impact of Mastitisin Small Scale Dairy Production Systems”, Food

and Agriculture Organisation of the United States, 13, 2014.

4. Shagufta Fahmid, Eram Hassan, Hafsa Waeem, Spozhmai Barrech, Shazma Lodhi,and Sidra

Latif,”dtermination of mastiti by measuring milk electrical conductivity”, international journal of advanced research in biologicla sciences, vol 3(10), 1-4,2016.

5. Mandheer Kaur, Khush Preet Singh, Neha, Yash Hans, Amrit Pal Kaur, Palki Sahib Kaur, Ankit Magotra,

“Biotools for Early Diagnosis and Cure of Mastitis, 2016. 6. Jurjen Draaiyer, Brian Dugdill, Anthony Bennett, Jerome Mounsey,“Milk Testing and Payment Systems

Resource Book”, Food and Agriculture Organisation of United States, 2009. 7. I Panchal, I K sawhney,A K Dang, “Relation between electrical conductivity, dielectric constant, somatic cell

count and some other milk quality parameters in diagnosis of subclinical mastitis in Murrah buffaloes”, indian

journal of dairy science, 69 (3), 2016. 8. Daniella Flavia, Vilas Boas, Anibal Eugenio Vercesi Filho, Mariana Alencar Pereira, Luiz Carios Roma

Junior, and Lenira El Faro, “Association between electrical conductivity and milk productio traits in dairy gyr

cows”,Journal of Applied Animal Research, vol 45, no.1,227-233, 2017. 9. Francisco J. Ferrero, Gustavo Grillo, Perez M A,Juan C. Campo, “Design of a low cost mastitis detector in

cows b measuring electrical conductivity of milk”, IEEE Instrumentation and Measurement Technology

Conferenced, vol 1, 375-378, 2002. 10. Wikipedia

42-46

8.

Authors: Harpal Singh, Ramneek Kaur Brar and Priyanka Kaushal

Paper Title: Performance Analysis of Fractional Redundant Wavelet Transform for

Watermarking Scheme

Abstract: In this paper, an algorithm for digital image watermarking which utilizes the

hybridization technique is presented. The hybrid technique is formulated by combining the

Redundant Wavelet Transform (RDWT) with Fractional Fourier Transform (FrFT) and

Singular Value Decomposition (SVD). In this technique, watermark information is

embedded in the low frequency band of Redundant Wavelet Transform. To increase the

robustness, FrFT is implemented on low frequency coefficients of RDWT. Experimental

results have been demonstrated on the basis of Peak Signal to Noise Ratio (PSNR),

Correlation Coefficient (CC), and Gradient Magnitude Similarity Deviation (GMSD). A

comparable improvement is witnessed from the results in terms of qualitative and

quantitative analysis. The experimental results prove to be robust against various image

processing and geometrical attacks applied on the standard test images.

Keyword: Logo Watermarking; Fractional Fourier Transform (FrFT); Redundant Wavelet

Transform (RDWT); Singular Value Decomposition (SVD), Gradient Magnitude Similarity

Deviation (GMSD).

References: 1. H. Tao, L. Chongmin, J. M. Zain, and A. N. Abdalla, “Robust image watermarking theories and

teciques: A review,” J. Appl. Res. Technol., vol. 12, no. 1, pp. 122–138, 2014.

2. I. J. Cox and M. L. Miller, “A Rewiew of Watermarking and the Importance of Perceptual Modeling,”

Proc. SPIE, Hum. Vis. Electron. Imaging II, vol. 3016, pp. 92–99, 1997. 3. J. Liu and X. He, “A Review Study on Digital Watermarking,” Inf. Commun. Technol., pp. 337–341,

47-52

2007.

4. J. Nin and S. Ricciardi, “Digital watermarking techniques and security issues in the information and

communication society,” Proc. - 27th Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2013, pp. 1553–

1558, 2013. 5. F. Ernawan and M. N. Kabir, “A Blind Watermarking Technique using Redundant Wavelet Transform

for Copyright Protection,” no. March, pp. 9–10, 2018.

6. J.-G. Cao, J. E. Fowler, and N. H. Younan, “An image-adaptive watermark based on a redundant wavelet transform,” Proc. 2001 Int. Conf. Image Process. (Cat. No.01CH37205), vol. 2, pp. 277–280,

2001.

7. J. E. Fowler, “The redundant discrete wavelet transform and additive noise,” IEEE Signal Process. Lett., vol. 12, no. 9, pp. 629–632, 2005.

8. L. Chen and J. Zhao, “Adaptive Digital Watermarking Using RDWT and SVD Lei Chen and Jiying

Zhao School of Electrical Engineering and Computer Science , University of Ottawa,” pp. 0–4, 2015. 9. G. Bhatnagar and Q. M. Jonathan Wu, “A new logo watermarking based on redundant fractional

wavelet transform,” Math. Comput. Model., vol. 58, no. 1–2, pp. 204–218, 2013.

10. M. H. Vali, A. Aghagolzadeh, and Y. Baleghi, “Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition,”

Expert Syst. Appl., vol. 114, pp. 296–312, 2018.

11. S. Lagzian, “Robust watermarking scheme based on RDWT-SVD : Embedding Data in All subbands,”

pp. 48–52, 2011.

12. M. T. Taba, “The fractional fourier transform and its application to digital watermarking,” 2013 8th Int.

Work. Syst. Signal Process. Their Appl. WoSSPA 2013, pp. 262–266, 2013. 13. S. Bansal, “On the security of robust reference logo watermarking scheme in Fractional Fourier

Transform Domain,” pp. 200–205, 2013.

14. F. Q. Yu, Z. K. Zhang, and M. H. Xu, “A digital watermarking algorithm for image based on fractional fourier transform,” 2006 1st IEEE Conf. Ind. Electron. Appl., 2006.

15. H. C. Andrews and C. L. Patterson, “Singular Value Decompositions And Digital Image Processing,”

IEEE Trans. Acoust., vol. 24, no. 1, pp. 26–53, 1976. 16. V. Aslantas, “An optimal robust digital image watermarking based on SVD using differential evolution

algorithm,” Opt. Commun., vol. 282, no. 5, pp. 769–777, 2009.

17. C. Chang, P. Tsai, and C. Lin, “SVD-based digital image watermarking scheme,” vol. 26, pp. 1577–1586, 2005.

18. M. Fan, H. Wang, and S. Li, “Restudy on SVD-based watermarking scheme,” vol. 203, pp. 926–930,

2008. 19. C. Lai, “A digital watermarking scheme based on singular value decomposition and tiny genetic

algorithm,” Digit. Signal Process., vol. 21, no. 4, pp. 522–527, 2011.

20. C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” OPTICS,

vol. 284, no. 4, pp. 938–944, 2011.

21. J. Shi, N. T. Zhang, and X. P. Liu, “A novel fractional wavelet transform and its applications,” Sci.

China Inf. Sci., vol. 55, no. 6, pp. 1270–1279, 2012. 22. H. Singh, L. Kaur, and K. Singh, “Fractional M-band dual tree complex wavelet transform for digital

watermarking,” Sadhana - Acad. Proc. Eng. Sci., vol. 39, no. 2, pp. 345–361, 2014.

23. H. Singh, L. Kaur, and K. Singh, “A novel robust logo watermarking scheme using fractional M-band wavelet transform,” J. Commun. Technol. Electron., vol. 59, no. 11, pp. 1234–1246, 2014.

24. W. Xue, L. Zhang, X. Mou, and A. C. Bovik, “Gradient magnitude similarity deviation: A highly

efficient perceptual image quality index,” IEEE Trans. Image Process., vol. 23, no. 2, pp. 668–695, 2014.

25. R. Choudhary, “A Robust image Watermarking Technique using 2-level Discrete Wavelet Transform (

DWT ),” no. Ll, pp. 0–4, 2016. 26. N. Li, X. Zheng, Y. Zhao, H. Wu, and S. Li, “Robust Algorithm of Digital Image Watermarking Based

on Discrete Wavelet Transform,” pp. 942–945, 2008. 27. P. Saravanan, M. Sreekara, and K. Manikantan, “Digital Image Watermarking using Daubechies

wavelets,” 3rd Int. Conf. Signal Process. Integr. Networks, SPIN 2016, pp. 57–62, 2016.

28. N. Jindal and K. Singh, “Applicability of fractional transforms in image processing - review , technical challenges and future trends,” 2018.

29. N. Kashyap, “Image Watermarking Using 3-Level Discrete Wavelet Transform ( DWT ),” no. April, pp.

50–56, 2012. 30. Y. Chen, W. Yu, and J. C. Feng, “A digital watermarking based on discrete fractional Fourier

transformation DWT and SVD,” Proc. 2012 24th Chinese Control Decis. Conf. CCDC 2012, no. 3, pp.

1383–1386, 2012. 31. D. Hien, “RDWT Domain Watermarking based on Independent Component Analysis Extraction.”

Authors: Parneet kaur, Dr. Pooja Sahni and Dr. Sukhdeep Kaur

Paper Title: Leach Protocol in Wireless Sensor Networks using Matlab

9.

Abstract: Today, at this age of intelligent technology, the intelligent have entered

agriculture in a great way. The base of this study is WSN based irrigation system. In this

work various problems in the irrigation system based on traditional wireless sensor

networks. The flaw is related to the selection approach for CH (cluster head). The most

important technologies are used in this work i.e. to develop an automatic and intelligent

irrigation system. The use of a sensor monitoring system is an effective method to prevent

interference and to improve efficiency. The CH election approach is modified by enhancing

the list of network influencing factors. To sense the energy of the overall network, LEACH

and IMPROVED LEACH protocol are compared to have a better and efficient network.

MATLAB simulates and evaluates the performance of the communication system in terms

of network life. The results of the simulation show the different amount of sensors initial

energy in relation to the dead last node and the dead first node.

Keyword: WSN (wireless sensor networks), cluster head, MATLAB

References: 1. Shunmin Wang, “Application of high precision accuracy irrigation based on the fuzzy spatial data mining in

4G”, IEEE, International Conference on Intelligent Human-Machine Systems and Cybernetics, 2014. Sandeep Kaur, Deepali, “An automatic irrigation system for different crops with WSN”, IEEE,2017 pp 407-

411.

2. Jin Wei and Gihan J. Mendis, “A Deep Learning-Based Cyber-Physical Strategy to Mitigate False Data Injection Attack in Smart Grids”, IEEE, 2016.

3. Peng Zhang, Qian Zhang, Fusheng Liu, Changqing Song, “The Construction of the Integration of Water and

Fertilizer Smart Water Saving Irrigation System Based on Big Data”, IEEE, International Conference on Computational Science and Engineering, 2017.

4. Sandeep Kaur, Deepali, “An automatic irrigation system for different crops with WSN”, IEEE, pp 407-411,

2017. 5. Manpreet Kaur, Amarvir Singh, “Detection and Mitigation of Sinkhole Attack in wireless sensor network”,

IEEE, International Conference on Micro-Electronics and Telecommunication Engineering, 2016.

6. Ravi Kishore Kodali, Borade Samar Sarjerao, “A Low Cost Smart Irrigation System Using MQTT Protocol”, IEEE, 2017.

7. Mahammad Shareef Mekala, Dr P. Viswanathan, “A Novel Technology for Smart Agriculture Based on IoT

with Cloud Computing”, IEEE, 2017.

53-58

10.

Authors: Ranjeet Kaur and Amit Doegar

Paper Title: Localization and Classification of Brain Tumor using Machine Learning & Deep

Learning Techniques

Abstract: Digital image processing is a rising field for the investigation of complicated

diseases such as brain tumor, breast cancer, kidney stones, lung cancer, ovarian cancer, and

cervix cancer and so on. The recognition of the brain tumor is considered to be a very

critical task. A number of approaches are used for the scanning of a particular body part like

CT scan, X-rays, and Magnetic Resonance Image (MRI). These pictures are then examined

by the surgeons for the removal of the problem. The main objective of examining these MRI

images (mainly) is to extract the meaningful information with high accuracy. Machine

Learning and Deep Learning algorithms are mainly used for analysing the medical images

which can identify, localize and classify the brain tumor into sub categories, according to

which the diagnosis would be done by the professionals. In this paper, we have discussed

the different techniques that are used for tumor pre-processing, segmentation, localization,

extraction of features and classification and summarize more than 30 contributions to this

field. Also, we discussed the existing state-of-the-art, literature gaps, open challenges and

future scope in this area.

Keyword: Brain Tumor, MRI, Machine Learning

References: 1. K. Manju and Tamanna, “A Survey on Brain Tumor Detection Technique”, International Journal of

Computer Science & Management Studies (IJCSMS), vol. 15, no. 06, 2015. 2. L. Kapoor, S. Thakur, “A Survey on Brain Tumor Detection Using Image Processing Techniques”,

International Conference on Cloud Computing, Data Science & Engineering (ICCDSE), 2017.

59-66

3. Swathi, Anoop, “Comparison of different image preprocessing methods used for Retinal Fundus

images”, IEEE Conference on Emerging Devices and Smart Systems, 2017.

4. V. Y. Borole, S. S. Nimbhore, S. S. Kawthekar, “Image Processing techniques for Brain Tumor

Detection: A Review”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 2015.

5. https://www.semanticscholar.org/paper/Novel-Hardware-Implementation-of-Adaptive-Median [last

accessed on 10-05-2019]. 6. http://www.owlnet.rice.edu/~elec539/Projects99/BACH/proj2/wiener.html[last accessed on 24-03-

2019].

7. https://forums.ni.com/t5/Machine-Vision/gaussian-filter/td-p/2441104 [last accessed on 24-03-2019]. 8. E. Hassan and A. Aboshgifa, “Detecting Brain Tumour from MRI image using Matlab GUI

programme”, International Journal of Computer Science, 2015.

9. M. Jain “Review of Image Classification methods and techniques”, International Journal of Engineering Research & Technology, 2013.

10. N. V. Shree, T. N. R. Kumar, “Identification and classification of brain tumor MRI image with feature

extraction using DWT and probabilistic neural network”, Brain Informatics, vol. 5, pp. 23–30, 2018. 11. Amin, Javeria, M.Sharif, M.Yasmin, S. L. Fernandes. "A distinctive approach in brain tumor detection

and classification using MRI", Pattern Recognition Letters, 2017.

12. https://www.kdnuggets.com/2016/10/artificial-intelligence-deep-learning-neural-networks-

explained.html [last accessed on 26-03-2019].

13. https://towardsdatascience.com/a-comprehensive-guide-to-convolutional-neural-networks [last accessed

on 26-03-2019]. 14. https://medium.com/deep-math-machine-learning-ai/chapter-4-decision-trees-algorithms [last accessed

on 10-05-2019].

15. P. Kamavisdar, S. Saluja, S. Agrawal, “A Survey on Image Classification Approaches and Techniques”, International Journal of Advanced Research in Computer and Communication Engineering, 2013.

16. A. Selvapandian, K. Manivannan, “Fusion Based Glioma Brain Tumor Detection and Segmentation

using ANFIS Classification”, Computer Methods and Programs in Biomedicine, vol. 166, pp. 33-38, 2018.

17. R. B. Vallabhaneni, V. Rajesh, “Brain tumour detection using mean shift clustering and GLCM features

with edge adaptive total variation denoising technique”, Alexandria Engineering Journal, vol. 57, no. 4, pp. 2387-2392, 2018.

18. A.K. Anaraki, M. Ayati, F. Kazemi, “Magnetic resonance imaging-based brain tumor grades

classification and grading via convolutional neural networks and genetic algorithms”, Biocybernetics and Biomedical Engineering, vol. 39, no. 1, pp. 63-74, 2019.

19. K. Y. Lim, R. Mandava, “A multi-phase semi-automatic approach for multisequence brain tumor image

segmentation”, Expert Systems with Applications, Vol. 112, no. 1, pp. 288-300, 2018.

20. S. Abbasi, F. Tajeripour, “Detection of brain tumor in 3D MRI images using local binary patterns and

histogram orientation gradient”, Neurocomputing, vol. 219, pp. 526-535, 2017.

21. M. Sajjad, S. Khan, K. Muhammad, W. Wu, A. Ullah, S. W. Baik, “Multi-Grade Brain Tumor Classification using Deep CNN with Extensive Data Augmentation”, Journal of Computational Science,

vol. 30, pp. 174-182, 2019.

22. S. Kumar, C. Dabas, S. Godara, “Classification of Brain MRI Tumor Images: A Hybrid Approach”, Procedia Computer Science, vol. 122, pp. 510-517, 2017.

23. B. Kaur, M. Sharma, M. Mittal, A. Verma, L. M. Goyal, D. J. Hemanth, “An improved salient object

detection algorithm combining background and foreground connectivity for brain image analysis”, Computers & Electrical Engineering, vol. 71, pp. 692-703, 2018.

24. A. Pinto, S. Pereira, D. Rasteiro, C. A. Silva, “Hierarchical brain tumour segmentation using extremely

randomized trees”, Pattern Recognition, vol. 82, pp.105-117, 2018. 25. D. J. Hemanth, J. Anitha, “Modified Genetic Algorithm approaches for classification of abnormal

Magnetic Resonance Brain tumour images”, Applied Soft Computing, vol. 75, pp. 21-28, 2019. 26. Hunnur, S. Raut, S. Kulkarni. “Implementation of image processing for detection of brain tumors”,

International Conference on Intelligent Computing and Control Systems (ICICCS), 2017.

27. Manisha, Radhakrishnan, Suresh, “Tumor region extraction using edge detection method in brain MRI images”, International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2017.

28. A. R. Mathew, P. B. Anto, “Tumor detection and classification of MRI brain image using wavelet

transform and SVM”, International Conference on Signal Processing and Communication (ICSPC), 2017.

29. L. Kapoor, S. Thakur, “A survey on brain tumor detection using image processing techniques”,

International Conference on Cloud Computing, Data Science & Engineering, 2017. 30. M. R Islam, M. R Imteaz, M. E. Jannat. “Detection and analysis of brain tumor from MRI by Integrated

Thresholding and Morphological Process with Histogram based method”, International Conference on

Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2), 2018. 31. D. Reddy, Dheeraj, Kiran, V. Bhavana, H. Krishnappa, “Brain Tumor Detection Using Image

Segmentation Techniques”, International Conference on Communication and Signal Processing

(ICCSP), 2018. 32. S.P. Archa, C.S. Kumar, “Segmentation of Brain Tumor in MRI Images Using CNN with Edge

Detection”, International Conference on Emerging Trends and Innovations In Engineering And

Technological Research (ICETIETR), 2018. 33. A. Arnaud, F. Forbes, N. Coquery, N. Collomb, B. Lemasson, and E. L. Barbier. "Fully Automatic

Lesion Localization and Characterization: Application to Brain Tumors Using Multiparametric

Quantitative MRI Data", IEEE Transactions on Medical Imaging, vol. 7, pp. 1678-1689, 2018.

34. R. Trigui, J. Mitéran , P.M. Walker, L. Sellami, A.B. Hamida, “Automatic classification and localization

of prostate cancer using multi-parametric MRI/MRS”, Biomedical Signal Process Control, vol. 31, pp. 189–98, 2017.

35. Amin, Javeria, M. Sharif, M. Yasmin, and S. L. Fernandes. "A distinctive approach in brain tumor

detection and classification using MRI", Pattern Recognition Letters, 2017. 36. S. Khawaldeh, U. Pervaiz, A. Rafiq, R.S. Alkhawaldeh, “Noninvasive grading of glioma tumor using

magnetic resonance imaging with convolutional neural networks”, Applied Sciences, vol. 8, no. 1, pp.

27-35, 2017. 37. S. Chaplot, L. Patnaik, N. Jagannathan, “Classification of magnetic resonance brain images using

wavelets as input to support vector machine and neural network”, Biomedical Signal Process Control,

vol. 1, no.1, pp. 86–92, 2006. 38. M. Havaei, A. Davy, D. Warde-Farley, A. Biard, A. Courville, Y. Bengio, “Brain tumor segmentation

with deep neural networks”, Medical Image Analysis, vol. 35, pp.18–31, 2017.

39. J. Sachdeva, V. Kumar, I. Gupta, N. Khandelwal, C.K. Ahuja, “A package-SFERCB-Segmentation, feature extraction, reduction and classification analysis by both SVM and ANN for brain tumors”,

Applied Soft Computing, vol. 47, pp.151–167, 2017.

40. G. Litjens, T. Kooi, B.E. Bejnordi, A.A.A. Setio, F. Ciompi, M. Ghafoorian, “A survey on deep learning

in medical image analysis”, Medical Image Analysis, 2017.

41. G. Mohan, M.M. Subashini, “MRI based medical image analysis: Survey on brain tumor grade

classification”, Biomedical Signal Process Control, vol. 39, pp. 139–161, 2018.

42. S. Pereira, A. Pinto, V. Alves, C. A. Silva, “Brain tumor segmentation using convolutional neural

networks in MRI images”, IEEE Transactions of Medical Imaging, vol. 35, no. 5, pp. 1240–1251, 2016.

11.

Authors: Akanksha Upadhay and Rajesh Khanna

Paper Title: A CPW-Fed Tomb Shaped Antenna For UWB Applications

Abstract: In this paper, a Coplanar Waveguide (CPW) fed tomb shaped antenna with novel

broad banding techniques is proposed for Ultra-Wideband (UWB) applications. The initial

design is taken as an elliptical radiator and techniques such as beveling of upper and lower

half of elliptical radiator and introducing staircase in the coplanar ground plane of the

antenna are used to significantly enhance the bandwidth. The proposed antenna has overall

size of 50×38×1.6 mm3 and possess good radiation characteristics and return loss < -10 dB

in the whole UWB spectrum from 2.8 GHz to 18 GHz. CST MICROWAVE STUDIO

SUITE is employed for the design, optimization and simulation of antenna, which is based

on method of finite integration technique (FIT). The performance of the proposed antenna is

validated by comparing simulated and experimental results which exhibit that the designed

antenna can be employed in various UWB applications.

Keyword: Coplanar Waveguide, Microstrip antenna, Planar antenna, Ultra-Wideband

antenna.

References: 1. Federal Communications Commission: First report and order in the matter of revision of part 15 of the

commission's rules regarding ultra-wideband transmission systems. ET-Docket 98-153, FCC 02-48, 2002.

2. S. R. Emadian, C. Ghobadi, J. Nourinia, M. H. Mirmozafari and J. Pourahmadazar, “Bandwidth Enhancement of

CPW-Fed Circle-Like Slot Antenna With Dual Band-Notched Characteristic,” in IEEE Antennas and Wireless Propagation Letters, vol. 11, 2012, pp. 543-546.

3. C. Deng, Y. Xie and P. Li, “CPW-Fed Planar Printed Monopole Antenna with Impedance Bandwidth

Enhanced,” in IEEE Antennas and Wireless Propagation Letters, vol. 8, 2009, pp. 1394-1397. 4. K. Chung, T. Yun and J. Choi, “Wideband CPW-fed monopole antenna with parasitic elements and slots,”

in Electronics Letters, vol. 40, no. 17, 2004, pp. 1038-1040.

5. S. R. Emadian and J. Ahmadi-Shokouh, “Very Small Dual Band-Notched Rectangular Slot Antenna With Enhanced Impedance Bandwidth,” in IEEE Transactions on Antennas and Propagation, vol. 63, no. 10, 2015, pp.

4529-4534,.

6. A. K. Gautam, S. Yadav and B. K. Kanaujia, “A CPW-Fed Compact UWB Microstrip Antenna,” in IEEE Antennas and Wireless Propagation Letters, vol. 12, 2013, pp. 151-154.

7. Z. J. Tang, J. Zhan and H. L. Liu, “Compact CPW-fed antenna with two asymmetric U-shaped strips for UWB

communications,” in Electronics Letters, vol. 48, no. 14, 2012, pp. 810-812. 8. J. Pourahmadazar, C. Ghobadi, J. Nourinia, N. Felegari and H. Shirzad, “Broadband CPW-Fed Circularly

Polarized Square Slot Antenna With Inverted-L Strips for UWB Applications,” in IEEE Antennas and Wireless

Propagation Letters, vol. 10, 2011, pp. 369-372. 9. N. Chen and Y. Liang, “Coplanar-Waveguide Fed Circular Disc Monopole Antenna with Improved Radiation

Characteristics,” in The Second European Conference on Antennas and Propagation, Edinburgh, 2007, pp. 1-6.

10. Chenn-Ming Lee, Tzong Chee Yo, Cheng Hsing Luo, Chih-Ho Tu and Ying-Zong Juang, “Broadband disk

67-72

monopole antenna with a circular CPW-feeding line,” in IEEE Antennas and Propagation Society International

Symposium, Honolulu, HI, 2007, pp. 773-776.

11. N. Ojaroudi and M. Ojaroudi, “Novel Design of Dual Band-Notched Monopole Antenna With Bandwidth

Enhancement for UWB Applications,” in IEEE Antennas and Wireless Propagation Letters, vol. 12, 2013, pp. 698-701.

12. R. Addaci, N. Hamdiken, T. Fortaki, F. Ferrero, D. Seetharamdoo and R. Staraj, “Simple bandwidth-

enhancement technique for miniaturised low-profile UWB antenna design,” in Electronics Letters, vol. 50, no. 22, 2014, pp. 1564-1566.

13. Xian-Ling Liang, Shun-Shi Zhong and Feng-Wei Yao, “Compact UWB tapered-CPW-fed planar monopole

antenna,” in Asia-Pacific Microwave Conference Proceedings, Suzhou, 2005, pp. 3. 14. I. B. Vendik, A. Rusakov, K. Kanjanasit, J. Hong and D. Filonov, “Ultrawideband (UWB) Planar Antenna with

Single-, Dual-, and Triple-Band Notched Characteristic Based on Electric Ring Resonator,” in IEEE Antennas

and Wireless Propagation Letters, vol. 16, 2017, pp. 1597-1600. 15. Anju A. Chandran, and Shiney Thankachan, “Triple frequency notch in UWB antenna with single ring SRR

loading,” in Proceedings of Computer Science, vol. 93, 2016, pp. 94-100.

16. L. Peng, B. Wen, X. Li, X. Jiang and S. Li, “CPW Fed UWB Antenna by EBGs With Wide Rectangular Notched-Band,” in IEEE Access, vol. 4, 2016, pp. 9545-9552.

17. Y. Kim and D. -Kwon, “CPW-fed right-angled dual tapered notch antenna for ultra-wideband communication,”

in Electronics Letters, vol. 41, no. 12, 2015, pp. 674-675.

18. A. Dastranj and H. Abiri, “Bandwidth Enhancement of Printed E-Shaped Slot Antennas Fed by CPW and

Microstrip Line,” in IEEE Transactions on Antennas and Propagation, vol. 58, no. 4, 2010, pp. 1402-1407.

19. J. Y. Siddiqui, C. Saha and Y. M. M. Antar, “Compact SRR Loaded UWB Circular Monopole Antenna With Frequency Notch Characteristics,” in IEEE Transactions on Antennas and Propagation, vol. 62, no. 8, 2014,

pp. 4015-4020.

20. D. M. Elsheakh and E. A. Abdallah, “Ultra-wide-bandwidth (UWB) microstrip monopole antenna using split ring resonator (SRR) structure,” in International Journal of Microwave and Wireless Technologies, vol. 10, no.

1, 2018, pp. 123–132.

21. M. S. A. Rani, S. K. A. Rahim, H. Rezaie, F. D. Dahalan, M. I. Sabran, M. Z. M. Nor, and A. Zainal, “Directional UWB antenna with a parabolic ground structure and split ring resonator for a 5.8 GHz band

notch,” in Journal of Electromagnetic Waves and Applications, vol. 27, no. 1, 2013, pp. 14-22.

12.

Authors: Ritika Sharma, Rajesh Khanna

Paper Title: A Novel UWB Antenna with Reconfigurable Notch Bands

Abstract: A UWB antenna with reconfigurable notch band characteristics is proposed in

this paper. The tunable notches are created using modified E shaped resonators that can be

reconfigured to modified C shape; etched on either side of the microstrip feed line of a

circular patch UWB antenna. The single and dual band rejection characteristics are created

by using C and E shaped structure respectively. Reconfigurability is achieved by using two

RF switches. By varying the ON and OFF states of the RF switches, two different notch

bands are created; single notch band from 4 to 6.2 GHz and an additional notch band from

7.6 to 10 GHz are achieved. These wide bandwidth rejection performance leads to notching

of WLAN, WiMAX, C-band frequencies and X band Satellite communication systems.

Keyword: Circular patch antennas, parasitic element, reconfigurable, resonator, RF switch,

UWB.

References:

1. US Federal Communications Commission, et al., “FCC revision of part 15 of the commission’s rules

regarding ultra-wideband transmission systems: First report and order,” Technical Report, Feb. 2002.

2. M. Ojaroudi, N. Ojaroudi, “Novel design of dual band-notched monopole antenna with bandwidth

enhancement for UWB applications”, IEEE Antennas Wirel. Propag. Lett., vol. 12, 2013, pp. 698–701.

3. L.Y. Cai, “Compact printed ultra-wideband antennas with band-notched characteristics,” in Electronics

Letters , vol. 46, no. 12, 2010, pp. 817-819. 4. R. Zaker, C. Ghobadi, and J. Nourinia, “Bandwidth enhancement of novel compact single and dual band-

notched printed monopole antenna with a pair of L-shaped slots,” IEEE Trans. Antennas Propag., vol. 57,

no. 12, Dec. 2009, pp. 3978–3983. 5. Nikolaou, S., Kingsley, N.D., Ponchak, G.E., et al., “UWB elliptical monopoles with a reconfigurable

band notch using MEMS switches actuated without bias lines”, IEEE Trans. Antennas Propagation., vol.

57, no. 8, 2009, pp. 2242-2251. 6. Homayoon Oraizi, “Frequency- and time-domain analysis of a novel UWB reconfigurable microstrip slot

antenna with switchable notched bands”, IET Microwaves, Antennas & Propagation, vol. 11, no. 8, May

2017 , pp. 1127-1132. 7. A. Tariq, H. Ghafouri-Shiraz, “Frequency-reconfigurable monopole antennas”, IEEE Trans. Antennas

Propag., vol. 60, no. 1, pp. 44–50, 2012.

73-79

8. D. E Anagnostou, “Reconfigurable UWB antenna with RF-MEMS for on-demand WLAN rejection,”

IEEE Trans. Antennas Propagation, vol. 62, no. 2, Feb. 2014, pp. 602–608.

9. B. Badamchi, J. Nourinia, C. Ghobadi, and A. V. Shahmirzadi, “Design of compact reconfigurable ultra-

wideband slot antenna with switchable single/dual band notch functions,” IET Microwave Antennas Propagation, Vol. 8, No. 8, Nov. 2013, pp. 541–548.

10. W. A. E. Ali, and R. M. A. Moniem, “Frequency reconfigurable triple band-notched ultra-wideband

antenna with compact size,” Progress In Electromagnetics Research C, Vol. 73, Apr. 2017, pp. 37–46. 11. K. C. Gupta, R. Garg, I. J. Bhal, and P. Bhartia, Microstrip Lines and Slotlines, 2nd Edition,10–15,

Artech House, 1996.

12. Abhishek Viswanathan, Rajasi Desai, “Applying Partial-Ground Technique to Enhance Bandwidth of a UWB Circular Microstrip Patch Antenna,” International Journal of Scientific & Engineering Research,

Vol. 5, Issue 10, Oct. 2014.

13. A. Valizade, Ch. Ghobadi, J. Nourinia, N. Ojaroudi, M. Ojaroudi, “Band-notch slot antenna with enhanced bandwidth by using Ω-shaped strips protruded inside rectangular slots for UWB applications”,

Applied Computer Electromagnetics Society (ACES) J., vol. 27, no. 10, 2012, pp. 816–822.

14. S. Nikolaou, N.D. Kingsley, G.E. Ponchak, “UWB elliptical monopoles with a reconfigurable band notch using MEMS switches actuated without bias lines’, IEEE Transaction Antenna Propagation, vol. 57, no.

8, 2009, pp. 2242–2251.

15. Datasheet at http://astramtl.com/admin/uploads/switches/datasheets/1360083817_2551011.pdf

13.

Authors: Hardeep Singh Dhillon and Dr. Paras Chawla

Paper Title: Hybrid Model based on Peltier and Piezoelectric Human Energy Harvesting for

WBAN Application

Abstract: Wireless body area network (WBAN) is developed as a result of Wireless

personal area network (WPAN), in which various interconnected Body Node (BN)

communicates near and around human body. There are many differences between the

WBAN and WPAN i.e distribution, density and mobility. Due to redundant nodes, BN in

WBAN are less dense. In WBAN, Body node are implanted inside and on human body to

measure physiological signals using different sensors i.e Electro cardio graph (ECG),

electroencephalogram (EEG), Blood pressure, temperature etc) of body which collects data

and send it to sink node. Earlier researchers have used either piezoelectric harvester, solar or

temperature gradient based. But in this paper optimization technique using combination of

Peltier and Piezoelectric human energy harvesting is studied. By developing an algorithm,

extensive simulation can be performed considering four human body gestures (relaxing,

walking, running and fast running). Overall Quality of Service (QoS) including average

(packet loss, end-to-end delay, throughput) and overall detection efficiency is studied.

Keyword: Wireless body area network, QoS, Optimization, Piezoelectric, Peltier.

References: 1. Mainwaring, Alan ‘Wireless sensor networks for habitat monitoring.’ Proceedings of the 1st ACM

international workshop on Wireless sensor networks and applications. ACM, 2002.

2. Y.-T. Lin, Y.-S. Lin, C.-H. Chen, H.-C. Chen, Y.-C. Yang, and S.-S. Lu, ‘A 0.5-V biomedical system-on-a-chip for intrabody communication system,’ IEEE Trans. Ind. Electron., vol. 58, no. 2, pp. 690–699, Feb.

2011. 3. N. Javaid, Z. Abbas, M. S. Farid, Z. A. Khan and N. Alrajeh, “M-ATTEMPT: A New Energy-Efficient

Routing Protocol for Wireless Body Area Sensor Networks”, The 4th International Conference on Ambient

Systems, Networks and Technologies (ANT 2013), 2013, Halifax, Nova Scotia, Canada, Procedia Computer Science, Volume 19, 2013, Pages 224-231, ISSN 1877-0509, http://dx.doi.org/10.1016/j.procs.2013.06.033.

Procedia Computer Science.

4. Kovacevic, T., T. Perkovic, and M. Cagalj. "LIRA: A new key deployment scheme for Wireless Body Area Networks." In Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International

Conference on, pp. 1-6. IEEE, 2013.

5. Javaid, N.; Bibi, A.; Djouani, K., ”Interference and bandwidth adjusted ETX in wireless multi-hop networks,” GLOBECOM Workshops (GC Wkshps), 2010 IEEE , vol., no., pp.1638,1643, 6-10 Dec. 2010.

doi: 10.1109/GLOCOMW.2010.5700217.

6. SH. Lee, JJ. Yoo and TC. Chuan, “Distance-based Energy Efficient Clustering for Wireless Sensor Networks”, Proc. of the 29th IEEE Int‟l Conf. on Local Computer Networks (LCN‟04).

7. Di Renzo, M.; Buehrer, R.; Torres, J. “Pulse Shape Distortion and Ranging Accuracy in UWB-Based Body

Area Networks for Full-Body Motion Capture and Gait Analysis”. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2007), Washington DC, WA, USA, 26–30 November 2007;

pp. 3775–3780.

8. Sana Ullah, Pervez Khan, Niamat Ullah, Shahnaz Saleem, Henry Higgins, and Kyung Sup Kwak “A Review

80-84

of Wireless Body Area Networks for Medical Applications” arXiv:1001.0831v3 [cs.NI] 3 Aug 2010.

9. Momoda, Miyu, and Shinsuke Hara. "Use of IEEE 802.15. 4e for a cooperator-assisted wireless body area

network." In Medical Information and Communication Technology (ISMICT), 2014 8th International

Symposium on, pp. 1-5. IEEE, 2014. 10. Ming Liu, Jiannong Cao, Guihai Chen 3 and Xiaomin Wang “An Energy-Aware Routing Protocol in

Wireless Sensor”, ISSN 1424-8220, Networks, SENSORS 2009.

11. P. Spachos and D. Hantzinakos, “Scalable dynamic routing protocol for cognitive radio sensor networks,” IEEE Sensors J., vol. 14, no. 7,pp. 2257–2266, Jul. 2014.

12. Heinzelman, Wendi Rabiner, Anantha Chandrakasan, and Hari Balakrishnan. “Energy-efficient

communication protocol for wireless microsensor networks.” System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on. IEEE, 2000.

13. P. Li, Y. Wen, W. Yin, and H. Wu, “An upconversion management circuit for low-frequency vibrating

energy harvesting,” IEEE Trans. Ind. Electron., vol. 61, no. 7, pp. 3349–3358, Jul. 2014. 14. M. Lossec, B. Multon, and H. B. Ahmed, “Sizing optimization of a thermoelectric generator set with heat

sink for harvesting human body heat," Energy Conversion and Management, vol. 68, pp. 260- 265, 2013.

15. V. Leonov, “Thermoelectric energy harvesting of human body heat for wearable sensors," Sensors Journal, IEEE, vol. 13, no. 6, pp. 2284-2291, 2013.

16. M.-K. Kim, M.-S. Kim, S. Lee, C. Kim, and Y.-J. Kim, “Wearable thermoelectric generator for harvesting

human body heat energy," Smart Materials and Structures, vol. 23, no. 10, p. 105002, 2014.

17. A. Almusallam, R. Torah, D. Zhu, M. Tudor, and S. Beeby, “Screenprinted piezoelectric shoe-insole energy

harvester using an improved exible PZT-polymer composite," in Journal of Physics: Conference Series, vol.

476, no. 1. IOP Publishing, 2013, p. 012108. 146. 18. J. Kymissis, C. Kendall, J. Paradiso, and N. Gershenfeld, “Parasitic power harvesting in shoes," in Wearable

Computers, 1998. Digest of Papers. Second International Symposium on. IEEE, 1998, pp. 132-139.

19. N. S. Shenck and J. A. Paradiso, “Energy scavenging with shoe mounted piezoelectrics," IEEE micro, no. 3, pp. 30-42, 2001.

20. A. Luque and S. Hegedus, “Handbook of photovoltaic science and en-gineering” John Wiley & Sons, 2011.

21. R. Bube, “Fundamentals of solar cells: photovoltaic solar energy con- version” Elsevier, 2012. 22. J. You, L. Dou, K. Yoshimura, T. Kato, K. Ohya, T. Moriarty, K. Emery, C.-C. Chen, J. Gao, G. Li et al., “A

polymer tandem solar cell with 10.6% power conversion effciency," Nature communications, vol. 4, p. 1446,

2013. 23. H.-S. Kim, C.-R. Lee, J.-H. Im, K.-B. Lee, T. Moehl, A. Marchioro, S.-J. Moon, R. Humphry-Baker, J.-H.

Yum, J. E. Moser et al., “Lead iodide perovskite sensitized all-solid-state submicron thin film mesoscopic

solar cell with effciency exceeding 9%," Scientific reports, vol. 2, 2012. 24. D. A. R. Barkhouse, O. Gunawan, T. Gokmen, T. K. Todorov, and D. B. Mitzi, “Device characteristics of a

10.1% hydrazine-processed Cu2ZnSn(Se, S)4 solar cell," Progress in Photovoltaics: Research and

Applications, vol. 20, no. 1, pp. 6-11, 2012.

25. I. Repins, M. A. Contreras, B. Egaas, C. DeHart, J. Scharf, C. L. Perkins, B. To, and R. Noufi, “19.9%-

effcient ZnO/CdS/CuInGaSe2 solar cell with 81.2% fill factor," Progress in Photovoltaics: Research and

applications, vol. 16, no. 3, pp. 235-239, 2008. 26. S. Roundy, E. S. Leland, J. Baker, E. Carleton, E. Reilly, E. Lai, B. Otis, J. M. Rabaey, P. K. Wright, and V.

Sundararajan, “Improving power output for vibration-based energy scavengers," Pervasive Computing, IEEE,

vol. 4, no. 1, pp. 28-36, 2005. 147 27. K. Uchida, S. Takahashi, K. Harii, J. Ieda, W. Koshibae, K. Ando, S. Maekawa, and E. Saitoh, “Observation

of the spin Seebeck effect," Nature, vol. 455, no. 7214, pp. 778-781, 2008.

28. D. M. Rowe, “Thermoelectrics handbook: macro to nano.” CRC press, 2005. 29. O. Bubnova, Z. U. Khan, A. Malti, S. Braun, M. Fahlman, M. Berggren, and X. Crispin, “Optimization of the

thermoelectric figure of merit in the conducting polymer poly (3, 4- ethylenedioxythiophene)," Nature

materials, vol. 10, no. 6, pp. 429- 433, 2011. 30. Y. Pei, A. LaLonde, S. Iwanaga, and G. J. Snyder, “High thermoelectric figure of merit in heavy hole

dominated PbTe," Energy & Environmental Science, vol. 4, no. 6, pp. 2085-2089, 2011. 31. D. Kraemer, B. Poudel, H.-P. Feng, J. C. Caylor, B. Yu, X. Yan, Y. Ma, X. Wang, D. Wang, A. Muto et al.,

“High-performance atpanel solar thermoelectric generators with high thermal concentration," Nature

materials, vol. 10, no. 7, pp. 532-538, 2011. 32. H. Alam and S. Ramakrishna, “A review on the enhancement of figure of merit from bulk to nano-

thermoelectric materials," Nano Energy, vol. 2, no. 2, pp. 190-212, 2013.

33. R. Saidur, M. Rezaei, W. Muzammil, M. Hassan, S. Paria, and M. Hasanuzzaman, “Technologies to recover exhaust heat from internal combustion engines," Renewable and Sustainable Energy Reviews, vol. 16, no. 8,

pp. 5649-5659, 2012.

34. Y. Hsiao, W. Chang, and S. Chen, “A mathematic model of thermoelectric module with applications on waste heat recovery from automobile engine," Energy, vol. 35, no. 3, pp. 1447-1454, 2010.

35. H. Lu, T.Wu, S. Bai, K. Xu, Y. Huang, W. Gao, X. Yin, and L. Chen, “Experiment on thermal uniformity

and pressure drop of exhaust heat exchanger for automotive thermoelectric generator," Energy, vol. 54, pp. 372-377, 2013. 148.

36. X. Gao, S. J. Andreasen, M. Chen, and S. K. Kaer, “Numerical model of a thermoelectric generator with

compact plate-fin heat exchanger for high temperature pem fuel cell exhaust heat recovery," interna- tional journal of hydrogen energy, vol. 37, no. 10, pp. 8490-8498, 2012.

37. B. Xu and K. Fobelets, “Effciency improvement of silicon nanowire arrays (NWAs) thermoelectric power

generation (TEG) by spin on doping (SOD)," in Meeting Abstracts, no. 4. The Electrochemical Society, 2013, pp. 279-279.

38. B. Xu, C. Li, K. Thielemans, M. Myronov, and K. Fobelets, “Thermoelectric performance of nanowire

arrays," Electron Devices, IEEE Transactions on, vol. 59, no. 12, pp. 3193-3198, 2012.

39. S. K. Yee, N. E. Coates, A. Majumdar, J. J. Urban, and R. A. Segalman, “Thermoelectric power factor

optimization in PEDOT: PSS tellurium nanowire hybrid composites," Physical Chemistry Chemical Physics, vol. 15, no. 11, pp. 4024-4032, 2013.

40. C.-C.Wang, C.-I. Hung, and W.-H. Chen, “Design of heat sink for improving the performance of

thermoelectric generator using two-stage optimization," Energy, vol. 39, no. 1, pp. 236-245, 2012. 41. J. Xiao, T. Yang, P. Li, P. Zhai, and Q. Zhang, “Thermal design and management for performance

optimization of solar thermoelectric generator," Applied Energy, vol. 93, pp. 33-38, 2012.

42. V. Leonov, P. Fiorini, S. Sedky, T. Torfs, and C. Van Hoof, “Thermoelectric mems generators as a power supply for a body area network," in Solid-State Sensors, Actuators and Microsystems, 2005. Digest of

Technical Papers. TRANSDUCERS'05. The 13th International Con-ference on, vol. 1. IEEE, 2005, pp. 291-

294.

14.

Authors: Bishwajeet Singh, Mohit Arvind, Divya Asija, Pallavi Choudekar and Ruchira

Paper Title: Driver Alert System for Hilly Roads at Hair Pin Bends

Abstract: In this paper we have proposed the time-based system for alerting the driver

against other vehicle at hair pin bends to avoid accidents causing loss of human life. This

system is designed to provide safe journey to the local residents and tourists by alerting

them against blind spot curves and also reduced the possibility of accident at blind curves.

This paper is focused on the designing of automated system with the advent of new

technology and up gradation. The proposed automated system would remarkably reduce the

human efforts by utilizing the PLCs. Automated system is taking place of human due to

increased efficiency and quality output. Thus, the proposed system adopts the latest

automated technology including PLC to develop driver alert system which has application

on the hair pin bends of hilly roads.

Keyword: MCB, SMPS, PLC, Sensor, LED

References: 1. A. K. Gupta, G. Wable, T. Batra, “Collision Detection System for Vehicles in Hilly and Dense Fog Affected

Area to Generate Collision Alerts” in International Conference on Issues and Challenges in Intelligent

Computing Techniques (ICICT), 2014.

2. S. Boopathi, K. Govindaraju, M. Sangeetha, M. Jagadeeshraja ,M. Dhanasu “Real time based smart vehicle

monitoring and alert using GSM” in International Journal of Advanced Research in Computer and

Communication Engineering, vol. 3, Issue 11, November 2014. 3. https://www.hindustantimes.com/business-news/hp-leo-burnett-make-smart-poles-for-roads-that-honk-to-

alert-drivers-on-blind-turns/story-gxkiMJjHWfCyMWhFTpyrGJ.html.

4. K. Aravind , D. Hardley, Pradeep, T. Vijayan, B. K. Selvi, S. Latha, “Automation of space management in vehicle parking using PLC and SCADA” International Journal of MC Square Scientific Research vol.9, no.2,

2017.

5. S. P. Biswas, P. Roy, N. Patra, A. Mukherjee and N. Dey, ” Intelligent Traffic Monitoring System”, Second International Conference on Computer and communication Technologies, Advances in Intelligent Systems

and Computing .

6. M. H. Alsibai, S. A. Manap,”A study on Driver fatigue notification systems” , ARPN Journal of Engineering and Applied Sciences, vol. 11, no. 18, September 201

7. J. K. Hedrick, M. Tomizuka, and P. Varaiya,”Control Issue in Automated Highway Systems” IEEE Control Systems, December 1994.

8. Kanchan Manohar Sontakke, ”Efficient Driver Fatigue Detection and Alerting System”, International Journal of Scientific and Research Publications, vol.5, no. 7, July 2015.

85-90

Authors: Akanksha Sharma and Neeru Jindal

Paper Title: CBNWI-50: A Deep Learning Bird Dataset for Image Translation and Resolution

Improvement using Generative Adversarial Network

Abstract: Generative Adversarial Networks have gained prominence in a short span of time

as they can synthesize images from latent noise by minimizing the adversarial cost function.

New variants of GANs have been developed to perform specific tasks using state-of-the-art

GAN models, like image translation, single image super resolution, segmentation,

classification, style transfer etc. However, a combination of two GANs to perform two

different applications in one model has been sparsely explored. Hence, this paper

concatenates two GANs and aims to perform Image Translation using Cycle GAN model on

15.

bird images and improve their resolution using SRGAN. During the extensive survey, it is

observed that most of the deep learning databases on Aves were built using the new world

species (i.e. species found in North America). Hence, to bridge this gap, a new Ave

database, 'Common Birds of North - Western India' (CBNWI-50), is also proposed in this

work.

Keyword: Generative Adversarial Networks, Indian-Subcontinent, Bird Dataset, Image

Translation, Single Image Super Resolution

References: 1. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A. and Bengio,

Y., 2014. Generative adversarial nets. In Advances in neural information processing systems (pp. 2672-2680). 2. Zhu, J.Y., Park, T., Isola, P. and Efros, A.A., 2017. Unpaired image-to-image translation using cycle-

consistent adversarial networks. In Proceedings of the IEEE international conference on computer vision (pp.

2223-2232). 3. Ledig, C., Theis, L., Huszár, F., Caballero, J., Cunningham, A., Acosta, A., Aitken, A., Tejani, A., Totz, J.,

Wang, Z. and Shi, W., 2017. Photo-realistic single image super-resolution using a generative adversarial

network. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 4681-4690). 4. Timofte, Radu and Agustsson, Eirikur and Van Gool, Luc and Yang, Ming-Hsuan and Zhang, Lei and Lim,

Bee and others, 2017. NTIRE 2017 Challenge on Single Image Super-Resolution: Methods and Results. In

Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 5. Welinder, P., Branson, S., Mita, T., Wah, C., Schroff, F., Belongie, S., & Perona, P. (2010). Caltech-UCSD

birds 200.

6. Van Horn, G., Mac Aodha, O., Song, Y., Shepard, A., Adam, H., Perona, P., & Belongie, S. (2017). The inaturalist challenge 2017 dataset. arXiv preprint arXiv:1707.06642, 1(2).

7. Berg, T., Liu, J., Woo Lee, S., Alexander, M. L., Jacobs, D. W., & Belhumeur, P. N. (2014). Birdsnap: Large-

scale fine-grained visual categorization of birds. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 2011-2018).

8. Van Horn, G., Branson, S., Farrell, R., Haber, S., Barry, J., Ipeirotis, P., ... & Belongie, S. (2015). Building a

bird recognition app and large scale dataset with citizen scientists: The fine print in fine-grained dataset collection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 595-

604).

9. Yi, Z., Zhang, H., Tan, P. and Gong, M., 2017. Dualgan: Unsupervised dual learning for image-to-image translation. In Proceedings of the IEEE international conference on computer vision (pp. 2849-2857).

10. Kim, T., Cha, M., Kim, H., Lee, J.K. and Kim, J., 2017, August. Learning to discover cross-domain relations

with generative adversarial networks. In Proceedings of the 34th International Conference on Machine Learning-Volume 70 (pp. 1857-1865). JMLR. org.

91-102

16.

Authors: Manbir Kaur, Rajesh Khanna and Atipriya Sharma

Paper Title: Radar Cross Section Reduction Techniques using Metamaterials

Abstract: In this paper, we have discussed and summarized the techniques of radar cross

section reduction (RCSR). RCSR has been prompted due to the evolution of military

technology. The paper reviews the basic concepts and characteristics of metamaterials, as

these are the most favorable development that impacts defense industry products and stealth

technology. This paper emphasizes the role of airpower and the ever-increasing demand for

stealth. Initially, the blending of the fundamental aspects of stealth technology through radar

signatures and methods of signature reduction are discussed. Then, the description of

metamaterials and detailed analysis of their properties is made. This paper review the

fundamental properties of metamaterials. It also explores the recent research activities on

metamaterials in various areas. Some existing researches techniques used for RCSR are

examined. The metamaterials are engineered media whose electromagnetic responses are

different from those of their constituent components. The general benefits of metamaterials

are pointed out in the paper. Metamaterials are mostly used in antenna configuration for

enhancing antenna performance such as realizing miniaturization, expanding the operating

band, enhancing gain as well as reducing RCS. These characteristics of the metamaterials

are basically the reason why metamaterials should be used in stealth technology. The

various categories of metamaterials used for RCSR are studied in the paper. In this paper,

we have also proposed a unit cell. The unit cell consists of a square loop and intersecting

strips at the edges of add shaped structure.

103-111

Keyword: Electromagnetic bandgap, Metamaterials, Microstrip Antenna, RCS, RCSR.

References: 1. Y.Liu, S.X Gong, and H.B Zhang, “A Novel Fractal Slot Microstrip Antenna with Low RCS”, IEEE

Antennas Propag.Soc.Int.Symp., pp 2603-2606, 2006.

2. C.B Wilsen, D.B Davidson, J.W.Odendaal, D.J Janse van Rensburg, “ The RCS Reduction of Microstrip Patch Antennas ”, in Proc. 10th Int. Conf.Antennas Propag., pp 174-177, 1997.

3. D.Lynch, Introduction to RF Stealth, NC, USA, SciTech, 2004.

4. W.Xu, J.Wang, M.Chen, Z.Zhang, “RCS Reduction of Patch Array Antenna with Composite Patch Structure for Reduction of In-Band RCS.”, IEEE Antennas Wireless.Propag.Lett., vol 14, pp 139-142, 2014.

5. Pozar, D.M., Schaubert, D.H., “Microstrip Antennas: The Analysis and Design of Microstrip Antennas and

Arrays” Wiley, New York, 1995. 6. Rao G.A, Mahulikar S.P, “ Integrated review of stealth technology and its role in airpower ”, Aeronautical

Journal, vol 106, pp. 629-641, 2002.

7. Mahulikar S.P, Sonawane H.R , RaoG.A, “Infrared signatures studies of aerospace vehicles”, Progress in Aerospace Sciences, vol 43, pp. 218-245, 2007.

8. Ruan, Y., “Radar Cross Section and Stealth Technology”, National Defense Industry Press, Beijing, 1998

9. J. Ling, S.-X. Gong, P.-F. Zhang, H.-W. Yuan, B. Lu, and W.-T.Wang, “Method for RCS reduction of the

microstrip patch antenna”, J .Xidian Un iv vol37, pp. 295–299, 2010.

10. W. Xu, J. Wang, M. Chen, Z. Zhang, and Z. Li, “A novel microstrip antenna with composite patch structure

for reduction of in-band RCS,” IEEE Antennas Wireless. Propagation Letter., vol. 14, pp. 139–142, 2014. 11. Ying Liu, Yuwen Hao, Kun Li, and Shuxi Gong, “Radar Cross Section Reduction of a Microstrip Antenna

Based on Polarization Conversion Metamaterial”, IEEE Antennas and Wireless Propagation Letters, pp80-83,

vol. 15, 2016. 12. Yuping Shang, Shaoqiu Xiao, and Bing-Zhong Wang, “Radar Cross-Section Reduction Design for a

Microstrip Antenna”, Microwave and Optical Technology Letters, pp1200-1204, vol. 56, no. 5, May 2014. 13. Mohsen Zahir Joozdani, Mohammad Khalaj Amirhosseini, and Ali Abdolali, “Wideband RCS Reduction of

Patch Array Antenna with Miniaturized FSS”, Microwave and Optical Technology Letters, pp 969-973, vol.

58, no. 4, April 2016. 14. Jeremiah P. Turpin, Peter E. Sieber and Douglas H. Werner, “Absorbing Ground Planes for Reducing Planar

Antenna Radar Cross-Section Based on Frequency Selective Surfaces”, IEEE Antennas and Wireless

Propagation Letters, pp1456-1459, vol. 12, 2013. 15. Ying Liu, Yuwen Hao, Hui Wang, Kun Li, and Shuxi Gong, “Low RCS Microstrip Patch Antenna Using

Frequency-Selective Surface and Microstrip Resonator”, IEEE Antennas and Wireless Propagation Letters,

pp1290-1293, vol. 14, 2015. 16. Hao Jiang, Zhenghui Xue, Weiming Li, Wu Ren, and Meng Cao, “Low-RCS High-Gain Partially Reflecting

Surface Antenna With Metamaterial Ground Plane”, IEEE Transactions on Antennas and Propagation,

pp4127-4132, vol.64, no. 9, September 2016. 17. Ali Azarbar, Mostafa Mashhadi, “Broadband RCS Reduction using a Composite AMC Structure” Majlesi

Journals of Telecommunication Devices, pp107-111, vol. 4, No. 3, September 2015.

18. M. Mighani and G. Dadashzadeh, “Broadband RCS reduction using a novel double-layer chessboard AMC surface”, Electronics Letters, pp. 1253–1255, vol. 52 no. 14,7 July 2016.

19. Yunqi Fu, Youquan Li, and Naichang Yuan, “Wideband Composite AMC Surfaces for RCS Reduction”,

Microwave and Optical Technology Letters, pp712-715, vol. 53, no. 4, April 2011. 20. Yongtao Jia , Ying Liu , Hui Wang, Kun Li, and Shuxi Gong, “ Low –RCS, High –Gain and Wideband

Mushroom Antenna” IEEE Antennas and Propagation Letters, pp277-280 vol.14, 2015.

21. M. Mantash, A. C. Tarot, S. Collardey, and K. Mahdjoubi, “Dual-band CPW-fed G-antenna using an EBG structure,” in International Journal of Antennas and Propagation 7 Proceedings of the 6th Loughborough

Antennas and Propagation Conference (LAPC ’10), pp. 453–456, November 2010..

22. P. Salonen and Y. Rahmat-Samii, “Textile antennas: effects of antenna bending on input matching and impedance bandwidth,” IEEE Aerospace and Electronic Systems Magazine, vol. 22, no. 3, pp. 10–14, 2007.

23. P. Salonen, F. Yang, Y. Rahmat-Samii, and M. Kivikoski, “WEBGA—Wearable electromagnetic band-gap

antenna,” in Proceedings of the IEEE Antennas and Propagation Society Symposium, vol. 1, pp. 451–454, Monterrey, Calif, USA, June 2004.

24. E. F. Knott, J. F. Shaefer, and. T. Tuley, Radar Cross Section, Scitech Publishing Inc, 2nd revised

edition,2004 25. E. F. Knott, J. F. Shaefer, and. T. Tuley, Radar Cross Section, 2nd ed. Norwood, MA, USA: Artech House,

1993, pp. 269–276.

26. Chen, H., Zhou, P., Chen, L., Deng, L., “Study on the Properties of Surface waves in Coated RAM layers and Monostatic RCS Performances of the Coated Slab.”, Progress in Electromagnetics Research , vol 1, pp

123-125, 2010

27. Costa, F., Genovesi, S., Monorchio, A., “A Frequency Selective Absorbing Ground Plane for Low- RCS Microstrip Antenna Arrays.” , Progress in Electromagnetics Research, vol 126, pp 317-332, 2012.

28. Jiang, W., Liu, Y., Gong, S., Hong, T., “Applications of Bionics in Antenna Radar Cross-section

Reduction.”, IEEE Antennas and Wireless Propagation Letters, vol 8, pp 1275-1278, 2009. 29. ]X U, H., Zhang, H., L I, G., Q U, Q., L U, K., “ An Ultrawideband Fractal Slot Antenna with Low Back

Scattering cross section.”, Microwave and Optical TechnologyLetters, vol 53, no 5, pp 1150-1154, 2011.

30. L I, Y., Zhang, H., F U, Y., Yuan, N., “RCS reduction of rigid waveguide”, IEEE Antenna and Wireless Propagation Letters, vol 7, pp 473-476, 2008.

31. R.L.Fante, M.T. Mc Cormack, “Reflection Properties of Salisbury Screen.”, IEEE Trans Antennas Propag,

vol 48, pp 1594-1606, 2000 Antenna Propag, vol 36, pp 1443-1454, 1998.

32. H.Mosallaei, Y.Rahmat-Samii, “RCS Reduction of Canonical Targets using Genetic Algorithm Synthesized

33. M.Mighani, G.Dadashzadeh, “ Broadband RCS reduction using a Novel Double Layer Chessboard AMC Surface”, Electron.Lett.,vol 52, no 14, pp 1253-1255,July 2016.

34. Q.Gao, Y. Yin, D-B. Yan, N-C Yuan, “ Application of Metamaterials to Ultra-Thin Radar Absorbing

Materials Design”, Electron.Lett., vol 41, no 17, pp 936-937, 2005. 35. M.Gustafsson,“ RCS Reduction of Integrated Antenna Arrays with Resistive Sheets”, Electromagnetic

Waves Appl, vol 20, pp 27-40, 2006.

36. B. Sweetman: A Stealthier Rafale?, posted in Aviation Week, 05-04-10. 37. G. Briganti: Rafale in Combat: War for Dummies, posted in Defense aerospace, 31 May 2011.

38. K. Zikidis, A. Skondras, and C. Tokas: Aeroskafi families paratirisimotitas (Stealth), Aeroporiki Epitheorisi,

vol. 95, Sep.12, pp. 30-55. 39. Rafale International, "Fox Three" no.15 http://www.dassault-

aviation.com/wpcontent/blogs.dir/1/files/2012/08/FoxThree_Fox15.pdf.

40. [E. Knott, J. F. Schaeffer, and M. T. Tuley: Radar Cross Sections, SciTech Publishing Inc, 2nd revised edition, 2004.

41. R. S.Kshetrimayum "A Brief Intro to Metamaterials", IEEE Potentials, vol 23, no 5, pp 44–46, 2004

42. Engheta, Nader, Richard W. Ziolkowski, Metamaterials: Physics and Engineering Explorations, Wiley &

Sons, pp. xv, 3–30, 37, 143–50, 215–34, 240–56, June 2006.

43. Zouhdi, Saïd, Ari Sihvola, Alexey P. Vinogradov, Metamaterials and Plasmonics: Fundamentals, Modelling,

Applications, New York: Springer-Verlag, pp. 3–10, December 2008. 44. Smith, David R., "What are Electromagnetic Metamaterials?", Novel Electromagnetic Materials. The research

group of D.R. Smith, Archived from the original on July 20, 2009, Retrieved 2009-08-19.

45. Slyusar V.I, Metamaterials on antenna solutions, 7th International Conference on Antenna Theory and Techniques ICATT’09, Lviv, Ukraine, pp. 19–24, October 6–9, 2009.

46. Eleftheriades, George V, Keith G. Balmain, Negative-refraction metamaterials: fundamental principles and

applications, Wiley, pp 340, 2005. 47. Engheta, Nader, Richard W. Ziolkowski , Wiley & Sons, pp 211–21, 2006.

48. alentine, J, Zhang, S, Zentgraf, T, Ulin-Avila, E, Genov, D. A, Bartal, G, Zhang, X. (2008). "Three-

dimensional optical metamaterial with a negative refractive index", Nature, vol 455 , pp 376–79. 49. Wang, Bingnan, "Chiral metamaterials: simulations and experiments", J. Opt. Soc. Am. A vol 11, no 11,

November 2009.

50. Tretyakov, S, Sihvola, A, Jylhä, L, "Backward-wave regime and negative refraction in chiral composites". Photonics and Nanostructures-Fundamentals and Applications, vol 3, no 2–3, pp 107–115, 2005.

51. I.A. Buriak, V.O. Zhurba1, G.S. Vorobjov, V.R. Kulizhko, O.K. Kononov, Oleksandr Rybalko,

Metamaterials: Theory, Classification and Application Strategies (Review), Journal of Nano- and Electronic

Physics, vol 8, no 4(2), pp 04088, 2016.

52. Munk, B.A. Frequency Selective Surfaces: Theory and Design; Wiley Online Library: Hoboken, NJ, USA,

2000; vol 29. 53. Arnaud, J.; Pelow, F. Resonant-grid quasi-optical diplexers. Bell Syst. Tech. J. 1975, 54, 263–283.

[CrossRef]

54. Lee, S.-W. Scattering by dielectric-loaded screen, IEEE Trans. Antennas Propag. 1971, 19, 656–665. 55. Pelton, E.; Munk, B. A streamlined metallic radome, IEEE Trans. Antennas Propag. 1974, 22, 799–

803.[CrossRef]

56. Rana SadafAnwar, Lin.gfeng Mao, and Huansheng Ning, “Frequency Selective Surfaces: A Review”, Appl. Sci. 2018, 8, 1689; DOI:10.3390/app8091689 www.mdpi.com/journal/applsci.

57. Sievenpiper, D.; Zhang, L.; Broas, R.F.; Alexopolous, N.G.; Yablonovitch, E. High-impedance

electromagnetic surfaces with a forbidden frequency band. IEEE Trans. Microw. Theory Tech. 1999, 47, 2059–2074. [CrossRef].

58. F.Yang and Y. Rahmat-Samii, Electromagnetic Bandgap Structures in Antenna Engineering, Cambridge University Press, 2009.

59. Y.Q, Li, H.Zhang, Y.Q.Fu, N.C Yuan, “ RCS Reduction of Ridged Waveguide Slot Antenna using EBG

Radar Absorbing Material ”, IEEE Antennas Wireless Propag Letters, vol 7, pp 473-476, 2008. 60. P.K Panda, D. Ghosh, “Mushroom-like EBG Structures for Reducing RCS of Patch Antenna Arrays”, in

Proc.Int.Conf.Microw.Photon., pp 1-4, December 2013.

61. H.K Jang, J.H Shin, C.G.Kim, “ Low RCS Patch Array Antenna with Electromagnetic Bandgap using a Conducting Polymer”, in Proc.Int.Conf.Environ.Eng.Appl., pp 140-143, September 2010

62. D. Sievenpiper, L. Zhang, R. F. Jimenez Broas, N. G. Alex¨opolous, and E. Yablonovitch, “High-impedance

electromagnetic surfaces with a forbidden frequency band,” IEEE Transactions on Microwave Theory and Techniques, vol. 47, no.11, pp. 2059–2074, 1999.

63. F. R. Yang, K. P. Ma, M. Yongxi Qian, and T. Itoh, “A uniplanar compact photonic-bandgap (UC-PBG)

structure and its applications for microwave circuits,” IEEE Transactions on Microwave Theory and Techniques, vol. 47, no. 8, pp. 1509– 1514, 1999.

64. F. Yang and Y. Rahmat-Samii, Electromagnetic Band-Gap Structures in Antenna Engineering, The

Cambridge RF and Microwave Engineering Series, Cambridge University, 2008. 65. J. McVay, N. Engheta, and A. Hoorfar, “High impedance metamaterials surfaces using Hilbert-curve

inclusions,” IEEE Microwave and Wireless Components Letters, vol. 14, no. 3, pp. 130–132, 2004.

66. Y. Kim, F. Yang, and A. Z. Elsherbeni, “Compact artificial magnetic conductor designs using planar square spiral geometries,” Progress in Electromagnetics Research, vol. 77, pp. 43–54, 2007.

67. M. E. De Cos, F. L. Heras, and M. Franco, “Design of planar artificial magnetic conductor ground plane

using frequency selective surfaces for frequencies below 1GHz,” IEEE Antennas and Wireless Propagation

Letters, vol. 8, pp. 951–954, 2009.

68. M. E. De Cos, Y. A´ Alvarez, and F. Las-Heras, “Planar artificial magnetic conductor: design and characterization setup in the RFID SHF band,” Journal of Electromagnetic Waves and Applications, vol. 23,

no. 11-12, pp. 1467–1478, 2009.

69. D. J. Kern, D.H.Werner, A. Monorchio, L. Lanuzza, and. J. Wilhelm, “The design synthesis of multiband artificial magnetic conductors using high impedance frequency selective surfaces,” IEEE Transactions on

Antennas and Propagation, vol. 53, no. 1 I, pp. 8–17, 2005.

70. M. E. De Cos, Y. A´ Alvarez, R. C. Hadarig, and F. Las-Heras, “Novel SHF-band uniplanar artificial magnetic conductor,” IEEE Antennas and wireless Propagation Letters, vol. 9, pp. 44–47, 2010.

71. A. Monorchio, G. Manara, and L. Lanuzza, “Synthesis of artificial magnetic conductors by using

multilayered frequency selective surfaces,” IEEE Antennas and Wireless Propagation Letters, vol. 1, pp. 196–199, 2002.

72. F. Yang and Y. Rahmat-Samii, “Reflection phase characterizations of the EBG ground plane for low profile

wire antenna applications,” IEEE Transactions on Antennas and Propagation, vol. 51, no. 10 I, pp. 2691–2703, 2003.

73. J. McVay, A. Hoorfar, and N. Engheta, “Small dipole antenna near piano high-impedance surfaces,” in

Proceedings of the IEEE Antennas and Propagation Society Symposium, vol. 1, pp. 305–308, June 2004.

74. H. Mosallaei and K. Sarabandi, “Antenna miniaturization and bandwidth enhancement using a reactive

impedance substrate,” IEEE Transactions on Antennas and Propagation, vol. 52, no. 9, pp. 2403–2414, 2004.

75. L. Akhoondzadeh-Asl, D. J. Kern, P. S. Hall, and D. H.Werner, “Wideband dipoles on electromagnetic bandgap ground planes,” IEEE Transactions on Antennas and Propagation, vol. 55, no. 9, pp. 2426–2434,

2007.

76. J. Liang and H. Y. D. Yang, “Radiation characteristics of a microstrip patch over an electromagnetic bandgap surface,” IEEE Transactions on Antennas and Propagation, vol. 55, no.6, pp. 1691–1697, 2007.

77. A. P. Feresidis, G. Goussetis, S. Wang, and J. C. Vardaxoglou, “Artificial magnetic conductor surfaces and

their application to low-profile high-gain planar antennas,” IEEE Transactions on Antennas and Propagation, vol. 53, no. 1 I, pp. 209–215, 2005.

78. J. R. Sohn, K. Y. Kim, H. S. Tae, and J. H. Lee, “Comparative study on various artificial magnetic

conductors for the low-profile antenna,” Progress in Electromagnetics Research, vol. 61, pp. 27–37, 2006. 79. [E. Rajo-Iglesias, L. Incl´an-S´anchez, and Q. Quevedo-Teruel, “Back radiation reduction in patch antennas

using planar soft surfaces,” Progress In Electromagnetics Research Letters, vol. 6, pp. 123–130, 2009.

80. S. Zhu and R. Langley, “Dual-band wearable textile antenna on an EBG substrate,” IEEE Transactions on Antennas and Propagation, vol. 57, no. 4, pp. 926–935, 2009.

81. M. Mantash, A-C. Tarot, S. Collardey, and K. Mabjoubi, “Dual-band antenna for W-LAN applications with

EBG,” in Proceedings of the 5th International Congress on Advanced ElectromagneticMaterials in microwave

and Optics (Metamaterials’11), pp. 456–458, Barcelona, Spain, October 2011.

82. M. Paquay, J. C. Iriarte, I. Ederra, R. Gonzalo, and P. de Maagt, “Thin AMC structure for radar cross-section

reduction,” IEEE Trans. Antennas Propag., vol. 55, no. 12, Dec. 2007. 83. J. C. Iriarte, I. Ederra, R. Gonzalo, and P. de Maagt, “Dual-band RCS reduction using planar technology by

combining AMC structures,” in Proc. EuCAP, 2009.

84. J. C. Iriarte, J. L. Martinez de Falcon, I. Maestrojuan, I. Liberal, A. Rebollo, I. Ederra, and R. Gonzalo, “Broadband RCS reduction using AMC technology,” in Proc. 5th Eur. Conf. Antennas Propag., Apr. 11–15,

2011, pp. 1322–1323.

Authors: Munish Mehta, Vijay Goyar, Vishnu Bairwa

Paper Title: Security and Authentication through text encryption and decryption based on

substitution method

Abstract: In order to maintain security, privacy and integrity of important information or

data is a great challenge in today’s world. Cryptography is a technique to prevent important

data from hackers and intruder by converting important information in encrypted text by

using an encryption algorithm. This paper is a review of various symmetric and asymmetric

cryptography techniques. In this paper some gaps have been identified after reviewing some

algorithms like they don’t work for case sensitive data but merely works for uppercase

alphabets, they don’t encrypt numerically, spaces and they don’t run on the special symbol.

In our proposed solution an effort to expand the original 5X5 character set of the Play Fair

algorithm will be done so as to include lower case alphabets(a-z), some symbols, numeric(0-

9) and a special character ‘\0’ for space. So, a new algorithm will encrypt lowercase,

numeric, symbols as well as spaces.

Keyword: Cipher, Cryptanalysis, Decryption, Encryption, Private Key, Public Key,

Substitution, Transposition.

17.

References: 1. Jitendra Choudhary, Prof. Ravindra Kumar Gupta, Dr Shailendra Singh, ” A GENERALIZED VERSION

OF PLAY FAIR CIPHER”, COMPUSOFT, An international journal of advanced computer technology, 2

(6), June-2013 (Volume-II, Issue-VI).

2. Mohammed Haris, Bhavya Alankar, “A Survey Paper on Different Modification of Playfair Cipher”, International International Journal of Advanced Research in Computer Science, Volume 8, No. 5, May-

June 2017.

3. Mohit Marwah, Rajeev Bedi, *Amritpal Singh, Tejinder Singh, “COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS”, Singh et al., International Journal of Advanced Engineering

Technology, E-ISSN 0976-3945, Int J Adv Engg Tech/IV/III/July-Sept.,2013/16-18.

4. Ravindra Babu K¹, S. Uday Kumar ², A. Vinay Babu ³, I.V.N.S Aditya4, P. Komuraiah5, “An Extension to Traditional Playfair Cryptographic Method”, Volume 17– No.5, March 2011.

5. Sanjay Kumar Mathur1, Sandeep Srivastava2, “Extended 16x16 Play- Fair Algorithm for Secure Key

Exchange Using RSA Algorithm”, Volume: 4 Issue: 2. 6. V.Subhashini1, Dr.N.Geethanjali2, P.Vidyasagar3, P.Amrutha4 1Research Scholar, “A Novel Approach

on Encryption and Decryption of 5X5 Playfair Cipher Algorithm”, International Journal of Advanced

Scientific Technologies, Engineering and Management Sciences (IJASTEMS-ISSN: 2454-356X) Volume.3, Special Issue.1,March.2017.

7. S.S.Dhenakaran, PhD. Assistant Professor, M. llayaraja research socholar , “Extension of Playfair Cipher

using 16X16 Matrix”, International Journal of Computer Applications (0975 – 888) Volume 48– No.7,

June 2012. 8. Reena singh, Shaurya taneja, Kavneet kaur, “Modified Play-fair Encryption Method using Quantum

concept”, DIACom-2016; ISSN 0973-7529; ISBN 978-93-80544-20-5

112-115

18.

Authors: Munish Mehta, Rahul Sharma, Pawan Suthar

Paper Title: Field Worker’s Routine Behaviour for Efficient Time Utilization

Abstract: In this paper, we are proposing a monitoring technique that can predict the

appropriate time to meet the field officer with more accuracy as compared to general human

prediction. To get the routine behaviour of an individual we will keep a track of his online

presence on WhatsApp by the “Active Now” status shown beneath the user’s name in the

profile. This will help the Personal assistants, secretaries and receptionists to provide right

appointment schedule to clients or to those who want to meet a field officer. This all will be

done by scraping data from WhatsApp web portal using python modules, storing the judging

parameters like unique identification number, date and time stamp, duration of continuous

presence and number of sessions in a day, afterwards analyzing the dataset and providing an

appropriate routine behaviour prediction. For the sake of efficient utilization of time and

resources.

Keyword: Human behaviour analysis, Naïve Bayes, Time Utilization, Web scraping.

References: 1. Python Reference. [Online]. Available: www.python.org 2. (Basic Book) Al Sweigart. (2015,April,14). Automate the boring stuff with PYTHON (Second Edition).

Available: https://automatetheboringstuff.com/

3. Leonard Richardson. (2004-2015). Crummy, The Webspace by L.R. [Online]. Available: https://www.crummy.com/software/BeautifulSoup/bs4/doc/

4. Mafrur, R., Nugraha, I.G.D. & Choi, D. Hum. Cent. Comput. Inf. Sci. (2015) 5: 31.

https://doi.org/10.1186/s13673-015-0049-7. 5. Harari G.M., Muller S.R., Aung M.S., Rentfrow P.J. Smartphone sensing methods for studying behaviour in

everyday life (2017) Current Opinion in Behavioral Sciences, 18, pp. 83-90.

6. Nikola Banovic, Tofi Buzali, Fanny Chevalier, Jennifer Mankoff, Anind K. Dey, Modeling and Understanding Human Routine Behavior, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems,

May 07-12, 2016, Santa Clara, California, USA [doi>10.1145/2858036.2858557].

7. Jing Wang, Yuchun Guo Sch, "Scrapy-Based Crawling and User-Behavior Characteristics Analysis on Taobao", 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery,

pp. 44-52.

8. Mizuno, H & Nagai, H & Sasaki, K & Hosaka, H & Sugimoto, Chika & Khalil, K & Tatsuta, S. (2007). Wearable Sensor System for Human Behavior Recognition (First Report: Basic Architecture and Behavior

Prediction Method). 435 - 438. 10.1109/SENSOR.2007.4300161.

9. Jian, An & Xiaolin, Gui & Jianwei, Yang & Yu, Sun & Xin, He. (2015). Mobile Crowd Sensing for Internet of Things: A Credible Crowdsourcing Model in Mobile-Sense Service. Proceedings - 2015 IEEE International

Conference on Multimedia Big Data, BigMM 2015. 92-99. 10.1109/BigMM.2015.62.

10. Ashiwal Pratiksha, Tandan S.R., Tripathi Priyanka, Miri Rohit, Web Information Retrieval Using Python and BeautifulSoup, International Journal for Research in Applied Science & Engineering Technology (IJRASET),

Volume 4 Issue VI, June 2016, Available: https://www.ijraset.com/fileserve.php?FID=4999.

116-120

19.

Authors: Ms. Mamta Arora, Dr. Paras Chawla

Paper Title: Performance Enhancement of OFDM System using Hybrid Channel Estimation with

Pseudo Pilot

Abstract: For high spectral efficiency and robustness against intersymbol interference (ISI),

orthogonal frequency division multiplexing (OFDM) is the best suited technology for many

applications such as digital audio broadcasting (DAB), wireless networks, digital video

broadcasting (DVB) and LAN. For efficient recovery of the original transmitted signal we

require the coherent demodulator as the frequency selective fading channels affects the

transmitted signal in OFDM. At the receiver end for coherent demodulation we require

channel state information (CSI), which is done by channel estimation. To find the channel

characteristics which varies with time and frequency, a reference signal is transmitted with

payload signal know as pilot or training sequence and technique or process is known as

channel estimation. The use of pilots in the OFDM system leads to pilots overhead. So we

propose a new technique which will reduces the transmission delay, reduce pilot overhead,

increases transmission rate and improves the BER performance without any computational

complexity, which is implemented using the Hybrid algorithm for channel based OFDM

system. In this proposed technique, for the channel estimation in OFDM system over

AWGN fading channel pseudo-pilots are used. At the transmitter end, pseudo-pilots are

employed to breed bank of pseudo random symbol (PRS). In this OFDM system with

pseudo-pilot the channel estimation is done by the Hybrid (LS + RLS) estimation approach

to recover the original transmitted information. The performance of the proposed techniques

and the weighted scheme are compared and verified using computerized simulation carried

out using Matrix Laboratory (MATLAB) software.

Keyword: OFDM, Pseudo-pilots, Least Square (LS), Recursive Least Square (RLS).

References: 1. S. Haykin, M. Moher, Communication systems. Hoboken: John Wiley, 2010.

2. J. Proakis and M. Salehi,Digital communications. Boston: McGraw-Hill, 2008.

3. J. KIM, S. NAM and D. HONG, "Channel Estimation in Comb-Type Pilot Arrangements for OFDM Systems with Null Subcarriers", IEICE Transactions on Communications, vol. 89-, no. 12, pp. 3458-3462, 2006.

4. M. Ozdemir and H. Arslan, "Channel estimation for wireless ofdmsystems",IEEE Communications Surveys

& Tutorials, vol. 9, no. 2, pp. 18-48, 2007. 5. Ye Li, "Simplified channel estimation for OFDM systems with multiple transmit antennas", IEEE

Transactions on Wireless Communications, vol. 1, no. 1, pp. 67-75, 2002.

6. Y. Ma, "Pseudo-Pilot: A Novel Paradigm of Channel Estimation", IEEE Signal Processing Letters, vol. 23, no. 6, pp. 814-818, 2016.

7. N. Jindal and A. Lozano, "A Unified Treatment of Optimum Pilot Overhead in Multipath Fading

Channels", IEEE Transactions on Communications, vol. 58, no. 10, pp. 2939-2948, 2010. 8. S. Chouhan, "Channel Estimation Using LS and MMSE Estimators", International Journal of Scientific

Research, vol. 3, no. 8, pp. 136-143, 2012.

9. K. Kavitha and S. Manikandan, "LMMSE Channel Estimation Algorithm Based on Channel Autocorrelation Minimization for LTE-Advanced with Adaptive Guard Interval", Wireless Personal Communications, vol.

81, no. 3, pp. 1233-1241, 2014.

10. G. Li and G. Liao, "A Pilot-Pattern Based Algorithm for MIMO-OFDM Channel Estimation", Algorithms, vol. 10, no. 1, p. 3, 2016.

11. T. J. Lee and Y. C. Ko, “Channel Estimation and Data Detection in the Presence of Phase Noise in MIMO-

OFDM Systems With Independent Oscillators”, in IEEE Access, vol. 5, pp. 9647-9662, 2017.

12. P. Aggarwal and V. A. Bohara, “A Nonlinear Downlink Multiuser MIMO-OFDM Systems” , in IEEE Wireless Communications Letters, vol. 6, no. 3, pp. 414-417, June 2017.

121-126

Authors: Ms. Mamta Arora, Dr. Paras Chawla

Paper Title: Performance Evaluation of OFDM System Using Pseudo-Pilots With Particle Swarm

& Moth Flame (Hybrid) Optimization

Abstract: This paper is focused on the advanced signal processing techniques for the multi-

carrier modulation especially on the orthogonal frequency division multiplexing (OFDM).

OFDM has high data rate and robust against the frequency selective multi-path channels.

Channel estimation is crucial for the receiver design in coherent detection. In this paper we

20.

are investigating and examining the pilot aided system for channel estimation and its special

effects on the performance of the OFDM based system. In this paper new technique is

proposed which make use of conventional Least Square (LS) and Recursive Least Square

(RLS) hybridization techniques for the channel estimation afterwards we apply Particle

Swarm Optimization (PSO) and Hybrid PSO (PSO+ Moth Flame Optimization(MFO))

optimization for obtaining more optimize techniques. In the proposed system, to estimate

channel impulse response we are using pseudo-pilots instead to pilots as it is useful to

overcome the pilot overhead and decrease the complexity by using pseudo random symbol

(PRS). The performance of the proposed techniques and the weighted scheme are compared

and verified using computerized simulation carried out using Matrix Laboratory

(MATLAB) software. It is demonstrated on the basis of graph between BER and signal to

Noise Ratio (Eb/NO), that the proposed technique reduces the execution time and increase

the transmission rate with low or zero overhead.

Keyword: OFDM, PSO, MFO, LS, RLS, Channel estimation.

References: 1. Ye Li, "Simplified channel estimation for OFDM systems with multiple transmit antennas", IEEE

Transactions on Wireless Communications, vol. 1, no. 1, pp. 67-75, 2002.

2. Y. Ma, "Pseudo-Pilot: A Novel Paradigm of Channel Estimation", IEEE Signal Processing Letters, vol. 23,

no. 6, pp. 814-818, 2016.

3. T. S. Rappaport, Wireless Communications, Principles and Practice 2nd ed., Pearson Edu., vol.-1, pp. 356–

376, 2002.

4. D. Qu , S. Lu and T. Jiang , "Multi-block joint optimization for the peak-to-average power ratio reduction

of FBMC-OQAM signals" , IEEE Trans. Signal Process. , vol. 61 , no. 7, pp.1605 -1613 , 2013.

5. S.Venkatachalam, T. Manigandan, “Optimization of OFDM Systems Using Genetic Algorithm in FPGA,”

– International Journal of Computing Science and Communication Technologies, VOL.5 NO. 2, PP-854-859, Jan. 2013.

6. P. Aggarwal and V. A. Bohara, "A Nonlinear Downlink Multiuser MIMO-OFDM Systems," in IEEE

Wireless Communications Letters, vol. 6, no. 3, pp. 414-417, June 2017.

7. T. J. Lee and Y. C. Ko, "Channel Estimation and Data Detection in the Presence of Phase Noise in MIMO-

OFDM Systems With Independent Oscillators," in IEEE Access, vol. 5, pp. 9647-9662, 2017.

8. E. Eraslan and B. Daneshrad, "Low-Complexity Link Adaptation for Energy Efficiency Maximization in

MIMO-OFDM Systems," in IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 5102-5114, Aug. 2017.

9. R. Kaur and . Mittal, “Implementation of neural network for channel estimation in OFDM network,” 2nd

International Conference on Contemporary Computing and Informatics (IC3I), 2016.

10. Şimşir and N. Taşpınar, " Channel estimation using neural network in Orthogonal Frequency Division

Multiplexing-Interleave Division Multiple Access (OFDM-IDMA) system," Telecommunications Symposium (ITS), 2014 International, Sao Paulo, pp. 1-5 2014.

11. S. Mirjalili, “Moth-Flame Optimization Algorithm: A Novel Nature-inspired Heuristic Paradigm” ,

Knowledge-Based Systems (2015), doi: http://dx.doi.org/10.1016/j.knosys.2015.07.006” .

12. L. Zajmi, F. Ahmed and A. Jaharadak, "Concepts, Methods, and Performances of Particle Swarm

Optimization, Backpropagation, and Neural Networks", Applied Computational Intelligence and Soft

Computing, vol. 2018, pp. 1-7, 2018. Available: 10.1155/2018/9547212.

127-130

21.

Authors: Rishikesh Sharma, Abha Thakral

Paper Title: Identifying Botnets: Classification and Detection

Abstract: The past few years have witnessed the threats caused by the evolving of botnets.

It has been found that the nefarious network consisting of contagious systems called as bots

are operated by the botmaster. These botnets have been used for malicious activities. This

prevailing threat on the internet has led to spam, Distributed Denial of Service (DDoS)

attacks, phishing emails, and other cyber-attacks. The detection of such networks is very

important keeping the protocols and features they work upon. The paper talks about the

various detection techniques that can be adapted to evade the attacks of bots. The huge

amount of traffic created by bots can be studied and distinguished respectively to understand

the protocols used by the botmaster; which are further used to detect botnets based on the

signature and anomaly patterns. The attacks being done from different locations have made

it difficult for a botnet to be caught. It has been mentioned that a few networks provide the

bots with a nickname using which the detection can be done. The method has been

described thoroughly by also specifying how the bot-names of the same network are similar.

Nowadays, the number of botnets has increased with a fewer number of trained bots. These

network work upon the protocols like Command and Control (C&C), Internet Relay Chat

(IRC), HyperText Transfer Protocol (HTTP) and Peer to Peer(P2P). The detection of such

networks is being done classifying the traffic and analyzing the spam e-mails alongside the

respected IP address. Even the traps of honeynet are developed which motivate the

botmaster to take action and get caught. Such honeynet techniques along with the required

steps and the necessary precautions are also mentioned in the paper.

Keyword: Botnet, Honeynet, IP Address, Network Traffic Classification, Phishing emails.

References: 1. Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., &Garant, D. (2013). Botnet detection based on

traffic behavior analysis and flow intervals. Computers & Security, 39, 2-16.

2. https://www.knowbe4.com/gameover-zeus

3. Abu Rajab, M., Zarfoss, J., Monrose, F., & Terzis, A. (2006, October). A multifaceted approach to

understanding the botnet phenomenon. In Proceedings of the 6th ACM SIGCOMM conference on Internet

measurement (pp. 41-52). ACM

4. Karasaridis, A., Rexroad, B., &Hoeflin, D. A. (2007). Wide-Scale Botnet Detection and Characterization. HotBots, 7, 7-7.

5. Dagon, D. (2005, July). Botnet detection and response. In OARC workshop (Vol. 2005).

6. Goebel, J., &Holz, T. (2007). Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. HotBots, 7, 8-8.

7. Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., & Stiller, B. (2010). An overview of IP flow-

based intrusion detection. IEEE communications surveys & tutorials, 12(3), 343-356. 8. Know you Enemy: Tracking Botnets ( https://www.honeynet.org/papers/bots )

9. Baecher, P., Koetter, M., Holz, T., Dornseif, M., &Freiling, F. (2006, September). The nepenthes platform:

An efficient approach to collect malware. In International Workshop on Recent Advances in Intrusion Detection (pp. 165-184). Springer, Berlin, Heidelberg.

10. Karasaridis, A., Rexroad, B., &Hoeflin, D. A. (2007). Wide-Scale Botnet Detection and

Characterization. HotBots, 7, 7-7. 11. Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., & Stiller, B. (2010). An Overview of IP Flow-

based Intrusion Detection. IEEE Communications Surveys and Tutorials, 12(3), 343-356.

12. Haddadi, F., Morgan, J., Gomes Filho, E., &Zincir-Heywood, A. N. (2014, May). Botnet behaviour analysis

using ip flows: with http filters using classifiers. In Advanced Information Networking and Applications

Workshops (WAINA), 2014 28th International Conference on (pp. 7-12). IEEE.

13. Choi, H., Lee, H., Lee, H., & Kim, H. (2007, October). Botnet detection by monitoring group activities in DNS traffic. In 7th IEEE International Conference on Computer and Information Technology (CIT 2007) (pp.

715-720). IEEE.

14. Strayer, W. T., Lapsely, D., Walsh, R., &Livadas, C. (2008). Botnet detection based on network behavior. In Botnet detection (pp. 1-24). Springer, Boston, MA.

15. Zeidanloo, H. R., Shooshtari, M. J. Z., Amoli, P. V., Safari, M., & Zamani, M. (2010, July). A taxonomy of

botnet detection techniques. In 2010 3rd International Conference on Computer Science and Information Technology (Vol. 2, pp. 158-162). IEEE.

16. Gu, G., Perdisci, R., Zhang, J., & Lee, W. (2008). Botminer: Clustering analysis of network traffic for

protocol-and structure-independent botnet detection. 17. Villamarin-Salomon, R., &Brustoloni, J. C. (2008, January). Identifying botnets using anomaly detection

techniques applied to DNS traffic. In 2008 5th IEEE Consumer Communications and Networking Conference (pp. 476-481). IEEE.

18. Feily, M., Shahrestani, A., &Ramadass, S. (2009, June). A survey of botnet and botnet detection. In 2009

Third International Conference on Emerging Security Information, Systems and Technologies (pp. 268-273). IEEE.

19. Li, C., Jiang, W., & Zou, X. (2009, December). Botnet: Survey and case study. In innovative computing,

information and control (icicic), 2009 fourth international conference on (pp. 1184-1187). IEEE. 20. Singh, K., Srivastava, A., Giffin, J., & Lee, W. (2008, June). Evaluating email’s feasibility for botnet

command and control. In Dependable Systems and Ntworks With FTCS and DCC, 2008. DSN 2008. IEEE

International Conference on (pp. 376-385). IEEE. 21. Dittrich, D., & Dietrich, S. (2008, October). P2P as botnet command and control: a deeper insight. In 2008

3rd International Conference on Malicious and Unwanted Software (MALWARE) (pp. 41-48). IEEE.

22. https://www.statista.com/statistics/420391/spam-email-traffic-share/ 23. McCallum, A., & Nigam, K. (1998, July). A comparison of event models for naive bayes text classification.

In AAAI-98 workshop on learning for text categorization (Vol. 752, No. 1, pp. 41-48).

24. Sahami, M., Dumais, S., Heckerman, D., & Horvitz, E. (1998, July). A Bayesian approach to filtering junk e-mail. In Learning for Text Categorization: Papers from the 1998 workshop (Vol. 62, pp. 98-105).

25. FineReader, A. B. B. Y. Y. 7.0 Professional

26. Dredze, M., Gevaryahu, R., & Elias-Bachrach, A. (2007, August). Learning Fast Classifiers for Image Spam. In CEAS(pp. 2007-487).

131-137

27. Thonnard, O., &Dacier, M. (2008). A framework for attack patterns' discovery in honeynet data. digital

investigation, 5, S128-S139.

28. Spitzner, L. (2003). The honeynet project: Trapping the hackers. IEEE Security & Privacy, 99(2), 15-23.

22.

Authors: Shanky Goyal, Dr. Sahshi Bhushan

Paper Title: A Optiminzed Model for Energy Efficiency on Cloud System using PSO &

CUCKOO Search Algorithm

Abstract: Cloud computing is one of the growing technologies, these days. Cloud

computing is a paradigm that is surrounded by multiple resources, which helps in resource

utilization. Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a

Service (Saas) are named as services of cloud computing. In the IaaS models, users can rent

infrastructure of the data center as a service. Some of the examples of IAAS are Google

Compute Engine (GCE) and Amazon Web Service (AWS). In the PaaS models, users can

take services like operating system and database. Some of the examples of PAAS are

Microsoft Azure and Google App Engine. In the SaaS models, users can access and install

application software and databases via Internet. Examples of SAAS are Citrix

GoToMeeting and Google Docs. In this paper algorithms named as PSO and CSA are

discussed The objective of optimization for energy consumption on cloud has also been

discussed in the paper. Along with the optimization techniques, the detailed literature

reviews have been presented. To achieve the proposed work, CloudSim simulators and

standard programming languages have been used. The performance of the proposed work

will be analyzed by using the various performance parameters such as response time, energy

efficiency and execution time.

Keywords: Cloud Computing, Load balancing, Energy efficiency, Data center, CSA, PSO.

References: 1. Vanitha, P. Marikkannu (2017).Effective resource utilization in cloud environment through a dynamic

well-organized load balancing algorithm for virtual machines. Elsevier Ltd.

2. Shiva Razzaghzadeh, Ahmad Habibizad Navin, Amir Masoud Rahmani, Mehdi Hosseinzadeh. (2017). Probabilistic modeling to achieve load balancing in Expert Clouds. ElsevierB.V.

3. Mohammad Goudarzi, Mehran Zamani, Abolfazl Toroghi Haghighat.(2017). A fast hybrid multi-site

computation offloading for mobile cloud computing. Journal of Network and Computer Applications, Elsevier.

4. Muhammad Baqer Mollah, Md. Abul Kalam Azad, Athanasios Vasilakos.(2017).Security and privacy

challenges in mobile cloud computing: Survey and way Ahead. Journal of Network and Computer Applications, Elsevier.

5. Sungju Huh , Seongsoo Hong. (2017). Providing fair-share scheduling on multicore computing systems

via progress balancing. The Journal of Systems and Software, Elsevier. 6. Hassan Raei, Nasser Yazdani. (2017). Performability analysis of cloudlet in mobile cloud computing.

Information Sciences, Elsevier.

7. Piotr Nawrocki, Wojciech Reszelewski. (2017).Resource usage optimization in Mobile Cloud Computing. Computer Communications, Elsevier.

8. Wei Zhu, Yi Zhuang, Long Zhang. (2017). A three-dimensional virtual resource scheduling method for

energy saving in cloud computing. Future Generation Computer Systems, Elsevier. 9. SONG Ningning, GONG Chao, AN Xingshuo, ZHAN Qiang. (2016). Fog Computing Dynamic Load

Balancing Mechanism Based on Graph Repartitioning. China Communications.

10. Lei Zhang, Jiangchuan Liu, Edith Cheuk-Han Ngai, Wenwu Zhu.(2016). On Energy-Efficient Offloading in Mobile Cloud for RealTime Video Applications. IEEE.

11. Mohammad Mehedi Hassan, Majed Alrubaian, Atif Alamri. (2016). Effective QoS aware Novel Resource Allocation Model for Body Sensor-Integrated Cloud platform. ICACT.

12. Qi Liu, Weidong Cai, Jian Shen, Dandan Jin, Nigel Linge. (2016). A Load Balancing Approach B ased

on Modified K-ELM and NSGA-II in a Heterogeneous Cloud Environment. IEEE International Conference on Consumer Electronics.

13. Deepak KumarPatel, DevashreeTripathy, C.R.Tripathy. (2016). Survey of load balancing techniques for

Grid. Journal of Network and Computer Applications, Elsevier. 14. Ankita Choudhary, Shilpa Rana, K.J. Matahai. (2016). A Critical Analysis of Energy Efficient Virtual

Machine Placement Techniques and its Optimization in a Cloud Computing Environment. International

Conference on Information Security & Privacy, Elsevier. 15. Aarti Singh, Dimple Juneja, Manisha Malhotra. (2015). Autonomous Agent Based Load Balancing

Algorithm in Cloud Computing. ICACTA, Elsevier.

138-144

16. Ebin Deni Raj and Dhinesh Babu L.D. (2015). A Two Pass Scheduling Policy based Resource allocation

for MapReduce. ICICT, Elsevier.

17. Fatemeh Jalali, Kerry Hinton, Robert Ayre, Tansu Alpcan, and Rodney S. Tucker. (2014). Fog

Computing May Help to Save Energy in Cloud Computing. IEEE Journal.

23.

Authors: Komalpreet Kaur, Dr. Amanpreet Kaur

Paper Title: Ultra-wideband coplanar waveguide antenna with an improved gain using a

frequency selective surfaces (FSS)

Abstract: In this article, an ultra-wideband FSS reflector has been proposed to enhance the

gain of a CPW antenna for UWB applications. A CPW fed antenna having dimensions of

38mm×38mm×1.605mm and FSS unit cell having dimensions 14mm × 14mm × 1.605 mm

are presented in the paper. A rectangular slot and stubs are interleaved at the outer edges of

the patch for achieving desired characteristics of an ultra-wideband for the frequency range

of 3.39 GHz to 12.9 GHz. Simulation results carried out using the CST microwave 2016

version in the time domain are presented for the proposed antenna. An FSS unit cell

designed and simulated using periodic boundary conditions and floquet ports is presented.

The combined setup of an array of FSS reflector behind the antenna has been simulated in

the time domain. This set up shows an improved performance in terms of antenna’s gain. A

maximum and minimum gain of 8.14 dB and 4.98 dB has been observed with the presence

of FSS reflector behind the coplanar waveguide antenna. A significant improvement of 2.9

dB has been observed over the entire band of antenna’s operation.

Keywords: Frequency selective surface (FSS), reflector, reflection parameters, and

transmission parameters, gain.

References: 1. Ekta Saini, Richa Bhatia, Saurabh Prakash, “High-speed broadband communication system for moving trains

using Free Space Optics”, 2016 International Conference on Computational Techniques in Information and

Communication Technologies (ICT ICT),pp.1-4.. 2. Mahdi Ghorbani and Habib Ghorbaninejad,2017 “Design Of A High Gain Bandwidth Improved Aperture

Antenna Using A Frequency Selective Surface”, ACES Journal, Vol. 32, No.4

3. Valentino Trainotti, Gonzalo Figueroa 2010, “Vertically Polarized Dipoles and Monopoles, Directivity, Effective Height and Antenna Factor”, IEEE Transactions on broadcasting, VOL. 56, NO. 3.

4. M. T. Islam, M. N. Shakib, and N. Misran, 2009 "Multi-Slotted Microstrip Patch Antenna for Wireless

Communication", Progress in Electromagnetics Research Letters, Vol. 10, pp.11-18. 5. Giorgio Montisci, Zusheng Jin, Mingchao Li, Hu Yang, Giovanni Andrea Casula, Giuseppe Mazzarella, and

Alessandro Fanti, 2013"Design of Multilayer Dielectric Cover to Enhance Gain and Efficiency of Slot

Arrays", International Journal of Antennas and Propagation, pp.1-6 6. C. A. Balanis. Antenna Theory2015: Analysis and Design, Third Edition: John Wiley & Sons.

7. T.K. Wu,1995 Frequency selective surfaces and grid array, Wiley, New York

8. B.A. Munk, 2000 Frequency selective surface - theory and design, Wiley, New York, . 9. Y. Ranga, K. P. Esselle, L. Matekovits3, and S. G. Hay,2012 "Increasing the Gain of a Semicircular Slot

UWB Antenna Using an FSS Reflector”, IEEE, pp.478-481.

10. Silva MWB, Araujo HX, Campos ALPS,2018 “Design of a narrow band and wideband absorbers using resistive FSS concept for the X and Ku band application”, Microwave Optical Technology Letters, vol.60,

pp.2128–2132.

11. A.G. D’Assunc¸ão, Jr.2012, Analysis of integrated circuits and FSS using WCIP for applications at microwaves and terahertz bands (in Portuguese), Ph.D. Dissertation, Federal University of Campina Grande,

PB, Brazil.

12. Silva MR, N_obrega CL, Silva PHF, D’assunção AG.2013 , “Stable and compact multiband frequency selective surfaces with fractal configurations”, IET Microwave Antennas Propagation, pp.543–551.

13. Sanz-Izquierdo B, Parker EA.,2014 “Dual polarized reconfigurable frequency selective surfaces”, IEEE Trans Antennas Propagation, pp.764–771.

145-149

Authors: Sandeep S. Jain, Riya Gupta, Chetika Tiwari, Navnoor Kaur

Paper Title: Behaviour of Players in IPL Based on Fuzzy C Means

24.

Abstract: Clustering algorithms are being widely used in the field of data mining in order to

accumulate similar data in the form of clusters. Indian Premiere League(IPL) is one of the

most famous cricket league around the globe.In this paper, the dataset of IPL is used to

cluster the players on the basis of various attributes. The authors ought to analyse both

batsmen and bowlers in various clusters with the help of Fuzzy-c-means. The algorithm has

been implemented to group the players in different clusters based on their performance in

the IPL season of 2018. The pros and cons of the algorithm are also discussed and finally

the experimental results are shown to highlighttwo main clusters i.e. above average and

below average. The present work simulates the algorithm to distinguish only overseas

player. In future this work can be extended for every player and form a recommendation

model to identify best player or form best team.

Keywords: Clustering algorithm, Fuzzy-C-Means, Clusters, IPL Dataset.

References: 1. Swartz, T. B., Research directions in cricket. Handbook of Statistical Methods and Analyses in Sports.

Chapman & Hall/CRC Handbooks of Modern Statistical Methods: Boca Raton,2016, FL, 272.

2. Shah, S., Hazarika, P. J., & Hazarika, J.,“A Study on Performance of Cricket Players using Factor Analysis

Approach.”International Journal of Advanced Research in Computer Science, 8(3), 2017. 3. Mittal, A., Manavalan, A., “The IPL Model: Sports Marketing and Product Placement

Sponsorship”International Journal of Humanities and Social Science Invention, 6(2), 2017.

4. Hou, J., Gao, H., & Li, X.,“DSets-DBSCAN: a parameter-free clustering algorithm.” IEEE Transactions on Image Processing, 25(7), 2016, pp. 3182-3193.

5. Shen, J., Hao, X., Liang, Z., Liu, Y., Wang, W., & Shao, L,“Real-time superpixel segmentation by DBSCAN clustering algorithm.” IEEE Transactions on Image Processing, 25(12), 2016, pp. 5933-5942.

6. Ienco, D., &Bordogna, G. ,Fuzzy extensions of the DBScan clustering algorithm. Soft Computing, 22(5),

2018, pp. 1719-1730. 7. Nayak, J., Naik, B., &Behera, H. S. ,“uzzy C-means (FCM) clustering algorithm: a decade review from 2000

to 2014.” Computational intelligence in data mining-volume 2, 2015, pp. 133-149.

8. Zheng, Y., Jeon, B., Xu, D., Wu, Q. M., & Zhang, H. ,“Image segmentation by generalized hierarchical fuzzy C-means algorithm.” Journal of Intelligent & Fuzzy Systems, 28(2), 2015, pp. 961-973.

9. Pourjabari, A. J., &Seyedzadegan, M.,” An improved method of fuzzy c-means clustering by using feature

selection and weighting.” International Journal of Computer Science and Network Security (IJCSNS), 16(10), 2016, pp.64.

10. Cebeci, Z., &Yildiz, F.,“Comparison of K-means and Fuzzy C-means algorithms on different cluster

structures.” AGRÁRINFORMATIKA/JOURNAL OF AGRICULTURAL INFORMATICS, 6(3), 2015, pp. 13-23.

11. Ludwig, S. A.,“MapReduce-based fuzzy c-means clustering algorithm: implementation and

scalability.” International journal of machine learning and cybernetics, 6(6), 2015, pp. 923-934. 12. Chirag Goyal, “IPL-2017 Cross Country Cluster Analysis.”International Journal of Computer Science Trends

and Technology (IJCST)5(4),2017, pp.117-124.

150-154

Authors: Arashpreet Kaur, Amanpreet Kaur

Paper Title: A Compact Rectangular Microstrip Patch Antenna Loaded with Stubs and Defected

Partial Ground Structure for UWB Systems

Abstract: This paper presents the prototype and simulations of a compact rectangular

microstrip patch antenna for ultra-wideband applications. The proposed antenna is printed

on FR4 (Flame Retardant) substrate with relative permittivity of 4.4, dielectric loss tangent

of 0.0024 and the dimensions of 57 × 25 × 1.57 mm3. The radiating patch of the antenna is

loaded with two rectangular stubs along its upper and lower edges and an equilateral

triangular notch is truncated from the reduced ground plane to achieve optimum results in

terms of bandwidth and reflection coefficient. It is fed along the centerline of symmetry by

50Ω microstrip feed line. The simulated return loss (𝐒𝟏𝟏) characteristics show that the

proposed antenna has a capability of covering the wireless bands from 0.17GHz to 7.25GHz

with impedance bandwidth of 7.08GHz and exhibits a peak gain of 5dB at 7.25GHz which

is acceptable for UWB systems.

Keywords: UWB patch antenna, DGS (Defected ground structure), VSWR (Voltage

Standing Wave Ratio), Smith Chart, Radiation Pattern, CST MWS’14.

25.

References: 1. Vuong, T.P., Ghiotto, A., Tedjini, S., et al. (2007). Design and characteristics of a small U-slotted planar

antenna for IR-UWB. Microwave and Optical Technology Letters, 49(7), 1727-1731.

2. Jung, J., Choi, W., Choi, J., (2005). A Small Wideband Microstrip-fed Monopole Antenna. IEEE Microwave

and Wireless Components Letters, 15(10), 703-705. 3. Kaur, S., Khanna, R., (2015). Design and analysis of stair-shape antenna with flowery DGS. International

Journal of Microwave and Wireless Technologies, 7(1), 53-60.

4. Balanis, C.A. (2005). Antenna Theory Analysis and Design, 3rd edition. Hoboken, NJ: John Wiley & Sons, Inc. 5. Abdelaziz, A.A. (2006). Bandwidth enhancement of microstrip antenna. Progress in Electromagnetics Research,

PIER 63, 311–317.

6. Kaur, A., Kaur, A. (2017). A compact staircase shaped slotted microstrip patch antenna with DGS for UWB applications. 5th International Conference on Advancements in Engineering and Technology, Sangrur, India,

66-69.

7. Lee, C.P., Chakrabarty, C.K. (2011) Ultra-Wideband Microstrip Diamond Slotted Patch Antenna with Enhanced Bandwidth. International Journal of Communications, Network and System Sciences, 4(7), 468-474.

8. Islam, M.T. (2009). Design analysis of High Gain Wideband L-Probe fed Microstrip Patch Antenna. Progress in

Electromagnetics Research, PIER 95, 397-407. 9. Kaur, A., Khanna, R., Kartikeyan, M.V. (2015). A stacked Sierpinski gasket fractal antenna with defected

ground structure for UWB/WLAN/radio astronomy/STM link applications. Microwave and Optical Technology

Letters, 57(12), 2786-2792. 10. Kaur, A., Khanna, R. (2017). Design and development of a stacked complementary microstrip antenna with a ‘

’-shaped DGS for UWB, UNII, WLAN, WiMAX and radio astronomy wireless applications. International

Journal of Microwave and Wireless Technologies, 2, 1-10. 11. Kaur, A., Kaur, A. (2017). An extended semi-circular microstrip patch antenna with DGS for UWB

applications. Journal of Microwave Engineering and Technology, 4(1), 13-18.

12. Wu, C.M., Chen, Y.L., Wen, C.L. (2012). A Compact Ultra-Wideband Slotted Patch Antenna for Wireless Dongle Application. IEEE Antennas and Wireless Propagation Letters, 11, 596-599.

13. Arya, A.K., Patnaik, A., Kartikeyan, M.V. (2013). Gain Enhancement of Microstrip patch antenna using

Dumbbell shaped Defected Ground Structure. International Journal of Scientific Research Engineering and Technology, 2(4), 184-188.

14. Woo D.J., Lee, T.K., Lee, J.W, Pyo, C.S, Choi, W.K. (2006). Novel U-Slot and V-Slot DGSs for band stop

filter with improved Q-factor. IEEE Transactions on Microwave Theory Techniques, 54(6), 2840-2847. 15. Reddy, B.R., Vakula, D. (2015). Compact Zigzag Shaped Slit Microstrip Antenna with Circular Defected

Ground Structure for Wireless Applications, IEEE Antennas and Wireless Propagation Letters, 14, 678-681.

16. Chen, H.J., Huang, T.H., Chang, C.S., Chen, I.S., Wang, N.F., Wang, Y.H, Houng, M.P. (2007). A novel cross-shape DGS applied to the design of ultra-wide stop band low pass filters. IEEE Microwave Wireless

Components Letters, 17(8), 586-588.

17. Chen, W., Lee, K.F., Dahele, J.S. (1992). Theoretical and experimental studies of resonant frequencies of the equilateral triangular microstrip antenna. IEEE Transactions on Antennas and Propagation, 40(10), 1253-1256.

18. Kaur, A., Khanna, R., Kartikeyan, M.V. (2017). A Multilayer dual wideband circularly polarized Microstrip

antenna with DGS for WLAN/Bluetooth/ZigBee/WiMAX/IMT band applications. International Journal of Microwave and Wireless Technologies, 9(2), 317-325.

19. Kelothu, B., Subhashini, K.R., Manohar G.L. (2012). A compact high-gain microstrip patch antenna for dual

band WLAN applications. 2012 Students Conference on Engineering and Systems, Allahabad, Uttar Pradesh, India, 1-5.

20. Agarwal, A., Kaur, A. (2017). A dual band stacked aperture coupled antenna array for WLAN applications.

Microwave Optical Technology Letters, 59, 648-654.

155-160

Authors: Sukhman Kaur

Paper Title: Energy Optimization Approach for Underwater Sensor Network Using

Nature Inspired Technique

Abstract-There is lots of energy optimization technique is used in underwater sensor

network but in this paper, nature-inspired technique, called Elephant Herding Optimization

(EHO), and is proposed for solving optimization tasks. The EHO method is inspired by the

herding behavior of the elephant group. In nature, the elephants having a place with various

factions live respectively under the initiative of female authority, and the male elephants will

leave their family bunch when they grow up. These two practices can be displayed into two

after administrators: group refreshing administrator and isolating administrator. In EHO, the

elephants in every faction are refreshed by its present position and female authority through

group refreshing administrator. It is found from the outcomes that the EHO based vitality

streamlining approach shows the outcomes compelling than established methodology as far

as numerous parameters. In this work, the advancement dimension of the vitality to over 11%

is accomplished utilizing Elephant Herd Optimization that is likewise utilized in numerous

other areas for designing enhancement.

26.

Keywords: Energy Optimization Underwater Sensor Networks, Elephants, Nature Inspired

Techniques.

References: 1. X. Gao, Z. Cui, “Theory and applications of swarm intelligence,” Neural Computing & Applications, vol. 21.

2. J. Kennedy, R. Eberhart, “Particle swarm optimization,” in Proceeding of the IEEE International Conference on Neural Networks, Perth, Australia, 1995.

3. S. Mirjalili, L. d. S. Coelh, G.-G.Wang, “Binary optimization using hybrid particle swarm optimization and

gravitational search algorithm,” Neural Computing and Applications, vol. 25. 4. A. H. Alavi, A. H. Gandomi, G.-G. Wang, S. Deb, “A hybrid method based on krill herd and quantum-

behaved particle swarm optimization,” Neural Computing and Applications, 2015.

5. G.-G. Wang, A. H. Gandomi, X.-S.Yang, A. H. Alavi, “A novel improved accelerated particle swarm optimization algorithm for global numerical optimization,” Engineering Computations, vol. 31.

6. X. Zhao, B. Song, P. Huang, Z. Wen, J. Weng, Y. Fan, X. Zhao, B. Song, “An improved discrete immune

optimization algorithm based on PSO for QoS-driven web service composition,” Applied Soft Computing, vol.12.

7. X. Zhao, “A perturbed particle swarm algorithm for numerical optimization,” Applied Soft Computing, vol.

10. 8. S. Mirjalili, A. Lewis, “S-shaped versus V-shaped transfer functions for binary Particle Swarm

Optimization,” Swarm and Evolutionary Computation, vol. 9. Cybernetics, vol. 26.

9. J. Jaen, K. Krynicki , J. A. Mocholí, "Ant colony optimization for resource searching in dynamic peer-to-peer grids," International Journal of Bio- Inspired Computation, 2014,vol. 6, no. 3, pp. 153-165.

10. D. Karaboga, B. Basturk, “A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm,” Journal of Global Optimization,2007, vol. 39, no. 3, pp. 459-471

11. X. S. Yang, S. Deb, "Cuckoo search via Lévy flights." pp. 210-214.

12. S. Debv, X.-S. Yang, “Cuckoo search: recent advances and applications,” Neural Computing and Applications, 2013 vol. 24.

13. X. Li, J. Wang, M. Yin, “Enhancing the performance of cuckoo search algorithm using orthogonal learning

method,” NeuralComputing and Applications, 2013,vol. 24, no. 6. 14. A. H. Gandomi, X. Zhao, G.-G. Wang, H. C. E. Chu, "Hybridizing harmony search algorithm with the

cuckoo search for global numerical optimization," Soft Computing, 2014.

15. G.-G. Wang, S. Deb, A. H. Gandomi, Z. Zhang, A. H. Alavi, “Chaotic cuckoo search,” Soft Computing, 2015.

16. A. H. Gandomi, G.-G. Wang, A. H. Alavi, X.-S.Yang, “A new hybrid method based on krill herd and

cuckoo search for global optimization tasks,” International Journal of Bio-Inspired Computation, 2012.

17. X. Li, M. Yin, “Modified cuckoo search algorithm with self- adaptive parameter method,” Information

Sciences,2015, vol. 298.

18. X. S. Yang, “Nature-inspired metaheuristic algorithms”, 2nd ed., Luniver Press, Frome, 2010. 19. S. M. Mirjalili, X.-S. Yang, “Binary bat algorithm,” Neural Computing and Applications, 2013,vol. 25.

20. X.-S. Yang, A. H. Gandomi, A. H. Alavi, “Mixed variable structural optimization using firefly algorithm,”

Computers & Structures,2011, vol. 89. 21. X. S. Yang, "Firefly algorithm, stochastic test functions, and design optimization," International Journal of

Bio-Inspired Computation, 2010, vol. 2.

22. G.-G. Wang, D. Wang, “An effective hybrid firefly algorithm with harmony search for global numerical optimization,” The Scientific World Journal, 2013.

23. S. Mirjalili, “The ant lion optimizer,” Advances in Engineering Software, 2015, vol. 83.

24. J.-W. Zhang, G.-G. Wang, “Image matching using a bat algorithm with mutation,” Applied Mechanics and Materials, 2012,vol. 203.

25. B. Chang, G.-G. Wang, Z. Zhang, "A multi-swarm bat algorithm for global optimization.”

26. A. Kaveh, S. Talatahari, "A discrete big bang-big crunch algorithm for the optimal design of skeletal structures,” ,2010, .vol. 11.

27. A. Kaveh, S. Talatahari, “Size optimization of space trusses using Big Bang–Big Crunch algorithm,”

Computers & Structures, vol. 87, 2009.

28. S. Talatahari, "A novel heuristic optimization method: charged system search," Acta Mechanica, 2010, vol.

21.

29. R. Sheikholeslami, S. Talatahari, “Optimum design of gravity and reinforced retaining walls using enhanced charged system search algorithm,” KSCE Journal of Civil Engineering, 2014,vol. 18, no. 5.

30. S. Talatahari, A. Kaveh, "Charged system search for the optimal design of frame structures," Applied Soft

Computing, 2012,vol. 12. 31. A. Kaveh, R. Sheikholeslami, S. Talatahari, M. Keshvari-Ilkhichi, “Chaotic swarming of particles: a new

method for size optimization of truss structures,” Advances in Engineering Software,2014, vol. 67.

32. S. M. Mirjalili, A. Hatamlou, “Multi-verse optimizer: a nature- inspired algorithm for global optimization,” Neural Computing and Applications, 2015.

33. A. H. Gandomi, A. H. Alavi, “Krill herd: a new bio-inspired optimization algorithm,” Communications in

Nonlinear Science and Numerical Simulation, 2012,vol. 17, no. 12 34. G.-G. Wang, A. H. Gandomi, A. H. Alavi, "A chaotic particle swarm krill herd algorithm for global

numerical optimization," Kybernetes, 2013,vol. 42.

35. A. H. Gandomi, A. H. Alavi, G.-G. Wang, “An effective krill herd algorithm with migration operator in

161-164

biogeography-based optimization,” Applied Mathematical Modelling, 2014,vol. 38.

36. A. H. Gandomi, G.-G. Wang, A. H. Alavi, “Stud krill herd algorithm,” Neurocomputing, 2014,vol. 128.

37. G.-G. Wang, A. H. Gandomi, A. H. Alavi, S. Deb, “A Multi-Stage Krill Herd Algorithm for Global

Numerical Optimization,” International Journal on Artificial Intelligence Tools, 2015. 38. A. H. Alavi, G.-G. Wang, L. Guo, H. Duan, “A new improved krill herd algorithm for global numerical

optimization,” Neurocomputing, vol. 138, 2014.

39. G.-G. Wang, S. Deb, Z. Cui, “Monarch butterfly optimization,” Neural Computing and Applications, 2015.

27.

Authors: Sukhman Kaur

Paper Title: Soft Computing Technique Based on Missing Value Treatment

Abstract: Missing value treatment is an actual yet challenging issue confronted in data

mining. In existing work missing value treatment is a procedure that replaces the missing

values in a dataset by some conceivable values. The conceivable values are generally

generated from the dataset using a statistical evaluation. These types of result do not give

accurate outcomes. In this paper, soft computing is used in the random forest approach using

for missing value treatment that is devised and implemented on the different types of social

media. Using random forest approach results are improved form existing technique.

Keywords: Missing value, Missing value treatment, Soft computing, Social media.

References: 1. Bifet, A., & Frank, E.. Sentiment knowledge discovery in Twitter streaming data. In International Conference

on Discovery Science. Springer Berlin Heidelberg, 2010. 2. Bollen, J., Mao, H., &Pepe, A.. Modeling public mood and emotion: Twitter sentiment and socio-economic

phenomena. ICWSM, 11, 2009,450- 453.

3. Bollen, J., Mao, H., &Pepe, A.. Determining the Public Mood State by Analysis of Microblogging Posts. In ALIFE2010, (pp. 667-668).

4. Asur, S., &Huberman, B. A.. Predicting the future with social media. In Web Intelligence and Intelligent Agent

Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference on (Vol. 1, pp. 492-499). 5. Tan, C., Lee, L., Tang, J., Jiang, L., Zhou, M., & Li, P... User-level sentiment analysis incorporating social

networks. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and

data mining (pp. 1397-1405). ACM, 2011.

6. Saif, H., He, Y., &Alani, H.. Semantic sentiment analysis of Twitter. In International Semantic Web

Conference (pp).508-524),2012. Springer Berlin Heidelberg..

7. Leong, C. K., Lee, Y. H., &Mak, W. K. Mining sentiments in SMS texts for teaching evaluation. Expert Systems with Applications, 39(3), 2584- 2589, 2012.

8. Wang, H., Cambria, E., Schuller, B., Liu, B., &Havasi, C.. Knowledge- based approaches to concept-level

sentiment analysis. IEEE Intelligent Systems, 28(2), 12-14, 2013. 9. Dong, H., Shahheidari, S., &Daud, M. N. R. B.. Twitter sentiment mining: A multi-domain analysis. In

Complex, Intelligent, and Software Intensive Systems (CISIS), 2013 Seventh International Conference (pp.

144-149). IEEE, 2013. 10. Cambria, E., Fu, J., Bisio, F., &Poria, S.AffectiveSpace 2: Enabling Affective Intuition for Concept-Level

Sentiment Analysis. In AAAI (pp. 508-514), 2013.

11. Kotwal, A., Fulari, P., Jadhav, D., &Kad, R.. Improvement in Sentiment Analysis of Twitter Data Using Hadoop. Imperial Journal of Interdisciplinary Research, 2(7), 2014.

12. Poria, S. Cambria, E., Fu, J., Bisio, F., &. AffectiveSpace 2: Enabling Affective Intuition for Concept-Level

Sentiment Analysis. In AAAI (pp. 508-514), 2015. 13. Davis, B., Hürlimann, M., Cortis, K., Freitas, A., Handschuh, S., & Fernández, S.. A Twitter Sentiment Gold

Standard for the Brexit Referendum. In Proceedings of the 12th International Conference on Semantic Systems

(pp. 193-196). ACM, 2016.

165-169

Authors: Gagandeep Kaur, Amanpreet Kaur

Paper Title: A Circular coplanar waveguide fed Microstrip Patch Antenna with modified

triangular Ground for UWB applications

Abstract: This research article gives a detailed insight of the design, simulation of a

compact circular shaped microstrip patch antenna that is fed using a coplanar waveguide

feed (CPW for practical wireless communication applications). The antenna is typically

designed for Ultra wideband (1.46-6GHz), Bluetooth (2.4GHz), ZIGBEE (2.4GHz), WLAN

(5.15- 5.35 GHz and 5.725- 5.825), Wi-Fi (2.4-2.485GHz) and HIPERLAN-2(5.15 - 5.35

GHz and 5.470 -5.725GHz) wireless applications with stop band characteristics for the H

(partial C band). The proposed antenna has an overall packaged structure dimensions of 78

28.

x75 x1.605 mm3 and is fabricated on FR4 substrate as a circular patch antenna with a

coplanar ground .The commercially available laminate FR4 substrate that is used has a

dielectric constant of 4.4, height of 1.6mm and a loss tangent of 0.0024.The prospective

antenna shows a simulated impedance bandwidth of 4.54 GHz. The coplanar waveguide

feeding used with this antenna helps in improving antenna performance in terms of its

impedance bandwidth as this geometry helps in creating multiple current loops at the

antenna structure, thereby exciting nearby frequencies that merge to show a broadband of

operation. The antenna’s operational bandwidth is also improved by the concept of modified

ground, in which triangular and rectangular shapes are added symmetrically on both sides of

ground plane that provide a better fringing effect and hence an improved bandwidth.

Keywords: CPW fed, modified ground structure (MGS), ultra wide band (UWB), CST

MWS version 2017.

References: 1. J. Y. Sze and K. L.Wong ,Bandwidth enhancement of a microstrip line-fed printed wide-slot antenna, IEEE

Trans. Antennas Propag, Jul. 2001;49(7),pp. 1020–1024.

2. H. G. Schantz , A brief history of UWB antennas , IEEE Aerosp. Electron. Syst. Mag., April 2004 ; 19(4), pp. 22–26.

3. Suvadeep Choudhury ,Effect of Dielectric Permittivity and Height on a Microstrip-Fed Rectangular Patch

Antenna, International Journal of Electronics & Communication Technology, March 2014;5 (2),pp.129-130. 4. Amanpreet Kaur, Rajesh Khanna, and Machavaram Kartikeyan, A Stacked Sierpinski Gasket Fractal Antenna

With A Defected Ground Structure For UWB/WLAN/Radio Astronomy/STM Link Applications, Microwave And Optical Technology Letters, December 2015; 57(12), pp. 2786-2792.

5. Amanpreet kaur, Rajesh Khanna and Machavaram kartikeyan ,A multi layer dual wideband circularly polarized

microstrip antenna with DGS WLAN/Bluetooth/Zigbee/WiMAX/IMT band applications, International Journal of Microwave and Wireless Technologies , 2015;9(2), pp. 317-325.

6. Mohamaed Nabil Srifi, Symon K. Podilchak, Mohamed Essaaidi, and Yahia N. N. Antar , A planar circular

disc monopole antennas using compact impedence matching networks for ultra wide band (UWB) applications, IEEE Trans Antennas Propag , 2009 ,782-785.

7. X. Qing and Z. N. Chen, Monopole-like slot UWB antenna on LTCC, in Proc. IEEE International Conference

on Ultra-Wideband, 2008, pp. 121–124. 8. S. Cumhur Basaran , Dual wideband CPW fed split ring monopole antenna for WLAN applications, IEEE

Trans. Antennas Propagation, 2010; 978(1) ,pp. 174- 177.

9. Kirti Vyas and P. K. Singhal , Bandwidth Enhancement in CPW Fed Compact Rectangular Patch Antenna, International Journal of Electronic and Communication Engineering, 2014; 8(2): pp. 378-381.

10. M. Bod and M. M. S. Taheri , Compact UWB printed slot antenna with extra Bluetooth, GSM, and GPS bands,

IEEE Antennas Wireless Propag. Lett 11(2012), 531–534. 11. C.-L. Tsai and C.-L. Yang. Novel compact eye-shaped UWB antennas, IEEE Antennas Wireless Propag Lett

11(2012), 184–187.

12. Y. Sung, UWB monopole antenna with two notched bands based on the folded stepped impedance resonator, IEEE Antennas Wireless Propag. Lett 11(2012), 500–502.

13. S. R. Emadian, C. Ghobadi, J. Nourinia, M. Mirmozafari, and J. Pourahmadazar , Bandwidth enhancement of

CPW-fed circle-like slot antenna with dual band-notched characteristic, IEEE Antennas Wireless Propag Lett 11(2012), 543–546.

14. Dhirgham K. Naji,Compact Broadband CPW-fed Taper-shaped Monopole Antenna with L-slots for C-band

Applications, International Journal of Electromagnetics and Applications ,2013; 3(6), pp. 136-143. 15. A. Kaur , R. Khanna and M.V. Kartikeyena , A Stacked Rectangular MSA with Defected Ground Structure for

IEEE 802.11b/g Bands and Wi-Max Applications, International Conference on Microwaves, Antenna

Propagation and Remote Sensing (IEEE), 2014, pp. 266–270. 16. Gagandeep Kaur and Amanpreet Kaur, Design of a Slotted Micro-strip patch Antenna with DGS for an UWB

applications, International conference on advancements in engineering and technology, 2017, pp. 39-41.

170-174

Authors: Saloni Behal, Nitin Sharma, Simrandeep Singh

Paper Title: Enhanced Vehicular Ad hoc Network Protocol to Improve Quality of Service in

Vehicle to Vehicle Communication

Abstract: The vehicular ad-hoc networks (VANETs) are specific type or a sub form of

Mobile ad hoc networks (MANETs). However the main problem which is related to this

network is the Quality of Service (QoS) which mainly occurs due to rapid change topology

nature in the network and lack of stability of communication. Consequently, some of the

challenges that researcher focus on routing protocols for VANET. The problem which is

faced by this network with these protocols is the dynamic environment in their route

29.

instability. This paper approaches the combination of Dynamic Source Routing protocol

(DSR) and Particle Swarm Optimization Algorithm (PSO) to solve the problems of Routing

protocols which help to improve the Quality of service (QoS) in the network. The approach

which is introduced in this paper is to make use for making the better Quality of Service

(QoS) in the VANET. The simulation results in MATLAB exactly predict the overall

performances regarding the proposed work in terms of the packet drop ratio, transmission

delay, channel utilization, Throughput and Energy consumption under varying conditions.

Keywords: VANETs, Topology Routing Schemes, DSR and PSOA.

References: 1. Sharma, Aravendra Kumar, Sushil Kumar Saroj, Sanjeev Kumar Chauhan, and Sachin Kumar Saini. "Sybil

attack prevention and detection in vehicular ad hoc network." In Computing, Communication and Automation (ICCCA), 2016 International Conference on, pp. 594-599. IEEE, 2016.

2. Abbasi, Irshad, and Adnan Shahid Khan. "A Review of Vehicle to Vehicle Communication Protocols for

VANETs in the Urban Environment." Future Internet 10, no. 2 (2018):

3. Eze, Elias C., Sijing Zhang, and Enjie Liu. "Vehicular ad hoc networks (VANETs): Current state, challenges,

potentials and way forward." In Automation and Computing (ICAC), 2014 20th International Conference on,

pp. 176-181. IEEE, 2014. 4. Chaubey, Nirbhay Kumar. "Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study."

International Journal of Security and Its Applications 10, no. 5 (2016): 261-274.

5. Ghori, Muhammad Rizwan, Zamli Kumal Z., Quosthoni Nik., Hisyam Muhammad., and Montaser, Mohamed.” Vehicular Ad-hoc Network (VANET): Review.” International conference on Innovative research

and Development (ICIRD). 2018.IEEE 6. Kabir, Md Humayun. "Research issues on vehicular ad hoc network." International Journal of Engineering

Trends and Technology (IJETT)–Volume 6 (2013).

7. Chadha, Divya. "Reena,“Vehicular Ad hoc Network (VANETs): A Review,”." Int. J. Innov. Res. Comput. Commun. Eng 3, no. 3 (2015): 2339-2346.

8. Rehman, Sabih, M. Arif Khan, Muhammad Imran, Tanveer A. Zia, and Mohsin Iftikhar. "Enhancing Quality-of-

Service Conditions Using a Cross-Layer Paradigm for Ad-Hoc Vehicular Communication." IEEE Access 5 (2017): 12404-12416.

9. Al-Kharasani, Nori M., Zuriati Ahmad Zulkarnain, Shamala Subramaniam, and Zurina Mohd Hanapi. "An

Efficient Framework Model for Optimizing Routing Performance in VANETs." Sensors 18, no. 2 (2018): 597. 10. Lugayizi, Francis L., Bukohwo M. Esiefarienrhe, and Akakandelwa Warren. "Comparative evaluation of

QoS routing in VANET." In Advances in Computing and Communication Engineering (ICACCE), 2016

International Conference on, pp. 183-188. IEEE, 2016. 11. Phakathi, Thulani, Francis Lugayizi, Bassey Isong, and Naison Gasela. "Quality of Service of Video Streaming

in Vehicular Adhoc Networks: Performance Analysis." In Computational Science and Computational

Intelligence (CSCI), 2016 International Conference on, pp. 886-891. IEEE, 2016. 12. Mchergui, Abir, Tarek Moulahi, Bechir Alaya, and Salem Nasri. "A survey and comparative study of QoS

aware broadcasting techniques in VANET." Telecommunication Systems 66, no. 2 (2017): 253-281.

13. Shaikh, Farheen Iqbal, and Hyder Ali Hingoliwala. "Path planning based QoS routing in VANET." In 2017 International Conference on Big Data, IoT and Data Science (BID), pp. 37-43. IEEE, 2017.

175-181

30.

Authors: Vani Bhargava, S K Sinha, M P Dave

Paper Title: Optimal Integration of Distributed Generation in Primary Distribution System and

its Economics

Abstract: The paper analyses four types of DG (distributed generators) for their optimal

placement in primary distribution system. They are sited and sized optimally to obtain

maximum loss reduction. The ultimate objective of the adopted work in this paper is to

identify the size and location of distributed generators for their placement in primary

distribution network and to justify the economics of these placements. To serve the purpose,

an analytical method is used in this paper for determination of sizes and sites for four DG

types. The analytical method is considered suitable for the analysis purpose in proposed

work. The paper presented a comprehensive analysis for four types of DGs for their

placement in primary distribution system. The type 1 DG is capable of delivering real power

only whereas type 3 DG is capable of providing real as well as reactive power to the

distribution network. Out of other two types, type 2 can deliver only the reactive power

whereas type 4 supplies active power but at the same time it consumes reactive power. The

paper compares the economic feasibility of placement of four DG types in primary

distribution system.

Keywords: Distributed Generation, Distribution System, Economics, Optimal Placement

References: 1. Duong Quoc Hung and Nadarajah Mithulananthan,. “Multiple Distributed Generator Placement in Primary

Distribution Networks for Loss Reduction,” IEEE Transactions on Industrial Electronics, vol.60, no. 3, April

2013

2. Thomas Ackermann, Go¨ran Andersson , Lennart Soder, “Distributed generation: a definition” Electric Power Systems Research, vol.57, pp 195–204, 2001.

3. Pabla A S, Electric Power Distribution , Tata Mc-Graw Hill Education, 2004.

4. R. Sanjay; T.Jayabarathi; T. Raghunathani; V. Ramesh; Nadarajah Mithulananthan, “Optimal Allocation of Distributed Generation Using Hybrid Grey Wolf Optimizer”, IEEE Access, date of publication July 21, 2017

5. Mario ŠIPOŠ, Zvonimir KLAIĆ, Krešimir FEKETE, Marinko STOJKOV, “Review of Non-Traditional

Optimization Methods for Allocation of Distributed Generation and Energy Storage in Distribution System” Technical Gazette 25, 1(2018), 294-301

6. J. A. Pecas Lopes, N. Hatziargyriou, J. Mutale, P. Djapic, N.Jenkins, “ Integrating Distributed Generation into

Electric Power Systems: A Review of Drivers, Challenges and Opportunities” Electrir Power System Research, Elsevier Science Ltd. Vol 77, pp 1189-1203, 2007

7. R. Srinivasa Rao ; K. Ravindra ; K. Satish ; S. V. L. Narasimham, “Power Loss Minimization in

Distribution System Using Network Reconfiguration in the Presence of Distributed Generation” IEEE Transactions on Power Systems, Volume 28, Issue 1, pp 317 – 325, Feb. 2013

8. H. Hedayati, S. A. Nabaviniaki, and A. Akbarimajd, "A Method for Placement of DG Units in Distribution

Networks," IEEE Transactions on Power Delivery, vol. 23, pp. 1620-1628, 2008. 9. S. Ghosh and D. Das, “Method for load-flow solution of radial distribution networks”, IEE Proceedings on

Generation, Transmission & Distribution, vol. 146, no. 6, pp. 641-648, 1999 10. J. H. Teng, “A Network-Topology-based Three-Phase Load Flow for Distribution systems”, Proceeding

National Science Council, Republic of China, vol. 24, no. 4, pp. 259-264, 2000.

11. J. H. Teng, “A Direct Approach for Distribution System Load Flow Solutions”, IEEE Transactions on Power Delivery, vol. 18, no. 3, pp. 882-887, 2003.

12. P. Sobha Rani, Dr. A Lakshmi Devi, “Optimal Sizing of DG Units Using Exact Loss Formula at Optimal

Power factor” International Journal of Engineering Science and Technology, Vol.4 No.09, September 2012. 13. Amir Ameli, Shahab Bahrami, Farid Khazaeli, Mahmood-Reza Haghifam, “A Multiobjective Particle

Swarm Optimization for Sizing and Placement of DGs from DG Owner’s and Distribution Company’s

Viewpoint” IEEE Transactions on Power Delivery, Volume 29, Issue 4, pp 1831 – 1840, Aug. 2014 14. Mukul Dixit , Prasanta Kundu , Hitesh R. Jariwala "Optimal Placement and Sizing of DG in Distribution

system using artificial Bee Colony Algorithm” 2016 IEEE 6th International Conference on Power Systems

(ICPS), 4-6 March 2016

15. N. Acharya, P. Mahat, and N. Mithulananthan, "An analytical approach for DG allocation in primary

distribution network," International Journal of Electrical Power & Energy Systems, vol. 28, pp. 669-678,

2006. 16. Hung D.Q., Mithulananthan N. and Bansal R.C., “Analytical Expressions for DG Allocation in Primary

Distribution Networks,” IEEE Transactions on Energy Conversion, vol. 25, no. 3, pp 814-820, 2010

17. W. Caisheng and M. H. Nehrir, "Analytical approaches for optimal placement of distributed generation sources in power systems," IEEE Transactions on Power Systems, vol. 19, pp. 2068-2076, 2004

18. Pavlos S. Georgilakis ; Nikos D. Hatziargyriou “Optimal Distributed Generation Placement in Primary

Distribution Networks: Models, Methods, and Future Research,” IEEE Transactions on Power Systems, Volume: 28, Issue: 3, pp 3420 – 3428, Aug. 2013

19. Lucian Ioan Dulau, Mihail Abrudean, Dorin Bica, “ Optimal Power Flow Analysis of a Distributed

Generation System” Procedia Technology, vol.19, pp 673 – 680, 2015. 20. Thomas E Hoff, Howard J Wenger, Brian K Farmer, “ Distributed Generation: An Alternative to Electric

Utility Investments in System capacity” Energy Policy, Elsevier Science Ltd.,Vol.24. No. 2. Pp.137-

147,1996. 21. P. Dondi, D. Bayoumi, C. Haederli, D. Julian, and M. Suter, 2002. "Network integration of distributed power

generation”, Journal of Power Sources Vol. 106, Issues 1–2, Pages 1-9, April 2002)

22. Anastasia S. Safigianni , George N. Koutroumpezis, Vassilis C. Poulios, “Mixed distributed generation technologies in a medium voltage network” Electric Power SystemsResearch Volume 96, pp 75-80, March

2013.

23. https://www.mnre.gov.in

182-190

Authors: Palak Thakur, Payal Patial, Dr. Prabhat Thakur

Paper Title: Performance analysis of Cognitive Radio based Internet-of-things Network for

energy efficiency and spectrum utilization

Abstract: Energy and Spectrum are the two basic requirements in the realm of Internet-of-

Things (IoT). The network of IoT is becoming larger day by day and the design of spectrum

and energy efficient solution is a quite challenging task because of the rapid increase of

connecting devices in IoT network. To make the system more energy and spectral efficient,

energy harvesting and cognitive radio (CR) are the proficient solutions, respectively. This

31.

paper introduces a spectral and energy efficient design for CR based sensor networks. We

present a network architecture, in which nodes or other sensing devices can use the

spectrum opportunistically and energy harvesting can be done from different ambient

sources. We then propose an 1) energy balancing scheme for heterogeneous network in

which nodes will have different energy levels and 2) Cluster head (CH) selection scheme

which will only be performed on the few nodes of network having the highest current

energy to accomplish the ultimate goal of energy balancing in network, this analysis is

performed with in the cluster. Furthermore, for the spectral efficiency, we propose a

channel management scheme based on cognitive radio to allot the best available channel

having highest reliability in respect of the bit error rate (BER) using. Comprehensive results

exhibit the effectiveness in the performance of the proposed spectral and energy efficient

schemes and show better performance over other schemes.

Keywords: Channel management, clustering, cognitive Radio, energy management,

Internet-of-Things,

References: 1. A. El-Mougy, M. Ibnkahla, G. Hattab, and W. Ejaz, “Reconfigurable wireless networks,” Proceedings of the

IEEE, vol.103, no. 7, pp. 1125–1158, Jul. 2015. 2. W. Ejaz and M. Ibnkahla, “Machine-to-machine communications in cognitive cellular systems,” in IEEE

International Conference on Ubiquitous Wireless Broadband (ICUWB). Montreal, QC: IEEE, Oct. 2015, pp.

1–5. 3. M. Ibnkahla, Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle. CRC Press, 2014.

4. G. Hattab and M. Ibnkahla, “Multiband spectrum access: Great promises for future cognitive radio

networks,” Proceedings of the IEEE, vol. 102,no. 3, pp. 282–306, Mar. 2014. 5. W. Ejaz, N. Ul Hasan, and H. S. Kim, “Distributed cooperative spectrum sensing in cognitive radio for ad hoc

networks,” Computer Communications, vol. 36, no. 12, pp. 1341–1349, Jul. 2013.

6. A. El-Mougy and M. Ibnkahla, “A cognitive framework for WSN based on weighted cognitive maps and Q-learning,” Ad Hoc Networks, vol. 16,pp. 46–69, 2014.

7. Z. Sheng, S. Yang, Y. Yu, A. V Vasilakos, J. A. Mccann, and K. K. Leung, “A Survey on The IETF Protocol

Suite for The Internet-ofThings: Standards , Challenges and Opportunities,” IEEE Wireless Communications, vol. 20, no. 6, pp. 91–98, 2013.

8. J. Zhao, R. Govindan, and D. Estrin, “Residual Energy Scans for Monitoring Wireless Sensor Networks,”

Proceedings of IEEE Wireless Communications and Networking Conference, pp. 356–362, 2002. 9. S. Aslam, W. Ejaz and M. Ibnkahla, "Energy and Spectral Efficient Cognitive Radio Sensor Networks for

Internet of Things", IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3220-3233, 2018

10. B. Mostafa, A. Benslimane, M. Saleh, S. Kassem and M. Molnar, "An Energy-Efficient Multiobjective Scheduling Model for Monitoring in Internet of Things", IEEE Internet of Things Journal, vol. 5, no. 3, pp.

1727-1738, 2018.

11. S. Santiago and L. Arockiam, "A novel fuzzy based energy efficient routing for Internet of Things", 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies

(ICAMMAET), 2017.

12. S. Nisha and S. Balakannan, "An energy efficient self organizing multicast routing protocol for Internet of Things", 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal

Processing (INCOS), 2017.

13. K. Suresh, M. Rajasekhara Babu and R. Patan, "EEIoT: Energy efficient mechanism to leverage the Internet of Things (IoT)", 2016 International Conference on Emerging Technological Trends (ICETT), 2016.

14. M. Yasin, Q. Abuein, A. Amer and M. Qasem, "An energy-efficient technique for constrained application protocol of Internet of Things", 2016 International Conference on Engineering & MIS (ICEMIS), 2016.

15. W. Ejaz, M. Naeem, A. Shahid, A. Anpalagan, and M. Jo, “Efficient energy management for Internet of

Things in smart cities,” IEEE Communications Magazine (in press), vol. 55, no. 1, pp. 84–91, Jan 2017.

16. R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless information and power transfer,”

IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 1989–2001, May 2013.

17. Y. Liu, Y. Zhang, R. Yu, and S. Xie, “Integrated energy and spectrum harvesting for 5G wireless communications,” IEEE Network, vol. 29,no. 3, pp. 75–81, Jun. 2015.

18. N. Panahi, H. O. Rohi, A. Payandeh, and M. S. Haghighi, “Adaptation of leach routing protocol to cognitive

radio sensor networks” in Sixth International Symposium on Telecommunications (IST). Tehran, Iran: IEEE, Nov. 2012, pp. 541–547.

19. J.-S. Leu, T.-H. Chiang, M.-C. Yu, and K.-W. Su, “Energy efficient clustering scheme for prolonging the

lifetime of wireless sensor network with isolated nodes,” IEEE communications letters, vol. 19, no. 2, pp.259–262, Feb. 2015.

20. N. Jain and V. A. Bohara, “Energy harvesting and spectrum sharing protocol for wireless sensor networks,”

IEEE Wireless Communications Letters, vol. 4, no. 6, pp. 697–700, Dec. 2015. 21. S. Aslam, W. Ejaz and M. Ibnkahla, "Energy and Spectral Efficient Cognitive Radio Sensor Networks for

Internet of Things", IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3220-3233, 2018. Available:

10.1109/jiot.2018.2837354.

191-199

22. S. K. Devi, “Survey On Sleep Scheduling Methods In Wireless Sensor Networks,” International Journal of

Advanced Research in Computer Engineering & Technology (IJARCET), vol. 3, no. 1, pp. 81–85, 2014.

23. P. Sasikumar and S. Khara, “K-means clustering in wireless sensor networks,” in Fourth international

conference on Computational intelligence and communication networks (CICN). Mathura, India: IEEE, Nov. 2012, pp. 140–144.

24. Y. Chen and Q. Zhao, “On the lifetime of wireless sensor networks, IEEE Communications letters, vol. 9, no.

11, pp. 976–978, Nov. 2005. 25. Z. Cheng, M. Perillo, and W. B. Heinzelman, “General network lifetime and cost models for evaluating

sensor network deployment strategies,”IEEE Transactions on mobile computing, vol. 7, no. 4, pp. 484–497,

Apr. 2008. 26. A. Woo, T. Tong, and D. Culler, “Taming the underlying challenges of reliable multihop routing in sensor

networks,” in Proceedings of the first international conference on Embedded networked sensor systems -

SenSys ’03, 2003, pp. 14–27. 27. S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad

Hoc Networks, vol. 11, no. 8, pp. 2661–2674, 2013.

28. R. Giuliano, F. Mazzenga, A. Neri, and A.M. Vegni, "Security Access Protocols in IoT Capillary Networks," in IEEE Internet of Things Journal, Vol. 4, no. 3, pp. 645-657, June 2017.

29. J. Stankovic, "Research Directions for the Internet of Things", IEEE Internet of Things Journal, vol. 1, no. 1,

pp. 3-9, 2014.

30. X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks with RF energy harvesting: A

contemporary survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 757–789, May 2015

31. H. Kharrufa, H. Al-Kashoash, Y. Al-Nidawi, M. Q. Mosquera, and A. H. Kemp, “Dynamic RPL for multi-hop routing in IoT applications,” in Proceedings of the 13th Annual Conference on Wireless On-Demand

Network Systems and Services (WONS ’17), pp. 100–103, February 2017.

32. A. Aijaz and A. H. Aghvami, “Cognitive machine-to-machine communications for internet-of-things: a protocol stack perspective,” IEEE Internet of Tings Journal, vol. 2, no. 2, pp. 103– 112, 2015.

33. S. Basagni, C. Petrioli, R. Petroccia, and D. Spaccini, “CARP: a channel-aware routing protocol for

underwater acoustic wireless networks,” Ad Hoc Networks, vol. 34, no. supplement C, pp. 92–104, 2015, Advances in Underwater Communications and Networks.

34. C. Liu, C. Yang, X. Zhang, and J. Chen, “External integrity verifcation for outsourced big data in cloud and

IoT: a big picture,” Future Generation Computer Systems, vol. 49, no. supplement C, pp. 58–67, 2015. 35. W. Ejaz, M. Naeem, M. Basharat, S. Kandeepan, and A. Anpalagan, “Efficient wireless power transfer in

software-defined wireless sensor networks,” IEEE Sensors Journal, vol. 16, no. 20, pp. 7409–7420, Oct 2016.

36. X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks with RF energy harvesting: A contemporary survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 757–789, May 2015.

37. W. Ejaz, G. A. Shah, H. S. Kim et al., “Energy and throughput efficient cooperative spectrum sensing in

cognitive radio sensor networks, ”Transactions on Emerging Telecommunications Technologies, vol. 26, no.

7, pp. 1019–1030, Jul. 2015.

38. T. H. Cormen, Introduction to algorithms. MIT press, 2009.

39. M. Mishra, C. R. Panigrahi, B. Pati, and J. L. Sarkar, “ECHS: An energy aware cluster head selection algorithm in Wireless Sensor Networks,” in International Conference on Man and Machine Interfacing

(MAMI). Bhubaneswar, India: IEEE, Dec. 2015, pp. 1–4.

40. V. Pal, G. Singh, and R. Yadav, “Energy efficient cluster head selection scheme: A change in node death scenario of leach for surveillance wireless sensor networks,” in IEEE International Conference on Parallel

Distributed and Grid Computing (PDGC). Himachal Pradesh, India, IEEE, Dec. 2012, pp. 865–869.

Authors: Priya Bakshi, Payal Patial, Prabhat Thakur

Paper Title: Cluster Formation with Bacteria Optimization Method Using Cognitive Radio Based

Vehicular Ad-Hoc Network

Abstract: The growing demand of the radio spectrum is an important part in the multi-agent

intelligence management system of the vehicles. Cognitive radio is used for reducing the

restricted access to the wavelength of the spectrum and utilizing the radio spectrum is

dynamic allocation method. With the advent in the cognitive radio arrangement, the CR in

vehicular ad hoc networks allow the operator to sense and hop from one to another system

network in the desired frequency of the spectrum based on the environment of the cognitive

radio. In existing method implemented a cluster formation mechanism used for data

transmission one to another vehicle nodes. In this mechanism used CR-VANET network is

divided into subgroups or clusters and achieve accuracy rate among vehicles. In this work,

has implemented a cluster formation mechanism with Bacterial foraging optimization

algorithm method in Cognitive radio in VANETs. In planned technique a self-motivated

system network is established on the basis of clusters using BFOA network goals to achieve

better throughput in data transmission one node to another node with RSU (Road Side

Units). In the experimental result improves accuracy of the data transmission over the

network. In proposed research, vehicles and road side units are deployed in the network.

When there is loss of the data packets during the transmission in the network, then

32. optimized clustering phase has implemented. In addition, the selections of the cluster heads

are maintained the path and optimization (BFOA) phase implement to recover the path

losses and improve the network performance such as overhead, energy consumption, E2E

delay and Network Throughput and compared with existing method (Cluster-Formation).

Simulation tool used in this proposed work is MATLAB 2016a.

Keywords: Cognitive radio, Radio Spectrum, Vehicular ad-hoc network and Bacteria

Foraging Optimization algorithm.

References: 1. Raut, R. and Kulat, K.D., 2011. SDR design with advanced algorithms for cognitive radio. IJACS, 1(4),

pp.134-141. 2. Toor, Y., Muhlethaler, P., Laouiti, A. and De La Fortelle, A., 2008. Vehicle ad hoc networks: Applications

and related technical issues. IEEE communications surveys & tutorials, 10(3), pp.74-88.

3. Hartenstein, H. and Laberteaux, L.P., 2008. A tutorial survey on vehicular ad hoc networks. IEEE Communications magazine, 46(6), pp.164-171..

4. Boukerche, A., Oliveira, H.A., Nakamura, E.F. and Loureiro, A.A., 2008. Vehicular ad hoc networks: A new

challenge for localization-based systems. Computer communications, 31(12), pp.2838-2849. 5. Li, F. and Wang, Y., 2007. Routing in vehicular ad hoc networks: A survey. IEEE Vehicular technology

magazine, 2(2), pp.12-22.

6. Marcus, M., Burtle, J., Franca, B., Lahjouji, A. and McNeil, N., 2002. Federal communications commission spectrum policy task force. Report of the unlicensed devices and experimental licenses working group.

7. Luo, J. and Hubaux, J.P., 2006. A survey of research in inter-vehicle communications. In Embedded Security

in Cars (pp. 111-122). Springer, Berlin, Heidelberg. 8. Mercier, B., Fodor, V., Thobaben, R., Skoglund, M., Koivunen, V., Lindfors, S., Ryynänen, J., Larsson, E.G.,

PetriolI, C., Bongiovanni, G. and Grøndalen, O., 2008. Sensor networks for cognitive radio: Theory and

system design. ICT mobile summit, pp.10-17. 9. Force, S.P.T., 2002. Spectrum policy task force report et docket no. 02-135. US Federal Communications

Commission.

10. Zhao, Q. and Swami, A., 2007. A survey of dynamic spectrum access: Signal processing and networking perspectives. CALIFORNIA UNIV DAVIS DEPT OF ELECTRICAL AND COMPUTER ENGINEERING.

11. Patil, K., Prasad, R. and Skouby, K., 2011, February. A survey of worldwide spectrum occupancy

measurement campaigns for cognitive radio. In 2011 International Conference on Devices and Communications (ICDeCom) (pp. 1-5). IEEE.

12. Federal Communications Commission, 2010. In the Matter of: Unlicensed Operation in the TV Broadcast

Bands (ET Docket No. 04-186) and Additional Spectrum for Unlicensed Devices Below 900 MHz and in the 3 GHz Band (ET Docket No. 02-380). FCC 10-174: Second Memorandum Opinion and Order.

13. Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C. and Sun, S., 2008, January. Cognitive radio network

architecture: part I--general structure. In Proceedings of the 2nd international conference on Ubiquitous information management and communication (pp. 114-119). ACM.

14. Nitola III, J., 1999. Cognitive radio: Making software radios more personal. IEEE Personal Communication,

pp.13-18. 15. Mitola, J.I., 2002. Cognitive radio. An integrated agent architecture for software defined radio.

16. Haykin, S., 2005. Cognitive radio: brain-empowered wireless communications. IEEE journal on selected

areas in communications, 23(2), pp.201-220. 17. Akyildiz, I.F., Lee, W.Y., Vuran, M.C. and Mohanty, S., 2006. NeXt generation/dynamic spectrum

access/cognitive radio wireless networks: A survey. Computer networks, 50(13), pp.2127-2159.

18. Wyglinski, A.M., Nekovee, M. and Hou, T. eds., 2009. Cognitive radio communications and networks: principles and practice. Academic Press.

19. Eze, J., Zhang, S., Liu, E. and Eze, E., 2017, September. Cognitive radio technology assisted vehicular ad-hoc networks (VANETs): Current status, challenges, and research trends. In 2017 23rd International

Conference on Automation and Computing (ICAC) (pp. 1-6). IEEE.

20. Rawat, D.B., Zhao, Y., Yan, G. and Song, M., 2013, January. CRAVE: Cognitive radio enabled vehicular

communications in heterogeneous networks. In 2013 IEEE Radio and Wireless Symposium (pp. 190-192).

IEEE.

21. Mitra, S., Jana, B. and Poray, J., 2016, December. A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks (CR-VANETs). In 2016 International Conference on Computer,

Electrical & Communication Engineering (ICCECE) (pp. 1-5). IEEE.

22. Yadav, N. and Rathi, S., 2011. Spectrum Sensing Techniques: Research, Challenge and Limitations 1.. 23. Mohapatra, S.G., Mohapatra, A.G. and Lenka, S.K., 2013, March. Performance evaluation of cyclostationary

based spectrum sensing in cognitive radio network. In 2013 International Mutli-Conference on Automation,

Computing, Communication, Control and Compressed Sensing (iMac4s)(pp. 90-97). IEEE. 24. Kapoor, S. and Singh, G., 2011, February. Non-cooperative spectrum sensing: a hybrid model approach.

In 2011 International conference on Devices and Communications (ICDeCom) (pp. 1-5). IEEE.

200-210

Authors: Neha Malgotra, Nitin Mittal, Prabhjot Singh

33.

Paper Title: A Hybrid Energy Efficient Reactive Multipath Routing for Wireless Sensor Network

Abstract: The efficiency of the wireless sensor network (WSN) can be evaluated by using

various factors such as lifetime of the network, number of dead nodes, number of alive

nodes, throughput of the network etc. All these factors are highly influenced by CH and

route formation process as the election of right node for CH and route is quite tedious task to

perform. Thus a large number of researches has been conducted in previous years. Few of

the previous approaches have been discussed in this study and it is analyzed that the

traditional HEEMP approach in quite effective to enhance the network lifetime but has a

weak data communication and transmission strategy. Thus a novel approach is developed in

this work by using the traditional HEEMP approach. The modification in the proposed work

is done in terms of data gathering and data transmission strategy. Only the relevant and

meaningful data packets are transmitted to the BS. The performance analysis of the

proposed and traditional HEEMP protocol is compared and proposed work is found to be

effective than the HEEMP protocol in terms of lifetime of the network.

Keywords:: Wireless Sensor Network, Data packets transmission, network lifetime, cluster

head, HEEMP, TEEN, CEED, and LEACH.

References:

1. M. Sajwan, D. Gosain and A. Sharma, "Hybrid energy-efficient multi-path routing for wireless sensor

networks", Computers & Electrical Engineering, vol. 67, pp. 96-113, 2018. Available:

10.1016/j.compeleceng.2018.03.018 [Accessed 4 June 2019]. 2. H. Zhang and H. Shen, "EEGR: Energy-Efficient Geographic Routing inWireless Sensor Networks", 2007

International Conference on Parallel Processing (ICPP 2007), 2007. Available: 10.1109/icpp.2007.37

[Accessed 4 June 2019]. 3. R. ALASEM, A. REDA and M. MANSOUR, 2019. [Accessed 4 June 2019].

4. R. Ding and L. Yang, "A Reactive Geographic Routing Protocol for wireless sensor networks", 2010 Sixth

International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2010. Available: 10.1109/issnip.2010.5706734 [Accessed 4 June 2019].

5. J. Al-Karaki and A. Kamal, "Routing techniques in wireless sensor networks: a survey", IEEE Wireless

Communications, vol. 11, no. 6, pp. 6-28, 2004. Available: 10.1109/mwc.2004.1368893 [Accessed 4 June 2019].

6. T. Le, P. Chong, X. Li and W. Leong, "A Simple Grid-Based Localization Technique in Wireless Sensor

Networks for Forest Fire Detection", 2010 Second International Conference on Communication Software and Networks, 2010. Available: 10.1109/iccsn.2010.108 [Accessed 4 June 2019].

7. L. Kencl and J. Le Boudec, "Adaptive Load Sharing for Network Processors", IEEE/ACM Transactions on

Networking, vol. 16, no. 2, pp. 293-306, 2008. Available: 10.1109/tnet.2007.909839 [Accessed 4 June 2019].

8. J. Wang, Y. Niu, J. Cho and S. Lee, "Analysis of Energy Consumption in Direct Transmission and Multi-

hop Transmission for Wireless Sensor Networks", 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007. Available: 10.1109/sitis.2007.145 [Accessed 4 June

2019].

9. Meicheng Liu, Jie Zhang, Ming Lyu, Yuming Bo, "A novel solution for energy hole of Wireless Sensor Network", Control Conference (CCC) 2014 33rd Chinese, pp. 456-460, 2014

10. F. Aderohunmu, G. Paci, D. Brunelli, J. Deng and L. Benini, "Prolonging the lifetime of wireless sensor

networks using light-weight forecasting algorithms", 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2013. Available:

10.1109/issnip.2013.6529834 [Accessed 5 June 2019].

11. S. Paul, S. Nandi and I. Singh, "A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor network", 2008 16th IEEE International Conference on Networks, 2008. Available:

10.1109/icon.2008.4772568 [Accessed 5 June 2019].

12. S. Basagni, A. Carosi and C. Petrioli, "Controlled Vs. Uncontrolled Mobility in Wireless Sensor Networks: Some Performance Insights", 2007 IEEE 66th Vehicular Technology Conference, 2007. Available:

10.1109/vetecf.2007.70 [Accessed 5 June 2019].

13. M. Khan, W. Gansterer and G. Haring, "Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networks", Computer Communications, vol. 36, no. 9, pp. 965-978, 2013.

Available: 10.1016/j.comcom.2012.10.010 [Accessed 5 June 2019]. 14. X. Li, S. Hong and K. Fang, "Location-Based Self-Adaptive Routing Algorithm for Wireless Sensor

Networks in Home Automation", EURASIP Journal on Embedded Systems, vol. 2011, pp. 1-15, 2011.

Available: 10.1155/2011/484690 [Accessed 5 June 2019]. 15. Y. Lu and V. S. Wong, "An Energy-Efficient Multipath Routing Protocol for Wireless Sensor

Networks", IEEE Vehicular Technology Conference, 2006. Available: 10.1109/vtcf.2006.505 [Accessed 5

211-217

June 2019].

16. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for

publication),” IEEE J. Quantum Electron., submitted for publication.

34.

Authors: Obaidullah Lodin, Nitin khajuria, Satyanand Vishwakarma, Gazia Manzoor

Paper Title: Modelling and Simulation of Wind Solar Hbrid System using Matlab/Simulink

ABSTRACT—this article is a simulation, designing and modeling of a hybrid power

generation system based on nonconventional (renewable) solar photovoltaic and wind

turbine energy reliable sources. The primary premeditated system is the solar electric

generator, consisting of six models and series connected to each other, based on predicted-

P&O and connected to a MPPT controller and DC/AC converter, system is associated with

PMSG (permanent magnet synchronous generator). The main purpose of this article is to

interconnect systems to generate maximum power for single auxiliary phase loading, as well

as the solar PV generator and systems of wind turbines for simulation with execution use of

Simulink / MATLAB. The results of this simulation indicate that the hybrid power system is

planned for stability, reliability, efficiency and model. Solar PV generator and wind turbine

from the use of a renewable energy source (for maximum voltage generation).The solar

photovoltaic module executable in MATLAB / Simulink captures five parameters, series

parameters and shunt resistance is an inverse photovoltaic saturation flow and an ideal

factor.

Keywords—MPPT algorithms, irradiance, Perturb-observe, wind power etc.

References:

1. B H Khan, “Non-Conventional Energy Resources,” Tata McGraw-Hill Pub.Co., 2009. 2. Gazia Manzoor, Kamalkant Sharma, Satyanand Vishwakarma”PSO-GSA based MPPT Algortihm for

Photovoltaic Sytems”, International Journal of Recent Technology and Engineering (IJRTE), ISSN:2277-

3878, vol.7, issue-6S4, April 2019 3. .H.Renaudineau,F.Donatantonio,G.Petrone, G.Spagnuolo, J. P. Martin, S.Pierfederici, J. Fontchastagner,“A

PSO-based global MPPT technique for distributed PV power generation,” IEEE Trans. Ind. Electron., vol.

62, no. 2, pp. 1047–1058, Feb. 2015 4. Vpiasha Sharma, Harpreet Kaur, Inderpreet Kaur,”Design and Implemetation of Multi Junction PV cell for

MPPT to improve the Transformation efficiency ” International Journal of Recent Technology and

Engineering (IJRTE), ISSN:2277-3878,vol.7, issue-6S4, April 2019 5. .K. Sundareswaran, V. Vigneshkumar, P. Sankar, S. P. Simon, P. S. R. Nayak, and S. Palani,

“Development of an improved P&O algorithm assisted through a colony of foraging ants for MPPT in PV

system,” IEEE Trans. Ind. Informat., vol. 12, no. 1, pp. 187–200, Feb. 2016. 6. D. Teshome, C. H. Lee, Y. W. Lin, and K. L. Lian, “A modified firefly algorithm for photovoltaic

maximum power point tracking control under partial shading,” IEEE J. Emerg. Sel. Topics Power

Electron., vol. 5, no. 2, pp. 661–671, Jun. 2017. 7. X. Liu, P. Wang and P. C. Loh, “A Hybrid AC/DC Microgrid and Its Coordination Control,” IEEE

Transaction on smart grid, vol. 2, June 2011, pp.278 - 286.

8. .J. Ahmed and Z. Salam, “A critical evaluation on maximum power point tracking methods for partial shading in PV systems,” Renewable Sustain. Energy Rev., vol. 47, pp. 933–953, Jul. 2015.

9. Obaidullah Lodin , Inderpreet Kaur, Harpreet Kaur “Predictive- P&O Mppt Algorithm for Fast and

Reliable Tracking of Maximum Power Point in Solar Energy Systems”, International Journal of Recent Technology and Engineering (IJRTE), ISSN:2277-3878, Volume-7, Issue-6S4, April 2019

10. .A. M. Osman Haruni, Michael Negnevitsky, Md. Enamul Haque, A.Gargoom, “A Novel Operation and Control Strategy for a Standalone Hybrid Renewable Power System,” IEEE Transactions on sustainable

energy, vol. 4, no. 2, April 2013,pp.402-413.

11. .F. Paz and M. Ordonez, “Zero oscillation and irradiance slope tracking for photovoltaic MPPT,” IEEE Trans. Ind. Electron., vol. 61, no. 11, pp. 6138–6147, Nov. 2014.

12. Shefali, Harvinder Singh, Sachin Kumar, Inderpreet Kaur,” Designing and Imulation of Solar module in the

Islanded network of a solar PV microgrid”, International Journal of Recent Technology and Engineering (IJRTE), ISSN:2277-3878, Volume-7, Issue-6S4, April 2019

13. S. K. Kollimalla and M. K. Mishra, “Variable perturbation size adaptive P&O MPPT algorithm for sudden

changes in irradiance,” IEEE Trans. Sustain. Energy, vol. 5, no. 3, pp. 718–728, Jul. 2014.

218-224

Authors: Ankita Gupta, Ankit Srivastava, Rohit Anand & Paras Chawla

35.

Paper

Title:

Smart Vehicle Parking Monitoring System Using RFID

Abstrat:”With the vast growing influx of population in the developed, industrially and

technologically sound urban cities, an urgent need to make the cities smart is surmounted.

The cities are made smart utilizing data sharing, artificial intelligence, machine learning,

analytics, and thousands of RFID tags and sensors. One of the significant concerns of

today's smart cities is the growing need to manage the vehicles on-road as well as to create

sufficient and well-managed parking lots to prevent urban areas from traffic congestion.

This leads to a call for highly automated parking management system self-sufficient in

guiding the driver to an available parking space in the nearby area. In this paper, a real-time

prototype of the smart parking system (S.P system) based on Internet of Things (IoT) is

discussed. The proposed smart parking system works on an electronic device that collects

the parking availability status and assists drivers in finding and selecting the desired parking

space among the available parking spaces that effectively reduces the traffic problems and

mismanagement across the cities to a great extent.

Keywords:Smart Parking System, Parking Lot, Parking device, Internet-of-Things(IoT),

RFID Tags, Real Time Management, GUI Information Centre, Localised parking,

Centralised Parking, Smart Cities

References: 1. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15),

2787-2805.

2. Karimi, K., & Atkinson, G. (2013). What the Internet of Things (IoT) needs to become a reality. White Paper, FreeScale and ARM, 1-16.

3. Idris, M. Y. I., Leng, Y. Y., Tamil, E. M., Noor, N. M., & Razak, Z. (2009). Саг park system: a review of

smart parking system and its technology. Information Technology Journal, 8(2), 101-113. 4. Fraifer, M., & Fernström, M. (2016). Investigation of smart parking systems and their technologies. In

Thirty Seventh International Conference on Information Systems. IoT Smart City Challenges Applications

(ISCA 2016), Dublin, Ireland (pp. 1-14). 5. Kurogo, H., Takada, K., & Akiyama, H. (1995, August). Concept of a parking guidance system and its

effects in the Shinjuku area-configuration, performance, and future improvement of system. In Pacific Rim

TransTech Conference. 1995 Vehicle Navigation and Information Systems Conference Proceedings. 6th International VNIS. A Ride into the Future (pp. 67-74). IEEE.

6. Skszek, S. L. (2001). State-of-the-art report on non-traditional traffic counting methods (No. FHWA-AZ-

01-503). Arizona. Dept. of Transportation. 7. Pala, Z., & Inanc, N. (2007, September). Smart parking applications using RFID technology. In 2007 1st

Annual RFID Eurasia (pp. 1-3). IEEE.

8. Tang, V. W., Zheng, Y., & Cao, J. (2006, August). An intelligent car park management system based on wireless sensor networks. In 2006 First International Symposium on Pervasive Computing and

Applications (pp. 65-70). IEEE.

9. Lu, R., Lin, X., Zhu, H., & Shen, X. (2009, April). SPARK: A new VANET-based smart parking scheme for large parking lots. In IEEE INFOCOM 2009 (pp. 1413-1421). IEEE.

10. Reddy, P. D., Rao, A. R., & Ahmed, S. M. (2013). An Intelligent Parking Guidance and Information

System by using image processing technique. International Journal of Advanced Research in Computer and Communication Engineering, 2(10), 4044-4048.

11. Sumathi, V., Varma, N. P., & Sasank, M. (2013). Energy efficient automated car parking system. Int. J.

Eng. Technol, 5(3), 2848-2852. 17. M. Sajwan, D. Gosain and A. Sharma, "Hybrid energy-efficient multi-path routing for wireless sensor

networks", Computers & Electrical Engineering, vol. 67, pp. 96-113, 2018. Available:

10.1016/j.compeleceng.2018.03.018 [Accessed 4 June 2019]. 18. H. Zhang and H. Shen, "EEGR: Energy-Efficient Geographic Routing inWireless Sensor Networks", 2007

International Conference on Parallel Processing (ICPP 2007), 2007. Available: 10.1109/icpp.2007.37

[Accessed 4 June 2019]. 19. R. ALASEM, A. REDA and M. MANSOUR, 2019. [Accessed 4 June 2019].

20. R. Ding and L. Yang, "A Reactive Geographic Routing Protocol for wireless sensor networks", 2010 Sixth

International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2010. Available: 10.1109/issnip.2010.5706734 [Accessed 4 June 2019].

21. J. Al-Karaki and A. Kamal, "Routing techniques in wireless sensor networks: a survey", IEEE Wireless

Communications, vol. 11, no. 6, pp. 6-28, 2004. Available: 10.1109/mwc.2004.1368893 [Accessed 4 June 2019].

22. T. Le, P. Chong, X. Li and W. Leong, "A Simple Grid-Based Localization Technique in Wireless Sensor

Networks for Forest Fire Detection", 2010 Second International Conference on Communication Software and Networks, 2010. Available: 10.1109/iccsn.2010.108 [Accessed 4 June 2019].

225-229

23. L. Kencl and J. Le Boudec, "Adaptive Load Sharing for Network Processors", IEEE/ACM Transactions on

Networking, vol. 16, no. 2, pp. 293-306, 2008. Available: 10.1109/tnet.2007.909839 [Accessed 4 June

2019].

24. J. Wang, Y. Niu, J. Cho and S. Lee, "Analysis of Energy Consumption in Direct Transmission and Multi-hop Transmission for Wireless Sensor Networks", 2007 Third International IEEE Conference on Signal-

Image Technologies and Internet-Based System, 2007. Available: 10.1109/sitis.2007.145 [Accessed 4 June

2019]. 25. Meicheng Liu, Jie Zhang, Ming Lyu, Yuming Bo, "A novel solution for energy hole of Wireless Sensor

Network", Control Conference (CCC) 2014 33rd Chinese, pp. 456-460, 2014

26. F. Aderohunmu, G. Paci, D. Brunelli, J. Deng and L. Benini, "Prolonging the lifetime of wireless sensor networks using light-weight forecasting algorithms", 2013 IEEE Eighth International Conference on

Intelligent Sensors, Sensor Networks and Information Processing, 2013. Available:

10.1109/issnip.2013.6529834 [Accessed 5 June 2019]. 27. S. Paul, S. Nandi and I. Singh, "A dynamic balanced-energy sleep scheduling scheme in heterogeneous

wireless sensor network", 2008 16th IEEE International Conference on Networks, 2008. Available:

10.1109/icon.2008.4772568 [Accessed 5 June 2019]. 28. S. Basagni, A. Carosi and C. Petrioli, "Controlled Vs. Uncontrolled Mobility in Wireless Sensor Networks:

Some Performance Insights", 2007 IEEE 66th Vehicular Technology Conference, 2007. Available:

10.1109/vetecf.2007.70 [Accessed 5 June 2019].

29. M. Khan, W. Gansterer and G. Haring, "Static vs. mobile sink: The influence of basic parameters on energy

efficiency in wireless sensor networks", Computer Communications, vol. 36, no. 9, pp. 965-978, 2013.

Available: 10.1016/j.comcom.2012.10.010 [Accessed 5 June 2019]. 30. X. Li, S. Hong and K. Fang, "Location-Based Self-Adaptive Routing Algorithm for Wireless Sensor

Networks in Home Automation", EURASIP Journal on Embedded Systems, vol. 2011, pp. 1-15, 2011.

Available: 10.1155/2011/484690 [Accessed 5 June 2019]. Y. Lu and V. S. Wong, "An Energy-Efficient Multipath Routing Protocol for Wireless Sensor

Networks", IEEE Vehicular Technology Conference, 2006. Available: 10.1109/vtcf.2006.505 [Accessed 5]

Kotb, A. O., Shen, Y. C., Zhu, X., & Huang, Y. (2016). iParker—A new smart car-parking system based on dynamic resource allocation and pricing. IEEE transactions on intelligent transportation systems, 17(9),

2637-2647.

36.

Authors: Simarpreet Kaur, Dr. Mohit Srivastava, Dr. Kamaljit Singh Bhatia

Paper

Title:

Simulation and Analysis of Telescopic Photonic Beam Combiner for

Stellar Interferometry in Labview

Abstract: The optical methods are the sensitive and subtle techniques of conducting optical

investigations without any physical contact. They are both accurate and fast at the same time

which provides an ease of having multiple observations. The need of optical interferometry

has been increased at a very quick pace due to its high range of applications, from surface

testing to locating of extra-solar planets in the universe. Optical Interferometry is a process

or technique of combining light from various telescopes for calculating the angular

resolution. The technique of optical interferometry helps astronomers for achieving a high

angular resolution, that is not possible with the conventional telescopes. Optical approaches

are the best approaches for non-contact evaluations, and these are accurate and fast. Due to

optical nature of the interferometry, this process is used in various fields, and today it has

become one of the important areas of research. Integrated Optics (IO) beam combiners are

an efficient and compact technology to combine light interferometrically collected by

multiple telescopes. IO beam combiner is based on the modal filtering properties of

waveguides or fibers, and it improves thermo-mechanical stability, because of the

characteristic rigidity of IO component substrate. Other advantages of this technology are

miniaturization and non-existence of alignment needs. Several IO beam combiners are being

proposed and tested nowadays. The purpose of this paper is to investigate different

techniques used to develop interferometric instrument from previous researches and to

simulate the technique suggested by Ermann in Labview.

Keywords:Beam Combiner, Condition Number, Integrated Optics Optical Interferometry,

Stellar Interferometer, and Visibility To Pixel Matrix.

References:

1. A. Saviauk, S. Minardi, F. Dreisow, S. Nolte, and T. Pertsch, “3D-integrated Optics Component for

Astronomical Spectro-Interferometry,” in Appl. Opt. vol. 52, no. 19, 2013,4556.

2. C. Schmid, “Stellar Interferometric Beam Combiners in the Context of Linear Optics Networks,” in

230-236

37.

Authors: Pallavi Choudekar, Sanjay Sinha, Divya Asija , Ruchira, Anwar Siddique

Paper

Title:

Transmission Congestion Management and Techno Economical Analysis using

Placement of TCSC

Abstract: Congestion management is a major problem in deregulated power system.

Congestion leads to increase in transmission line loading, increases losses and reducing

transmission efficiency. It also leads to increase in congestion cost and thus affects technical

as well as economical parameters. Research work is carried out under single line critical

contingency condition. Critical contingency is found out by overall performance index

(OPI). Optimal Power Flow (OPF) is carried out and objective is to maximize social

welfare. Thyristor controlled series compensator is used to improve power flow, thus it

reduces congestion and improves techno-economical parameters. Optimal location of

Thyristor controlled series compensator (TCSC) is found out by LMP difference method.

Index Terms: Critical Contingency, Optimal Power Flow, Locational Marginal Price.

References:

1. . I. Rashed, H. I. Shaheen, X. Z. Duan, and S. J. ChengEvolutionary optimization techniques for optimal

location and parameter setting of TCSC under single line contingency. vol. 205, no. 1. Appl. Math. Comput., (2008) 133–147

2. P. Sekhar and S. Mohanty.:Power system contingency ranking using Newton Raphson load flow

method.Annual IEEE India Conference, INDICON (2013)

3. S. Nagalakshmi and N. Kamaraj.:Comparison of computational intelligence algorithms for loadability

enhancement of restructured power system with FACTS devices. vol. 5. Swarm Evol. Comput. (2012). 17–27

4. 4. A. Elmitwally and A. Eladl.: Planning of multi-type FACTS devices in restructured power systems with

wind generation. vol. 77. Int. J. Electr. Power Energy Syst. (2016).33–42

5. C. Asir Rajan C., M. Surya Kalavathi, and S. Ranganathan.: Self-adaptive firefly algorithm based multi-

objectives for multi-type FACTS placement. vol. 10. no. 11. IET Gener. Transm. Distrib. (2016). 2576–2584

6. M. Saravanan, S. M. R. Slochanal, P. Venkatesh, and J. P. S. Abraham.: Application of particle swarm

optimization technique for optimal location of FACTS devices considering cost of installation and system loadability. vol. 77. no. 3–4. Electr. Power Syst. Res. (2007) 276–283

7. F. B. Alhasawi and J. V. Milanovic.: Techno-Economic Contribution of FACTS Devices to the Operation

of Power Systems With High Level of Wind Power Integration. vol. 27, no. 3. IEEE Trans. Power Syst.

(2012). 1414–1421

8. A. Mishra and G. V. N. Kumar.: Congestion management of deregulated power systems by optimal setting

237-242

Proceedings of SPIE 9146, 2014, 914632.

3. E. Coscelli, et al., “ Analysis of the Modal Content into Large-Mode-Area Photonic Crystal Fibers under

Heat Load,” in IEEE Journal of Selected Topics in Quantum Electronics, vol. 22, no. 2, 2016, pp 323-330.

4. H. K.Hsiao and K.A.Winick, “An Integrated Infrared Optics Astronomical Beam Combiner for Stellar

Interferometry at 3-4 um,” in Optics Express, vol. 17, no. 21, 2009, pp 18489-18500.

5. J. D. Monnier, “Optical Interferometry in Astronomy,” Journal of Lightwave Technology, vol. 66, 2003, pp 789-857.

6. J. Tepper, L. Labadie, R. Diener, S. Minardi, J. Pott, R. Thomson, & S. Nolte, “Integrated Optics

Prototype Beam Combiner for Long Baseline Interferometry in the L and M bands,” in Astronomy & Astrophysics 602, 2017, p A66.

7. K. Perraut, and J.P. Berger, “Planar Integrated Optics and Astronomical Interferometer,” in Compt. Rend.

Acad. Sci. Ser. IV Phys. Astrophys, vol. 2, no. 1, 2001, pp 111-124.

8. M. Born and E. Wolf, Principles of Optics (Cambridge U. Press, 1999), Ch. 10.

9. M. Olivero and M. Svalbard, “ Direct UV Written Integrated Optical Beam Combiner for Stellar Interferometry,” in Journal of Lightwave Technology, vol. 25, no. 1, Jan. 2007, pp 367-371.

10. P. Benech and P. Kern, “On-chip Spectro-detection for Fully Integrated Coherent Beam Combiner,” in

Journal of Astrophysics, vol. 17, no. 3, 2009, pp 1976-87. 11. P. Kern and F. Malbet, “Single Mode Beam Combination for Interferometry,” in Aerospace Conference

JENAM , 2005, vol. 74, July. 2005, pp 5-6.

of Interline Power Flow Controller using Gravitational Search algorithm. vol. 118.J. Electr. Syst. Inf.

Technol. (2016).1–15.

9. J. Aghaei, M. Gitizadeh, and M. Kaji.: Placement and operation strategy of FACTS devices using optimal

continuous power flow. vol. 19. no. 6. Sci. Iran. (2012.). 1683–1690,

10. Z. Lu, M. S. Li, L. Jiang, and Q. H. Wu.: Optimal allocation of FACTS devices with multiple objectives

achieved by Bacterial Swarming Algorithm. in IEEE Power and Energy Society 2008 General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century, PES. (2008)

11. M. Gitizadeh and M. Kalantar.: Genetic algorithm-based fuzzy multi-objective approach to congestion

management using FACTS devices. vol. 90. no. 8. Electr. Eng. (Archiv fur Elektrotechnik). (2009).539–549

12. M. Basu.: Optimal power flow with FACTS devices using differential evolution..vol.30.no. 2. Int. J.

Electr. Power Energy Syst. (2008).150–156

13. E. Nanda Kumar and R. Dhanasekaran.: Optimal Power Flow with FACTS Controller Using Hybrid PSO.

vol.39. no. 4. Arab. J. Sci. Eng.. (2014), 3137–3146

14. R. Benabid, M. Boudour, and M. A. Abido.: Optimal location and setting of SVC and TCSC devices using

non-dominated sorting particle swarm optimization. vol. 79. no. 12. Electr. Power Syst. Res. (2009).1668–1677

15. Pallavi Choudekar, SK Sinha, Anwar Siddiqui: Optimal location of SVC for improvement in voltage

stability of a power system under normal and contingency condition. International Journal of System Assurance Engineering and Management.vol.8. Issue 2 (2017). 1312-1318.

38.

Authors: Shakshi Ghatwal, Himanshi Saini

Paper

Title:

Investigation on Applicability of Modulation Schemes for WDM High Speed Networks

using Hybrid Optical Amplifiers

Abstract: High speed networks face several challenges in order to meet desired Quality of

Service (QOS). In order to increase network speed with significant reduction in Bit Error

Rate (BER), new design techniques have to be deployed in high speed networks. In this

paper, basics of high speed networks along with Dense Wavelength Division Multiplexing

(DWDM) network issues and challenges have been discussed. Modulation schemes and

amplifier configurations are also summarized. Investigations on applicability of modulation

schemes for DWDM network architecture have been performed with various hybrid optical

amplifier configurations. The link configuration consists of 56 channels at speed of 15Gbps.

It is observed that Non Return to Zero (NRZ) scheme gives better performance in terms of

Quality-factor (Q-f) and BER. The network parameters are further improved using various

hybrid optical amplifier configurations. It is observed that NRZ scheme with Erbium Doped

Fiber Amplifier (EDFA) hybrid amplifier configuration has improved the quality factor of

system as compared to other hybrid amplifier configurations.

Keywords:: Amplifier, Bit Error Rate (BER), Modulation, Multiplexing, Quality-factor (Q-

f).

References:

1. Available: accessed on 1 May 2019 at 8:00 PM IST https://www.fs.com/the-advantages-and-

disadvantages-of-fiber-optic-transmission-aid-431.html

2. D. Sharma, Y. K. Prajapati, “Performance analysis of DWDM system for different modulation schemes

using variations in channel spacing”, J opt commun netw, vol. 37, no. 4, 2016, pp. 401-413

3. S. K. Gill, G. Kaur, “Performance evaluation of 32 channel DWDM system using dispersion

compensation unit at different bit rates”, International Research Journal Of Engineering And Technology,

vol. 03, no. 06, June 2016, pp. 2436-2441.

4. B.P. Patel, R. B. Patel, “Comparison of different modulation formats for 8 channel WDM optical network

at 40 GBPS datarate with non-linearity,” IJARET, vol. 5, no. 2, Feb. 2014, pp. 37-51.

5. N. V. Jaya, T. Kabilan, “Performance analysis of 48 channels dwdm system using edfa for long distance

communication,” GRD Journals, vol. 2, no. 3, Feb. 2017, pp. 39-47.

6. N. Rani, “Design and implementation of various advanced modulation format over 8-wdm bidirectional

243-248

39.

Authors: Jaspreet Kaur, Dr. Chandan Singh

Paper

Title:

Segmentation Of Brain Tissues From MRI Using Bilateral Filter Based Fuzzy C-Means

Clustering

Abstract: This paper represents a segmentation method that incorporates both local spatial

information and intensity information in an efficient fuzzy way. The newly introduced

segmentation method BWFCM is an abbreviation of Bilateral weighted fuzzy C-Means.

BWFCM uses the advantage of the bilateral filter in its objective function as a bilateral

kernel that replaced the spatial neighborhood term with Gaussian weighted Euclidean

distance mean of the intensity value of neighbor pixels. BWFCM preserves the damping

extent of adjacent pixels while removing the noise because of its averaging behavior. The

BWFCM segmentation method is perceived to be very focused on several state-of-the-art

methods on a range of images.Experiment analysis on simulated and real MR images show

that the proposed method BWFCM provides superior performance over the conventional

FCM method and several FCM based methods. The proposed method BWFCM has

weakened the impact of Rician noise and other artifact and gives more accurate and efficient

segmentation results.

Keywords: Fuzzy Clustering,Intensity information, MRI segmentation, Noise, Spatial

information.

References: 1. Brown RW, Haacke EM, Thompson MR, "Magnetic resonance imaging, physical principles, and sequence

design", John Willey Sons NY 1999. 2. V. Datta and S. Bhowmik, "A Survey on Clustering Based Image Segmentation," International Journal of

Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, no. 5, pp. 280--284, 2012.

3. Sung-Cheng Huang, Jun Yung, "Methods for evaluation of different MRI segmentation approaches", Nuclear Science Symposium, vol 3 pp. 2053-2059,1998

4. O. L. Hall, J. C. Bezdek, L. Clarke, "Review of MR image segmentation techniques using pattern recognition,"

vol. 20, pp. 1033-1048, 1993. 5. M.N. Murty, P.J, A.K. Jain, Flynn, "Data clustering: a review, ACM Comput", Surv. 31(3) (1999) 264-323

6. M.S.Yang, "A survey of fuzzy clustering,” Volume 18, Issue 11, December 1993, Pages 1-16

249-255

PON,” IJARIIT, vol. 3, no. 6, 2017, pp. 300-305

7. V. Senthamizhselvan, R. Ramachandran, R. Rajasekar, “Performance analysis of DWDM based fiber

optic communication with different modulation schemes and dispersion compensation fiber”, IJRET, vol.

03, no. 03, March 2014, pp. 287-290.

8. Y. J. Wen, J. Mo, Y. Wang, “Advanced data modulation techniques for WDM transmission”, IEEE

Commun. Mag., vol. 44, no. 8, Aug. 2006, pp. 58-65.

9. R. Mehra, V. Joshi, “Effect on Q factor of fixed bit pattern, and encoding techniques in intensity

modulated optical networks”. IJCA (0975 – 8887),vol. 106, no. 13, Nov. 2014, pp. 42-45

10. J. Singh, P. Gilawat, B. Shah, “Performance evaluation of 32×40 GBPS (1.28 TBPS) FSO link using RZ

and NRZ line codes,” IJCA (0975 – 8887), vol. 85, no 4, Jan. 2014, pp. 32-36.

11. S. Arya, D. Joseph, “A study performance of l- band optical communication system for NRZ and RZ

format,” Int J Phys Chem Math Sci, vol. 4, no. 1, 2015, pp. 9-13.

12. Payal, S. Kumar, D. Sharma, “Performance Analysis of NRZ and RZ Modulation Schemes in Optical

Fiber Link Using EDFA,” IJARCSSE, vol. 7, no. 8, Aug. 2017, pp. 161-168.

13. M. Sharma, N. Kaur, “Analysis of DWDM System Using Different Modulation and Compensation

Technique at Different Bit Rates,” International Journal of Exploring Emerging Trends in Engineering, vol. 02, no. 04, 2015, pp. 219-223.

14. A.A. Khadir, B. F. Dhahir, “Achieving optical fiber experiments using Optisystem”, IJCSMC, vol. 3, no.

6, 2014, pp. 42-53.

15. P. Jain, K. Vashist , N. Gupta, “Comparison Study of Hybrid Optical Amplifier,” IJSRET , vol. 3, no. 9,

Dec. 2014, pp. 1289-1292.

16. H. Ziqiang , L. Hongzuo , Z. Ting , “Theoretical analysis on the transient characteristics of EDFA in

optical fiber communication,” JASEI ,vol.1, no.2, 2014, pp. 83-91.

7. J. Dunn, “A fuzzy relative of the ISODATA process and its use in detecting c".

8. J. Bezdek, "Pattern Recognition with Fuzzy Objective Function Algorithms", New York: Plenum, 1981.

9. M. Ahmed, N. Mohamed, S. Yamany, A. Farag, and T. Moriarty, “A modified fuzzy C-means algorithm for

bias field estimation and segmentation of MRI data,” IEEE Trans. Med. Imag., vol. 21, pp. 193–199,2002. 10. D. Zhang and S. Chen, “Robust image segmentation using FCM with spatial constraints based on new kernel-

induced distance measure", IEEE Trans. Syst., Man, Cybern., vol. 34, pp. 1907–1916, 2004.

11. Krinidis S, Chatzis V., "A robust fuzzy local information c-means clustering algorithm", IEEE Transactions on Image Processing, 2010, 19(5): 1328-1337.

12. M. Gong, J. Ma, Z. Zhou “Change detection in synthetic aperture radar images based on image fusion and

fuzzy clustering,” IEEE Trans. Image Process, vol. 21, no. 4, pp. 2141-2151, 2012. 13. C. Tomasi and R. Manduchi, “Bilateral filtering for gray and color images,” IEEE Intl. Conf. Comp. Vis., pp.

839–846, 1998.

14. L. R. Dice, “Measures of the amount of ecologic association between species,” Ecology, vol. 26, no. 3, pp. 297–302, 1945. View at Google Scholar

15. W. R. Crum, O. Camara, and D. L. G. Hill, “Generalized overlap measures for evaluation and validation in

medical image analysis,” IEEE Transactions on Medical Imaging, vol. 25, no. 11, pp. 1451–1461, 2006. 16. R.C.Gonzalez, R.E.Woods., “Image restoration and reconstruction”, in Digital Image Processing, 3rd ed. India:

Pearson Prentice Hall, (2011), pp.no.322-330.

17. A.C. Bovik, Z.Wang, Sheikh, E.P, H.R. Simoncelli, “Image quality assessment: from error visibility to

structural similarity,” IEEE Trans. Image Processing 13(2004) 600-612.

18. R.k.-S. Kwan, A.C. Evans, G.B. Pike, MRI simulation-based evaluation of image processing and classification

methods, IEEE Trans. Med. Imaging 18 (11) (1999) 1085-97. 19. IBSR, “The Internet Brain Segmentation Repository,” 2013, http://www.nitrc.org/projects/ibsr.

40.

Authors: Shivani Gaba,Shifali Singla,Deepak Kumar

Paper

Title:

A Genetic Improved Quantum Cryptography Model to Optimize Network

Communication

Abstract— The communication becomes more critical when the network is having high

speed mobility and restricted coverage. WPAN is one such network defined for indoor

network and with smaller sensing limit. In this work, a quantum inspired encoded

communication is provided to improve the communication reliability and security. The work

model is defined for a randomly distributed and high mobility based WPAN network. At

first phase of this model, the node level characterization is applied under coverage, stability

and load parameters. Later on genetic model is applied to identify the most effective

communication pair. Finally, the quantum key based SHA is applied to perform the data

encoded. This encoded communication is performed over the network. The comparative

results shows that the work model has reduced the communication loss over the network.

Keywords:WPAN,Genetics,Quantum,Encoded,Cryptography

References: 1. S. Mandal et al., "Multi-photon implementation of three-stage quantum cryptography protocol," Information

Networking (ICOIN), 2013 International Conference on, Bangkok, 2013, pp. 6-11.

2. A. Porzio, "Quantum cryptography: Approaching communication security from a quantum perspective," Photonics Technologies, 2014 Fotonica AEIT Italian Conference on, Naples, 2014, pp. 1-4.

3. M. Niemiec and A. R. Pach, "Management of security in quantum cryptography," in IEEE Communications

Magazine, vol. 51, no. 8, pp. 36-41, August 2013. 4. Lei Zhou," A Simulation Platform for ZigBee-UMTS Hybrid Networks", IEEE COMMUNICATIONS

LETTERS 1089-7798/13@ 2013 IEEE

5. Adam Dahlstrom," Performance Analysis of Routing Protocols in Zigbee Non- Beacon Enabled WSNs", Internet of Things: RFIDs, WSNs and beyond 978-1-4673-3133-3/13 ©2013 IEEE

6. Meng-Shiuan Pan," Convergecast in ZigBee Tree-Based Wireless Sensor Networks", 2013 IEEE Wireless

Communications and Networking Conference (WCNC): NETWORKS 978-1-4673-5939-9/13 ©2013 IEEE 7. M. H. Shazly, E. S. Elmallah and J. Harms, "Location Uncertainty and Target Coverage in Wireless Sensor

Networks Deployment," 2013 IEEE International Conference on Distributed Computing in Sensor Systems,

Cambridge, MA, 2013, pp. 20-27. 8. Alexandru-Corneliu Olteanu," Enabling mobile devices for home automation using ZigBee", 2013 19th

International Conference on Control Systems and Computer Science 978-0-7695-4980-4/13 © 2013 IEEE

9. R. Rostom, B. Bakhache, H. Salami and A. Awad, "Quantum cryptography and chaos for the transmission of security keys in 802.11 networks," Mediterranean Electrotechnical Conference (MELECON), 2014 17th IEEE,

Beirut, 2014, pp. 350-356.

10. R. Khedikar and A. Kapur, "Energy effective target coverage WSNs," Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on, Ghaziabad, 2014, pp. 388-392.

11. Z. Lu and W. W. Li, "Approximation algorithms for maximum target coverage in directional sensor networks,"

Networking, Sensing and Control (ICNSC), 2014 IEEE 11th International Conference on, Miami, FL, 2014, pp. 155-160.

256-259

12. B. Diop, D. Diongue and O. Thiare, "A weight-based greedy algorithm for target coverage problem in wireless

sensor networks," Computer, Communications, and Control Technology (I4CT), 2014 International

Conference on, Langkawi, 2014, pp. 120-125.

13. A. Dahane, N. E. Berrached and A. Loukil, "Homogenous and secure weighted clustering algorithm for mobile wireless sensor networks," Control, Engineering & Information Technology (CEIT), 2015 3rd International

Conference on, Tlemcen, 2015, pp. 1-6.

14. P. Chaturvedi and A. K. Daniel, "An Energy Efficient Node Scheduling Protocol for Target Coverage in Wireless Sensor Networks," Communication Systems and Network Technologies (CSNT), 2015 Fifth

International Conference on, Gwalior, 2015, pp. 138-142.

15. X. Ren, W. Liang and W. Xu, "Quality-Aware Target Coverage in Energy Harvesting Sensor Networks," in IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1,

41.

Authors: Anupam Singh, Raghuraj Suryavanshi, Divakar Singh Yadav

Paper

Title:

Formal Development of Fault-Tolerant Majority Based Replica Control

Protocol Using Event-B

Abstract: In distributed environment, data availability and concurrency control both are

challenging issues. Data availability can be maintained by replicating data at several

locations or sites that will improve the availability but at the same time it is very challenging

task to maintain the consistency of it. In order to improve the performance of the system, it

is required to execute multiple transactions concurrently on several sites. Therefore, we need

to control these concurrent transactions for maintaining consistency of replica. Replica

control become more complex for the environment where messages are delayed due to

communication failure. In this paper, we develop formal model of fault-tolerant replica

control protocol Using Event-B. Formal methods are mathematical techniques through

which we can verify the correctness of model. Event-B is a formal method which is used to

develop the model in distributed environment.

Keywords: Formal Methods, Formal Verification, Event-B, Replication, Replica control

Protocol.

References

1. M. Ozsu and P. Valduriez: Principles of Distributed Database Systems.Pearson Education (Singapore) Pte.Ltd.

India 2004.

2. M. Singhal, N.G. Shivratri: Advanced Concepts in Operating Systems.Tata McGraw- Hill Book Company,

2012. 3. R. Suryavanshi and D.Yadav,Rigorous Design of Lazy Replication System Using Event-B, Communications in

Computer and Information Science ISSN: 1865-0929, Volume 0306, Springer, Verlag Germany 2012, pp

400-411. 4. Helal, A., Heddya, A. and Bhargava, B.: Replication Techniques in Distributed System. Kluwener Academic

Publishers (1997).

5. J. Gray, P. Helland, P. E. ONeil, and D. Shasha. The dangers of replication and a solution. In Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pages 173-182, Montreal, Canada, June 1996.

6. Kemme, B., Alonso, G.: A new approach to developing and implementing eager database replication protocols.

ACM Transaction Database System, 25(3), 2000, pp 333-379. 7. Paul Ammann, Sushil Jajodia, and Indrakshi Ray. Using formal methodsto reason about semantics-based

decompositions of transactions. InUmeshwar Dayal,Peter M. D. Gray, and Shojiro Nishio, editors, VLDB

Morgan Kaufmann, 1995, pp 218-227. 8. .D. Yadav and M. Butler. Application of Event B to global causal ordering for fault tolerant transactions. In

Proc. of Workshop on Rigorous Engineering of Fault Tolerant System, REFT05,Newcastle upon Tyne, 19

July 2005, pp 93-103. 9. Paul Ammann, Sushil Jajodia, and Indrakshi Ray. Applying formalmethods to semantic-based decomposition

of transactions. ACM Transaction on Database System., 22(2), 1997, pp 215-254.

10. Jean-Raymond Abrial and Dominique Cansell. Clickn prove: Interactiveproofs within set theory. In David A. Basin and Burkhart Wolff, editors, TPHOLs,volume 2758 of Lecture Notes in Computer Science, Springer,

2003, pp 124.

11. C Metayer, J R Abrial, and L Voison. Event-B language. RODIN deliverables ,http://rodin.cs.ncl.ac.uk/deliverables/D7.pdf, 2005.

12. M. Butler, J.-R. Abrial, and R. Banach, From Action Systems to Distributed Systems: The Renement

Approach. Tayloramp;Francis,2016, ch. Modelling and Hybrid Systems in Event-B and Rodin. 13. Michael Butler, Cli B. Jones, Alexander Romanovsky, and Elena Troubitsyna, editors. Rigorous Development

of Complex Fault-Tolerant Systems [FP6 IST-511599 RODIN project], volume 4157 of Lecture Notes in

Computer Science. Springer, 2006. 14. D. Yadav and M. Butler. Formal specifications and verification of message ordering properties in a broadcast

260-267

system using Event B. In Technical Report,School of Electronics and Computer Science, University of

Southampton, Southampton, UK, May 2007.

15. R. Suryavanshi, D. Yadav, Modeling of Multiversion ConcurrencyControl System Using Event-B in Federated

Conference on ComputeScience and Information systems (FedCSIS) 9-12 September,Poland,indexed and published by IEEE ISBN 978-83-60810-51-4, 2012, pp 1397-1401.

16. R. Banach, M. Butler, S. Qin, N. Verma, and H. Zhu,Core Hybrid Event-B I: Single Hybrid Event-B

machines, Science of Computer Programming, 2015. 17. E. Elsayed , G. El-Sharawy and E.Sharawy, Integration Of AutomaticTheorem Provers In Event-B

Patterns,International Journal of SoftwareEngineering amp; Applications (IJSEA), Vol.4, No.1, Jan. 2013.

18. D. Yadav and M. Butler. Formal specifications and verification of message ordering properties in a broadcast system using Event B. In Technical Report,School of Electronics and Computer Science, University of

Southampton, Southampton, UK, May 2007.

42.

Authors: Harsimarjeet Kaur, Parminder Singh

Paper

Title:

Text to Speech Synthesis System for Punjabi language Using Statistical Parametric

Speech Synthesis Technique

Abstract: Statistical Parametric Speech Synthesis has been most growing technique rather

than the traditional approaches that we are used to synthesizing the speech. The shortcoming

of traditional approaches will be overcome with latest statistical techniques. The main

advantages of SPSS from traditional synthesis technique are that it has more flexibility to

change the characteristics of voice and support more multiple languages i.e. multilingual,

has good coverage of acoustic space and robustness. It generates high quality of speech from

small training database. Deep Neural network and Hidden Morkov model are basic

statistical parametric speech synthesis techniques. Gaussian mixture model, sinusoidal

model are also under this categories. Features were extracted in two type spectral features

like spectral bandwidth, spectral centroid etc. and excitation features like F0 frequencies etc.

We are using 722 Punjabi phonemes. Using sound forge software we extracted the 200

wave file from 1 hour pre-recording wave file related to those phonemes. Each and every

phonemes feature was extracted and saved in database. We were extracting 28 features of

each phoneme. TTS text-to-speech system generates sounds or speech as a output when

provided the text of Punjabi language. There were already many TTS are developed on

different Indian languages. The system that we are trying to build is based only on Punjabi

language.

Keywords: SPSS, TTS, Phonemes, HMM.

References: 1. . F. Jalin and J. Jayakumari, “Text to speech synthesis system for Tamil using HMM,” in IEEE International

Conference on Circuits and Systems, ICCS 2017.

2. N. Adiga, B. K. Khonglah, and S. R. Mahadeva Prasanna, “Improved voicing decision using glottal activity features for statistical parametric speech synthesis,” Digit. Signal Process. A Rev. J., 2017.

3. E. Gerbier et al., “Deep Elman recurrent neural networks for statistical parametric speech synthesis,” Speech

Commun., 2017. 4. R. Kaur, R. K. Sharma, and P. Kumar, “Building a Text-to-Speech System For Punjabi Language,” IT-CSCP,

2016. 5. F. Araújo, J. Filho, and A. Klautau, “Genetic algorithm to estimate the parameters of Klatt and HLSyn

formant-based speech synthesizers,” BioSystems, 2016.

6. D. Mahanta, B. Sharma, P. Sarmah, S R Mahadeva Prasanna, “Text to Speech Synthesis System in Indian English” in IEEE Region 10 Conference (TENCON) — Proceedings of the International Conference, 2016.

7. D. Jurafsky and J. H. Martin, “Speech and Language Processing 18 BT - An Introduction to Natural Language

Processing, Computational Linguistics, and Speech Recognition,” in An Introdction to Natural Language Processing, Computational Lingustics, and Speech Recognition, 2009.

8. S. Lukose and S. S. Upadhya, “Text to speech synthesizer-formant synthesis,” in IEEE International

Conference on Nascent Technologies in Engineering, ICNTE 2017 - Proceedings, 2017. 9. G. Kaur and P. Singh “Formant Text To Speech Synthesis using Artificical Neural Network,” in IEEE Second

internal conference on advanced computational and communication paradigms,ICACCP2019.

268-272

Authors: Shradha Yadav, Shalley Bakshi, Manpreet Kaur

Paper Efficient routing in wireless sensor network by using water cycle algorithm to evaluating

43.

Title: the performance of density grid based clustering

Abstract: Wireless communication has an exceptional network known as a wireless

sensor network, which consists of many dedicated sensors. They have characteristics of

sensing capacity and have the capability to complete a common task. To increase the

performance of the network an energy efficient algorithm is needed which enhances the

network lifetime and make the system more energy efficient. In this paper, the density

grid based clustering is enhanced using the water cycle algorithm. The water cycle

algorithm is a nature-inspired optimization algorithm that is used to increase the

performance of the network which effects the lifetime of the network. The simulation is

done in the Matlab r2015a environment. The proposed methodology has increased the

performance of the network when compared with the existing algorithm ABC (artificial

bee colony) and its better improvement is shown in parameters like network lifetime,

computation time and cluster formed.

Keywords: WCA, WSN, optimization

Reference:

1. Baljinder Singh,"evaluating the performance of density grid based clustering using ABC technique for efficient

routing in WSNs" D.O.I:10.1109/CISS.2017.7926099,Conference:2017 ,51 annual conference on information

sciences and system(CISS) 2. Utpal Kumar Paul, Sudipta Chattopadhyay, “A Novel Grid based energy efficient Routing Algorithm for

Wireless Sensor Network”, International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE, pp 223-226, 2016.

3. Abdullah, Manal, et al. "Density Grid-Based Clustering for Wireless Sensors Networks." Procedia Computer

Science 65 (2015): 35-47. 4. Kumar Dilip "Performance analysis of energy efficient clustering protocols for maximizing lifetime of wireless

sensor networks." Wireless Sensor Systems, IET 4, No. 1, pp. 9-16, 2014.

5. Stefanos A. Nikolidakis, Dionisis Kandris, Dimitrios D. Vergados, and Christos Douligeris, (2013)“Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering,”

6. .Ji, Peng, Yupeng Li, Jingqi Jiang, and Tianbao Wang. "A Clustering Protocol for Data Aggregation in

Wireless Sensor Network." In Proceedings of the IEEE International Conference on Control Engineering and

Communication Technology, pp. 649-652, 2012.

7. Ashok Kumar and Vinod Kumar, (2011)“Energy Efficient Clustering and Cluster Head Rotation Scheme for

Wireless Sensor Networks,” (IJACSA) International Journal of Advanced Computer 8. Science and Applications, vol. 3, no. 5

9. Li, Nan, Shangru Li, and Xiaozhou Fang. "Adaptive data aggregation mechanism based on leach protocol." in

International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010), pp. 131- 134, 2010 10. Liu XiaoLong, Li RongJun, YangPing, “A Bacterial Foraging Global Optimization Algorithm Based On the

Particle Swarm Optimization”, International Conference on Intelligent Computing and Intelligent Systems,

IEEE, pp. 21-27, December 2010. 11. Xiaorong Zhu, Lianfeng Shen, and Tak-Shing Peter Yum, (2009)"Hausdorff Clustering and Minimum Energy

Routing for Wireless Sensor Networks," IEEE Transactions on Vehicular Technology, vol. 58, no. 2.

12. Gao Yi, Sun Guiling, Li Weixiang, and Pan Yong, (2009)"Recluster- LEACH: A Recluster Control Based on Density for Wireless Sensor Network," International Conference on Power Electronics and Intelligent

Transportation System.

13. Dongkyun Kim, Hong-Jong Jeong, C. K. Toh, and Sutaek Oh, (2009)"Passive Duplicate Address-Detection Schemes for On- Demand Routing Protocols in Mobile Ad Hoc Networks," IEEE Transactions on Vehicular

Technology, vol. 58, no. 7.

14. Hu Junping, Jin Yuhui, and Dou Liang, (2008)“A Time-based Cluster-Head Selection Algorithm for LEACH,”

IEEE Symposium on Computers and Communications,

15. S. J. Baek and G. de Veciana, (2007) "Spatial Energy Balancing through Proactive Multipath Routing in

Wireless Multihop Networks," IEEE ACM Transactions Networking, vol. 15, no. 1, pp. 93-104, February 16. Uk-Pyo Han, Sang-Eon Park, Seung-Nam Kim, and Young-Jun Chung, (2006)“An Enhanced Cluster Based

Routing Algorithm for Wireless Sensor Networks,” IEEE Transactions on Dependable and Secure

Computing, vol. 3, no. 1 17. O. Younis and S. Fahmy, (2004)"HEED: A Hybrid, Energy- Efficient Distributed Clustering Approach for Ad

Hoc Sensor Networks," IEEETransactions Mobile Computing, vol. 3, no. 4, pp. 366-379, December.

18. Ali Sadollah,’’ water cycle algorithm: a detail standard code DOI: 10.1016/j.softx.2016.03.0

273-279

Authors: Jaswinder Kaur, Rajesh Khanna, Nitika Mittal

Paper

Title:

Rectangular Zigzag Microstrip Patch Antenna with Swastic shape DGS for WLAN,

C and Ku-Band Applications

44.

Abstract: A triple band microstrip-fed patch antenna is presented which contains the

radiating structure having rectangular zigzag shape patch and an altered ground structure

with a swastic shape design. This modified ground plane actually acts as a defected ground

structure (DGS). Both the modified ground plane and radiating patch are perfect electric

conductors. The patch is imprinted on a substrate named as Epoxy Glass FR-4 having

thickness 1.6 mm, relative permittivity 4.4, and loss tangent 0.0024. The designed

microstrip patch antenna (MPA) is able to generate three specific operating bands viz.

11.9–13.6 GHz, 5.71–5.82 GHz, 4.5-4.6 GHz with adequate bandwidth of 1.64 GHz, 110

MHz and 100 MHz and corresponding return loss of -32dB, -23dB, -14.3dB respectively

covering Wireless Local Area Network (WLAN), C-band and Ku-band applications. A

parametric study has been performed for the rectangular slots located in the patch.

Proposed MPA is simulated using Computer Simulation Technology Microwave Studio

Version 14.0 (CST MWS V14.0). Lastly, the fabrication of the proposed antenna with

optimized parameters has been accomplished and measured results for S-parameter

magnitude have been discussed.

Keywords: CST MWS V14.0, defected ground structure, direct broadcast satellite,

microstrip patch antenna, C-band, WLAN, zigzag

Reference: 1. Balanis CA. Antenna Theory: Analysis and Design. Third Edition. Wiley Interscience. 2005.

2. Sittironnarit T, Hwang HS, Sadler RA, Hayes GJ. Wide band/dual band package antenna for 5–6 GHz WLAN application. IEEE Trans. on Antennas and Propag. 2004;52(2):610-615.

3. Li L, Cheung SW, Yuk TI. Dual band antenna with compact radiator for 2.4/5.2/5.8 GHz WLAN applications.

IEEE Trans. on Antennas and Propag. 2012;60(12):5924- 5931. 4. Huang CY, Yu EZ. A slot-monopole antenna for dual-band WLAN applications. IEEE Antennas Wirel.

Propag. Lett. 2011;10:500–502.

5. Khalegh A. Dual band meander line antenna for wireless LAN communication. IEEE Trans. on Antennas and Propag. 2007;55(3):1404–1409.

6. Kaur J. Development of Dual Band Microstrip Patch Antenna for WLAN /MIMO/ WiMAX/AMSAT/WAVE

Applications. Microw. and Opt. Tech. Lett. 2014;56(8):1965-1970.

7. Kaur J, Khanna R, Kartikeyan MV. Optimization and Development of O-Shaped Triple band Microstrip Patch

Antenna for Wireless Communication Applications. IETE Journal of Research. 2014;60(2):95-105.

8. Patel JM, Patel SK, Thakkar FN. Comparative analysis of S-shaped multiband microstrip patch antenna. Int. J of Adv. Research in Electrical, Electronics and Instrumentation Engg. 2013;2(7):3273–3280.

9. Kaur J, Khanna R, Kartikeyan MV. Novel Dual Band Microstrip Monopole Antenna with Defected Ground

Structure for WLAN /IMT/Bluetooth/WiMAX Applications. Int. J of Microw. and Wirel. Tech. 2014;6(1):93-100.

10. Chitra RJ, Jayanthi K, Nagaraja V. Design of microstrip slot antenna for WiMAX Application. IEEE Int.

Conf. on Comm. and Signal Processing (ICCSP). 2013:645 – 649. 11. Chakraborty U, Chowdhury SK, Bhatacharjee AK. Frequency tuning and miniaturization of square microstrip

antenna embedded with ‘T’-shaped defected ground structure. Microw. and Opt. Tech. Lett. 2013;55(4):869–

872. 12. Chiang KH, Tam KW. Microstrip monopole antenna with enhanced bandwidth using defected ground

structure. IEEE Antennas and Wirel. Propag. Lett. 2008;7:532–535.

13. Ali T, Pathan S, Biradar RC. Multiband, frequency reconfigurable, and metama-terial antennas design techniques: Present and future research directions. Internet Tech Lett. 2018;1:e19.

14. Ali T, Saadh MAW, Pathan S and Biradar RC. A miniaturized circularly polarized coaxial fed superstrate slot

antenna for L-band application. Internet Tech Lett. 2018;1:e21.

280-284

45.

Authors: Sapna Juneja, Abhinav Juneja, Rohit Anand and Paras Chawla

Paper

Title:

Mining aspects on the social network

Abstract: This paper proposes an effective concept of mining the feedback of product given

by the user. In return various solutions are suggested according to the ratings of the aspect

and its corresponding weightage. The satisfaction of user is determined by the help of user’s

rating and weight of the aspect determines the significance of each aspect in the user’s

review. These methodologies are thus, important and play a significant role for the

285-289

manufacturers and producers to improvise their product and eventually leading to rise in the

market value of that particular product. The methodology here extracts the aspects from the

feedbacks of users with the help of conditional probability and bootstrap technique. Also an

approach that is supervised and is called by the name, Naïve Bayes is used to classify aspect

ratings and the sentiment words are considered as properties or features.

Index Terms: Aspect, Aspect Extraction, Aspect Weight, Aspect Ratings, Core Term,

Naïve Bayes Conditional Probability.

Reference: 1. S Park, K Lee , JSong: Contrasting opposing views of news articles on contentious issues. Proceedings of the

49th annual meeting of the association for computational linguistics (ACL-2011),2011.

2. MVan Den Camp, A Bosch:The socialist network. Decis Support Syst, 2012,pp.761-69. 3. S K Li, Z Guan, LY Tang :Exploiting consumer reviews for product feature ranking. J Comput Sci

Technology, 2012, pp. 635-49.

4. C Lin, Y He, R Everson, S Ruger: Weakly supervised joint sentiment-topic detection from text,IEEE 2012,

pp.1134-45.

5. J Zhan, HT Loh, Y Liu: Gather customer concerns from online product reviews—a text summarization

approach. Expert Sysem 2009, pp.2107-15. 6. Y Dang, Y Zhang, H Chen, A lexicon-enhanced method for sentiment classification: an experiment on online

product reviews. IEEE, 2010, pp.46-53.

7. B Pang,L Lee: A sentiment education: sentiment analysis using subjectivity summarization based on minimum cuts. In: Proceedings of the,42nd annual meeting on association for Computational Linguistics.

2004. 8. M Taboada, J Brooke, M Tofiloski, KVoll, M Stede: Lexicon-based methods for sentiment analysis.,2011,

pp.267-307.

9. P D Turney:Semantic orientation applied to unsupervised classification of reviews. Proceedings of the 40th annual meeting on association for computational linguistics, 2002, pp.417–24.

10. M Hu,B Liu:Mining and summarizing customer reviews, Proceedings of the Tenth ACM SIGKDD

international conference on knowledge discovery and data mining, New York, 2004, pp. 168–77. 11. B Liu: Sentiment analysis and opinion mining. Synth Lect Human Lang Technology1–67.CrossRef, 2012.

12. C Long, J Zhang, X Zhut:A review selection approach for accurate feature rating estimation. Proceedings of

Coling ,2010. 13. S Moghaddam ,M Ester: Opinion digger: an unsupervised opinion miner from unstructured product review,

Proceeding of the ACM conference on Information and knowledge management , 2010.

14. Li Chen, Feng Wang:Preference-based clustering reviews for augmenting e-commerce recommendation. Knowledge Based System, 2013, pp.44-59.

15. H Wang, Y Lu, C Zhai: Latent aspect rating analysis on review text data: a rating regression approach,

Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, 2010, pp.783-92.

16. K Ravi:A survey on opinion mining and sentiment analysis: tasks, approaches and applications. Knowledge

Based System, 2015, pp.14-46. 17. A M Popescu, O Etzioni :Extracting product features and opinions from reviews, Proceedings of the conference

on Human Language Technology and Empirical Methods in Natural Language Processing.2005, pp. 339–46.

18. J Zhu, H Wang, B K Tsau, M Zhau:Multi-aspect opinion polling from textual reviews, Proceedings of ACM international conference on information and knowledge management,2009.

19. B Santorini: Part-of-speech tagging guidelines for the Penn Treebank Project, University of Pennsylvania,

School of Engineering and Applied Science, Dept. of Computer and Information Science, 1990. 20. Shivam Agarwal: Data Mining: Data mining concepts and techniques,International conference on machine

learning and research advancement, IEEE, 2013.

21. Xiuzhen Zhang, Shuliang Wang, Gao Cong,Alfredo Cuzzocrea:Social Big Data: Mining aspects, applications and beyond , Wiley, 2019.

46.

Authors: Haleema Sadiya, Harbinder Singh, Mamta Arora

Paper

Title:

Broad Band Propinquity Coupled Feed Line Micro-strip Blotch Antenna for 5G

Applications

Abstract— In this research based paper, as the need of capacity is increasing very

frequently so the demand of smart mobile phone and other wireless communication devices

are increasing. The only technology that would be able to fastly fulfill the increasing

communication capacity is 5G. For the establishment of communication between the

devices of wireless on the higher band of frequencies like mm wave (mili-meter) there is

much demand of such type of antennas that are lesser in size, not much expansive, compact

and also main easy to fabricate as well as simulate. So, according to all these requirements

the antennas that can fulfill all the requirements are only the patch antennas. The Micro-strip

290-296

blotch Antenna and the authentic viewpoint are shown with high gain millimeter-wave

antenna. The micro-strip blotch Antenna has high gain more prominent ground as of late.

The Antenna has a good return-loss, gain up-to 11.91dB and the directivity 12.62dB at

28GHz frequency with 6×5 micro-strip planar array configuration with Propinquity coupled

planar array Feeding method & line feed method procedure, it gives advantages over

traditional conventional Antennas and benefits for 5G applications. In this research work for

the implementation the designing and simulation work done on CST TOOL. This simulation

is basically performed for coup-led propinquity and line feed for 5G application in future

work together.

Keywords- Micro strip blotch Antenna (MPA), Return-loss, Feeding techniques etc.

References:

1. M Barrett, “Microwave Printed Circuits The Early Years”, IEEE Trans. Microwave Theory Tech., vo232, no.

19, Sept. 1987. 2, pp. 783-700.

2. H.Howe, “Microwave integrated Circuits –An Historical Prespective:, IEEE trans.. Microwave Theory Tech.,

vol. 132, no.9, Sept. 1987. 3, pp. 91-96

3. Y.B jung and H.A Diawuo “Wideband Propinquity coupled micro-strip linear array design for 5G

mobilecommunication”, Microwave Opt.Tecnol.Lettl,vol.59,no.12,2 018, pp, .996-002. 4. R .Z,W.Ling, T.Xiaobong, Z.Xinjing, “Study of micro-strip line inserted fed and two layer electromagnetically

coupled rectangular blotch Ant-ennas,” Microwave Conference Proceedings APMC, vol. 24, 2000.

5. V singh, M thakur, “Band-width Enhancement of Microstrip line inset fed Path Ant-enna,”IJERT, vol 1.3, August- 2018.

6. R. Verma, N. Vyas, R. Rana, V. Kaushik, A.K. Arya, ‘Design study of Microstrip Antenna with Various

Feeding Techniques: A Review, International Journal of Engineering Research & Technology, 3, 2014, pp. 619-622.

7. K.Mak, H.Lai and K.Luk. “A 5G Wideband Patch Ante-nna With Antisymmetric L-shaped Probe Feeds”.

IEEE Transactions on Ante-nnas and Propagation, 66(2), pp.957-961, 2018. 8. M. Sharawi, M. Ikram and A. Shamim, ”A Two Concentric Slot Loop Based Connected Array

MIMO Ante-nna System for 4G/5G Terminals”. IEEE Transactions on Ante-nnas and Propagation, 65(12),

2017, pp.6679-6686. 9. J. Ban G and J. Choi. “A SAR Reduced mm-Wave Beam-Steerable Array Ante-nna With Dual-Mode

Operation for Fully Metal-Covered 5G Cellular Handsets”. IEEE Ante-nnas and Wireless Propagation

Letters,17(6), 2018, pp.1118-1122.

10. L. Trinh, F. Ferrero, L. Lizzi,R. Staraj. and J. Ribero. “Reconfigurable Ante-nna for Future Spectrum

Reallocations in 5G communication’’ IEEE antennas and wireless Propogation Letters,15,2016, pp.1297-1300.

11. P. Dzagblete and Y. Jung, “Stacked Micro-strip Linear Array for Millimeter-Wave 5G baseband

Communication”. IEEE Antennas and Wireless Propagation Letters, 17(5), 2018, pp. 780-783,. 12. D. HA, J.Y-B. ‘Wideband proximity coupled microstrip linear array design for 5G mobile communication’

Microw Opt Technol Lett. 2017;59, pp. 2996–3002.

13. H. Abu, Y. Bae a.,(2018). broadband proximity-coupled microstrip planar antenna array for 5g cellular applications. ieee antennas and wireless propagation letters, 17(7), pp. 1286–1290.

47.

Authors: Saumya Srivastava & Tripti Sharma

Paper

Title:

Performance Improvement Strategies of Analog & Mixed Circuits

Abstract: In modern days technology becomes very advanced and it moves from analog to

digital domain. Everything depends on one and zero frame. In any case, the foundation of

any computerized circuit is constantly simple and without simple can't envision this world.

ADCs play an intermediate role between analog and digital circuits. Analog and mixed

circuits are basic piece of any gadget and there are bunches of works in analog domain for

researcher. This paper is extremely helpful for understanding the extent of analog and mixed

circuits, also give description about various smart techniques which help to improve the

performance of the device. Presently gadgets turn out to be little because of scaling and

circuits works on nano-scale process so area become comparably very small but on the

penalty of power dissipation which is important term for consideration. This paper

additionally talked about different way to deal with decrease control supply. It is thoroughly

legitimizes the way that Analog is exceptionally amazing area for researcher.

Keywords: Analog & Mixed signal, Bulk driven, Floating gate, Slew Rate, DTMOS, DC

297-301

48.

Authors: Ketan thakur, Dr. Tripti sharma

Paper

Title:

Area efficient high speed vedic multiplier

Abstract: Very large scale integration is a process of integrating hundreds of thousands of

transistors or devices into a single chip. VLSI can be categorized into two fields Frontend

and Backend. Digital VLSI design falls under the Frontend design. Multiplication is an

arithmetic operation important for the Digital Signal Processing (DSP) and for processors.

Multiplier is the main hardware block for the digital circuit. More than 70% of the

applications in a digital circuit are either addition or multiplication. As these operations

dominates most of the execution time so we need fast multipliers. The overall objective of a

good multiplier is to have high speed, low power consumption unit, less area. Vedic

multipliers are the fast multipliers and occupy less area. They are based on the Vedic

mathematics sutra "Urdhava-Triyakbhyam" . The paper contain a review of multipliers and

use of different adder structures.

302-306

gain

References:

1. B. Razavi, “Design of Analog CMOS Integrated Circuits”, 27th ed. New Delhi: McGraw Hill Education

(India) Private Limited, 2013, pp. 291-339.

2. R. Baker, “CMOS Circuit Design, Layout and simulations”, 2nd ed. New Delhi: Wiley-Blackwell (an imprint of john Wiley & Sons), 2010, pp. 773-792.

3. P. Allen and D. Holberg, “CMOS Analog Circuit Design”, 2nd ed. New Delhi: Oxford University Press, USA,

2011, pp. 72-87. 4. A. Sedra and K. smith, Microelectronics circuits, 5th ed. New Delhi: Oxford University Press, 2004, pp. 287-

297.

5. Paul R. Gray, Robert G. Mayer, “Analysis and design of analog integrated circuits”, (John Wiley and sons) 5th ed. 08-043583, 2001

6. Benjamin J. Blalock and Phillip E. Allen, “A Low-Voltage, Bulk-Driven MOSFET Current Mirror for CMOS

Technology”, IEEE 0-7803-2570-2/95 1995 7. Liang Zuo, Syed K. Islam, “Low-Voltage Bulk-Driven Operational Amplifier With Improved

Transconductance”, IEEE tran. Of circuit & system Vol-60 2012

8. Jose Maria Algueta Miguel, Antonio J. Lopez-Martin, Lucia Acosta, “Using Floating Gate and Quasi-Floating

Gate Techniques for Rail-to-Rail Tunable CMOS Transconductor Design”,IEEE trans. Of circuit & system

Vol.58 2011

9. Fariborz Assaderaghi et.al , “Dynamic Threshold-Voltage MOSFET (DTMOS) for Ultra low voltage VLSI”, IEEE trans. On electronic devices Vol.44 No.3, 1997

10. Francesco Forti and Michael E. Wright, “Measurement of MOS Current Mismatch in the Weak Inversion

Region”, IEEE Journal of solid state circuits Vol. 29, 1994. 11. Ramón González Carvajal, Jaime Ramírez-Angulo, Antonio J. López-Martín, Antonio Torralba, Juan Antonio

Gómez Galán, Alfonso Carlosena, Fernando Muñoz Chavero, “The Flipped Voltage Follower: A Useful Cell for Low-Voltage Low-Power Circuit Design” IEEE trans. On circuit & system, Vol.52, 2005.

12. Mr. D. K. Shedge1, Mr. D. A. Itole2, Mr. M. P. Gajare3, and Dr. P. W. Wani4, “Analysis and Design of CMOS

Source Followers and Super Source Follower”, ACEEE Int. J. on Control System and Instrumentation, Vol. 4, No. 2, June 2013.

13. Pradip Mandal, V. Viisvanathan, “A Self-Biased High Performance Folded Cascode CMOS Op-Amp”, IEEE

conference on VLSI design 0-8186-7755-4/96, 1996 14. Sayed Mahmoud Anisheh, Hossein Shansi, Mitra Mirhassani, “Positive feedback technique and split length

transistors for DC-gain enhancement of two stage op-amp”, IET circuits devices syst., Vol.11, Iss-6, 2017, pp.

605-612. 15. Meysam Akbari , Sadegh Biabanifard, Shahrouz Asadi, Mustapha C.E. Yagoub, “Design and analysis of DC

gain and transconductance boosted recycling folded cascode OTA”, AEU ELSEVIER, 10.1016, 2014

16. Mahdieye Pourabdollah, “A new gain-enhanced and slew-rate-enhanced folded-cascode opAmp”,Springer Science+Business Media New York 2016

17. Elad Alon, Jaeha Kim, Sudhakar Pamarti, Ken Chang, Mark Horowitz, “ Replica Compensated Linear

Regulators for Supply-Regulated Phase-Locked Loops”, IEEE Journal of solid state Vol.41 2006 18. Liang-Rui Chen, Chuan-Sheng Liu, Jin-Jia Chen, “Improving Phase-Locked Battery Charger Speed by Using

Resistance-Compensated Technique”, IEEE trans. On Industrial Electronics Vol-56, No.4 2009

19. Neha Gupta1, Sapna Singh2, Meenakshi Suthar3 and Priyanka Soni4, “LOW POWER LOW VOLTAGE BULK DRIVEN BALANCED OTA”, International Journal of VLSI design & Communication Systems

(VLSICS) Vol.2, No.4, December 2011

Keywords-VLSI, DSP, Vedic, multiplier.

References: 1. A.DHURKADAS,"Faster parallel multiplier ",1984, PROCEEDINGS OF THE IEEE, VOL. 72, NO. 1,

JANUARY 1984.

2. Honey Durga Tiwari,et.al.," Multiplier design based on ancient Indian Vedic Mathematics",2008 International SoC Design Conference.

3. Vaijyanath Kunchigi,et.al."High speed and area efficient Vedic multiplier" ,2012,IEEE conf.

4. Sushma R.Huddar and Sudhir Rao,"Novel High Speed Vedic Mathematics Multiplier",2013,IEEE conf. 5. Sandesh S. Saokar ,et..al.,"High speed Multiplier for digital signal processing ",2012,IEEE conf.

6. T. Arunachalam and S. Kirubaveni ,''Analysis of High Speed Multipliers'',International conference on

Communication and Signal Processing, April 3-5, 2013, India. 7. N.Rajasekhar and Dr.T.Shanmuganantham,"A Modified Novel Compressor based Urdhwa Tiryakbhyam

Multiplie"r,2014,ICCCI conf.

8. Sumod Abraham,et.al,"Study of Various High Speed Multipliers",2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA.

9. G.Challa Ram ,et.al.,"Area efficient modified Vedic multiplier", 2016,ICCPCT Int. conf.

10. Ms. G. R. Gokhale,et.al,"Design of Area and Delay Efficient Vedic Multiplier Using Carry Select

Adder",2015 International Conference on Information Processing (ICIP)Vishwakarma Institute of

Technology. Dec 16-19, 2015.

11. YogitaBansal,CharuMadhu,"Anovel high-speed approach for 16×16Vedic multiplication with compressor adders",Elsevier ComputersandElectricalEngineering49(2016), pp.39–49.

12. Jiangmin Gu, Chip-Hong Chang,Ultra Low voltage ,Low power 4-2 compressor for high speed

multiplications",2003,IEEE trans. 13. J.Subhajit Roy chaudhary ,et.al.,"Design simulation and testing of high speed low power 15-4 compressor for

high speed multiplication applications"2008,IEEE conf. 14. R.Abhilash ,et.al,"ASIC design of low power VLSI architecture for different multiplier algorithms using

compressors",2016,ICIIS conf.

49.

Authors: Afzal Hussain Shahid, M. P. Singh, Gunjan Kumar

Paper

Title:

Severity classification of Multiple Sclerosis disease: a rough set-based approach

Abstract: Multiple sclerosis (MS) is among the world’s most common neurologic disorder.

Severity classification of MS disease is necessary for treatment and medication dosage

decisions and to understand the disease progression. To the best of authors’ knowledge, this

is the first study for the severity classification of MS disease. In this study, Rough set (RS)

approach is applied to discern the three classes (mild, moderate, and severe) of the severity

of MS disease. Furthermore, the performance of the RS approach is compared with Machine

learning (ML) classifiers namely, random forest, K-nearest neighbour, and support vector

machine. The performance is evaluated on the dataset acquired from Multiple sclerosis

outcome assessments consortium (MSOAC), Arizona, US. The weighted average accuracy,

precision, recall, and specificity values for the RS approach are found to be 84.04%,

76.99%, 76.75%, and 83.84% respectively. However, among the ML classifiers, the

performance of random forest classifier is found best for which the weighted average

accuracy, precision, recall, and specificity values are 62.19 %, 52.65 %, 56.84 %, and 59.87

% respectively. The RS approach is found much superior to ML classifiers and may be used

for MS disease severity classification. This study may be helpful for the clinicians to assess

the severity of the MS patients and to take medication and dosage decisions.

Keywords: Multiple sclerosis, severity classification, rough sets, machine learning.

References: 1. Browne, P., et al., Atlas of multiple sclerosis 2013: a growing global problem with widespread inequity.

Neurology, 2014. 83(11): p. 1022-1024.

2. Federation, M.S.I., Atlas of MS 2013: Mapping multiple sclerosis around the world. Mult Scler Int Fed, 2013: p. 1-28.

3. Mackenzie, I., et al., Incidence and prevalence of multiple sclerosis in the UK 1990–2010: a descriptive study

in the General Practice Research Database. J Neurol Neurosurg Psychiatry, 2014. 85(1): p. 76-84. 4. Johnston Jr, R.B. and J.E. Joy, Multiple sclerosis: current status and strategies for the future. 2001: National

Academies Press. 5. Lublin, F.D., et al., Defining the clinical course of multiple sclerosis: the 2013 revisions. Neurology, 2014.

83(3): p. 278-286.

6. Whitaker, J., et al., Outcomes assessment in multiple sclerosis clinical trials: a critical analysis. Multiple

307-314

Sclerosis Journal, 1995. 1(1): p. 37-47.

7. LaRocca, N.G., et al., The MSOAC approach to developing performance outcomes to measure and monitor

multiple sclerosis disability. Multiple Sclerosis Journal, 2018. 24(11): p. 1469-1484.

8. Cohen, J.A., et al., Disability outcome measures in multiple sclerosis clinical trials: current status and future prospects. The Lancet Neurology, 2012. 11(5): p. 467-476.

9. T Jock Murray, M., Multiple sclerosis: the history of a disease. 2004: Demos medical publishing.

10. Sandroff, B.M., et al., Further validation of the Six-Spot Step Test as a measure of ambulation in multiple sclerosis. Gait & posture, 2015. 41(1): p. 222-227.

11. Hulst, H.E., A.J. Thompson, and J.J. Geurts, The measure tells the tale: Clinical outcome measures in multiple

sclerosis. 2017, SAGE Publications Sage UK: London, England. 12. Lamers, I., et al., Perceived and actual arm performance in multiple sclerosis: relationship with clinical tests

according to hand dominance. Multiple Sclerosis Journal, 2013. 19(10): p. 1341-1348.

13. Drake, A., et al., Psychometrics and normative data for the Multiple Sclerosis Functional Composite: replacing the PASAT with the Symbol Digit Modalities Test. Multiple Sclerosis Journal, 2010. 16(2): p. 228-237.

14. Rudick, R., et al., Clinical outcomes assessment in multiple sclerosis. Annals of Neurology: Official Journal of

the American Neurological Association and the Child Neurology Society, 1996. 40(3): p. 469-479. 15. Balcer, L.J., et al., Validity of low-contrast letter acuity as a visual performance outcome measure for multiple

sclerosis. Multiple Sclerosis Journal, 2017. 23(5): p. 734-747.

16. Suraj, Z., An introduction to rough set theory and its applications. ICENCO, Cairo, Egypt, 2004. 3: p. 80.

17. Inbarani, H.H., A novel neighborhood rough set based classification approach for medical diagnosis. Procedia

Computer Science, 2015. 47: p. 351-359.

18. Nyirarugira, C. and T. Kim, Stratified gesture recognition using the normalized longest common subsequence with rough sets. Signal Processing: Image Communication, 2015. 30: p. 178-189.

19. Hassanien, A.E., et al., Rough sets in medical imaging: foundations and trends, in Computational Intelligence

in Medical Imaging. 2009, Chapman and Hall/CRC. p. 61-102. 20. Wabnik, K., et al., Gene expression trends and protein features effectively complement each other in gene

function prediction. Bioinformatics, 2008. 25(3): p. 322-330.

21. Pawlak, Z., Rough sets. International journal of computer & information sciences, 1982. 11(5): p. 341-356. 22. Pawlak, Z., Rough sets: Theoretical aspects of reasoning about data. Vol. 9. 2012: Springer Science & Business

Media.

23. Zhang, Q., Q. Xie, and G. Wang, A survey on rough set theory and its applications. CAAI Transactions on Intelligence Technology, 2016. 1(4): p. 323-333.

24. Walczak, B. and D. Massart, Rough sets theory. Chemometrics and intelligent laboratory systems, 1999. 47(1):

p. 1-16. 25. Pawlak, Z., Rough set theory and its applications to data analysis. Cybernetics & Systems, 1998. 29(7): p. 661-

688.

26. Pawlak, Z., et al., Rough sets. Communications of the ACM, 1995. 38(11): p. 88-95.

27. Ross, T.J., Fuzzy logic with engineering applications. Vol. 2. 2004: Wiley Online Library.

28. Skowron, A. and C. Rauszer, The discernibility matrices and functions in information systems, in Intelligent

decision support. 1992, Springer. p. 331-362. 29. Johnson, D.S., Approximation algorithms for combinatorial problems. Journal of computer and system

sciences, 1974. 9(3): p. 256-278.

30. Vinterbo, S. and A. Øhrn, Minimal approximate hitting sets and rule templates. International Journal of approximate reasoning, 2000. 25(2): p. 123-143.

31. Goldberg, D.E. and J.H. Holland, Genetic algorithms and machine learning. Machine learning, 1988. 3(2): p.

95-99. 32. Bazan, J.G., et al., Rough set algorithms in classification problem, in Rough set methods and applications.

2000, Springer. p. 49-88.

33. Hvidsten, T.R., A tutorial-based guide to the ROSETTA system: A Rough Set Toolkit for Analysis of Data. 2010.

50.

Authors: Jasmeet Kaur, Gurpreet Singh

Paper

Title:

An Optimized Method of Module Selection During Software Development

Abstract: The field of Software Engineering comes into the existence to avoid the damage

caused by exploratory style of software development. Various steps specified during

software development leads to the successful completion of the software under

consideration. If the software is really not feasible then these steps will explain this in the

initial investigation without wasting efforts in terms of time and person months. In this

paper the focus is given on the Design and Implementation phases of the development

process. A new method has been proposed to prepare a valid sequence of execution of

modules to ease the work of implementation team. Convolution Neural Network has been

used to find the best sequence of execution based on various coupling and cohesion

parameters.

315-318

Keywords: Design, Implementation, Neural Network, Software Engineering.

References: 1. Yurinda, Software Engineeering. 2017.

2. G. Dougherty, Pattern recognition and classification: an introduction. Springer Science & Business Media,

2012. 3. A. Kumar and C. Ravikanth, “Personal authentication using finger knuckle surface,” IEEE Trans. Inf.

Forensics Secur., vol. 4, no. 1, pp. 98–110, 2009.

4. I. Guyon and A. Elisseeff, “An Introduction to Variable and Feature Selection,” J. Mach. Learn. Res., vol. 3, no. Mar., pp. 1157–1182, 2003.

5. F. Penha, E. Miranda, M. Lucena, L. Lucena, F. Alencar, and C. S. Filho, “Actor ’ s social complexity : a

proposal for managing the iStar model,” 2018. 6. E. M. Guerra, S. M. Porto, J. Choma, and M. G. Quiles, “An approach for applying Test-Driven Development (

TDD ) in the development of randomized algorithms,”

7. D. F. Brito, M. P. Barcellos, and G. Santos, “Investigating measures for applying statistical process control in software organizations,” J. Softw. Eng. Res. Dev., vol. 6, 2018.

8. G. Singh and M. Sachan, “A Framework of Online Handwritten Gurmukhi Script Recognition,” vol. 8491, pp.

52–56, 2015. 9. S. Ramteke, “Automatic Segmentation of Content and Noncontent based Handwritten Marathi Text

Document,” pp. 404–408, 2016.

10. C. L. Huang and J. F. Dun, “A distributed PSO–SVM hybrid system with feature selection and parameter optimization,” Appl. Soft Comput., vol. 8, no. 4, pp. 1381–1391, 2008.

11. D. Mateos-Garcia, J. Garcia-Gutierrez, and J. C. Riquelme-Santos, “On the evolutionary optimization of k-NN

by label-dependent feature weighting,” Pattern Recognit. Lett., vol. 33, no. 16, pp. 2232–2238, 2012. 12. A. Craig, O. Cloarec, E. Holmes, J. K. Nicholson, and J. C. Lindon, “Scaling and normalization effects in

NMR spectroscopic metabonomic data sets,” Anal. Chem., vol. 78, no. 7, pp. 2262–2267, 2006.

13. [ G. Singh and B. Singh, “Feature Based Method for Human Facial Emotion Detection using Optical Flow Based Analysis,” Int. J. Eng. Sci., vol. 4, no. 1, pp. 363–372, 2011.

14. [ “NASA DATA SET for Software Defect Prediction.” [Online]. Available:

http://promise.site.uottawa.ca/SERepository/datasets-page.html. [Accessed: 07-Mar-2019]. 15. M. J. Lyons, “Automatic classification of single facial images,” IEEE Trans. Pattern Anal. Mach. Intell., vol.

21, no. 12, pp. 1357–1362, 1999.

16. G. Singh and M. K. Sachan, “Data capturing process for online Gurmukhi script recognition system,” in IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015, pp. 518–

521.

17. G. Singh and M. Sachan, “Multi-layer perceptron (MLP) neural network technique for offline handwritten Gurmukhi character recognition,” in 2014 IEEE International Conference on Computational Intelligence and

Computing Research, IEEE ICCIC 2014, 2015.

51.

Authors: Satwinder Kaur, Garima Joshi, Renu Vig

Paper

Title:

Plant Disease Classification Using Deep Learning GoogleNet Model

Abstract: Plant diseases have been a major crisis that is disturbing the food production. So

there is a need to provide proper procedures for plant disease detection at its growing age

and also during harvesting stage. Timely disease detection can help the user to respond

instantly and sketch for some defensive actions. This detection can be carried out without

human intervention by using plant leaf images. Deep learning is progressively best for

image detection and classification. In this effort, a deep learning based GoogleNet

architecture is used for plant diseases detection. The model is trained using public database

of 54,306 images of 14 crop varieties and their respective diseases. It achieves 97.82%

accuracy for 14 crop types making it capable of further deployment in a crop detection and

protection application.

Keywords: Deep learning, GoogleNet, Plant disease detection

References: 1. Yang, Xin, and Tingwei Guo. "Machine learning in plant disease research." European Journal of Biomedical

Research 3, no. 1 6-9.2017.

2. Mohanty, Sharada P., David P. Hughes, and Marcel Salathé. "Using deep learning for image-based plant disease detection." Frontiers in plant science 7:1419.2017.

3. Hughes, David, and Marcel Salathé. "An open access repository of images on plant health to enable the

development of mobile disease diagnostics." arXiv preprint arXiv: 1511.08060 2015.

4. Slodojevic, Srdjan, Marko Arsenovic, Andras Anderla, Dubravko Culibrk, and Darko Stefanovic. "Deep

neural networks based recognition of plant diseases by leaf image classification." Computational intelligence

and neuroscience 2016. 5. Rehman, Tanzeel U., Md Sultan Mahmud, Young K. Chang, Jian Jin, and Jaemyung Shin. "Current and future

applications of statistical machine learning algorithms for agricultural machine vision systems." Computers

and Electronics in Agriculture 156: 585-605. 2019. 6. Zhang, Shanwen, Haoxiang Wang, Wenzhun Huang, and Zhuhong You. "Plant diseased leaf segmentation and

recognition by fusion of superpixel, K-means and PHOG." Optik 157: 866-872.2018.

7. Nagasubramanian, Koushik, Sarah Jones, Asheesh K. Singh, Arti Singh, Baskar Ganapathysubramanian, and Soumik Sarkar. "Explaining hyperspectral imaging based plant disease identification: 3D CNN and saliency

maps." arXiv preprint arXiv: 1804.08831 2018.

8. Johannes, Alexander, Artzai Picon, Aitor Alvarez-Gila, Jone Echazarra, Sergio Rodriguez-Vaamonde, Ana Díez Navajas, and Amaia Ortiz-Barredo. "Automatic plant disease diagnosis using mobile capture devices,

applied on a wheat use case." Computers and electronics in agriculture 138: 200-209.2017.

9. Ferentinos, Konstantinos P. "Deep learning models for plant disease detection and diagnosis." Computers and Electronics in Agriculture 145 : 311-318. 2018

10. Iqbal, Zahid, Muhammad Attique Khan, Muhammad Sharif, Jamal Hussain Shah, Muhammad Habib ur

Rehman, and Kashif Javed. "An automated detection and classification of citrus plant diseases using image

processing techniques: A review." Computers and electronics in agriculture 153: 12-32.2018.

11. Chaudhary, Piyush, Anand K. Chaudhari, A. N. Cheeran, and Sharda Godara. "Color transform based

approach for disease spot detection on plant leaf." International Journal of Computer Science and Telecommunications 3, no. 6: 65-70.2012.

12. Patil, Jayamala Kumar, and Raj Kumar. "Analysis of content based image retrieval for plant leaf diseases using

color, shape and texture features." Engineering in agriculture, environment and food 10, no. 2: 69-78.2017. 13. Sardogan, Melike, Adem Tuncer, and Yunus Ozen. "Plant Leaf Disease Detection and Classification Based on

CNN with LVQ Algorithm." In 2018 3rd International Conference on Computer Science and Engineering

(UBMK), pp. 382-385. IEEE, 2018. 14. Too, Edna Chebet, Li Yujian, Sam Njuki, and Liu Yingchun. "A comparative study of fine-tuning deep

learning models for plant disease identification." Computers and Electronics in Agriculture 2018.

15. Barbedo, Jayme Garcia Arnal. "Impact of dataset size and variety on the effectiveness of deep learning and transfer learning for plant disease classification." Computers and electronics in agriculture 153: 46-53.2018.

16. Szegedy, Christian, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan,

Vincent Vanhoucke, and Andrew Rabinovich. "Going deeper with convolutions." In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1-9. 2015.

17. Erhan, Dumitru, Christian Szegedy, Alexander Toshev, and Dragomir Anguelov. "Scalable object detection

using deep neural networks." In Proceedings of the IEEE conference on computer vision and pattern

recognition, pp. 2147-2154. 2014.

319-322

52.

Authors: Ashima Kalra, Shakti Kumar, Sukhbir Singh Walia

Paper

Title:

ANN Model Identification: Parallel Big Bang Big Crunch Algorithm

Abstract: This paper proposes a modification to existing big bang big crunch optimization

algorithm that uses the concept of more than one population. In this the search begins with

all the populations independently in parallel and as the algorithm proceeds the local best of

the individual populations interact with global best to avoid local minima. In order to

validate the proposed approach the authors have identified two models one from control

field namely rapid battery charger and second a rating system for institutes of higher

learning and compared its results with simple BB-BC based approach. The author further

compared results of the proposed approach with the results of other recent soft computing

based algorithms for ANN model identification. The proposed algorithm outperformed all of

the other 7 algorithms in terms of MSE and convergence time.

Keywords: model identification, ANN (artificial neural network), big bang big crunch

(BB-BC) optimization, parallel big bang big crunch (PBB-BC) optimization Levenberg-

Marquardt algorithm (LM), error back propagation (EBP), Resilent prop (RPROP), particle

swarm optimization (PSO), ant colony optimization(ACO) and artificial bee colony(ABC) .

References:

1. Bishop Chris M., (1994) Neural Networks and their applications, Review of Scientific Instruments, Vol. 65,

No. 6, pp. 1803-1832. 2. Martin T. Hagan, Howard B. Demuth, Mark H. Beale, Neural Network Design, ISBN:0-9717321-0-8.

3. Soroush A.R., Kamal-Abadi, NakhaiBahreininejad A, 2009 “Review on Applications of Artificial neural

networks in supply chain management”, World Applied Sciences Journal 6 (supplement 1), pp. 12-18. 4. Yaochu Jin, Jingping Jiang, Jing Zhu, June 1995, “Neural Network Based Fuzzy Identification and Its

Applications to Control of Complex systems”, IEEE Transactions on Systems, Man and Cybernetics, Vol, 25,

No. 6, pp. 990-997. 5. Shakti Kumar, Nitika Ohri, Savita Wadhvan 2004 a, “ANN based design of rapid battery charger”, Trends Of

Computational Techniques In Engineering Oct 15-16, SLIET, Longowal Punjab pp 129-132.

6. Khosla, A., Kumar, S. and Aggarwal,K. K. (2002). Design and development of RFC-10: A fuzzy logic based

rapid battery charger for Ni-Cd batteries. HiPC (High Performance Computing). Workshop on Soft

Computing, Bangalore, pp. 9-14.

7. Khosla, A., Kumar, S. and Aggarwal,K. K. (2003 b). Fuzzy controller for rapid Nickel-Cadmium batteries charger through adaptive neuro-fuzzy inference system (ANFIS) architecture. Proceedings of 22nd

International Conference of the North American Fuzzy Information Processing Society, Chicago, Illinois, USA, July 24–26, pp. 540–544.

8. Shakti Kumar, Savita Wadhawan and Neetika Ohri 2004 b, “ANDEng: An Artificial Neural Network Design

Automation Tool”. National Conference on Intelligent Systems and Networks, ISN-2004, Feb27-28, , Haryana Engineering College Jagadhri, Haryana, pp 26-29

9. Gallant, S. (1988). Connectionist expert systems. Comm. ACM. 31(2) : 152-169 .

10. Ishikawa, M., 1996, “Structural learning with forgetting,” Neural Networks, vol. 9, pp. 509–521. 11. Duch, W., R. Adamczak, and K. Grabczewski, (1998), “Extraction of logical rules from neural networks,”

Neural Process. Lett., vol. 7, pp. 211–219.

12. Ishibuchi, H. et al., (1993), “Neural Networks that learn from Fuzzy if then rules,” IEEE Trans. on Fuzzy Systems, Vol.1, pp.85-97.

13. Towell, G.G., J. W. Shavlik, 1993, “Extracting refined rules from knowledge-based neural networks,”

Machine learning, vol. 13, no.1, pp. 71-101. 14. Setiono, R., 1997, “Extracting rules from neural networks by pruning and hidden-unit splitting,” Neural

Computat., vol. 9, pp. 205–225.

15. Setiono, R., 2000, “Extracting M of N rules from trained neural networks,” IEEE Trans. Neural Networks. 16. Ashwani K., D.P. Agrawal and S.D. Joshi (2003). A GA-based method for constructing TSK fuzzy rules from

numerical data IEEE Int’l Conf. on Fuzzy Systems, pp.131-136.

17. Eghbal G. Mansoori, M.J. Zolghadri and S.D. Katebi, (2008) “SGERD: A steady-state genetic algorithm for extracting fuzzy classification rules from data,” IEEE Transactions on Fuzzy Systems, Vol.16, No.4, pp.

1061-1071.

18. Pal, T., and Nikhil, R. P. 2003. SOGARG: A self organized genetic algorithm based rule generation scheme for fuzzy controllers. IEEE Transactions on Evolutionary Computation. vol. 7. no. 4.

19. Eghbal G. Mansoori, M.J. Zolghadri and S.D. Katebi, Aug. 2008 “SGERD: A steady-state genetic algorithm

for extracting fuzzy classification rules from data,” IEEE Transactions on Fuzzy Systems, Vol.16, No.4, pp. 1061-1071.

20. Shakti Kumar, Parvinder Bhalla, AP Singh, July 2009, “Fuzzy rule generation from numerical data using

biography based optimization. Journal of Institutions of Engineers (India), IE(I) Journal–ET, Volume 90, pp. 8-13. .

323-330

53

Authors: Shally Nagpal, Suneet Kumar, Suresh Chand Gupta

Paper Title: A New Approach for Modifying Blowfish Algorithm for IoT

Abstract: Due to rapid development of internet and web applications, the prominence and

the importance of the information exchange using the internet is growing. Communication

through internet faces data safety as an important issue. Data has to be safe when

communicating as slightly loss or danger to transmitted data can be responsible for

excessive harm to the society. For network safety encryption plays a vibrant part. Many

times it is little bit confusing to choose best encryption, as there are many cryptography

methods for securing the data during transmission. For many applications Blowfish is

currently assumed to be insecure. So it turns out to be essential to enhance this procedure

through addition of different levels of safety so that it can be used in several reliable

communication channels. Blowfish algorithm is modified in a way that it is platform

independent; however the present encryption schemes are restricted to platform dependent

proposal. This proposed modified blowfish algorithm supports text, images and media files.

Keywords: Network Security, Symmetric Block Cipher, Cell Automata, Internet of Things,

Entropy.

References:

1. Afaf M. Ali Al-Neaimi, Rehab F. Hassan, ”New Approach for Modifying Blowfish Algorithm by Using

Multiple Keys”, International Journal of Computer Science and Network Security, VOL.11 No.3, March

2011, pp.21-26. 2. .M. Anand Kumar and Dr.S.Karthikeyan, ”Investigating the Efficiency of Blowfish and Rejindael (AES)

Algorithms”, I. J. Computer Network and Information Security, 2012, 2, pp.22-2.

3. SWETA K. PARMAR, K.C. DAVE, ”IMPLEMENTATION OF DATA ENCRYPTION AND DECRYPTION ALGORITHM FOR INFORMATION SECURITY”, International Journal of Advances in

Science Engineering and Technology, Volume- 1, Issue- 2, Oct-2013,pp.7-10.

4. Christina L , Joe Irudayaraj V S, ”Optimized Blowfish Encryption Technique”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 7, July 2014, pp.5009-5015.

5. .Manju Suresh , Neema M, ”Hardware implementation of blowfish algorithm for the secure data transmission

in Internet of Things”, Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology, 2016 ,pp.248 – 255.

6. Avinash M Ghorpade, HarshavardhanTalwar, ”The Blowfish Algorithm Simplified”, International Journal of

Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 4, April 2016, pp.3343-3351.

331-334

21. Simon D. December 2008, “Biogeography-Based Optimization,” IEEE

Transactions on Evolutionary Computation, vol. 12, no. 6, pp. 702-713.

22. Simon, D., Ergezer, M. and Du, D. 2009. Population distributions in biogeography-based optimization

algorithms with elitism. Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, TX, USA, pp. 991–996.

23. Simon, D., Ergezer, M., Du,D. and Rarick, R. 2011. Markov models for biogeography–based optimization.

IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics.41 (1): 299– 306. 24. Carmona, P. and J. L. Castro, 2005, “Using ant colony optimization for learning maximal structure fuzzy

rules,” Proc. IEEE Int. Conf. Fuzzy Systems, pp.999-999.

25. Chia-Feng J., H.J. Huang and C.M. Lu, 2007, “Fuzzy controller design by ant colony optimization,” IEEE Proc. on Fuzzy Systems.

26. Dorigo M and L.M. Gambardella (1997), Ant colony system: a cooperative learning approach to the traveling

salesman problem, IEEE Transaction on Evolutionary Computation 1, pp. 53-66. 27. Dorigo, M., Maniezzo, V. and Colorni, A. 1996. The Ant System: Optimization by a colony of cooperating

agents. IEEE Transactions on Systems, Man, and Cybernetics–Part B. 26(1) : 1-13.

28. Chen, C.C. 2006. Design of PSO-based fuzzy classification systems.,Tamkang journal of science and engineering, vol. 9, no.1, 63-70.Khosla, A., Kumar, S. and Aggarwal, K. K. 2005. A framework for

identification of fuzzy models through particle swarm optimization algorithm. In Proceedings of IEEE

Indicon 2005 Conference, Chennai, India, 11-13 (Dec. 2005), 388-391.

29. He Z., Wei C., Yang L., Gao X., Yao S., Eberhart R. C., Shi Y., 1998, "Extracting Rules from Fuzzy Neural

Network by Particle Swarm Optimization", IEEE International Conference on Evolutionary Computation,

Anchorage, Alaska, USA. 30. Khosla, A., Kumar, S. and Aggarwal,K. K. 2005. A framework for identification of fuzzy models through

particle swarm optimization algorithm. IEEE Indicon 2005 Conference, Chennai, India, Dec. 11-13. pp. 388-

391.

7. WenlongShen, Bo Yin, Yu Cheng, Xianghui Cao and Qing Li,” Privacy-Preserving Mobile Crowd Sensing

for Big Data Applications”, IEEE ICC ,2017,pp.1-6.

8. G. Manikandan, N. Sairam and M. Kamarasan, ”A New Approach for Improving Data Security using Iterative

Blowfish Algorithm”, Research Journal of Applied Sciences, Engineering And Technology 4(6): pp. 603-607, 2012.

54.

Authors: Arvind Kumar, Nidhi Garg, Gurpreet Kaur

Paper Title: An Emotion Recognition Based on Physiological Signals

Abstract: Emotion recognition is alluring considerable interest among the researchers.

Emotions are discovered by facial, speech, gesture, posture and physiological signals.

Physiological signals are a plausible mechanism to recognize emotion using human-computer

interaction. The objective of this paper is to put forth the recognition of emotions using

physiological signals. Various emotion elicitation protocols, feature extraction techniques,

classification methods that aim at recognizing emotions from physiological signals are

discussed here. Wrist Pulse Signal is also discussed to fill the lacunae of the other

physiological signal for emotion detection. Working on basic as well as non-basic human

emotion and human-computer interface will make the system robust.

Keywords: Ayurveda, Emotion recognition system, Emotion elicitation protocols,

Physiological signals, Wrist Pulse Signal

References:

1. L. Bernardi et al., “Effects of controlled breathing, mental activity and mental stress with or without

verbalization on heart rate variability,” J. Am. Coll. Cardiol., vol. 35, no. 6, pp. 1462–1469, 2000. 2. H. Kim, K. Lee, and D. Kwon, “Emotional interaction model for a service robot,” 2005 IEEE Int. Work. Robot.

Hum. Interact. Commun., pp. 672–678, 2005.

3. C. Zong and M. Chetouani, “Hilbert-Huang transform based physiological signals analysis for emotion recognition,” 2009 IEEE Int. Symp. Signal Process. Inf. Technol., pp. 334–339, 2009.

4. N. H. Frijda, “The Laws of Emotion,” in American Psychologist, 1988, vol. 43, no. 5, pp. 349–358. 5. R. W. Picard, E. Vyzas, and J. Healey, “Toward machine emotional intelligence: analysis of

affective\nphysiological state,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no. 10, pp. 1175–1191, 2001.

6. R. W. Picard, “Affective computing: Challenges,” Int. J. Hum. Comput. Stud., vol. 59, no. 1–2, pp. 55–64, 2003.

7. C. He, Y. Yao, and X. Ye, “Wearable Sensors and Robots,” vol. 399, 2017.

8. J. Kim and E. André, “Emotion recognition based on physiological changes in music listening,” IEEE Trans.

Pattern Anal. Mach. Intell., vol. 30, no. 12, pp. 2067–2083, 2008. 9. A. De and A. Saha, “A comparative study on different approaches of real time human emotion recognition based

on facial expression detection,” 2015 Int. Conf. Adv. Comput. Eng. Appl., pp. 483–487, 2015.

10. A. B. Ingale and D. S. Chaudhari, “Speech Emotion Recognition,” no. 1, pp. 235–238, 2012. 11. O. E. Korkmaz and A. Atasoy, “Emotion Recognition from Speech Signal Using Mel-Frequency Cepstral

Coefficients,” pp. 1254–1257.

12. S. Jerritta, M. Murugappan, K. Wan, and S. Yaacob, “Electrocardiogram-based emotion recognition system using empirical mode decomposition and discrete Fourier transform,” Expert Syst., vol. 31, no. 2, pp. 110–120,

2014.

13. S. Jerritta, M. Murugappan, K. Wan, and S. Yaacob, “Emotion recognition from facial EMG signals using higher order statistics and principal component analysis,” J. Chinese Inst. Eng., vol. 37, no. 3, pp. 385–394,

2014.

14. Q. Li, Z. Yang, S. Liu, Z. Dai, and Y. Liu, “The Study of Emotion Recognition from Physiological Signals,” Seventh Int. Conf. Adv. Comput. Intell., pp. 378–382, 2015.

15. E. H. Jang, B. J. Park, M. S. Park, S. H. Kim, and J. H. Sohn, “Analysis of physiological signals for recognition

of boredom, pain, and surprise emotions,” J. Physiol. Anthropol., vol. 34, no. 1, pp. 1–12, 2015.

16. H. Jerath and N. Garg, “Exploring Human Emotions Recognition Through Physiological Signals,” vol. 10, no.

22, pp. 57–62, 2017.

17. Y. L. Hsu, J. S. Wang, W. C. Chiang, and C. H. Hung, “Automatic ECG-Based Emotion Recognition in Music Listening,” IEEE Trans. Affect. Comput., pp. 1–16, 2017.

18. J. Selvaraj, M. Murugappan, K. Wan, and S. Yaacob, “Classification of emotional states from electrocardiogram

signals: A non-linear approach based on hurst,” Biomed. Eng. Online, vol. 12, no. 1, p. 1, 2013. 19. K. N. Minhad, S. H. M. Ali, and M. B. I. Reaz, “Happy-anger emotions classifications from electrocardiogram

signal for automobile driving safety and awareness,” J. Transp. Heal., vol. 7, no. November, pp. 75–89, 2017.

20. R. Ranjan, S. Conjeti, and R. Banerjee, “Biomedical Signal Processing and Control A comparative evaluation of neural network classifiers for stress level analysis of automotive drivers using physiological signals,” Biomed.

Signal Process. Control, vol. 8, no. 6, pp. 740–754, 2013.

21. D. Wang, D. Zhang, and G. Lu, “A robust signal preprocessing framework for wrist pulse analysis,” Biomed. Signal Process. Control, vol. 23, pp. 62–75, 2016.

22. F. Agrafioti, D. Hatzinakos, and A. K. Anderson, “ECG pattern analysis for emotion detection,” IEEE Trans.

335-341

Affect. Comput., vol. 3, no. 1, pp. 102–115, 2012.

23. P. Ekman, R. W. Levenson, and W. V Friesen, “Autonomic nervous system activity distinguishes among

emotions.,” Science, vol. 221, no. 4616, pp. 1208–1210, 1983.

24. D. Rangaprakash and D. Narayana Dutt, “Study of wrist pulse signals using time domain spatial features,” Comput. Electr. Eng., vol. 45, pp. 100–107, 2015.

25. . K. Goyal and R. Agarwal, “Pulse based sensor design for wrist pulse signal analysis and health diagnosis .,”

vol. 28, no. 12, pp. 5187–5195, 2017. 26. . M. S. Begum, “DIAGNOSING DISEASES THROUGH,” pp. 140–143, 2012.

27. . R. Kaur, “Role of Pulse Diagnosis : A Review,” pp. 152–155, 2015.

28. . B. Srinivasulu, “International Journal of Ayurveda and Pharma Research CLINICAL ASSESSMENT OF HYPOTHYROID SYMPTOMS IN DIFFERENT TYPES OF,” vol. 1, no. 2, pp. 17–23, 2013.

29. P. J. Mills et al., “Journal of Ayurveda and Integrative Medicine Relationships among classi fi cations of

ayurvedic medicine diagnostics for imbalances ( vikruti ) and western measures of psychological states : An exploratory study,” J. Ayurveda Integr. Med., pp. 1–5, 2018.

30. Y. F. Chung, C. S. Hu, C. C. Yeh, and C. H. Luo, “How to standardize the pulse-taking method of traditional

Chinese medicine pulse diagnosis,” Comput. Biol. Med., vol. 43, no. 4, pp. 342–349, 2013. 31. C. Maaoui and a Pruski, “Emotion recognition through physiological signals for human-machine

communication,” Cut. Edge Robot., no. September 2010, pp. 317–333, 2010.

32. K. Gouizi, C. Maaoui, and F. Bereksi Reguig, “Negative emotion detection using EMG signal,” Control. Decis.

Inf. Technol. (CoDIT), 2014 Int. Conf., pp. 690–695, 2014.

33. . A. Goshvarpour, A. Abbasi, and A. Goshvarpour, “Do men and women have different ECG responses to sad

pictures?,” Biomed. Signal Process. Control, vol. 38, pp. 67–73, 2017. 34. Y. Yaslan and C. E. Faculty, “Emotion Recognition via Random Forest and Galvanic Skin Response :

Comparison of Time Based Feature Sets , Window Sizes and Wavelet Approaches,” pp. 16–19, 2016.

35. S. Katsigiannis and N. Ramzan, “DREAMER: A Database for Emotion Recognition Through EEG and ECG Signals from Wireless Low-cost Off-the-Shelf Devices,” IEEE J. Biomed. Heal. Informatics, vol. 22, no. 1, pp.

98–107, 2018.

36. B. Thakker and A. Vyas, “Outlier pulse detection and feature extraction for wrist pulse analysis,” World Acad. Sci. Eng. Technol., vol. 3, no. 011, pp. 173–176, 2009.

37. N. Garg, A. Bisht, H. S. Ryait, and A. Kumar, “Identification of motion outliers in wrist pulse signal,” Comput.

Electr. Eng., vol. 0, pp. 1–15, 2018. 38. 38. Z. Zhang, Y. Zhang, L. Yao, H. Song, and A. Kos, “A sensor-based wrist pulse signal processing and lung

cancer recognition,” J. Biomed. Inform., vol. 79, no. May 2017, pp. 107–116, 2018.

39. W. Zuo, P. Wang, and D. Zhang, “Comparison of three different types of wrist pulse signals by their physical meanings and diagnosis performance,” IEEE J. Biomed. Heal. Informatics, vol. 20, no. 1, pp. 119–127, 2016.

40. N. Garg, H. S. Ryait, A. Kumar, and A. Bisht, “An effective method to identify various factors for denoising

wrist pulse signal using wavelet denoising algorithm,” vol. 29, pp. 53–65, 2018.

41. A. Haag, S. Goronzy, P. Schaich, and J. Williams, “Emotion Recognition Using Bio-sensors: First Steps

towards an Automatic System,” pp. 36–48, 2004.

42. T. Chen, S. Ju, X. Yuan, M. Elhoseny, and F. Ren, “Emotion recognition using empirical mode decomposition and approximation entropy R,” Comput. Electr. Eng., vol. 72, pp. 383–392, 2018.

43. N. Zhuang, Y. Zeng, L. Tong, C. Zhang, H. Zhang, and B. Yan, “Emotion Recognition from EEG Signals Using

Multidimensional Information in EMD Domain,” vol. 2017, 2017. 44. D.-Y. Zhang, W.-M. Zuo, D. Zhang, H.-Z. Zhang, and N.-M. Li, “Wrist blood flow signal-based computerized

pulse diagnosis using spatial and spectrum features,” J. Biomed. Sci. Eng., vol. 03, no. 04, pp. 361–366, 2010.

45. . X. Guo,“Study of emotion recognition based on electrocardiogram and RBF neural network,” Procedia Eng., vol. 15, pp. 2408–2412, 2011.

46. Y. Xu, G. Liu, M. Hao, W. Wen, and X. Huang, “Analysis of affective ECG signals toward emotion

recognition,” J. Electron., vol. 27, no. 1, pp. 8–14, 2010. 47. M. Jain and S. Saini, “A Hybrid Approach to Emotion Recognition System Using Multi-Discriminant Analysis

& K-Nearest Neighbour,” 2017, pp. 2251–2256. 48. I. Branch, P. Sciences, W. Island, S. Spring, N. Surface, and C. Division, “The empirical mode decomposition

and the Hilbert spectrum for nonlinear and non-stationary time series analysis,” 1998.

49. A. Albraikan, D. P. Tobon, and A. El Saddik, “Toward User-Independent Emotion Recognition using Physiological Signals,” IEEE Sens. J., vol. PP, no. c, pp. 1–1, 2018.

50. G. K., “Pulse based sensor design for wrist pulse signal analysis and health diagnosis,” Biomed. Res., vol. 28,

no. 12, pp. 5187–5195, 2017.

51. X. Liu et al., “Human emotion classification based on multiple physiological signals by wearable system,”

Technol. Heal. Care, vol. 26, no. S1, pp. S459–S469, 2018.

Authors: Deepti Aggarwal, Dr. Vikram Bali, Dr.Sonu Mittal

Paper Title: An Insight IntoMachine Learning Techniquesfor Predictive Analysis And Feature

Selection

55.

Abstract - Predictive analysis comprises a vast variety of statistical techniques like “machine

learning”, “predictive modelling” and “data mining” and uses current and historical statistics

to predict future outcomes. It is used in both business and educational domain with equal

applicability.This paper aims to give an overview of the top work done so far in this field. We

have briefed on classical as well as latest approaches (using“machine learning”) in predictive

analysis. Main aspects like feature selection and algorithm selection along with corresponding

application is explained. Some of the most quoted papers in this field along with their

objectives are listed in a table. This paper can give a good heads up to whoever wants to know

and use predictive analysis for his academic or business application.

Keywords:Classification, Clustering, Feature Selection, Machine Learning, Predictive

Analysis,Regression

References:

1. Jie Cai, Jiawei Luo, Shulin Wang, Sheng Yang, “Feature selection in machine learning: A new perspective”,

Neurocomputing, Volume 300, 2018, Pages 70-79, ISSN 0925-2312, https://doi.org/10.1016/j.neucom.2017.11.077

2. Concepción Burgos, María L. Campanario, David de la Peña, Juan A. Lara, David Lizcano, María A. Martínez,

“Data mining for modeling students’ performance: A tutoring action plan to prevent academic dropout”, Computers & Electrical Engineering, Volume 66, 2018, Pages 541-556, ISSN 0045-7906,

https://doi.org/10.1016/j.compeleceng.2017.03.005.

3. Ajmer Singh, Rajesh Bhatia, Anita Singhrova, “Taxonomy of machine learning algorithms in software fault prediction using object oriented metrics”, Procedia Computer Science, Volume 132, 2018, Pages 993-1001,

ISSN 1877-0509, https://doi.org/10.1016/j.procs.2018.05.115.

4. Arno De Caigny, Kristof Coussement, Koen W. De Bock, “A new hybrid classification algorithm for customer churn prediction based on logistic regression and decision trees”, European Journal of Operational Research,

Volume 269, Issue 2, 2018, Pages 760-772, ISSN 0377-2217, https://doi.org/10.1016/j.ejor.2018.02.009.

5. Aggarwal D., “Sentiment Analysis: An insight into Techniques, Application and Challenges”, International Journal of Computer Science and Engineering, Volume 6, Issue 5, 2018, pages 697-703,

https://doi.org/10.26438/ijcse/v6i5.697703

6. RaziehSheikhpour, Mehdi Agha Sarram, Sajjad Gharaghani, Mohammad Ali ZareChahooki, “A Survey on semi-supervised feature selection methods”, Pattern Recognition, Volume 64, 2017, Pages 141-158, ISSN 0031-

3203, https://doi.org/10.1016/j.patcog.2016.11.003.

7. Anne-Sophie Hoffait, Michaël Schyns, “Early detection of university students with potential difficulties”, Decision Support Systems, Volume 101, 2017, Pages 1-11, ISSN 0167-9236,

https://doi.org/10.1016/j.dss.2017.05.003.

8. Chuan Liu, Wenyong Wang, Qiang Zhao, Xiaoming Shen, Martin Konan, “A new feature selection method based on a validity index of feature subset, Pattern Recognition Letters, Volume 92, 2017, Pages 1-8, ISSN

0167-8655, https://doi.org/10.1016/j.patrec.2017.03.018.

9. S. Sasikala, S. Appavu alias Balamurugan, S. Geetha, “Multi Filtration Feature Selection (MFFS) to improve discriminatory ability in clinical data set”, Applied Computing and Informatics, Volume 12, Issue 2, 2016,

Pages 117-127, ISSN 2210-8327, https://doi.org/10.1016/j.aci.2014.03.002.

10. Jianyu Miao, LingfengNiu, “A Survey on Feature Selection”, Procedia Computer Science, Volume 91, 2016, Pages 919-926, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2016.07.111.

11. Junfei Qiu, Qihui Wu, Guoru Ding, Yuhua Xu and Shuo Feng, “A survey of machine learning for big data

processing”, EURASIP Journal on Advances in Signal Processing, 2016:67, https://doi.org/10.1186/s13634-016-0355-x

12. Sara Landset, TaghiM. Khoshgoftaar, Aaron N. RichterEmail author and Tawfiq Hasanin, “A survey of open

source tools for machine learning with big data in the Hadoop ecosystem”, Journal of Big Data, 2015, 2:24, https://doi.org/10.1186/s40537-015-0032-1

13. RattanawadeePanthong, AnongnartSrivihok, ”Wrapper Feature Subset Selection for Dimension Reduction

Based on Ensemble Learning Algorithm”, Procedia Computer Science, Volume 72, 2015, Pages 162-169, ISSN

1877-0509, https://doi.org/10.1016/j.procs.2015.12.117.

14. Ruchika Malhotra, “A systematic review of machine learning techniques for software fault prediction”, Applied Soft Computing, Volume 27, 2015, Pages 504-518, ISSN 1568-4946,

https://doi.org/10.1016/j.asoc.2014.11.023.

15. Konstantina Kourou, Themis P. Exarchos, Konstantinos P. Exarchos, Michalis V. Karamouzis, Dimitrios I. Fotiadis, “Machine learning applications in cancer prognosis and prediction”, Computational and Structural

Biotechnology Journal, Volume 13, 2015, Pages 8-17, ISSN 2001-0370,

https://doi.org/10.1016/j.csbj.2014.11.005. 16. T. Vafeiadis, K.I. Diamantaras, G. Sarigiannidis, K.Ch. Chatzisavvas, “A comparison of machine learning

techniques for customer churn prediction”, Simulation Modelling Practice and Theory, Volume 55, 2015, Pages

1-9, ISSN 1569-190X, https://doi.org/10.1016/j.simpat.2015.03.003. 17. Girish Chandrashekar, FeratSahin, “A survey on feature selection methods”, Computers & Electrical

Engineering, Volume 40, Issue 1, 2014, Pages 16-28, ISSN 0045-7906,

342-349

https://doi.org/10.1016/j.compeleceng.2013.11.024.

18. DursunDelen, “A comparative analysis of machine learning techniques for student retention management”,

Decision Support Systems, Volume 49, Issue 4, 2010, Pages 498-506, ISSN 0167-9236,

https://doi.org/10.1016/j.dss.2010.06.003. 19. IoannaLykourentzou, IoannisGiannoukos, Vassilis Nikolopoulos, George Mpardis, VassiliLoumos, “Dropout

prediction in e-learning courses through the combination of machine learning techniques”, Computers &

Education, Volume 53, Issue 3, 2009, Pages 950-965, ISSN 0360-1315, https://doi.org/10.1016/j.compedu.2009.05.010.

20. Carolyn Mair, GadaKadoda, Martin Lefley, Keith Phalp, Chris Schofield, Martin Shepperd, Steve Webster, “An

investigation of machine learning based prediction systems”, Journal of Systems and Software, Volume 53, Issue 1, 2000, Pages 23-29, ISSN 0164-1212, https://doi.org/10.1016/S0164-1212(00)00005-4.

21. Witten, I.H., Frank, E., Trigg, L., Hall, M., Holmes, G. &Cunningham, S.J. (1999), “Weka: Practical machine

learning tools and techniques with Java implementations”, (Working paper 99/11). Hamilton, New Zealand: University of Waikato, Department of Computer Science.

22. Hall, M. A. & Smith, “Practical feature subset selection for machine learning”,Computer Science ’98

Proceedings of the 21st Australasian Computer Science Conference ACSC’98, Perth, 4-6 February, 1998, Pages 181-191, Berlin: Springer.

56

Authors: Kushnian Kour, Dr. Sandeep Singh Kang

Paper

Title:

Evaluation of Wireless Body Area Networks

Abstract: Remote body Area Network is the interconnection of different hubs that are

situated in or around the outside of the body which is equipped for remote correspondence.

Remote body Area Network includes different observing application condition, fighting,

farming, military and social insurance. The principle motivation behind WBAN is to

physiologically screen patient's fundamental signs and thus course the related information

towards a base station. The sensor hubs are normally light weight, minimal effort, low

power expending insight gadgets which are equipped for detecting, figuring, speaking with

one another remotely. This audit gives an unmistakable outline about the elements of

WBAN. The fundamental activity of conventions, transmitter and beneficiary of IEEE

802.15.6 are profoundly analyzed and examined in this work. The WBAN elements

include the sensor devices .These sensor devises are wearable devices. These sensor

devices are the detector devices such as motion sensors, ECG sensors etc. There are some

protocols which are within body protocols in WBAN. These protocols enhance the work of

the Wireless Body area network There are also some security aspects including

confidentiality, integrity in WBAN. There are various application areas where these

sensors can be used .This review paper gives snappy synopsis about the sensor plan,

WBAN architecture, within-body routing protocols, applications, control proficiency,

vitality preservation, correspondence conventions and security issues in WBAN.

Keywords—Wireless Body Area Networks (WBANs), Sensors, intra body and additional

body correspondence, detector devices.

References

1. Mark A. Hanson, Harry C. Powell Jr., AdamT. Barth, Kyle Ringgen berg, Benton H. Calhoun, James H.Aylor,and John Lach Body Area Sensor Networks: Challenges and

Opportunities , University of Virginia, IEEE Computer Society (2009)

2. Data Security And Privacy In Wireless Body Area Networks, Ming Li And Wenjing Lou, Worcester Polytechnic Institute Kui Ren, Illinois Institute Of Technology, IEEE Wireless Communications (

February 2010)

3. https://www.seminarsonly.com/computer%20science/wireless-body-area-network.php 4. https://www.techsparks.co.in/thesis-in-wireless-body-area-network/

5. https://www.researchgate.net/figure/Example-of-intra-body-and-extra-body-communication-in-a-

WBAN_fig24_45709672 6. https://www3.nd.edu/~dwang5/courses/spring19/ papers/bsn/BSNOverview.pdf

7. Javaid, N., Abbas, Z., Fareed, M.S., Khan, Z.A. and Alrajeh, N., 2013. M-ATTEMPT: A new energy-efficient

routing protocol for wireless body area sensor networks. Procedia Computer Science, 19, pp.224-231. 8. Ragesh, G. K., & Baskaran, K. (2012). An Overview of Applications , Standards and Challenges in Futuristic

Wireless Body Area Networks. Journal of Computer Science

9. Transmission-Rate-Adaption Assisted Energy-Efficient Resource Allocation With QoS Support in WBANs

350-356

10. Tang, Q.,Tummala, N., Gupta, S.K. and Schwiebert, L., 2005, June. TARA: thermal-aware routing algorithm for

implanted sensor networks.International Conference on Distributed Computing in Sensor Systems (pp. 206-

217). Springer Berlin Heidelberg

11. https://www.researchgate.net/publication/253418115_IEEE_802154_for_Wireless_Sensor_Networks_A_Tecnical_Overview

57.

Authors: Simerjeet Singh Bawa, Dr. Harpreet Singh

Paper Title: Factor Influencing the Formulation of Effective Marketing Strategies of Indian

Railways

Abstract: The growth of an organization depends on its marketing strategies and to create

successful marketing strategies, it is very important to be familiar with consumers. The

authors have tried to understand and analyze the marketing strategies preferred by Indian

railways. The sample of 50 respondents, who are working at various profiles have been taken

to evaluate the same.

Keywords: Indian Railways, Marketing Strategies, Passenger Safety.

Reference: 1. Adewale Gbolagade, Adesola M.A, Oyewale I.O, (2016), “Impactof Marketing Strategy on Business

Performance A Study of Selected Small and Medium Enterprises. In Oluyole Local Government, Ibadan,

Nigeria”, IOSR Journal of Business and Management, Vol.11, Issue.4, Jul.-Aug, 2016, pp. 59-66.

www.iosrjournals.org www.iosrjournals.org 2. CAG (2007), “Report of the Comptroller & Auditor General of India”, Union Government Railways, No.6.

3. Choudhary Atul, Bansal Sanjeev, Sharma Prashant, Prashaant Anu (2018), “An Impact of Recent Technological

Reforms in Indian Railways on its Revenue and Its Influence on the Passenger Satisfaction in Terms of Service”, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, Issue. 2 pp. 90-95.

4. Kothari. R.K, Mehta, Sharma. A, (2007), “Indian Railways Marketing Management”, Ramesh Book Depot,

Jaipur. 5. Kotler Philip, Armstrong Gary, Saunders John, Wong Veronica. (1999), “Principles of Marketing”, Second

European Edition. Prentice Hall. London.

6. Michael Porter, Nov-Dec (1996), Harvard Business Review. 7. Ministry of Railways, Annual Reports, [2013 to 2016]

8. MOR, (1998), Status Paper on Indian Railways [New Delhi: Ministry of Railways]

9. Owomoyela S.K, Oyeniyi K.O and Ola O.S (2013). “Investigating the impact of marketing mix elements on consumer loyalty: An empirical study on Nigerian Breweries Plc. Interdisciplinary”, Journal of Contemporary

Research in Business, Vol.4 (11), pp. 485 –496.

10. Raghuram G, Niraja S. (2007), “Turnaround of Indian 11. Railways: increasing the axle loading – A case Study”, Indian Institute of Management, Ahmedabad.

12. Shim S, Eastlick M A, Lotz S (2004), Search-Purchase[S-P] Strategies of Multi-Channel Consumers: A

segmentation Scheme, J. Marketing Channel. 13. Slater. S.F, Hult. G.T. M & Olson. E.M. (2007), “On the importance of matching strategic behavior and target

market selection to business strategy in high-tech markets”, Journal of the Academy of Marketing Science, Vol.

35 No. 1, pp. 5–17.

357-362

58.

Authors: Dr. Sharad, Dr. Sandeep Singh Kang, Er. Deepshikha

Paper

Title:

Cluster Based Techniques LEACH and Modified LEACH Using Optimized

Technique EHO in WSN

Abstract— In the last few years, the Internet of Things (IoT) and the advance wireless

networks are becoming very prominent in various domains. Wireless Sensors are facing

problems of frequent energy loss which affects to the lifetime of the entire network. There are

number of researchers who are working on such energy losses which occur in the wireless

sensor nodes by using various approaches. One such method is Low- energy adaptive

clustering hierarchy (LEACH) and its number of methods. Despite of various methods of

LEACH, there is still immense scope of research as it is highly used in sensor nodes for

different scenarios. The emerging growth of energy aware wireless sensor networks for a

long time leads to various problems related to the lifetime of nodes in the wireless

environment. In our research paper, a new and performance aware approach named Elephant

Herd Optimization based Cluster Head Selection is devised and simulated so that the

optimization level can be achieved. The nature inspired soft computing approaches are

363--372

always beneficial for the use of optimization and reduction of various problems which can

occur during energy optimization and this is the main focus which is considered in this

research work. The main fundamental concept of the cluster head shuffling using EHO and

other methods of key exchange are simulated in Contiki-Cooja which is an open source

simulator for wireless sensor networks.

Keywords::Advance Wireless Networks, Energy aware Wireless Networks, Elephant Herd

Optimization, Energy Optimization.

Reference: 1. Feeney, L. and Nilsson , M. “Investigating the energy consumption of a wireless network interface in an ad hoc

networking environment”. IEEE INFOCOM 3:1548- 1557 vol.3, 2001

2. Aydos, Sunar, and Koc, C “An elliptic curve cryptographybased authentication and key agreement protocol for wireless communication” in 2nd International Workshop on Discrete Algorithms and Methods for Mobile

Computing and Communications Symposium on Information Theory, 1998

3. Carey, Peragine, Dziadek, Herscovici, and Ryan, Spike Broad andSystemic,”Methodsand determining an

ptimum sector distribution within a coverage area of a wireless communication system” U. Patent 6,418, 327,

2002.

4. Chan, and Perrig, “Security and privacy in sensor network computer”, 36(10), pp.103-105, 2003 5. Gupta, Stebila, Fung, Shantz, Gura, and Eberle, , Augus “Speeding up Secure Web Transactions Using Elliptic

Curve Cryptograph In NDSS”, 2004

6. Sterbenz, Medhi, Monaco, Ramamurthy, Scoglio, Choi,B. Evans, J. Gruenbacher, Hui, Kaplow, and Minden,.GpENI: “Great Plains Environment for Network Innovation” Proposal).2008 ITTC technical report

ITTC-FY2009TR-0061349-01, The University of Kansas.

7. Roman, Zhou, and Lopez, “On the features and challenge of security and privacy in distributed internet of things,” Computer Networks, vol. 57, n 10, pp 2266–2279, 2013.

8. Jayashree, Arumugam, Anusha, and Hariny, A. (2006),“Apri On the accuracy of centroid based multilateration

procedure for location discovery in wireless sensor network In Wireless and Optical Communications Networks, IFIP International Conference on (p 6-pp). IEEE. 2006.

9. Uckelmann Harrison Michahelles “An architectural approach towards the future internet of things”, Springer

Berlin Heidelberg, pp 1-24, 2011. 10. Zhang, Liang, Lu, & Shen, “Sybil attacks and their defenses in the internet of things.” IEEE Internet of Things

Journal, (5), pp 372-383, 2014 1.

11. Wang, Deb Coelho,“Elephant herding optimization In Computational and Business Intelligence (ISCBI)”, 3rd International Symposium on Dec 7 (pp 1-5). IEEE, 2015.

12. Trappe, Howard, and Moore, “Low-energy security: Limits and opportunities in the internet of things”, IEEE

Security and Privacy, vol. 13, pp 14–21, 2015. 13. Said, Masu “Towards internet of things: Survey and future vision”. International Journal of Computer Network

pp.1-7, 2015.

14. Rehiman and Veni, “A secure authentication infrastructure for IOT enabled smart mobile devices - an initial prototype,” Indian Sc Techno vol. 9, pp 1-6 2016.

15. Li, Zheng, and Jin, “Secure and efficient data transmission in the Internet of Things,” Telecommunication

Systems, vol. 62, n 1, pp 111–122, 2016. 16. Mollah, Azad, and Vasilakos, “Secure data sharing and searching at the edge of cloud-assisted internet of

things,” IEEE Cloud Computing, vol. 4, pp 34–42, 2017.

59.

Authors: Harleen kaur, Gourav Bathla

Paper Title: Techniques of recommender system

Abstract –The term Recommender system is described as any organization that provides

personalized suggestions as a result and it effects the user in the individualized way to

favorable items from the large number of opinions. The voluminous inflation of the reachable

data online and also the number of users have lead to the information overload problem. To

overcome this problem the recommender system came into play as it is able to prioritize and

personalize the data. Recommendation systems have developed alongsidewith the

net.Recommender system has mainly three data filtering methodssuch as content based

filtering technique, collaborative based filtering technique and the hybrid approach to manage

the data overload problem and to recommends the items to the user the items they are

interested in from the dynamically generated data. This paper makes a comprehensive

introduction to the recommender system with its types, content based filtering , collaborative

filtering and the hybrid recommendation.

Keywords – Recommendation system,Collaborative filtering, Content based filtering, Hybrid

373-379

recommendation

References 1. Nehete, S.P. and Devane, S.R., 2018, August. Recommendation Systems: past, present and future. In 2018

Eleventh International Conference on Contemporary Computing (IC3) (pp. 1-7). IEEE.

2. Yang, X., Guo, Y., Liu, Y. and Steck, H., 2014. A survey of collaborative filtering based social recommender systems. Computer Communications, 41, pp.1-10.

3. Patel, A., Thakkar, A., Bhatt, N. and Prajapati, P., 2019. Survey and Evolution Study Focusing Comparative

Analysis and Future Research Direction in the Field of Recommendation System Specific to Collaborative Filtering Approach. In Information and Communication Technology for Intelligent Systems (pp. 155-163).

Springer, Singapore.

4. Yanxiang, L., Deke, G., Fei, C. and Honghui, C., 2013, January. User-based clustering with top-n recommendation on cold-start problem. In 2013 Third International Conference on Intelligent System Design

and Engineering Applications (pp. 1585-1589). IEEE.

5. Mustafa, N., Ibrahim, A.O., Ahmed, A. and Abdullah, A., 2017, January. Collaborative filtering: Techniques and applications. In 2017 International Conference on Communication, Control, Computing and Electronics

Engineering (ICCCCEE) (pp. 1-6). IEEE.

6. Thorat, P.B., Goudar, R.M. and Barve, S., 2015. Survey on collaborative filtering, content-based filtering and

hybrid recommendation system. International Journal of Computer Applications, 110(4), pp.31-36.

7. Ghodsad, P.R. and Chatur, P.N., 2018, August. Handling User Cold-Start Problem for Group Recommender

System Using Social Behaviour Wise Group Detection Method. In 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE) (pp. 1-5). IEEE.

8. Ambulgekar, H.P., Pathak, M.K. and Kokare, M.B., 2019. A Survey on Collaborative Filtering: Tasks,

Approaches and Applications. In Proceedings of International Ethical Hacking Conference 2018 (pp. 289-300). Springer, Singapore.

9. Li, J., Zhang, K., Yang, X., Wei, P., Wang, J., Mitra, K. and Ranjan, R., 2019. Category Preferred Canopy–K-means based Collaborative Filtering algorithm. Future Generation Computer Systems, 93, pp.1046-1054.

10. Ortega, F., Hurtado, R., Bobadilla, J. and Bojorque, R., 2018. Recommendation to groups of users using the

singularities concept. IEEE Access, 6, pp.39745-39761. 11. Fletcher, K.K., 2017, June. A Method for Dealing with Data Sparsity and Cold-Start Limitations in Service

Recommendation Using Personalized sPreferences. In 2017 IEEE International Conference on Cognitive

Computing (ICCC) (pp. 72-79). IEEE. 12. Amatriain, X., Jaimes, A., Oliver, N. and Pujol, J.M., 2011. Data mining methods for recommender systems.

In Recommender systems handbook (pp. 39-71). Springer, Boston, MA.

13. Guo, L., Liang, J., Zhu, Y., Luo, Y., Sun, L. and Zheng, X., 2018. Collaborative filtering recommendation based on trust and emotion. Journal of Intelligent Information Systems, pp.1-23.

14. Schafer, J.B., Frankowski, D., Herlocker, J. and Sen, S., 2007. Collaborative filtering recommender systems.

In The adaptive web (pp. 291-324). Springer, Berlin, Heidelberg. 15. Katarya, R. and Verma, N., 2017, December. Automatically detection and recommendation in collaborative

groups. In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp. 218-222). IEEE.

60

Authors: K GOKUL, RITU GARG

Paper Title: Multi-level QR code with Hill Climbed Encrypted Public level for secured Message

Transfer

Abstract: With the world turning into a worldwide town, the data sharing requires abnormal

state security with substantial verification of the data which ought not be undermined with the

time, hence providing food all the above necessities we propose another brisk reaction (QR)

code containing two stockpiling levels specifically open and private stockpiling levels, which

can go above and beyond in validating the inventiveness of the reports. The open stockpiling

level can be perused by any traditional QR code scanners while it's not the equivalent for the

private stockpiling level as its being produced with exchanging the dark modules with

finished examples of the first QR code consequently it tends to be perused by just explicit QR

scanners. The data's being put away in the private stockpiling level is being encoded sing q-

ary code substituted by mistake amendment systems along these lines expanding the QR

stockpiling limit while the open stockpiling level data's are being scrambled with the key

which will be sent to the private stockpiling level where it experiences all the procedure like

the private data's and will be moved by means of QR to the required gatherings. The size can

be expanded by the information's or with the finished example estimate.

Keywords: QR code, multiple Storage levels, Secured transfer, Extended hill climbing

algorithm.

380-384

References

1. Wu M, Liu B (2004) Data hiding in binary image for authenticationand annotation. IEEE Trans Multimedia 6(4):528–538

2. Yang H, Kot AC (2007) Pattern-based data hiding for binary imageauthentication by connectivity-preserving.

IEEE Trans Multimedia 9(3):475–486 3. Varna A, Rane S, Vetro A (2009) Data hiding in hard-copy textdocuments robust to print, scan and photocopy

operations. In:Proc. of IEEE International Conference on Acoustics, Speech andSignal Processing, pp 1397–

1400 4. Das S, Rane S, Vetro A Hiding information inside structured shapes. In: Proc. of IEEE International

Conference on AcousticsSpeech and Signal Processing, Mar 2010, pp 1782–1785

5. Kieseberg P, Leithner M, Mulazzani M, Munroe L, SchrittwieserS, Sinha M, Weippl E (2010) QR code security. In: Proc. of theInternational Conference on Advances in Mobile Computing andMultimedia, pp 430–

435

6. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things Perspectives and challenges. Wirel Netw20(8):2481–2501

7. Reed IS, Solomon G (1960) Polynomial codes over certain finitefields. J Soc Ind Appl Math 8(2):300–304

8. Wilds M, Chambers S Bar code authentication, Patent US2010/0 012 736 A1, Jan., 2010 9. Eldefrawy M, Alghathbar K, KhanMHardcopy document authentication based on public key encryption and 2D

barcodes. In: Proc. of International Symposium on Biometrics and Security Technologies, Mar. 2012, pp 77–81

10. Li CM, Hu P, Lau WC Authpaper: Protecting paper-based documents and credentials using authenticated 2d barcodes. In: 2015 IEEE International Conference on Communications (ICC). IEEE, 2015, pp 7400–7406

11. Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving.

IEEE Trans Multimedia 9(3):475–486 12. Reed IS, Solomon G (1960) Polynomial codes over certain finitefields. J Soc Ind Appl Math 8(2):300–304

13. Villan R, Voloshynovskiy S, Koval O, Pun T (2006) Multilevel2-D bar codes: Toward high-capacity storage modules for multimedia security and management. IEEE Trans Inf Forensics Secur 1(4):405–420

61

Authors: Gurpreet Kaur, Vinay Bhatia, P. N. Hrisheekesha, R. S. Kaler

Paper

Title:

Bragg Grating Diffraction light at Different Wavelength and Incident Light

Abstract: The diffraction grating is an important device that makes use of the diffraction of

light to produce spectra. Diffraction is also fundamental in other applications such as x-ray

diffraction studies of crystals and holography. We proposed a design of Bragg grating

waveguide to investigate the behavior of diffraction of light at different incident angle and

wavelengths. Using finite difference time domain (FDTD) photonics simulation software the

performance of proposed waveguide is observed in term of output power, electric field,

diffraction efficiency (DE) and signal to noise ratio (SNR). It is found that the proposed

waveguide provides better diffracted light with electric field distribution with 1.969 v/m,

Diffraction efficiency 8%, and SNR (25.5 dB) at 1.55µm wavelength and 00 degrees of

incident angle.

Keywords:: optical fiber, Medical application, Bragg Grating Waveguide

References: 1. K. Venkatachalam, D. S. Kumar, and S. Robinson, “Investigation on 2D photonic crystal-based eight-

channel wavelength-division demultiplexer”, Photonic Network Communications, DOI: 10.1007/s11107-

016-0675-7. 2. S. Singh, “Investigation of wavelength division multiplexing ring network topology to enhance the system

capacity” Optik - International Journal for Light and Electron Optics, vol. 125, no. 21. pp. 6527–6529,

2014. 3. Nidhi, U.Tiwari, V. Mishra, A. kumar, Y. Singh, B. kumar, S.C. Jain, N. Singh, and P. Kapur, “A current

sensing technique based upon fiber Bragg grating”, Photonics - IIT Gawahati. vol. 39, no. 4. pp. 266, 2010.

4. N. Panwar, U. Tiwari, Nidhi, M. M. Khan, S. C. Jain, R. Garg and P. Kapur, “Long Period Fiber Grating Humidity Sensor with Gelatin/Cobalt Chloride coating”, is presented in International Conference on Fiber

Optics and Photonics, pp-W2B.4,OSA 2012,IIT Chennai.

5. Christopher Palmerk, Diffraction Grating Handbook, 5th Edition, Richardson Grating Laboratory 705 St. Paul Street, Rochester, New York. 2015

6. M. Dai, L. Ma, Yelong Xu, M. Lu, X. Liu, and Y. Chen, “Highly efficient and perfectly vertical chip-to

fiber dual-layer grating coupler”, Optik Express, vol. 23, no. 2, pp. 1691-8, 2015. 7. B. Yun, G. Hu, Y. Cui, “Third-order polymer waveguide Bragg grating array by using Conventional

contact lithography”, Optics Communications, vol. 330, no.1, pp. 113–116, 2014.

385-389

8. H. J. Wang, D. F. Kuang, X. D. Sun, and Z. L. Fang, “Period interaction on diffraction efficiency of blazed

transmission gratings”, Optik, vol. 121, no. 16, pp. 1511–1515, 2010.

9. J.C. Ibarra, M. O. -Gutie´rrez, A. Olivares-Pe´rez, G. ObregoPulido, M. Pe´rez-Corte, “Changes of the

diffraction efficiency due to emulsions thicknesses in holographic gratings”, Optical Materials, vol. 30, no. 2, pp. 255–259, 2007.

10. Yao Hu, L. Zeng, L. Li, “Method to mosaic gratings that relies on analysis of far-field intensity patterns in

two wavelengths”, Optics Communications, vol. 269, no. 2, pp. 285–290, 2007. 11. T. Harimoto, “Far-Field Pattern Analysis for an Array Grating Compressor” Jpn. J. Appl. Phys. vol. 43, no.

4A,pp.1362, 2004.

12. G. Kaur, R. S. Kaler, N. Kwatra, “On the optimization of fiber Bragg grating optical sensor using genetic algorithm to monitor the strain of civil structure with high sensitivity”, Optical Engineering, vol. 55, no.8,

pp. 087103-1 to 087103-6, 2016.

13. G.Kaur, R. S. Kaler, N. Kwatra, “Performance investigation of semiconductor optical amplifier and raman amplifier as an optical sensors”, Optoelectronics and Advanced Materials – Rapid Communications, vol. 9,

no. 9-10, pp. 1110 – 1113, 2015.

62.

Authors: Vinay Bhatia, Eti, Parveen Singla

Paper Title: VANET and FANET under the Impact of the Security Attack

Abstract - The flying ad hoc network (FANET) is a distributed type of network in which

nodes have the ability to join or leave the network at any time as and when needed. FANET

is the kind of ad-hoc network just like the Mobile ad-hoc network (MANET) and the

Vehicular ad-hoc network (VANET). In our previous work a monitor mode technique is

proposed for the detection of malicious nodes in Flying ad-hoc network (FANET). In this

research work, a secure architecture for FANET and VANET is designed for the detection

and isolation of malicious nodes in the network. The ad- hoc network is unstable when

malicious nodes are present in the network which create fake identities, so that security of

the network is to be reduced. A multiple copies of fake identities create by Sybil attack

which is harmful for the network. In this research work, the performance of the proposed

technique for the detection and isolation of malicious node of FANET is compared with

VANET. It is analyzed that FANET performs well in terms of all parameters like

throughput, packet loss and routing overhead as compare to VANET.

Keywords—Mobile ad-hoc network (MANET), Vehicular ad-hoc Network(VANET),

Flying ad-hoc network (FANET), Sybil attack, Malicious nodes , Unmanned aerial Vehicle

Network(UAV).

References:

1. V. Gatteschi, F. Lamberti, G. Paravati, A. Sanna, C. Demartini, A. Lisanti, and G. Venezia, ―New

frontiers of delivery services using drones: A prototype system exploiting a quadcopter for autonomous drug shipments,‖ in 39th IEEE Annual Computer Software and Applications Conference (COMPSAC), vol.

2, July 2015, pp. 920–927.

2. K. Mansfield, T. Eveleigh, T. H. Holler, and S. Sakami, 3. ―Unmanned aerial vehicle smart device ground control station cyber security threat model,‖ in IEEE

International Conference on Technologies for Homeland Security (HST), Nov 2013, pp. 722–728.

4. N. M. Roddy, R. d. O. Schmidt, and A. Pars, ―Exploring security vulnerabilities of unmanned aerial vehicles,‖ in IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2016, pp. 993–

994.

5. W. Sad, A. L. Glass, N. B. Mandayam, and H. V. Poor, 6. ―Toward a consumer-centric grid: A behavioural perspective,‖ Proceedings of the IEEE, vol. 104, no. 4,

pp. 865–882, April 2016.

7. G. E. Rahil, A. Sanjeev, W. Sad, N. B. Mandayam, and H. V. Poor, ―Prospect theory for enhanced smart grid resilience using distributed energy storage,‖ in 54th Annual Allerton Conference on

Communication, Control, and Computing (Allerton), Sept 2016, pp. 248–255.

390-397

Authors: Parvinder Singh, Rajeshwar Singh

Paper

Title:

Multi-Metric Route Cost Based Routing In Wireless Multimedia Adhoc Networks

63.

Abstract: To improve the quality of life, bigger cities in the world addressing their

problems by adopting latest technology. IOT connect physical world to the internet and such

concept is adopted by bigger cities having large population growth rate. Wireless

multimedia sensor network helps to monitor various parts of a city without use of cables.

This network becomes the primary component of every smart city due to its surveillance and

monitoring capability In contrast with conventional sensor networks, multimedia sensor

nodes are equipped with cameras which acquire, process, compress and transmit information

about an event happing at some remote area in the form of an image or video. However, like

conventional WSNs this network is having multiple constrained and new metric needs to be

considered to improve network life time and Quality of service parameters. Multiple metric

based route cost function is defined and routing mechanism based upon this cost function is

proposed. Since each multimedia sensor node is battery operated and connected through low

power wireless links. This work helps to find an optimal path having minimum energy

consumption, maximum link reliability, minimum number of hops and minimum routing

table magnitude. A cost function considers constraints of wireless multimedia sensor

networks. It satisfies desirable network requirements and improves network life time

through efficient routing. The proposed algorithm is tested, simulated and compared with

previous routing algorithms.

Keywords: IEEE 802.15.4, Wireless multimedia sensor networks, Reliability, Storage

constraints, Hop-metric, Route cost function

References: 1. Tenager mekonnen, pawani porambage, erkki harjul and mika ylianttila, “Energy Consumption Analysis of

High Quality Multi-Tier Wireless Multimedia Sensor Network” IEEE Access, 2017, vol. 5.

2. R. Monika & R. Hemalatha and S. Radha, “Energy efficient surveillance system using WVSN with

reweighted sampling in modified fast Haar wavelet transform domain” Multimed Tools Appl (2018). 3. Joao Paulo,Just Peixoto and Daniel G. Costa, “ Wireless visual sensor networks for smart city applications:

A relevance-based approach for multiple sinks mobility” Future Generation Computer Systems 76 (2017) 51–

62. 4. G. Shahzad, H. Yang, A. W. Ahmad, and C. Lee, “Energy-efficient intelligent street lighting system using

traffic-adaptive control,” IEEE Sensors Journal, vol. 16, no. 13, 2016, pp. 5397–5405.

5. A. Kovacs, R. B ´ atai, B. Cs. Cs ´ aji, P. Dud ´ as, B. H ´ ay, G. Pedone, ´ T. Rev´ esz, and J. V ´ ancza, “Intelligent control for energy-positive street ´ lighting,” Energy, vol. 114, pp. 40–51, 2016

6. A. Lavric, V. Popa, and S. Sfichi, “Street lighting control system based on large-scale WSN: A step towards a

smart city,” in 2014 International Conference and Exposition on Electrical and Power Engineering (EPE). IEEE, 2014, pp. 673–676.

7. M. Mahoor, F. R. Salmasi, and T. A. Najafabadi, “A hierarchical smart street lighting system with brute-force

energy optimization,” IEEE Sensors Journal, vol. 17, no. 9, 2017, pp. 2871–2879 8. F. Viani, A. Polo, P. Garofalo, N. Anselmi, M. Salucci, and E. Giarola, “Evolutionary optimization applied to

wireless smart lighting in energyefficient museums,” IEEE Sensors Journal, vol. 17, no. 5, 2017, pp. 1213–

1214. 9. F. Viani, A. Polo, F. Robol, E. Giarola, and A. Ferro, “Experimental validation of a wireless distributed

system for smart public lighting management,” in IEEE International Smart Cities Conference (ISC2), Trento,

Italy, September 12-15, 2016, pp. 678–683. 10. L. M. Oliveira and J. J. Rodrigues, “Wireless sensor networks: A survey on environmental monitoring.”

Journal of Communications, vol. 6, no. 2, 2011, pp. 143–151.

11. Balazs Cs.aji, Zsolt Kemeny, Gianfranco Pedone, Andr Kuti, J´ozsef Vancza “Wireless Multi-Sensor Networks for Smart Cities: A Prototype System with Statistical Data Analysis” IEEE sensors journal.

12. A. Monsalve, H.L. Vu, Q.B. Vo, “Optimal designs for IEEE 802.15.4 wireless sensor networks”, Wirel.

Commun. Mob. Comput. 13 (18) (2013) 1681–1692. 13. V. Vora, T. Brown, “High rate video streaming over 802.11n in dense wi-fi environments”, in: IEEE

Conference on Local Computer Networks, 2010, pp. 1054–1061.

14. Pan Zhaoqing, Zhang Yun, Kwong Sam, “Efficient motion and disparity estimation optimization for low complexity multiview video coding” IEEE Trans. Broadcast. 61 (2) , 2015, 166–176.

15. Mario Collottaa,Giovanni Paua,Daniel G. Costa “A fuzzy-based approach for energy-efficient Wi-Fi

communications in dense wireless multimedia sensor networks” Computer Networks 134 (2018) 127–139. 16. Hang Shen, Guangwei Bai, “Routing in wireless multimedia sensor networks: A survey and challenges

ahead”, Journal of Network and Computer Applications 71 (2016) 30–49.

17. Sarwesh P, N. Shekar V. Shet, K. Chandrasekaran “ETRT – Cross layer model for optimizing transmission range of nodes in low power wireless networks – An Internet of Things Perspective” Physical Communication

29 (2018) 307–318

18. Mario Collotta, Giovanni Pa , Daniel G. Costa “ A fuzzy-based approach for energy-efficient Wi-Fi comunications in dense wireless multimedia sensor networks” Computer Networks 134 (2018) 127–13.

398-401

19. Joao Paulo, Just Peixoto, Daniel G. Costa “Wireless visual sensor networks for smart city applications:A

relevance-based approach for multiple sinks mobility” Future Generation Computer Systems 76 (2017) 51–

62.

64.

Authors: Rekha Parihar, Ritu Garg

Paper

Title:

Wireless Energy Harvesting in Internet-of-Things Communication Systems with

Optimized Energy Efficiency using PSO

Abstract: IoT is an emerging technology having a wide range of application areas. IoT

applications are also affecting human lives. But these small devices are battery powered

which is major problem for IoT systems. Wireless energy transfer is a good solution for

such systems. Both information and energy can be transmitted together by wireless energy.

In this paper, time splitting-based relaying (TSR) protocol is used by relay node to harvest

the energy in IoT system. Here, dual-hop IoT system is considered for analysis. System with

three different Wi-Fi protocols is examined against the energy efficiency at the destination

node. All three protocols are analysed individually. Further, Particle Swarm Optimization

(PSO) technique is used to optimize the energy efficiency of the considered IoT system.

Keywords: Energy harvesting, Internet of things, Time splitting based relay protocol,

Wireless energy.

References:

1. 1T. D. Nguyen, J. Y. Khan, D. T. Ngo, Energy harvested roadside ieee 802.15. 4 wireless sensor networks for iot applications, Ad Hoc Networks 56 (2017) 109-121.

2. C. Production, B. Risteska, S. Ss, K. T. Ss, CO (January). doi:10.1016/j.jclepro.2016.10.006. 3. 3L. Atzori, A. Iera, G. Morabito, The internet of things: A survey, Computer Networks 54 (15) (2010) 2787 -

2805. doi:https://doi.org/10.1016/j.comnet.2010.05.010.

4. P. Tuwanut, S. Kraijak, A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends, 11th International Conference on Wireless Communications, Networking

and Mobile Computing (WiCOM 2015) (2015) 6-6. doi:10.1049/cp.2015.0714.

5. D. Blaauw, D. Sylvester, P. Dutta, Y. Lee, I. Lee, S. Bang, Y. Kim, G. Kim, P. Pannuto, Y. Kuo, et al., Iot

design space challenges: Circuits and systems, in: Symp. VLSI Circuits Dig. Tech. Papers, 2014, pp. 1-2.

6. G. Santucci, et al., From internet of data to internet of things, in: International Conference on Future Trends of

the Internet, Vol. 28, 2009. 7. L. Srivastava, Pervasive, ambient, ubiquitous: the magic of radio, in: European Commission Conference From

RFID to the Internet of Things,Bruxelles, Belgium, 2006.

8. O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer, et al., Internet of things strategic research roadmap, Internet of Things-Global

Technological and Societal Trends 1 (2011) (2011) 9-52.

9. I. Pe~na-L_opez, et al., ITU Internet report 2005: the internet of things (2005). 10. IDC, International Data Corporation (IDC) (2018 (accessed Jan 3, 2018)). URL

https://www.networkworld.com/article/3244927/inte

11. IDC, International Data Corporation (IDC) website (2016 (accessed June 3, 2018)). 12. URL ttps://www.idc.com/getdoc.jsp?containerId=prUS41

13. A. Al-fuqaha, S. Member, M. Guizani, M. Mohammadi, S. Member, Internet of Things: A Survey on

Enabling Technologies, Protocols, and 14. Applications 17 (4) (2015) 2347-2376. arXiv:jjj. URL http://ieeexplore.ieee.org.proxy.queensu.ca/docum

15. D. Bandyopadhyay, J. Sen, Internet of things: Applications and challenges in technology and standardization,

Wireless Personal Communications 58 (1) (2011) 49-69. arXiv:1105.1693, doi:10.1007/s11277-011-

0288-5.

16. Rekha, R. Garg, Energy management in wireless sensor networks: A state of art, in: International Conference

on Intelligent Data Communication Technologies and Internet of Things, Springer, 2018, 17. pp. 492-499.

18. P. Kamalinejad, C. Mahapatra, Z. Sheng, S. Mirabbasi, V. C. M. Leung, Y. L. Guan, Wireless energy

harvesting for the Internet of Things, IEEE Communications Magazine 53 (6) (2015) 102-108. 19. E. Kordetoodeshki, A. Hassanzadeh, An ultra-low power, low voltage dc-dc converter circuit for energy

harvesting applications, AEU-International Journal of Electronics and Communications 98 (2019) 8-18.

20. M. Gorlatova, J. Sarik, G. Grebla, M. Cong, I. Kymissis, G. Zussman, Movers and shakers: Kinetic energy harvesting for the internet of things,

21. in: ACM SIGMETRICS Performance Evaluation Review, Vol. 42, ACM, 2014, pp. 407-419.

22. H. G. Lee, N. Chang, Powering the iot: Storageless and converter-less energy harvesting, in: Design Automation Conference (ASP-DAC), 2015 20th Asia and South Paci_c, IEEE, 2015, pp. 124-129.

23. M. Babar, A. Rahman, F. Arif, G. Jeon, Energy harvesting based on internet of things and big data analytics

402-410

for smart health monitoring, Sustainable Computing: Informatics and Systems

doi:10.1016/j.suscom.2017.10.009.

24. URL http://dx.doi.org/10.1016/j.suscom.2017.10.009

25. B. Vaisband, E. G. Friedman, Heterogeneous 3-D ICs as a platform for hybrid energy harvesting in IoT systems, Future Generation Computer Systems 87 (2018) 152-158. doi:10.1016/j.future.2018.04.092.

26. H.-S. Nguyen, T.-S. Nguyen, M. Voznak, Relay selection for swipt: Performance analysis of optimization

problems and the trade-off between ergodic capacity and energy harvesting, AEU-International Journal of Electronics and Communications 85 (2018) 59-67.

27. S. Bagchi, J. Y. Siddiqui, Throughput optimization using availability analysis based spectrum sensing for a

cognitive radio, AEU-International Journal of Electronics and Communications 85 (2018) 12-22. 28. J. Guo, H. Hu, X. Da, J. Liu, W. Li, Optimization of energy efficiency for cognitive radio with partial rf

energy harvesting, AEU-International Journal of Electronics and Communications 85 (2018) 74-77.

29. S. Kitazawa, H. Ban, K. Kobayashi, Energy harvesting from ambient rf sources, in: Microwave Workshop Series on Innovative Wireless Power

30. Transmission: Technologies, Systems, and Applications (IMWS), 2012 IEEE MTT-S International, IEEE,

2012, pp. 39-42. 31. X. Lu, P. Wang, D. Niyato, D. I. Kim, Z. Han, C. Engineering, Wireless Networks with RF Energy Harvesting

: A Contemporary Survey 17 (2) (2015) 1-34. arXiv:arXiv:1406.6470v6, doi:10.1109/COMST.2014.2368999.

32. L. R. Varshney, Transporting information and energy simultaneously, in: Information Theory, 2008. ISIT

2008. IEEE International Symposium on, IEEE, 2008, pp. 1612-1616.

33. R. Zhang, C. K. Ho, Mimo broadcasting for simultaneous wireless information and power transfer, IEEE

Transactions on Wireless Communications 12 (5) (2013) 1989-2001. 34. X. Zhou, R. Zhang, C. K. Ho, Wireless information and power transfer: Architecture design and rate-energy

tradeo_, IEEE Transactions on communications 61 (11) (2013) 4754-4767.

35. A. A. Nasir, X. Zhou, S. Durrani, R. A. Kennedy, Relaying protocols for wireless energy harvesting and information processing, IEEE Transactions on Wireless Communications 12 (7) (2013) 3622-

3636.arXiv:1212.5406,doi:10.1109/TWC.2013.062413.122042.

36. K. Tang, R. Shi, J. Dong, Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting, Future Generation Computer Systems.

37. S. Tariq, K. Won, S. Faraz, M. Young, Ad Hoc Networks Throughput analysis of two-way relay networks

with wireless energy harvesting capabilities 53 (2016) 123-131. 38. B. Ji, K. Song, C. Li, W.-p. Zhu, L. Yang, Energy harvest and information transmission design in internet-of-

things wireless communication systems, AEU-International Journal of Electronics and Communications 87

(2018) 124-127. 39. B. C. Nguyen, T. M. Hoang, P. T. Tran, Performance analysis of full-duplex decode-and forward relay system

with energy harvesting over nakagami-m fading channels, AEU-International Journal of Electronics and

Communications 98 (2019) 114-122.

40. R. Poli, J. Kennedy, T. Blackwell, Particle swarm optimization, Swarm intelligence 1 (1) (2007) 33-57.

65.

Authors: Amritpal Kaur, Balwinder S. Dhaliwal, Suman Pattnaik

Paper

Ttle:

Design of Hybrid Fractal Boundary Antenna for RF Energy Harvesting Applications

Abstract- The fractal antennas have multiband behavior and also have the capabilities of the

size reduction as compared to the other patch antennas. Ahybrid fractal boundary antenna

has been designed and simulated in this paper for radio frequency energy harvesting

(RFEH). The designed antenna has the multiband behavior, as it resonates at the two

frequencies. The multiband behavior of the antenna helps in harvesting the energy from

various frequencies band and improves the output of the circuit. This hybrid fractal

boundary antenna uses the microstrip feed line to improve the matching performance of the

antenna.

Keywords: Fractal antenna, Hybrid fractal boundary antenna, Radio Frequency (RF),

Energy Harvesting (EH).

References:

1. D. Y. Choi, S. Shrestha, J. J. Park, and S. K. Noh, “Design and performance of an efficient rectenna incorporating a fractal structure,” Int. J. Commun. Syst., no. 4, 2014, pp. 661-679.

2. M. Mrnka, P. Vasina, M. Kufa, V. Hebelka, and Z. Raida, “The RF Energy Harvesting Antennas Operating in

Commercially Deployed Frequency Bands: A Comparative Study,” Int. J. Antennas Propag., vol. 2016, pp. 1-11.

3. D. Mishra, S. De, S. Jana, S. Basagni, K. Chowdhury, and W. Heinzelman, “Smart RF energy harvesting

communications: Challenges and opportunities,” IEEE Commun. Mag., vol. 53, no. 4, 2015, pp. 70-78. 4. J. Jose, S. George, L. Bosco, J. Bhandari, F. Fernandes, and A. Kotrashetti, “A Review of RF Energy

411-413

Harvesting Systems in India,” in 2015 International Conference on Technologies for Sustainable

Development (ICTSD), 2015, pp. 1-4.

5. Q. Awais, Y. Jin, H. T. Chattha, M. Jamil, H. Qiang, and B. A. Khawaja, “A Compact Rectenna System With

High Conversion Efficiency for Wireless Energy Harvesting,” IEEE Access, vol. 6, 2018, pp. 35857-35866. 6. Y. Wang and S. Liu, “A New Modified Crown Square Fractal Antenna,” 2008 Int. Conf. Microw. Millim.

Wave Technol. Proceedings (ICMMT), vol. 1, 2008, pp. 400-402.

7. Y. Shi, Y. Fan, J. Jing, L. Yang, Y. Li, and M. Wang, “An efficient fractal rectenna for RF energy harvest at 2.45 GHz ISM band,” Int. J. RF Microw. Comput. Eng. , 2018, pp. 1-8.

8. V. V Reddy and N. V. S. N. Sarma, “Triband Circularly Polarized Koch Fractal Boundary Microstrip

Antenna,” IEEE Antennas Wirel. Propag. Lett., vol. 13, 2014, pp. 1057-1060. 9. D. Li, F. Zhang, Z. Zhao, L. Ma, and X. Li, “UWB Antenna Design Using Patch Antenna with Koch Fractal

Boundary,” in 2012 International Conference on Microwave and Millimeter Wave Technology (ICMMT),

2012, vol. 3, pp. 1-3. 10. N. Sharma, S. Kaur, and B. S. Dhaliwal, “A New Triple Band Hybrid Fractal Boundary Antenna,” in 2016

IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology

(RTEICCT), 2016, pp. 874-878

66.

Authors: Mitali Desai, Rupa G. Mehta, Dipti P. Rana

Paper

Title:

An Empirical Analysis to Identify the Effect of Indexing on Influence Detection using

Graph Databases

Abstract: The data generated on social media platforms such as Twitter, Facebook,

LinkedIn etc. are highly connected. Such data can be efficiently stored and analyzed using

graph databases due to the inherent property of graphs to model connected data. To reduce

the time complexity of data retrieval from huge graph databases, various indexing

techniques are used. This paper presents an extensive empirical analysis on popular graph

databases i.e. Neo4j, ArangoDB and OrientDB; with an aim to measure the competencies

and effectiveness of primitive indexing techniques on query response time to identify the

influencing entities from Twitter data. The analysis demonstrates that Neo4j performs

efficient and stable for load, relation and property queries compare to other two databases

whereas the performance of OrientDB can be improved using primitive indexing.

Keywords: graph database, index, influence detection, query processing, Twitter

References

1. R. Hecht and S. Jablonski, “NoSQL evaluation: A Use Case Oriented Survey”, in Proceedings of the

International Conference on Cloud and Service Computing, 2011, pp. 336-341. 2. T. Petkova, “Why Graph Databases Make a Better Home for Interconnected Data than the Relational

Databases”, January 2016. Available:https://ontotext.com/graph-databases-interconected-data-relational-

databases/ [Accessed: June 11, 2018]. 3. S. Ma, J. Li J, C. Hu, X. Lin X, J. Huai, “Big graph search: Challenges and Techniques, Frontiers of Computer

Science, Vol. 10, No. 3, 2016, pp. 387–398.

4. D. K. Singh and R. Patgiri, “Big Graph: Tools, Techniques, Issues, Challenges and Future Directions”, in 6th International Conference on Advances in Computing and Information Technology (ACITY 2016), Chennai,

India, July 2016, pp. 119–128.

5. A. Silberschatz, H. F. Korth and S. Sudarshan, "Indexing and Hashing”, in Database System Concepts, 6th ed., New York: McGraw-Hill, 2011, pp. 475-527.

6. L. Ciglan and A. Averbuch, “Benchmarking Traversal Operations over Graph Databases”, in 28th

International Conference on Data Engineering Workshops, IEEE, 2012.

7. G. Graefe, “Query Evaluation Techniques for Large Databases”, ACM Computing Surveys, Vol. 25, No. 2,

June 1993, pp. 73-170.

8. S. Sakr and G. Al-Naymat, “Graph Indexing and Querying: A Review”, International Journal of Web Information Systems, Vol. 6, No. 2, 2010, pp. 101-120.

9. O. Batarfi, R. El Shawi, A. G. Fayoumi, R. Nouri, A. Barnawi and S. Sakr, "Large Scale Graph Processing

Systems: Survey and An Experimental Evaluation", Cluster Computing, Vol. 18, No. 3, 2015, pp. 1189-1213. 10. H. Dinari, “A Survey on Graph Queries Processing: Techniques and Methods”, International Journal of

Computer Network and Information Security, 2017, pp. 48-56.

11. C. Park, “Reducing Redundancy in Keyword Query Processing on Graph Databases”, Journal of Information Science and Engineering, Vol. 34, No. 2, 2018, pp. 551-574.

12. A. Patel and J. Dharwa, “Graph Data: The Next Frontier in Big Data Modeling for Various Domains”, Indian

Journal of Science and Technology, Vol. 10, No. 21, June 2017, pp. 1-7. 13. S. Agrawal and A. Patel, “A Study on Graph Storage Database of NoSQL”, International Journal on Soft

Computing, Artificial Intelligence and Applications (IJSCAI), Vol. 5, No. 1, February 2016, pp. 33-39.

414-421

14. R Angles and C. Gutierrez, “Survey of graph database models”, ACM Computing Surveys (CSUR), Vol. 40,

No. 1, February 2008, pp.1-39.

15. R. K. Kaliyar, “Graph Databases: A survey”, in International Conference on Computing, Communication and

Automation (ICCCA), July 2015, pp. 785-790. 16. S. A. T. Mpinda, L. C. Ferreira, M. X. Ribeiro and M. T. P. Santos, “Evaluation of Graph Databases

Performance Through Indexing Techniques”, International Journal of Artificial Intelligence & Applications

(IJAIA) Vol. 6, No. 5, September 2015, pp. 87-98. 17. R. Angles, "A Comparison of Current Graph Database Models", in 28th International Conference on Data

Engineering Workshops, IEEE, 2012, pp. 171-177.

18. D. Fernandes, and J. Bernardino, “Graph Databases Comparison: AllegroGraph, ArangoDB, InfiniteGraph, Neo4J, and OrientDB”, in Proceedings of the 7th International Conference on Data Science, Technology and

Applications, Porto, Portugal, 26–28 July, 2018, pp. 373–380.

19. P. Jadhav and R. Oberoi, “Comparative Analysis of Different Graph Databases”, International Journal of Engineering Research and Technology, Vol. 3, No. 9, September 2014, pp. 820-824.

20. S. Jouili and V. Vansteenberghe, “An Empirical Comparison of Graph Databases” in SocialCom, IEEE, 2013,

pp. 708–715 21. D. S. Rawat and N. K. Kashyap, “Graph Database: A Complete GDBMS Survey”, International Journal for

Innovative Research in Science & Technology, Vol. 3, No. 12, May 2017, pp. 217-226.

22. A. Romano, “The Massive Data Dump Reveals How Trolls Disrupt and Destabilize Local and Global

Politics”, October 19, 2018. Available: https://www.vox.com/2018/10/19/17990946/twitter-russian-trolls-

bots-election-tampering [Accessed: March 13, 2019].

67.

Authors: Ashish Tiwari, Dr. Ritu Garg

Paper

Title:

Eagle Techniques In Cloud Computational Formulation

Abstract: The eagle expresses of cloud computing plays a pivotal role in the development

of technology. In this computing world everyone is active so the end users and providers use

various applications which are working as a broker for providing and managing the services.

The aim of the paper is to solve the problems in such a way that brokers will provide an

optimized solution for cloud service providers and the end users. The key role of allocating

the efficient resources by making the algorithm which works for the time and cost

optimization keeping in consideration of its quality of services and characteristics. These

both are affecting the performance of these techniques is a major drawback due to low

accuracy and large computational complexity of the algorithms. As per the scenario, the

approach of the research is based on the rough set theory (RST). It’s a strategy to found the

information revelation and handle the issues like number of parameters (Virtualization,

resource sharing, cloud standardization etc). The rough set theory is the new method in

cloud service selection so that the best services to provide for cloud users and efficient

service improvement for cloud providers.

Keywords: High-Performance computing, Cloud parameters, Cloud brokers, Mathematical

model, Cloud simulator.

References:

1. Abawajy, J. (2009, December). Determining service trustworthiness in Intercloud computing environments. In

Pervasive Systems, Algorithms, and Networks (ISPAN), 2009 10th International Symposium on (pp. 784-

788). IEEE.

2. Abawajy, J. H., & Dandamudi, S. P. (2003, December). Parallel job scheduling on multicluster computing

systems. In null (p. 11). IEEE.

3. Almuttairi, R. M., Wankar, R., Negi, A., Rao, C. R., Agarwal, A., & Buyya, R. (2013). A two phased service oriented Broker for replica selection in data grids. Future Generation Computer Systems, 29(4), 953-972.

4. A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management

of data centers for cloud computing. Future generation computer systems, 28(5), 755-768. 5. Bera, S., Misra, S., & Rodrigues, J. J. (2015). Cloud computing applications for smart grid: A survey. IEEE

Transactions on Parallel & Distributed Systems, (5), 1477-1494.

6. Bonabeau, E., Marco, D. D. R. D. F., Dorigo, M., Théraulaz, G., & Theraulaz, G. (1999). Swarm intelligence: from natural to artificial systems (No. 1). Oxford university press.

7. Buyya, R. (2010, October). Cloud computing: The next revolution in information technology. In Parallel

Distributed and Grid Computing (PDGC), 2010 1st International Conference on (pp. 2-3). IEEE. 8. Buyya, R., Beloglazov, A., & Abawajy, J. (2010). Energy-efficient management of data center resources for

cloud computing: a vision, architectural elements, and open challenges. arXiv preprint arXiv:1006.0308.

422-429

9. Buyya, R., Broberg, J., & Goscinski, A. M. (Eds.). (2010). Cloud computing: Principles and paradigms (Vol.

87). John Wiley & Sons.

10. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT

platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.

11. Calheiros, R. N., Ranjan, R., Beloglazov, A., De Rose, C. A., & Buyya, R. (2011). CloudSim: a toolkit for

modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and experience, 41(1), 23-50.

12. Chandrasekar, R., & Misra, S. (2006, December). Introducing an ACO based paradigm for detecting wildfires

using wireless sensor networks. In Ad Hoc and Ubiquitous Computing, 2006. ISAUHC'06. International Symposium on (pp. 112-117). IEEE.

13. Chen, F., Guo, K., Lin, J., & La Porta, T. (2012, March). Intra-cloud lightning: Building CDNs in the cloud.

In INFOCOM, 2012 Proceedings IEEE (pp. 433-441). IEEE. 14. Deepa, O., & Senthilkumar, A. (2016). Swarm intelligence from natural to artificial systems: Ant colony

optimization. Networks (GRAPH-HOC), 8(1).

15. F. Mann(2009), Cloud Computing: The Next Revolution in IT, Photogrammetric Week '09. 16. Foster, I., & Kesselman, C. (Eds.). (2003). The Grid 2: Blueprint for a new computing infrastructure. Elsevier.

17. Geeta, C. M., Raghavendra, S., Buyya, R., Venugopal, K. R., Iyengar, S. S., & Patnaik, L. M. (2018). Data

Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions. International Journal of

Computer (IJC), 28(1), 8-57.

18. Garg, R., & Singh, A. K. (2011). Fault tolerance in grid computing: state of the art and open issues.

International Journal of Computer Science & Engineering Survey (IJCSES), 2(1), 88-97. 19. Garg, R., & Singh, A. K. (2015). Adaptive workflow scheduling in grid computing based on dynamic resource

availability. Engineering Science and Technology, an International Journal, 18(2), 256-269.

20. Garg, R., & Singh, A. K. (2013). Enhancing the discrete particle swarm optimization based workflow grid scheduling using hierarchical structure. International Journal of Computer Network and Information Security,

5(6), 18.

21. Garg, R., & Singh, A. K. (2011). Multi-objective optimization to workflow grid scheduling using reference point based evolutionary algorithm. International Journal of Computer Applications, 22(6), 44-49.

22. Gupta, A., & Garg, R. (2017, September). Load balancing based task scheduling with ACO in cloud

computing. In 2017 International Conference on Computer and Applications (ICCA) (pp. 174-179). IEEE. 23. Herawan, T., Deris, M. M., & Abawajy, J. H. (2010). A rough set approach for selecting clustering attribute.

Knowledge-Based Systems, 23(3), 220-231.

24. Mansouri, Y., Toosi, A. N., & Buyya, R. (2017). Cost optimization for dynamic replication and migration of data in cloud data centers. IEEE Transactions on Cloud Computing.

25. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

26. Mosleh, M. A., Radhamani, G., Hazber, M. A., & Hasan, S. H. (2016). Adaptive Cost-Based Task Scheduling

in Cloud Environment. Scientific Programming, 2016.

27. Nan, X., He, Y., & Guan, L. (2011, October). Optimal resource allocation for multimedia cloud based on

queuing model. In Multimedia signal processing (MMSP), 2011 IEEE 13th international workshop on (pp. 1-6). IEEE.

28. Nan, X., He, Y., & Guan, L. (2012, May). Optimal resource allocation for multimedia cloud in priority service

scheme. In Circuits and systems (ISCAS), 2012 IEEE international symposium on (pp. 1111-1114). IEEE. 29. Naga, K. P. P., Kodialam, M., & Varvello, M. (2014). U.S. Patent Application No. 13/597,614.

30. Pawlak, Z. (1982). Rough sets. International journal of computer & information sciences, 11(5), 341-356.

31. Sundareswaran, S., Squicciarini, A., & Lin, D. (2012, June). A brokerage-based approach for cloud service selection. In Cloud computing (cloud), 2012 ieee 5th international conference on (pp. 558-565). IEEE.

32. Tiwari, A., & Sharma, R. M. (2016, August). Potent Cloud Services Utilization with Efficient Revised Rough

Set Optimization Service Parameters. In Proceedings of the International Conference on Advances in Information Communication Technology \& Computing (p. 90). ACM.

33. Tiwari, A., Mahrishi, M., & Fatehpuria, S. A Broking Structure Originated on Service accommodative Using MROSP Algorithm.

34. Tiwari, A., Nagaraju, A., & Mahrishi, M. (2013, February). An optimized scheduling algorithm for cloud

broker using adaptive cost model. In Advance Computing Conference (IACC), 2013 IEEE 3rd International (pp. 28-33). IEEE.

35. Tiwari, A., Sah, M. K., & Gupta, S. (2015). Efficient Service Utilization in Cloud Computing Exploitation

Victimization as Revised Rough Set Optimization Service Parameters. Procedia Computer Science, 70, 610-617.

36. Tiwari, A., Sah, M. K., & Malhotra, A. (2015, September). Effective service Utilization in Cloud Computing

exploitation victimisation rough pure mathematics as revised ROSP. In Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on (pp. 1-6). IEEE.

37. Tiwari, A., Sharma, V., & Mahrishi, M. (2014). Service Adaptive Broking Mechanism Using MROSP

Algorithm. In Advanced Computing, Networking and Informatics-Volume 2 (pp. 383-391). Springer, Cham. 38. Tiwari, A., Tiwari, A. K., Saini, H. C., Sharma, A. K., & Yadav, A. K. (2013). A Cloud Computing using

Rough set Theory for Cloud Service Parameters through Ontology in Cloud Simulator. In ACITY-2013

Conference at Chennai, in CS and IT proceedings. 39. Tiwari, A., Tiwari, A. K., Saini, H. C., Sharma, A. K., & Yadav, A. K. (2013). A Cloud Computing using

Rough set Theory for Cloud Service Parameters through Ontology in Cloud Simulator. In ACITY-2013

Conference at Chennai, in CS and IT proceedings. 40. Vallverdú, J., Talanov, M., & Khasianov, A. (2017). Swarm Intelligence via the Internet of Things and the

Phenomenological Turn. Philosophies, 2(3), 19.

41. Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds: towards a cloud

definition. ACM SIGCOMM Computer Communication Review, 39(1), 50-55.

42. Vecchiola, C., Pandey, S., & Buyya, R. (2009, December). High-performance cloud computing: A view of scientific applications. In Pervasive Systems, Algorithms, and Networks (ISPAN), 2009 10th International

Symposium on (pp. 4-16). IEEE.

43. Zhang, L., Wu, C., Li, Z., Guo, C., Chen, M., & Lau, F. C. (2013). Moving big data to the cloud: An online cost-minimizing approach. IEEE Journal on Selected Areas in Communications, 31(12), 2710-2721.

44. Zhou, Z., Abawajy, J., Chowdhury, M., Hu, Z., Li, K., Cheng, H., ... & Li, F. (2017). Minimizing SLA

violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. Future Generation Computer Systems.

68

Authors: Simarjeet Kaur, Navdeep Kaur, Kamaljit Singh Bhatia

Paper

Title:

A Novel Prevention Mechanism for Replay Attack in Distance Vector - Hop Localization

Scheme

Abstract: Securing the process of node localization in Wireless Sensor Network (WSN) is

an important area of research. In this paper, we focus on securing Distance Vector (DV)-

Hop localization scheme from Replay Attack. The DV-Hop localization algorithm is a limit

free hop based reference Wireless Sensor Network architecture. It faces a couple of issues

like a route discovery mechanism and threat prevention issues. This paper focuses on the

establishment of a prevention mechanism for DV-Hop scheme against a Replay attack. The

proposed architecture uses an Artificial Bee Colony (ABC) and Neural Network in order to

prevent the attack. To prove the efficacy of the proposed scheme, the network scenario

without replay attack, with replay attack and with attack after prevention mechanism is

considered. The simulations are conducted for 200 iterations using MATLAB. The

evaluation is done on the basis of parameters like localization error and transmission loss.

Localization error of the proposed framework is similar to localization error without an

attack which is about 0.57, and the maximum localized error is about 0.92. The maximum

transmission loss without attack and after prevention is very close and varies by only 2 %,

which is very good. The experimental results reveal that the proposed technique successfully

prevents replay attack in WSN.

Keywords:DV-Hop, Localization Error, Node Localization, Replay Attack, Transmission

Loss, Wireless Sensor Network

References:

1. S. Biswas, R. Das, and P. Chatterjee, “Energy-efficient Connected Target Coverage in Multi-hop Wireless Sensor Networks” In Industry Interactive Innovations in Science, Engineering and Technology,2018, pp.411-

421, Springer, Singapore.

2. V. Mittal, S. Gupta, and T. Choudhury, “Comparative Analysis of Authentication and Access Control Protocols against Malicious attacks in Wireless Sensor Networks” In Smart Computing and

Informatics,2018, pp. 255-262, Springer, Singapore.

3. N. Jain, S. Madan and S. K. Malik, “A Charge System Search based DV Hop Algorithm for Wireless Sensor Networks” International Journal of Scientific Research in Computer Science, Engineering and Information

Technology, 2018, 3(1),pp.568-576.

4. O. Cheikhrouhou, G M Bhatti and R. Alroobaea, “A Hybrid DV-Hop Algorithm Using RSSI for Localization in Large-Scale Wireless Sensor Networks” Sensors, 2018, 18(5),pp. 1-14.

5. L. Cui, C. Xu, G. Li, Z. Ming, Y. Feng and N. Lu, “ A High Accurate Localization Algorithm with DV-Hop

and Differential Evolution for Wireless Sensor Network” Applied Soft Computing, 2018, 68, pp.39-52. 6. W. Zhao, S. Su and F. Shao, “ Improved DV-Hop Algorithm Using Locally Weighted Linear Regression in

Anisotropic Wireless Sensor Networks” Wireless Personal Communications, 2018, 98(4), pp.3335-3353.

7. B. Peng and L. Li, “An Improved Localization Algorithm based on Genetic Algorithm in Wireless Sensor Networks”, Cognitive Neurodynamics, 2015, 9(2),pp. 249–256.

8. X. Chen and B. Zhang, “Improved DV-Hop node Localization Algorithm in Wireless Sensor Networks”

International Journal of Distributed Sensor Networks, 2012, pp.1-7. 9. Q. Qian, X. Shen and H. Chen, “An Improved Node Localization Algorithm based on DV-Hop for Wireless

Sensor Networks” Computer Science and Information Systems, 2011, 8(4), pp.953–972.

10. X. Chen and B. Zhang, “Improved DV-Hop Node Localization Algorithm in Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, 2012, pp.1-7.

11. L. Gui, T. Val, A. Wei, and S. Taktak, “An adaptive range free localisation protocol in wireless sensor

networks”, International Journal of Ad Hoc and Ubiquitous Computing, 2014, 15(1–3),pp. 38–56. 12. F. Shahzad, T. R. Sheltami and E. M. Shakshukhi, “ DV-maxHop: A Fast and Accurate Range-Free

430-434

Localization Algorithm for Anisotropic Wireless Networks. IEEE Transactions on Mobile Computing, 2017,

16(9), pp. 2494-2505.

13. S. Kumar and D. K. Lobiyal, “Power Efficient Range-Free Localization Algorithm for Wireless Sensor

Networks”, Wireless Networks, 2014, 20(4), pp. 681–694. 14. S. Kumar and D. K. Lobiyal, “An Advanced DV-Hop Localization Algorithm for Wireless Sensor

Networks. Wireless Personal Communications, 2013, 71(2), pp.1365–1385.

15. W. Ren and C. Zhao, “A Localization Algorithm based on SFLA and PSO for Wireless Sensor Network” Information Technology Journal, 2013, 12(3), pp.502–505.

16. M. Mehrabi, H. Taheri and P. Taghdiri, “An improved DV-Hop Localization Algorithm based on

Evolutionary Algorithms”, Telecommunication Systems, 2017, 64(4), pp.639–647. 17. G. Zhou, T. He, S. Krishnamurthy and J. A. Stankovic, “Models and Solutions for Radio Irregularity in

Wireless Sensor Networks”, ACM Transactions on Sensor Networks (TOSN), 2006, 2(2),pp. 221–262.

18. Z. Dengyi and L. Feng, “Improvement of DV-Hop localization algorithms in wireless sensor networks” In Int Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA), IEEE,

2012,vol. 2, pp. 567–569.

69

Authors: Dr. Pooja Sahni , Dr. Sukhdeep Kaur, Jaswinder Singh, Ripple Sahni

Paper

Title:

Energy Aware Nature InspiredAlgorithm for better energy utilization for Wireless

Sensor Network

Abstract -Wireless sensor nodes are dead very early because of less battery power

availability. If any single node dead in the network then the workload shifted on the other

nodes. By this scenario battery consumption increase of other nodes from the regular

routine, and the whole sensor network down very soon. Every single node in a sensor

network interconnected with each other without the help of the radio waves technology.

Each sensor nodes associated with a batterythat provides sufficient power to complete the

whole tasks, like to sense data, receive data, transmit data,etc. Tasks are huge but the battery

lifetime is limited, this is a major problem in the sensor network. This paper represented a

newly develop Algorithmto better utilization of nodes battery power and make the sensor

network more stable by increasing the lifetime of the sensor nodes.EANIA results proved

that this approach is more energy aware and more secure.

Keywords::Cluster Head,Energy Efficient, Network Lifetime, Sensor Network.

Reference: 1. Heinzeleman, “energy efficient communication protocol for wireless microsensor network”, Hawaii

international conference on system science, 4 January 2000.

2. A. Bouyer, A. Hatamlou, M.Masdari, “A new approach for decreasing energy in wireless sensor networks

with hybrid LEACH protocol and fuzzy C-means algorithm”, International Journal of Communication Networks and Distributed Systems, pp. 400-12, 2015

3. A. Yektaparast, and A. Sarmast, “An improvement on LEACH protocol (cell-leach),” Advanced Comm. Tech.

(ICACT), pp. 992-996, Feb. 2012, 4. A. Manjeshwar; D.P. Agrawal, “TEEN: a routing protocol for enhanced efficiency in wireless sensor

networks”, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001,

Pages: 2009 – 2015, year 2001 5. G. Smaragdakis, I. Matta, and A. Bestavros, “SEP: A stable electionprotocol for clustered heterogeneous

wireless sensor networks,” 2nd international workshop sensor actor-network protocols appl.(SANPA),

Boston, MA, USA, pp.1-1, Aug. 2004. 6. Naranjo PG, Shojafar M, Mostafaei H, Pooranian Z, Baccarelli E., “P-SEP: a prolong stable election routing

algorithm for energy-limited heterogeneous fog-supported wireless sensor networks”, The Journal of

Supercomputing. 73(2):pp. 733-55, Feb 2017. 7. Vijayan K, Raaza A., “A novel cluster arrangement energy-efficient routing protocol for wireless sensor

networks”, Indian Journal of Science and Technology, Feb 2016

8. S.-H. Yang, “Principle of Wireless Sensor Networks”,Wireless Sensor Networks Signals and Communication Technology, Springer-Verlag London 2014.

9. Chandni et al. “Optimization through Bio-Inspired Algorithms in Wireless Sensor Network” Survey and

Future Directions, Volume 2, Spl. Issue 2 2015. 10. FakhrosadatFanian et al., “A Survey of Advanced LEACH-based Protocols”International Journal of Energy,

Information and Communications, Vol.7, Issue 1 (2016), pp.1-16

11. Vinay Kumaret al. “Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011.

435-438

Authors: Jasjeet Singh, Harpreet Kaur

70

Paper

Title:

Congestion Management and Transmission Line Loss Reduction Using TCSC and

Market Split Based Approach

Abstract: Due to increasing power demand in a deregulated power system, the stability of

the power system may get affected and sometimes it may also cause congestion in the

transmission lines of power networks. It is a major issue for a deregulated power system and

its management provides a competition environment to different market players. In this

paper, market split based approach is used to tackle the problem of congestion which split

the system into zones. Locational Marginal Pricing (LMP) method is used to access the

prices at different buses. The objective is to minimize the congestion effect. DC optimal

power flow based system is used to solve such type of problem. TCSC (Thyristor-

Controlled Series Compensation), FACTS (Flexible Alternating Current Transmission

System) device is used to reduce the losses in a transmission system.Market splitting based

approach is effective to manage the prices at different buses and system stability is increased

by using TCSC. The whole work is carried out on IEEE 14 bus system.

Keywords: Locational marginal pricing (LPM), TCSC, DC optimal power flow, Congestion

management

Referenecs: 1. S.Meikandasivam, R. K. Nema, and S. K. Jain, “Selection of TCSC Parameters : Capacitor and Inductor,” no.

2, 2011, pp. 1–5.

2. M. Matcha et al., “Congestion management considering optimal placement of distributed generator in

deregulated power system networks,” IEEE Trans. Power Syst., vol 42, no. 1, 2010, pp. 1–8. 3. A. S. Siddiqui, “Zonal Congestion Management Based on Locational Marginal Price in Deregulated

Electricity Market,” , 2015 pp. 3–6.

4. N. Kirthika and S. Balamurugan, “Pass Through Congestion Management in Deregulated Power System Using Genetic Algorithm,” 2017.

5. A. K. R. K and S. P. Singh, “Congestion mitigation using UPFC,” vol. 8687, pp. 2433–2442, 2016.

6. F. Rahimi and A. Ipakchi, “Demand response as a market resource under the smart grid paradigm,” IEEE Trans. Smart Grid, vol. 1, no. 1, 2010, pp. 82–88.

7. A. J. Conejo, F. Milano, and R. García-Bertrand, “Congestion management ensuring voltage stability,” IEEE

Trans. Powe Syst., vol. 21, no. 1, 2006, pp. 357–364.

8. A. S. Siddiqui, R. Jain, M. Jamil, and C. P. Gupta, “LMP technique for locating series FACTS device (TCSC)

for social welfare benefits in deregulated electricity market,”India Int. Conf. Power Electron. IICPE, 2012.

9. a. Kumar, S. C. Srivastava, and S. N. Singh, “A Zonal Congestion Management Approach Using Real and Reactive Power Rescheduling,” IEEE Trans. Power Syst., vol. 19, no. 1, 2004, pp. 554–562.

10. S. Dutta and S. P. Singh, “Optimal Rescheduling of Generators for Congestion Management Based on Particle

Swarm Optimization,” IEEE Trans. Power Syst., vol. 23, no. 4, 2008, pp. 1560–1569. 11. K. Kaur, N. Kumar, S. Kumar, and K. Khatua, “Congestion management of transmission lines by FACTS

devices using Krill herd technique,” 2017 Innov. Power Adv. Comput. Technol. i-PACT 2017, vol. 2017–

Janua, no. 1, 2018, pp. 1–8. 12. M. Matcha and S. Kumari, “LMP Calculation wutg Distributed Loos using GA based DCOPF,” J. Electr.

Syst., vol. 8, no. 3, 2012, pp. 292–303.

13. M. Oloomi Buygi, H. M. Shanechi, G. Balzer, and M. Shahidehpour, “Transmission planning approaches in restructured power systems,” 2003 IEEE Bol. PowerTech - Conf. Proc., vol. 2, no. March, 2003, pp. 898–904.

14. K. Singh, V. K. Yadav, N. P. Padhy, and J. Sharma,“Congestion management considering optimal placement of distributed generator in deregulated power system networks,” Electr. Power Components Syst., vol. 42, no.

1, 2014, pp. 13–22.

15. M. Sarwar and A. S. Siddiqui, “Congestion Management in Deregulated Electricity Market Using Distributed Generation,” Ieee Indicon, no. 1, 2005, pp. 1–5.

16. R. Leou and J. Teng, “A Transmission Plan Considering Uncertainties Under a Deregulated Market,” vol. 6,

2011, pp. 33–37. 17. M. Afkousi-Paqaleh, A. Abbaspour-Tehranifard, M. Rashidinejad, and K. Lee, “Optimal placement and sizing

of distributed resources for congestion management considering cost/benefit analysis,” Power Energy Soc.

Gen. Meet. 2010 IEEE, 2010, pp. 1–7. 18. P. P. Kulkarni and N. D. Ghawghawe, “Optimal Placement and Parameter Setting of TCSC in Power

Transmission System toIncrease the Power Transfer Capability,” Int. Conf. Energy Syst. Appl., no. Icesa,

2015, pp. 735–739. 19. S.E. Gasim and J. Jasni," Power System Security Enhancement and Loss Reduction using the SMART Power

Flow Controller" ,IEEE Innovative smart grid Technologies - Asia (ISGT ASIA) ,2014,pp.307-311.

20. N. A. Belyaev ; N. V. Korovkin ; V. S. Chudny , "Reduction of active power loss in electric power system with optimal placement of FACTS device", 2015 IEEE NW Russia Young Researchers in Electrical and

Electronic Engineering Conference (EIConRusNW) , 2015, pp. 150-154

21. I. S. Latypov ; V. V. Sushkov, reduction of active power loss in overhead power transmission lines rated for 6-35kv, 2016 Dynamics of Systems, Mechanisms and Machines (Dynamics), 2016,

439-446

22. G. Hocine ; L. Fatiha ; F.Z Gherbi ; A. Labiba "The intrest of SACTS to improve voltage and loss reduction in

the western Algerian network 2012”, 2015 4th International Conference on Electrical Engineering (ICEE) ,

2012,pp.1-6.Vol: 5 , Issue: 6,2014,pp: 2739 – 274

71

Authors: Afshan Hassan, Rajeev Sharma, Gurbaj Singh

Paper

Title:

Detection & Mitigation Of Selfish Node In Wireless Mesh Networks

Abstract: Wireless Mesh networks (WMN’s) are prone to a number of attacks & these

attacks compromise the security of these networks. Attaining security in these networks is a

challenging task. It is logical to consider that there are many types of scripts in the internet.

The virus can either be a key logger or somebody else's mischief. With this script we can

steal any information. Since the existence of virus cannot be ignored, therefore the authors

have tried to present their work on first detecting it and later on fixing it. With the help of

different protocols present in the Application Layer ,a hacker takes information out of the

script. The authors have used Covert Channel, which has been mentioned in many essays.

Now with the help of this channel, the information will go to all and it will not go to any of

the informatics. This research proposal envisions a methodology to first detect the selfish

node in the network & later on provides a technique for mitigation of the same.NS2

simulator has been used to simulate & analyze the performance of our proposed

methodology for Open Shortest Path First(OSPF) protocol in WMN’s.

Keyword: Wireless Mesh Networks(WMN’s), Distributed Denial Of Service (DDoS),

covert channel, Media Access Control (MAC), Open Shortest Path First(OSPF),Switch port

analyzer, Intrusion Detection Systems(IDS), Packet Delivery Ratio(PDR)

Referenecs: 1. Ali Mahmodi, Parisa Daneshjoo, Changez Delara,”Using Genetic Algorithm to Improve Bernoulli Naïve

Bayes Algorithm in Order to Detect DDoS Attacks in Cloud Computing Platform”2018

2. E. Cedex, “Protecting Wireless Mesh Networks through a Distributed Intrusion Prevention Framework,” ,

2015, pp. 1–6. 3. H. Al-Mefleh and O. Al-Kofahi, “Taking advantage of jamming in wireless networks: A survey,” Computer

Networks, vol. 99, 2016, pp. 99–124.

4. Y. Yu, Z. Ning, Q. Song, L. Guo, and H. Liu, “A Dynamic Cooperative Monitor Node Selection Algorithm in Wireless Mesh Networks,” 2015.

5. T. Sommestad and F. Sandström, “Information Computer"2014

6. Security & quot; Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: An empirical test of the accuracy of an attack graph analysis tool,” Inf. Computer. Security, vol. 23, no. 5,

2015, pp. 516–531.

7. M.Baskar,T.Gnansekaran,J.Frank Vijay: Time Variant Predicate Based Traffic Approximation Algorithm for Efficient low Rate DDoS Attack TAGA Journal,2018 ,Vol 14

8. M. Mehic, J. Slachta, and M. Voznak, “Whispering through DDoS attack,” Perspect. Sci., vol. 7, 2016, pp.

95–100. 9. O. Cheikhrouhou, “Secure Group Communication in Wireless Sensor Networks: A survey,” J. Network.

Computing. Appl., vol. 61, 2016, pp. 115–132.

10. R. Upadhyay, Salman Khan,Herendra Tripathi,Uma Rathore Bhatt"Conference on Computing and Network Communications(CoCONet'15)",2015

11. D. Kaur and P. Singh, “Various OSI Layer Attacks and Countermeasure to Enhance the Performance of

WSNs during Wormhole Attack,” vol. 5, 2014, no. 1. 12. M. Ahmed, A. N. Mahmood, and J. Hu, “Journal of Network and Computer Applications A survey of network

anomaly detection techniques,” J. Network. Computing. Appl., vol. 60, 2016, pp. 19–31.

13. E. Technique and F. Preventing, “Enhanced Technique For Preventing and Isolating Distributed Denial of Service Attack in Wireless Mesh Networks,” pp. 1–38.

447-454

Authors: Abdul Khader Valli T, Monica Mittal

Paper

Title:

Analysis of fractional systems using Haar wavelet

72

.

Abstract: Wavelets are relatively new tool and have quite been thriving domain in

mathematical research. Numerical solutions of differential and integral equations require

development of accurate and fast algorithms based on wavelets. This is more pertinent for

those problems having localized solutions, both in position and scale. Haar wavelet offers a

promising solution bases due to simple mathematical expressions and multi-resolution

properties. In this paper, A Haar wavelet based method to solve partial differential equations

(PDE) modeling fractional systems is presented. Operational approach is based on

representing various integro-differential mathematical operations in terms of matrices. In

this article, firstly introduction of Haar wavelet and different operational matrices used for

the analysis of fractional systems are presented. A modified computational technique is

explained to solve variety of partial differential equations modeling systems of fractional

order. This method achieves the solutions by solving Sylvester equation using MATLAB.

Demonstrations are provided with the help of two illustrative examples by suitable

comparisons with exact solutions.

Keyword: Fractional partial differential equations (FPDE), Haar wavelet, Fractional

calculus, Operational matrices, Sylvester equation.

Referenecs: 1. F. Liu, V. Anh, I. Turner, “Numerical solution of the space fractional Fokker–Planck equation,” J. Comput.

Appl. Math., 166 (2004), pp. 209-219.

2. S .A. EI-Wakil, A. Elhanbaly, M.A. Abdou, “Adomian decomposition method for solving fractional nonlineardifferential equations,” Appl. Math. Comput., 182 (2006), pp. 313-324.

3. S. Chen, F. Liu, “Finite difference approximations for the fractional Fokker–Planck equation,” Appl. Math.

Model., 33 (2009), pp. 256-273. 4. A. Calderon, B. Vinagre, “Fractional order control strategies for power electronic buckconverters,” Signal

Process., 86 (2006), pp. 2803-2819.

5. M. Tavazoei, M. Haeri, “Chaos control via a simple fractional-order controller,” Phys. Lett. A, 372 (2008), pp. 798-807.

6. Li Zhu, Qibin Fan, “Solving fractional nonlinear Fredholm integro–differentialequations by the second kind

Chebyshev wavelet,” Commun. Nonlinear Sci. Numer. Simul., 17 (2012), pp. 2333-2341. 7. Zaid M. Odibat, “A study on the convergence of variational iteration method,” Math. Comput. Model., 51

(2010), pp. 1181-1192.

8. I.L. EI-Kalla, “Convergence of the Adomian method applied to a class ofnonlinear integral equations,” Appl. Math. Comput., 21 (2008), pp. 372-376.

9. M.M. Hosseini, “Adomian decomposition method for solution of nonlinear differential algebraic equations,”

Appl. Math. Comput., 181 (2006), pp. 1737-1744. 10. Shaher Momani, Zaid Odibat, “Generalized differential transform method for solving a space and time-

fractional diffusion-wave equation,” Phys. Lett. A, 370 (2007), pp. 379-387.

11. Zaid Odibat, Shaher Momani, “Generalized differential transform method: application todifferential equations of fractional order,” Appl. Math. Comput., 197 (2008), pp. 467-477.

12. Abbas Saadatmandi, Mehdi Dehghan, “A new operational matrix for solving fractional-order

differentialequations,” Comput. Math. Appl., 59 (2010), pp. 1326-1336 13. Y. Zhang, “A finite difference method for fractional partial differential Equation,” Appl. Math. Lett., 215

(2009), pp. 524-529

14. Y.M. Chen, Y.B. Wu, et al., “Wavelet method for a class of fractional convection–diffusionequation with variable coefficients,” J. Comput. Sci., 1 (2010), pp. 146-149.

15. H. Jafari, S.A. Yousefi, “Application of Legendre wavelets for solving fractionaldifferential equations,”

Comput. Math. Appl., 62 (2011), pp. 1038-1045. 16. I. Podlubny, “Fractional Differential Equations,” Academic press (1999).

17. Khushboo Kumari , Monika Mittal, “State analysis of singular time-varying bilinear systems using non-

recursive Haar wavelet operational approach,” 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT-2017).

18. Zaid Odibat, Shaher Momani, “A generalized differential transform method for linear partial differential

equations of fractional order,” Appl. Math. Lett., 21 (2008), pp. 194-199. 19. Y.L. Li, N. Sun, “Numerical solution of fractional differential equations using thegeneralized block pulse

operational matrix,” Comput. Math. Appl., 62 (2011), pp. 1046-1054.

20. Ming xu Yi , Jun Huang , Jin xia Wei, “Block pulse operational matrix method for solving fractional partial differential equation,” Applied Mathematics and Computation, volume 221, 15 September 2013, Pages 121-

131.

21. M Garg, L Dewan, “Non-recursive Haar Connection Coefficients Based Approach for Linear Optimal Control,” Journal of Optimization Theory and Applications 153 (2) , 2012, 320-337.

22. M Garg, L Dewan, “A numerical method for linear ODEs using non-recursive Haar connection coefficients,”

International Journal of Computational science and Mathematics (IJCSM), 2010.

455-459

.

.

73.

Authors: Samarth Negi, Navneet Yadav, Rahul Rawat, Rishabh Singh

Paper

Title:

An Effective Technique for Determining Fish Freshness using Image Processing

Abstract: This paper presents an efficient image processing based algorithm to determine

the freshness of a fish. The determination is made after judging the condition of the eyes and

the gills of the sample. The method is applicable for most edible fishes and can be easily

reconfigured by changing the effect that the two determinants have on the final outcome.

The novelty of the method lies in the ability of the algorithm to easily adapt to new samples

which is a result of the universal applicability of the parameters selected. The method shows

highly accurate results when compared to the ground truth.

Keyword: Digital Image Processing, Image Segmentation, Fish Quality

Referenecs: 1. A. Danti, J. Y. Kulkarni and P. Hiremath, "An Image Processing Approach to Detect Lanes, Pot Holes and

Recognize Road Signs in Indian Roads," International Journal of Modeling and Optimization, vol. 2, 2012,

pp. 658-662.

2. N. Yadav, "DWT--SVD--WHT Watermarking Using Varying Strength Factor Derived From Means of the WHT Coefficients,” Arabian Journal for Science and Engineering, vol. 43(8), 2017, pp. 4131-4143.

3. M.T.-Salazar, L. E. C.-Suarez, D. R.-Marie, I. H. Pike et al. "Effect of fishmeal made from stale versus fresh

herring and of added crystalline biogenic amines on growth and survival of blue shrimp Litopenaeus stylirostris fed practical diets," Aquaculture. vol. 242(1-4), 2004, pp. 433-449.

4. S. V. Joshi, "To Study the Relationship between Indian Food Habits and Health for Healthy India," Imperial

Journal of Interdisciplinary Research (IJIR), vol. 3(3), 2017, pp. 1120-1122. 5. I. C. Navotas, C. N. V. Santos, E. J. M. Balderrama, F. E. B. Candido et al. "Fish identification and freshness

classification through image processing using artificial neural network," Journal of Engineering and Applied

Sciences, vol. 13(18), pp. 4912-4922. 6. A. Issac, M. K. Dutta, B. Sarkar and R. Burget, "An efficient image processing based method for gills

segmentation from a digital fish image," 2016 3rd International Conference on Signal Processing and

Integrated Networks (SPIN), Noida, 2016, pp. 645-649. 7. G. Xue, W. Yu, L. Yutong, Z. Qiang et al. "Construction of novel xanthine biosensor by using Zinc Oxide

(ZnO) by biotemplate method for detection of fish freshness," Analytical Methods. vol. 11(8), 2019,

10.1039/C8AY02554A.

8. A. Karagöz, "Fish Freshness Detection by Digital Image Processing, " Dokuz Eylül University ,Iżmir, Turkey,

2013, Available: http://acikerisim.deu.edu.tr

9. G. Ólafsdóttir, E. Martinsdottir, J. Oehlenschläger, P. Dalgaard, B. Jensen, et al. "Method to evaluate fish freshness in research and industry," Trends in Food Science & Technology, vol. 8(8), 1997, pp. 258-265.

10. Z. Chen, Y. Lin, X. Ma, L. Guo, , B. Qiu, G. Chen and Z. Lin, "Multicolor biosensor for fish freshness

assessment with the naked eye," Sensors and Actuators B: Chemical.vol. 252, 2017, pp. 201-208. 11. V. Lougovois, Freshness Quality and Spoilage of Chill-Stored Fish. ISBN 1-59454-408-5, 2005, pp. 35-36

12. J. J. Connell, Control of Fish Quality; 4th ed.; Fishing News Books Ltd.: Farnham, Surrey, 1995; pp 1-4, 37-

48, 135-164

460-464

Authors: Divya Thakur, Rajdeep Kaur

Paper

Title:

An Optimized CNN based Real World Anomaly Detection in Surveillance Videos

Abstract: Anomaly detection in automated surveillance video is an extremely monotonous

process for monitoring for crowded scenes and surveillance videos are capable to

incarcerate a mixture of sensible anomalies. An appropriate machine learning technique can

help to train the Anomaly Detection System (ADS) in identifying anomalous activities

during surveillance. To this end, we present an anomaly detection system that can be used as

a tool for anomaly detection in surveillance videos using the concept of artificial

intelligence. The main intention of the proposed anomaly detection system is to improve the

detection time and accuracy by using the concept of Convolutional Neural Network (CNN)

74

.

as artificial intelligence technique. In this paper we present a CNN based Anomaly

Detection System (CNN-ADS), which is the combination of multiple layer of hidden unit

with the optimized MSER feature by using Genetic Algorithm (GA). Here CNN is used for

classifying the activity into normal and abnormal from the surveillance videos based on the

fitness function of GA which is used for the selection of optimal MSER feature sets.

Further, Self adaptive genetic algorithm (SAGA) is adopted to efficiently solve optimization

problems in the continuous search domain to select the best possible feature to segregate the

pattern of normal and abnormal activities. The main contribution of this research is

validation of proposed system for the large scale data and we introduce a new large-scale

dataset of 128 hours of videos. Dataset consists of 1900 long and untrimmed real-world

surveillance videos, with 13 sensible anomalies such as road accident, burglary, fighting,

robbery, etc. as well as normal activities. The experimental results of the planned system

show that our CNN-ADS for anomaly detection achieve essential improvement on anomaly

detection presentation as compared to the state-of-the-art approaches. The dataset is

available at: https://webpages.uncc.edu/cchen62/dataset.html. In this paper, to validate the

proposed ADS we provide the comparison of existing results of several recent deep learning

baselines on anomalous activity detection. The real-time ADS in surveillance video

sequences using SAGA based CNN with MSER feature extraction technique is implemented

using Image Processing Toolbox within Matlab Software.

Keyword: Anomaly Detection System (ADS), Convolutional Neural Network (CNN),

MSER Feature Extraction, Pattern recognition, Genetic Algorithm (GA).

Referenecs: 1. Sultani, Waqas, Chen Chen, and Mubarak Shah. "Real-world anomaly detection in surveillance videos."

Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018.

2. Hsu, Shih-Chung, et al. video-based abnormal human behavior detection for psychiatric patient monitoring." Advanced Image Technology (IWAIT), 2018 International Workshop on. IEEE, 2018.

3. Huang, Shaonian, Dongjun Huang, and Xinmin Zhou. "Learning Multimodal Deep Representations for

Crowd Anomaly Event Detection." Mathematical Problems in Engineering 2018 (2018). 4. Cheng, Kai-Wen, Yie-Tarng Chen, and Wen-Hsien Fang. "Gaussian process regression-based video anomaly

detection and localization with hierarchical feature representation." IEEE Transactions on Image Processing

24.12 (2015): 5288-5301 5. Cheng, Kai-Wen, Yie-Tarng Chen, and Wen-Hsien Fang. "Video anomaly detection and localization using

hierarchical feature representation and Gaussian process regression." Proceedings of the IEEE Conference on

Computer Vision and Pattern Recognition. 2015. 6. Agrawal, Vartika, and Satish Chandra. "Feature selection using Artificial Bee Colony algorithm for medical

image classification." Contemporary Computing (IC3), 2015 Eighth International Conference on. IEEE, 2015.

7. Subanya, B., and R. R. Rajalaxmi. "Feature selection using Artificial Bee Colony for cardiovascular disease classification." Electronics and Communication Systems (ICECS), 2014 International Conference on. IEEE,

2014.

8. Uijlings, Jasper RR, et al. "Realtime video classification using dense hof/hog." Proceedings of international conference on multimedia retrieval. ACM, 2014

9. Abu-Mouti, Fahad S., and Mohamed E. El-Hawary. "Overview of Artificial Bee Colony (ABC) algorithm

and its applications." Systems Conference (SysCon), 2012 IEEE International. IEEE, 2012. 10. Kharazmi, Pegah, et al. "Automated detection and segmentation of vascular structures of skin lesions seen in

Dermoscopy, with an application to basal cell carcinoma classification." IEEE journal of biomedical and health informatics 21.6 (2017): 1675-1684.

11. M. J. Khan, A. Zafar and K. S. Hong, “Comparison of brain areas for executed and imagined movements after

motor training: An fNIRS study,” 2017 10th International Conference on Human System Interactions (HSI), Ulsan, South Korea, 2017, pp. 125-130.

12. R. Majid Mehmood, R. Du and H. J. Lee, “Optimal Feature Selection and Deep Learning Ensembles Method

for Emotion Recognition from Human Brain EEG Sensors,” in IEEE Access, vol. 5, no. , pp. 14797-14806, 2017.

13. A Minz and C. Mahobiya, “MR Image Classification Using Adaboost for Brain Tumor Type,” 2017 IEEE 7th

International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 701-705. 14. H. Rao, P. V. Naganjaneyulu and K. S. Prasad, “Brain Tumor Detection and Segmentation Using Conditional

Random Field,” 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp.

807-810. 15. R. A. Jasmine and P. A. J. Rani, “A two phase segmentation algorithm for MRI brain tumor extraction,” 2016

International Conference on Control, Instrumentation, Communication and Computational Technologies

(ICCICCT), Kumaracoil, 2016, pp. 437-440. 16. M. Gupta, B. V. V. S. N. P. Rao and V. Rajagopalan, “Brain Tumor Detection in Conventional MR Images

Based on Statistical Texture and Morphological Features,” 2016 International Conference on Information

465-473

Technology (ICIT), Bhubaneswar, 2016, pp. 129-133

17. G. Singh and M. A. Ansari, “Efficient detection of brain tumor from MRIs using K-means segmentation and

normalized histogram,” 2016 1st India International Conference on Information Processing (IICIP), Delhi,

2016, pp. 1-6.

75

.

Authors: Abhas Kanungo, Monika Mittal, Lillie Dewan

Paper

Title:

Optimal parameter tuning of MRPID controller for temperature control

Abstract: This paper presents the optimal tuning of gain parameters of Multi-resolution

PID controller for thermal system. Control of temperature in thermal system is very

important. MRPID controller utilizes the multi-resolution property of wavelet transform to

decompose the error signal in to different frequency components. Further different

coefficients of wavelet are used to generate the control signal. To generate the desired

control, optimal tuning is required. In this paper, optimal tuning of MRPID controller is

done by genetic algorithm (GA) & Particle swarm optimization (PSO). At the end,

performance comparison between these two techniques is done and concluded. Wavelet-

based MRPID controller is executed in MATLAB/Simulink@2015a.

Keyword: Thermal system, MRPID Controller, GA and PSO, MWT

Referenecs: 1. Jino, Y., Matsumoto, S., & Kamito, A. “Risk based Model Predictive Control with hybrid system structure

and its application to Thermal Power Plants”. 2006 SICE-ICASE International Joint Conference.doi:10.1109/sice.2006.315571

2. Emami-Naeini, A., Ebert, J. L., de Roover, D., Kosut, R. L., Dettori, M., Porter, L. M. L., & Ghosal,

S.”Modeling and control of distributed thermal systems”. IEEE Transactions on Control Systems Technology, 11(5), 668–683.doi:10.1109/tcst. 2003.816411.

3. Dong, Z., Su, Y., & Yan, X. “Temperature Control System of the Thermal Analyzer Based on Fuzzy PID

Controller”. 2009 Ninth International Conference on Hybrid Intelligent Systems.doi:10.1109/his.2009.123 4. Dong, Z., Su, Y., & Yan, X. “Temperature Control System of the Thermal Analyzer Based on Fuzzy PID

Controller”. Ninth International Conference on Hybrid Intelligent Systems.doi:10.1109/his.2009.123.

5. C. C. Hang, K. J. Aström, and W. K. Ho, “Refinements of the Ziegler– Nichols tuning formula”, Proc. Inst. Elect. Eng.—Control Theory Appl., vol. 138, no. 2, pp. 111–118,1991.

6. J. G. Ziegler and N. B. Nichols, “Optimal settings for automatic controllers, Trans. ASME”, vol. 64, no. 11,

pp. 759–768,1942. 7. Abhas Kanungo, Monika Mittal, Lillie Dewan , “Comparison of Haar and Daubechies Wavelet Denoising for

PID Controlled Thermal System”, Journal of Advanced Research in Dynamical and Control Systems,2018,

issue 9, pp 2405-2411. 8. Tang, K. S., Kim Fung Man, Guanrong Chen, & Kwong, S. “An optimal fuzzy PID controller”. IEEE

Transactions on Industrial Electronics, 48(4), 2001,757–765. doi:10.1109/41.937407. 9. Hari Om Bansal, Rajamayyoor Sharma, P. R. Shreeraman , “ PID Controller Tuning Techniques: A Review”,

Journal of Control Engineering and Technology (JCET) ,2012,Vol. 2 Iss. PP. 168-176.

10. Khan, M.A.S.K. and M.Azizur Rahman, "Implementation of wavelet-based controller for battery storage system of hybrid electric vehicles", IEEE Transactions on Industry Applications, 2011,Vol.47, No.5, pp.2241-

2249.

11. Das, P., Edavoor, P. J., Raveendran, S., Rathore, S., & Rahulkar, A. D. Design and implementation of PID controller based on orthogonal wavelet filter-banks in FPGA. 2017 7th International Symposium on

Embedded Computing and System Design (ISED). doi:10.1109/ised.2017.8303928

12. Parvez, Shahid and Zhiqiang Gao, "A wavelet-based multiresolution PID controller", IEEE Transactions on

Industry Applications, 2005, Vol.41, No.2, pp.537-543.

13. Vajpayee, Vineet, Siddhartha Mukhopadhyay and AkhilanandPatiTiwari, "A Multi resolution Wavelet based

Subspace Identification", An International Journal of IFAC ,2016, Vol.49, No.1, pp.247-253. 14. Dewan L and Garg M. , “A Numerical Method for Linear ODEs using

Non-recursive Haar Connection Coefficients”, International Journal of Computational and Applied

Mathematics (IJCAM) vol. 2 no.3b,pp 429-440,2012. 15. Khan, M.Abdesh SK and M.AzizurRahman , "A novel neuro-wavelet-based self-tuned wavelet controller for

IPM motor drives", IEEE Transactions on Industry Applications, 2010,Vol.46, No.3, pp.1194-1203.

16. Kanungo, A., Dewan, L., & Mittal, M.,” Performance improvement of a thermal system PID controller using Haar wavelet based denoising”. International Conference on Industrial Instrumentation and Control (ICIC).

2015, doi:10.1109/iic.2015.7150773.

17. Khan, M. A. S. K., & Rahman, M. A. “Implementation of a Wavelet-Based MRPID Controller for Benchmark Thermal System”. IEEE Transactions on Industrial Electronics, 57(12), 2010 ,4160–

4169.doi:10.1109/tie.2010.2044121

474-477

18. S. Parvez,, “Advanced control techniques for motion control problem”,2003, Ph.D. dissertation, Cleveland

State Univ., Cleveland.

19. Meena, D. C., & Devanshu, A. “Genetic algorithm tuned PID controller for process control”. 2017

International Conference on Inventive Systems and Control (ICISC). doi:10.1109/icisc.2017.8068639. 20. Seekuka, J., Rattanawaorahirunkul, R., Sansri, S., Sangsuriyan, S., & Prakonsant, A. “AGC using Particle

Swarm Optimization based PID controller design for two area power system.” International Computer

Science and Engineering Conference (ICSEC). doi:10.1109/icsec.2016.7859951. 21. Aranza, M. F., Kustija, J., Trisno, B., & Hakim, D. L. “Tunning PID controller using particle swarm

optimization algorithm on automatic voltage regulator system”. IOP Conference Series: Materials Science and

Engineering, 2016,128, 012038. doi:10.1088/1757-899x/128/1/012038

76

Authors: Jahangir Kamal, Dr. Meenu Dave

Paper

Title:

A Framework for Managing and Analyzing Big Data in Indian School Education System

with Reference to Jammu & Kashmir

Abstract: Big Data storm has reached all most in every sector whether be public or private

and is an important decision making factor for the administration or governing body of any

system or organization, because with the advancements in technologies, various public,

private, and social organizations are creating or exchanging a huge volume of data through

different sources in various formats. Big Data can be applied in various sectors of India,

wherein one of the essential sectors is education system where Big Data analytics is slowly

and steadily finding its place for betterment of the services being provided by this system.

India has one of the biggest school systems in the world which is spread over different states

of the country and one part of this system is functional in one of the northern states of India

known as Jammu and Kashmir (J&K). This study is based on Big Data management and

analysis in School Education System of J&K. In the area of School Education in J&K,

computers are finding an important place for data management as well as imparting learning

through digital means. There is a need of applying Big Data technologies to various aspects of

the School Education in J&K, as huge amount of data with variety and high frequency of

generation is available in the institutes under this system. This paper will analyze various

aspects of Big Data management and analysis system for School Education of J&K. This

paper will also highlight the current scenarios of School Education System of J&K in

handling Big Data such as sources of Big Data, Scope of Big Data analytics in School

Education System of J&K, opportunities of Big Data analytics, challenges and issues that can

be faced in this system, Applications of Big Data analytics in School Education of J&K, and

finally discussing the proposed architecture of Big Data management and analysis system for

School Education of J&K.

Keyword: Big Data, School Education, Analytics, Hadoop, HBase.

References:

1. , H. M. El-Bakry et al, “Enhancing Big Data Processing in Educational Systems,” Advances in Computers and

Technology for Education, 2014, pp.176-181.

2. Rao and K. Baglodi, “Role of Big Data in Education Sector: A Review,” International Journal of Advances in

Science Engineering and Technology, vol. 6, issue 1,spl. Issue 1, Feb. 2018. 3. F. Fayaz and S. Mehta, “Analysis of Education Sector-Study of Kerala and Jammu & Kashmir,” IOSR Journal

of Humanities and Social Science (IOSR-JHSS), vol. 23, issue 3, March 2018, pp. 44-51.

4. Y. Li and X. Zhai, “Review and Prospect of Modern Education Using Big Data,” Procedia Computer Science,

ELSEVIER, vol. 129, 2018, pp. 314-347.

5. Vatsala, R. Jadhav and Sathyaraj, “A Review of Big Data Analytics in Sector of Higher Education,”

International Journal of Engineering Research and Application, vol. 7, issue 6, part 2, June 2017, pp. 25-32. 6. Manohar, P. Gupta et al, “Utilizing Big Data Analytics to Improve Education,” Semantic Scholar, 2016.

Available:https://www.semanticscholar.org/paper/Utilizing-Big-Data-Analytics-to-Improve-Education-

Manohar-Gupta/1792463683531cd5db886972d96b92aea75db18e 7. P. Dar, “Top 7 Sectors where Data Science can transform India,” August 16, 2018. Available:

https://www.analyticsvidhya.com/blog/2018/08/top-7-sectors-where-data-science-can-transform-india-with-

free-datasets/ 8. Peterson, “Big Data in Education: New Efficiencies for Recruitment, Learning, and Retention of Students and

Donors,” Handbook of statistical Analysis and Data Mining Applications, Academic Press ELSEVIER, United

Kingdom, 2nd ed., chap. 13, 2018, pp. 259-278. 9. J. Kohlhammer, D. Keim et al, “Solving Problems With Visual Analytics,” Procedia Computer Science,

ELSEVIER, vol.7, 2011, pp. 117-120.

10. L. Khanna, S. N. Singh, and M. Alam, “Educational Data mining and its Role in Determining Factors Affecting

478-493

Students Academic Performance: A Systematic Review,” In Proceedings of 1st India International Conference

on Information Processing (IICIP), IEEE, Aug. 2016, pp. 1-7.

11. U. Kumar, “Bringing Big Data to Your School’s Analytics,” Higher Education Marketing, September 3, 2013.

Available: http://www.highereducationmarketing.com/blog/bringingbigdataschoolsanalytics 12. Q. Liu, Y. Fu, G. Ni and J. Mei, "Big Data Management Performance Evaluation in Hadoop Ecosystem," In

Proceedings of 3rd International Conference on Big Data Computing and Communications (BIGCOM), IEEE,

2017, pp. 413-421. 13. W. T. Wu, W. W. Lin et al, “Energy-efficient hadoop for big data analytics and computing: A systematic

review and research insights,” Future Generation Computer Systems, ELSEVIER, vol. 86, sep. 2018, pp. 1351-

1367. 14. C.T. Yang et al, “Implementation of Data Transform Method into NoSQL Database for Healthcare,” In

proceedings of International Conference on parallel and Distributed Computing, Applications and

Technologies, IEEE, Dec. 2013, pp. 198-205. 15. N. V. Patil and T. Patel, “Apache Hadoop: Resourceful Big Data management,” International Journal of

Innovative Research in Science, Engineering and Technology, vol. 3, special issue 4, April 2014, pp. 201-209.

77

Authors: Anand Shanker Tewari, Aleesha S.J.

Paper

Title:

Generating Quality Items Recommendation by Fusing Content based and Collaborative

filtering

Abstract: Recommendation system has become an inevitable part of our life. It has already

spread its prominence in various fields like movies, music, news, article recommendations

etc. Due to the influence of social media, data is streaming from all over the Internet. Collect

the relevant information from chunks of data available has become much difficult.

Recommender systems guides in filtering data to get the relevant information. Commonly

used recommendation approaches are content based filtering and collaborative filtering. Each

approach has its own limitations. The hybrid approach combines the advantages of both the

approaches. In this paper, we have tried to enhance the quality of the items recommendation

system by fusing both content based and collaborative filtering uniquely. The experimental

results are compared with that of other traditional approach using precision and recall

evaluation measure. The comparison results show that our approach has 10% better precision

for top-10 recommendations than other established recommendation technique.

Keyword: E-commerce, Content based filtering, Collaborative filtering, Hybrid

Recommendation System.

References: 1. Boutemedjet, Sabri, and DjemelZiou. “A graphical model for context-aware visual content

recommendation.”IEEE Transactions on Multimedia 10.1 (2007): 52-62.

2. Pazzani, Michael J. “A framework for collaborative, content-based and demographic filtering.” Artificial

intelligence review13.5-6 (1999): 393-408. 3. Pazzani, Michael J., and Daniel Billsus. "Content-based recommendation systems." The adaptive web. Springer,

Berlin, Heidelberg, 2007. 325-341.

4. Herlocker, Jon, Joseph A. Konstan, and John Riedl. “An empirical analysis of design choices in neighborhood-based collaborative filtering algorithms.” Information retrieval 5.4 (2002): 287-310.

5. Salter, James, and Nick Antonopoulos. “Cinema Screen recommender agent: combining collaborative and

content-based filtering.” IEEE Intelligent Systems 21.1 (2006): 35-41. 6. Adomavicius, Gediminas, and Alexander Tuzhilin. “Toward the next generation of recommender systems: A

survey of the state-of-the-art and possible extensions.”IEEE Transactions on Knowledge & Data Engineering 6

(2005): 734-749. 7. Wei, Suyun, et al. "Item-based collaborative filtering recommendation algorithm combining item category with

interestingness measure." 2012 International Conference on Computer Science and Service System. IEEE,

2012. 8. Qin, Jie, Lei Cao, and Hui Peng. "Collaborative filtering recommendation algorithm based on weighted item

category." 2016 Chinese Control and Decision Conference (CCDC). IEEE, 2016..

9. Yi Mu, Nianhao Xiao, Ruichun Tang, Liang Luo, Xiaohan Yina. “An Efficient Similarity Measure for Collaborative Filtering.” Procedia computer science 147 (2019): 416-421

10. Gandhi, Sonali, and Monali Gandhi. "Hybrid Recommendation System with Collaborative Filtering and

Association Rule Mining Using Big Data." 2018 3rd International Conference for Convergence in Technology (I2CT). IEEE, 2018.

11. Tewari, Anand Shanker, and Kumari Priyanka. "Book recommendation system based on collaborative filtering

and association rule mining for college students." 2014 International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2014.

12. Kardan, Ahmad A., and Mahnaz Ebrahimi. “A novel approach to hybrid recommendation systems based on

association rules mining for content recommendation in asynchronous discussion groups.” Information

494-498

Sciences 219 (2013): 93-110

13. Puntheeranurak, Sutheera, and Thanut Chaiwitooanukool. "An Item-based collaborative filtering method using

Item-based hybrid similarity." 2011 IEEE 2nd International Conference on Software Engineering and Service

Science. IEEE, 2011. 14. Yang, S., Korayem, M., AlJadda, K., Grainger, T., & Natarajan, S. (2017). Combining content-based and

collaborative filtering for job recommendation system: A cost-sensitive Statistical Relational Learning

approach. Knowledge-Based Systems, 136, 37-45. 15. Zihayat, M., Ayanso, A., Zhao, X., Davoudi, H., & An, A. (2019). A utility-based news recommendation

system. Decision Support Systems, 117, 14-27.

16. Ochirbat, A., Shih, T. K., Chootong, C., Sommool, W., Gunarathne, W. K. T. M., Wang, H. H., & Ma, Z. H. (2018). Hybrid occupation recommendation for adolescents on interest, profile, and behavior. Telematics and

Informatics, 35(3), 534-550.

17. Lucas, Joel P., Nuno Luz, MaríA N. Moreno, Ricardo Anacleto, Ana Almeida Figueiredo, and Constantino Martins. "A hybrid recommendation approach for a tourism system." Expert Systems with Applications 40, no.

9 (2013): 3532-3550.

18. Wei, Shouxian, Xiaolin Zheng, Deren Chen, and Chaochao Chen. "A hybrid approach for movie recommendation via tags and ratings." Electronic Commerce Research and Applications18 (2016): 83-94.

19. Tewari, Anand Shanker, and Asim Gopal Barman. “Collaborative recommendation system using dynamic

content based filtering, association rule mining and opinion mining.” Int. J. Intell. Eng. Syst 10.5 (2017): 57-

66.

20. Tewari, Anand Shanker, Jyoti Prakash Singh, and Asim Gopal Barman. “Generating Top-N Items

Recommendation Set Using Collaborative, Content Based Filtering and Rating Variance.” Procedia computer science 132 (2018): 1678-1684.

78

Authors: Nidhi Gaur, Anu Mehra, Shikha Bathla, Pradeep Kumar

Paper

Title:

Delay Efficient Vedic Multiplier for DSP

Abstract: Multipliers are very essential blocks in any arithmetic and logic unit, accumulators

and Digital signal processors. Due to the enlarging check on delay, design of faster

multipliers is desired. Amidst numerous multipliers, Vedic multipliers are favored for

their speed of operation. There are sixteen sutras in Vedic mathematics out of which four are

multiplication techniques. “URDHVA TIRYAKBHYAM” is the most efficient vedic

multiplication technique in terms of speed. In this paper we aim to develop a multiplier using

Ripple Carry Adder and parallel prefix adders which carry out the “URDHVA

TIRYAKBHYAM” sutra with improved speed of operation by providing the minimum

delay for the multiplication of numbers regardless of their bit sizes. A vast

majority of the engineering domain consists of ubiquitous technologies like DSP. As it is

one of the most rapid growing technologies of the 21st Century, it faces challenges and

improvisation at each step. Engineers are working diligently to improve the quality of

Digital Signal processors and major breakthroughs are being made at a very good

rate. Proposed multiplier could be applied for such DSP applications. Verilog

language has been used for the coding. Xilinx Vivado Tool is used for synthesis and Model

Sim 5.4 has been used for simulation.

Keyword: Urdhva Tiryakbhyam, Vedic Multiplier, Ripple Carry Adder, Parallel Prefix

Adder.

References: 1. Swami BharatikrishnaTirthaji Maharaja, “Vedic Mathematics’, MotilalBanarasidass Publishers,

1965.

2. Y Rana Lakshmanna, GVS Rao,” A Survey on Different Multiplier Techniques”; SSRG International Journal of Electronics ad Communication Engineering( SSRG- IJECE)- Volume 3, March 3, 2016.

3. Rakshith T R and RakshithSaligram, “Design of High speed Low power Multiplier using Reversible

logic: a vVedic Mathematical Approach”, International conference on Circuits, Power and Computing Technologies (ICCPCT-2013), ISBN: 978-1-4763-4922- 2/13,PP 775-781.

4. VaijyanathKunchigi, Subhash Kulkarni,” Simulation of Vedic Multipliers in DCT Applications.”

International Journal of Computer Applications (0975-8887) Volume 63-No. 16, February 2013. 5. Palladurai K. and K. Hariharan, “Implementation of Signed Vedic Multiplier Targeted at FPGA

architectures”, ARPN Journal of Engineering and Applied Science, Vol. 10, No. 5, March 2015.

499-501

Authors: Ashima Kalra, Shakti Kumar, Sukhbir Singh Walia

Paper ANN System Identification for Rapid Battery Charger using Parallel 3 Parent Genetic

79

Title: Algorithm

Abstract: Model identification is one of the main concerns in the field of system modeling.

The complete modeling of an ANN system using input output data consists of two processes:

architecture selection in which number of hidden layers and the number of neurons in each

hidden layer is to be decided. This is then followed by training of system by the given training

data. The problem here is formulated as search and minimization problem. This paper

presents the identification of ANN system for rapid Nickel Cadmium (Ni-Cd) batteries

charger by applying a new version of Genetic algorithm called as parallel 3 parent genetic

algorithm (P3PGA). It is a multi population based 3 parent genetic algorithm (3PGA) .The

proposed approach was implemented using MATLAB R2018A and was observed to be

computationally more efficient with minimum MSE. With increase in number of iterations,

system performance gets improved. We further compared results of the proposed algorithm

with the results of other recent soft computing based algorithms as well classical learning

based algorithms namely, big bang big crunch (BB-BC), parallel big bang big crunch (PBB-

BC), Levenberg-Marquardt algorithm (LM), error back propagation (EBP), Resilent prop

(RPROP), particle swarm optimization (PSO), ant colony optimization (ACO) and artificial

bee colony (ABC) for ANN model identification. The proposed algorithm outperformed all of

the other 8 algorithms.

Keyword: Model identification, 3 parent genetic algorithm (3PGA), parallel 3 parent genetic

algorithm (P3PGA)

References: 1. P.J., "The Roots of Backpropagation", John Wiley k Sons, Inc., New York, 1994.

2. Sehgal et.al, “Minimization of Error in Training a Neural Network Using Gradient Descent Method”,

International Journal of Technical Research(IJTR), Vol 1, Issue 1, Mar-Apr 2012, pp 10-12.

3. Ahmad Hashim Hussein Aal-Yhia, and Ahmad Sharieh , “An Energy Backpropagation Algorithm”,

Proceedings of the World Congress on Engineering WCE 2007, Vol I, July 2007,

4. Byoung_Tak Zhang et.al., “Evolving Optimal Neural Networks Using Genetic Algorithms with Occam_s

Razor”, Complex Systems,7(3),199-220,1993

5. L. Yan-Peng, W. Ming-Guang, and Q. Ji-Xin, “Evolving neural networks using the hybrid of ant colony

optimization and bp algorithm,” in Advances in Neural Networks - 3rd International Symposium on Neural

Networks, ser. LNCS, vol. 3971. Springer-Verlag, 2006, pp. 714–722.

6. David J. Montana, “Neural Network Weight Selection Using Genetic Algorithms”, pp 1-17.

7. David J. Montana and Lawrence Davis, “Training Feedforward Neural Networks Using Genetic Algorithms",

Machine Learning, pp 762-767.

8. Alba E., Chicano J.F. (2004) Training Neural Networks with GA Hybrid Algorithms. In: Deb K. (eds)

Genetic and Evolutionary Computation – GECCO 2004. GECCO 2004. Lecture Notes in Computer Science, vol 3102. pp 852-863 Springer, Berlin, Heidelberg

9. Hiroaki Kitano, "Empirical Studies on the Speed of Convergence of Neural Network Training using Genetic

Algorithms", Machine Learning, AAAI-90 Proceedings, pp 789-795.

10. Jatinder N.D. Gupta, Randall S. Sexton, “Comparing backpropagation with a genetic algorithm for neural

network training”, Elsevier, Omega 27 (1999), pp 679-684.

11. Zhen-Guo Che, Tzu-An Chiang, and Zhen-Hua Che, "Feed forward Neural Networks Training: A Comparison

Between Genetic Algorithm and Back-propagation Learning Algorithm", International Journal of Innovative Computing, Information and Control, ICIC International 2011 ISSN 1349-4198, Volume 7, Number 10,

October 2011, pp. 5839- 5850.

12. V. Saishanmuga Raja and S.P. Rajagopalan, "A Comparative Analysis of Optimization Techniques for

Artificial Neural Network in Bio-Medical Applications", Journal of Computer Science 10 (1): pp 106-114,

Science Publications, 2014

13. Richa Mahajan, Gaganpreet Kaur, Guru Nanak Dev University, Amritsar.Neural Networks using Genetic

Algorithms, International Journal of Computer Applications (0975 – 8887), Volume 77– No.14, September

2013

14. Effect of the number of parents on the performance of multi-parent genetic algorithm, November 2016,

Conference: 2016 11th International Conference on Knowledge, Information and Creativity Support Systems (KICSS), Seng Pan That Pann Phyu, Gun Srijuntongsiri

15. Shih-Hsin Chen, Min-Chih Chenb, Pei-Chann Chang, V. Mani, Multiple parents crossover operators: A new

approach removes the overlapping solutions for sequencing problems, Applied Mathematical Modelling,

Volume 37, Issue 5, 1 March 2013, 2737-2746.

16. Eiben A.E., Raué P.E., Ruttkay Z. (1994) Genetic algorithms with multi -parent recombination. In:

Davidor Y., Schwefel HP., Männer R. (eds) Parallel Problem Solving from Nature — PPSN III. PPSN

1994. Lecture Notes in Computer Science, vol 866. Springer, Berlin, Heidelberg

502-506

17. Paula Amato, Masahito Tachibana, Michelle Sparman, and Shoukhrat Mitalipov, “Three-Parent IVF: Gene

Replacement for the Prevention of Inherited Mitochondrial Diseases”, Fertility and Sterility, 101(1), 2014, pp.

31-35.

18. A Singh, S Kumar, A Singh, SS Walia , “Three-parent GA: A Global Optimization Algorithm”, Journal of

Multiple-Valued Logic & Soft Computing, Vol. 32, ,2019 ,pp 407-423.

19. Nargis Akhter, Amar Singh, Mr. Guljar Singh, Automatic Test Case Generation by using Parallel 3 Parent

Genetic Algorithm, International Journal for Research in Applied Science & Engineering Technology

(IJRASET), Volume 6 Issue VII, July 2018

20. A Singh, Shakti Kumar, Sukhbir Singh Walia, P3PGA: Multi-Population 3 Parent Genetic Algorithm and its

Application to Routing in WMNs, International Journal of Advanced Research in Computer Science, Volume 8,

No. 5, May – June 2017.

21. Ankita et al, Fuzzy system identification for Ni-Cd battery charger using genetic algorithm, International

Journal of Engineering Research & Technology (IJERT), Vol. 1, Issue 5, July – 2012

22. S Kumar, P Kaur and A Singh,” Fuzzy Model Identification: A Firefly Optimization Approach. International

Journal of Computer Applications 58(6):1-8, November 2012.

23. A Kalra, S Kumar, S S Walia, "ANN Model identification: Two Soft Computing Based Approaches",

International Journal of Research and Analytical Reviews, Vol. 4, issue 2, June 2017, pp 79-86.

24. A Kalra, S Kumar, S S Walia, ANN Model Identification: A BB-BC Optimization Algorithm Based Approach,

International Journal of Computer Sciences and Engineering, Vol.-6, Issue-12, Dec 2018, pp 264-271.

25. A Khosla, S Kumar, and K K Aggarwal,2002. Design and development of RFC-10: A fuzzy logic based rapid

battery charger for Nickel-Cadmium batteries. HiPC (High Performance Computing), Workshop on Soft

Computing, Bangalore, 9-14.

80

Authors: Shikha Bathla, Nidhi Gaur, Ayush Uniyal

Paper

Title:

Power analysis of digital circuits for VLSI applications

Abstract: In this modern world, power plays a very important role in designing of electronic

circuits. Portable devices like mobile phones, laptops require electronic circuits that consume

less power. Power dissipation causes invariably rise in temperature of electronic circuits. As

the temperature increases, the power gets dissipated more. MTCMOS (Multi-Threshold

Complementary Metal Oxide semiconductor) power gating is a design technique that reduces

power dissipation. It results in the prevention of sub-threshold leakage in standby mode and

high speed operation with low power consumption in active mode. In this paper, MTCMOS

based MUX is designed and is compared with CMOS MUX and PTL (Pass Transistor Logic)

based MUX. It has been concluded that MTCMOS based MUX consumes 16.56% and

15.19% less power than CMOS MUX and PTL MUX respectively. Results are simulated in

Mentor Graphics version 10.2.

Keyword: PTL, power gating, power dissipation, MTCMOS

References: 1. S. Shigematsu, S. Mutoh et al., "'I-V high-Speed MTCMOS CircuitScheme for Power-Down Application

Circuits", IEEE Journal of Solid-state Circuits, 1997

2. S. Mutoh, IEEE J. Solid State Circuits, vol. 31, pp. 1795-1802, 1996 3. S. M. Kang, Y. Leblebici, CMOS Digital Integrated Circuits: Analysisand Design, India:Tata McGraw-Hill,

2011.

4. N.abiallah Shiri Asmangerdi, Javad. Forounchi, Kuresh. Ghanbari, "Anew 8- Transistor Floating Full-Adder Circuit", IEEE Trans. 20th Iranian Conference on Electrical Engineering (ICEE2012), pp. 1405

1409, May, 2012.

5. Arvind Nigam, Raghvendra Singh,”Design and Analysis of Multi-Threshold CMOS 14T Full Adder using

180nm”, Intl J Engg Sci Adv Research 2016 , March;15-20, ISSN NO: 2395-0730

6. M.Geetha Priya, Dr.K.Baskaran, D.Krishnaveni “Leakage Power Reduction Techniques in Deep Submicron

Technologies for VLSI 7. Ch. Mohammad Arif , J. Syamuel John “Low Power 32-bit Improved Carry Select Adder based on

MTCMOS Technique”

507-511

Authors: Pooja, DavinderParkash, Harbinder Singh

Paper

Title:

Trapezoid Shape Patch Antenna for WLAN Application

81

Abstract: In this paper,CPW fed Trapezoid shape patch antenna is analyzed and investigated

for Wireless Local Area Network (WLAN) application. The proposed antenna is fabricated

on FR4 substrate having dimensions of 19mm ×21.2mm ×1.6mm. It resonates at 5.44 GHz

frequency with peak return loss of 25.8 dB. The parametric study of proposed antenna is

carried out to understand the effect of different values of ground plane on the impedance

bandwidth, return loss of the antenna andalso to optimize the antenna parameters. The CPW-

fed is used to enhance the bandwidth and to reduce the return loss of the antenna. The

importance of different design parameters like current distribution, S-parameter, gain, and

radiation pattern are studied. The results of the proposed antenna are useful for WLAN

Application.

Keyword: Bandwidth,CPW-feed, Patch Antenna, WLAN and Return loss.

References: 1. K. R. Carver and J. W. Mink, “Microstrip Antenna Technology,” IEEE Trans. Antennas Propag., vol. 29, no. 1,

1981, pp. 2–24.

2. N. Prema and A. Kumar, “Design of multiband microstrip patch antenna for C and X band,” Optik (Stuttg).,

vol. 127, no. 20, 2016, pp. 8812–8818.

3. S. Bisht, S. Saini, V. Prakash, and B. Nautiyal, “Study The Various Feeding Techniques of Microstrip Antenna Using Design and Simulation Using CST Microwave Studio,” Int. J. Emerg. Technol. Adv. Eng., vol. 4, no. 9,

2014, pp. 318–324.

4. R. K. Raj, M. Joseph, C. K. Aanandan, K. Vasudevan, and P. Mohanan, “A new compact microstrip-fed dual-band coplanar antenna for WLAN applications,” IEEE Trans. Antennas Propag., vol. 54, no. 12, 2006, pp.

3755–3762.

5. R. Vivek and S. Sreenath, “Coplanar Waveguide ( CPW ) -Fed Compact Dual Band Antenna for 2 . 5 / 5 . 7 GHz Applications,” vol. 74, no. July, 2018, pp. 51–59.

6. A. Dastranj and H. Abiri, “Bandwidth enhancement of printed E-shaped slot antennas fed by CPW and

microstrip line,” IEEE Trans. Antennas Propag., vol. 58, no. 4, 2010, pp. 1402–1407. 7. C.-S. Eun, J.-W. Kim, T.-H. Jung, H.-K. Ryu, J.-M. Woo, and D.-K. Lee, “Compact Multiband Microstrip

Antenna Using Inverted-L- and T-Shaped Parasitic Elements,” IEEE Antennas Wirel. Propag. Lett., vol. 12, pp.

1299–1302, 2013. 8. I. Wire and W. Communications, “Small Planar Monopole Antenna With a Shorted Parasitic,” vol. 52, no. 7,

2004, pp. 1903–1905.

9. L. Dang, Z. Y. Lei, Y. J. Xie, G. L. Ning, and J. Fan, “A compact microstrip slot triple-band antenna for

WLAN/WiMAX applications,” IEEE Antennas Wirel. Propag. Lett., vol. 9, 2010, pp. 1178–1181.

10. K. Srivastava, A. Kumar, B. K. Kanaujia, S. Dwari, and S. Kumar, “Multiband integrated wideband antenna for

bluetooth/WLAN applications,” AEU - Int. J. Electron. Commun., vol. 89, no. January, 2018, pp. 77–84. 11. S. S. Al-Bawri, M. F. Jamlos, P. J. Soh, S. A. Aljunid Syed Junid, M. A. Jamlos, and A. Narbudowicz,

“Multiband slot-loaded dipole antenna for WLAN and LTE-A applications,” IET Microwaves, Antennas

Propag., vol. 12, no. 1, 2017, pp. 63–68.

512-516

82

Authors: Dr. PankajBhambri, Vijay Kumar Sinha, Ms. MeenakshiJaiswal

Paper

Title:

Change in Iris Dimensions as a Potential Human Consciousness Level Indicator

Abstract: Detection of human consciousness is vital for validating a legal or official

statement whether in the form of written or verbal. A statement given under unconsciousness

state is considered null and void as the person is not fully awarded about the consequences of

the statement. Several factors affects human consciousness like effect of alcohol, drowsiness,

effect of anesthesia, sleeping pills, natural sleeping hours etc. The present available methods

for detection of level of consciousness works in a specific condition only. For instance

Alcohol Meter can detect the level of alcohol in the breath but not the effects sleeping pills or

partial conscious due to drowsiness. In this research we propose a new technique which can

detect all types of unconsciousness irrespective of reasons. We used the feature of iris light

sensitivity which dilates inversely to pupil. Consciousness and iris dilation is directly

proportional i.e. iris dilation increases with increase of consciousness and decreases with

decrease of consciousness. We tested this method on 66 volunteers with 99.83% accuracy for

0.03mm iris dilation threshold value unconscious under alcohol effect and under drossiness

conditions. Results shows that iris sensitivity decreases significantly during unconscious state,

for any reasons. This feature can be used for validation of contracts before signing legal

contracts.

517-525

Keyword: Consciousness, Iris Dilation, Pupil Dilation, Pupiliometer, ADHAR, Drowsiness,

consent, legal contract , Lux , Luminance

References: 1. Czajka "Pupil dynamics for iris liveness detection" IEEE Trans. Inf. Forensics Security vol. 10 Apr. 2015, pp.

726-735.

2. Czajka and A. Pacut, “Iris Recognition System Based on Zak-Gabor Wavelet Packets,” Journal of

Telecommunications and Information Technology, no. 4, 2010, pp. 10–18. 3. Czajka, “Database of iris printouts and its application: Development of liveness detection method for iris

recognition,” in Methods and Models in Automation and Robotics (MMAR), 2013 18th International Conference on, Aug 2013, pp. 28–33.

4. Adam Czajka, (2014), "Pupil dynamics for presentation attack detection in iris recognition," in International

Biometric Performance Conference. 5. Biometric Vulnerability Assessment Expert Group (BVAEG). [Online]. Available:

http://www.biometricsinstitute.org/pages/ biometric-vulnerability-assessment-expert-group-bvaeg.html

6. E. C. Lee and K. R. Park, (2010), "Fake iris detection based on 3D structure of iris pattern," International Journal of Imaging Systems and Technology, 2010, pp. 162-166.

7. E. Lee et al., Fake iris detection by using Purkinje image. In Proc. ICB, Hong Kong, China, 2006, pp. 397-403.

8. E. Lee, K. Park, and J. Kim , "Fake iris detection by using purkinje image," in Advances in Biometrics, ser. Lecture Notes in Computer Science, D. Zhang and A. Jain, Eds. Springer Berlin Heidelberg, 3832, 2005, pp.

397-403.

9. EuiChul Lee, Kang Ryoung Park, "Fake Iris detection Based on iris Pattern ", Wiley Periodicals Inc.(2010). 10. EuiChul Lee, Kang Ryoung Park, Jaihie Kim, "Fake Iris Detection by Using Purkinje Image “, Springer,

Advances in Biometrics, Vol 3832,2006, pp 397-403.

11. ISO/IEC JTC 1/SC 37 Text of Working Draft 30107-3, “Information Technology – Presentation Attack Detection – Part 3: Testing, reporting and classification of attacks,” February 28, 2014.

12. J. Galbally, J. Ortiz-Lopez, J. Fierrez and J. Ortega-Garcia, (2012), "Iris liveness detection based on quality

related features," Proc. ICB 2012, pp. 271-276, New Delhi, India, 2012. 13. J. Galbally, S. Marcel, and J. Fierrez, "Image quality assessment for fake biometric detection: Application to iris,

fingerprint, and face recognition," Image Processing, IEEE Transactions on, 23, 2, Feb 2014, pp. 710-724.

14. J. Galbally, J. Ortiz-Lopez, J. Fierrez, and J. Ortega-Garcia, “Iris liveness detection based on quality related features,” in Proc. 5th IAPR ICB, 2012, pp. 271–276.

15. Javier Galbally, SébastienMarcel,JulianFierrez, “Image Quality Assessment for Fake Biometric Detection:

Application to Iris, Fingerprint, and Face Recognition.” IEEE Trans. on Image Process, 23, February 2014 16. J. Galbally, R. Cappelli, A. Lumini, G. G. de Rivera, D. Maltoni,J. Fierrez, “An evaluation of direct and indirect

attacks using fake fingers generated from ISO templates,” Pattern Recognition. Lett., 31,8,2010, pp. 725–732.

17. J. Daugman, “Countermeasures against subterfuge,” in Biometrics: Personal Identication in Networked Society, Jain, Bolle, and Pankanti, Eds. Amsterdam: Kluwer, 1999, pp. 103–121.

18. L. Thalheim, J. Krissler, and P.-M. Ziegler, “Biometric Access Protection Devices and their Programs Put to the

Test,” Available online in c’t Magazine, No. 11/2002, p. 114. 19. M. Kohn and M. Clynes, “Color dynamics of the pupil,” Annals of New York Academy of Science, vol. 156, no.

2, 2006, pp. 931–950.

20. Pupil dynamics for iris liveness detection Adam Czajka, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 4, APRIL 2015

21. Trusted Biometrics under Spoofing Attacks (TABULA RASA). Project funded by the European Commission,

under the Seventh Framework Programme. [Online]. Available: http://www.tabularasa-euproject.org 22. T. Matsumoto, “Artificial fingers and irises: Importance of vulnerability analysis,” in Proceedings of the Seventh

International Biometrics Conference and Exhibition, 2004.

23. Sinha V.K., Gupta A.K , Khanna R. , “Detection of Fake Iris by using Frame Difference and Reflection Ratio”, I J C T A, 9(40) 2016, pp. 557-562

24. Sinha V.K., Gupta A., Mahajan M., “Detecting fake iris in iris bio-metric system”, Digital Investigation (2018),

https://doi.org/10.1016/j.diin.2018.03.002 25. Sinha V.K., Gupta A.K., "Enhancing Iris Security by Detection of Fake Iris". National Conference GyanJyoti-

National Conference MITE. - 2016. - P. 1-22.

Authors: Vijay Kumar Sinha, Gurmeet Kaur, Nisha Kumari

Paper

Title:

Detection of Involuntary Iris Scanning for Enhanced Biometric Security

Abstract: Although iris recognition system is considered as most robust, hard to counterfeit

and the most secure system of biometric authentication. However the existing system fails to

detect a forced authentication which might be misused by criminals to unlock the user's

account. In this paper we examine the conditions in which a real user is forcibly presented in

front of iris scanner on gun point to unlock the account. In this case a significant difference is

noted in the area of iris visibility with respect to user's normal iris area visibility. An

83

abnormal eye blink is also detected in forced condition. We successfully design and

developed an algorithm to detect such conditions to protect the users from criminals when a

user is forcibly presented to an iris scanner to unlock their account. A sample size of 65

volunteers are taken to record the iris authentication in both the conditions i.e. normal with

consent of user and forced under without user’s consent. The average size of iris is recorded

10.1 mm while it expands on 13.2 mm (average) in fear when iris is being scanned forcibly

by criminals. We conclude that a variation of 2 to 3 mm in iris exposure is a clear biomarker

to indicate some presence of criminal traces and take proactive measures to prevent losses.

Keyword: Area of Iris Visibility (AIV), Blink Rate Criminals, Fear Detection, Gun Point, Iris

Dilation, Kidnapped, Pupil Dilation, Purkinje Image.

References: 1. Czajka and A. Pacut, “Iris Recognition System Based on Zak-Gabor Wavelet Packets,” Journal of

Telecommunications and Information Technology, no. 4, 2010, pp. 10–18.

2. Czajka, “Database of iris printouts and its application: Development of liveness detection method for iris

recognition,” in Methods and Models in Automation and Robotics (MMAR), 2013 18th International

Conference on, Aug 2013, pp. 28–33. 3. Adam Czajka, (2014), "Pupil dynamics for presentation attack detection in iris recognition," in International

Biometric Performance Conference.

4. Biometric Vulnerability Assessment Expert Group (BVAEG). [Online]. Available: http://www.biometricsinstitute.org/pages/ biometric-vulnerability-assessment-expert-group-bvaeg.html

5. E. C. Lee and K. R. Park, (2010), "Fake iris detection based on 3D structure of iris pattern," International Journal

of Imaging Systems and Technology, 20, 2, pp. 162-166. 6. E. Lee et al. , (2006), Fake iris detection by using Purkinje image. In Proc. ICB, Hong Kong, China, pp. 397-403.

7. E. Lee, K. Park, and J. Kim , (2005), "Fake iris detection by using purkinje image," in Advances in Biometrics,

ser. Lecture Notes in Computer Science, D. Zhang and A. Jain, Eds. Springer Berlin Heidelberg, 3832, pp. 397-403.

8. Eui Chul Lee, Kang Ryoung Park, (2010), "Fake Iris detection Based on iris Pattern ", Wiley Periodicals Inc.

9. EuiChul Lee, Kang Ryoung Park, Jaihie Kim, (2006), "Fake Iris Detection by Using Purkinje Image “, Springer, Advances in Biometrics, Vol 3832, pp 397-403.

10. ISO/IEC JTC 1/SC 37 Text of Working Draft 30107-3, “Information Technology – Presentation Attack

Detection – Part 3: Testing, reporting and classification of attacks,” February 28, 2014.

11. J. Galbally, J. Ortiz-Lopez, J. Fierrez and J. Ortega-Garcia, (2012), "Iris liveness detection based on quality

related features," Proc. ICB 2012, New Delhi, India, 2012, pp. 271-276.

12. J. Galbally, S. Marcel, and J. Fierrez, (Feb 2014), "Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition," Image Processing, IEEE Transactions on, 23, 2, pp. 710-

724.

13. J. Galbally, J. Ortiz-Lopez, J. Fierrez, and J. Ortega-Garcia(2012), “Iris liveness detection based on quality related features,” in Proc. 5th IAPR ICB, pp. 271–276.

14. Javier Galbally, Sébastien Marcel,Julian Fierrez, (February 2014),“Image Quality Assessment for Fake

Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.” IEEE Trans. on Image Process, 23.

15. J. Galbally, R. Cappelli, A. Lumini, G. G. de Rivera, D. Maltoni,J. Fierrez (2010), “An evaluation of direct and

indirect attacks using fake fingers generated from ISO templates,” Pattern Recognition. Lett., 31,8, pp. 725–732.

16. J. Daugman, “Countermeasures against subterfuge,” in Biometrics: Personal Identication in Networked Society,

Jain, Bolle, and Pankanti, Eds. Amsterdam: Kluwer, 1999, pp. 103–121. 17. L. Thalheim, J. Krissler, and P.-M. Ziegler, “Biometric Access Protection Devices and their Programs Put to the

Test,” Available online in c’t Magazine, No. 11/2002, p. 114.

18. M. Kohn and M. Clynes, “Color dynamics of the pupil,” Annals of New York Academy of Science, vol. 156, no.

2, 1969, pp. 931–950. Available online at Wiley Online Library (2006).

19. Pupil dynamics for iris liveness detection Adam Czajka, IEEE TRANSACTIONS ON INFORMATION

FORENSICS AND SECURITY, VOL. 11, NO. 4, APRIL 2015 20. Trusted Biometrics under Spoofing Attacks (TABULA RASA). Project funded by the European Commission,

under the Seventh Framework Programme. [Online]. Available: http://www.tabularasa-euproject.org

21. T. Matsumoto, “Artificial fingers and irises: Importance of vulnerability analysis,” in Proceedings of the Seventh International Biometrics Conference and Exhibition, 2004.

22. Sinha V.K., Gupta A.K , Khanna R. , “Detection of Fake Iris by using Frame Difference and Reflection Ratio”, I

J C T A, 9(40) 2016, pp. 557-562 23. Sinha V.K., Gupta A., Mahajan M., “Detecting fake iris in iris bio-metric system”, Digital Investigation (2018),

https://doi.org/10.1016/j.diin.2018.03.002 24. Sinha V.K., Gupta A.K., "Enhancing Iris Security by Detection of Fake Iris". National Conference Gyan Jyoti-

National Conference MITE. - 2016. - P. 1-22.

526-532

84

Authors: Lala Bhaskar, Pradeep Kumar, Kishore Naik Mude

Paper

Title:

Simulation Analysis of Wireless Power Transfer for Future Office Communication

Systems

Abstract: A Wireless Power Transfer system consists of a transmitter coil which is

inductively coupled with secondary coil and is popular for wireless charging of future office

communication system. Wireless power transfer is used in different applications ranging from

mobile chargers to charging stations. In this paper simulation of Wireless Power Transfer for

future office communication systems has been conducted over Maxwell 3d of Ansys

electromagnetic suite. The input frequency of primary coil is varied from 1kHz -120kHz with

respect to the change in resonant capacitance and observed that input frequency between

20kHz-30 kHz, the output power in secondary coil appears to be maximum at variable

distances between transmitter coil and receiver coil. There is an improvement of 72% seen in

the output power of secondary coil for 25kHz input frequency of primary coil as compared

with 40kHz input frequency. This model can be helpful to design future Office

Communication systems for charging the mobile phones, Laptops and to turn on the printer

wirelessly.

Keyword: Communication System, Laptop Charger, Mobile Charger, Receiver Coil,

Transmitter Coil, WPT(Wireless Power Transfer)

References: 1. M. G. L. Roes, J. L. Duarte, M. A. M. Hendrix and E. A. Lomonova, "Acoustic Energy Transfer: A Review,"

IEEE Trans. on Industrial Electronics, vol. 60, no. 1, Jan. 2013, pp. 242-248.

2. 2. Y. Hu, X. Zhang, J. Yang and Q. Jiang, "Transmitting electric energy through a metal wall by acoustic waves using piezoelectric transducers," IEEE Trans. on Ultrasonics, Ferroelectrics, and Frequency Control, vol. 50,

no. 7, July 2003, pp. 773-781.

3. A. Sahai and D. Graham, "Optical wireless power transmission at long wavelengths," in Proc. International Conference on Space Optical Systems and Applications, Santa Monica, CA, 2011, pp. 164-170.

4. S. Sasaki, K. Tanaka and K. i. Maki, "Microwave Power Transmission Technologies for Solar Power

Satellites," in Proc. of the IEEE, vol. 101, no. 6, June 2013, pp. 1438-1447.

5. L. Summerer and O. Purcell, “Concepts for Wireless Energy Transmission via Laser,” 2008.

6. J. Dai and D. C. Ludois, "A Survey of Wireless Power Transfer and a Critical Comparison of Inductive and

Capacitive Coupling for Small Gap Applications," IEEE Transactions on Power Electronics, vol. 30, no. 11, Nov. 2015, pp. 6017-6029.

7. G. a. Covic and J. T. Boys, “Inductive Power Transfer,” Proc. IEEE, vol. 101, no. 6, 2013, pp. 1276–1289.

8. N. Tesla, “High frequency oscillators for lectro-therapeutic and other purposes,” in Proc. IEEE, vol. 87, no. 7, 1999, pp. 1282–1292.

9. S. Y. R. Hui, "Magnetic Resonance for Wireless Power Transfer [A Look Back]," IEEE Power Electronics

Magazine, vol. 3, no. 1, March 2016, pp. 14-31. 10. H. A. Wheeler, "Simple Inductance Formulas for Radio Coils," in Proceedings of the Institute of Radio

Engineers, vol. 16, no. 10, Oct. 1928, pp. 1398-1400.

11. H. A. Wheeler, "Inductance formulas for circular and square coils," in Proceedings of the IEEE, vol. 70, no. 12, Dec. 1982, pp. 1449-1450.

12. S. S. Mohan, M. del Mar Hershenson, S. P. Boyd and T. H. Lee, "Simple accurate expressions for planar spiral

inductances," in IEEE Journal of Solid-State Circuits, vol. 34, no. 10, Oct 1999, pp. 1419-1424. 13. Kunwar Aditya, Sheldon S. Williamson “Design Guidelines to Avoid Bifurcation in aSeries–Series

Compensated Inductive Power Transfer System IEEE Transactions on Industrial Electronics, vol.66, no.5, May

2019.

533-538

85

Authors: Sachin Majithia, Harjeet Singh, Astha Gupta, Neeraj Sharma

Paper

Title:

An Efficient Machine Learning Approach for Facial Expression Recognition

Abstract: Emotions play important role in human sentiments so broad studies are carried out

to explore the relation between human sentiments and machine interactions. This paper deals

with an automatic system which spontaneously identifies the facial emotion. Gradient

filtering and component analysis is used to extract feature vector and feature optimization is

taken place using swarm intelligence approach. Thus emotion recognition with optimized

feature extraction process is carried out with high accuracy rate and less error probabilities.

Finally the testing process is obtained for the classification of emotions and then performance

is measured in terms of false acceptance rate, false rejection rate, and accuracy.

539-546

Keyword: Facial emotion Detection, Feature Extraction, Feature Optimization, Gradient

Filtering.

References: 1. Dixit, B. A., &Gaikwad, A. N. (2015, June). Statistical moments based facial expression analysis. In Advance

Computing Conference (IACC), 2015 IEEE International (pp. 552-557). IEEE.

2. Chiranjeevi, P., Gopalakrishnan, V., &Moogi, P. (2015). Neutral face classification using personalized

appearance models for fast and robust emotion detection. IEEE Transactions on Image Processing, 24(9), 2701-2711.

3. Saeed, A., Al-Hamadi, A., Niese, R., &Elzobi, M. (2014). Frame-based facial expression recognition using geometrical features. Advances in Human-Computer Interaction, 2014, 4.

4. Liu, P., Han, S., Meng, Z., & Tong, Y. (2014). Facial expression recognition via a boosted deep belief network.

In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1805-1812). 5. Kulkarni, P. U., Bharate, V. D., &Chaudhari, D. S. (2016, March). Human emotions recognition using adaptive

sublayer compensation and various feature extraction mechanisms. In Wireless Communications, Signal

Processing and Networking (WiSPNET), International Conference on (pp. 515-519). IEEE.Sirovich, L., & Kirby, M. (1987). Low-dimensional procedure for the characterization of human faces. Josa a, 4(3), 519-524.

6. Mathew, D., Kumar, D. S., & James, A. P. (2015, December). Facial emotion recognisingmemristive threshold

logic system. In Intelligent Computational Systems (RAICS), 2015 IEEE Recent Advances in (pp. 39-44). IEEE.

7. Said, S., Jemai, O., Zaied, M., & Amar, C. B. (2015, December). Wavelet networks for facial emotion

recognition. In Intelligent Systems Design and Applications (ISDA), 2015 15th International Conference on (pp. 295-300). IEEE.

8. Hmayda, M., Ejbali, R., &Zaied, M. (2015, December). Facial emotions recognition based on wavelet network.

In Intelligent Systems Design and Applications (ISDA), 2015 15th International Conference on (pp. 249-253). IEEE.

9. Chanthaphan, N., Uchimura, K., Satonaka, T., &Makioka, T. (2015, November). Facial emotion recognition

based on facial motion stream generated by Kinect. In Signal-Image Technology & Internet-Based Systems (SITIS), 2015 11th International Conference on (pp. 117-124). IEEE.

10. Moore, S., & Bowden, R. (2011). Local binary patterns for multi-view facial expression recognition. Computer

Vision and Image Understanding, 115(4), 541-558. 11. Barbu, T, Gabor Barbu, T. (2010). Gabor filter-based face recognition technique. Proceedings of the Romanian

Academy, 11(3), 277-283..

12. Chen, S., Sun, Y., & Yin, B. (2009, December). A novel hybrid approach based on sub-pattern technique and extended 2dpca for color face recognition. In Multimedia, 2009. ISM'09. 11th IEEE International Symposium

on (pp. 630-634). IEEE.

13. Thomas, M., Kambhamettu, C., & Kumar, S. (2008, November). Face recognition using a color subspace LDA approach. In Tools with Artificial Intelligence, 2008. ICTAI'08. 20th IEEE International Conference on (Vol. 1,

pp. 231-235). IEEE.

14. Belhumeur, P. N., Hespanha, J. P., &Kriegman, D. J. (1997). Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. Yale University New Haven United States.

15. Draper, B. A., Baek, K., Bartlett, M. S., &Beveridge, J. R. (2003). Recognizing faces with PCA and

ICA. Computer vision and image understanding, 91(1-2), 115-137. 16. Yang, J., Zhang, D., Frangi, A. F., & Yang, J. Y. (2004). Two-dimensional PCA: a new approach to appearance-

based face representation and recognition. IEEE transactions on pattern analysis and machine

intelligence, 26(1), 131-137. 17. Torres, L., Reutter, J. Y., &Lorente, L. (1999). The importance of the color information in face recognition.

In Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on (Vol. 3, pp. 627-631).

IEEE. 18. Vasilescu, M. A. O., &Terzopoulos, D. (2002). Multilinear image analysis for facial recognition. In Pattern

Recognition, 2002. Proceedings. 16th International Conference on (Vol. 2, pp. 511-514). IEEE..

19. Dixit, B. A., &Gaikwad, A. N. (2015, June). Statistical moments based facial expression analysis. In Advance Computing Conference (IACC), 2015 IEEE International (pp. 552-557). IEEE.

20. Chiranjeevi, P., Gopalakrishnan, V., &Moogi, P. (2015). Neutral face classification using personalized

appearance models for fast and robust emotion detection. IEEE Transactions on Image Processing, 24(9), 2701-2711.

21. Saeed, A., Al-Hamadi, A., Niese, R., &Elzobi, M. (2014). Frame-based facial expression recognition using

geometrical features. Advances in Human-Computer Interaction, 2014, 4. 22. Liu, P., Han, S., Meng, Z., & Tong, Y. (2014). Facial expression recognition via a boosted deep belief network.

In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1805-1812).

23. Sánchez, A., Ruiz, J. V., Moreno, A. B., Montemayor, A. S., Hernández, J., &Pantrigo, J. J. (2011). Differential optical flow applied to automatic facial expression recognition. Neurocomputing, 74(8), 1272-1282.

24. Chaudhar, M. B., &Deshmukh, R. R. (2016). Facial Expression Recognition and Analysis. Imperial Journal of Interdisciplinary Research, 2(3).

Authors: Rajeev Sharma,Sandeep singh kang

86

Paper

Title:

Challenges and Applications of Wireless Body Area Networks

Abstract: Modified low-power, ultra-slim, light in weight, intelligent devices are the result of

recent advances in technology. Wireless Body Area Network (WBAN) is a replacement

technology that can be used to incorporate these devices & thereby provide health monitoring

applications in healthcare. Further development of wireless communications in recent years

has led to the use of sensing element networks, which are low priced. These networks have a

wide variety of applications. Various technical problems in these application areas are being

resolved by researchers across the world. These sensing component networks play a

significant role in healthcare. These networks have deep roots in various sectors viz;

engineering, medicine& science & can show good performance even in harsh climatic

conditions. Therefore, this paper provides an associated degree of exposure for the analysis

and applications of wireless body area networks (WBAN’s), and body sensor networks

(BSN’s). Apart from it, it addresses a wide variety of challenges in these technologies.

Keyword: Wireless body area networks (WBANs), body sensor networks (BSNs), ultra-

wideband (IEEE 802.15.3) & ZigBee (IEEE 802.15.3), Sensor, personal digital assistant

(PDA)

References: 1. Ragesh, G. K., &Baskaran, K. “An Overview of Applications, Standards and Challenges in Futuristic Wireless

Body Area Networks”, Journal of Computer Science, (2012), 9(1), 180-186.

2. E. M. Staderini, ―UWB radars in medicine,IEEE Aerospace and Electronic Systems Magazine, vol. 17(1), pp. 13–18, 2002.

3. IEEE standard for information technology—telecommunications and information exchange between systems—

local and metropolitan area networks—specific requirements part 15.1: wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs),‖ IEEE Std 802.15.1TM,

2005.

4. IEEE standard for information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements part 15.3: wireless medium access control (MAC)

and physical layer (PHY) specifications for high rate wireless personal area networks (WPANs) amendment 1:

MAC sublayer,‖ IEEE Std 802.15.3b, 2006.

5. IEEE Standard for Information technology—telecommunications and information exchange between systems—

local and metropolitan area networks—specific requirements part15.4: wireless medium access control (MAC)

and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs),‖ IEEE STD 802.15.4TM, 2006.

6. S. U., Khan, P., Ullah, N., Saleem, S., Higgins, H., &Kwak, K. S. A Review of Wireless Body Area Networks

for Medical Applications.Sciences-New York, 1-7(2009). 7. C. Scott, G. Heath and J. Svoboda (2006, April) Preprint: ―Vibration monitoring of power

distributionpoles.‖[Online].http://www.inl.gov/technicalpublications/Documents/3493254.pdf.

8. Kyung Sup Kwak1, M. A. Ameen1, Daehan Kwak1, Cheolhyo Lee2, Hyungsoo Lee2, A Study on Proposed IEEE 802.15 WBAN MAC Protocols vol 978-1-4244-4522-6/09/$25.00 ©2009 IEEE

9. Y. Xiao, X. Shen, B. Sun, L. Cai, Security and privacy in RFID and applications in telemedicine, IEEE

Communications Magazine, 44(4) 64-72(2006). 10. ParneetDhillon, HarshSadawarti, “A Review Paper on Zigbee (IEEE 802.15.4) Standard”. International Journal

of Engineering Research & Technology (IJERT) IJERT ISSN: 2278-0181, Vol. 3 Issue 4, April – 2014.

11. IEEE Standard 802, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer(PHY) specifications for low-rate wireless personal area networks (WPANs), IEEE Std 802.15.4d™-2009, IEEE

Computer Society, 17 April 2009.

12. ArwaKurawar, AyushiKoul, Prof. Viki TukaramPatil, “Survey of Bluetooth and Applications”, International

Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 8, August

2014

13. Rongrong Zhang, Amiya Nayak, &Jihong Yu. “SleepScheduling in Energy Harvesting Wireless Body Area Networks”, IEEE Communications Magazine, February 2019, 95-101.

14. Yuan-Yao Shih, Member, IEEE, Pi-Cheng Hsiu, Senior Member, IEEE, and Ai-Chun Pang, Senior Member,

IEEE, “A Data Parasitizing Scheme for Effective Health Monitoring in Wireless Body Area Networks”, IEEE, 1536-1233 (c) 2018 ,1-14.

547-554

Authors:

Ramneet Kaur, Dr.Navdeep Kaur,Dr.Satwinder singh

Paper Enhanced Routing Protocol for VANET

87

Title:

Abstract: A class of networks called VANET(vehicular adhoc network) ,the extension of

MANETs(mobile adhoc network) are based on the principle of the formation of wireless

network for exchange of data and the creation of network is spontaneous in nature. The

mobility constraints, behavior of driver, high speed, limited coverage of wifi, hard delay

constraints leads to unique characteristics in VANETS. So the MANET routing protocols are

not suitable for VANET. Optimization of routing protocols becomes necessary to make it

suitable for VANET. In this paper , various optimized routing protocols are analyzed and

their optimization techniques are discussed. Parameters such as end to end delay and energy

spent are taken into consideration in order to show the improvement from the routing

protocols that are standard protocols. Then a method has been proposed to optimize the fine

tuned OLSR (optimized link state routing)protocol with the use of advanced genetic

algorithm to further improve the results and to make the protocol more efficient.

Keyword: Optimized link state routing (OlSR), particle swarm optimization (PSO), Quality

of service (QoS),Vehicular Adhoc Network (VANET).

References: 1. S. Ganguly, S. Das, "A Novel Ant Colony Optimization Algorithm for the Vehicle Routing Problem."

Swarm,Evolutionary and Memetic Computing, Springer, vol.8297, 2013, pp.401-412.

2. Isaac, J. Téllez, S. Zeadally, and J. S. Camara, "Security attacks and solutions for vehicular ad hoc networks." Communications, IET 4.7, 2010, pp.894-903.

3. Kochhar, Mandoria, "Performance study of VANET using ant based routing algorithms." Computing for Sustainable Global Development (INDIACom), 2nd International Conference, IEEE, New Delhi, 2015, pp.1803-1806.

4. Mane and S. Kulkarni, "QoS realization for routing protocol on VANETs using combinatorial optimization."Computing, Communications and Networking Technologies (ICCCNT), Fourth International Conference,IEEE,Tiruchengode, 2013,pp.1-5.

5. Y. Lin, Y. Chen and S. Lee, "Routing protocols in vehicular adhoc network:A survey and future perspectives." Journal of information science and engineering, vol.26, 2010, pp.913-932.

6. Guo, Zhong-Hua, and Hao-Shan Shi. "The Optimization of DSR Protocol of Ad Hoc Network with Constrained

Dynamic Query Localization Technique."2007 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2007,pp.1585-1588.

7. Bandi, Anusha. "Parameters tuning of OLSR routing protocol with metaheuristic algorithm for VANET." Advance Computing Conference (IACC), 2015 IEEE International. IEEE, 2015,pp.1207-1212.

8. Rana, Hemant, P. Thulasiraman, and R. Thulasiram, "MAZACORNET: Mobility aware zone based ant colony optimization routing for VANET." Evolutionary Computation (CEC), IEEE, Cancun, 2013, pp.2948-2955.

9. Sumra, Ahmed, H. Hasbullah, and J. AbManan., "Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey." Vehicular Ad-hoc Networks for Smart Cities, Springer, Singapore, vol.306, 2015, pp.51-61.

9. P. Stodola, J. Mazal, and M. Podhorec, "Improving the Ant Colony Optimization Algorithm for the Multi-

Depot Vehicle Routing Problem and Its Application." Modelling and Simulation for Autonomous Systems:FirstInternationalWorkshop,Springer,Rome,Vol.8906, 2014,pp.376-385.

10. S. Shah, M. Shiraj, R. Noor, "Unicast routing protocols for urban vehicular networks: review, taxonomy, and open research issues." Journal of Zhejiang University, vol.15, 2014, pp. 489-513.

11. Souza, A. B., Celestino, J., Xavier, F. A., Oliveira, F. D., Patel, A., & Latifi, M."Stable multicast trees based on

Ant Colony optimization for vehicular Ad Hoc networks." The International Conference on Information Networking 2013 (ICOIN). IEEE, 2013,pp.101-106.

12. Mavrovouniotis, Michalis, and S. Yang, "Dynamic vehicle routing: A memetic ant colony optimization approach." Automated Scheduling and Planning, Springer, Berlin Heidelberg, 2013, pp.283-301.

13. S. Kumar, A. Kumar, "Position Based Routing Protocols in VANET: A Survey." Wireless Personal Communications , Springer US, vol.83, 2015, pp. 1-26.

14. K. R. Jothi, A. Ebenezer, "Optimization and Quality-of-Service Protocols in VANETs: A Review." Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Springer India, vol.324, 2015, pp.275-284.

15. D. Gaikwad, Sudhakar, and M. Zaveri, "Vanet routing protocols and mobility models: A survey." Trends in Network and Communications, Springer, Berlin Heidelberg, vol.197, 2011, pp.334-342.

16. Baber, P. Wang, and C. Zou, "An economical, deployable and secure vehicular ad hoc network." In Military Communications Conference.IEEE,San Diego,CA, 2008,pp.1-7.

17 F. Ali, F. Sheikh, A. Ansari, "Comparative Analysis of VANET Routing Protocols: On Road Side Unit Placement Strategies." Wireless Personal Communications, Springer, 2015, pp.1-14.

555-560

18 M.Asgari, K.Jumari, M. Ismail, "Analysis of routing protocols in vehicular ad hoc network applications."

Software Engineering and Computer Systems, Springer, Berlin Heidelberg, vol.181, 2011,pp.384-397.

19 Safi, Seyed Mohammad, Ali Movaghar, and Misagh Mohammadizadeh. "A novel approach for avoiding

wormhole attacks in VANET." 2009 First Asian Himalayas International Conference on Internet. IEEE, 2009,pp.1-6.

88

Authors: Khushal Thakur, Bhasker Gupta, Balwinder Singh Sohi

Paper

Title:

BER analysis of Hybrid precoded Massive MIMO systems in Downlink with receiver

beamforming over mmWave Channels

Abstract: Next generation networks are required to deliver extremely high data rates in order

to enable mission critical services, massive IoT and enhanced mobile broadband. In the

pursuit of high data rates, significant research is focused on higher frequency bands.

mmWaves are the most promising carriers because of their associated bandwidth benefits.

However, on the other hand, mmWaves also bring along difficulties in link management as

the channel is totally different from the traditional systems. This paper evaluates the BER

performance of mmWave-massive MIMO systems with Hybrid precoding and receiver

beamforming. The availability of perfect CSI at both the transmitting and receiving ends of

the downlink is assumed. The results demonstrate that BER performance at low SNR region

remains almost exclusive of the system dimensions as long as CSI is available. It was

observed that almost 20 dB SNR is required to achieve error performance of 10-5. Zero

forcing and Wiener Filter precoder are also evaluated against each other with analog

precoding and receiver beamforming.

Keyword: mmWave, Massive MIMO, BER, Perfect CSI, Hybrid Precoding

References: 1. O. El Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. Heath, “Spatially sparse precoding in millimeter wave

MIMO systems,” IEEE Trans. Wireless Commun., vol. 13, no. 3, Mar. 2014, pp. 1499–1513.

2. T. Rappaport et al., “Millimeter wave mobile communications for 5G cellular: It will work!” IEEE Access, vol. 1, May 2013, pp. 335–349.

3. S. Hur et al., “Millimeter wave beamforming for wireless backhaul and access in small cell networks,” IEEE

Trans. Commun., vol. 61, no. 10, Oct. 2013, pp. 4391–4403. 4. T. Nitsche et al., “IEEE 802.11ad: Directional 60 GHz communication for multi-Gigabit-per-second Wi-F,”

IEEE Commun. Mag., vol. 52, no. 12, Dec. 2014, pp. 132–141.

5. T. Baykas et al., “IEEE 802.15.3c: The first IEEE wireless standard for data rates over 1 Gb/s,” IEEE Commun. Mag., vol. 49, no. 7, Jul. 2011, pp. 114–121.

6. T. Parfait, Y. Kuang, and K. Jerry, “Performance analysis and comparison of ZF and MRT based downlink

massive MIMO systems,” in Proc. 6th Int. Conf. Ubiquitous Future Netw., Shanghai, China, 2014, pp. 383–388. 7. A. Kammoun, A. Muller, E. Bjornson, and M. Debbah, “Linear precoding based on polynomial expansion:

Large-scale multi-cell MIMO systems,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 861–875

8. V. P. Selvan, M. S. Iqbal, and H. S. Al-Raweshidy, “Performance analysis of linear precoding schemes for very large multi-user MIMO downlink system,” in Proc. 4th Int. Conf. Innov. Comput. Technol., Luton, U.K., 2014,

pp. 219–224.

9. E. Bjornson, L. Sanguinetti, J. Hoydis, and M. Debbah, “Optimal design of energy-efficient multi-user MIMO systems: Is massive MIMO the answer?” IEEE Trans. Wireless Commun., vol. 14, no. 3, Mar. 2015, pp. 3059–

3075

10. X. Gao, O. Edfors, F. Rusek, and F. Tufvesson, “Linear pre-coding performance in measured very-large MIMO channels,” inProc. 2011 IEEE Veh. Technol. Conf., San Francisco, CA, USA, 2011, pp. 1–5.

11. J. Hoydis, S. Brink, and M. Debbah, “Massive MIMO in the UL/DL of cellular networks: How many antennas

do we need?” IEEE J. Sel. Areas Commun., vol. 31, no. 2, Feb. 2013, pp. 160–171. 12. A. Muller, A. Kammoun, E. Bjornson, and M. Debbah, “Linear precoding based on polynomial expansion:

Reducing complexity in massive MIMO,” EURASIP J. Wireless Commun. Netw., vol. 2016, 2016, Art. no. 63.

13. L. Liang, W. Xu, and X. Dong, “Low-complexity hybrid precoding in massive multiuser MIMO systems,” IEEE Wireless Commun. Lett., vol. 3, no. 6, Dec. 2014, pp. 653–656.

14. A. Alkhateeb, G. Leus and R. W. Heath, "Limited Feedback Hybrid Precoding for Multi-User Millimeter Wave

Systems," in IEEE Transactions on Wireless Communications, vol. 14, no. 11, Nov. 2015, pp. 6481-6494 15. S. Jacobsson, G. Durisi, M. Coldrey, T. Goldstein and C. Studer, "Quantized Precoding for Massive MU-

MIMO," in IEEE Transactions on Communications, vol. 65, no. 11, Nov. 2017, pp. 4670-4684.

16. P. Kashyap and K. Thakur, "Improved ACE method for reducing PAPR in OFDM system," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT),

Coimbatore, 2018, pp. 402-406.

17. S. Sharma and K. Thakur, "Carrier frequency offset in OFDM systems," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 369-373.

561-566

18. S. Sharma and K. Thakur, "Improved CE-OFDM Using LDPC Codes for Frequency Offset Compensation,"

2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, 2018, pp.

869-873

89

Authors: Bhisham Bhanot, Amit Jain

Paper

Title:

Load Balancing Applying Resources Based on Runtime Conditions in Cloud Computing

Abstract: With the fast advancement of the Internet, numerous sellers have begun to give

cloud administrations. An ever- increasing number of administrations can be gotten in the

cloud, and clients don't need to do activities on a nearby PC. All activities are figured on

the cloud. At the point when an enormous number of clients endeavor to access cloud

benefits, this frequently makes the server neglect to react. Deciding a technique by which to

give clients auspicious and exact reactions is a subject deserving of cutting edge examine. A

few examinations have been proposed to assess and to create calculations and load adjusting

approaches for cloud-based applications. It is hard for a server to manage the progression

of data created by the majority of the different endeavors endeavoring to get to it.

Unreasonable stream causes server over-load with a resulting loss of data. So the

primary target of this examination is to investigate the outstanding task at hand among

every single virtual machine and execute upgraded load adjusting the calculation to increase

the allotment of VM to cloudlet and limit the makespan time.

Keyword: cloud infrastructure, load balancing, makespan time.

References:

1. N. Ajith Singh, M. Hemalatha, “An approach on semi distributed load balancing algorithm for cloud

computing systems” International Journal of Computer Applications Vol-56 No.12 2012

2. Shanti Swaroop moharana, Rajadeepan d. Ramesh &DigamberPowar, “Analysis of load balancers in

cloudcomputing” International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue2, May 2013, 101-108.

3. D. Fernández-Baca: Allocating modules to processors in a distributed system, IEEE Transactions

onSoftware Engineering, Vol. 15, No. 11, pp. 1427-1436 (1989 4. Vibhore Tyagi, Tarun Kumar, “ORT Broker Policy: Reduce Cost and Response Time Using Throttled

LoadBalancing Algorithm” in Procedia Computer Science Volume 48, 2015, Pages 217-221

5. P.P. Geethu Gopinath, Shriram K. Vasudevan, “An In-depth Analysis and Study of Load BalancingTechniques in the Cloud Computing Environment” in Procedia Computer Science Volume 50, 2015,

Pages 427-432

6. S. Jain and A. K. Saxena, "A survey of load balancing challenges in a cloud environment," 2016International Conference System Modeling & Advancement in Research Trends (SMART), Moradabad,

2016, pp. 291-293

7. O. Kaneria and R. K. Banyal, "Analysis and improvement of load balancing in Cloud Computing," 2016International Conference on ICT in Business Industry & Government (ICTBIG), Indore, 2016, pp. 1-5

8. R. K. Jena, “Energy Efficient Task Scheduling in Cloud Environment” in Energy Procedia, Volume

141,December 2017, Pages 222-227 9. M. Lawanyashri, Dr. Balamurugan Balusamy, Dr. S. Subha, “Energy-aware Hybrid Fruitfly Optimizationfor

load balancing in cloud environments for EHR applications” in Informatics in Medicine Unlocked Volume8,

2017, Pages 42-50 10. Ahmed M. Manasrah, Tariq Smadi, Ammar ALmomani, “A Variable Service Broker Routing Policy for data

center selection in cloud analyst” in Journal of King Saud University - Computer and Information Sciences

Volume 29, Issue 3, July 2017, Pages 365-37 11. Obinna H. Ejimogu, SerenBaşaran, “A systematic mapping study on soft computing techniques to cloud

environment” in Procedia Computer Science Volume 120, 2017, Pages 31-38

12. Mousa Elrotub, Abdelouahed Gherbi, “Virtual Machine Classification-based Approach to Enhanced Workload Balancing for Cloud Computing Applications” in Procedia Computer Science Volume 130,

2018, Pages 683-688

13. Amanpreet Kaur, Bikrampal Kaur, Dheerendra Singh, " Meta-heuristic based framework for workflow load balancing in cloud environment " in International Journal of Information Technology, 2018, pp 1–7

14. Mohit Kumar, S. C. Sharma, “Dynamic load balancing algorithm for balancing the workload among

virtualmachine in cloud computing” in Procedia Computer Science Volume 115, 2017, Pages 322-329

567-571

Authors: P. Limameren Chang, Garima Saini

90

Paper

Title:

Different Substrate Materials For Designing A Passive UHF RFID Tag Antenna

Abstract: The Radio Frequency Identification (RFID) technology has been increasingly used

for various application such as tracking of products, smart cards, identification, item

management, security etc. In this paper, the performance parameter of the passive UHF RFID

tag antenna has been studied for four different substrate materials viz., FR4 epoxy, PET,

Rogers 4350, Taconic TLY materials. A simple meandered dipole antenna has been designed

using a T-match stub for impedance matching of the tag antenna with the attached RFID chip.

These different substrates are then designed separately, for the same antenna geometry. The

effect of using these substrates on RFID tag antenna parameters such as reflection coefficient,

antenna gain, VWSR, radiation pattern, impedance, ease of optimization level, read range,

and radiation efficiency are then observed.

Keyword: impedance matching, meander line antenna, tag antenna, UHF RFID

References: 1. ALN-9762 Short Inlay Technical Data Sheet, Alien Technology Co. USA. 2. Jasmin Grosinger,Walther Pachler,and Wolfgang Bosch, “Tag sizematters”, IEEE Microwave Magazine, Vol.

19, No.6, 2018, pp.101-111.

3. Y. He, X. Zhao, C. Zhang, and Z. Wang, “A fully Integrated Chip- ID tag used in chip information identification,” in Proc. IEEE Int.Conf. Radio Frequency Identification, 2012, pp. 172–176.

4. P. Bhartia, I. Bahl, R. Garg, and A. Ittipiboon, Microstrip Antenna Design Handbook. Boston, MA: Artech, 2000, pp. 759-761.

5. C. A. Balanis, Antenna Theory, Analysis and Design, Second Edition, New York, John Wiley &Sons Inc.,

1997,pp. 771-775. 6. A. Khan and R. Nema, “Analysis of five different dielectric substrates on microstrip patch antenna,” Int. J.

Comput. Appl., Vol. 55, No. 14, 2012, pp. 6-12.

7. Wee FwenHoon, Yew Been Seok, Mohamed Fareq Abdul Malek, Lee Yeng Seng,SitiZuraidah Ibrahim, “Radio Frequency Identification (RFID) tag antenna design at Ultra High Frequency (UHF) band”, Indian Journal of

Science and Technology, Vol 10, 2017, pp. 1-6.

8. Nanassy. A. I, “Dielectric measurement of moist wood in a sealed system.”, Wood Sci. Technol., Vol. 6, 1972, pp. 67-77.

9. A Guide to FR4: When Can You Use It and When Can You Not, Millennium Circuits Limited.

10. Diego Betancourt, and Joaquin Castan, “Printed antenna on flexible low-cost PETsubstrate for UHF applications”, Progress In Electromagnetics Research C, Vol. 38, 2013, pp. 129-140.

11. M. G. Faraj, K. Ibrahim, M. K. Ali, “PET as a plastic substrate for the flexible optoelectronic applications”,

Optoelectronics And Advanced Materials – Rapid Communications, Vol. 5, No. 8, 2011, pp. 879 – 882. 12. Nhan Ai Tran, Huy Nam Tran, Mau Chien Dangand Eric Fribourg-Blanc, “Copper thin film for RFID UHF

antenna on flexible substrate”, Advances In Natural Sciences: Nanoscience And Nanotechnology, Vol.1, 2010,

pp.1-6. 13. RO4000 Series Laminated Data Sheet, Rogers Corporation, pp. 1-4.

14. Rogers Material PCB- Rogers 4350, Rayming PCB & Assembly.

15. TLY Family of Low Loss Laminates, Taconic. 16. Olusola O. Olaode, W. Devereux Palmer, William T. Joines, “Characterization of meander dipole antennas

with a geometry-based, frequency- independent lumped element model”, IEEE Antennas And Wireless

Propagation Letters, Vol. 11, 2012, pp. 346-349. 17. A.Abattouy, M. Y. Douieb, M.A. Ennasar, O. EL Mrabet, K. Ameziane, “Design of a low cost meander line

RFID tag antenna using 3D printing technology”, International Conference on Multimedia Computing and

Systems, 2018, pp.1-3. 18. Gaetano Marrocco, “The art of UHF RFID antenna design: Impedance-matching and size-reduction

techniques”, IEEE Antennas and Propagation Magazine, Vol. 50, No. 1, 2008, pp. 66-79.

19. D. Prabhakar, CH. Balaswamy, M. AkhilPoorvika, M. Venkata Krishna Sai, M. Subba Naidu, “Flexible Microstrip Patch Antenna using Different Substrates for Bio- Medical Applications”,International Journal of

Innovative Technology and Exploring Engineering, Vol. 8, No. 7,2019pp.1350-1352.

20. Lingfei Mo and Chenyang Li, “Double loop inductive feed patch antenna design for antimetalUHF RFID tag”, International Journal of Antennas and Propagation, Vol. 2019, pp. 1-9.

21. Ying She, Tao Tang, Guang Jun Wen, Hao Ran Sun, “Ultra-High-Frequency Radio Frequency Identification

tag antenna applied for human body and water surfaces”, International Journal of RF and Microwave Computer Aided Engineering, Vol. 29, 2018, pp. 1-8.

572-580

Authors: Parul Sharma, Harpreet Kaur, Simran Uppal

Paper A novel Technique for Copy move forgery detection using Grey level co-occurrence

91

Title: matrix

Abstract: In this paper we have studied the GLCM approach as an improvement over SWT-

DCT method for feature extraction for CMFD. We have carefully studied the previously used

methods and also studied the SWT-DCT method for improvement in features. We have

proposed a method for the use of GLCM instead of SWT-DCT method for feature extraction

which will improve the results of CMFD method used in the base work framework.

Keyword: CMFD, GLC, SWT

References:

1. Islam, M., Shah, M., Khan, Z., Mahmood, T., & Khan, M. J. (2015, December). A new symmetric key encryption algorithm using images as secret keys. In 2015 13th International Conference on Frontiers of

Information Technology (FIT) (pp. 1-5). IEEE.

2. Kessler, G. C. (2004). An overview of steganography for the computer forensics examiner. Forensic science communications, 6(3), 1-27.

3. Almohammad, A., Hierons, R. M., & Ghinea, G. (2008, March). High capacity steganographic method based

upon JPEG. In 2008 Third International Conference on Availability, Reliability and Security (pp. 544-549). IEEE.

4. Al-Qershi, O. M., & Khoo, B. E. (2017). Comparison of matching methods for copy-move image forgery

detection. In 9th International Conference on Robotic, Vision, Signal Processing and Power Applications (pp. 209-218). Springer, Singapore.

5. Mahmood, T., Nawaz, T., Ashraf, R., Shah, M., Khan, Z., Irtaza, A., & Mehmood, Z. (2015, December). A

survey on block based copy move image forgery detection techniques. In 2015 International Conference on Emerging Technologies (ICET) (pp. 1-6). IEEE.

6. Muhammad, G., Al-Hammadi, M. H., Hussain, M., & Bebis, G. (2014). Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications, 25(4), 985-995.

7. Li, Y. (2013). Image copy-move forgery detection based on polar cosine transform and approximate nearest

neighbor searching. Forensic science international, 224(1-3), 59-67. 8. Zhao, J., & Guo, J. (2013). Passive forensics for copy-move image forgery using a method based on DCT and

SVD. Forensic science international, 233(1-3), 158-166.

9. Lee, J. C., Chang, C. P., & Chen, W. K. (2015). Detection of copy–move image forgery using histogram of orientated gradients. Information Sciences, 321, 250-262.

10. Silva, E., Carvalho, T., Ferreira, A., & Rocha, A. (2015). Going deeper into copy-move forgery detection:

Exploring image telltales via multi-scale analysis and voting processes. Journal of Visual Communication and Image Representation, 29, 16-32.

11. Liu, G., Wang, J., Lian, S., & Wang, Z. (2011). A passive image authentication scheme for detecting region-

duplication forgery with rotation. Journal of Network and Computer Applications, 34(5), 1557-1565. 12. Uliyan, D. M., Jalab, H. A., Wahab, A. W. A., Shivakumara, P., & Sadeghi, S. (2016). A novel forged blurred

region detection system for image forensic applications. Expert Systems with Applications, 64, 1-10.

13. Mohanaiah, P., Sathyanarayana, P., & GuruKumar, L. (2013). Image texture feature extraction using GLCM approach. International journal of scientific and research publications, 3(5), 1.

14. Lee, J. C. (2015). Copy-move image forgery detection based on Gabor magnitude. Journal of Visual

Communication and Image Representation, 31, 320-334. 15. Li, G., Wu, Q., Tu, D., & Sun, S. (2007, July). A sorted neighborhood approach for detecting duplicated

regions in image forgeries based on DWT and SVD. In 2007 IEEE international conference on multimedia and

expo (pp. 1750-1753). IEEE. 16. Zimba, M., & Xingming, S. (2011). DWT-PCA(EVD) Based Copy-move Image Forgery

Detection. International Journal of Digital Content Technology and its Applications, 5(1).

17. Mahmood, T., Nawaz, T., Shah, M., Khan, Z., Ashraf, R., & Habib, H. A. (2016). Copy-move forgery detection technique based on DWT and Hu Moments. International Journal of Computer Science and Information

Security (IJCSIS), 14(5).

18. Coifman, R. R., & Donoho, D. L. (1995). Translation-invariant de-noising. In Wavelets

and statistics (pp. 125-150). Springer, New York, NY. 19. Starck, J. L., Fadili, J., & Murtagh, F. (2007). The undecimated wavelet decomposition and its

reconstruction. IEEE Transactions on Image Processing, 16(2), 297-309.

20. Muhammad, G., Hussain, M., & Bebis, G. (2012). Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital investigation, 9(1), 49-57.

21. Mahmood, T., Mehmood, Z., Shah, M., & Khan, Z. (2018). An efficient forensic technique for exposing region

duplication forgery in digital images. Applied Intelligence, 48(7), 1791-1801. 22. Cao, Y., Gao, T., Fan, L., & Yang, Q. (2012). A robust detection algorithm for copy-move forgery in digital

images. Forensic science international, 214(1-3), 33-43.

23. Amerini, I., Uricchio, T., Ballan, L., & Caldelli, R. (2017, July). Localization of JPEG double compression through multi-domain convolutional neural networks. In 2017 IEEE Conference on computer vision and pattern

recognition workshops (CVPRW) (pp. 1865-1871). IEEE.

24. Chaplot, S., Patnaik, L. M., & Jagannathan, N. R. (2006). Classification of magnetic resonance brain images

581-586

using wavelets as input to support vector machine and neural network. Biomedical signal processing and

control, 1(1), 86-92.

25. Mahmood, T., Nawaz, T., Mehmood, Z., Khan, Z., Shah, M., & Ashraf, R. (2016, August). Forensic analysis of

copy-move forgery in digital images using the stationary wavelets. In 2016 Sixth International Conference on Innovative Computing Technology (INTECH) (pp. 578-583). IEEE.

92

Authors: A.Deepa, Nitasha, NamrataChopra

Paper

Title:

Intensification of Lempel-Ziv-Welch Algorithm

Abstract: There is a necessity to reduce the consumption of exclusive resources. This is

achieved using data compression. The data compression is one well known technique which

can reduce the file size. A plethora of data compression algorithms are available which

provides compression in various ratios. LZW is one of the powerful widely used algorithms.

This paper attempts to propose and apply some enhancements to LZW, hence comes out with

an efficient lossless text compression scheme that can compress a given file at better

compression ratio. The paper proposes three approaches which practically enhances the

original algorithm. These approaches try to gain better compression ratio. In approach1, it

exploits the notion of using existing string code with odd code for a newly encounter string

which is reverse of existing. In approach2 it uses a choice of code length for the current

compression, so avoiding the problem of dictionary overflow. In approach3 it appends some

selective set of frequently encountered string patterns. So the intensified LZW method

provides better compression ratio with the inclusion of the above features.

Keyword: Algorithm, compression, decompression Intensification.

References: 1. G David Solomon, Data compression: The complete references book, Third edition, 2004.

2. Zhou Yan-li, Fan Xiao-ping, Improved LZW algorithm of lossless data compression for WSN, Conference proceedinmgs, 3rd International Conference on Computer Science and information Technology, 2010

3. M. Abu Alsheikh, S. Lin, D. Niyato, H.P. Tan, Rate-distortion balanced data compression for wireless sensor

networks, IEEE Sens. J., 16 (2016), pp. 5072-5083.

4. J.UthayakumarT.VengattaramanP.Dhavachelva, A survey on data compression techniques: From the

perspective of data quality, coding schemes, data type and applications, Journal of King Saud University - Computer and Information Sciences, 2018.

5. J. Abel, W. Teahan, Universal text preprocessing for data compression, IEEE Trans. Comput., 54 (2005), pp. 497-507.

6. Ezhilarasu P,Karthik Kumar P,LZW Lossless Text Data Compression Algorithm – A ReviewInternational Journal of Computer Science & Engineering Technology (IJCSET, Vol. 6 No. 11 Nov 2015.

7. H. Amri, A. Khalfallah, M. Gargouri, N. Nebhani, J.-C. Lapayre, M.-S. Bouhlel Medical image compression approach based on image resizing, digital watermarking and lossless compression, J. Signal Process. Syst., 87 (2017), pp. 203-214.

8. Simrandeep kaur, V.Sulochana Verma, Design and Implementation of LZW Data Compression Algorithm, International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012

9. Sawsan A. Abu Taleb Hossam M.J. Musafa Asma’a M. Khtoom Islah K. Gharaybih, Improving LZW Image Compression, European Journal of Scientific Research, Vol.44 No.3 (2010), pp.502-509.

10. Sawsan A. Abu Taleb , Hossam M.J. Musafa , Asma’a M. Khtoom Improving LZW Image

CompressionEuropean Journal of Scientific Research 1450-216X Vol.44 No.3 (2010), pp.502-509

11. Evon Abu-Taieh1, Issam AlHadid, A New Lossless Compression Algorithm, Modern Applied Science, Canadian Center of Science and Education, Vol. 12, No. 11, 2018.

12. Restu Maulunida*1, Achmad Solichin, Optimization of LZW Compression Algorithm With Modification of

Dictionary Formation , Indonesian Journal of Computing and Cybernetics Systems) Vol.12, No.1, January 2018, pp. 73~82.

587-591

Authors: Arti Tyagi,Cheshta Kashyap, Ashima Kalra

Paper

Title:

Optimal Sequence in General flow shop with Job block criteria using Fuzzy index

Technique

93

Abstract: Here, we are finding a novel methodology to solve a problem of scheduling of

general flow shop where proceeding time of job is indeterminate. The parameters required to

solve such problem was considered to be in triangular fuzzy number. The concept of job

block concept has been introduced to understand relative interference of one job with other.

The novelty of this method lies in the section that it will not convert the fuzzy processing time

into classical numbers to figure out the near optimal sequence of jobs. The method has been

made clearer by giving a numerical example to demonstrate the purposed technique.

Keyword: Triangular fuzzy number (TFN), Fuzzy processing time, Flow shop, Fuzzy

ranking, Location index etc.

References: 1. Johnson S.M. (1954), “Optimal two and three stage production schedule with set times included.” Naval

Research logistics quarterly, 1(1) 61-68.

2. Gupta J.N.D. & Dudek (1971), “Optimality criteria for flow shop schedule” AIIE transactions 3 (3) 199-205.

3. Maggu P.L. & Das G.(1977),“Equivalent job block in job scheduling”, Operation Research vol 14(4) pp 277-

281

4. Singh T.P. (1985),”On 2 x n flow shop problem involving job block, transportation time, arbitrary time and

break down machine times. “PAMS” Vol- XXI (1-2) 5. Mccahon S. and Lee E.S. (1990), “Job sequencing with fuzzy processing times,” Computer and mathematics

applications, Vol 19(7) pp. 294-301.

6. Ishibuchi H and Lee. K.H. (1996), “Formulation of fuzzy flow shop scheduling problem.” Proceedings of IEEE International Conference on Fuzzy System pp 199-205.

7. Hong T. and Chuang T. (1999), “New triangular Fuzzy Johnsons Algorithm.” Computer and Industrial Engg.

Vol 36(1) pp. 179-200. 8. Sayed Reza Hejari, SaeedEmami, Ali Akam (2009), “A Heuristic Algorithm for minimizing the expected make

span in two machine flow shops with fuzzy processing times.” Journal of Uncertain Systems, Vol 3(2) 114-122.

9. Yager R.R. (1981) “A procedure for ordering fuzzy subset of unit interval.” Information sciences, 24 pp. 143-161.

10. Ming Ma, Friedman, A. Kandel (1999). “A new fuzzy arithmetic,” Fuzzy Sets and Systems Vol 108 pp 83-90.

11. Singh T.P, Sunita and Praveen Ailawalia(2008), “Refer motion of Non-fuzzy Scheduling using concept of fuzzy Processing time under job – block”, International conference on Intelligent System & Network pp 322-

324.

12. T.P. Singh & Sunita (2009) “Fuzzy Flow Shop Problem on 2 Machines with single transportation facility: A

Heuristic Approach.” Aryabhatta J.Y. Maths& Info Vol (1-2) pp 38-46.

13. T.P. Singh & Sunita Gupta (2010), “An α-cut approach to Fuzzy Processing Time on 2 machine flow shop scheduling.” Aryabhatta Journal of Mathematics & Informatics,Vol 2 (1) pp 35-44.

14. T.P. Singh & Indira Vij (2007) “Minimize Rental Cost of machines in m stage scheduling with job-block

concept.” Reflections Das Era, J. of Mathematical Sciences Vol 2 (4) pp 359-370. 15. Menu, T.P. Singh & Deepak Gupta (2013) “A Heuristic Algorithm for General Weightage job scheduling

under uncertain environment.” Aryabhatta J. of Maths &Info Vol 5(2) pp 331-388.

16. T.P. Singh, Meenu Mittal & Gupta D. (2015) “Tardiness of Jobs and Satisfaction Level of Demand Maker in m stage Scheduling with Fuzzy due time.” Arybhatta J. of Maths & Info. Vol 7(2) pp 351-358.

17. Namita Aggarwal and Arti Tyagi (2017)“ optimal sequence in fuzzy flow shop scheduling with job – block

concept using location index and fuzziness index function technique” Aryabhatta Journal of Mathematics & Informatics Vol. 9, No. 1, ISSN : 0975-7139, pp: 21- 30.

18. Abbasbandy S. &Hajjari T. (2009). “A New Approach for Ranking of Trapezoidal Fuzzy Numbers.”

Computers and Mathematics with Applications, Vol 57 pp 413-419.

592-597

94

Authors: Dr. Charu Jain, Dr. Ved Mishra, Aarti Chugh

Paper

Title:

Palm Vein Technology for Biometrics

Abstract: The use and implementation of biometrics for identification and authentication has

become more important in the past decade. This is because there has been an increased risk

associated with textual passwords such as dictionary attacks, eavesdropping, shoulder surfing

etc. We have worked on Palm vein recognition for detecting palm veins in applications for

biometric security using near infrared absorption phenomena. The goal is to produce a

software prototype that is capable of identifying a person by the vein structures of the hand.

The images used for the same were taken from the CASIA-MS-PalmprintV1 database

collected by the Chinese Academy of Sciences' Institute of Automation (CASIA). After pre-

processing, LDR and DCT have been used for feature extraction and Euclidian Distance is

598-602

calculated for generating matching score. Acceptance/rejection is based on this matching

score. The efficiency obtained was 93.2% when compared with other systems.

Keyword: Biometrics, Near-Infrared Image, Palm Vein Recognition, Region of Interest

References: 1. Vishal U. Bhosale, Mr. Onkar S. Kale, Mr. Mahesh W. Pawar, Mr. Roshan R. Patil, Mr. Pritam S. Patil, Prof

Mrs. Sonali Madankar,” Palm Vein Extraction and Matching For Personal Identification”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume 16, Issue 2, Ver. IX

(Mar-Apr. 2014), PP 64-68.

2. Ajay Kumar, et al., "Personal Authentication Using Hand Vein Triangulation and Knuckle Shape.", IEEE Transaction on Image Processing. Vol.18, no.9, September 2009, pp2127- 2136.

3. Aycan Yuksel, Lale Akarun, Bulent Sankur, Jie Cao, "My Palm Vein: A Palm Vein-based Lowcost Mobile

Identification System For Wide Age Range", 17th International Conference on E-health Networking Application & Services 2015.

4. N. Miura, A.Nagasaka, T. Miyatake, "Feature extraction of finger-vein patterns based on repeated line tracking

and its application to Person Identification", Machine Vision and Applications, vol.15, no.4, 2004, pp.194-203. 5. Nisha Charaya, Dr. Priti Singh“International Journal of Pure and Applied Mathematics”, Volume 119, No. 16,

2018, pp. 2175-2185.

6. Jason Forté,”Development of a Near Infrared Hand Vein Imaging Device With Software Enhancement”, Presented at University of Cape Town, November 2014.

7. Jayanti Yusmah Sari, Chastine Fatichah, and Nanik Suciati “Local Line Binary Pattern For Feature Extraction

On Palm Vein Recognition”, Department of Informatics Engineering, Faculty of Information Technology, Institute Teknologi Sepuluh Nopember Surabaya Keputih, Sukolilo, Surabaya 60111, East Java, Indonesia

8. Yingbo Zhou and Ajay Kumar, “Human Identification Using Palm-Vein Images”, IEEE Transaction on

Information Forensics and Security, December 2011, VOL.6, NO.4. 9. Sheetal, Ravi Prakash Goel, Kanwal Garg “Image Processing in Hand Vein Pattern Recognition System”,

Volume 4, Issue 6, June 2014, International Journal of Advanced Research in Computer Science and Software

Engineering 10. Dattatray V. Jadhav, Raghunath S. Holambe “Radon and discrete cosine transforms based feature extraction and

dimensionality reduction approach for face recognition”, Department of Instrumentation, SGGSIE & T,

Vishnupuri, Nanded (MS), Maharashtra 411037, India 11. Vijayta Chowdhary, Kamini Verma, Himanshu Monga “Human Identification Using Palm-Vein Images Using

Gabor Filter”, Volume 4, Issue 7, July 2014 ISSN: 2277 128X, International Journal of Advanced Research in

Computer Science and Software Engineering 12. Anisotropic Diffusion, “http://www.mathworks.com/ matlabcentral/fileexchange/14995-anisotropic-diffusion--

perona---malik-/content/anisodiff_PeronaMalik/ anisodiff2D.m.

13. Sudha Yadav, Charu Jain, Aarti Chugh, “Evaluation of Image Deblurring Techniques” IJCA, vol. 139, 2016.

14. Charu Jain, Aarti Chugh, Dr. Priti Singh, “An Offline Signature verification using Adaptive Resonance Theory”

IJCA, vol 94, issue 2, 2014, pp 8-11.

95

Authors: Mainka, Khushal Thakur, Kiran Jot Singh

Paper

Title:

Detection of Coverage Hole Nodes in Wireless Sensor Network using Artificial

Intelligence

Abstract: Adequate coverage of the sensing field in Wireless sensor networks (WSNs) is

critical to many applications. However, when one or more sensor nodes stop working due to

energy exhaustion or physical damage, the network may experience overlay vulnerability.

This can disrupt network connectivity and hinder performance. Therefore, it must be fixed

automatically. To resolve this problem, swarm inspired Artificial Bee Colony (ABC) scheme

in addition to the Artificial Neural Network (ANN) approach is used. The aim of ABC is to

optimize the shortest path by selecting an appropriate fitness function and then identify holes

using ANN. Before the detection of holes, ANN is trained as per the optimized properties of

nodes that are as per the genuine nodes and coverage hole repair properties. Therefore during

the testing process, ANN compares these properties with the stored properties and then

identify the hole repair node. From the experiment, it has been analyzed that the energy

consumption up to 23.88% is saved.

Keyword: WSN, coverage holes, mobility, ABC, ANN

References: 1. Zhu, C., Zheng, C., Shu, L., & Han, G. (2012). A survey on coverage and connectivity issues in wireless sensor

networks. Journal of Network and Computer Applications, 35(2), 619-632.

603-606

2. Ahmed, N., Kanhere, S. S., & Jha, S. (2005). The holes problem in wireless sensor networks: a survey. ACM

SIGMOBILE Mobile Computing and Communications Review, 9(2), 4-18.

3. Tian, Y., Chang, X., Ou, Y., & Jiang, Y. (2019, April). Coverage Hole Detection Algorithm Based on Cooperative

Probability Coverage in Wireless Sensor Networks. In 2018 5th IEEE International Conference on Cloud

Computing and Intelligence Systems (CCIS) (pp. 835-840). IEEE.

4. Htun, A. M., Maw, M. S., & Sasase, I. (2014, September). Reduced complexity on mobile sensor deployment and

coverage hole healing by using adaptive threshold distance in hybrid wireless sensor networks. In 2014 IEEE 25th

Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC) (pp. 1547-1552). IEEE.

5. Tamboli, N., & Younis, M. (2010). Coverage-aware connectivity restoration in mobile sensor networks. Journal of

network and computer applications, 33(4), 363-374.

6. Wang, J., Ju, C., Gao, Y., Sangaiah, A. K., & Kim, G. J. (2018). A PSO based energy efficient coverage control

algorithm for wireless sensor networks. Comput. Mater. Contin, 56, 433-446.

7. Yi, L., Deng, X., Zou, Z., Ding, D., & Yang, L. T. (2018). Confident information coverage hole detection in

sensor networks for uranium tailing monitoring. Journal of Parallel and Distributed Computing, 118, 57-66.

8. Amgoth, T., & Jana, P. K. (2017). Coverage hole detection and restoration algorithm for wireless sensor

networks. Peer-to-Peer Networking and Applications, 10(1), 66-78.

9. Sahoo, P. K., & Liao, W. C. (2015). HORA: A distributed coverage hole repair algorithm for wireless sensor

networks. IEEE Transactions on Mobile Computing, 14(7), 1397-1410.

10. Zhao, L. H., Liu, W., Lei, H., Zhang, R., & Tan, Q. (2016). Detecting boundary nodes and coverage holes in

wireless sensor networks. Mobile Information Systems, 2016.

11. Cheng, C. T., Chi, K. T., & Lau, F. C. (2011). A delay-aware data collection network structure for wireless sensor

networks. IEEE sensors journal, 11(3), 699-710

12. He, Y. Q. (2017). Signal hole repair strategy based on sensor deployment density for mobile crowd

network. EURASIP Journal on Embedded Systems, 2017(1), 16.

13. Fan, X., Zhang, Z., Lin, X., & Wang, H. (2014, June). Coverage hole elimination based on sensor intelligent

redeployment in WSN. In The 4th Annual IEEE International Conference on Cyber Technology in Automation,

Control and Intelligent (pp. 336-339). IEEE.

14. Deng, L., Ma, X., Gu, J., & Li, Y. (2018). DETECTION AND REPAIR OF COVERAGE HOLES IN MOBILE

SENSOR NETWORKS USING SUB-VORONOI CELLS. International Journal of Robotics and

Automation, 33(6).

15. Mann, P. S., & Singh, S. (2019). Improved artificial bee colony metaheuristic for energy-efficient clustering in

wireless sensor networks. Artificial Intelligence Review, 51(3), 329-354.

16. Yuan, Q., Wei, Y., Meng, X., Shen, H., & Zhang, L. (2018). A multiscale and multidepth convolutional neural

network for remote sensing imagery pan-sharpening. IEEE Journal of Selected Topics in Applied Earth

Observations and Remote Sensing, 11(3), 978-989.

17. Khalifa, B., Al Aghbari, Z., Khedr, A. M., & Abawajy, J. H. (2017). Coverage hole repair in WSNs using

cascaded neighbor intervention. IEEE Sensors Journal, 17(21), 7209-7216.

96

Authors: Himaja Sree, Dandabathula Kumudhini, Vuyyuru Sruthi Laya, Guttikonda Geetha

Paper

Title:

QSAR Analysis for For Drug Discovery

Abstract: Quantitative structure-activity relationship (QSAR), gives useful information for

drug design and medicinal chemistry. QSAR is a method used to anticipate the organic

reaction of a molecule by developing equations which use descriptors calculated from its

compounds. The molecular descriptors vary in complexity. A time consuming and expensive

process for pharmaceutical industries is drug discovery. An inspiration driving these QSAR

models is to help revive the revelation of molecular drug candidates through minimized test

work and to bring a drug to market faster. To obtain sorted features principal component

analysis is used. The biological activities of the test set are determined by training the neural

network using training set. By predicting the activities it can be known whether the drug is

close to the target or not.

Keyword: biological activity, descriptors, neural networks, Quantitative- structure activity

relationship.

References: 1. Gregory Sliwoski, Sandeepkumar Kothiwale, Jens Meiler, and on Computational Methods in Drug Discovery 2. gor I. Baskin , Vladimir A. Palyulin , and Nikolai S. Zefirov on Neural Networks in

Building QSAR Models ,2008 Research Gate 3. Rachid Darnaga, BrahimMinaouia, MohamedFakir on QSAR models for prediction study of HIV protease

inhibitors using support vector machines, neural networks and multiple linear regression, Arabian Journal Of

Chemistry, Volume 10, Supplement 1, February 2017

607-610

4. Li Wen, Qing Li, Wei Li, Qiao Cai, and Yong-Ming Cai on A QSAR Study Based on SVM for the Compound of

Hydroxyl Benzoic Esters , BioInorganic Chemistry and Applications, Volume 2017, Article ID 4914272, 10 pages

5. Mohamed G. Malhat ; Hamdy M. Mousa ; Ashraf B. El-Sisi on Clustering of chemical data sets for drug

discovery ,2014 9th International Conference on Informatics and Systems 6. Breiman, L. Random forests. Machine Learning 2001, 45, 5−32.

7. Cortes, C.; Vapnik, V. N. Support-vector networks. Machine Learning 1995, 20, 273−297.

8. Svetnik, V.; Wang, T.; Tong, C.; Liaw, A.; Sheridan, R. P.; Song, Q. Boosting: an ensemble learning tool for compound classification and QSAR modeling. J. Chem. Inf. Comput. Sci. 2005, 45, 786−799.

9. Bruce, C. L.; Melville, J. L.; Picket, S. D.; Hirst, J. D. Contemporary QSAR classifiers compared. J. Chem. Inf.

Model. 2007, 47, 219−227. 10. Svetnik, V.; Liaw, A.; Tong, C.; Culberson, J. C.; Sheridan, R. P.; Feuston, B. P. Random forest: a classification

and regression tool for compound classification and QSAR modeling. J. Chem. Inf. Comput.Sci. 2003, 43,

1947−1958. 11. Fernandez-Delgado, M.; Cernades, E.; Barro, S.; Amorim, D. A. Do we need hundreds of classifiers to solve real

world problems? J. Machine. Learning. Res. 2014, 15, 3133−3181.

12. Burden, F. R. Quantitative structure-activity relationship studies using Gaussian Processes. J. Chem.Inf. Comput. Sci. 2001, 41, 830− 835.

97

Authors: Sukhdeep Kaur, Rajesh Khanna, Pooja Sahni, Naveen Kumar

Paper

Title:

Design and Optimization of Microstrip Patch Antenna using Artificial Neural Networks

Abstract: In this paper a Neural Network model for the design of a Microstrip Patch

Antenna for an Ultra-wideband frequency range is presented. The reduced ground size is

used to enhance bandwidth in proposed design. The results obtained from the proposed

method are compared with the results of EM simulation software and are found to be in

good agreement. The advantage of the proposed method lies with the fact that the various

parameters required for the design of a Microstrip Patch Antenna at a particular frequency

of interest can be easily extracted without going into the rigorous time consuming, iterative

design procedures using a costly software package. In the paper staircase patch design is

considered for ultra-wideband matching of Antenna. The results obtained from artificial

neural network when compared with experimental and simulation results, found satisfactory

and also it is concluded that Radial Basis Function (RBF) network is more accurate and fast

for the proposed design.

Keyword: Neural network, microstrip patch antenna, staircase, radial basis function.

References: 1. Choudhury, B., Thomas, S., &Jha, R. M. (2015). Implementation of soft computing optimization techniques in

antenna engineering [antenna applications corner]. IEEE Antennas and Propagation Magazine, 57(6), 122-

131.

2. Singhal, M., & Saini, G. (2017). Optimization of antenna parameters using artificial neural network: A

review. Int. J. Comput. Trends Technol, 44, 64-73.

3. C. A. Balanis, Antenna Theory, John Wiley & Sons, Inc., 1997.

4. Manh, L. H., Mussetta, M., Grimaccia, F., Zich, R. E., &Pirinoli, P. (2014, April). Antenna optimization

based on Artificial Neural Network. In The 8th European Conference on Antennas and Propagation (EuCAP 2014) (pp. 3172-3175). IEEE.

5. Ozkaya, U., &Seyfi, L. (2015). Dimension optimization of microstrip patch antenna in X/Ku band via

artificial neural network. Procedia-Social and Behavioral Sciences, 195, 2520-2526.

6. Kaur, R., & Rattan, M. (2015). Optimization of the return loss of differentially fed microstrip patch antenna

using ANN and firefly algorithm. Wireless Personal Communications, 80(4), 1547-1556.

7. Guney, K., Sagiroglu, S., &Erler, M. (2002). Generalized neural method to determine resonant frequencies of

various microstrip antennas. International Journal of RF and Microwave Computer‐Aided Engineering:

Co‐sponsored by the Center for Advanced Manufacturing and Packaging of Microwave, Optical, and Digital

Electronics (CAMPmode) at the University of Colorado at Boulder, 12(1), 131-139..

8. Dhaliwal, B. S., &Pattnaik, S. S. (2016). Performance comparison of bio-inspired optimization algorithms for

Sierpinski gasket fractal antenna design. Neural Computing and Applications, 27(3), 585-592..

9. Mishra, R. K., &Patnaik, A. (1998). Neural network-based CAD model for the design of square-patch

antennas. IEEE Transactions on Antennas and propagation, 46(12), 1890-1891.

10. Devi, S., Panda, D. C., &Pattnaik, S. S. (2002, June). A novel method of using artificial neural networks to

calculate input impedance of circular microstrip antenna. In IEEE Antennas and Propagation Society

International Symposium (IEEE Cat. No. 02CH37313) (Vol. 3, pp. 462-465). IEEE.

11. Xiao, L. Y., Shao, W., Jin, F. L., & Wang, B. Z. (2018). Multiparameter modeling with ANN for antenna

design. IEEE Transactions on Antennas and Propagation, 66(7), 3718-3723.

611-616

12. Chetioui, M., Boudkhil, A., Benabdallah, N., &Benahmed, N. (2018, April). Design and optimization of SIW

patch antenna for Ku band applications using ANN algorithms. In 2018 4th International Conference on

Optimization and Applications (ICOA) (pp. 1-4). IEEE.

98

.

Authors: Pallavi Choudekar, Divya Asija, Upasana Gaur

Paper

Title:

Power Transmission Lines Congestion Control with Proper Placement of Smart Wire

Abstract: Congestion is severe problem that affects the power system security as it violates

the various operating limits of the power system so congestion management is an important

task for independent system operator. For managing congestion, smart wire module has

been used in series with transmission line. When smart wire is connected in series with most

congested line, there is improvement in voltage profile, reduction in transmission line

loading and losses. Transmission Congestion Distribution Factor (TCDF) is calculated to

know congestion in lines and congestion is managed with the help of smart wire module. It

is observed that value of TCDF also reduced when smart wire is connected. Work has been

carried out on IEEE 15 bus system on MATLAB.

Keywords:Smart wire, Congestion, TCDF (Transmission Congestion Distribution Factor),

PTCDF (Active Power Transmission Congestion Distribution Factor), QTCDF (Reactive

Power Transmission Congestion Distribution Factor).

References: 1 .Sananda Pal, Samarjit Sengupta, “Congestion Management of a Multi-bus Transmission System using

Distributed Smart Wires”, International conference on Control, Instrumentation, Energy and Communication (CIEC), 2014, pp.417-419.

2.Sananda Pal, A. Neogi, S. Biswas, M. Bandyopadhyay and S. Sengupta,” Loss Minimization and Congestion

Management of a Power Distribution Network through its Reconfiguration”, International Journal of Electrical,

Electronics ISSN No. (Online) : 2277-2626 and Computer Engineering 2(2): 95-99(2013) Special Edition for Best Papers of Michael Faraday IET India Summit-2013, pp. 95-98.

3.D. Venugopal, A. Jayalaxmi, “Congestion Management by Optimal Choice and Allocation of FACTS Controllers using Genetic Algorithm”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307,

Vol.4, pp. 72-73, July 2014.

4.S.N. Singh, A.K. David, “Congestion Management by Optimizing FACTS Device Location”, International

Conference on Electric Utility Deregulation and Restructuring and Power Technologies, 2000. Proceedings. DRPT

2000, pp. 23.

5.Frank Kreikebaum, Debrup Das, Yi Yang, Member, Frank Lambert, Prof. Deepak Divan, “Smart Wires A

Distributed, Low-Cost Solution for Con-trolling Power Flows and Monitoring Transmission Lines”, international conference on Innovative Smart Grid Technologies Conference Europe (ISGT Europe), 2010 IEEEPES, pp. 2-4.

6. Deepak M. Divan, William E. Brumsickle, Robert S. Schneider, Bill Kranz, Randal W. Gascoigne, Dale T. Bradshaw, Michael R. Ingram, and Ian S. Grant, “ A Distributed Static Series Compensator System for Realizing

Active Power Flow Control on Existing Power Lines”, IEEE transactions on power delivery, vol. 22, pp. 642-644,

January 2007.

7.Jerry Melcher, “Distributed Series Reactance for Grid Power Flow Control”,IEEE PES Chapter Meeting pp. 3-5,

August 8, 2012.

8.Begovic,, Miroslav, “ Electrical Transmission System & Smart Grid,” Selected Entries from the Encyclopedia of

Sustainability Science and Technology Springer, 2013

9.D. M. Divan et al., "A Distributed Static Series Compensator System for Realizing Active Power Flow Control

on Existing Power Lines," in IEEE Transactions on Power Delivery, vol. 22, no. 1, Jan. 2007 pp. 642-649.

10.D. Divan, H. Johal, “Distributed FACTS A New Concept for Realizing Grid Power Flow Control,” IEEE

Transactions on Power Electronics, Vol. 22, Issue 6, Nov. 2007, pp. 2253 2260. S. soft, Power System Economics Piscataway: IEEE Press, 2002, pp.6-16.

11.Abhishek, Asija D., Choudekar P., Manganuri Y., “Series Smart Wire—Managing Load and Congestion in Transmission Line”, Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory

617-621

99

Authors: Dinesh Arora, Hardeep Singh Saini, Harbinder Singh

Paper

Title:

Third party based security approach in vehicular ad-hoc networks

Abstract: Security is the key factor of consideration in the vehicular ad-hoc network

(VANET), which is prone to various security dangers. A VANET package gives information

on life’s essentials and provides security from detrimental external agencies. This paper

presents an outsider-based security approach which secures VANETs condition by verification

process, where marks are produced and conveyed to hubs and checked at the measure of any

transmission. In the suggested approach, the rise in mobility decreases the packet delivery

ratio and performance of proposed protocol is approximately 4% improved as compared to

other techniques. Moreover, the escalation in mobility increases the average delay and in case

proposed protocol is compared with the group based authentication then the improvement in

its performance is approximately 50%.Thus, the proposed approach is completely focused on

security and consequently secures the system..

Keywords:Ad-hoc network, end to end delay, nodes, packet delivery ratio (PDR), security,

VANETs security

References:

1. Qin B, Wu Q, Domingo-Ferrer J, Susilo W. Robust distributed privacy-preserving secure aggregation in

vehicular communication. Control and Cybernetics 2012;42(2):.277-296

2. Azogu IK, Ferreira MT, Larcom JA, Liu K. A new ati-jamming strategy for VANET metrics-directed

security defence in conference proceedings. IEEE Globecom Workshops; 2013, Atlanta, GA, USA,

pp.1344–1349.

3. DOI: 10.1109/GLOCOMW.2013.6825181

4. Dhurander SK, Obaidat M, Jaiswal A, Tiwari A, Tyagi A. Vehicular security through reputation and

plausibility checks. IEEE Systems Journal 2014;8 (2):384-394.

5. DOI. 10.1109/JSYST.2013.2245971

6. Petit J, Feiri M, Kargl F. Spoofed data detection in VANETs using dynamic thresholds”, IEEE Vehicular

Networking ;2011, Amsterdam, Netherlands, pp.25–32. 7. DOI: 10.1109/VNC.2011.6117120

8. Chakroun O, Cherkaoul S. Overhead-free congestion control and data dissemination for 802.11p VANETs.

Vehicular Communications 2014; 1 (3):123–133.

9. doi.org/10.1016/j.vehcom.2014.05.003

10. Pari NS, Jayapal S, Duraisamy S. A trust system in MANET with secure key authentication mechanism. Recent

Trends Information Technology (ICRTIT);2012, IEEE. Chennai, Tamil Nadu, India, pp.261–265. DOI:10.1109/ICRTIT.2012.6206818

11. Karger P, Frankel Y. Security and privacy threats to ITS. In Second World Congress on Intelligent Transport

Systems 2014; 5: 24522458.

12. Raiya R, Gandhi S. Survey of various security techniques in VANET. International Journal of Advanced

Research in Computer Science and Software Engineering 2014; 4 (6):431-433.

13. Dadali AS, Joshi, R. Survey on VANET protocols and security techniques. International Journal of Science and

Research 2015; 4 (6):1644-1648.

14. Ribagorda A, Gonzalez-Tablas AI., Ribagorda A. Overview of security issues in vehicular ad-hoc networks.

Handbook of Research on Mobility and Computing ; 2010, IGI Global, Hershey,USA.

15. Becker M, Gupta A, Marot M, Singh H. Improving clustering techniques in wireless sensor networks using

thinning process. Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges- Series Lecture Notes in Computer Science ; 2014, Springer, pp.203-214

622-628

and Applications. Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore, 2017.

12.Nibha Rani, Pallavi Choudekar, Divya Asija, P Vishnu Astick, “Congestion management of transmission line

using smart wire & TCSC with their economic feasibility”, 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2017, pp 1-5.

13.P Vishnu Astick , Divya Asija , Pallavi Choudekar , Nibha Rani, “Transmission line efficiency enhancement with inclusion of smart wires and controllable network transformers”, th International Conference on Computing,

Communication and Networking Technologies (ICCCNT), 2017 ,pp 1-6.

16. Bitam S, Mellouk A, Zeadally S. HyBR: A hybrid bio-inspired bee swarm routing protocol for safety

applications in vehicular adhoc networks (VANETs). Journal of Systems Architecture 2013; 59 (10B):953–957.

17. doi.org/10.1016/j.sysarc.2013.04.004

18. Chen L, Ng SL, Wang G. Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in

Communications 2011; 29 (3):605–615.

19. DOI: 10.1109/JSAC.2011.110310

20. Bali RS, Kumar N, Rodrigues JJPC. Clustering in vehicular ad hoc networks: Taxonomy, challenges and

solutions. Vehicular Communications 2014;1(3):134-152.

21. doi.org/10.1016/j.vehcom.2014.05.004

22. Katal A,Wazid M, Goudar RH. A cluster based detection and prevention mechanism against novel datagram

chunk droppingattack 23. in MANET multimedia transmission. Information & Communication Technologies (ICT) ; 2013, IEEE.

Thuckalay, Tamil Nadu, India, pp.479–484.

24. DOI: 10.1109/CICT.2013.6558143Verma K, Hasullah H, Saini HK. Reference broadcast synchronization-based prevention to DoS attacks in VANET.7th IEEE International Conference on Contemporary Computing ; 2014,

Noida, India, pp. 270–275.

25. DOI: 10.1109/IC3.2014.6897185

26. Khabazian M, Aissa S, Mehmet-Ali M. Performance modelling of safety messages broadcast in vehicular ad

hoc networks. IEEE Transactions on Intelligent Transportation Systems 2013; 14 (1): 380- 387. DOI:10.1109/TITS.2012.2213595

27. Daeinabi A, Rahbar AG. An advanced security scheme based on clustering and key distribution in vehicular

ad-hoc networks. Computers & Electrical Engineering. 2014 ; 40 (2) :517–529.

28. doi.org/10.1016/j.compeleceng.2013.10.003

29. Yujin L, Zhao M, Wang W. Internode mobility correlation for group detection and analysis in VANETs. IEEE Transactions on Vehicular Technology 2013; 62(9):4590-4601.

30. DOI: 10.1109/TVT.2013.2264689

31. Wang M, Shan MH, Lu R,Zhang R, Shen X, Bai F. Real-time path planning based on hybrid-VANET-

enhanced transportation system. IEEE Transactions on Vehicular Technology 2015; 64 (5):1664-1678.

32. DOI: 10.1109/TVT.2014.2335201

33. Chim TW, Yiu SM, Hui LCK, Victor OKL. VSPN: VANET-based secure and privacy-preserving

navigation. IEEE Transactions on Computers 2014; 63 (2): 510-524. DOI:10.1109/TC.2012.188

34. Song C, Liu M, Gong HG, Chen GH, Cao JN. Utilizing the dropped packets for data delivery in VANETs.

The Journal of China Universities of Posts and Telecommunications, Elsevier 2013; 20(3): 48–52.doi.org/10.1016/S1005-8885(13)60048-5

35. Kaur, A., Arora, D.: Survey over VANET routing protocols for vehicle communication. Int. J. Electr.

Electron. Eng. 1, 1–6(2014)

36. Jain, P., Arora, D.: A survey on link connectivity of networks. Int. J. of Engineering Applied Sciences and Technology, 2016 Vol. 1, Issue 10, ISSN No. 2455-2143, Pages 156-162 Published Online August -

September2016.

37. P.Jain and D. Arora, "Fuzzification based intravehicular

communicationinVANETs,"2017InternationalConferenceonI- SMAC (IoT in Social, Mobile, Analytics

and Cloud) (I-SMAC), Palladam,2017,pp.223-228.doi:10.1109/I-SMAC.2017.8058344

100

Authors: Ruchika, Ravindra Kumar Purwar

Paper

Title:

Abnormality detection using LBP features and K-means labelling based feed-forward neural

network in video sequence

Abstract: Video surveillance is widely used in various domains like military, commercial and

consumer areas. One of the objectives in video surveillance is the detection of normal and

abnormal behavior. It has always been a challenge to accurately identify such events in any

real time video sequence. In this paper, abnormality detection method using Local Binary

Pattern and k-means labeling based feed-forward neural network has been proposed. The

performance of the proposed method has also been compared with four other techniques in

literature to show its worthiness. It can be seen in the experimental results that an accuracy of

up to 98% has been achieved for the proposed technique.

Keyword:NN, k-mean labeling, abnormality detection, video surveillance

References: 1. Singh, Sanjay, Sumeet Saurav, Chandra Shekhar, and Anil Vohra. "Prototyping an automated video

surveillance system using FPGAs." International Journal of Image, Graphics and Signal Processing 8, no. 8,2016, pp : 37

2. Ravanbakhsh, Mahdyar, Moin Nabi, Hossein Mousavi, Enver Sangineto, and Nicu Sebe. "Plug-and-play cnn

for crowd motion analysis: An application in abnormal event detection." In 2018 IEEE Winter Conference on

629-633

Applications of Computer Vision (WACV), pp. 1689-1698. IEEE, 2018.

3. Chong, Yong Shean, and Yong Haur Tay. "Abnormal event detection in videos using spatiotemporal

autoencoder." In International Symposium on Neural Networks,Springer, Cham, 2017, , pp. 189-196..

4. Yang, Michael Ying, Wentong Liao, Yanpeng Cao, and Bodo Rosenhahn. "Video Event Recognition and Anomaly Detection by Combining Gaussian Process and Hierarchical Dirichlet Process

Models." Photogrammetric Engineering & Remote Sensing 84, no. 4,2018, pp: 203-214.

5. Vu, Hung, Tu Dinh Nguyen, and Dinh Phung. "Detection of Unknown Anomalies in Streaming Videos with Generative Energy-based Boltzmann Models." arXiv preprint arXiv:1805.01090 (2018).

6. Muhammad, Khan, Jamil Ahmad, Irfan Mehmood, Seungmin Rho, and Sung Wook Baik. "Convolutional

neural networks based fire detection in surveillance videos." IEEE Access 6,2018,pp: 18174-18183. 7. Hsu, Shih-Chung, Cheng-Hung Chuang, Chung-Lin Huang, Ren Teng, and Miao-Jian Lin. "A video-based

abnormal human behavior detection for psychiatric patient monitoring." In 2018 International Workshop on

Advanced Image Technology (IWAIT), IEEE, 2018, pp. 1-4. 8. Wang, Siqi, En Zhu, Jianping Yin, and Fatih Porikli. "Video anomaly detection and localization by local

motion based joint video representation and OCELM." Neurocomputing 277,2018,pp: 161-175.

9. Tay, Nian Chi, Tee Connie, Thian Song Ong, Kah Ong Michael Goh, and Pin Shen Teh. "A robust abnormal behavior detection method using convolutional neural network." In Computational Science and Technology,

Springer, Singapore, 2019,pp. 37-47..

10. Harjanto, Fredro, Zhiyong Wang, Shiyang Lu, Ah Chung Tsoi, and David Dagan Feng. "Investigating the

impact of frame rate towards robust human action recognition." Signal Processing124 (2016): 220-232.

11. http://cvrc.ece.utexas.edu/SDHA2010/Human\_Interaction.html

12. Gonzalez and Woods, Digital Image Processing, 4th edition, pearson, 2017. 13. Ojala T, Pietik¨ainen M, Harwood D. A comparative study of texture measures with classification based on

featured distributions. Pattern Recognition, 1996, 29(1) pp: 51−59

14. Ke-Chen, Song, et al. "Research and perspective on local binary pattern." Acta Automatica Sinica 39.6 2013,pp: 730-744.

15. Akosa, Josephine. "Predictive accuracy: A misleading performance measure for highly imbalanced data."

In Proceedings of the SAS Global Forum. 2017. 16. Taha, Abdel Aziz, and Allan Hanbury. "Metrics for evaluating 3D medical image segmentation: analysis,

selection, and tool." BMC medical imaging 15, no. 1 2015, pp: 29.

17. Wang, Xiaoyang, and Qiang Ji. "Hierarchical context modeling for video event recognition." IEEE transactions on pattern analysis and machine intelligence 39, no. 9,2016, pp: 1770-1782.

101

Authors: Ramandeep Kaur, Gagandeep, Parveen Kumar,Geetanjali Babbar

Paper

Title:

An Enhanced and Automatic Skin Cancer Detection using K-Mean AND PSO Technique

Abstract: Scientists have been trying to implement traditional methods around the world,

particularly in developing countries, to reduce the death rate of skin cancer in humans. The

scientific term is named as melanoma. But this effort always working hard as the system is

costly, the low availability of experts and the conventional telemedicine. There are three

types of skin cancer: basal cell cancer (BCC), squamous cell cancer, and melanoma. More

than 90% of human is affected by ultraviolet (UV) radiation exposed to the sun. In this

research, a skin cancer detection system (BCC) is designed in MATLAB. The images going

to different processes such as Pre processing, feature extraction and classification. In pre-

processing K-mean clustering is applied to determine the foreground and background of an

image, since some part of background appear in the image after K-mean. Therefore, to

resolve this problem Particle Swarm optimization (PSO) is applied. The segmented image

features are extracted using Speed Up Robust Features (SURF), this helps to enhance the

quality of the image. The Artificial neural network (ANN) is trained on the basis of these

extracted features. To determine the efficiency of the system, the images are tested and

performance parameters are measured. The detection accuracy determined by this model is

about 98.7 5 is obtained.

Keyword :Skin Cancer, K-mean, PSO, SURF, ANN

References: 1. N. C. Codella, D. Gutman, M. E. Celebi, B. Helba, M. A. Marchetti, S. W. Dusza, ... & A. Halpern, “Skin

lesion analysis toward melanoma detection,” A challenge at the 2017 international symposium on biomedical

imaging (isbi), hosted by the international skin imaging collaboration (isic). In 2018 IEEE 15th International Symposium on Biomedical Imaging, 2018, pp. 168-172.

634-639

2. A. C. Geller, R. R. Keske, S. Haneuse, J. A. Davine, K. M. Emmons, C. L. Daniel, ... & L. L. Robison, “Skin

cancer early detection practices among adult survivors of childhood cancer treated with radiation,” Journal of

Investigative Dermatology, 2019.

3. A. Mirbeik-Sabzevari, Li, S., Garay, E., Nguyen, H. T., Wang, H., & Tavassolian, N, “Synthetic ultra-high-

resolution millimeter-wave imaging for skin cancer detection,” IEEE Transactions on Biomedical Engineering,

2019, vol. 66, no. 1, pp.61-71.

4. A. Dascalu, & E. O. David, “Skin cancer detection by deep learning and sound analysis algorithms: A

prospective clinical study of an elementary dermoscope,” EBioMedicine, 2019.

5. A. F. Jerant, J. T. Johnson, C. Demastes Sheridan, & T. J. Caffrey, “Early detection and treatment of skin

cancer. American family physician,” 2000, vol. 62, no. 2.

6. R. J. Friedman, D. S. Rigel, & A. W. Kopf, “Early detection of malignant melanoma: the role of physician

examination and self‐examination of the skin,” CA: a cancer journal for clinicians, 1985, vol. 35, no.3, pp.130-

151.

7. M. A. H. Bhuiyan, I. Azad, & K. Uddin, “Image processing for skin cancer features extraction,” International

Journal of Scientific & Engineering Research, 2013, vol. 4, no. 2, pp.1-6.

8. J. Choi, J. Choo, H. Chung, D. G. Gweon, J., Park, H. J. Kim, ... & Oh, C. H, “Direct observation of

spectral differences between normal and basal cell carcinoma (BCC) tissues using confocal Raman

microscopy,” Biopolymers: Original Research on Biomolecules, 2005, vol. 77, no.5, pp. 264-272.

9. M. A. Sheha, M. S. Mabrouk, & A. Sharawy, “Automatic detection of melanoma skin cancer using texture

analysis,” International Journal of Computer Applications, , 2012.

10. A. Masood, & A. Ali Al-Jumaily, “Computer aided diagnostic support system for skin cancer: a review of

techniques and algorithms,” International journal of biomedical imaging, 2013.

11. P. Åberg, P. Geladi, I. Nicander, J. Hansson, U. Holmgren, & S. Ollmar, “Non‐invasive and microinvasive

electrical impedance spectra of skin cancer–a comparison between two techniques,” Skin research and technology, 2005, 11(4), 281-286.

12. M. A. Calin, S. V. Parasca, R. Savastru, M. R. Calin, & S. Dontu,, “Optical techniques for the noninvasive

diagnosis of skin cancer,” Journal of cancer research and clinical oncology, 2013, vol. 139, no.7, pp.1083-

1104.

13. P. Kharazmi, M. I. AlJasser, Lui, H., Wang, Z. J., & Lee, T. K, “Automated detection and segmentation of

vascular structures of skin lesions seen in Dermoscopy, with an application to basal cell carcinoma

classification,” IEEE journal of biomedical and health informatics,2016, vol.21, no. 6, pp.1675-1684.

102.

Authors: Puneet Kamal, Rajeev Sharma, Abhishek Gupta, Gaurav Kumar

Paper

Title:

Mitigating Gray Hole attack in Mobile AD HOC Network using Artificial Intelligence

Mechanism

Abstract: A mobile ad hoc network (MANET) is a combination of multiple mobile nodes,

which are interconnected by radio link. In MANET, sensor nodes are free to move, and each

node can act as a host or router. Routing is one of the most challenging tasks because nodes

move frequently. Therefore, in MANET, the routing protocol plays an important role in

selecting the best route to efficiently transmit data from the source node to the destination

node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector

(AODV) routing protocol is chosen as the routing mechanism. The properties of each node

are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as

per these properties and hence in case if the gray hole node is detected within the route, it is

identified and the route between the source and the destination is changed. At last, to show

how effectively the proposed AODV with Firefly and ANN works is computed in terms of

performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 %

compared to the network which is affected by gray hole attack. The energy up to 44.02 %

has been saved.

Keyword ::Mobile ad hoc network, gray hole attack, cuckoo search, support vector

machine, Ad Hoc On-Demand Distance Vector

References: 1. G Banerjee, S. “Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks”. In

Proceedings of the world congress on engineering and computer science , 2008 pp. 22-24.

2. Sen, J., Chandra, M. G., Harihara, S. G., Reddy, H., & Balamuralidhar, P. “A mechanism for detection of

gray hole attack in mobile Ad Hoc networks”. In 2007 6th International Conference on Information, Communications & Signal Processing, 2007, pp. 1-5. IEEE.

3. Vishnu, K., & Paul, A. J. . “Detection and removal of cooperative black/gray hole attack in mobile ad hoc

networks”. International Journal of Computer Applications, 1(22),2010, pp: 38-42.

4. Kanthe, A. M., Simunic, D., & Prasad, R.. “A Mechanism for Gray Hole Attack Detection in Mobile Ad–

hoc Networks”. International journal of computer applications, 53(16), 2012, pp: 23-30.

640-645

5. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C, “DoS attacks in mobile ad hoc networks: A survey”. In 2012

second international conference on advanced computing & communication technologies , 2012 pp. 535-

541. IEEE.

6. Kumar, A., & Chawla, M. (2012). “Destination-based group Gray hole attack detection in MANET through

AODV”. International Journal of Computer Science Issues (IJCSI), 9(4), 292.

7. Jain, S., Jain, M., & Kandwal, H. “Advanced algorithm for detection and prevention of cooperative black

and gray hole attacks in mobile ad hoc networks”. International Journal of Computer Applications,

1(7),2010 , pp: 37-42.

8. Shalika, E., Bal, J. S., & Dhir, V. “A Review on Implementation of AODV Technique for Isolation of Gray

Hole Attack in MANET”, 2018.

9. Kumar, J., Kulkarni, M., & Gupta, D Effect of Black hole Attack on MANET routing protocols.

International Journal of Computer Network and Information Security, 5(5), 2013, pp: 64.

10. Gurung, S., & Chauhan, SA dynamic threshold based algorithm for improving security and performance of

AODV under black-hole attack in MANET. Wireless Networks, 25(4), 2019 pp:1685-1695.

11. Swapnil S. Bhalsagar, Manish D. Chawhan, Yogesh Suryawanshi, V. K. Taksande (2019) Performance

Evaluation of Routing Protocol under Black hole Attack In Manet And Suggested Security Enhancement

Mechanisms, Volume-8 Issue-5 March, 2019, pp 1-7.

103

Authors: Meenakshi Mittal, Dr S Veena Dhari

Paper

Title:

A Regression Model for Analysis of Bounce Rate Using Web Analytics

Abstract: Bounce rate is an effective parameter to measure the quality of any website.

Bounce rate refers to the percentage of visitors that leave a website (or “bounce” back to the

search results or referring website) after viewing only one page a website. High bounce rate

is bad as it depicts that the content on a site didn’t match what the visitor was looking for so

he left without viewing another page. Since bounce rate equates to visitors taking absolutely

no action on a website so this metric could be used as a measure of success .This paper

analyses the bounce rate of a website based on web analytics data. In this paper, analysis of

bounce rate will be based on performance of website. Data is collected using Google

Analytics tool. After applying preprocessing techniques to data an eleven step regression

model is built using the various attributes like Average Server Response Time, Average

Server Connection Time, Average Redirection Time, Average Page Download Time,

Average Domain Lookup time and Average Page Load Time. Mathematical equation is

constructed on the basis of outcome of result so that bounce rate can be analyzed and

predicted. Model is further refined after establishing the correlation between various

attributes. Correlation is established to improve the accuracy in analysis and prediction of

bounce rate. This regression model gives insight about the various parameters involved and

their effect on bounce rate. Qunatile Quantile plot is constructed to see if plausible data is

normally distributed. This complete experiment is done using R Studio

Keyword: Bounce Rate, Google Analytics, Regression model, Web Analytics, Website

Performance.

References: 1. H Singal, S. Kohli, “Trust Necessitated through Metrics: Estimating the Trustworthiness of Websites”

Elsevier Procedia Computer Science Volume 85, 2016, Pages 133-140.

2. Dr Veena Dhari, Meenakshi Garg “ Analytics For Content Based Sites –A Comparative Study “

International Journal of Science, Engineering and Technology Research (IJSETR) Volume 5, Issue 6, June 2016 Pages 2261-2264

3. Daniel Amo Filvà, María José Casany Guerrero , Marc Alier Forment, “Google analytics for time behavior

measurement in Moodle” 2014 9th Iberian Conference on Information Systems and Technologies (CISTI)

4. laza, Beatriz. “Google Analytics for measuring website performance. Tourism Management - TOURISM

MANAGE” 32. 477-481. 10.1016/j.tourman.2010.03.015.

5. Han Qin, Kit Riehle, Haozhen Zhao ” Using Google Analytics to Support Cybersecurity Forensics” 2017

IEEE International Conference on Big Data (Big Data), Dec. 2017,pp: 11-14.

6. https://www.searchenginejournal.com/10-reasons-website-can-high-bounce-rate/182260/#close accessed

on 15 May 2019

7. H Singal, S. Kohli, “ Conceptual Model For Obfuscated TRUST induced from Web Analytics data fro

content driven Websites” International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014.

646-649

8. Akiyuki Sekiguchia, KazuhikoTsuda “ Study on Web Analytics Utilizing Segmentation Knowledge in

Business to Business Manufacturer Site “ Elsevier Procedia Computer Science Volume 35, 2014, pp: 902-

909

9. Veena Dhari , Meenakshi Garg “A Novel Appraoch for Comparing Third Party Web Analytical Tools for

General Data Protection Regulation Policy“ International Journal of Computer Applications 181(42),

February 2019, pp: :10-12.

10. Berger P.D., Maurer R.E., Celli G.B. (2018) “ Introduction to Simple Regression. “ In: Experimental

Design. Springer, Cham

11. Naomi Altman. Martin Krzywinski “Simple linear regression“, Nature Methods volume12, 2015,

pp:999–1000

12. Oyerinde, O. D. , Chia, P. A. , “Predicting Students’ Academic Performances – A Learning Analytics

Approach using Multiple Linear Regression“, Vol. 157;No. 4; pp 37- 44

104

Authors: Praveen Barapatre, Dr. Jayantilal N. Patel

Paper

Title:

Development of Internet of Things (IoT) Based Smart Irrigation System for Sugarcane Crop

Abstract: This work focuses on the impact of climate change on agriculture water for

sugarcane crop of Gujarat region and alternatively, IoT (Internet of Things) technology to be

proposed for decision making and irrigating water requirement of the crop. Agriculture is a

major source of income for Indians and Agribusiness has a major effect on India's economy.

Sugarcane is an important crop utilized for bioenergy and sugar. It is one of the world's

major crops that for the most part develop in the tropic and subtropic areas. Climate and

atmosphere related occasions such as development condition of atmospheric CO2,

temperature, rainfall, and other extraordinary weather conditions are the key components for

sugarcane production around the world. So reasonable conditions and appropriate moisture

in beds of the crop can play a noteworthy job for crop production. Generally, irrigation of

sugarcane crop is done by conventional techniques in which stream flows from end to end.

The organization of the irrigation framework can be upgraded using automated watering

structure. In this paper automation of irrigation system using soil moisture sensors and

solenoid valves has been proposed. For implementing the system Arduino Uno and Esp8266

Node MCU microcontrollers have been proposed for gathering information from soil

moisture sensor, and operations of solenoid valves and water pump

Keyword: Automation, IoT, Irrigation, Soil Moisture Sensor, Sugarcane..

References: 1. T. Stambouli, J. M. Faci, and N. Zapata, “Water and energy management in an automated irrigation

district,” Agric. Water Manag., vol. 142, pp. 66–76, 2014.

2. Z. Feng, “Research on water-saving irrigation automatic control system based on Internet of things,” 2011

Int. Conf. Electr. Inf. Control Eng., pp. 2541–2544, 2011.

3. L. Zotarelli, M. D. Dukes, J. M. S. Scholberg, K. Femminella, and R. Muñoz-Carpena, “Irrigation

Scheduling for Green Bell Peppers Using Capacitance Soil Moisture Sensors,” J. Irrig. Drain. Eng., vol.

137, no. 2, pp. 73–81, 2011.

4. S. Sawant, S. S. Durbha, and J. Adinarayana, “Interoperable agro-meteorological observation and analysis

platform for precision agriculture : A case study in citrus crop water requirement estimation,” Comput.

Electron. Agric., vol. 138, pp. 175–187, 2017.

5. K. X. Soulis, D. Ph, and S. Elmaloglou, “Optimum Soil Water Content Sensors Placement in Drip

Irrigation Scheduling Systems : Concept of Time Stable Representative Positions,” J. Irrig. Drain Eng.,

2016, 142(11) 04016054, vol. 142, no. 11, pp. 1–9, 2016.

6. B. Khelifa and D. Amel, “Smart Irrigation Using Internet of Things,” 2015 Fourth Int. Conf. Futur. Gener.

Commun. Technol., no. Fgct, pp. 1–6, 2015.

7. K. Sakthivelu and D. Jalihal, “moisture scanner for efficient feasibility of soil Techno-commercial

feasibility of scheduling soil moisture moisture scanner scanner for for efficient efficient irrigation irrigation scheduling irrigation scheduling in in in in,” IFAC-PapersOnLine, vol. 49, no. 16, pp. 199–204,

2016.

8. R. C. Rm, “Automation in drip irrigation using IOT devices,” 2017 Fourth Int. Conf. Image Inf. Process.

Autom., pp. 323–327, 2017.

9. J. Casadesús, M. Mata, J. Marsal, and J. Girona, “A general algorithm for automated scheduling of drip

irrigation in tree crops,” Comput. Electron. Agric., vol. 83, pp. 11–20, 2012.

10. D. Zhao and Y.-R. Li, “Climate Change and Sugarcane Production: Potential Impact and Mitigation

650-654

Strategies,” Int. J. Agron., vol. 2015, pp. 1–10, 2015.

11. R. G. ALLEN, L. S. PEREIRA, D. RAES, and M. SMITH, “FAO Irrigation and Drainage Paper No. 56

Crop Evapotranspiration,” Guidel. Comput. Crop water Requir., vol. 13, no. 3, pp. 110–115, 1991.

105

Authors: Dr. Rinkesh Mittal, Agrima Kukkar, Dr. P. N. Hrisheekesha

Paper

Title:

An approach for optical communication with WDM based FSO over varying weather

conditions

Abstract: These days, Free Space Optics (FSO) has become a prominent mechanism due to

its economic nature, broad-bandwidth access technique. The effects of unpredictable

weather are difficult to deal. In order to draft the most effective system, Single beam and

multiple beam FSO systems are developed which can tackle the atmospheric weather

condition’s effects on signal. In this dissertation, a practical review on communication

channels (FSO) is presented. These channels are used in WDM. It was obtained that the

traditional Wavelength Division Multiplexing (WDM) based FSO system utilized the NRZ

encoding method which was less efficient and it was suitable for communication channel

which supports 16 transmitters and receivers only. This work is organized to achieve an

objective to perform some enhancements in traditional WDM system by replacing NRZ

encoding scheme with MDRZ encoding and also the channel size is increased to the 32.

Keyword: Free Space Optic, WDM, NRZ, Duobinary Return to Zero, Modified Duobinary

Return to Zero format.

References:

1. Nishu sahu and Jayesh c. Prajapti, “Optimization of WDM-FSO link using Multiple Beams under

different rain conditions”, Volume 4, Issue 5, May 2015 , IJARECE. 2. M. Boroon, S. Hitam, M. A. Mahdi, R. K. Z. Sahbudin and S. Seyedzadeh, "Performance of multi-

wavelength erbium doped fiber laser on free space optical medium," 2014 IEEE 5th International

Conference on Photonics (ICP), Kuala Lumpur, 2014, pp. 99-101. doi: 10.1109/ICP.2014.7002323

3. H. Henniger, O. Wilfert, “An Introduction to Free-space Optical Communications”, Radio engineering, vol.

19, no. 2, June 2010. 4. X. Cao, "An Integer Linear Programming Approach for Topology Design in OWC Networks," IEEE

Globecom Workshops, New Orleans, LA, 2008, pp.1-5.,doi: 10.1109/GLOCOMW.2008.ECP.6

5. Light pointe, “How to design a reliable FSO system”, Light pointe white paper series, 2009. Available at: https://www.nebula.wsimg.com

6. 6. S. Bloom, E. Korewaar, J. Schuster, H. Willebrand, “Understanding the performance of free-space

optics”, Journal of Optical Networking, Optical Society of America, vol. 2, no. 6, June 2003, pp. 178 – 200.

7. 7. C. P. Colvero, M. C. R. Cordeiro and J. P. von der Weid, "FSO systems: Rain, drizzle, fog and haze

attenuation at different optical windows propagation," SBMO/IEEE MTT-S International Microwave and Optoelectronics Conference, Brazil, 2007, pp. 563-568. doi: 10.1109/IMOC.2007.4404328

8. Mustafa, Fatin & Supa'at, Abu & Charde, Nachi Mani, “Effect of Rain attenuations on free space optic

transmission in Kuala Lumpur”, (Proceeding of the International Conference on Advanced Science, Engineering and Information Technology), 2011, pp. 337 – 341.

9. Fadhil, H.A., Amphawan, A., Shamsuddin, H.A., Abd, T.H., Al-Khafaji, H.M., Aljunid, S.A., & Ahmed,

N.U., “Optimization of free space optics parameters: An optimum solution for bad weather conditions”. Optik, 124, 2013 pp.3969-3973.

10. Aditi and Preeti, "An effort to design a power efficient, long reach WDM- FSO system," 2014

International Conference on Signal Propagation and 11. Computer Technology (ICSPCT 2014), Ajmer, 2014, pp. 791-796. doi: 10.1109/ICSPCT.2014.6885013

12. Sharan, Lucky & G. Shanbhag, Akshay & Chaubey, Vinod, “Design and simulation of modified duobinary modulated 40 Gbps 32 channel DWDM optical link for improved non-linear performance”

Cogent Engineering. 3,2013.

13. Doi: 10.1080/23311916.2016.1256562. 14. “Fourth-Generation free space optics” available at: https://www.Electronicsforu.com.

15. P. Sathya and S. Robinson, "Impact of Modulation Techniques for Hybrid-WDM Based FSO," 2018

International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, 2018, pp. 1-6.

16. Ghazi, Alaan & Noori, Awab & Al-dawoodi, Aras & Aljunid, S & Syed Idrus, Syed Zulkarnain & Syed

Idrus, Zulkarnain. (2019). Design & Investigation of 10 x 10 Gbit/s MDM over Hybrid FSO link under Different Weather Conditions and Fiber to The Home.

655-660

106

Authors: Rahul Kumar Verma, R L Yadava

Paper

Title:

Analysis and design of DGS by inserting ofa active element PIN Diode in slot patch

Abstract: In this work, a rectangle is formed one side of substrate material i.e. FR-4/glass

epoxy, PIN diode and slot integrated on ground patch ,on the basis of reflection coefficient

S11, a re-configurability characteristics is found. Using the PIN diode the electrical length

of slot can be changed when the PIN diode is in ON / OFF position has more than one

resonant frequency. Patch antenna is compatible with characteristics use as dual band

antenna under ON condition of PIN diode in wireless communication, these frequencies are

6.45 Ghz and 9.7 GHz. OFF conditions 6.46GHz and 9.8GHz.all the parameters remains

same during the current distribution. A reconfigurable property of patch antenna is found.

Keyword: DGS, Electrical length, PIN Diode, reconfigurable, slot.

References: 1. Ó. Quevedo-Teruel, E. Pucci and E. Rajo-Iglesias, "Compact Loaded PIFA for Multifrequency

Applications," in IEEE Transactions on Antennas and Propagation, vol. 58, no. 3, pp. 656-664, March 2010.

2. J. Hu, Z. Hao and W. Hong, "Design of a Wideband Quad-Polarization Reconfigurable Patch Antenna Array

Using a Stacked Structure," in IEEE Transactions on Antennas and Propagation, vol. 65, no. 6, June 2017,

pp. 3014-3023.

3. K. M. Mak, H. W. Lai, K. M. Luk and K. L. Ho, "Polarization Reconfigurable Circular Patch Antenna With

a C-Shaped," in IEEE Transactions on Antennas and Propagation, vol. 65, no. 3, March 2017, pp. 1388-1392.

4. H. W. Liu, Z. F. Li, and X. W. Sun, “A novel fractal defected ground structure and its application to the low-

pass filter,” Microwave and Optical TechnologyLetters, vol. 39, no. 6, 2003, pp. 453–456.

5. Jong-Sik Lim, Chul-Soo Kim, Jun-Seok Park, Dal Ahn and Sangwook Nam, "Design of 10 dB 90/spl deg/

branch line coupler using microstrip line with defected ground structure," in Electronics Letters, vol. 36, no. 21, 12 Oct. 2000, pp. 1784-1785.

6. J.-S. Lim, S.-W. Lee, C.-S. Kim, J.-S. Park, D. Ahn, and S. Nam, “A 4.1 unequal Wilkinson power divider,”

IEEE Microwave and Wireless Components Letters, vol. 11, no. 3, 2001, pp. 124–126.

7. A. K. Gautam and B. Kr Kanaujia, “A novel dual-band asymmetric slit with defected ground structure

microstrip antenna for Circular Polarization operation,” Microwave and Optical Technology Letters, vol. 55,

no. 6, 2013, pp. 1198–1201.

8. J. -. Wu, H. -. Hsiao, J. -. Lu and S. -. Chang, "Dual broadband design of rectangular slot antenna for 2.4 and

5 GHz wireless communication," in Electronics Letters, vol. 40, no. 23, 11 Nov. 2004, pp. 1461-1463 .

661-663

107

Authors: Anshu Soni and Virender Ranga

Paper

Title:

API Features Individualizing Comparison of Web Services: REST and SOAP

Abstract: Web Services are combination of open protocols and standards to allow

communication between client and server. It provides an interoperability between

contrasting applications. Representational state Transfer (REST) and Simple Object Access

Protocol (SOAP) are the two main popular used web services now-a-days. REST is an

architectural style based, whereas SOAP is a underlying protocol. Both services are used to

handle the communication on the world wide web (www). Both services have some

advantages and drawbacks and it is the decision of web developer to decide which service is

best to use according to its requirements. The aim of this research work is to design a REST

API and SOAP API by JAX-RS and JAX-WS, respectively and gives a comparative

analysis of Application Programming Interface (API) features (in terms of response time,

memory usage, execution speed and so on) of these services by using API testing tool like

Postman. This gives insight view of which service is better to use as per requirements. The

result of experiments shows that the response time of SOAP is approximate takes 4ms to

7ms more than REST. It has been observed that as number of API increases, SOAP takes

approximate 1MB to 2MB more memory usage than REST.

Keyword:Architectural style, JAX-RS, JAX-WS, Jersey, Postman, Protocol, REST,

SOAP, Tomcat, Web service..

References:

664-671

1. C.Zhang and X.Yin,"Design and implementation of single-service multifunction webservice",2011

International Conference on Computer Science and Service System (CSSS), Nanjing,2011, pp. 3912-3915.

2. R.T.Fielding, "Architectural Styles and the Design of Network-based Software Architectures

DISSERTATION", 2000.

3. P.Adamczyk, P.H. Smith, R.E.Johnson, and Munawar Hafiz,"REST and Web Services: In Theory and in

Practice", DOI 10.1007/978-1-4419-8303-9\_2, Springer Science+Business Media, 2011.

4. Mark Massé,"Designing Consistent RESTful Web Services Interface",Published by O’Reilly Media,ISBN:

978-1-449-31050-9.

5. C.H.Kao, C.C.Lin and J.Chen, "Performance Testing Framework for REST-basedWeb Applications", 13th

International Conference on Quality Software,2013 IEEE, DOI 10.1109/QSIC.2013.32, 2013.

6. F.Haupt, F.Leymann, A.Scherer and K.Vukojevic-Haupt,"A Framework for the Structural Analysis of

REST APIs", IEEE International Conference on Software Architecture,DOI 10.1109/ICSA.2017.40, 2017.

7. Munonye K* and Martinek P**, "Performance Analysis of the Microsoft .Net- and Java-Based

Implementation of REST Web Services", IEEE 16th International Symposium on Intelligent Systems and

Informatics, Subotica, Serbia, September 13-15, 2018.

8. R.Sinha, M.Khatkar and S.Chand Gupta, "Design & Development of a REST based Web Service Platform

for Applications Integration on Cloud", IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 7, September 2014.

9. P.Giessler, M.Gebhart, D.Sarancin, R.Steinegger and S.Abeck "Best Practices for the Design of RESTFul

Web Services," Tenth International Conference on Software Engineering Advances, Barcelona, 2015.

10. D.Qiu, B.Li and H.Leung,"Understanding the API usage in Java",Information and Software Technology,

Elsevier, 2016, pp 81-100.

11. F.Halili and E.Ramadani, "Web Services: A Comparison of Soap and Rest Services", Canadian Center of

Science and Education, Modern Applied Science; Vol. 12, No. 3; 2018.

12. S.Mumbaikar and Puja Padiya,"Web Services Based On SOAP and REST Principles", International Journal

of Scientific and Research Publications, Volume 3, Issue 5, May 2013.

13. A.Navarro, A.d.Silva, "A metamodel-based definition of a conversion mechanism between SOAP and

RESTful web services", Computer Standards & Interfaces, pp.49-70,2016.

14. M.Govindaraju, A.Slominski, K.Chiu, P.Liu, R.v.Engelen and M.J.Lewis,"Toward Characterizing the

Performance of SOAP Toolkits", Fifth IEEE/ACM International Workshop on Grid Computing, Pittsburgh,

PA, 2004, pp. 365-372.

15. S.Malik and S.Malik,"A Comparison of RESTful vs. SOAP Web Services in Actuator Networks", 2017

Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, 2017, pp. 753-755.

16. A.Neumann, N.Laranjeiro and J.Bernardino, "An Analysis of Public REST Web Service APIs", IEEE

Transactions on Services Computing,2018.

17. J.Tihomirovs and J.Grabis,"Comparison of SOAP and REST Based Web Services Using Software

Evaluation Metrics",Information Technology and Management Science,2016,pp. 92-97.

18. J.Bian, Y.Cheng and J.Kuang, "RESEARCH ON WEBSERVICE TECHNOLOGY BASED ON OMS

PLATFORM",2010 International Conference on Advanced Intelligence and Awarenss Internet (AIAI

2010), Beijing, China, 2010, pp. 162-165.

19. C.Kiama and L.Muchemi,"Comparative Study of REST and SOAP: Case of Registrar of Political Parties’

Kenya", Trends in Distributed Computing, 2014, pp.105-116.

20. A.Dudhe and S.S. Sherekar, "Performance Analysis of SOAP and RESTful Mobile Web Services in

Cloud Environment", International Journal of Computer Applications (0975 – 8887) Second National

Conference on Recent Trends in Information Security, GHRCE, Nagpur, India, Jan-2014.

21. V.Kumari, "Web Services Protocol: SOAP vs REST",International Journal of Advanced Research in

Computer Engineering & Technology (IJARCET) Volume 4 Issue 5, May 2015, pp.2467-2469.

22. K.Wagh and R.Thool, "A Comparative Study of SOAP Vs REST Web Services Provisioning Techniques

for Mobile Host", Journal of Information Engineering and Applications,Vol 2, No.5, 2012,pp 12-16.

23. G. Sambasivam , J. Amudhavel, T. Vengattaraman and P. Dhavachelvan,"An QoS based multifaceted

matchmaking framework for web services discovery",Future Computing and Informatics Journal Volume

3, Issue 2, pp.371-383, December 2018.

24. R. Padmanaban, M. Thirumaran, P. Anitha and A. Moshika," Computability evaluation of RESTful API

using Primitive Recursive Function", Journal of King Saud University–Computer and Information

Sciences, accepted (article in press), 2018.

25. M.Z.Gashti, "Investigating Soap And Xml Technologies In Web Service", InternationalJournal on Soft

Computing (IJSC) Vol.3, No.4, November 2012.

26. jersey: https://jersey.github.io/, online Accessed on 5-oct-2018.

27. JAX-WS: https://javaee.github.io/metro-jax-ws/, online Accessed on 15-oct-2018.

28. Postman: https://www.getpostman.com/, online accessed on 20-nov-2018.

Authors: Gajanan Choudhari, Rajesh Mehra

Paper

Title:

Iris Recognition using Convolutional Neural Network Design

108

Abstract: Iris trait has gained the attention of many researchers recently as it consists of

unique and highly random patterns. Many methods have been proposed for feature

extraction and classification for iris trait but suffer from poor generalization ability. In this

paper, a scratch convolutional neural network is designed in order to extract the iris features

and softmax classifier is used for multiclass classification. The various optimization

techniques with backpropagation algorithm are used for weight updating. The results show

that the Convolutional Neural Network based feature extraction has proven to provide good

generalization ability with improved recognition rate. The effect of various optimization

techniques for generalization ability is also observed. The method is tested on IITD and

CASIA-Iris-V3 database. The recognition rates obtained are comparable with state of art

methods.

Keyword:Bio-metric, Deep Learning, Iris Recognition, Softmax Classifier, Adam, SGD

with Moment, RMSprop, Convolutional Neural Network..

References: 1. Chengcheng Li , Weidong Zhou , Shasha Yuan, “Iris Recognition based on a Novel Variation of Local

Binary Pattern,” The Visual Computer, Springer, Vol.31, No.10, pp. 1419–1429, 2015.

2. Tze Weng Ng, Thien Lang Tay, Siak Wang Khor, “ Iris Recognition Using Rapid Haar Wavelet

Decomposition,” IEEE, International Conference on Signal Processing Systems (ICSPS) , pp. 820–823, 2010.

3. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris Recognition using Shape-Guided Approach and Game

theory,” Pattern Analysis and Applications ,Springer,Vol.14, No.4, pp. 329–348, 2011.

4. J. G. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,”

IEEE transactions on pattern analysis and machine intelligence , Vol. 15, no. 11, 1993..

5. J. Daugman, “The importance of being random : statistical principles of iris recognition,” Pattern

recognition, Vol. 36, pp. 279–291, 2003..

6. Saiyed Umer, Bibhas Chandra Dhara, Bhabatosh Chanda “Texture Code Matrix-based Multi-Instance Iris

Recognition,” Pattern Analysis and Application,Springer, Vol.19, No.1, pp. 283-295, 2016.

7. Mahmoud Elgamal, Nasser Al-Biqami, “An Efficient Feature Extraction Method for Iris Recognition Based

on Wavelet Transformation,” International Journal of Computer and Information Technology ,Vol. 02, No. 03, pp. 521–527, 2013.

8. Shervin Minaee, AmirAli Abdolrashidi, and Yao Wang, “Iris Recognition Using Scattering Transform And

Textural Features ",IEEE Signal Processing and Signal Processing Education Workshop, pp. 37–42, 2015.

9. Rathgeb, C and Wagner, J and Busch, C, “SIFT ‑ based iris recognition revisited : prerequisites ,

advantages and improvements,” Pattern Anal. Appl., no. pp. 1-18, 2018.

10. Abhiram M.H, Chetan Sadhu, K. Manikantan, S. Ramachandran” Novel DCT based feature extraction for

enhanced iris recognition”, IEEE International Conference on Communication, Information & Computing Technology (ICCICT), pp. 1-6, 2012.

11. Alaa S. Al-Waisy, Rami Qahwaji, Stanley Ipson, Shumoos Al-Fahdawi,“ A fast and accurate iris

localization technique for healthcare security system” IEEE International Conference on Computer and

Information Technology; Ubiquitous Computing and Communications,pp.1028-1034,2015.

12. A. S. Al-waisy, R. Qahwaji, S. Ipson, and S. Al-fahdawi, “A Multimodal Biometric System for Personal

Identification Based on Deep Learning Approaches,” pp. 163–168, 2017.

13. Itamar Arel, Derek C Rose, Thomas P, Karnowski,” Deep machine learning-a new frontier in artificial

intelligence research”, IEEE computational intelligence magazine, Vol. 5, No.4, pp. 13-18, 2010.

14. David Menotti , Allan Pinto , William Robson Schwartz , Helio Pedrini , Alexandre Xavier Falcao ,

Anderson Rocha ,”Deep representations for iris, face, and fingerprint spoofing detection”, IEEE

Transactions on Information Forensics and Security,Vol.10, No.4, pp. 864-879, 2015.

15. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, Ruslan Salakhutdinov,”Dropout: a

simple way to prevent neural networks from overfitting”, The Journal of Machine Learning Research,Vol.

15,No. 01, pp.1929-1958, 2014.

16. Rui Zeng, Jiasong Wu, Zhuhong Shao, Lotfi Senhadji and Huazhong Shu, “Quaternion softmax classifier,”

IET Electronics Letters, Vol. 50, No. 25, pp-1929-1931, 2014.

17. Diederik P.Kingma, Jimmy Li Ba, “Adam: A method for stochastic optimisation”, International Conference

on Leraning representation ,pp. 1-15, 2015.

18. M. G Alaslani and L. A. Elrefaei, “Convolutional Neural Network Based Feature Extraction for IRIS

Recognition,” International Journal of Computer Science Informatics Technology, Vol. 10, No. 2, pp. 65–

78, 2018.

19. Tze Weng Ng, Thien Lang Tay, Siak Wang Khor, “ Iris Recognition Using Rapid Haar Wavelet

Decomposition,” IEEE, International Conference on Signal Processing Systems (ICSPS) ,2010, pp. 820–823.

20. Ajay Kumar , Arun Passi ,“Comparison and combination of iris matchers for reliable personal

authentication”, Pattern recognition, Elsevier,Vol.43,No.3,pp-1016-1026, 2010.

672-678

21. M. Vatsa, S. Member, R. Singh, S. Member, and A. Noore, “Improving Iris Recognition Performance

Using Segmentation , Quality Enhancement , Match Score Fusion , and Indexing,” IEEE Transactions on

Systems, Man, and Cybernetics, Part B (Cybernetics), Vol. 38, No. 4, pp. 1021–1035, 2008.

109

Authors: Navrattan Parmar and Virender Ranga

Paper

Title:

Performance Analysis of WebRTC and SIP for Video Conferencing

Abstract: With the advancement in communication and development of technologies like

VoIP and Video Conferencing, Web Real-Time Communication (WebRTC) is developed to

communicate without plugins and stream the videos on a real time. It was initially

developed by Web Consortium(W3C) and Internet Engineering Task Force (IETF). It

allows to transfer videos and audios between different browsers. This research paper,

analyse the parameters during the call in different browsers and conditions (number of end

points). The concept of WebRTC is inspired from Session Initiation Protocol(SIP). It helps

in the establishment of sessions and maintain it. It also supports data and message

transmissions. It also works on remote location and different network transmission

protocols. It also allows peer to peer communication. In this research work, we examine the

behaviour of WebRTC and SIP during the call from different browsers. We examine the

different parameters like packets sent, jitter, VO-Width and bandwidth during the call and

call supported on cloud during our experimental work.

Keyword: WebRTC , SIP , SDP , UDP , Codec , VoIP , Session Management , Internet

Engineering Task Force (IETF), TLS, Channel Bitrate, Inter-Process Communication (IPC).

References: 1. Hussain, Md.I, Internet of Things: Challenges and Research Opportunities, published in International

conference on dependable systems and networks workshops 35, 123-126.

2. Mizukusa ,T., Nagano, T. , Shimizu,,Y,Sakata,K. & Kato,K.(2009), Development of Feed-Forward Design

System for Rapid SiP Design, IEEE International Conference on 3D System Integration, San Francisco,

CA,1-4.

3. Hoffstadt,D. Monhof,S. & Rathgeb,E.(2012), SIP Trace Recorder: Monitor and Analysis Tool for threats in

SIP-based networks, 8th International Wireless Communications and Mobile Computing Conference

(IWCMC), Limassol, 631-635.

4. Hlavacs,H.,Hummel,K.A., Hess,A. & Nussbaumer,M. (2008), Babel-SIP: Self-learning SIP Message

Adaptation for Increasing SIP-Compatibility, IEEE INFOCOM Workshops 2008, Phoenix, AZ, 1-6.

5. Vavas,D.V., Hokelek,I. & Gunsel,B.(2018), On modeling of priority-based SIP request scheduling,

Simulation Modelling Practice and Theory, vol 80, 128–144.

6. Yildiz C., Kurt,A.B, Ceritli,T.Y., Sankur,B & Cemgil,A.T.(2018), A real-time SIP network simulation and

monitoring system", SoftwareX, vol.8 ,21–25.

7. Zhou,J., Li,J., Xia,Y.B., Cai,B., & Ying,C.(2008), SIP Network Discovery by Using SIP Message Probing,

IEEE Network Operations and Management Symposium, Salvador, Bahia, 791-794.

8. Zhiguo,G., Zhe,X.,Wei,X., Zhiyong,L., & Bo,Y.(2009), SIP Offload Engine for Accelerating J2EE Based

SIP Application Server, International Conference on Communication Software and Networks, Macau, 749-

753.

9. Bansal,A., Kulkarni,P., & Ais,A.R.(2013), Effectiveness of SIP Messages on SIP Server, IEEE Conference

on Information & Communication Technologies, Thuckalay, Tamil Nadu, India, 616-621.

10. Beltran,V. & Bertin,E (2015), Unified communications as a service andWebRTC: An identity-centric

perspective, Computer Communications, 73–82.

11. Rosas,A.S. & Martínez,J.L.A.(2016), " Videoconference System Based on WebRTC With Access to the

PSTN, Electronic Notes in Theoretical Computer Science, vol 329,105–121.

12. Daldal,B., Bilgin,I., Basaran,D. & Metin,S.(2016), Using Web Services For WebRTC Signaling

Interoperability, IEEE/IFIP Network Operations and Management Symposium, Istanbul, 780-783.

13. .Montazerolghaem, A., Moghaddam,M.H.Y., & Leon-Garcia,A.(2018), OpenSIP: Toward Software-Defined

SIP Networking , in IEEE Transactions on Network and Service Management, vol. 15,no.1, 184-199.

14. .Moor,K.D., Arndt,S. & Ammar,D.(2017), Exploring diverse measures for evaluating QoE in the context of

WebRTC, Ninth International Conference on Quality of Multimedia Experience (QoMEX), Erfurt,, 1-3.

15. Xue,H. & Zhang,Y. (2016) A WebRTC-Based Video Conferencing System with Screen Sharing, 2nd IEEE

International Conference on Computer and Communications (ICCC), Chengdu, 485-489.

16. Gouaillard,A. & Roux,L.(2017), Real-Time Communication Testing Evolution with WebRTC 1.0,

Principles, Systems and Applications of IP Telecommunications (IPTComm), Chicago, IL, 1-8.

679-686

17. Jian.C. & Lin,Z.(2015), Research and Implementation of WebRTC Signaling via WebSocket-based for Real-

time Multimedia Communications, ,5th International Conference on Computer Sciences and Automation

Engineering ICCSAE, 374-380.

18. Edan,N.M., Al-Sherbaz,A. & Turner,S.(2017), Design and Evaluation of Browser-to-Browser Video

Conferencing in WebRTC",Global Information Infrastructure and Networking Symposium (GIIS), St. Pierre,

75-78.

19. Haensge,K., & Maruschke,M.(2015), QoS-based WebRTC Access to an EPS Network Infrastructure", 18th

International Conference on Intelligence in Next Generation Networks, Paris, 9-15.

20. Kim,W., Jang,H., Choi,G., Hwang,I. & C. Youn,(2016), A WebRTC based live streaming service

platform with dynamic resource provisioning in cloud, IEEE Region 10 Conference (TENCON), Singapore,

2424-2427.

21. Zubair,M., Kong,X., Jamshed,I., & Ali,M.(2014), Integrating SIP with F-HMIPv6 to Enhance End-to-End

QoS in Next Generation Networks, Advances in Intelligent Systems and Computing 240,Springer International Publishing Switzerland.

22. Yan,S, Guo,Y. Y.Chen, & Xie,F.(2019), Predicting Freezing of WebRTC Videos in WiFi Networks, ICST

Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Published by

Springer Nature Switzerland AG 2019, 292–30.

23. Rodríguez,P., Cerviño,J., Trajkovska,I. & Salvachúa,J(2019),"Advanced VideoConferencing Services Based

on WebRTC",Conference: IADIS Multi Conference on Computer Science and Information Systems.

24. Nayyef, Z.T., Amer, S.F. & Hussain,Z.(2018),Peer to Peer Multimedia Real-Time Communication System

based on WebRTC Technology, International Journal of Engineering & Technology, 125-130.

25. Zafran, M.R.M., Gunathunga, L.G.K.M. , Rangadhari, M.I.T, Gunarathne, M.D.D.J, Kuragala K.R.S.C.B,

Dhammearatchi, M.D.(2016), Real Time Information and Communication Center based on webRTC,

International Journal of Scientific and Research Publications, Volume 6, Issue 4, 644-649.

110

Authors: Vikas Kumar, Jagjit Singh, Arvind Kumar

Paper

Title:

Non Volatile Low Power Wake up Radio Transceiver for Wireless Sensor Network

Abstract: Wireless sensor nodes consume lots of energy during communication but huge

power consumption has been observed during active listening in idle mode as source nodes

can start data transmission at any time. Power saving can be achieved by establishing

synchronization among end nodes. Many rendezvous solutions are available and out of

which wake up receiver found extremely adroit. A non volatile wake up transceiver has been

proposed in the present paper that works on the basis of ID matching. State of art using 4GB

of memory to remember states of sensor nodes while proposed technique used only 60 bits

of memory with very less false alarm probability. Power consumption for proposed model is

only 59.47 nW. Hence this model is quite effective in terms of power consumption and

memory usage as compared to trailing models.

Keyword: ID matching, low power, wake-up receiver, wireless sensor network.

References: 1. Said, O.,” Performance evaluation of WSN management system for QOS gurantee,” EURASIP Journal on

Wireless Communications and Networking,2015, pp. 1-18

2. Pflaum,R., Weigel,R., and Koelpin, A., “Ultra-low-power sensor node with wake-up-functionality for smart-

sensor-applications," 2018 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet), Anaheim, CA, 2018, pp. 107-110.

3. Lee, D.,” Fast notification architecture for wireless sensor network,” International journal of electronics,

Vol100, No.3, 2013, pp 371-383. http://dx.doi.org/10.1080/00207217.2012.713012

4. Pughat, A. and Sharma, V., “A review on stochastic approach for dynamic power management in wireless

sensor network’” Springer, Human-centric Computing and Information Sciences, 2015, pp. 1-14.

5. Popovici, E., Magno, M., and Marinkovic, S.,” ‘Power Management Techniques for Wireless Sensor

Networks.” Advances in Sensors and Interfaces (IWASI), 2013 pp. 194-198

6. Hutu, F., Khoumeri, A., Villemaud, G., and Gorce , J.,”A new wake-up radio architecture for wireless sensor

network” EURASIP Journal on Wireless Communications and Networking, 2013, pp.1-13

7. Berder, O., and Sentieys, O.,”Power optimized hardware/software framework for wireless motes,” In Proc.

of the Workshop on Ultra-Low Power Sensor Networks, Co-located with ARCS,2010, pp. 229–233

8. Wardlaw, J., Karaman, I., and Karsilayan, A.,” Low-Power Circuits and Energy Harvesting for Structural

Health Monitoring of Bridges,” IEEE Sensors Journal, vol. 13, No. 2, 2013, pp.709-722

9. Dikovic, A., Sisul, G., and Modlic, B.,” A Low Cost Platform For Sensor Network Applications and

educational purposes,” Radio engineering, Vol. 20, No. 4, 2011, pp. 758-765

10. Magno, M., Marinkovic, S., Brunelli, D., and Popovici, E.,”Smart Power Unit with Ultra Low Power Radio

Trigger Capabilities for Wireless Sensor Networks,” DATE '12 Proceedings of the Conference on Design,

687-691

Automation and Test in Europe, 2012, pp. 75-80

11. Seyed, N., Mazloum, and Edfors, O., ”Performance Analysis and Energy Optimization of Wake-Up Receiver

Schemes for Wireless Low-Power Applications,” IEEE Transaction on wireless communication, 2014, pp.

7050-7061.

12. Magno, M., and Benini, L.,”An Ultra Low Power High Sensitivity Wake-Up,” IEEE Transactions on

Industrial Informatics, 2014, pp. 92-99.

13. Stecklina, O., Kornemann, S., and Methfessel, M.,”A secure wake-up scheme for low power wireless sensor

nodes,” Collaboration Technologies and Systems (CTS) IEEE, 2014, pp.279-286, ISBN 978-1-4799-5157-4.

14. Vodel, M., Lippmann, M., and Hardt, W.,” Energy-Efficient Communication with Wake-Up Receiver

Technologies and an Optimised Protocol Stack,” International Conference on Advances in ICT for Emerging

Regions, 2013, pp.177-184.

15. Zhang, D., Wang, X., Song, X., Zhang, T., and Zhu Y. ,”A new clustering routing method based on PECE

for WSN,” EURASIP Journal on Wireless Communications and Networking, 2015, pp. 1-13, DOI: 10.1186/s13638-015-0399-x.

16. Ali Shah, M., Abbas, G., Basit Dogar, A. and Halim, Z. ,” Scaling hierarchical clustering,” Springer

Complex Adapt System Model, 2015, pp. 1-23, DOI: 10.1186/s40294-015-0011-6.

17. Mathews, J., Barnes, M. and Arvind, D.,”Low Power Free Space,” Optical Communication in Wireless

Sensor Networks, Euro micro Conference on Digital System Design, 2009, pp. 849-856,

DOI:10.1109/DSD.2009.234

18. Mathews, J., Barnes, M., Young, A., and Arvind, D.,” Low Power Wake-Up in Wireless Sensor Networks

using Free Space Optical Communications,” International Conference on Sensor Technologies and

Applications, 2010 pp. 257-261.

19. Deng, B., Li, W., Huang, G., Liu, S., and Zhang, Q.,” High-accuracy and low-cost localisation scheme for

wireless sensor networks,” International Journal of Electronics, Vol. 99, No. 4, April 2012, pp 455–476,

DOI: 10.1080/00207217.2011.609969

20. Unterassinger, H., Dielachery, M., Flatschery, M., Grubery, S., and Kowalczyky, G.,”A Power Management

Unit for Ultra-Low Power Wireless Sensor Networks,” IEEE Africon, 2011 pp. 1-6.

21. Tang S., Yomo H., Kondo Y., and Obana S. (2012), “ Wake-up receiver for radio-on-demand wireless

LANs,“ EURASIP Journal on Wireless Communications and Networking, 2011, pp.1-13, DOI:

10.1186/1687-1499-2012-42.

22. Jurdak, R., Ruzzelli, A., and Hare, G., “Multi-hop RFID Wake-up Radio: Design Evaluation and Energy

Tradeoffs,” IEEE conference on Computer Communications and Networks, 2011, pp.1-8, DOI: 10.1109/ICCCN.2008.ECP.124.

23. Gamm, G., Sippel, M., Kostic M., and Reind, L.,”Low Power Wake-up Receiver for Wireless Sensor

Nodes,” IEEE International Conference on Intelligent Sensors, Sensor Networks and Information

Processing, 2010, pp.121-126

24. Rosello, V., and Riesgo, T. ,”Ultra Low Power FPGA-Based Architecture for Wake-up Radio in Wireless

Sensor Networks,” Annual Conference on IEEE Industrial Electronics Society, 2011, pp. 3826-3831.

25. Uraiby, A., Yoshigoe, K., Seker, R., and Babiceanu, R. ,”FPGA Implementation of Low-profile Wake-up

Radio Receiver for Wireless Sensor Networks,” IEEE conference on consumer electronic, 2012, pp. 20-24

26. Vodel, M., Caspar, M., and Hardt, W. ,”Wake-Up-Receiver Concepts -Capabilities and Limitations,”

Journal of networks, vol. 7, no. 1, 2012, pp 126-134.

27. Shuangming Y., Peng F., and Nanjian W. ,” A low power non Volatile LR- WPAN baseband processor with

wake up identification receiver ,” Communication system design, China Communications, 2016, pp 33-46.

28. Kaushik, K., Mishra, D., Swades De, Chowdhury, K., and Heinzelman, W.,” Low cost Wake-up Receiver for

RF Energy harvesting Wireless Sensor Networks,” IEEE sensor, 2016 pp. 1-9, 2DOI: 10.1109/JSEN.2016.2574798

29. Divyabharathi, R., Scholar, P., Hakeem, C., and Mian, A.,” Design and simulation of zigbee transmitter

using verilog,” International Conference on Information Communication and Embedded Systems, 2013,

pp.882-888.

111

Authors: NavleenKaur, Munish Rattan, Chahat Jain

Paper

Title:

Design of t slot shaped microstrip patch antenna for s band applications

Abstract: In this paper, the T slot shaped micro strip patch antenna is designed on FR4

substrate. The length and width of proposed antenna is 32.5mm and 25.2mm. The T slot

shaped antenna is simulated on IE3D software for s band application.This simulated antenna

operates on 3.379 GHz with Return Loss -23.66s. Finally, the simulated and base/ previous

results are compared.

Keyword: Microstrip, Patch, Antenna, T Slot.

References:

692-695

1. A.Q. Khan, M. Riaz, A. Bilal, “Various types of antenna with respect to their applications: A review”

International Journal of Multidisciplinary Science and Engineering, vol.7, no.3, March 2016.

2. A. Mehta, “Microstrip Antenna” International Journal of Scientific & Technology Research, vol. 4, issue.3,

March 2015.

3. P. A. Ambresh, P. A. Hadalgi, P. V. Hunagund, “Effects of Slots on Microstrip Patch Antenna

characteristics” International Conference on Computer and Electrical Technology, 978-1-4244-9394-1/11,

March 2011.

4. Y. L. Kuo, K. L. Wong, “Printed Dual T Monopole Antenna for 2.4/5.2 GHz Dual Band WLAN

Application” IEEE Transaction on Antenna and propagation, vol.51, no. 9,September 2003.

5. A. Kumar, S. Singh, “Design and Analysis of T shaped Microstrip Patch Antenna for the 4G System”

Global Journal of Computer Science and Technology Network Web &Security, vol.13, issue 8, 2013.

6. A. Goyal, M. R. Tripathi, S. A.Zaidi “Design & Simulation of Inverted T Shaped Antenna for X Band

Application” International Journal of Computer & Technology, vol.4, no. 6, November 2014.

7. M. N. Moghadsai, R. A. Sadeghzadeh, T.Sdghi, T. Aribi, B.S.Birdhi, “UWB CPW Fed Fractal Patch

Antenna with band notched function employing folded T shaped element” IEEE antenna & propagation letters,vol. 12, 2013.

8. H. Saini, A. Kaur, A. Thakur et al. “Compact Multiple Ground slotted patch antenna for X band

Applications” IEEE 2nd international Conference on Recent Advances in Engineering and Computational,

pp. 1-6, 2015.

9. Y.W.Zhang, S. Lin, Y.W. Zhang et al. “Simulation Design of a Broadband Dual-Polarized Minkowski

Fractal Antenna Fractal Microstrip Antenna for S-Band”IEEEInternatinal of Symposium on Antenna

&Propgation USNC/URSI National Radio Science Meeting, 2018.

10. P. Bhattacharjee, V. Hanumante, S. Roy, “Design U slot Patch Antenna for Wireless LAN at 2.45GHz” 9th

International Conference Microwave Antenna Propagation and Remote Sensing, Dec. 2013

Authors: Shipra, B. P. Garg

Paper

Title:

Effect of Heat Source/Sink on Free Connective MHD Flow past an Exponentially Accelerated

Infinite Plate with Mass Diffusion and Chemical Reaction

112 Abstract: The effects of heat source/sink and chemical reaction with mass diffusion on free

convective incompressible viscous fluid flow past an accelerated vertical plate with

magnetic field has been investigated. Laplace transformation method has been applied to

solve the system of linear partial differential equations. The result is presented in form of

complementary error function and exponential function. The effect of non dimensional

parameters such as Schmidt number (Sc), Accelerated parameter (a), Chemical reaction

parameter (K), Prandtl number (Pr), Magnetic field parameter (M), Mass Grashof number

(Gm), Heat source/sink parameter (H), Thermal Grashof number (Gr) on temperature,

concentration, velocity has been discussed with graphs.

Keyword:Free-convection, Mass transfer, MHD, Heat Source/Sink, Chemical Reaction..

References: 1. G. G. Stokes, On the Effect of the Internal Fraction of Fluids on the Motion of a Pendulum Trans. Camb.

Phil. Soc. 9, 1851, pp. 8-106.

2. A. Raptis and C. V. Massalas, Magnetohydrodynamic flow past a plate by the presence of radiation. Heat

and Mass Transfer, 34, 1998, pp.107-109.

3. R. Muthucumaraswamy and P. Ganesan, Effect of the Chemical Reaction and Injection on Flow

Characteristics in an Unsteady Upward Motion of an Isothermal Plate. J. Appl. Mech. Tech. Phys., 42, 2001,

pp. 665-671.

4. V. M. Soundalgekar, N. S. Birajdar and V. K. Darwhekar, Mass transfer effects on the flow past an

impulsively started infinite vertical plate with variable temperature or constant heat flux. Astrophysics and

Space Science, 100, 1984, pp. 159-164.

5. A. K. Singh and N. Kumar, Free convection flow past an exponentially accelerated vertical plate.

Astrophysics and Space science, 98,2000, pp. 245-258.

6. R. Muthucumaraswamy and V. Visalakshi , Radiative flow past an exponentially accelerated vertical plate

with variable temperature and mass diffusion. Int. J. of Engg. Annals. of Faculty Engineering Hunedoara .Tom IX, Fascicule 2, 2008, pp. 137-140.

7. M. A Hossain., M. M. Molla and L. S. Yaa, Natural Convection Flow along a Vertical Wavy Surface

Temperature in the Presence of Heat Generation/Absorption. Int. J. Thermal Sci., 43, 2004, pp. 157-163.

8. F. M. Hady, R. A. Mohamed and A. Mahdy, MHD Free Convection Flow along a Vertical Wavy Surface

with Heat Generation or Absorption Effect. Int. Comm. Heat Mass Transfer, 33, 2006, pp. 1253-1263.

9. B. P. Garg and Shipra and N. Rani, Heat Source/Sink effect on Flow past an impulsively started vertical plate

with variable heat and mass transfer. International Journal of Advance and Innovative Research, 6(1), 2019.

696-702

Authors: Navjot Kaur, Manish Mahajan, Rajeev Sharma

Paper

Title:

An Enhanced LEACH in Wireless Sensor Network

113

Abstract: Wireless sensor networks (WSNs) consist of self-governing sensors that sense as

well as monitor the area in which these nodes are deployed and distribute this information

in a distributed manner. Presently, the WSN with long life and minimum energy

consumption are in demand. To overcome this problem, Low Energy Adaptive Clustering

Hierarchy (LEACH) is presented with the addition of Cuckoo Search (CS) and Support

Vector Machine (SVM) concept. The problem of LEACH protocol like which node is

considered as Cluster Head (CH) is overcome by CS. On the basis of healthy function, the

nodes property such as energy consumed by each node is categorized. Those nodes that

have higher energy compared to the defined function are put in one category and remaining

in another category. These two categories of nodes are provided as an input to SVM and

train the system. Therefore, the best node having the highest energy is considered as CH

and hence enhanced the lifetime by saving the energy upto 21.86 %.

Keyword:WSN, LEACH, CS, SVM, CH.

References: 1. Zhang, W. H., Li, L. Y., ZHANG, L. M., & WANG, X. Z. (2008). Energy consumption balance

improvement of LEACH of WSN. Chinese Journal of Sensors and Actuators, 11, 1918-1922.

2. J. Wang, J. Cao, S. Ji, & J. H. Park, “Energy-efficient cluster-based dynamic routes adjustment approach

for wireless sensor networks with mobile sinks,” The Journal of Supercomputing, Vol.73, no.7, 2017,

703-709

pp.3277-3290.

3. A Bouyer, A. Hatamlou, & M. Masdari, “ A new approach for decreasing energy in wireless sensor

networks with hybrid LEACH protocol and fuzzy C-means algorithm,” IJCNDS, Vol.14, No.4, pp. 2015

400-412.

4. C. Gherbi, Z. Aliouat, & M. Benmohammed, An adaptive clustering approach to dynamic load balancing

and energy efficiency in wireless sensor networks,” Energy, Vol.114, 2016, pp. 647-662.

5. D. Jiang, Z. Xu, Li, W., & Z. Chen, “Network coding-based energy-efficient multicast routing algorithm

for multi-hop wireless networks,” Journal of Systems and Software, Vol.104, 2015, pp.152-165.

6. S. K. Gupta, & P. K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor

networks: GA based approach,” Wireless Personal Communications, Vol. 83, No. 3, 2015., pp.2403-

2423.

7. J. A. Khan, H. K. Qureshi, & A. Iqbal, “Energy management in wireless sensor networks: A survey,”

Computers & Electrical Engineering, Vol. 41, 2015, pp.159-176.

8. J. Kaur, S. Randhawa, & S. Jain, “A novel energy efficient cluster head selection method for wireless

sensor networks,” Int. J. Wireless Microwave Technol, Vol. 8, No. 2, 2018., pp.37-51.

9. J. N. Al-Karaki, & A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE

wireless communications, Vol. 11, No. 6, 2004, pp. 6-28.

10. Heinzelman, W. B., Chandrakasan, A. P., &Balakrishnan, H. (2002). An application-specific protocol

architecture for wireless microsensor networks. IEEE Transactions on wireless communications, 1(4),

660-670.

11. Muruganathan, S. D., Ma, D. C., Bhasin, R. I., &Fapojuwo, A. O. (2005). A centralized energy-efficient

routing protocol for wireless sensor networks. IEEE Communications Magazine, 43(3), S8-13.

12. Ghasemzadeh, H., Rezaeian, M., Touranposhti, F. D., &Ghasemian, M. M. (2014, September). BN-

LEACH: an improvement on LEACH protocol using Bayesian networks for energy consumption reduction in wireless sensor networks. In 7'th International Symposium on Telecommunications

(IST'2014) (pp. 1138-1143). IEEE.

13. Wang, N., & Zhu, H. (2012, March). An energy efficient algrithm based on leach protocol. In 2012

International Conference on Computer Science and Electronics Engineering (Vol. 2, pp. 339-342). IEEE.

14. Gupta, V., &Doja, M. N. (2018). H-leach: Modified and efficient leach protocol for hybrid clustering

scenario in wireless sensor networks. In Next-generation networks (pp. 399-408). Springer, Singapore.

15. Omari, M., &Laroui, S. (2015). Simulation, comparison and analysis of Wireless Sensor Networks

protocols: LEACH, LEACH-C, LEACH-1R, and HEED. 2015 4th International Conference on Electrical

Engineering (ICEE).

16. Leach Protocol in Wireless Sensor network (2017) International Journal of Science and Research, 6(12),

808-813.

17. Ma, Z., & Li, G. (2017).Improvement on LEACH-C Protocol for Wireless Sensor Network. Artificial

Intelligence Science and Technology.

18. Katiyar, V., Chand, N., Gautam, G. C., & Kumar, A. (2011). Improvement in LEACH protocol for large-

scale wireless sensor networks. 2011 International Conference on Emerging Trends in Electrical and

Computer Technology.

19. A Survey on LEACH Protocols in Wireless Sensor Networks. (2019). International Journal of Recent

Trends in Engineering and Research,5(1), 20-23.

20. Improved Clustering Based Routing Protocol for Wireless Sensor Networks. (2016). International Journal

of Science and Research (IJSR),5(2), 247-250.

21. Manjunatha, P., Verma, A. K., &Srividya, A. (2010). Fuzzy Based Optimized Routing Protocol for

Wireless Sensor Networks. Lecture Notes in gineeringAdvancesElectricalEn in Wireless Sensors and

Sensor Networks,273-282

22. Luo, Z., &Jannett, T. C. (2012). A multi-objective method to balance energy consumption and

performance for energy-based target localization in wireless sensor networks. 2012 Proceedings of IEEE

Southeastcon.

23. Yan, F. (2011). Wireless sensor networks hierarchical routing algorithm based on nodes energy balance.

2011 International Conference on Electric Information and Control Engineering.

24. Pawar, S., &Kasliwal, P. (2012). Design and Evaluation of En-LEACH Routing Protocol for Wireless

Sensor Network. 2012 International Conference on Cyber-Enabled Distributed Computing and

Knowledge Discovery.

25. Kai, L. (2009). A Mine-Environment-Based Energy-Efficient Routing Algorithm for Wireless Sensor

Network. 2009 Ninth International Conference on Hybrid Intelligent Systems.

Authors: Dr. Shivinder Nijjer, Jaskirat Singh, Dr. Sahil Raj

Paper

Title:

Developing HRIS for Predictive Attrition and Retention management of Indian IT Engineers-

Using ANN, ANOVA and SmartPLS

114

Abstract: Growth of IT sector in India (Heeks, 2015) is phenomenal, however, employee

turnover has been a persistent issue in IT sector (Yiu & Saner, 2008). Voluntarily turnover

among employees has been attributed to dissatisfaction with organizational factors and

individual characteristics (Elkjaer & Filmer, 2015). Therefore, this research examines how

to retain employees in IT firms, by focusing on the Job attitudes, theory of individual

differences and theory of planned behaviour. It also explores which individual

characteristics contribute to employee turnover intent, as a consequence of their negative job

attitudes. The techniques of Artificial Neural Networks, Two-way ANOVA and PLS testing

have been utilised. The analysis confirms the proposition that individual differences have an

effect on job attitudes, which ultimately affect the turnover intention.

Keyword:Predictive Analytics, ANN, HRM, Attrition, Retention, IT industry, Software

Engineers

References: 1. Heeks, R. (2015, April 28). Indian IT/Software Statistics: 1980-2015 time series data. Retrieved from ICT

BLOG: https://ict4blog.wordpress.com/2015/04/28/indian-itsoftware-sector-statistics-1980-2015-time-series-data/

2. Holland, P., Sheehan, C., & Cieri, H. D. (2007). Attracting and retaining talent: exploring human resources

development trends in Australia. Human Resource Development International , 247-262.

3. Ostroff, C., & Bowen, D. E. (2016). Reflections on the 2014 decade award: Is there strength in the construct

of HR system strength?. . Academy of Management Review, 196-214.

4. Bellou, V., Chaniotakis, I., Kehagias, I., & Rigopoulou, I. (2013). Employer Brand of Choice: an employee

perspective. Journal of Business Economics and Management, 1201-1215.

5. McCulloch, M. C., & Turban, D. B. (2007). Using Person–Organization Fit to select employees for high

turnover jobs. International Journal of Selection and Assessment, 63-71.

6. Sheridan, J. E. (1992). Organisational Culture and Employee Retention. The Academy of Management

Journal , 1036-1056.

7. Presbitero, A., Roxas, B., & Chadee, D. (2016). Looking beyond HRM practices in enhancing employee

retention in BPOs: focus on employee-organisation value fit. The International Journal of Human Resource

Management , 635-652.

8. Richter, A., & Schrader, S. (2016). Financial participation and recruitment and retention. The International

Journal of Human resource management .

9. Cascio, W. F. (2014). Leveraging employer branding, performance management and human resource

development to enhance employee retention . Human Resource Development International , 121-128.

10. Breukelen, Wim Van, Rene Van Der Vlist, and Herman Steensma. "Voluntary employee turnover:

combining variables from the 'traditional' turnover literature with the theory of planned behavior." Journal

of Organisational Behavior, 2004: 893-914.

11. Hoffman, B. J., & Woehr, D. J. (2006). A quantitative review of the relationship between person-

organisation fit and behavioural outcomes. Journal of Vocational Behavior , 389-399.

12. Cooper, Colin (2010). Individual Differences and Personality, Oxon, NY: Routledge, Taylor and Francis

Group.

13. Judge, Timothy A., and John D. Kammeyer-Mueller. "Job Attitudes." Annual Review of Psychology, 2012:

341-367.

14. Judge, Timothy A., and Joyce E. Bono. "Relationship of Core Self-Evaluations Traits—Self- Esteem,

Generalized Self-Efficacy, Locus of Control, and Emotional Stability—With Job Satisfaction and Job

Performance: A Meta-Analysis." Journal of Applied Psychology, 2001: 80-92.

15. FE Bureau (2018), ―India IT-BPM Sector Revenue Expected to Touch $350 bn by 2025, Says IT

Minister,‖ Financial Express July 11, 2018, accessed on December 28 at https://www.financialexpress.com/industry/india-it-bpm-sector-revenue-expected-to-touch- 350-bn-by-

2025-says-it-minister/1239509.

16. Yiu, L., & Saner, R. (2008). Indian Employee turnover report. Confederation of Indian Industry.

17. Cho, Y. J., & Lewis, G. B. (2012). Turnover Intention and Turnover Behavior: Implications for Retaining

federal Employees. Review of Public Personnel Administration , 4-23.

18. Kumar, R., & Arora, R. (2012). Determinants of talent retention in BPO industry. Indian Journal of

Industrial Relations , 259-273.

19. Kim, S. (2005). Factors affecting state government information technology employee turnover intentions.

American Review of Public Administration , 137-156.

20. Moynihan, D. P., & Landuyt, N. (2008). Explaining turnover intention in state government:Examining the

roles of gender, life cycle, and loyalty. Review of Public Personnel Administration , 120-143.

21. Ajzen, I., and M. Fishbein. Understanding attitudes and predicting social behavior.Engelwood Cliffs, NJ:

Prentice-Hall, 1980.

22. Ajzen, Icek. "The Theory of Planned Behavior." Organisational Behavior and Human Decision Processes,

1991: 179-211.

710-715

23. Gaur, Sanjaya S., Manish Goswami, and Ali Quazi. "Does relational paradigm lead to staff commitment:

evidence from Indian call centres." Journal for Global Business Advancement, 2014: 287-302.

24. Maurer, Roy. "How to begin hiring veterans?" Societ for Human Resource Management. July 2015.

http://www.shrm.org/hrdisciplines/staffingmanagement/articles/pages/begin-hiring- veterans.aspx

25. Park, Ben. "How TO: land a job at Facebook." Mashable India. April 2011.

http://mashable.com/2011/04/03/facebook-jobs-2/.

26. Anderson, Mike. "5 traits Google looks for in new hires." Code Fellows. March 2014.

https://www.codefellows.org/blog/5-traits-google-looks-for-in-new-hires.

27. Youssef, Carolyn M., and Fred Luthans (2007). "Positive Organizational Behavior in the Workplace: The

Impact of Hope, Optimism and Resilience." Journal of Management, 774-800.

28. Wanberg, Connie R., and Joseph T. Banas (2000). "Predictors and Outcomes of Openness to Changes in a

Reorganising Workplace." Journal of Applied Psychology, 132-142.

29. Xuming, Y., Mingyuan, Q., Qian, L., Li, C., Zhongyi, Y., & Lin, Y. (2016). Information integration

research on cumulative effect of 'Siqi, Wuwei, and Guijing' in traditional chinese medicine. Journal of

Traditional Chinese Medicine , 538-546.

30. Yamamoto, H. (2011). The relationship between employee benefit managament and employee retention. The

International Journal of Human Resource Management , 3550-3564.

31. Cheung, Francis, Catherine So-Kum Tang, and Shuwen Tang. "Psychological Capital as a Moderator

Between Emotional Labor, Burnout, and Job Satisfaction Among School Teachers in China." International journal of stress management, 2011: 348-371.

32. Griffin, A. (2017, March 17). 'Intellectual humility' could be key to becoming a better person, scientists say.

Retrieved from Independent: http://www.independent.co.uk/news/science/intellectual-humility-duke-

university-study-how-to-be-a-better-person-personality-characteristic-a7636011.html

33. Guchait, P., & Cho, S. (2010). The impact of human resource management practices on intention to leave of

employees in the service industry in India: the mediating role of organizational commitment. The

International Journal of Human Resource Management , 1228-1247.

34. Gunther, F., & Fritsch, S. (2010). neuralnet: Training of neural networks. The R Journal , 30-38.

35. Hamori, M. (2010, July-August). Managing Yourself: Job-Hopping to the Top and Other Career Fallacies.

Retrieved from Harvard Business Review: https://hbr.org/2010/07/managing-yourself-job-hopping-to-the-

top-and-other-career-fallacies

36. Hook, J. N., Davis, D. E., Tongeren, D. R., Hill, P. C., WorthingtonJr., E. L., Farrell, J. E., et al. (2015).

Intellectual Humility and forgiveness of religious leaders. The Journal of Positive Psychology: Dedicated to

furthering research and promoting good practice .

37. Fletcher, L., Alfes, K., & Robinson, D. (2016). The relationshipbetween perceived training and development

and employee retention: the mediating role of work attitudes. The International Journal of Human Resource

Management .

38. Fairris, D. (2004). Internal Labor Markets and Worker Quits. Industrial Relations , 573–594.

39. Emiroglu, B. D., Akova, O., & Tanriverdi, H. (2015). The relationship between turnover intention and

demograohic factors in hotel business: A study at five star hotels in Istanbul. Procedia-Social and

Behaviorial Sciences , 385-397.

40. Ehrhart, Karen Holcombe, and Jonathan C. Ziegert. "Why are individuals attracted to organisations?"

Journal of Management, 2005: 901-919.

41. Trimble, Douglas E. "Organizational Commitment, Job Satisfaction, and Turnover Intention of

Missionaries." Journal of Psychology and Theology, 2006: 349-360.

42. `Shaw, Jason D. "Job Satisfaction and Turnover Intentions: The Moderating Role of Positive Affect." The

Journal of Social Psychology, 2010: 242-244.

43. Cascio, W. F. (2014). Leveraging employer branding, performance management and human resource

development to enhance employee retention . Human Resource Development International , 121-128.

44. Batt, R., & Valcour, P. (2003). Human Resources Practices as Predictors of Work-Family Outcomes and

Employee Turnover. Industrial Relations , 189–220.

45. Nishii, L. H., Lepak, D. P., & Schneider, B. (2008). Employee attributions of the “why” of hr practices:

Their effects on employee attitudes and behaviors, and customer satisfaction. Personnel Psychology , 503–

545.

46. NASSCOM. "Industry Rankings." NASSCOM. 2015. www.nasscom.in/industry-

ranking&grqid=Olc_lak&hl=en-IN.

Authors: Dr. Monika Gupta Vashisht, Dr. Bhawna, Ms. Ashima Kalra

Paper

Title:

Students Expectations Using Opinion Mining Clustering Approach

115

Abstract: Students and their parents have become more and more aware of the importance

of gaining higher education in India. Government of India, as well as state governments, has

been framing various policies to promote higher education in various fields such as

engineering, management, and hotel management, medical and allied disciplines. An

attempt has been made to analyze the expectations of students pursuing higher education in

the state of Punjab and Haryana in India. For this, Clustering approach has been used.

Students studying in selected engineering colleges have been approached. Two clusters have

been evolved: Career-Oriented Students and Society Conscious Students. This research

gives further directions for the future as the same can be conducted in other institutes and in

other cities, states, and countries too

Keyword:Students, Higher Education, Engineering, Career, Social, Fun, Clustering

Analysis.

References: 1. A. Dutt, M.A. Ismail and T. Herawan, “A systematic review on educational data mining,” IEEE Access,

ResearchGate, vol. 5, pp. 15991–16005, 2017.

2. S. Kausar, X. Huahu, I. Hussain , Z. Wenhao, and M. Zahid, “Integration of data mining clustering

approach in the personalized E-Learning system,” IEEE Access, vol. 6, pp. 72724–34, 2018.

3. I. Majeed, “Current State of Art of Academic Data Mining and Future Vision,” Indian Journal of

Computer Science and Engineering, vol. 9(2), pp. 49-56, April-May 2018.

4. K. J. G. Leeuwenkamp, D. J. Brinke and L. Kester, “Developing questionnaires to measure students’

expectations and perceptions of assessment quality,” Cogent Education, vol. 5, pp. 1-16, 2018.

5. J. Chang K. Choi, K. K. Moon, P. Chan, T. LK. Chan and C. To, “Teaching practices: a cluster analysis of

students in Hong Kong,” Developments in Business Simulations and Experiential Learning, vol. 32, pp.

373-80, 2005.

6. C. Singh and A. Gopal, “Performance analysis of faculty using data mining techniques,” International

Journal of Computer Science and Application, pp. 140-144, 2010.

7. H. Afzal, I. Ali, M. A. Khan and K. Hamid, “A study of university students’ motivation and its

relationship with their academic performance”, International Journal of Business and Management, Vol.

5, No. 4, pp. 80-88, April 2010.

8. S. Arumugam, A. Kovalan and A.E. Narayanan, “A study of easy educational data mining for e-learning

log data from complex and large dataset,” International Journal of Innovations in Engineering and

Technology (IJIET), vol. 11(1). Oxford: Clarendon, 1892, pp.39–47, August 2018.

9. Atta-Ur-Rahman, K. Sultan, N. Aldhafferi and A. Alqahtani, “Educational data mining for enhanced

teaching and learning,” Journal of Theoretical and Applied Information Technology, vol. 96(14), pp.

4417–4427, 31st July 2018.

10. P. Ughade and S.W. Mohod, “A survey on analysis of faculty performance using data and opinion

mining,” International Journal of Innovative Research in Computer and Communication Engineering, vol.

4(1), pp. 87-91, January 2016.

11. A. Chitriv and A. Thomas, “Analysis of student feedback by using data mining techniques,” Helix, vol.

8(5), pp. 4034-38, August 2018.

12. H. Kaur and G. Bathla, “Student performance prediction using educational data mining techniques,”

International Journal on Future Revolution in Computer Science & Communication Engineering, vol.

4(12), pp. 93-97, 2018.

13. H. Malini and L. Suresh, “Data mining in higher education system and the quality of faculty affecting

students academic performance: A systematic review,” International Journal of Innovations & Advancement in Computer Science, vol. 7(3), pp. 66-70, March 2018.

14. V. Dahiya, “A survey on educational data mining,” International Journal of Research in Humanities, Arts

and Literature, IEEE Access, ResearchGate, vol. 6(5), pp. 23-30, May 2018.

15. E. Popescu and F. Leon, “Predicting academic performance based on learner traces in a social learning

environment,” IEEE Access, vol. 6, pp. 72774–72785, 2018.

16. “Indian education sector in India industry report”, India Brand Equity Foundation (IBEF), April, 2019.

17. https://www.tutorialspoint.com/data_mining/dm_cluster_analysis.htm

18. Student Expectations, Augusta University, https://www.augusta.edu/student-affairs/professionalism.php

Students’ Definitions of the College Classroom, Tomorrow's Teaching and Learning, https://tomprof.stanford.edu/posting/1616

19. Teaching Excellence & Educational Innovation, Course Policies / Expectations, Carnegie Mellon

University, Eberly Center, https://www.cmu.edu/teaching/designteach/design/syllabus/samples-

policiesexpectations/

20. Student Code of Conduct, Cambridge College, September 4, 2018,

https://www.cambridgecollege.edu/student-rights-complaints-grievances/student-code-conduct

21. M. Gupta and Dr. A. Mittal, “Mall Shopper Clustering in Business Intelligemce”, AIMA Journal of

Management & Research, , vol. 6(3/4), pp. 75-95, August 2012.

716-720

22. M. Gupta, “Co-Shopper Preference and Mall Shopping– A Study of Delhi and NCR”, GGGI Management

Review, vol. 4(1), pp. 33-40, January-June, 2014.

23. M. Gupta, “Impact of Shopper’s Occupation on Mall Shopping”, Journal of IMS Group, vol. 11(1), pp.

49-56, January-June 2014.

24. M. Gupta,” Data Mining for Shopping Malls– Customer Loyalty Strategies”, Proceedings of National

Conference on Advancements in the Era of Multi Disciplinary Systems, Elsevier, a division of Reed

Elsevier India Private Limited, India, Chapter 57, pp. 315-320, 2013.

116

Authors: Navpreet Kaur Samra, Ramanpreet Kaur

Paper

Title:

A Fuzzy based approach in Wireless Body Area Network for Controlling Congestion

Abstract: With the wireless communication, the ways of communication in present era of

technology has changed which helps in fastest and efficient way of communication in each

and every domain. In the field of medical science, to sense the human body activities such

as heartbeat, blood pressure and other activities performed by internal body parts of the

human, Wireless Sensor Network is employed. Then this sensed data is transmitted to the

centralized server. The information that is collected is made to transfer to the destination

through a dedicated route created by routing protocols in form of data packets. Thus, the

network sometimes faces the issue of congestion due to increased data traffic to the nodes.

The present paper defines an enhanced congestion handling concept for Wireless Body Area

Network. For this purpose, the cost function of the nodes is evaluated on the basis of major

factors such as distance, residual energy and delay. Additionally, by applying the Fuzzy

Inference System, the congestion control model is executed. It also improves the routing

strategy by introducing the firefly algorithm based forward-looking node selection approach.

For evaluation, the proposed work is simulated in MATLAB and compared with the

traditional congestion technique. The simulation results show that the lifetime of the

network increases by 30%. The efficiency of packet received at sink improves by 18%. Path

loss in the present study is 33% less as compared to traditional approach. And, also

consumes near about 8% less energy.

Keywords: Congestion Control, Firefly Algorithm, Forwarder node selection, Fuzzy

Inference System, WBAN.

References: 1. A. Kumar, C. V.Raj, “On designing lightweight QoS routing protocol for delay-sensitive wireless body

area networks”, IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017, pp. 740-744.

2. J. Anand, D.Sethi, “Comparative analysis of energy efficient routing in WBAN,” IEEE International

Conference on Computational Intelligence & Communication Technology (CICT), 2017, pp. 1-6.

3. M. Roy, C. Chowdhury, N. Aslam, “Designing an energy efficient WBAN routing protocol,” IEEE

International Conference on Communication Systems and Networks (COMSNETS), 2017, pp. 298-305.

4. O. Smail, A.Kerrar, Y. Zetili, B. Cousin, “ESR: Energy aware and stable routing protocol for WBAN

networks,” IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), 2016, pp. 452-457.

5. Rakhee, M. B. Srinivas, “Cluster Based Energy Efficient Routing Protocol Using ANT Colony

Optimization and Breadth First Search,” ELSEVIERin Procedia Computer Science, vol. 89,2016, pp. 124-

133.

6. S.Ahmeda, N.Javaida, S.Yousaf, A.Ahmad, M.M.Sandhu, M.Imran, Z.A.Khand, N.Alrajeh, “Co-LAEEBA:

Cooperative link aware and energy efficient protocol for wireless body area networks,” ELSEVIERin

Computers in Human Behavior, vol. 51B,2015, pp. 1205-1215.

7. L. Liang, Y. Ge, G. Feng, W. Ni, A. A. P. Wai, “A low overhead tree-based energy-efficient routing

scheme for multi-hop wireless body area networks,” ELSEVIER in Computer Networks, vol. 70, 2014,pp.

45-58.

8. I. Karthiga, S. Sankar, P. Dhivahar, “A study on routing protocols in wireless body area networks and its

suitability for m-Health applications,”IEEE International conference on Communications and Signal Processing (ICCSP), 2015,pp. 1064–1069.

9. N. K. Samra, R. Kaur, B. P. Kaur, “Congestion Control in WBAN-A Review”,5thInternational conference

oncomputing for sustainable global development,INDIACOM-2018,pp.

10. N. K. Samra, R. Kaur, B. P. Kaur, “A Novel Approach for Energy Efficiencyand Congestion Control in

WBAN” 6th International conference on computing for sustainable global development,INDIACOM-

721-725

2019,pp.

11. H. B. Elhadj, J. Elias, L. Chaari, L.Kamoun, “A Priority based Cross Layer Routing Protocol for healthcare

applications,” ELSEVIER in Ad Hoc. Networks, vol. 42, 2016, pp. 1-18.

12. N. Kaur, S. Singh, “Optimized cost effective and energy efficient routing protocol for wireless body area

networks,” ELSEVIER in Ad Hoc Networks, vol. 61, June 2017, pp. 65-84.

117

Authors: Pardeep Singh Tiwana, Harjot Singh Tiwana, Rajeev Sharma, Astha Gupta

Paper

Title:

An Scrutiny of Run-time Ramification for 5-Proviso Busy Beaver Proving Empirical

Composition

Abstract: The major aim of this paper is to undertake an experimental investigation for

analyze the fluctuation between the descriptional (program-size) and computational time

complexity. The investigation proceeds by systematic and exhaustive study for analysis of

run-time complexity for 5-state Busy Beaver function using an experimental setup. To carry

out experiment, TM simulator for Busy Beaver function will be tested for different N-values

on different machines with different configurations and different platforms to calculate the

run-time complexity. This study revealed that whether the Busy Beaver function is machine

dependent. It also report that the average run-time of Busy Beaver function surely increases

as the number of states.

Keyword:Busy Beaver function, Computational complexity, Program-size complexity.

References: 1. Joost J. Joosten, Fernando Soler-Toscano and Hector Zenil “Program-size versus Time complexity

Slowdown and speed-up phenomena in the micro-cosmos of small Turing machines,” 16 April 2011.

2. Francisco B. Pereira, Penousal Machado, Ernesto Costa, Amílcar Cardoso, “Busy Beaver – An

Evolutionary Approach”

3. Qiang Gao and Xu Xinhe “The analysis and research on computational complexity,” Control and Decision

Conference, The 26th Chinese, IEEE 2014.

4. Claus Diem, “On the complexity of some computational problems in the Turing model,” Preprint,

November 18, 2013.

5. Cristian S. Calude, Michael A. Stay, “Most programs stop quickly or never halt,” Advances in Applied

Mathematics 40, (2008).

6. Gregory J. Chaitin, “Computing the Busy beaver function,” In T. M. Cover and B. Gopinath, Open

Problems in Communication and Computation, Springer, pp. 108–112,1987.

7. Turlough Neary, Damien Wood, “Small fast universal Turing machines,” Theoretical Computer Science

362, 1 June 2006.

8. Pascal Michel, “Small Turing machines and generalized busy beaver competition,” Theoretical Computer

326, 18 May 2004.

9. Marxen, Heiner, Specs Gmbh, “Attacking the busy beaver 5,” Bull EATCS. 1990.

10. Woods Damien, and Turlough Neary, “The complexity of small universal Turing machines: A survey,”

Theoretical Computer Science 410.4, 2009.

11. Francisco B Pereira, et al. "Graph based crossover–a case study with the busy beaver problem,"

Proceedings of the 1999 Genetic and Evolutionary Computation Conference, 1999.

12. Ed Blakey, "Computational Complexity in Non-Turing Models of Computation: The What, the Why and

the How," Electronic Notes in Theoretical Computer Science 270.1, 2011.

13. Thomas Worsch, "Parallel Turing machines with one head control units and cellular automata," Theoretical

computer science 217.1,1999.

14. Jones, Terry, and Gregory JE Rawlins, "Reverse Hill climbing Genetic Algorithms and the Busy Beaver

Problem," ICGA, 1993.

15. Rado T., “On non-computable functions,” The Bell System Technical Journal, vol. 41, no. 3, pp.877-884,

1962.

16. Brady, A.H., “The conjectured highest scoring machines for Rado’s S(k) for the value k=4,” IEEE

Transactions on Electronic Computers, vol. EC-15, pp. 802-803, October 1966.

17. Brady, A.H., “Solution of the non-computable Busy Beaver game for k=4,” Abstracts for ACM Computer

Science Conference Washington, DC, p. 27, ACM, February 18-20, 1975.

18. K.L.P Mishra, N. Chandrasekaran, “Theory of computer science,” Third edition.

19. University of Waterloo, “Introduction to the theory of computing – Handout on the Busy Beaver

problem,” Winter, 1998.

20. K. Dewdney, “A computer trap for the busy beaver, the hardest-working Turing machine," Computer

Recreations Dept., Scientific American 251, No. 2, Aug, 1984.

21. Penousal Machado, Francisco B. Pereira, Amílcar Cardoso , Ernesto Costa, “ Busy Beaver – The Influence

726-732

of Representation”.

118

Authors: Chetanjot Kaur, Narwant Singh Grewal

Paper

Title:

Antenna Systems for Base Station Applications

Abstract: Base Station is the primary unit of any mobile communication system. An

antenna is the most important part of the Base Station as it is responsible for exchange of all

the electrical signals and electromagnetic waves radiations. From the last two decades there

is huge advancement in the mobile communications and so as in the antennas for the base

stations. This advancement gives rise to new designs of antennas with different

specifications for different applications. In this paper, we discussed different geometries,

designed earlier for the base station applications. The structures and respective results of

antennas are discussed in the paper.

Keyword: Base Station, Dipole Antenna, Dual Polarization, Patch antennas, Slot antennas.

References: 1. T.W. Chiou and K.L. Wong, “Broad-Band Dual-Polarized Single Microstrip Patch Antenna with High

Isolation and Low Cross Polarization,” IEEE Transactions on Antennas and Propagation, vol.50, no. 3, 2002, pp. 399-401.

2. R. Lian, Z. Wang, Y. Yin, et al., “Design of a Low-Profile Dual-Polarized Stepped Slot Antenna Array for

Base Station,” DOI 10.1109/LAWP.2015.2446193, IEEE Antennas and Wireless Propagation Letters, 2015. 3. H. Huang, Y. Liu and S. Gong, “A Dual-Broadband, Dual-Polarized Base Station Antenna for 2G/3G/4G

Applications,” IEEE Antennas and Wireless Propagation Letters, vol.16, 2017, pp. 1111-1114.

4. Y. He, C. Li and J. Yang, “A Low-Profile Dual-Polarized Stacked Patch Antenna for Micro-Base-Station Applications,” IEEE MTT-S International Wireless Symposium (IWS), 2018

5. K. Moradi1 and S. Nikmehr, “A Dual Band Dual Polarized Microstrip Array Antenna for Base

Stations,”Progress In Electromagnetics Research, , 2012Vol. 123, 527{541. 6. Y.Gao, R. Ma and Y. Wang et.al, “Stacked Patch Antenna with Dual-Polarization and Low Mutual

Coupling for Massive MIMO,” IEEE Transactions on Antennas and Propagation, vol.64, no 10, , 2016. pp.

4544-4549

7. A. A. Serra, P. Nepa, G. Manara, G. Tribellini, and S. Cioci, “A Wide-Band Dual-Polarized Stacked Patch

Antenna,”IEEE Antennas and Wireless Propagation Letters VOL. 6, 2007

8. X. L. Jiang, Z. J. Zhang, Y. Li, and Z. H. Feng, “A wideband dual-polarized slot antenna,” IEEE Antennas Wireless Propagation Letters, vol. 12, Jul. 2013, pp. 1010-1013.

9. R.V.S. Krishna and R. Kumar, “A Dual-Polarized Square Ring Slot Antenna for UWB, Imaging and Radar Applications,” IEEE Antennas Wireless Propagation Letters, vol.15, 2016, pp. 195-198.

10. R.Kumar, R. K. Khokle, and R. V. S. R. Krishna, “A Horizontally Polarized Rectangular Stepped Slot

Antenna for Ultra- Wide Bandwidth with Boresight Radiation Patterns,”IEEE Transactions on Antennas and Propagation, vol. 62, NO. 7, JULY 2014.

11. W. Li, Z. Xia, B. You, Y. Liu and Q. Liu, “Dual-Polarized H-Shaped Printed Slot Antenna,”DOI

10.1109/LAWP.2016.2646805, IEEE Antennas and Wireless Propagation Letters, 2016. 12. Y. Liu and Z. Tu, “Compact Differential Band-Notched Stepped-Slot UWB-MIMO Antenna with

Common-Mode Suppression,” IEEE Antennas Wireless Propagation Letters, DOI

10.1109/LAWP.2016.2592179. 13. Polarized Magneto-Electric Dipole Antenna with Simple Feeds,” IEEE Antennas and Wireless Propagation

Letters, vol.8, pp. 60-63, 2009.

14. X.Gao, H. W. Lai, K. Kan So, et al., “Dual-Polarized Antenna Element for LTE Applications”, IEEE International Workshop on Electromagnetics, Applications and Student Innovation Competition, DOI

10.1109/iWEM.2013.6888800, August 2013.

15. Y. Liu, H. Yi, F. W. Wang, and S. X. Gong, “A novel miniaturized broadband dual-polarized dipole antennas for base station,” IEEE Antennas Wireless Propagation Letters, vol. 12, Oct. 2013. pp. 1335-1338.

16. W. Di, Y. Yingzeng, G.Minjun and S. Renqiang, “Wideband Dipole Antenna for 3G Base Stations,” IEEE

International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications Proceedings, 2005.

17. H.Huang, Y. Liu and S. Gong, “A Broadband Dual-Polarized Base Station Antenna with Anti-Interference

Capability,”IEEE Antennas and Wireless Propagation Letters, vol.16, 2017. 18. H. Huang, Y. Liu and S. Gong, “A Broadband Dual-Polarized Base Station Antenna with Sturdy

Construction,” IEEE Antennas and Wireless Propagation Letters, 2017,vol. 16, pp. 665-668.

19. G. Zhang, L. Sun and B. Sun, “A Wideband Dual-Polarized Antenna Using Planar Quasi-Open-Sleeve Dipoles for Base Station Applications,” DOI 10.1155/2015/164392, International Journal of Antennas and

Propagation, 2015.

20. X. L. Jiang, Z. J. Zhang and Y. Li et.al, ”A low-cost dual-polarized array antenna etched on a single substrate,”

733-736

IEEE Antennas Wireless Propagation Letters, vol.12, Mar. 2013,pp.265-268.

21. Y.Cui, R.Li, and H. Fu, “A Broadband Dual-Polarized Planar Antenna for 2G/3G/LTE Base Stations,”IEEE

Transactions on Antennas and Propagation, vol.62.no.9, September 2014.

22. Y. Cui , L. Wu and R. Li, “Bandwidth Enhancement of a Broadband Dual-Polarized Antenna for 2G/3G/4G and IMT Base Stations,”IEEE Transactions on Antennas and Propagation,vol,66.no.12, December,2018

23. Q. Zhang and Y.Gao, “A Compact Broadband Dual-Polarized Antenna Array for Base Stations,” IEEE

Antennas and Wireless Propagation Letters, vol.17, no. 6, June 2018. 24. H. Zhai, Lei Xi, Y. Zang, and Long Li, “A Low Profile Dual-polarized High Isolation MIMO Antenna

25. Arrays for Wideband Base Station Applications,”IEEE Transactions on Antennas and Propagation, DOI

10.1109/TAP.2017.2776346. 26. H. Zhai, J. Zhang, Y. Zang, Q. Gao and C. Liang, “An LTE Base-Station Magneto-electric DipoleAntenna

with Anti-Interference Characteristics and Its MIMO System Application,”IEEE Antennas and Wireless

Propagation Letters, vol.14, 2015. 27. J.N. Lee, K.C. Lee and P.J. Song, “The Design of a Dual-Polarized Small Base Station Antenna with High

Isolation Having a Metallic Cube,”,”IEEE Transactions on Antennas and Propagation, vol.63, no.2,

February 2015. 28. R. Wu and Q. Chu, “Resonator-Loaded Broadband Antennafor LTE700/GSM850/GSM900 Base

Stations,”,”IEEE Antennas and Wireless Propagation Letters, vol.16, 2017.

29. Y. He, W. Tian and L. Zhang, “A Novel Dual-Broadband Dual-Polarized Electrical Down-tilt Base Station

Antenna for 2G/3G Applications,” IEEE Access, vol.5, June 2017.

30. M. M. Fadoul, T. A. Rahman, and A. Moradikordalivand, “Novel Planar Antenna for Long Term Evolution

(LTE),” International Journal of Information and Electronics Engineering, Vol. 4, No. 1, January 2014. 31. A. Elsherbini, J. Wu and K. Sarabandi, “Dual Polarized Wideband Directional Coupled Sectorial Loop

Antennas for Radar and Mobile Base Stations Applications,”IEEE Transactions on Antennas and

Propagation,DOI 10.1109/TAP.2015.2392773. 32. Y. Cui, X. Gao, H. Z. Fu, Q. Xin Chu, and R. Li, “Broadband Dual-Polarized Dual-Dipole Planar

Antennas,” IEEE Antennas and Propagation Magazine, pp. 77-87, December 2017.

33. . SEbadi, N.Amiri and L. Forooraghi, “ A Low Side lobe level Non-equispaced Microstrip Array Antenna Design for BTS Application Using Genetic Algorithm,”IEEE International Symposium on Microwave,

Antenna, Propagation and EMC Technologies for Wireless Communications Proceedings ,2005.

119.

Authors: Prabhjot Kaur, Praveen Kumar Khosla

Paper

Title:

Recent Automated Glaucoma Detection Techniques using Color Fundus Images

Abstract: One of the areas in which C-DAC, Mohali is actively engaged, is development of

AI powered fundus imaging system providing insight into several severe eye diseases.

Glaucoma, one of the most hazardous ocular disease, continues to affect and burden a large

section of our population. Neuropathy of optic nerve cells is the prime cause of glaucoma and

is the second leading cause of blindness worldwide. It doesn’t manifest itself and is often

termed as the silent thief of eye sight. The damage caused by glaucoma is irreversible.

Therefore, it is imperative to detect glaucoma at an early stage. The medical literature related

to glaucoma indicates that glaucoma detection is a complex process and depends on

combination of several parameters. The conventional methods of hand-crafted feature

extraction are tedious, time consuming and require human intervention. Even though many

such systems have recently shown promising results, but these systems require extensive

feature engineering and have limited representation power owing to varied morphology of the

optic nerve head. Most of the proposed systems have targeted the parameter cup to disc ratio

(CDR) for detection of glaucoma, but that may not be the best approach for building efficient,

robust and accurate automated system for glaucoma diagnosis. This paper advocates the use

of hybrid approach of manual feature crafting with deep learning. It holds promise of

improving the accuracy of glaucoma diagnosis through the automated techniques. It is

further proposed that if diagnosis based on CDR remains inconclusive other methods of

diagnosis should be adopted to come to a certain conclusion.

Keywords: CDR, CNN, Deep Learning NN, Feature Extraction, Glaucoma, Fundus, ISNT

rule, Transfer Learning

References:

737-742

1. Y. C. Tham, X. Li, T. Y. Wong, H. A. Quigley, T. Aung, and C. Y. Cheng, “Global prevalence of glaucoma

and projections of glaucoma burden through 2040: A systematic review and meta-analysis,” J.

Ophthalmology, vol. 121, no. 11, pp. 2081–2090, 2014.

2. American Optometric Association, “Glaucoma” https://www.aoa.org/patients-and-public/eye-and-vision-problems/glossary-of-eye-and-vision-conditions/glaucoma, Access Date: 1 May 2019

3. Downs, J. C., Roberts, M. D., & BURGOYNE, C. F. (2008). “Mechanical Environment of the Optic Nerve

Head in Glaucoma”. Optometry and Vision Science, 85(6), E425–E435. 4. 4. Jonas JB, Budde WM, “Diagnosis and Pathogenesis of Glaucomatous Optic Neuropathy: Morphological

Aspects”, Prog Retin Eye Res, 2000;19:1–40

5. 5. American Academy of Opthalmology, “Clinical Evaluation of the Optic Nerve Head”, https://www.aao.org/bcscsnippetdetail.aspx?id=ee28fa7a-e1f7-4495-99a4-7828a800fcd2, Access Date: 3

May 2019

6. 6. Naida Jakirlic ,”Optic Nerve Evaluation in Glaucoma‘, California Optometric Association”, 2016 7. 7. Downs, J. C., Roberts, M. D., & BURGOYNE, C. F. (2008). “Mechanical Environment of the Optic

Nerve Head in Glaucoma”. Optometry and Vision Science, 85(6), E425–E435.

8. 8. Susanna Jr R, Medeiros FA, “Ophthalmoscopic aspects of the optic nerve in glaucoma: Normal optic disc”, Rio de Jenerio: Cultura Médica, 2006, 1–12.

9. 9. Hoffmann EM, Zangwill LM, Crowston JG, Weinreb RN. “Optic disk size and glaucoma”. Surv

Ophthalmol.2007;52(1):32–49.doi:10.1016/j.survophthal.2006.10.002.

10. 10. Peter E. Libre, MD, Norwalk, Conn. “Revisiting the Importance of Disc Size, Review of

Ophthalmology”, 2004.

11. 11. Spaeth GL, Lopes JF, Junk AK, et al., “Systems for staging the amount of optic nerve damage in glaucoma: A critical review and new material”, Surv Ophthalmol, 2006; 51:293–315.

12. 12. Fingeret M, Medeiros FA, Susanna Jr R, Weinreb RN, “Five rules to evaluate the optic disc and retinal

nerve fiber layer for glaucoma”, Optometry, 2005;76:661–8. 13. 13. Linda Yi-Chieh Poon, David Solá-Del Valle, Angela V. Turalba,

14. Iryna A. Falkenstein, Michael Horsley, Julie H. Kim, Brian J. Song,

15. Hana L. Takusagawa, Kaidi Wang, Teresa C. Chen, “The ISNT Rule: How Often Does It Apply to Disc Photos and Retinal Nerve Fiber Layer Measurements in the Normal Population”, Am J Ophthalmol, 2018.

16. 14. W. Ruengkitpinyo ; W. Kongprawechnon ; T. Kondo ; P. Bunnun ; H. Kaneko , “Glaucoma screening

using rim width based on ISNT rule”, IEEE 2015 6th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).

17. 15. Andrew J. Tatham; Robert N. Weinreb; Linda M. Zangwill; Jeffrey M. Liebmann; Christopher A. Girkin;

Felipe A. Medeiros,”The Relationship Between Cup-to-Disc Ratio and Estimated Number of Retinal Ganglion Cells”, Investigative ophthalmology and visual science, 2013.

18. 16. Jonas JB, Gusek GC, Naumann GO, “Optic disc, cup and neuroretinal rim size, configuration and

correlations in normal eyes”, Invest Ophthalmol VisSci, 1988;29:1151–8.

19. 17. Hayreh SS, “Ischemic Optic Neuropathies”, Berlin Heidelberg: Springer-Verlag, 2011.

20. 18. Bourne RR, “The optic nerve head in glaucoma”, Community Eye Health, 2006;19:44–5.

21. 19. Mandeep Singh, Mooninder Singh, JiwanpreetKaurVirk, “Glaucoma Detection Techniques: A Review”, International Journal of Computer Science & Communication (ISSN: 0973-7391), Vol 6 • Number 2 April -

Sep 2015 pp. 66-76.

22. 20. https://www.sciencedirect.com/topics/ medicine-and-dentistry/fundus-photography, access date : 1 May 2019

23. 21. Abràmoff MD, Garvin MK, Sonka M, “Retinal imaging and image analysis”, PubMed, 2010

24. 22. C Alexandrescu, AM Dascalu, A Panca, A Sescioreanu, C Mitulescu, R Ciuluvica, L Voinea, C Celea, “Confocal scanning laser ophthalmoscopy in glaucoma diagnosis and management”, J Med Life. 2010 Aug

15; 3(3),pp: 229-234.

25. 23. Weinreb RN, et al., “Scanning laser polarimetry to measure the nerve fiber layer of normal and glaucomatous eyes”. Am J Ophthalmology. 1995;119(5),pp::627–36.

26. 24. Huang D, Swanson EA, Lin CP, Schuman JS, Stinson WG, Chang W, Hee MR, Flotte T, Gregory K, Puliafito CA, “Optical coherence tomography”, Science. 1991 Nov 22; 254(5035):1178-81.

27. 25. James G Fujimoto, Costas Pitris, Stephen A Boppart, “Optical Coherence Tomography: An Emerging

Technology for Biomedical Imaging and Optical Biopsy”, PMC, 2000. 28. 26. Tehmina Khalil ; Muhammad Usman Akram ; Samina Khalid ; Amina Jameel, “An overview of

automated glaucoma detection”, IEEE 2017 Computing Conference.

29. 27. Michael Abràmoff, Christine N. Kay, Chapter 6 Image Processing, Book: Retina, Elsevier, 2013, doi: 10.1016/B978-1-4557-0737-9.00006-0.

30. 28. Hossein Nazari Khanamiri, Austin Nakatsuka, and Jaafar El-Annan, “Smartphone Fundus Photography”,

PubMed, 2017 31. 29. U. Raghavendra, Sulatha V. Bhandary, Anjan Gudigar, U. Rajendra Acharya, “Novel expert system for

glaucoma identification using non-parametric spatial envelope energy spectrum with fundus images”, Bio

cybernetics and Biomedical Engineering, Volume 38, Issue 1, 2018, pp:170-180 . 32. 30. S. Maheshwari, R. B. Pachori, and U. R. Acharya, “Automated Diagnosis of Glaucoma Using Empirical

Wavelet Transform and Correntropy Features Extracted From Fundus Images,” IEEE J. Biomed. Health

Inform. 21(3), (2017) pp: 803–813.

33. 31. U Rajendra Acharya, Shreya Bat, Joel EW Koh, Sulatha V Bhandary, Hojjat Adeli, A novel algorithm, to

detect glaucoma risk using texton and local configuration pattern features extracted from fundus images, Computers in Biology and Medicine, vol. 88 (2017),pp: 72-83.

34. 32. Julian Zilly, Joachim M. Buhmann, Dwarikanath Mahapatra, “Glaucoma detection using entropy

sampling and ensemble learning for automatic optic cup and disc segmentation”, Computerized Medical

Imaging and Graphics, Elsevier, Volume 55, January 2017, pp: 28-41. 35. 33. Simonthomas, S., N. Thulasi, and P. Asharaf. "Automated diagnosis of glaucoma using Haralick texture

features." In Information Communication and Embedded Systems (ICICES), 2014 International

Conference on, pp. 1-6. IEEE, 2014. 36. 34. Annu, N., and Judith Justin. "Automated classification of glaucoma images by wavelet energy features."

International Journal of Engineering and Technology 5, no. 2 (2013),pp: 1716-1721.

37. 35. Abhishek Pal, Manav Rajiv Moorthy , A. Shahina , “G-EYENET: a convolutional autoencoding classifier framework for the detection of glaucoma from retinal fundus images”, 25th IEEE International Conference

on Image Processing (ICIP), 2018.

38. 36. U Raghavendra, Hamido Fujita, Sulatha V Bhandary, Anjan Gudigar, Jen Hong Tan, U Rajendra Acharya, “Deep Convolution Neural Network for Accurate Diagnosis of Glaucoma Using Digital Fundus

Images”, Computerized Medical Imaging and Graphics, ScienceDirect, Elsevier, Volume 55, January 2017,

pp: 28-41 39. 37. Xiangyu Chen, Yanwu Xu, Damon Wing Kee Wong, Tien Yin Wong, Jiang Liu, “Glaucoma Detection

based on Deep Convolutional Neural Network”, 37th Annual International Conference of the IEEE

Engineering in Medicine and Biology Society (EMBC), 2015.

40. 38. Juan J. Gómez-Valverde et al., “Automatic glaucoma classification using color fundus images based on

convolutional neural networks and transfer learning”, Biomedical Optics Express, Vol. 10, No. 2 | 1 Feb

2019. 41. 39. Alan Carlos de Moura Lima, Lucas Bezerra Maia, Roberto Matheus Pinheiro Pereira, Geraldo Braz

J´unior, Joao Dallyson Sousa de Almeida, Anselmo Cardoso de Paiva, “Glaucoma Diagnosis over Eye

Fundus Image through Deep Features”, 25th International Conference on Systems, Signals and Image Processing (IWSSIP), 2018.

42. 40. Annan Li , Yunhong Wang , Jun Cheng , Jiang Liu, “Combining Multiple Deep Features for Glaucoma

Classification”, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 43. 41. Yidong Chai, Hongyan Liu, JieXu, “Glaucoma diagnosis based on both hidden features and domain

knowledge through deep learning models”, Knowledge-Based Systems, ScienceDirect, Volume 161, 1

December 2018, 147-156. 44. 42. D. J Hemanth, J. Anitha, L Hoang Son, M Mittal “Diabetic Retinopathy Diagnosis from Retinal Images

using Modified Hopfield Neural Network”, Journal of Medical Systems, 42(2018),pp:247.

45. 43. M Mittal, A Verma, I Kaur, B Kaur, M Sharma, L M Goyal, S Roy & T-H Kim, “An Efficient Edge Detection Approach to Provide Better Edge Connectivity for Image Analysis”, IEEE Access, Vol. 7(2019),

pp:33240-33255.

46. 44. Kaur B., Sharma M., Mittal M., Verma A., Goyal L. M., Hemanth D. J, “An improved salient object

detection algorithm combining background and foreground connectivity for brain image analysis”,

Computers and Electrical Engineering, vol. 71(2018), pp:692-703.

47. 45. M. Mittal, L M Goyal, S Kaur, I Kaur, A Verma, D. J Hemanth, “Deep learning based enhanced tumor segmentation approach for MR brain images”, Applied Soft Computing, Vol 78 (2019), pp:346-354.

48. 42. D. J Hemanth, J. Anitha, L Hoang Son, M Mittal “Diabetic Retinopathy Diagnosis from Retinal Images

using Modified Hopfield Neural Network”, Journal of Medical Systems, 42(2018),pp:247. 49. 43. M Mittal, A Verma, I Kaur, B Kaur, M Sharma, L M Goyal, S Roy & T-H Kim, “An Efficient Edge

Detection Approach to Provide Better Edge Connectivity for Image Analysis”, IEEE Access, Vol. 7(2019),

pp:33240-33255.

Authors: Navneet Kaur, Surbhi Sharma, Jaswinder Kaur

Paper

Title:

Concave Shape Microstrip Patch Antenna using SRR for 5G Applications

120

.

.

Abstract: A single band microstrip-fed patch antenna is presented which contains the

radiating structure having concave shape slots and split ring resonator loaded in the partial

ground plane. This partial ground plane has been used to enhance the bandwidth of proposed

antenna. Both the partial ground plane and radiating patch are perfect electric conductors. The

patch is imprinted on a substrate named as Epoxy Glass FR-4 having thickness 1.6 mm,

relative permittivity 4.4, and loss tangent 0.0024. The designed concave shape microstrip patch

antenna (MPA) is resonate at single frequency band from 3.4-3.8 GHz with 400 MHz

bandwidth and corresponding return loss of -25dB. A parametric study has been performed for

the concave shape slots located in the patch. Proposed MPA is simulated using Computer

Simulation Technology Microwave Studio Version 14.0 (CST MWS V14.0). Furthermore, the

radiation performance of antenna in terms of gain and radiation efficiency has been analyzed .

The proposed antenna is having a peak gain of 3.2 dB and radiation efficiency of 94%.

Keywords: CST MWS V14.0, partial ground plane, fifth generation, microstrip patch

antenna, SRR.

References: 1. A. Osseiran et al., "Scenarios for 5G mobile and wireless communications: the vision of the METIS project,"

in IEEE Communications Magazine, vol. 52, no. 5, May 2014, pp. 26-35. 2. Nokia white paper. 2017. 5G deployment below 6 GHZ. https://resources.ext.nokia.com/asset/201315.(accessed

August 2017). 3. O. M. Haraz, A. Elboushi, S. A. Alshebeili and A. Sebak, "Dense Dielectric Patch Array Antenna With Improved

Radiation Characteristics Using EBG Ground Structure and Dielectric Superstrate for Future 5G Cellular

Networks," in IEEE Access, vol. 2,2014, pp.909-913. 4. K. Mak, K. So, H. Lai and K. Luk, "A Magnetoelectric Dipole Leaky-Wave Antenna for Millimeter-Wave

Application," in IEEE Transactions on Antennas and Propagation, vol. 65, no. 12,Dec.2017, pp. 6395-6402.

5. K. M. Mak, H. W. Lai, K. M. Luk and C. H. Chan, "Circularly Polarized PatchAntenna for Future 5G Mobile Phones," in IEEE Access, vol. 2, pp. 1521-1529, 2014.

6. Alieldin, Ahmed, Yi Huang, Stephen J. Boyes, Manoj Stanley, Sumin David Joseph, Qiang Hua, and Dajun Lei.

"A Triple-Band Dual-Polarized Indoor Base Station Antenna for 2G, 3G, 4G and Sub-6 GHz 5G Applications." IEEE Access 6 (2018): 49209-49216.

7. Sarkar, Debdeep, and Kumar Vaibhav Srivastava. "Four Element Dual-band Sub-6 GHz 5G MIMO Antenna

Using SRR-loaded Slot-Loops." In 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical,

Electronics and Computer Engineering (UPCON), pp. 1-5. IEEE, 2018.

8. Vaidya, Avinash R., Rajiv K. Gupta, Sanjeev K. Mishra, and Jayanta Mukherjee. "Right-hand/left-hand

circularly polarized high-gain antennas using partially reflective surfaces." IEEE antennas and wireless propagation letters, vol. 13, 2014, pp. 431-434.

9. Pandit, Soumen, Akhilesh Mohan, and Priyadip Ray. "A low-profile high-gain substrate-integrated waveguide-

slot antenna with suppressed cross polarization using metamaterial." IEEE Antennas and Wireless Propagation Letters,vol. 16,2017, pp.1614-1617.

10. Singh, Amit K., Mahesh P. Abegaonkar, and Shiban K. Koul. "High-gain and high-aperture-efficiency cavity

resonator antenna using metamaterial superstrate." IEEE Antennas and Wireless Propagation Letters , vol.16, 2017, pp. 2388-2391.

11. Balanis CA. Antenna Theory: Analysis and Design. Third Edition. Wiley Interscience. 2005.

743-746

Authors: Dr. Monika Gupta Vashisht, Ms. Ashima Kalra, Dr. Bhawna

Paper

Title:

Determining Factors Influencing Faculty Feedback Using Data Mining Technique

Abstract: Faculty is a major stakeholder in an education institute. Quality of faculty reflects

the quality of youth, the future nation builders. Based on the vision of honorable management,

an attempt has been made to gather the feedback of faculty reflecting their current state of

work. Data have been collected initially via open-ended questionnaire. Faculties serving

renowned institutes in the states of Punjab and Haryana have been approached to gather

information. Attributes have been identified from the literature review and using an appropriate

measurement scale. Only the willing respondents and their responses have been taken into

consideration. The responses gathered using 5-point Likert-Scale was then factor analyzed.

The attributes converged mainly on six dimensions- recognition, sense of belongingness,

working environment, basic need fulfillment, self-respect, and contribution to society. These

dimensions have been discussed keeping in view the current scenario in the education sector.

121.

.

Keywords: Faculty, Higher Education, Factor Analysis and Satisfaction

References: 1. Dr. K. Nigama, Dr. S. Selvabaskar, Dr. S. T Surulivel, Dr. R. Alamelu and Ms. D. Uthaya Joice (2018). Job

satisfaction among school teachers, International Journal of Pure and Applied Mathematics, vol. 119(7), special

issue, pp. 2645-2655. 2. J. Han and H. Yin (2016), Teacher motivation: Definition, research development and implications for teachers,

Cogent Education, 3: 1217819, pp. 1-18.

3. V. Ramachandran and M. Pal, Dr. S. Jain, S. Shekar, J. Sharma (2005).Teacher Motivation in India, pp. 1-38.

4. World Development Report (2018), Teacher skills and motivation both matter (though many education systems act like they don’t), pp. 131-139.

5. F. Gokce (2010). Assessment of teacher motivation. School Leadership and Management, 30(5), pp. 487-499.

6. India Brand Equity Foundation (IBEF) Report, April 2019. Education and training industry in India.

7. India Brand Equity Foundation (IBEF) Report, June 2018. Education and training report.

8. 12 Skills teachers require to be effective in teaching. 12 February 2018. https://www.edsys.in/8-skills-teachers-require-effective-teaching/

9. Z. Ozguner and M. Ozguner (June 2014). A managerial point of view on the relationship between Maslow’s hierarchy of needs and Herzberg’s dual factor theory, International Journal of Business and Social Science, vol. 5(7), pp. 207-215.

10. Z. Demirtas (2010). Teachers’ job satisfaction levels, Procedia Social and Behavioral Sciences 9, pp. 1069–1073.

11. M. I. Rasheed, A. A. Humayon, U. Awan and A-ud-D. Ahmed (2016). Factors affecting teachers’ motivation, International Journal of Educational Management, vol. 30(1), pp. 101 – 114.

12. C. M. Calkins (2018). Developing and Measuring Faculty Motivation to Teach in Higher Education. UNLV Theses, Dissertations, Professional Papers, and Capstones. 3227, pp. 1-154.

13. S. Munyengabe, H. Haiyan, Z. Yiyi and S. Jiefei (2017). Factors and levels associated with lecturers’ motivation and job satisfaction at a Chinese University. EURASIA J Math Sci and Tech Ed., vol. 13(10), pp. 6415-6430.

14. H. U. Amin and A. R. Khan (2009). Acquiring Knowledge for Evaluation of Teachers’ Performance in Higher Education – using a Questionnaire, International Journal of Computer Science and Information Security, vol. 2(1).

15. M, Ahmad (08 February 2019). What is wrong with the Indian higher education system? University World News. https://www.universityworldnews.com/post.php?story=20190129125036113

16. Happy Teachers, Better Students: Three Ways to Motivate Your Teachers and Your Engage Students. https://catchbox.com/education/teacher-motivation/

747-751

122.

Authors: Dr. Sunayna Khurana, Dipti Jain

Paper

Title:

Applying and Extending UTAUT2 Model of Adoption of New Technology in the context of

M-Shopping Fashion Apps

Abstract: The drive of this work is to recognize the factors that affect the adoption of m-

shopping fashion apps from the consumer perspective in Delhi NCR by extending UTAUT2

model with Post-purchase behavior with the aim to find out the consumers experience and

satisfaction level after adopting new technology (in this case mobile shopping application for

fashion).The variables identified including new variable, i.e. perceived risk and post-purchase

behaviour, were tested using structural equational modelling. Data collection was done using

the structured online survey on the sample of 557 mobile app users in Delhi-NCR on the young

Indian mobile users of age bracket (18-25) years. The outcomes of the work revealed that

except effort expectancy and social influence, all the remaining factors used in the proposed

model significantly influence the formation of behavioral intention of young mobile users to

embrace mobile based fashion shopping apps. Also, the results of the work revealed that

consumers actual purchase significantly affect their post-purchase behaviour. Hence, validates

the proposed model extended till post adoption. This is the first work in Delhi NCR on the

specific mobile shopping application category particularly fashion apps using extended

UTAUT2 model.

Keywords: Mobile Fashion Applications, Mobile Shopping, Utaut2, Technology Adoption,

India

References: 1. A.Y.L. Chong, (2013a), “A two-staged SEM-neural network approach for understanding and predicting the

752-759

.

determinants of m-commerce adoption”, Expert Systems with Applications, Vol.40 No. 4, pp. 1240-1247.

2. A.Y.L.Chong, (2013b), “Predicting m-commerce adoption determinants: a neural network approach”, Expert

Systems with Applications, Vol. 40 No. 2, pp. 523-530.

3. C.C.Lewis, C.E. Fretwell, J.Ryan, &J.B. Parham, (2013), “Faculty use of established and emerging technologies in higher education”, A unified theory of acceptance and use of technology perspective, International Journal of

Higher Education, Vol.2 No.2, pp.22-34.

4. C.Fang and S. C. Fang. (2016), “Factors Affecting Consumer Stickiness to Continue Using Mobile Applications”, International Journal of Mobile Communications, Vol.14 No.5, pp.431–453.

5. C.Gan , and H. Li. 2018. “Understanding the Effects of Gratifications on the Continuance Intention to Use

WeChat in China: A Perspective on Uses and Gratifications.” Computers in Human Behavior, Vol.78, pp. 306–315.

6. C.Kim,W.Li and Kim, D.J(2015),” An Empirical Analysis of Factors Influencing M-Shopping Use”,

International Journal of Human-Computer Interaction, Vol.31 No.12, pp:974-994. 7. C.L.Goi, & P.Y.Ng, (2011), “Perception of Young Consumers on Mobile Phone Applications in Malaysia”

World Applied Sciences Journal”, Vol.15 No. (1), pp. 47-55.

8. C.Liao,P. Palvia & H.N.Lin, (2006), “The roles of habit and web site quality in e-commerce”, International Journal of Information Management, Vol. 26 No.6, pp. 469- 483.

9. C. M. Chiu, E. T.Wang, , H.Fang., and H. Y.Huang, (2014), “Understanding Customers’ Repeat Purchase

Intentions in B2C e-Commerce: The Roles of Utilitarian Value, HedonicValue and Perceived Risk.” Information

Systems Journal, Vol.24 No. 1, pp. 85–114.

10. C.S Yu, (2012),” Factors affecting individuals to adopt mobile banking: empirical from the UTAUT model”,

Journal of Electronic Commerce Research, Vol.13 No. 2, pp.104-121. 11. C. Wong, G. Tan, T. Hew and K. Ooi, (2016), “Can mobile TV be a new revolution in the television industry?”,

Computers in Human Behavior, Vol. 55, Part B, pp. 764-776.

12. E.Moon, and T. Domina, (2015), “Willingness to use fashion mobile applications to purchase fashion products. A comparison between United States and South Korea”, Journal of textile and Apparel, Technology and

Management, Vol. 13, pp. 221-230.

13. F.D.Davis, R.P. Bagozzi, and P.R. Warshaw, (1989), “User acceptance of computer technology: a comparison of two theoretical models”, Management science, Vol. 35 No. 8, pp. 982-1003.

14. G. Baptista, and T. Oliveira, (2015), “Understanding Mobile Banking:The Unified Theory of Acceptance and

Use of Technology Combined with Cultural Moderators”, Computers in Human Behavior, Vol.50, pp: 418–430. 15. G.W.H. Tan, V. H. Lee, B. Lin, and K.B. Ooi,(2017), "Mobile applications in tourism: the Future of the tourism

industry?", Industrial Management& Data Systems, Vol. 117 No.3, pp.560-58.

16. H.Baumgartner and C. Homburg, (1996), “Applications of structural equation modeling in marketing and consumer research: a review”, International Journal of Research in Marketing, Vol. 13 No. 2,pp. 139-161.

17. H.R.Marriott, M.D.Williams, (2018) “Enhancing the Customer Experience: Understanding UKConsumers’ M-

Shopping Adoption Intention” In: Krey N., Rossi P. (eds) BoundaryBlurred: A Seamless Customer Experience in

Virtual and Real Spaces. AMSAC 2018.Developments in Marketing Science: Proceedings of the Academy of

Marketing Science.Springer, Cham.

18. H.Y. Wang, C. Liao and L.H. Yang, “What affects Mobile Application Use? The role of consumption values”, International Journal of Marketing Studies, Vol.5 No. 2, pp. 11-22

19. I. K.W. Lai, and G. Shi, (2015) “The Impact of Privacy Concerns on the Intention for Continued use of an

Integrated Mobile Instant Messaging and Social Network Platform.” International Journal of Mobile Communications, Vol. 13 No.6: pp.641 669.

20. I.L.D. Harsono, M.L. A. Suryana, (2014),” Factors Affecting the Use Behavior of Social Media Using UTAUT 2

Model, Proceedings of the First Asia-Pacific Conference on GlobalBusiness, Economics, Finance and Social Sciences (AP14 Singapore Conference) Singapore, 1-3 August 2014 Paper ID: S471.

21. J.H. Cheong, M.C.Park, and J.H. Hwang, (2004), “Mobile payment adoption in Korea: switching from credit

card”, in ITS 15th Biennial Conference, in Berlin, pp. 4-7. 22. J.J.Hew,V.H. Lee, K.B. Ooi, andJ. Wei, (2015),"What catalyses mobile apps usage intention: an empirical

analysis", Industrial Management & Data Systems, Vol. 115 No. 7, pp. 1269 –1291. 23. Jati. NugrohoJatmiko and Laksito. Herry.. 2012. AnalisisFaktor-faktor yang Mempengaruhi

MinatPemanfaatandanPenggunaanSistem E-Learning. Diponegoro, Journal ofAccounting,Vol 1. No. 2.

24. K. Lai, and D. C. Lai. (2014) “User Acceptance of Mobile Commerce: An Empirical study in Macau.” International Journal of Systems Science, Vol. 45 No.6, pp: 1321–1331.

25. K. Yang,(2012), “Consumer technology traits in determining mobile shopping adoption: An application of the

extended theory of planned behaviour”, Journal of Retailing and Consumer Services, Vol.19 No.5, pp: 484- 491. 26. K.Madan and R. Yadav, (2016). (2016) "Behavioural intention to adopt mobile wallet: a developingcountry

perspective", Journal of Indian Business Research, Vol. 8 No. 3, pp.227-244.

27. K.Madan and R. Yadav, (2018) "Understanding and predicting antecedents of mobile shopping adoption: A developing country perspective", Asia Pacific Journal of Marketingand Logistics, Vol.30 No. 1, pp.139-162.

28. L. Jia, D.Hall, and S.Sun,2014. “The Effect of Technology Usage Habits on Consumers’Intention to Continue

Use Mobile Payments.” Proceedings of Twentieth Americas 29. L.Gao, K. A. Waechter, and X. Bai. 2015. “Understanding Consumers’ Continuance Intention Towards Mobile

Purchase: A Theoretical Framework and Empirical study – A Case of China.” Computers in Human Behavior,

Vol.53, pp.249–262. 30. L.Morris, (2016). Which mobile fashion retail app has the best UX?

Availableat:https://www.clickz.com/2015/11/06/which-mobile-fashion-retail-app-has-the best-ux[Accessed

5April 2019]. 31. Localytics (2011, January),” First impressions matter! 26% of apps downloaded in 2010 wereused just once”

available at http://www.localytics.com/blog/2011/first-impressions-matter-26-percentof-apps-downloaded-used-

just-once/(accessed on 10 April, 2019)

32. L.T., Hu and P.M. Bentler,(1999), “Cut off criteria for fit indexes in covariance structure analysis: conventional

criteria versus new alternatives”, Structural Equation Modeling: A Multidisciplinary Journal, Vol. 6 No. 1, pp. 1-55.

33. M Arcand., D. Pauzé (2017) Winning Over Customers with Mobile: A Fashion Industry Case Work. In: Rossi P.

(eds) Marketing at the Confluence between Entertainment and Analytics. Developments in Marketing Science: Proceedings of the Academy of Marketing Science.Springer, Cham.

34. M. Hasan, R. Kouser, S.S Abbas and M. Azeem, (2014),” Consumers Attitudes and Intentions to adopt

Smartphone Apps: Case of Business Students”, Pakistan Journal of Commerce andSocial Sciences, Vol.8 No. 3, pp. 763-779.

35. M. Limayem, S. G. Hirt, and C. M. Cheung, (2007). “How HabitLimits the Predictive Powerof Intention”, The

Case of InformationSystems Continuance.” MIS Quarterly Vol. 31, pp.705–737. 36. M.Groß, (2015). Exploring the acceptance of technology for mobile shopping: An empirical investigation among

smartphone users”,International Review of Retail Distribution & Consumer Research, Vol.25 No.3, pp.215-235.

37. M.R., Islam, and T.A.Mazumder, (2010), “Mobile application and its global impact”, International Journal of Engineering & Technology, Vol. 10 No. 6, pp. 72-78.

38. P. Hanafizadeh, M. Behboudi, A.A.Koshksaray, and M.J.S. Tabar, (2014), Mobile-bankingadoption by Iranian

bank clients”, Telematics and Informatics, Vol. 31 No. 1, pp. 62-78.

39. P.K.Chopdar, N.Korfiatis, V.J Sivakumar, and M.D Lytras, (2018) "Mobile Shopping Apps Adoption and

Perceived N. Risks: A Cross-Country Perspective Utilizing the Unified Theory ofAcceptance and Use of

Technology." Computers in Human Behavior, Vol.86, pp.109–128. 40. Peter, M.J,Ryan, (1976),” An investigation of perceived risk at the brand level”, “Journal of Marketing Research,

Vol.2 No.13, pp.184–188.

41. Preeti Tak and S.Panwar, (2017) "Using UTAUT 2 model to predict mobile app-based shopping: evidences from India", Journal of Indian Business Research, Vol. 9 No. 3, pp. 248-264.

42. R.E., Schumacker and R.G.Lomax,(2004), A Beginner’s Guide to Structural Equation Modelling,Erlbaum,

Mahwah, NJ. 43. R.H. Tsiotsou &J. Wirtz, (2015), “The Three-Stage Model of Service Consumption,” in: The Handbook of

Service Business: Management, Marketing, Innovation and Internationalisation, by Bryson, J. R. and Daniels, P.

W. (eds.) Cheltenham: Edward Elgar, United Kingdom, 105-128 44. S. Yang, Y. Chen, and J. Wei. (2015) “Understanding Consumers’ Web-Mobile Shopping Extension Behavior: A

Trust Transfer Perspective.” Journal of Computer Information Systems, Vol.55 No.2, pp:78–87.

45. S.C.Kim, D.Yoon,& E.K. Han,(2016), “Antecedents of mobile app usage amongsmartphone users”, Journal of Marketing Communications, Vol.22 No.6, pp.653-670.

46. S.Hong, J.Y.Thong, and K.Y.Tam,(2006) “Understanding Continued InformationTechnology Usage Behavior: A

Comparison of Three Models in the Context of Mobile Internet.” Decision Support Systems, Vol.42 No.3, pp.

1819–1834.

47. S.Pahnila,S.Mikkoand X.,Zheng(2011). “Integrating Habit intoUTAUT: The Chinese eBay Case”,Pacific Asia

Journal of the Association for Information System, Vol. 3 No. 2pp 1-30 48. Statista.com. (2015). Retail m-commerce sales in India from 2015-2020 |Statistic. [online] Available at:

https://www.statista.com/statistics/266119/india-retail- mcommerce- sales//[Accessed 10 April. 2019].

49. T.T.T. Phamand J.C, Ho, J.C. (2014), “What are the core drivers in consumer adoption of NFC- based mobile payments? A proposed research framework”, Management of Engineering &Technology (PICMET), 2014

Portland International Conference, Kanazawa, pp.3041-3049.

50. T.Y.Chang, C.J. Tsai, and J.H. Lin, (2012), “A graphical-based password keystroke Dynamic authentication system for touch screen handheld mobile devices”, The Journal of Systems and Software”, Vol. 85 No. 5, pp.

1157-1165.

51. T., Zhou, (2013), “Understanding Continuance Usage of Mobile Sites.” Journal of IndustrialManagement & Data Systems, Vol.113 No. 9, pp.1286–1299.

52. Uravshi Tandon., R. Kiran and A.N. Sah. (2016), “Understanding online shopping adoption in India: unified theory of acceptance and use of technology 2 (UTAUT2) with perceived risk application” Service Science, Vol.8

No. 4, pp. 420–437.

53. V. Venkatesh, J.Y. Thong &X. Xu, (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1), 157-178.

Authors: Gurmeet Singh and Manish Mahajan

Paper

Title:

A Green Computing Supportive Allocation Scheme Utilizing Genetic Algorithm and

Support Vector Machine

Abstract: Green Computing leads to energy-aware computation. When a Physical Machine

gets a job from user, it intends to complete it at any cost. Virtual Machine (VM) helps to attain

maximum completion ratio. The Host to VM ratio increases with the increase in the workload

over the system. The allocation policy of VM has ambiguities with leads to an overloaded

Physical Machine (PM). This paper aims to reduce the overhead of the PMs. For the allocation,

123

.

Modified Best Fit Decreasing (MBFD) algorithm is used to check the resources availability.

For the allocation, Modified Best Fit Decreasing (MBFD) algorithm is used to check the

resources availability. Genetic Algorithm (GA) has been used to optimize the MBFD

performance by fitness function. For the cross-validation Polynomial Support Vector Machine

(P-SVM) is used. It has been utilized for training and classification and accordingly,

parameters, viz. (Service Level Agreement) SLA and Job Completion Ratio (JCR) are

evaluated. A comparative analysis has been drawn in this article to depict the

research work effectiveness and an improvement of 70% is perceived.

Keywords: Green Computing, VM Allocation, MBFD, GA, SLAV, JCR

References: 1. K.Ye, D.Huang, X.Jiang, H.Chen, S.Wu, “Virtual Machine Based Energy-Efficient Data Centre Architecture

for Cloud Computing: A Performance Perspective”, IEEE/ACM International Conference on Green

Computing and Communications, 2010, pp.171-178.

2. D.Jayasinghe, C.Pu, T. Eilam, M.Steinder, I.Whalley, E.Snible, “Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-aware Virtual Machine Placement”, IEEE

International Conference on Services Computing, 2011, pp.72-79,

3. C.T.Man, M.Kayashima, “Virtual Machine placement algorithm for virtulized desktop infrastructure”, Proceedings of IEEE CCIS, 2011, pp.334-337.

4. C.Lin, P.Liu, J. Wu, “Energy-Aware Virtual Machine Dynamic Provision and Scheduling for Cloud Computing”, IEEE 4th International Conference onCloud Computing, 2011, pp.736-737.

5. Y. Jadeja and K. Modi, “Cloud computing-concepts, architecture and challenges”, in Computing, Electronics

and Electrical Technologies (ICCEET), International Conference, 2012, pp. 877–880. 6. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms:

Vision, hype, and reality for delivering computing as the 5th utility”, Futur. Gener.Comput. Syst., Vol. 25,

No. 6, 2009, pp. 599–616. 7. Yamini, B.; Selvi, D.V., “Cloud virtualization: A potential way to reduce global warming”, Recent Advances

in Space Technology Services and climate Change (RSTSCC), 13-15, 2010., pp.55-57.

8. Witkowski, M.; Brenner, P.; Jansen, R.; Go, D.B.; Ward, E., “Enabling Sustainable Clouds via Environmentally Opportunistic Computing”, IEEE Second International Conference on Cloud Computing

Technology and Science (CloudCom), 2010., pp.587-592.

9. Youwei Ding, Xiaolin Qin, Liang Liu, Taochun Wang, “Energy efficient scheduling of virtual machines in

cloud with deadline constraint”, Science Direct 2015.

10. Xiaomin Zhu, Laurence T. Yang, Huangke Chen Ji Wang, Shu Yin and Xiao cheng Liu, “Real-Time Tasks

Oriented Energy-Aware Scheduling in Virtualized Clouds”, IEEE, 2014. 11. Jinn-Tsong Tsai Jia-Cen Fang, Jyh-Horng Chou “Optimized task scheduling and resource allocation on

cloud computing environment uses Improved Differential Evolution Algorithm (IDEA)”, Computers &

Operations Research Elseveir, vol. 40, no. 12, 2014, pp.3045-3055. 12. Qiang Li, QinfenHao, Limin Xiao, and Zhoujun Li, “Adaptive Management of Virtualized Resources in

Cloud Computing Using Feedback Control,” in First International Conference on Information Science and

Engineering,, 2009, pp. 99-102. 13. W. E. Walsh, G. Tesauro, J. O. Kephart, and R. Das, “Utility Functions in Autonomic Systems”, in ICAC

’04: Proceedings of the First International Conference on Autonomic Computing. IEEE Computer

Society,2004, pp. 70–77. 14. Jiayin Li, MeikangQiu, Jian-Wei Niu, Yu Chen, Zhong Ming, “Adaptive Resource Allocation for Preempt

able Jobs in Cloud Systems”, In 10th International Conference on Intelligent System Design and

Application, 2011, pp. 31-36. 15. Shi J.Y., Taifi M., KhreishahA.,” Resource Planning for Parallel Processing in the Cloud”, In IEEE 13th

International Conference on High Performance and Computing, 2011, pp. 828-833..

16. Goudarzi H., Pedram M., “Multi-dimensional SLA-based Resource Allocation for Multi-tier Cloud

Computing Systems”, In IEEE International Conference on Cloud Computing, 2011, pp. 324- 331.

17. Gaurav Dhiman, Giacomo Marchetti ,TajanaRosing, “ vGreen: A System for Energy Efficient Computing in

Virtualized Environments”, In conference of ISLPED 2009 San Francisco, California ,USA, 2009, pp.19-21..

18. H. Jin, L. Deng, S. Wu, X. Shi and X. Pan, “Live virtual machine migration with adaptive, memory

compression”, IEEE International Conference on Cluster Computing and Workshops, New Orleans, LA, 2009, pp. 1-10.

19. G. von Laszewski, L. Wang, A. J. Younge and X. He, “Power-aware scheduling of virtual machines in

DVFS-enabled clusters”, IEEE International Conference on Cluster Computing and Workshops, New Orleans, LA, 2009, pp. 1-10.

20. B. Li, J. Li, J. Huai, T. Wo, Q. Li and L. Zhong, “EnaCloud: An Energy-Saving Application Live Placement

Approach for Cloud Computing Environments”, IEEE International Conference on Cloud Computing, Bangalore,2009, pp. 17-24.

21. M. Devare, M .sheikhalishahi, L.Grandinetti, “Prototype Implementation of Desktop cloud”, by IOS press,

Netherland, presented in Centraro International workshop on HPC, Grids and clouds,2010.

760-766

22. Haikun Liu, Cheng-Zhong Xu, Hai Jin, Jiayu Gong, Xiaofei Liao, “Performance and energy modeling for

live migration of virtual machines”, International Symposium on High Performance Distributed Computing,

2011.

23. Jiandun Li, Junjie Peng, Wu Zhang, “A Scheduling Algorithm for Private Clouds”, Journal of Convergence Information Technology, Vol. 6, No. 7, 2011, pp.1-9.

24. A.K, M.Z, EL Bakkali, Da_r EL Kettani, “Load Balancing Cloud Computing: State of Art”, IEEE, ISBN

978-1-4673-1053-6, 2012, pp.106-109. 25. Sourabh Dave, Abhishek Raghuvanshi, “Fault Tolerance Techniques in Distributed System”, International

Journal of Engineering Innovation & Research, vol. 1, no. 2, 2012, pp. 124-130.

26. J. J. Prevost, K. Nagothu, B. Kelley and M. Jamshidi, “Load prediction algorithm for multi-tenant virtual machine environments”, World Automation Congress, Puerto Vallarta, Mexico, 2012, pp. 1-6.

27. JyotiThaman, ManpreetSingh, “Green cloud environment by using robust planning algorithm”, Egypt Inform

J, Vol. 18, No3, 2017 pp. 205-214. 28. B. P. Rimal and M. Maier, “Workflow Scheduling in Multi-Tenant Cloud Computing Environments”,

in IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 1, 1 Jan. 2017, pp. 290-304.

29. G. Ayorkor Mills-Tettey Anthony Stentz M. Bernardine Dias, “The dynamic Hungarian algorithm for the assignment problem with changing costs”, Technical report Carnegie Mellon University (CMU-RI-TR-07-

27), 2007.

30. Y. Wang, S. Chen and M. Pedram, “Service Level Agreement-Based Joint Application Environment

Assignment and Resource Allocation in Cloud Computing Systems”, IEEE Green Technologies Conference

(GreenTech), Denver, CO, 2013, pp. 167-174.

31. T. Penner, A. Johnson, B. Van Slyke, M. Guirguis and Q. Gu, “Transient clouds: Assignment and collaborative execution of tasks on mobile devices”, IEEE Global Communications Conference, Austin, TX,

2014, pp. 2801-2806.

32. Anton Beloglazov, JemalAbawajy, RajkumarBuyyaa, “Energy-aware resource allocation heuristics for efficient management of data centres for cloud computing”, Fut Gen ComputSyst, Vol. 28, No.5, 2012,

pp.755–768.

33. S. Vakilinia, B. Heidarpour and M. Cheriet, “Energy Efficient Resource Allocation in Cloud Computing Environments”, in IEEE Access, vol. 4, , 2016, pp. 8544-8557.

34. S. Kentros, C. Kari, A. Kiayias and A. Russell, “Asynchronous Adaptive Task Allocation”, IEEE 35th

International Conference on Distributed Computing Systems, Columbus, OH, pp. 83-92,2015. 35. Massimo Ficco, Beniamino Di Martino, Roberto Pietrantuono, StefanoRusso, “Optimized task allocation on

private cloud for hybrid simulation of large-scale critical systems”, Future Generation Computer Systems,

vol. 74, 2017, pp. 104-118. 36. Ziqian Dong, Ning Liu and Roberto Rojas-Cessa, “Greedy scheduling of tasks with time constraints for

energy efficient cloud-computing data centres”, Journal of Cloud Computing: Advances, Systems and

Applications, vol.4, no.1, 2015, pp.2-14.

37. Chen J, Li K, Tang Z, Bilal K, Yu S, Weng C, Li K, “A Parallel Random Forest Algorithm for Big Data in a

Spark Cloud Computing Environment”, In IEEE Transactions on Parallel and Distributed Systems, vol. 28,

no. 4, 1 April 2017 pp. 919-933. 38. D. Chitra Devi and V. RhymendUthariaraj, “Load balancing in cloud computing environment using

Improved Weighted Round Robin Algorithm for nonpreemptive dependent tasks”, Sci World J, 2016, pp. 1–

14, 39. Elmougy S, Sarhan S, Joundy M, “ A novel hybrid of shortest job first and round Robin with dynamic

variable quantum time task scheduling technique”, J Cloud Comput, Vol. 6, No. 1, 2017, pp.12.

40. YadaiahBalagoni and Dr. R.Rajeswara Rao, “SLA-AWARE scheduling of VMs for load balancing in cloud using a three phase optimal VM migration technique”, International Journal of Latest Trends in Engineering

and Technology, Vol. 10, No.2, 2018, pp.217-227.

Authors: Anjana Sharma, Amarjeet Kaur, Shikha Saxena and Prashant Singh

Paper

Title:

A Novel Signal Scrambling Technique for PAPR Reduction in OFDM Systems

Abstract: OFDM forms the basis of the upcoming next generation technologies so as to

achieve higher data rates within a given bandwidth effectively. One of the major issues

associated with OFDM is Peak to Average Power Ratio (PAPR) which needs to be minimized

to get an efficient performance. The random variation in the signal amplitude of the OFDM

signal leads to additional interference in the system and hence affecting the performance of

HPA in non-linear region. In this paper, we propose a technique for the reduction of PAPR in

OFDM systems with some increased complexity which works for any modulation type and any

number of subcarriers. The simulation results show performance improvement with respect to

the existing signal scrambling techniques.

Keywords: Orthogonal frequency division multiplexing (OFDM), Peak to Average Power

Ratio (PAPR), High Power Amplifier (HPA), Complimentary Cumulative Distribution

Function (CCDF).

124.

.

References: 1. Y. C. Tham, X. Li, T. Y. Wong, H. A. Quigley, T. Aung, and C. Y. Cheng, “Global prevalence of glaucoma and

projections of glaucoma burden through 2040: A systematic review and meta-analysis,” J. Ophthalmology, vol.

121, no. 11, pp. 2081–2090, 2014. 2. American Optometric Association, “Glaucoma” https://www.aoa.org/patients-and-public/eye-and-vision-

problems/glossary-of-eye-and-vision-conditions/glaucoma, Access Date: 1 May 2019

3. Downs, J. C., Roberts, M. D., & BURGOYNE, C. F. (2008). “Mechanical Environment of the Optic Nerve Head in Glaucoma”. Optometry and Vision Science, 85(6), E425–E435.

4. Jonas JB, Budde WM, “Diagnosis and Pathogenesis of Glaucomatous Optic Neuropathy: Morphological

Aspects”, Prog Retin Eye Res, 2000;19:1–40 5. American Academy of Opthalmology, “Clinical Evaluation of the Optic Nerve Head”,

https://www.aao.org/bcscsnippetdetail.aspx?id=ee28fa7a-e1f7-4495-99a4-7828a800fcd2, Access Date: 3 May

2019 6. Naida Jakirlic ,”Optic Nerve Evaluation in Glaucoma‘, California Optometric Association”, 2016

7. Downs, J. C., Roberts, M. D., & BURGOYNE, C. F. (2008). “Mechanical Environment of the Optic Nerve Head

in Glaucoma”. Optometry and Vision Science, 85(6), E425–E435. 8. Susanna Jr R, Medeiros FA, “Ophthalmoscopic aspects of the optic nerve in glaucoma: Normal optic disc”, Rio de

Jenerio: Cultura Médica, 2006, 1–12.

9. Hoffmann EM, Zangwill LM, Crowston JG, Weinreb RN. “Optic disk size and glaucoma”. Surv Ophthalmol.2007;52(1):32–49.doi:10.1016/j.survophthal.2006.10.002.

10. Peter E. Libre, MD, Norwalk, Conn. “Revisiting the Importance of Disc Size, Review of Ophthalmology”, 2004.

11. Spaeth GL, Lopes JF, Junk AK, et al., “Systems for staging the amount of optic nerve damage in glaucoma: A critical review and new material”, Surv Ophthalmol, 2006; 51:293–315.

12. Fingeret M, Medeiros FA, Susanna Jr R, Weinreb RN, “Five rules to evaluate the optic disc and retinal nerve fiber

layer for glaucoma”, Optometry, 2005;76:661–8. 13. Linda Yi-Chieh Poon, David Solá-Del Valle, Angela V. Turalba,

Iryna A. Falkenstein, Michael Horsley, Julie H. Kim, Brian J. Song,

Hana L. Takusagawa, Kaidi Wang, Teresa C. Chen, “The ISNT Rule: How Often Does It Apply to Disc Photos and Retinal Nerve Fiber Layer Measurements in the Normal Population”, Am J Ophthalmol, 2018.

14. W. Ruengkitpinyo ; W. Kongprawechnon ; T. Kondo ; P. Bunnun ; H. Kaneko , “Glaucoma screening using rim

width based on ISNT rule”, IEEE 2015 6th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).

15. Andrew J. Tatham; Robert N. Weinreb; Linda M. Zangwill; Jeffrey M. Liebmann; Christopher A. Girkin; Felipe

A. Medeiros,”The Relationship Between Cup-to-Disc Ratio and Estimated Number of Retinal Ganglion Cells”, Investigative ophthalmology and visual science, 2013.

16. Jonas JB, Gusek GC, Naumann GO, “Optic disc, cup and neuroretinal rim size, configuration and correlations in

normal eyes”, Invest Ophthalmol VisSci, 1988;29:1151–8. 17. Hayreh SS, “Ischemic Optic Neuropathies”, Berlin Heidelberg: Springer-Verlag, 2011.

18. Bourne RR, “The optic nerve head in glaucoma”, Community Eye Health, 2006;19:44–5.

767-770

125.

Authors: Deepti Sharma, Deepshikha Aggarwal, Disha Grover

Paper

Title:

Academic Performance Analysis of Information Technology Students in Higher Education

Institutions

Abstract: This research is conducted to analyse the factors that may affect the academic

performance of students in the MCA (Masters in Computer Application) course in Delhi, India.

MCA is a three year post graduate programme in Computer Application. This work will help to

better understand the factors that commonly affect the performance of students in academics

and also will contribute to the pedagogy development of educational institutes. The seven

factors that have been considered for the analysis are the Faculty, time management, interest of

students, placements, difficulty of course, sources of study and extra efforts by students. The

hypothesis has been developed to establish the relationship between the independent variables

which are the seven factors and the dependent variable which is the academic performance.

The research is conducted on the data collected from the students through questionnaire and we

have chosen to use convenience sampling to conduct this study. The data thus collected is

tested using the multiple linear regression model as multiple factors have been considered. The

result of the analysis indicate that the Faculty, time management, interest of students,

placements, difficulty of course, sources of study and extra efforts by students have a positive

effect on the academic performance of the students. Measuring the academic performance of

the student is a difficult task as it cannot be measured quantitatively. In most of the cases the

student performances are also affected by various environmental, socio-economic and

psychological factors. These factors also need to be considered while assessing the academic

771-776

.

performance of the students. Still the factors incorporated in this study give a considerable

result regarding their influence on the academic performance of the students. The results of the

research can be useful for various academic institutions to formulate the educational pedagogy

that can accommodate the most influential factors for better academic performance of the

students.

Keywords: Data analysis, Regression, Student performance Analysis, Higher education,

Technical education, Data Science

References: 1. S. N. K. Irfan Mushtaq, “Factors Affecting Students’ Academic,” Global Journal of Management and Business

Research, vol. 12, no. 9, June 2012 pp. 16-22

2. N S. Nisha Arora, “Factors Affecting the Academic Performance of College Students,” i-manager’s Journal of Educational Technology, 2017 pp. 47-53.

3. G M. Hiluf Reda, “Investigating the Causes of Students’ Less Academic Performance in Engineering College

of Debre Berhan University,” American Journal of Theoretical and Applied Statistics, vol. 7, no. 3, 2018 pp. 126-131.

4. 4. S. R. N. Syed Tahir Hijazi, “Factors Affecting Students’ Performance,” Bangladesh e-Journal of Sociology,

vol. 3, no. 1, 2006. 5. S. N. K. Irfan Mushtaq, “Factors Affecting Students’ Academic,” Global Journal of Management and Business

Research, vol. 12, no. 9, 2012.

6. S. K. Kochhar, Educational and Vocational Guidance in Secondary Schools, New Delhi: Sterling Publishers Private Limited, 2000.

7. A. AL-Mutairi, Factors affecting business students’ performance in Arab Open University: The case of Kuwait, vol. 6, 2011, pp. 146-155.

8. A H. Ch., “Effect of Guidance Services on Study Attitudes, Study Habits and Academic Achievement of

Secondary School Students,” Bulletin of Education & Research , vol. 28, no. 1, 2006, pp. 35-54. 9. C. M. J. S. P. H. a. H. M. Javed Hussain, “Ethnic minority graduate entrepreneurs in the UK,” vol. 21, no. 6,

2007, pp. 455-463.

10. J. F. K. J. M. M. S. G. R. Eric A. Hanushek, “Does Peer Ability Affect Student Achievement,” Journal of Applied Econometrics, vol. 18 , no. 5, 2003, pp. 527-544.

11. S. D. S.P Rao, “Peer instruction improves performance on quizzes,” Advances in Physiology Education, vol.

24, no. 1, 2000, pp. 51-55.

12. D karemera, “The Effects of academic environment and background characteristics on students' satisfaction and

performance: The Case of South Carolina State University's School of Business,” College Student Journal, vol. 37, no. 2, 2003, pp. 298-311.

126.

Authors: Deepak Dhadwal, Vinay Bhatia, PN Hrisheekesha

Paper

Title:

Method & Implementation of Fault Detection & Prevention Attack in WSN

Abstract: In WSNs, a major problem is the assaults on nodes or more sinks. In any case, this

information rate is obliged by the accessible vitality at every hub just as connection limit. After

sending, some sensor hubs may obstruct the measure of information that land at a sink due to

their low vitality reaping rate. In this work, the fundamental objective is to recognize and

detect black hole attack in WSN. These assaults may decrease the exhibition of framework. In

this work, it gives deficiency dealing with in system and can improve execution. Likewise

stream can improve by utilization of advancement calculation in the system. The proposed

framework improves vitality just as stream of framework. All recreations are done in

simulation tool. The proposed system is executed with MATLAB. The work has increased the

maximum flow of information to 30% with increase in degree of nodes

Keywords: Routing in WSN ,Max Flow,Tabu search,Routing in WSN

References: 1. D. Linden and T. B. Reddy, 2002,Handbook of Batteries. McGraw-Hill Professional: New York.

2. S. Davis, 2004, Basics of Design: Battery Power Management. Supplement to Electronic Design.

3. Y. Cheng, D.P. Agrawal, 2006, “An improved key distribution mechanism for large-scale hierarchical

wireless sensor networks”, Elsevier Ad Hoc Networks, pp.35-48. 4. Wenqing Cheng, Zhiqiang Xiong, Wei Liu, 2006, “Hybrid Solution: A FEC Algorithm for Fault Tolerant

Routing in Sensor Networks”, IEEE International Conference on Communications and Networks, China,

pp.0463-0467. 5. Zhiqiang Xiong, Zongkai Yang, Wei Liu, Zhen Feng, 2006, “A Lightweight FEC Algorithm for Fault Tolerant

Routing in Wireless Sensor Networks”, IEEE International Conference on Wireless Communications,

Networking and Mobile Computing, pp 1-4. 6. S. Ozdemira, Y. Xiao, 2008, “Secure data aggregation in wireless sensor networks: A comprehensive

777-783

.

overview”, Elsevier Computer Networks, pp. 202-2037.

7. L.T Nguyen, X.Defago, R.Beuran, Y.Shinoda, 2008, “An Energy Efficient Routing Scheme for Mobile

Wireless Sensor Networks”, IEEE International Symposium on Wireless Communication Systems, pp. 568-

572. 8. W.H Liao, H-H Wang, 2008, “An asynchronous MAC protocol for wireless sensor networks”, Elsevier

Journal of Network and Computer Applications, pp. 807–820.

9. J. Zhua, K.L Hunga, B. Bensaoua, F.N Abdesselam, 2008, “Rate-lifetime tradeoff for reliable communication in wireless sensor networks”, Elsevier Computer Networks, pp. 25-43.

10. Lan Tien Nguyen, Xavier Defago, 2008, “An Energy Efficient Routing Scheme for Mobile Wireless Sensor

Networks”, IEEE International Symposium on Wireless Communications Systems, pp.568-572. 11. Tsai-Wei Wu and Hung-Yun Hsieh, 2008, “Interworking Wireless Mesh Networks: Performance

Characterization and Perspectives”, IEEE Global Telecommunications Conference, pp.4846-4851.

12. Zhang Lili, Wang Huibin, Xu Lizhong, 2009, “Fault Tolerance and Transmission Delay In Wireless Mesh Networks”, IEEE International Conference on Networks Security, Wireless Communications and Trusted

Computing, pp. 193-196.

13. Chuang Wang, Taiming Feng, Jinsook Kim, 2009, “Catching Packet Droppers and Modifiers in Wireless Sensor Networks”, IEEE Social Conference on Sensors, Mesh and Ad hoc Communication and

Networks,pp.2908-2916.

14. Anna Abbagnale, Emanuele Cipollone, 2009, “A case study for evaluating IEEE 802.15.4 wireless sensor

network formation with mobile sinks”, IEEE International Conference on Communications, pp. 3435-3439.

15. Che-Aron, Z., Al-Khateeb, 2010, “An Enhancement of Fault-Tolerant Routing Protocol for Wireless Sensor

Network”, International Conference on Computer and CommunicatioEngineering (ICCCE), pp.6235-6240. 16. Dario Bruneo and Marco Scarpa, 2010, “Adaptive Swarm Intelligence Routing Algorithms for WSN in a

Changing Environment”, IEEE Sensors Conference, pp.1813-1818.

17. Preetam Ghosh, Michael Mayo, Vijender Chaitankar, 2011, “Principles of Genomic Robustness Inspire Fault-Tolerant WSN Topologies: a Network Science Based Case Study”, Seventh IEEE International Workshop on

Sensor Networks and Systems for Pervasive Computing, pp.160-165.

18. Z Jun, C. Xiang-guang, 2011, “The application of multi-path fault tolerant algorithm in WSN nodes”, IEEE International Conferences on Artificial Intelligence, Management Science & Electronic Commerce, pp. 7323-

7326.

19. L. Karim, N. Nasser, 2012, “Reliable location-aware routing protocol for mobile wireless sensor network”, IET Communication, Vol. 6, Iss. 14, pp. 2149–2158.

20. K.Akkaya, I. F. Senturk, S.Vemulapalli, 2013, “Handling large-scale node failures in mobile sensor/robot

networks”, Elsevier Journal of Network and Computer Applications, pp.195-210.

127

.

Authors: Sanjive Tyagi, Rakesh Kumar Dwivedi, Ashendra Kumar Saxena

Paper

Title:

High Capacity Steganography Protected using Shamir’s threshold scheme and

Permutation Framework

Abstract: This paper presents a framework that conceal large volume of secret information

using distributed file system that permit implantation of decomposed secret images across

multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and

permutation generator framework. Three layers of security is being applied to protect the secret

information, in first, secret image is decomposed into equal size of smaller sub-images and

generate a framework of permutations from an integer for distributing and reassembling the

circulated broken secret sub images among the intended participants. At the time of embedding

purpose of permutation generator is to arrange the sub-images in unknown order for outsider.

During the discloser stage only inverse of permutation can rearrange the distributed sub-images

to reassemble into original image by authorized contributors. In second, Shamir’s threshold

scheme is designed for authentication of shared associated stego-cover images before starting

the extraction process. This process provides an extremely secured construction of shared

secret information. In third, image is divided in 2x2 blocks of pixels and traverses it in zig-zag

manner; the pixel value difference is computed for all Red, Green, and Blue (RGB)

components between non-overlapping pixels of selected diagonal path with in targeted block.

Secret bits are concealed inside RGB color pixels of cover image by utilizing proposed novel

pixel-value differencing (PVD) scheme, furthermore varying embedding capacity may be

obtained by controlling the selection of number of 2x2 block. Exploratory result displays that

the proposed approach provides productive algorithms in term multilayer unbreakable security

and higher payload of embedded information.

Keywords: Secret sharing, Distributed steganography, Pixel value differencing,

Cryptography.

784-795

References: 1. S. Tyagi, R. K. Dwivedi, and A. K. Saxena, "A Novel PDF Steganography Optimized Using Segmentation

Technique," International Journal of Information Technology, https://doi.org/10.1007/s41870-019-00309-7,

Springer, 2019, pp 1-9. 2. D.-C. Wu and W.-H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern

Recognition Letters, vol. 24(9-10),2003, pp. 1613–1626.

3. C.-C. Chang and R.-J. Hwang, “A New Scheme to Protect Confidential Images,” Journal of Interconnection Networks, Vol. 5, no. 3, 2004, pp. 221-232.

4. C. H. Yang and C. Y. Weng, “A steganographic method for digital images by multi-pixel differencing,” in

Proceedings of International Computer Symposium Taipei, Taiwan, 2006, pp. 831–836,. 5. K.-H. Jung, K.-J. Ha, and K.-Y. Yoo, “Image data hiding method based on multi-pixel differencing and LSB

substitution methods,” in Proceedings of International Conference on Convergence and Hybrid Information

Technology (ICHIT 08), 2008, pp. 355–358. 6. J.-C. Liu and M.-H. Shih, “Generalizations of pixel-value differencing steganography for data hiding in images,”

Fundament- Informaticae, vol. 83, no. 3, 2008, pp. 319–335.

7. X. Liao, Q.-Y. Wen, and J. Zhang, “A Steganographic Method for Digital Images with Four-Pixel Differencing and Modified LSB Substitution,” Journal of Visual Communication and Image Representation, vol. 22, no. 1,

2011, pp. 1–8.

8. C.-H. Yang, C.-Y. Weng, H.-K. Tso, and S.-J. Wang, “A Data Hiding Scheme using the Varieties of Pixel-Value Differencing in Multimedia Images,” Journal of Systems and Software, vol. 84, no. 4, 2011, pp. 669–678.

9. K.-C. Chang, P.S. Huang, T.-M. Tu, and C.-P. Chang “Adaptive Image Steganographic Scheme Based on Tri-

Way Pixel-Value Differencing,” in Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC 07), 2007, pp. 1165–1170.

10. X. Liao, Q.Y. Wen, S. Shi, “Distributed Steganography,” in Proceedings of Seventh International Conference on

Intelligent Information Hiding and Multimedia Signal Processing, 2011, pp. 153-156. 11. Fendi, A. Wibisurya, and Faisal, “Distributed Steganography using Five Pixel Pair Differencing and Modulus

Function,” in Proceedings of International Conference on Computer Science and Computational Intelligence,

ICCSCI, Bali, Indonesia,116 (2017), 2017, pp. 334–341. 12. A.K. Gulve, M.S. Joshi, “An Image Steganography Algorithm with Five Pixel Pair Differencing and Gray Code

Conversion,” International Journal of Image, Graphics and Signal Processing, Vol. 6(3), 2014, pp. 12-20.

13. C.-C. Thien, J.-C. Lin, “Secret Image Sharing,” Computers & Graphics, Vol. (26), 2002, pp. 765-770,. 14. R. Koikara, D.J. Deka, M. Gogoi, and R. Das, “A Novel Distributed Image Steganography Method Based on

Block-DCT,” Advanced Computer and Communication Engineering Technology, Springer, 2015 pp. 423-435.

15. S. Hemalatha, U. D. Acharya, A. Renuka, and P.R. Kamath, “A Secure Image Steganography Technique to Hide Multiple Secret Images”, in Proceedings of the Fourth International Conference on Networks and

Communications, NetCom, Vol. 131, Springer, 2012, pp. 613-620, .

16. S. Tyagi, A. K. Saxena, and S. Garg, “Secured High Capacity Steganography using Distribution Technique with Validity and Reliability”, in Proceedings of International Conference on System Modeling & Advancement in

Research Trends, Moradabad, India, 2016, pp.109 –114.

17. V. Kumar, A. Bansal, and S. K. Muttoo, “Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution”, International Journal of Information Security and Privacy, (IGI Global), Vol.

8(2), 2014, pp. 55-68.

18. A. Bansal, S. K. Muttoo, and V. Kumar, “Data Hiding Approach Based on Eight-Queens Problem and Pixel Mapping Method”, International Journal of Signal Processing, Image Processing and Pattern Recognition,

Vol.7(5), 2014, pp.47-58.

19. M. Deshmukh, N. Nain, and M. Ahmed, "A Novel Approach for Sharing Multiple Color Images by Employing Chinese Remainder Theorem", Journal of Visual Communication and Image Representation, Vol. 49, 2017, pp.

291-302.

20. K. Joshi , S. Gill, and R. K. Yadav, “A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image”, Journal of Computer Networks and

Communications, Hindawi, 2018, pp. 10. 21. A. Bakshi, A. K. Patel, “Secure Telemedicine using RONI Half Toned Visual Cryptography without Pixel

Expansion”, Journal of Information Security and Applications, 46 (2019), pp. 281–295.

22. A. Kanso, M. Ghebleh, An efficient lossless secret sharing scheme for medical images,” Journal of Visual

Communication and Image Representation, Elsevier, Vol. 56, 2018, pp. 245-255.

23. X. Wua, C.-N. Yang, “A Combination of Color-Black-and-White Visual Cryptography and Polynomial Based

Secret Image Sharing,” Journal of Visual Communication and Image Representation, Elsevier, Vol. 61, 2019, pp.74-84.

24. A. A. Al-Sadi, E.S.M. El-Alfy , “An Adaptive Steganographic Method for Color Images Based on LSB

Substitution and Pixel Value Differencing,” in Proceedings of (ACC 2011) Communications in Computer and Information Science, Vol . (191), Springer.

25. https://en.wikipedia.org/wiki/Permutation

26. S. Tyagi, R. K. Dwivedi, and A. K. Saxena, "A High Capacity PDF Text Steganography Technique Based on Hashing Using Quadratic Probing", International Journal of Intelligent Engineering and Systems , Vol.12, No.3,

2019, pp. 192-202.

128.

.

Authors: Dr. Dakka.Obulesu, Dr. Arunkumar G., Dr. B.P. Mishra, Spoorthi J, Dr. T.CManjunath

Paper

Title:

Recent advances in the design & development of a drone used for bio-medical engineering

applications : Medi-Sky

Abstract: The primary target or the motivation behind this paper is to build up a model of the

automaton rescue vehicle to help the ambulances in sparing human lives by sending the drugs to

the working environment where the influenced patients are available. A huge number of

individuals bite the dust in light of rescue vehicle delays. The time taken by emergency vehicle

to achieve a patient depends a great deal on the course and the traffic on the way. At the point

when a medicinal crisis happens, the reaction time can have a significant effect between a real

existence spared and an actual existence lost. Shockingly, ambulances can stall out in rush hour

gridlock and arrive of late after the crisis call has been made, in which an unfortunate casualty

may have endured a great deal of wounds and can even lose his/her life. The utilization of

Unmanned Aerial Vehicles (UAV) or "Automatons" has been utilized for quite a while for a

wide range of uses. The motivation behind this paper is to build up a model of automaton

emergency vehicle to help the ambulances in sparing human lives. The emergency vehicle

automaton enters the scene at the moment time and constant directions are given by the

administrator. The automaton can gauge different constant wellbeing parameters of the patient,

for example, temperature, pulse and heartbeat. The estimations of these basic parameters are then

transmitted to the specialists present in a rescue vehicle. Well, the idea is to implement the same

in the rural areas where penetration of healthcare is poor. The system is being designed to look

after the infants and aged people in the fast-moving urban lives. The work developed in this

paper along with the results shown depicts the effectivity of the methodology proposed.

Keywords: Drone, Application, Medicine, Hardware, Software, Arduino, UAV.

References:

1. Vangara Vamsi Krishna, Shivang Shastri, Shubhra Kulshrestha, Mrs. A. Mariajossy, “Design of Drone Ambulance”,

International Journal of Pure and Applied Mathematics, Volume 119 No. 15 2018, 1813-1818, ISSN: 1314-3395 (on-

line version), url: http://www.acadpubl.eu/hub/ Special Issue. 2. Josefin Lennartsson, “Strategic Placement of Ambulance Drones for Delivering Defibrillators to out of Hospital

Cardiac Arrest Victims”, KTH, School of Architecture and the Built Environment (ABE), Urban Planning and

Environment, Geoinformatic, 2015. 3. Josephin Arockia Dhivya, Dr. J. Premkumar, “Quadcopter based technology for an emergency healthcare,” 2017 3rd

International Conference on Biosignals, images and instrumentation (ICBSII), 16-18 March 2017.

4. Tan Han Rong, Ronald, “Collaborative UAV study ,” National University of Singapore, 2009. 5. Farin, N. Sharif, S. and Mobin, I, “An Intelligent Sensor Based System for Real Time Heart Rate Monitoring”,

(HRM), Intelligent Control and Automation, 7, 55-62,May 2016.

6. www.radio-electronics.com 7. www.ni.com

8. www.wikipedia.org

9. Trio Adiono; Renitia Murti Rahayu, “Zigbee baseband hardware modeling for Internet of Things IEEE 802.15.4 compliance”, 6th International Conference on Electrical Engineering and Informatics (ICEEI), 2017.

10. http://pharpoint.com/wp-content/uploads/2013/06/Ambulance-Drones.pdf

11. https://scholarspace.manoa.hawaii.edu/bitstream/10125/41557/paper0408.pdf 12. https://acadpubl.eu/hub/2018-119-15/4/794.pdf

13. http://www.goelectromech.in/doc/Ambulance%20Drone%20Support%20System%20(ADSS).pdf

796-800

Authors: Satvik M. Kusagur, Dr. Arun Kumar G., Spoorthi Jainar, Dr. T.C.Manjunath, Pavithra

G.

Paper

Title:

4-point minimal pick & place trajectory design in robotics

Abstract: Motion planning in robotics plays a very important role in the movement of objects

from the source to the destination. Robots are classified according to motion control as PNP,

PTP and CP robots. Hence, there are 3 basic types of trajectory motions + 1 trajectory which is

the shortest path between two points in the 3D space. This type of motion or trajectory is

exhibited by PNP robots. In this paper, we develop the theoretical background along with the

mathematical formulation relating to the design & development of a 4-point minimal pick &

place trajectory from the source to the destination during the transportation of an object in the 3

129.

.

dimensional Euclidean space R3.

Keywords: Robot, Motion planning, Trajectory, Source, Destination, 4-Point, Pick, Lift-off,

Set-down, Place, Obstacle.

References: 1. Craig J, “Introduction to Robotics : Mechanics”, Dynamics & Control, Addison Wessely, USA, 1986. 2. Robert J.S., “Fundamentals of Robotics - Analysis and Control”, PHI, New Delhi.

3. Klafter, Thomas and Negin, “Robotic Engineering”, PHI, New Delhi.

4. Fu, Gonzalez and Lee, “Robotics: Control, Sensing, Vision and Intelligence”, McGraw Hill, Singapore. 5. Groover, Weiss, Nagel and Odrey, “Industrial Robotics”, McGraw Hill.

6. Ranky P.G., C.Y. Ho, “Robot Modeling, Control & Applications”, IFS Publishers, Springer, UK.

7. Crane, Joseph Duffy, “Kinematic Analysis of Robotic Manipulators”, Cambridge Press, UK. 8. Manjunath, T.C., “Fundamentals of Robotics”, Fifth edn., Nandu Publishers, Mumbai, India, 2007.

9. Ranky P G and C Y Ho, Robot Modeling, control and applications, IFS publishers, Springer, UK.

10. Asada, H., and J.E. Slotine, Robot Dynamics & Control, Wiley, NY. 11. Phillip Coiffette, Robotics Series (Vol. I to VIII ), Kogan Page, London.

12. Mohsen Shahinpoor, “Robotic Engineering Text Book”, Harper & Row Publishers.

13. Janakiraman, “Robotics and Image Processing”, Tata McGraw Hill . 14. Richard A Paul, “Robotic Manipulators”, MIT press, Cambridge.

15. Fairhunt, “Computer Vision for Robotic Systems”, CFS Pubs., New Delhi.

16. Yoram Koren, “Robotics for Engineer”, McGraw Hill. 17. Bernard Hodges, “Industrial Robotics”, Jaico Publishing House, India.

18. Tsuneo Yoshikawa, “Foundations of Robotics : Analysis and Control”, PHI, India.

19. Dr. Jain and Dr. Aggarwal, “Robotics : Principles & Practice”, Khanna Publishers, Delhi. 20. Lorenzo and Siciliano, “Modeling and Control of Robotic Manipulators”, McGraw Hill.

21. Dr. Amitabha Bhattacharya, “Mechanotronics of Robotics Systems”, Kaizen Publishing, Calculatta, India.

22. S.R. Deb, “Industrial Robotics”, Tata MacGraw Hill.. 23. Edward Kafrissen and Mark Stephans, “Industrial Robots and Robotics”, Prentice Hall Inc. , Virginia, USA.

24. Rex Miller, “Fundamentals of Industrial Robots and Robotics”, PWS Kent Pub Co., Boston, USA.

25. William Burns and Janet Evans, (2000), Practical Robotics - Systems, Interfacing, Applications, Reston Publishing Co.

26. http://www.wikipedia.org

27. Michael Dipperstein, Run Length Encoding (RLE) Discussion and Implementation. 28. Flusser, J.; Suk, T.; Saic, S., Recognition of blurred images by the method of moments, Image Processing, IEEE

Transactions.

29. Bob Bailey, Moments in Image Processing, Nov. 2002. 30. Phillip Coiffette, (1995), Robotics Series, Volume I to VIII, Kogan Page, London, UK.

31. Yoshikawa T., (1984), “Analysis and Control of Robot Manipulators with Redundancy”, Proc. First Int. Symp.

on Robotics Research, Cambridge, MIT Press, pp. 735-748. 32. Whitney DE., (1972), “The Mathematics of Coordinated Control of Prosthetic Arms and Manipulators”,

Trans. ASM J. Dynamic Systems, Measurements and Control, Vol. 122, pp. 303-309.

33. Lovass Nagy V, R.J. Schilling, (1987), “Control of Kinematically Redundant Robots Using {1}-inverses”, IEEE Trans. Syst. Man, Cybernetics, Vol. SMC-17 (No. 4), pp. 644-649.

34. Lovass Nagy V., R J Miller and D L Powers, (1978), “An Introduction to the Application of the Simplest Matrix-

Generalized Inverse in Systems Science”, IEEE Trans. Circuits and Systems, Vol. CAS-25 (No. 9), pp. 776. 35. Dr. Manjunath, “Modelling & Control of Smart Structures”, Ph.D. Thesis, IIT Bombay, 2007.

36. Dr. Arunkumar, Ph.D. Thesis, 2016.

801-806

Authors: Simran Uppal, Harpreet Kaur, Parul Sharma

Paper

Title:

High capacity reversible data hiding technique framed for experimentation with PSO

Abstract: In this paper we have studied the reversible data hiding techniques. We have seen

previous techniques and also carefully analyzed the high capacity reversible data hiding

method in MSB. We have proposed a model with particle swarm optimization which will work

in future with HCRDH to ensure improvement in several parameters like precision and PSNR.

We want to contribute towards a proposed method before actual experimentation and results

are worked for.

Keywords: High Capacity Reversible data hiding, Most Significant Bit, Reversible data

hiding.

References:

130

.

1. Trappe, W., 2006. Introduction to cryptography with coding theory. Pearson Education India.

2. Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R.L., Shokrollahi, J., Neven, G. and Barni, M., 2007.

Protection and retrieval of encrypted multimedia content: When cryptography meets signal

processing. EURASIP Journal on Information Security, 2007, p.17. 3. Puech, W., Chaumont, M. and Strauss, O., 2008. A reversible data hiding method for encrypted images,

Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. In Proc. SPIE (Vol. 6819).

4. Cao, X., Du, L., Wei, X., Meng, D. and Guo, X., 2015. High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE transactions on cybernetics, 46(5), pp.1132-1143.

5. Wu, X. and Sun, W., 2014. High-capacity reversible data hiding in encrypted images by prediction error. Signal

Processing, 104, pp.387-400. 6. Rad, R.M., Wong, K. and Guo, J.M., 2014. A unified data embedding and scrambling method. IEEE

Transactions on Image Processing, 23(4), pp.1463-1475.

7. Xu, D., Wang, R. and Shi, Y.Q., 2014. Data hiding in encrypted H. 264/AVC video streams by codeword substitution. IEEE transactions on information forensics and security, 9(4), pp.596-606.

8. Dragoi, I.C. and Coltuc, D., 2014. Local-prediction-based difference expansion reversible watermarking. IEEE

Transactions on image processing, 23(4), pp.1779-1790. 9. Hong, W., Chen, T.S. and Wu, H.Y., 2012. An improved reversible data hiding in encrypted images using side

match. IEEE Signal Processing Letters, 19(4), pp.199-202.

10. Qian, Z., Zhang, X. and Wang, S., 2014. Reversible data hiding in encrypted JPEG bitstream. IEEE

transactions on multimedia, 16(5), pp.1486-1491.

11. Sachnev, V., Kim, H.J., Nam, J., Suresh, S. and Shi, Y.Q., 2009. Reversible watermarking algorithm using

sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), pp.989-999. 12. Lin, S.J. and Chung, W.H., 2012. The scalar scheme for reversible information-embedding in gray-scale

signals: Capacity evaluation and code constructions. IEEE Transactions on Information Forensics and

Security, 7(4), pp.1155-1167. 13. Kennedy, J., 2010. Particle swarm optimization. Encyclopedia of machine learning, pp.760-766.

14. Tai, W.L., Yeh, C.M. and Chang, C.C., 2009. Reversible data hiding based on histogram modification of pixel

differences. IEEE transactions on circuits and systems for video technology, 19(6), pp.906-910. 15. Tian, J., 2002, December. Reversible watermarking by difference expansion. In Proceedings of workshop on

multimedia and security (Vol. 19).

16. Tian, J., 2003. Reversible data embedding using a difference expansion. IEEE transactions on circuits and systems for video technology, 13(8), pp.890-896.

17. Trappe, W., 2006. Introduction to cryptography with coding theory. Pearson Education India.

18. Van Droogenbroeck, M. and Benedett, R., 2002. Techniques for a selective encryption of uncompressed and compressed images. ACIVS advanced concepts for intelligent vision systems, proceedings, pp.90-97.

19. Cao, X., Du, L., Wei, X., Meng, D. and Guo, X., 2015. High capacity reversible data hiding in encrypted

images by patch-level sparse representation. IEEE transactions on cybernetics, 46(5), pp.1132-1143.

20. Xu, D. and Wang, R., 2016. Separable and error-free reversible data hiding in encrypted images. Signal

Processing, 123, pp.9-21.

21. Zhang, W., Ma, K. and Yu, N., 2014. Reversibility improved data hiding in encrypted images. Signal Processing, 94, pp.118-127.

22. Zhang, X., 2011. Reversible data hiding in encrypted image. IEEE signal processing letters, 18(4), pp.255-258.

23. Xu, D., Wang, R. and Shi, Y.Q., 2014. Data hiding in encrypted H. 264/AVC video streams by codeword substitution. IEEE transactions on information forensics and security, 9(4), pp.596-606.

24. Xiang, S. and Luo, X., 2017. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext

group. IEEE Transactions on Circuits and Systems for Video Technology, 28(11), pp.3099-3110. 25. Zhou, J., Sun, W., Dong, L., Liu, X., Au, O.C. and Tang, Y.Y., 2015. Secure reversible image data hiding over

encrypted domain via key modulation. IEEE transactions on circuits and systems for video technology, 26(3),

pp.441-452. 26. Li, X., Zhang, W., Gui, X. and Yang, B., 2015. Efficient reversible data hiding based on multiple histograms

modification. IEEE Transactions on Information Forensics and Security, 10(9), pp.2016-2027. 27. Ou, B., Li, X. and Wang, J., 2016. High-fidelity reversible data hiding based on pixel-value-ordering and

pairwise prediction-error expansion. Journal of Visual Communication and Image Representation, 39, pp.12-

23. 28. Ou, B. and Zhao, Y., 2019. High capacity reversible data hiding based on multiple histograms modification.

IEEE Transactions on Circuits and Systems for Video Technology.

29. Wu, H.T., Mai, W., Meng, S., Cheung, Y.M. and Tang, S., 2019. Reversible Data Hiding with Image Contrast Enhancement Based on Two-dimensional Histogram Modification. IEEE Access.

807-812

Authors: Vikas Kashtriya, Amit Doegar, Varun Gupta, Poonam Kashtriya

Paper

Title:

Identifying Malaria Infection in Red Blood Cells using Optimized Step-Increase

Convolutional Neural Network Model

131

.

.

Abstract: A vast number of image processing and neural network approaches are currently

being utilized in the analysis of various medical conditions. Malaria is a disease which can be

diagnosed by examining blood smears. But when it is examined manually by the microscopist,

the accuracy of diagnosis can be error-prone because it depends upon the quality of the smear

and the expertise of microscopist in examining the smears. Among the various machine

learning techniques, convolutional neural networks (CNN) promise relatively higher accuracy.

We propose an Optimized Step-Increase CNN (OSICNN) model to classify red blood cell

images taken from thin blood smear samples into infected and non-infected with the malaria

parasite. The proposed OSICNN model consists of four convolutional layers and is showing

comparable results when compared with other state of the art models. The accuracy of

identifying parasite in RBC has been found to be 98.3% with the proposed model.

Keywords: CNN, Deep Learning, Malaria, Machine Learning, Medical Diagnosis, Neural

Networks, Image Classification.

References: 1. Z. May, S. S. A. M. Aziz, and R. Salamat, “Automated quantification and classification of malaria parasites in

thin blood smears,” 2013 IEEE International Conference on Signal and Image Processing Applications, 2013.

2. World Health Organization World Malaria Report – 2018. https://www.who.int/malaria/publications/world-malaria-report-2018/en/ Accessed May 2019.

3. S. Chavan and M. Nagmode, “Malaria Disease Identification and Analysis Using Image Processing,” IJLTET, 2014.

4. M. Poostchi, K. Silamut, R. J. Maude, S. Jaeger, and G. R. Thoma, “Image analysis and machine learning for detecting malaria,” Transl. Res., vol. 194, 2018, pp. 36–55.

5. Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, 2015, pp. 436–444.

6. D. K. Das, A. K. Maiti, and C. Chakraborty, “Automated system for characterization and classification of

malaria‐infected stages using light microscopic images of thin blood smears,” J. Microsc., vol. 257, no. 3, 2015,

pp. 238–252.

7. J. E. Arco, J. M. Górriz, J. Ramírez, I. Álvarez, and C. G. Puntonet, “Digital image analysis for automatic enumeration of malaria parasites using morphological operations,” Expert Syst. Appl., vol. 42, no. 6, 2015, pp. 3041–3047.

8. G. Díaz, F. A. González, and E. Romero, “A semi-automatic method for quantification and classification of

erythrocytes infected with malaria parasites in microscopic images,” J. Biomed. Inform., vol. 42, no. 2, 2009, pp.

296–307.

9. J. Soni, N. Mishra, and C. Kamargaonkar, “Automatic difference between RBC and malaria parasites based on morphology with first order features using image processing,” IJAET, vol. 1, no. 5, 2011, pp. 290–297.

10. S. S. Savkare and S. P. Narote, “Automated system for malaria parasite identification,” in 2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015, pp. 1–4.

11. F. B. Tek, A. G. Dempster, and İ. Kale, “Parasite detection and identification for automated thin blood film malaria diagnosis,” Comput. Vis. Image Underst., vol. 114, no. 1, 2010, pp. 21–32.

12. Pallavi T. Suradkar, “detection of malarial parasite in blood using image processing,” Int J Eng Inn Technol (IJEIT) 2(10):124–126, 2013.

13. N. Abbas and D. Mohamad, “Microscopic rgb color images enhancement for blood cells segmentation in ycbcr color space for k-means clustering,” J. Theor. Appl. Inf. Technol., vol. 55, no. 1, 2013, pp. 117–125.

14. N. A. Khan, H. Pervaz, A. K. Latif, A. Musharraf, and Saniya, “Unsupervised identification of malaria parasites

using computer vision,” in Computer Science and Software Engineering (JCSSE), 2014 11th International Joint Conference on, 2014, pp. 263–267.

15. M. Chayadevi, G. Raju, “Usage of art for automatic malaria parasite identification based on fractal features,”. Int J Video Image Proc Netw Sec 14(4), 2014, pp 7–15.

16. L. B. Damahe, R. K. Krishna, N. J. Janwe, and V. T. Nileshsingh, “Segmentation Based Approach to Detect Parasites and RBCs in Blood Cell Images,” Int J Comput Sci Appl 4(2), 2011, pp 71–81.

17. L. Malihi, K. Ansari-Asl, and A. Behbahani, “Malaria parasite detection in giemsa-stained blood cell images,” in 2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP), 2013 , pp. 360–365.

18. N. A. Seman, N. A. M. Isa, L. C. Li, Z. Mohamed, U. K. Ngah, and K. Z. Zamli, “Classification Of Malaria

Parasite Species Based On Thin Blood Smears Using Multilayer Perceptron Network,” Int. J. Comput. Internet Manag., vol. 16, no. 1, 2008, pp. 46–52.

19. V. Špringl, “Automatic malaria diagnosis through microscopy imaging,” Fac. Electr. Eng., vol. 128, 2009.

20. S. T. Khot and R. K. Prasad, “Optimal Computer Based Analysis for Detecting Malarial Parasites,” FICTA (1), 2015, pp. 69–80.

21. D. Anggraini, A. S. Nugroho, C. Pratama, I. E. Rozi, V. Pragesjvara, and M. Gunawan, “Automated status identification of microscopic images obtained from malaria thin blood smears using bayes decision: A study case

in plasmodium falciparum,” in 2011 International Conference on Advanced Computer Science and Information

813-818

Systems, 2011, pp. 347–352.

22. S. Mandal, A. Kumar, J. Chatterjee, M. Manjunatha, and A. K. Ray, “Segmentation of blood smear images using

normalized cuts for detection of malarial parasites,” in 2010 Annual IEEE India Conference (INDICON), 2010, pp. 1–4.

23. L. Yunda, A. A. Ramirez, and J. Millán, “Automated image analysis method for p-vivax malaria parasite detection in thick film blood images,” Sist. y Telemática Vol. 10 No. 20, vol. 10, no. 20, 2012, pp. 9–25.

24. M.T. Le, T. R. Bretschneider, C. Kuss, and P. R. Preiser, “A novel semi-automatic image processing approach to

determine Plasmodium falciparum parasitemia in Giemsa-stained thin blood smears.,” BMC Cell Biol., vol. 9, no. 1, 2008, p. 15.

25. D. M. Memeu, “A Rapid Malaria Diagnostic Method Based On Automatic Detection And Classification Of Plasmodium Parasites In Stained Thin Blood Smear Images,” 2014.

26. K. Prasad, J. Winter, U. M. Bhat, R. V Acharya, and G. K. Prabhu, “Image analysis approach for development of

a decision support system for detection of malaria parasites in thin blood smear images,” J. Digit. Imaging, vol. 25, no. 4, 2012, pp. 542–549.

27. S. K. Kumarasamy, S. H. Ong, and K. S. W. Tan, “Robust contour reconstruction of red blood cells and parasites

in the automated identification of the stages of malarial infection,” Mach. Vis. Appl., vol. 22, no. 3, 2011, pp. 461–469.

28. D. S. Kermany et al., “Identifying medical diagnoses and treatable diseases by image-based deep learning,” Cell, vol. 172, no. 5, 2018, pp. 1122–1131.

29. Y.D. Zhang, C. Pan, X. Chen, and F. Wang, “Abnormal breast identification by nine-layer convolutional neural

network with parametric rectified linear unit and rank-based stochastic pooling,” J. Comput. Sci., vol. 27, 2018, pp. 57–68.

30. S. Rajaraman et al., “Pre-trained convolutional neural networks as feature extractors toward improved malaria parasite detection in thin blood smear images,” PeerJ, vol. 6, , 2018, p. e 4568.

31. B. Xu, N. Wang, T. Chen, and M. Li, “Empirical Evaluation of Rectified Activations in Convolutional Network,” Journal of Machine Learning Research, 15(1), 1929–1958. 2015.

32. J. Bergstra and Y. Bengio, “Random search for hyper-parameter optimization,” J. Mach. Learn. Res., vol. 13, no. Feb. 2012, pp. 281–305.

33. D. P. Kingma and J. L. Ba, “Adam: A Method for Stochastic Optimization,” Int. Conf. Learn. Represent., 2015.

34. G. P. Gopakumar, M. Swetha, G. S. Siva, and G. R. K. S. Subrahmanyam, “Convolutional Neural Network-based malaria Diagnosis from Focus Stack of Blood Smear Images Acquired Using Custom-built Slide Scanner,” J. Biophotonics, vol. 11, no. 3, 2018.

35. D. Bibin, M. S. Nair, and P. Punitha, “Malaria Parasite Detection From Peripheral Blood Smear Images Using

Deep Belief Networks,” IEEE Access, vol. 5, 2017, pp. 9099–9108.

36. Z. Liang et al., “CNN-based image analysis for malaria diagnosis,” in 2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2016, pp. 493–496.

37. N. E. Ross, C. J. Pritchard, D. M. Rubin, and A. G. Dusé, “Automated image processing method for the diagnosis and classification of malaria on thin blood smears.,” Med. Biol. Eng. Comput., vol. 44, no. 5, 2006, pp. 427–436.

38. A. Vijayalakshmi and B. Rajesh Kanna, “Deep learning approach to detect malaria from microscopic images,” Multimed. Tools Appl., 2019.

Authors: Sandeep Kaur, Alka Jindal

Paper

Title:

Fragile water-marking based image authentication scheme using LSBs

Abstract: This paper proposed a Quick response code (QR code) based strategy to provide

authentication to our digital images. Quick response code is used to provide protection to

digital images because of its important characteristics like detection from direction and large

data encoding capacity. First of all, Least Significant Bit (LSB) approach is applied on the

original image to select LSBs from each block of the image. Next, LSB image is partitioned

into sized blocks and mean is calculated for each block of the cell. Then Singular Value

Decomposition function is performed on this cell to get singular values which are used as

authentication data. After that QR Code generator is used to generate QR code matrix from

these singular values. And finally this code is inserted into MSBs to get an authenticated

image. Experimental result shows that proposed method produces images with good quality.

Keywords: Image authentication, Least Significant bit, QR code, Singular Value

Decomposition.

References:

819-824

132.

.

1 Ansari, I. A., Pant, M., & Ahn, C. W. (2016). SVD based fragile watermarking schem e for tamper

localization and self-recovery. International Journal of Machine Learning and Cybernetics, 7(6), 1225–1239.

https://doi.org/10.1007/s13042-015-0455-1 2 Dadkhah, S., Abd Manaf, A., Hori, Y., Ella Hassanien, A., & Sadeghi, S. (2014). An effective SVD-based

image tampering detection and self-recovery using active watermarking. Signal Processing: Image

Communication, 29(10), 1197–1210. https://doi.org/10.1016/j.image.2014.09.001 3 Liu, X. L., Lin, C. C., & Yuan, S. M. (2018). Blind Dual Watermarking for Color Images’ Authentication and

Copyright Protection. IEEE Transactions on Circuits and Systems for Video Technology, 28(5), 1047–1055.

https://doi.org/10.1109/TCSVT.2016.2633878 4 Ozyurt, F., Tuncer, T., & Avci, E. (2018). A novel probabilistic image authentication method based on

universal hash function for RGB images. 2018 International Conference on Computing Sciences and

Engineering, ICCSE 2018 - Proceedings, 1–6. https://doi.org/10.1109/ICCSE1.2018.8373994 5 Qasim, A. F., Meziane, F., & Aspin, R. (2018). Digital watermarking: Applicability for developing trust in

medical imaging workflows state of the art review. Computer Science Review, 27, 45–60.

https://doi.org/10.1016/j.cosrev.2017.11.003 6 Singh, H., & Kaur, L. (2014). Fractional M-band dual tree complex wavelet transform for digital

watermarking, 39(April), 345–361.

7 Sreenivas, K., & Kamkshi Prasad, V. (2018). Fragile watermarking schemes for image authentication: a

survey. International Journal of Machine Learning and Cybernetics, 9(7), 1193–1218.

https://doi.org/10.1007/s13042-017-0641-4

8 Wu, W. C. (2015). Subsampling-based image tamper detection and recovery using quick response code. International Journal of Security and Its Applications, 9(7), 201–216.

https://doi.org/10.14257/ijsia.2015.9.7.18

9 Wu, W. C., Chan, C. S., Lin, C. Y., & Lin, Z. W. (2016). Joint SVD and QR codes for image authentication. 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA

ASC 2015, (December), 1137–1140. https://doi.org/10.1109/APSIPA.2015.7415448

10 Wu, W., & Lin, Z. (2016). SVD-Based Self-Embedding Image Authentication Scheme Using Quick Response Code Features. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION,

(February). https://doi.org/10.1016/j.jvcir.2016.02.005

11 Zhang, J., Zhang, Q., & Lv, H. (2013). Optik A novel image tamper localization and recovery algorithm based on watermarking technology. Optik - International Journal for Light and Electron Optics, 124(23), 6367–

6371. https://doi.org/10.1016/j.ijleo.2013.05.040

12 Zhuvikin, A. (2017). Selective Image Authentication Using Shearlet Coefficients Tolerant to JPEG Compression. Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 11, 681–688. https://doi.org/10.15439/2017f177

133.

Authors: Gulshan Sharma, Rakesh Kumar

Paper

Title:

Classifying White Blood Cells in Blood Smear Images using a Convolutional Neural

Network

Abstract: We have tried to automate the classification task of white blood cells by using a

Convolutional Neural Network. We have divided white blood cell classification in two types of

problems, a binary class problem and a 4-classification problem. In binary class problem we

classify white blood cell as either mononuclear or Grenrecules. In 4-classification problem

where cells are classified into their subtypes (monocytes, lymphocytes, neutrophils, basophils

and eosinophils). In our experiment we were able to achieve validation accuracy of 100% in

binary classification and 98.40 in multiple classification.

Keywords: Convolutional Neural Network, Deep Learning, Medical Diagnosis, White Blood

Cell Classification.

References: 1. S. H. Rezatofighi, H. Soltanian-Zadeh, “Automatic Recognition of Five Types of White Blood Cells in Peripheral

Blood,”Computerized Medical Imaging and Graphics, vol. 35, no. 4, 2011, pp. 333-343.

2. G. Liang, H. Hong, W. Xie and L. Zheng, "Combining Convolutional Neural Network With Recursive Neural Network for Blood Cell Image Classification," in IEEE Access, vol. 6, 2018, pp. 36188-36197.

3. D.-C. Huang and K.-D. Hung, "Leukocyte Nucleus Segmentation and Recognition in Color Blood-Smear Images,"

in IEEE International Instrumentation and Measurement Technology, 2012. 4. Putta madegowda and Prasanna kumar, "White Blood cell segmentation using Fuzzy C means and snake," in 2016

International Conference on Computation System and Information Technology for Sustainable Solutions

(CSITSS), 2016. 5. R. Ahasan, A. U. Ratul and A. S. M. Bakibillah, "White Blood Cells Nucleus Segmentation from Microscopic

Images of strained peripheral blood film during Leukemia and Normal Condition," in 5th International Conference

825-828

.

on Informatics, Electronics and Vision (ICIEV), 2016.

6. Z. K. K. Alreza and A. Karimian, "Design a new algorithm to count white blood cells for classification Leukemic

Blood Image using machine vision system," in International Conference on Computer and Knowledge

Engineering (ICCKE 2016), 2016. 7. S. Manik, L.M. Saini, N. Vadera, Counting and classification of white blood cell using Artificial Neural Network

(ANN), in IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems

(ICPEICES), IEEE (2016). 8. G. Ongun, et al., An automated differential blood count system. Engineering in Medicine and Biology Society,

in2001 Proceedings of the 23rd Annual International Conference of the IEEE,vol. 3. IEEE (2001).

9. W. Tai, R. Hu, H. C. W. Hsiao, R. Chen and J. J. P. Tsai, "Blood Cell Image Classification Based on Hierarchical SVM," 2011 IEEE International Symposium on Multimedia, Dana Point CA, 2011, pp. 129-136.

10. LeCun, Yann & Bengio, Y & Hinton, Geoffrey. (2015). “Deep Learning,” Nature. 521, 2015. pp. 436-44.

11. Mehdi Habibzadeh, Mahboobeh Jannesari, Zahra Rezaei, Hossein Baharvand, Mehdi Totonchi, "Automatic white blood cell classification using pre-trained deep learning models: ResNet and Inception," Proc. SPIE 10696, Tenth

International Conference on Machine Vision (ICMV 2017)

12. H. Chang, “Skin cancer reorganization and classification with deep neural network,” arXiv preprint arXiv:1703.00534 (2017).

13. Y. Liu, K. Gadepalli, M. Norouzi, et al., “Detecting cancer metastases on gigapixel pathology images,”

arXiv preprint arXiv:1703.02442 (2017).

14. M. Aubreville, C. Knipfer, N. Oetter, et al., “Automatic classification of cancerous tissue in laser endomicroscopy

images of the oral cavity using deep learning,” arXiv preprint arXiv:1703.01622 (2017).

15. A. Cruz-Roa, H. Gilmore, A. Basavanhally, et al., “Accurate and reproducible invasive breast cancer detection in whole-slide images: A deep learning approach for quantifying tumor extent,” Scientific Reports 7, 46450 (2017).

16. D. Wang, A. Khosla, R. Gargeya, et al., “Deep learning for identifying metastatic breast cancer,” arXiv preprint

arXiv:1606.05718 (2016). 17. K. Sirinukunwattana, S. E. A. Raza, Y. W. Tsang, et al., “Locality sensitive deep learning for detection and

classification of nuclei in routine colon cancer histology images,” IEEE Transactions on Medical Imaging 35,

1196 (2016) 18. GitHub - Shenggan/BCCD_Dataset: BCCD Dataset is a small-scale dataset for blood cells detection. BCCD

Dataset is under MIT licence. [Online]. Available: https://github.com/Shenggan/BCCD_Dataset

19. M. J. Macawile, V. V. Quiñones, A. Ballado, J. D. Cruz and M. V. Caya, "White blood cell classification and counting using convolutional neural network," 2018 3rd International Conference on Control and Robotics

Engineering (ICCRE), Nagoya, 2018, pp. 259-263.

134.

.

Authors: Dr. Rinkesh Mittal, Navneet Kaur, Dr. Parveen Singla

Paper

Title:

Performance improvement of DVFS based 16 bit SAR ADC

Abstract: Analog-to-digital converters (ADCs) at elevated efficiency are vital components

for elevated quality image sensors growth. In order to achieve the necessary resolution at a

specific velocity, these systems need a large amount of ADCs. In addition, energy dissipation

has now become a main output for analog models, especially for mobile equipment. Such a

circuit design is a difficult job, requiring a mixture of sophisticated digital circuit design,

analog expertise and iterative design. The sharing of amplifiers was frequently employed for

reducing dissipation of energy in ADC pipelines. In this paper we present the topology of a 16-

bit ADC pipeline, developed in 45 nm CMOS. Its efficiency is likened to a standard Scaling

configuration for amplifier and a completely shared amplifier.

Keywords: Analog-digital converters (ADC), data conversion, low power, successive

approximation register architecture (SAR), digital to analog converter (DAC).

References:

1. T.Sowmya, SK. Muneer Nihal, “IMPLEMENTATION OF 16-BIT PIPELINED ADC USING 180nm CMOS TECHNOLOGY”, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072.

2. Saima Bashir, Samiya Ali, Suhaib Ahmed, “Analog-to-Digital Converters: A Comparative Study and

Performance Analysis”, International Conference on Computing, Communication and Automation (ICCCA2016),2016.

3. T. Moody, "Design of a 10-bit 1.2 GS/s Digital-to-Analog Converter in 90 nm CMOS," Ohio LINK

Electronic Theses and Dissertations Center., 2015. 4. Abhishek Rai, B Ananda Venkatesan,“Analysis and design of High Speed and Low Power Comparator in

ADC”, International Journal of Engineering Development and Research (IJEDR), 2014. 5. S. Ren and J. Emmert, "Successive approximation pipelined ADC with one clock cycle conversion rate," The

Institute of Engineering and Technology 2012 ELECTRONIC LETTERS, vol. 48, no. 20, 27th September

2012.

829-835

6. Baker, R. Jacob. CMOS: circuit design, layout, and simulation. Vol. 18. John Wiley & Sons, 2011.

7. M. a. A. Zeki, "Current-steering digital-to-analog converters: functional specifications, design basics, and

behavioral modeling," Antennas and Propagation Magazine, p. 197– 208, 2010.

8. I. -H. Wang, J. -L. Lin and S. -I. Liu, “5-bit, 10 G Samples/s track-and-hold circuit with input feed through cancellation," Electronics Letters, vol. 42, no. 8, pp. 457 - 459, 2006.

9. Oskuii, SaeeidTahmasbi. "Comparative study on low power high performance flip-flops." (2004).

10. P. E. Allen and D. R. Holberg, CMOS analog circuit design., Oxford Univ. Press, 2002. 11. Rossi, A., and G. Fucili. "Non redundant successive approximation register for A/D converters." Electronics

letters 32.12 (1996): 1055- 1057.

12. F. Kuttner, "A 1.2v 10b 20MSample/s non-binary successive approximation ADC in0.13um CMOS," in IEEE International Solid-State Circuits Conference, 2002. [9] B.Razavi, Principles of Data Conversion System

Design, IEEE Press, 1995.

13. Yee, Y. S., L. M. Terman, and L. G. Heller. "A two- stage weighted capacitor network for D/AA/D conversion." SolidState Circuits, IEEE Journal of 14.4 (1979): 778-781.

14. J. McCreary, "Successive Approximation Analog to Digital Conversion Techniques in MOS Integrated

Circuits," University of California, Berkeley, 1975.

15. Ian Beavers contributing technical expert, "Understanding Spurious-Free Dynamic Range in Wideband GSPS

ADCs by Ian Beavers,," Analog Devices, Inc. Technical Article MS-2660.

135

.

.

Authors: Er. Archana Madan, Er. Daljit Singh

Paper

Title:

An Optimized Hybrid Filter designing for Speckle and Gaussian Noise Reduction in

UltraSound Images

Abstract: Image which is a visual perception of a scene or something is a set of pixels that

have certain values which appear in the form of colors to view that particular set of pixel as

image. Image contains information about whatever is being depicted in the picture and hence it

can be said as a useful source for storing or conveying information. Image noise is apparent in

image region with low signal level, such as shadow region or under exposed images. The work

presents the concept of noising and denoising in a digital image. Noise is a kind of disturbance

that occurs in the channel at the time of transmission. Image denoising is the procedure of

improving true images from the noisy images. For ages researchers have been proposing

several techniques that were used to remove the noise from the image. Image denoising is the

procedure of improving true image from the noisy image. At the time of such process it is

difficult to reduce noise. Owing to this difficulty, numerous denoising models have been

proposed [4]. The paper presents the reduction of speckle and Gaussian noise in the biomedical

ultrasound images. In the proposed work, the butterworth filter is applied for filtering the noisy

image and then the coefficients are optimized by using the firefly algorithm mechanism to

remove noise that occurs at the time of transmission and then it is hybrid with the Weiner filter.

Experiments have been performed to check the performance of the proposed technique. The

results are analysedquantatively using PSNR and SSIM. The results are also evaluated on other

performance parameters such as BER, MSE and fitness on speckle as well as on Gaussian

noise.

Keywords: Speckle Noise, Gaussian Noise, Denoising, Butterworth filter, Firefly Algorithm,

Digital Image, Ultrasound Image

References:

1. ArchanaMadan, Daljit Singh, “ An Optimized Hybrid Filter Designing for Speckle Noise Reduction in Ultrasound

Images”, International Journal for Research in Applied Science and Engineering Technology (IJRASET), Vol 5

Issue XII December 2017 2. Rajesh Mohan R, “Speckle Noise Reduction in Images using Wiener Filtering and Adaptive Wavelet

Thresholding”, IEEE, 2016, Pp 2860-2864.

3. Mr. Hitesh, S. Asari, Ami Shah, “A Research Paper On Reducion Of Speckle Noise In Ultrasound Imaging Using Wavelet And Contourlet Transform”, Journal of information, knowledge and research in electronics and

communication engineering, Vol 2, 2016, Pp 800-806.

4. Milind Kumar V. Sarode, Prashant R. Deshmukh, “Reduction of Speckle Noise and Image Enhancement of Images Using Filtering Technique”, International Journal of Advancement in Technology, Vol 2, 2011,

5. AlenrexMaity ;AnshumanPattanaik ; SantwanaSagnika ; SantoshPani, “A Comparative Study on Approaches to

Speckle Noise Reduction in Images”, IEEE, 2015. 6. T.RathaJeyalakshmi and K.Ramar, “A Modified Method for Speckle Noise Removal in Ultrasound Medical

Images”, International Journal of Computer and Electrical Engineering, Vol 2, 2010, Pp 1-5.

836-842

7. NishthaAttlas, Dr. Sheifali Gupta, “Wavelet Based Techniques for Speckle Noise Reduction in Ultrasound

Images” , International Journal of Engineering and Research and Application, Vol 4, 2014, Pp 508,513.

8. JyotiJaybhay, RajveerShastri, “speckle noise reduction filters analysis”, Research Gate, Vol 2, 2015, Pp 72-78.

9. K.M. SharavanaRaju, Mohammad ShahnawazNasir, T. Meera Devi, “Filtering Techniques to reduce Speckle Noise and Image Quality Enhancement methods on Satellite Images”, IOSR-JCE, Vol 15, 2013, Pp 10-15.

10. Karamjeet Singh, SukhjeetKaurRanade, Chandan Singh, “A hybrid algorithm for speckle noise reduction of

ultrasound images”, ELSEVIER, Vol 148, 2017, Pp 55-69. 11. NagashettappaBiradar, M.L. Dewal, Manoj Kumar Rohit, “Speckle noise reduction in echocardiographic images

of aortic valve and cardiac chambers”, ELSEVIER, Vol 126, 2015, Pp 153-169.

12. Jian Yang, Jingfan Fan, Yongtian Wang, “Local statistics and non-local mean filter for speckle noise reduction in medical ultrasound image”, ELSEVIER, Vol 195, 2016, Pp 88-95.

13. Ajitha R. Subhamathi, “Ultrasound Image Despeckling based on Local Binary Pattern and Local Homogenity”,

IEEE, 2016, Pp 1758-1761. 14. Jingyun Liu, Zegang Ding, Liangbo Zhao, Fei Dong, Dechengang Liu, “An Adaptive SAR Image Speckle

Reduction Algorithm Based on Wavelet Transform and Partial Differential Equations”, Proceedings of 10th

European Conference on Synthetic Aperture Radar (EUSAR),2014,Pp 1-4.

136

.

.

Authors: Sonali Mathur, Prof. (Dr.) Vikram Bali, Prof. (Dr.) S.L. Gupta, Dr. Payal Pahwa

Paper

Title:

Data Warehouse Testing and Security: A Conspectus

Abstract: Data warehouse is a central storage facility that stores information from many

sources which can be in structured or unstructured format, queries this information for retrieval

based on certain input facts and delivers the outcome analysis to many analysts, to meet

decision support and business intelligence requirement. Not much research has been carried

out in this research area in the past few years. In this research paper, we are discussing the

data warehouse architecture and the testing techniques that are used for best suited to be used

for the data warehouses. Literature for the testing techniques is integrated at one place and the

outcome is to focus on security issues while performing data warehouse testing.

Keywords: Database, Data Warehouse, Data Warehouse Testing, Database Testing, Software

Testing

References: 1. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd

ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64. 2. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.

3. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.

4. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished. 5. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas

Propagat., to be published.

6. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

7. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

8. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741

[Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

9. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989. 10. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium].

Volume(issue). Available: http://www.(URL)

11. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com 12. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging

if given. Available: http://www.(URL)

843-850

137

Authors: Sulekha Saxena, P. N. Hrisheekesha, Vijay Kumar Gupta, Ram Sewak Singh

Paper

Title:

Detection of Congestive Heart Failure Based On Spectral Features and Extreme Learning

Machine

.

Abstract: In this paper we proposed a novel approach to evaluate the classification

performance of features derived from various spectral investigation methods for congestive

Heart Failure (CHF) analysis using ranking methods, Kernel Principal Component Analysis

(KPCA) and binary classifier as 1-norm linear programming extreme learning machine (1-

NLPELM). For this study, thirty different features are extracted from heart rate variability

(HRV) signal by using spectral methods like multiscale Wavelet packet (MSWP), higher order

spectra (HOS) and auto regression (AR) model. Top ten features were extracted by ranking

methods and then reduced to only one feature by KPCA having kernel function as radial basis

function (RBF) which was further applied to 1-NLPELM binary classifier. For this purpose,

the HRV data were taken from standard database of Normal sinus rhythm (NSR), elderly

(ELY) and Congestive heart failure (CHF) subjects. Numerical experiments were being done

on the combination of database sets as NSR-CHF, NSR-ELY, and ELY-CHF subjects. The

numerical results show that features at third level of decomposition of HRV data sets MSWP

shows lowest p-value (<0.001). Thus, third level of MSWP features are better than other

features extracted by auto regression (AR) model and higher order spectra (HOS) spectral

methods.

Keywords: 1-norm linear programming extreme learning machine (1-NLPELM), higher order

spectra (HOS), Kernel Principal Component Analysis (KPCA), ranking methods

References: 1. World Health Organization, “Global status report on non-communicable diseases”, 2010, Available online at:

http://www.who.int/cardiovascular_diseases /about_cvd /en/ [last accessed December 2016]. 2. N. D. Wong, “Epidemiological studies of CHD and the evolution of preventive cardiology”, Nature Reviews

Cardiology, vol. 11, 2014, pp. 276–289.

3. National Heart Lung and Blood Institute, “What is coronary heart disease?” Accessed 2015-11-25 http://www.nhlbi.nih.gov/health/health-topics/ topics/cad/.

4. WHO (World Health Organization), “Definition and Diagnosis of cardiac disease and Intermediate

Hyperglycemia”, 2006, http://whqlibdoc.who.int/publications/2006/9241594934_eng.pdf, (Last accessed December 2016.).

5. M. G. Poddar, V. Kumar and Y. P. Sharma, “Automated diagnosis of coronary artery disease patients by heart

rate variability analysis using linear and non-linear methods”, J Med Eng Technol, vol. 39, 2015, pp. 331-341.

6. E. Silber and L.N. Katz, “Heart Disease”, New York: Macmillan Publishing Co., 1975, pp. 498.

7. U.R. Acharya, N. Kannathal and S.M. Krishnan, “Comprehensive analysis of cardiac health using heart rate

signals”, Physiological Measurement, vol. 25, 2004, pp. 1139–1151. 8. S. Nikolopoulos, A. Alexandridi , S. Nikolakeas and G. Manis, “Experimental analysis of heart rate variability

of long-recording electrocardiograms in normal subjects and coronary patients”, J. Biomed. Inform, Vol 36,

2003, pp. 202–217. 9. G. Manis, S. Nikolopoulos, A. Alexandridi and C. Davos, “Assessment of the classification capability of

prediction and approximation methods for HRV analysis”, Computers in Biology and Medicine, vol. 37, 2007,

pp. 642 – 654. 10. A.L. Goldberger, “Non-linear dynamics for clinicians: chaos theory, fractals, and complexity at the bedside”,

Lancet, vol 11, 1996, pp. 1312–1314.

11. Y. Sun, K. L. Chan and S. M. Krishnan, “Arrhythmia detection and recognition in ECG signals using nonlinear techniques”, Ann. Biomed. Eng, Vol. 28, 2000, pp. 37-40.

12. S.M. Pincus, “Approximate entropy as a measure of system complexity”, Proc. Nat. Acad. Science, vol 88,

1991, pp. 2297–2301. 13. U.R. Acharya, N. Kannathal and S.M. Krishnan, “Comprehensive analysis of cardiac health using heart rate

signals”, Physiol. Measurement, vol 25, 2004, pp. 1139–1151.

14. A.L. Goldberger and B.J. West, “Applications of nonlinear dynamics to clinical cardiology”, Ann. N.Y. Acad.

Science, vol. 50, 1987, pp. 195–213.

15. G. B. Huang, Q. Yu. Zhu and C. K. Siew, “Extreme learning machine: Theory and applications”,

Neurocomputing, vol 70, 2006, pp. 489–501. 16. G. B. Huang, D.H. Wang and Y. Lan, “Extreme learning machines: a survey”, Int. J. Mach. Learn. Cybernet,

vol. 2, 2011, pp. 107–122.

17. Z. Chen, H. Zhu And Y. Wang, “A modified extreme learning machine with sigmoidal activation functions”, Neural Comput. Appl., vol. 22, 2013, pp. 541–550.

18. Y. Lan, C. Soh, and G. B. Huang, “Two-stage extreme learning machine for regression”, Neurocomputing, vol

73, 2010, pp. 3028–3038. 19. Q. Y. Zhu, A.K. Qin, P.N. Suganthan and G.B. Huang, “Evolutionary extreme learning machine”, Pattern.

Recognit., vol 38, 2005, pp. 1759–1763.

20. Y. Yuan and Y. F. Wang, “Optimization approximation solution for regression problem based on extreme learning machine”, Neurocomputing, vol 74, 2011, pp. 2475–2482.

21. L. Zhang and W. Zhou, “On the sparseness of 1-norm support vector machines”, Neural Networks, vol. 23,

2010, pp. 373-385.

851-862

22. S. Balasundaram, D. Gupta, and Kapil, “1-Norm extreme learning machine for regression and multiclass

classification using Newton method”, Neurocomputing, vol 128, 2014, pp. 4–14.

23. A. L. Goldberger, L. A.N. Amaral, L. Glass and J. M. Hausdorff, “PhysioBank, PhysioToolkit, and PhysioNet

Components of a New Research Resource for Complex Physiologic Signals”, Circulation, vol. 101, 2000,pp. 215-220, (http://www.physionet.org).

24. N. Iyengar, C. K. Peng, A. L. Goldberger, R. Morin and L. A. Lipsitz, “Age-related alterations in the fractal

scaling of cardiac inter beat interval dynamics”, Am J Physiol, vol. 271, 1996, pp. 1078-1084. 25. I. P. Mitove, “A method for assessment and processing of bio medical signals containing trend and periodic

Components”, Med Eng Phys, vol 20, 1998, pp. 660-668.

26. U. R. Acharya, K. P. Joseph, N. Kannathal, C.M. Lim and J. S. Suri, “Heart rate variability: a review”, Med Bio Eng Comput, vol. 44, 2006, pp. 1031–1051.

27. J. T. Ramshur, “Design, evaluation, and applicaion of heart rate variability analysis software (HRVAS)”,

thesis, vol. 23, 2010. 28. A. Subasi, “Comparison of subspace-based methods with AR parametric methods in epileptic seizure

detection”, Computers in Biology and Medicine, vol 36, 2006, pp. 195-208.

29. A. Boardman, “A study on the optimum order of autoregressive models for heart rate variability”, Physiological Measurement, vol 23, 2002, pp. 325-328.

30. R.K. Sunkaria, V. Kumar, and S.C. Saxena, “Aging effects on dynamics: A comparative study with FFT and

AR models”, International Journal of Signal and Imaging Systems Engineering, vol 6, 2013, pp. 240–249.

31. R. R. Coifman, Y. Meyer, S. Quake and V. Wickerhauser, “Wavelet analysis and Signal processing”, Wavelets

and Their Applications, Sudbury, MA: Jones and Barlett, vol 2, 1992, pp. 153–178.

32. R. N. Khushaba, S. Kodagoda, G. Dissanayake and S. Lal, “Driver Drowsiness Classification Using Fuzzy Wavelet-Packet-Based Feature-Extraction Algorithm”, IEEE Transactions On Biomedical Engineering, vol 58,

2011, pp. 512-518.

33. K. Chua, V. Chandran, U. Acharya and C. Lim, “Cardiac state diagnosis using higher order spectra of heart rate variability”, Journal of medical engineering & technology, vol 32, 2008, pp. 145-155.

34. K. C. Chua, V. Chandran, U. R. Acharya and C. M. Lim, “Application of higher order statistics spectra in

biomedical signals-A review”, Medical engineering & physics, vol 32, 2010, pp. 679–89. 35. N. Madhu, “Note on measures for spectral flatness”, ELECTRONICS LETTERS, vol 45, 2009, pp. 1195 -1196.

36. R. O. Duda, P. E. Hart, and D. G. Stork, Pattern classification, John Willey & Sons, 2000, ch. 2.

37. M. Kumar, R. B. Pachori and U. R. Acharya, “An efficient automated technique for CAD diagnosis using

flexible analytic wavelet transform and entropy features extracted from HRV signals”, Expert Systems with Applications, vol 63, 2016,pp. 165–172.

38. Gu Quanquan, Li Zhenhui, Han Jiawei, “Generalized Fisher Score for Feature Selection”, Proceedings of the

Twenty-Seventh Conference on Uncertainty in Artificial Intelligence, Barcelona, Spain, 2011, July 14-17. 39. B. D. R. Derry, S. B. Schou, and W. J. Conover, “Teaching rank based tests by emphasizing structural

similarities to corresponding parametric tests”, Journal of Statistics Education, vol. 18, 2010, pp. 1–19.

40. A. Kampouraki, G. Manis and C. Nikou, “Heartbeat Time Series Classification with Support Vector Machines”, IEEE Transactions on Information Technology In Biomedicine, vol 13, 2009, pp. 512-518.

41. S. Dua, X. Du, S. V. Sree and T. A., “Novel classification of coronary artery disease using heart rate

variability analysis”, Journal of Mechanics in Medicine and Biology, vol 12, 2012, pp. 124-129. 42. S. Patidar, R.B. Pachori and U. Rajendra Acharya, “Automated diagnosis of coronary artery disease using

tunable-Q wavelet transform applied on heart rate signals”, Knowledge-Based Systems, vol 82, 2015, pp. 1–10.

43. I. Babaoglu, O Findik and M. Bayrak, “Effects of principle component analysis on assessment of coronary artery diseases using support vector machine”, Expert Systems with Applications vol 37, 2010, pp. 2182–2185.

44. M. G. Poddar, V. Kumar, and Y. P. Sharma, “Automated diagnosis of coronary artery disease patients by heart

rate variability analysis using linear and non–linear methods”, Journal of Medical Engineering & Technology, vol 39, 2015, pp. 331–341.

45. D. Giri, U. R. Acharya, R. J. Martis, S. V Sree., T.C. Lim, and J. S. Suri, “Automated diagnosis of coronary

artery disease affected patients using LDA, PCA, ICA and discrete wavelet transform”, Knowledge-Based System, vol 37, 2013, pp. 274–282.

46. C. R. Rao and S. K. Mitra, Generalized Inverse of Matrices and its Applications, John Wiley, New York, 1971.

47. S. S. Shwartz and A. Tewari, “Stochastic methods for ℓ1 -regularized loss minimization”, In Proceedings of the 26th International Conference on Machine Learning, Montreal, Canada, 2009, pp. 929–936.

48. O. L. Mangasarian, “Exact 1-norm support vector machines via unconstrained convex differential

minimization”, J. Mach. Learn. Res., vol 7, 2006 , pp. 1517–1530. 49. G. B. Huang, H. Zhou, X. Ding, and R. Zhang, “Extreme learning machine for regression and multiclass

classification”, IEEE Trans. on Syst. Man Cybern. Part B: Cybern, vol. 42, 2012, pp. 513–528.

50. R. S. Singh, B. S. Saini and R. K. Sunkaria, “Classification of cardiac heart disease using reduced chaos features and 1-norm linear programming extreme learning machine”, International Journal for Multiscale

computational engineering, vol 16, 2018, pp. 465-486.

51. R. Alizadehsani, M. J. Hosseini, A. Khosravi and F. Khozeimeh, “Non invasive detection of coronary artery disease in high risk patients based on the stenosis prediction of separate coronary arteries”, Computer methods

and programs in Biomedicine, vol 162, 2018, pp. 119-127.

Authors: Gaurav Mehta, Dr. Parveen Singla, Dr. Rinkesh Mittal

Paper

Title:

Node Validation Technique to Increase Security of Wireless Sensor Networks

138

.

Abstract: A distributed sort of network in which sensor nodes can join or leave the network

when they want is identified as wireless sensor network. Due to self-arranging of the network,

attacker nodes make their entry inside networks and launch different types of active and

passive intrusions. The active attacks can be divided into various sub categories and one of

them is misdirection attack. This attack increases delay in the network. The available attacker

hub will trigger attack. In order to recognize and disengage malicious nodes a novel strategy is

proposed in this work. The malicious nodes are recognized from the networks which are in

charge of triggering the node. The attacker or malevolent node launches sinkhole intrusion.

This intrusion streams fake recognition information within the network. This study proposes a

verification approach for detecting attacker nodes present in the network. The performance of

introduced approach is tested in NS2. It is scrutinized that performance is improved as per

various parameters.

Keywords: ACTIVE ATTACKS, DOS, IDS,LEACH, NS2, SINKHOLE, WSN

References: 1. Omar Banimelhem, Muhammad Naserllah, and Alaa Abu-Hantash, “An Efficient Coverage in Wireless

Sensor Networks Using Fuzzy Logic-Based Control for the Mobile Node Movement,” 2017, IEEE 2. RanuShukla, Rekha Jain, P. D. Vyavahare, “Combating against Wormhole Attack in Trust and Energy Aware

Secure Routing Protocol (TESRP) in Wireless Sensor Network”, 2017, Recent Innovations is Signal

Processing and Embedded Systems (RISE) 3. Poonam Rolla, ManpreetKaur, “Dynamic Forwarding Window Technique against DoS Attack in WSN,”

2016, IEEE

4. Aamir Shaikh and Siraj Pathan, “Research on Wireless Sensor Network Technology”, 2012, International Journal of Information and Education Technology, Vol. 2, No. 5

5. RakshaUpadhyay, Salman Khan, HarendraTripathi, Uma Rathore Bhatt, “Detection and Prevention of DDOS

Attack in WSN for AODV and DSR using Battery Drain,” 2015, IEEE 6. Yogesh Kumar Fulara, “Some Aspects of Wireless Sensor Networks”, 2015, International Journal on AdHoc

Networking Systems (IJANS) Vol. 5, No. 1

7. Ju young Kim, Ronnie D. Caytiles, Kyung Jung Kim, “A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks” Journal of Security Engineering, 2014, pp.241-250

8. Mayank Kumar Sharma, Brijendra Kumar Joshi, “Detection & Prevention of Vampire Attack in Wireless

Sensor Networks,” 2017, IEEE

9. Aditi Rani, Sanjeet Kumar, “A Low Complexity Security Algorithm for Wireless Sensor Networks,” 2017,

IEEE

10. AminaMsolli, HaythemAmeur, AbdelhamidHelali, HassenMaaref, “A new secure key management scheme for wireless sensor network,” 2017, IEEE

11. JanhaviKulkarni, Karan Nair, AdityaPappu, SarthakGadre, Ganesh Gore, Jonathan Joshi, “Using On-Chip

Cryptographic Units for Security in Wireless Sensor Networks,” 2017, IEEE 12. C. Anand, R. K. Gnanamurthy,” Localized DoS Attack Detection Architecture for Reliable Data Transmission

Over Wireless Sensor Network”, 2016 Springer Science + Business Media New York

13. Omar Said and AlaaElnashar,” Scaling of wireless sensor network intrusion detection probability: 3D sensors,

3D intruders, and 3D environments”, 2015 Springer

863-867

Authors: Simranjeet kaur, Geetanjali Babbar, Dr. Gagandeep

Paper

Title:

Image processing andclassification, approch for plant Disease detecion

Abstract: The plant disease detection is the major issue of the computer vision and machine

learning. The plant disease detection has the various phases like pre-processing, segmentation,

feature extraction and classification. In the existing technique support vector machine is used

for the classification. The support vector machine approach has the low accuracy for the plant

disease detection and also it can classify data into two classes which affect its performance.

The proposed methodology is based on the region based segmentation, textual feature analysis

and k-nearest neighbor method is applied for the classification. The proposed method is

implemented in MATLAB and results are analyzed in terms of accuracy. The proposed

technique has high accuracy and compared to existing technique

Keywords: Plant disease detection, GLCM, K-mean, KNN

References:

139

.

1. Santhosh Kumar S, B. K. Raghavendra, “Diseases Detection of Various Plant Leaf Using Image Processing

Techniques: A Review”, 2019, 5th International Conference on Advanced Computing & Communication Systems (ICACCS)

2. Kriti, Jitendra Virmani and Ravinder Agarwal, “Effect of despeckle filtering on classification of breast

tumors using ultrasound images”, Biocybernetics and Biomedical Engineering, Vol. 39, No. 2, pp. 536-560, 2019, Publisher: Elsevier

3. Abirami Devaraj, Karunya Rathan, Sarvepalli Jaahnavi, K Indira, “Identification of Plant Disease using

Image Processing Technique”, 2019, International Conference on Communication and Signal Processing (ICCSP)

4. Meenakshi Garg, Manisha Malhotra and Harpal Singh, “Statistical Feature Based Image Classification and

Retrieval Using Trained Neural Classifiers”, 2018, International Journal of Applied Engineering Research, Volume 13, Number 8, pp. 5766-5771

5. M S Arya, K Anjali, Divya Unni, “Detection of unhealthy plant leaves using image processing and genetic

algorithm with Arduino”, 2018, International Conference on Power, Signals, Control and Computation

(EPSCICON) 6. V Pooja, Rahul Das, V Kanchana, “Identification of plant leaf diseases using image processing techniques”,

2017, IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR)

7. Sujatha R, Y Sravan Kumar and Garine Uma Akhil, “Leaf disease detection using image processing”,2017,

Journal of Chemical and Pharmaceutical Sciences

8. Sujeet Varshney, Tarun Dalal, “Plant Disease Prediction using Image Processing Techniques- A Review”,

2016, International Journal of Computer Science and Mobile Computing 9. Shivani K. Tichkule, Dhanashri. H. Gawali, “Plant diseases detection using image processing techniques”,

2016, Online International Conference on Green Engineering and Technologies (IC-GET)

10. R Anand, S Veni, J Aravinth, “An application of image processing techniques for detection of diseases on brinjal leaves using k-means clustering method”, 2016, International Conference on Recent Trends in

Information Technology (ICRTIT)

11. K. Sumithra, S. Buvana, R. Somasundaram, “A Survey on Various Types of Image Processing Technique”, 2015, International Journal of Engineering Research & Technology (IJERT)

12. Sachin D. Khirade, A.B. Patil, “Plant Disease Detection Using Image Processing”, 2015, International

Conference on Computing Communication Control and Automation

868-871

140

.

Authors: Shaifali Sharma, Geetanjali Babbar, Ishdeep singla,gagandeep jindal

Paper

Title:

Efficient Scale Invariant and Back Propagation Neural Network Method using LIP Region

Segmentation

Abstract: With the advent of technological sensor devices and human interface machine

technology, there has been extensive research done in lip segmentation methods by several

researchers — some linguistic features required for interaction with the machine equipment.

Therefore, research work has been done in the audio speech detection scheme for recognition

of lip reading . Visual lip reading technology developed based on the extraction of features of

the lip. Lip segmentation is an essential approach to recognize lip reading scheme. Meanwhile,

it helps to improve parameters. Several methods studied to segment the lip area based on

localized active contour method using twice contour finding and combined color-space

method. Apply the illumination histogram equalization to real color images to reduce the

distortion of uneven illumination. The proposed method implemented can get better accuracy

rate and segmentation results and compare with the existing process using area or circle as the

region to segment grayscale images and combined in the color-space image. Using SIFT and

BPNN, the inner region of the lip found in the result. The experiment tool is used MATLAB

2016a and designs a PROJECT APPLICATION. Improve the success rate and reduce the

segmented error and compared with the current metrics. The experimental analysis determines

the accuracy rate with 94%; error rate reduces with Segmented Error 14.1 % and Overlap Error

rate value with 79.73%.

Keywords: Lip Segmentation, Feature Extraction – Scale Invariant Feature Transformation,

BPNN – Back Propagation Neural Network, and Active Contour.

References: 1. Chin, S. W., Seng.al, K. P., Ang.al, L. M. and Lim, K. H. (2009,March), “New lips detection and tracking

system.”,In Proceedings of the international multi conference of engineers and computer scientists ,Vol. 1, pp.

872-877

18-20.

2. Sadaghiani.al, M. H., Seng.al, K. P., Chin, S. W., and Ang.al, L. M. (2009, November),”Enhanced Lips

Detection and Tracking System,In International Visual Informatics Conference

(pp.254-265).Springer, Berlin, Heidelberg. 3. Karlsson.al, S. M., and Bigun.al, J. (2012, June), “Lip-motion events analysis and lip segmentation using

optical flow” ,In 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition

Workshops (pp. 138-145).IEEE. 4. Yan, X. P., Li, X. Q., Zheng.la, L. L and Li, F. F. (2010,September),”Robust lip segmentation

method based on the level set model” , In Pacific-Rim Conference on Multimedia (pp. 731-739).Springer,

Berlin, Heidelberg. 5. Wang, S. L., Lau, W. H., Liew.al, A. W. C and Leung, S. H.(2007).,”Robust lip region segmentation for lip

images with complex background”’ Pattern Recognition, vol.40(12), pp.3481-3491.

6. Munot.al, K., Mehta, N., Mishra.la, S. and Chaturvedi.la, R. N.(2017),”Areview on image segmentation techniques with an application perspective.”,International Journal of Advanced Research in Computer

Science, vol. 8(9).

7. Li, M. and Cheung, Y. M. (2010, September),”Automatic segmentation of color lip images based on morphological filter”,In International Conference on Artificial Neural Networks (pp. 384-387).Springer,

Berlin, Heidelberg.

8. Kalbkhani.al, H. and Amirani.al, M. C. (2012),”An efficient algorithm for lip segmentation in color face

images based on local information”, Journal of World's Electrical engineering and technology, vol.1(1), 2012.

9. Naz.al, S., Majeed.al, H and Irshad.al, H. (2010, October). Image segmentation using fuzzy clustering: A

survey. In 2010 6th international conference on emerging technologies (ICET) (pp. 181-186).IEEE. 10. Liew.al, A. C., Leung, S. H and Lau, W. H. (2003),” Segmentation of color lip images by spatial fuzzy

clustering”,IEEE transactions on Fuzzy Systems, vol 11(4), pp 542-549.

11. Zhang, D and Lu, G. (2001),”Segmentation of moving objects in image sequence: A review”, Circuits, Systems and Signal Processing, vol 20(2), pp 143-183.

12. Stillittano.al, S and Caplier.al, A. (2008, January),”Inner Lip Segmentation by Combining Active Contours

and Parametric Models”, 13. In VISAPP (1) (pp. 297-304).

14. Lu, Y and Zhou, T. (2018),”Lip segmentation using localized active contour model with automatic initial

contour”, Neural Computing and Applications, 29(5), 1417-1424. 15. Liévin.al, M., Delmas.al, P., Coulon.al, P. Y., Luthon.al, F andFristol.al, V. (1999, July),” Automatic

lip tracking: Bayesiansegmentation and active contours in a

cooperative scheme”,In Proceedings IEEE International Conference on MultimediComputing and Systems (Vol. 1, pp. 691-696).IEEE.

16. Saeed.al, U and Dugelay.al, J. L. (2010, July),”Combining edgedetection and region segmentation for lip

contour extraction “,In International Conference on Articulated Motion and Deformable Objects (pp. 11-

20).Springer, BerlinHeidelberg.

17. Lu, Y and Liu, Q. (2018),”Lip segmentation using automatic selected initial contours based on localized

active contour model “,EURASIP Journal on Image and Video Processing, 201 vol 8(1), 7. 18.

19. Liu, G., and Li, H. (2018),” Robust evolution method of active contour models and application in

segmentation of image sequence.”,Journal of Electrical and Computer Engineering, 2018. 18 Wang, L., Chang, Y., Wang, H., Wu, Z., Pu, J and Yang, X. (2017),”An active contour model based on local

fitted images for image segmentation,” Information sciences,vol. 418,pp. 61-73.

19 Shele.ali, L. and Mengxing.al, H. (2018, March).,”Research ofUnderwater Image Segmentation Algorithm Based on the ImprovedGeometric Active Contour Models”, In 2018 International Conference on

Intelligent Autonomous Systems (ISO IAS) (pp. 44-50).IEEE.

20 X u, W., Y u e, X., Chen, Y and Reformat, M. (2017, September),”Ensemble of active contour based image segmentation”, In 2017 IEEE International Conference on Image Processing (ICIP) (pp. 86-90).IEEE.

21 Zaman.al, M. and Lung, C. H. (2018, April).,”Evaluation of machine learning techniques for network intrusion detection”,In NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium (pp.

1-5).IEEE.

Authors: Ashima Rani, Gaurav Aggarwal

Paper

Title:

Algorithm for Automatic Detection of Ambiguities from Software Requirements

Abstract: Software Systems are built by the Software engineers and must ensure that

software requirement document (SRS) should be specific. Natural Language is the main

representation of Software requirement specification document, because it is the most flexible

and easiest way for clients or customers to express their software requirements [2]. However

being stated in natural language, software requirement specification document may lead to

ambiguities [28]. The main goal of presented work to automatically detection of the different

types of ambiguities like Lexical, Syntactic, Syntax and Pragmatic. Then an algorithm is

proposed to early detection the different types of ambiguities from software requirement

141

document. Part of Speech (POS) technique and regular expression is used to detect each type

of ambiguities. An algorithm presented in this paper have two main goals (1) Automatic

detection of different types of ambiguities. (2) Count the total number of each types of

ambiguities found and evaluate the percentage of ambiguous and non- ambiguous statements

detected from software requirement document. The suggested algorithm can absolutely support

the analyst in identifying different kinds of ambiguities in Software requirements specification

(SRS) document.

Keywords: Lexical ambiguity, Syntax Ambiguity, Software Requirement Specification,

Syntactic ambiguity, Pragmatic ambiguity, Part of Speech Tagging.

References: 1. Ashima Rani, Gaurav Aggarwal, “Advanced Practices to Detect Ambiguities and Inconsistencies from

Software Requirements”, IEEE, 7th international conference on System Modeling & Advancement in

Research Trends, November 2018, pp. 17-21.

2. Benedikt Gleich, Oliver Creighton, Leonid Kof, “Ambiguity Detection: Towards a toll explaining ambiguity

sources”, International Working Conference on Requirements Engineering: Foundation for Software Quality,

2010, pp 218-232.

3. Ayan Nigam, Neeraj Arya, Bhawna Nigam, Dipika Jain, “Tools for automatic discovery of ambiguity in requirements”, International Journal of Computer Science Issues, Vol 9, Issue 5, 2012, pp 350-356.

4. ALI OLOW JIM, WAN MOHD NAZMEE WAN ZAINON, “An approach for detecting syntax and syntactic

ambiguity in software requirement specification”, Journal of Theoretical and applied Information Technology, Vol 96, Issue. 8, April 2018, pp 2275-2284.

5. Gulia, S. and T. Choudhury, “An efficient automated design to generate UML diagram from Natural

Language specifications” , IEEE 6th International Conference Cloud System and Big Data Engineering (Confluence), 2016.

6. Beg, R., Q. Abbas, and A. Joshi, “A method to deal with the type of lexical ambiguity in a software

requirement specification document”, ICETET’08 in Emerging Trends in Engineering and Technology, 2008. 7. Gleich, B., O. Creighton, and L. Kof, “Ambiguity detection: Towards a tool explaining ambiguity sources.

International Working Conference on Requirements Engineering: Foundation for Software Quality”. 2010.

Springer. 8. Arendse, B., “A thorough comparison of NLP tools for requirements quality improvement”, 2016.

9. . Umber, A. and I.S. Bajwa. Minimizing ambiguity in natural language software requirements specification.

2011 Sixth International Conference on Digital Information Management (ICDIM),. 2011. IEEE.

10. Takoshima, A. and M. Aoyama. Assessing the Quality of Software Requirements Specifications for

Automotive Software Systems. in Software Engineering Conference (APSEC), 2015 Asia-Pacific. 2015.

IEEE. 11. Bano, M. Addressing the challenges of requirements ambiguity: A review of empirical literature. in 2015

IEEE Fifth International Workshop on Empirical Requirements Engineering (EmpiRE). 2015. IEEE.

12. Popescu, D., Rugaber, S., Medvidovic N., & Berry, D.M. Reducing ambiguities in requirements specifications via automatically created object-oriented models. LNCS 5320, 2007. Springer.

13. Femmer, H., Fernandez, D.M., & Juergens, E., Rapid requirements checks with requirements smells: two

case studies. in Proceedings of the 1st International Workshop on Rapid Continuous Software Engineering. 2014. ACM.

14. . Shah, U.S. and D.C. Jinwala, Resolving ambiguities in natural language software requirements: a

comprehensive survey. ACM SIGSOFT Software Engineering Notes, 2015. 40(5): p. 1-7. 15. Korner, S.J. and T. Brumm. Resi-a natural language specification improver. in Semantic Computing, 2009.

ICSC'09. IEEE International Conference on. 2009. IEEE. 16. . Bajwa, I., M. Lee, and B. Bordbar, Resolving syntactic ambiguities in natural language specification of

constraints. Computational Linguistics and Intelligent Text Processing, 2012: p. 178-187.

17. . Soares, H.A. and R.S. Moura. A methodology to guide writing Software Requirements Specification document. in Computing Conference (CLEI), 2015 Latin American. 2015. IEEE.

18. Fockel, M. and J. Holtmann. ReqPat: Efficient documentation of high-quality requirements using controlled

natural language. in 2015 IEEE 23rd International Requirements Engineering Conference (RE). 2015. IEEE. 19. Gill, K.D., Raza, A., Zaidi, A.M., & Kiani, M.M. Semi-Automation For Ambiguity Resolution, 27th

Canadian Conference on Open Source Software requirements. in Electrical and Computer Engineering

(CCECE). 2014. IEEE. 20. . Sandhu, G. and S. Sikka. State-of-art practices to detect inconsistencies and ambiguities from software

requirements. 2015 International Conference on. Computing, Communication & Automation (ICCCA), 2015.

IEEE. 21. de Bruijn, F. and H.L. Dekkers. Ambiguity in natural language software requirements: A case study.

International Working Conference on Requirements Engineering: Foundation for Software Quality. 2010.

Springer. 22. Unnati S Shah, Devesh C. Jinawala, “Resolving Ambiguties in Natural language Software Requirements: A

Comp rehensive Survey”, ACM SIGSOFT Software Engineering Notes, Vol 40 No. 5, September 2015.

23. . Gang Liu, Shaobin Huang, Xiufeng Piao, “Study on Requirement Testing Method Based On Alpha-Beta Cutoff Procedure” Collage of computer Science and Technology, Harbin Engineering University, Harbin,

878-882

Heilongjiang, China, 2008 IEEE.

24. Ravi Prakash Verma, Bal Gopal, Md. Rizwan Beg, ”Algorithm for Generating Test Case for Prerequisites of

Software Requirement” Department of Computer Science and Engineering, Integral University. International

Journal of Computer Application, September 2010 IEEE. 25. Ronald Kirk Kndt “Software Requirement Engineering: Practice and Techniques”, Jet Propulsion

Laboratory, California Institute of Technology, November 7, 2003.

26. . Massila Kamalrudin, Safiah Sidek, Sharifah Sakinah, Syed Ahmad, Nadiah Daud, “A review of requirements engineering tools for requirements validation software engineering process”,vol.1, no.1,

International journal of software engineering and technology (IJSET), 2014.

27. . Dr. Sohail Asghar, Mahrukhumar, “Requirement engineering challenges in development of software applications and selection of customer-offthe-Shelf (COTS) components”, International journal of software

engineering (IJSE), vol. 1, no. 2, August 2010.

28. . Khtira, A.; Benlarabi, A.; El Asri, B. Detecting feature duplication in natural language specifications when evolving software product lines. In Proceedings of the 10th International Conference on Evaluation of Novel

Approaches to Software Engineering, Barcelona, Spain, 29–30 April 2015.

142

Authors: Pradeep Kumar Gaur, Anupma Marwaha

Paper

Title:

Wide-WANET Architecture for extension of Internet facilities in remote regions

Abstract: A definitive research of intrigue nowadays is in the field of internetworking

identified with overseeing and keeping up of correspondence between nodes of various

network standards inside an ad-hoc domain. The communication between heterogeneous nodes

is established by the computation of the instantaneously selected metric values i.e. hop count

and routing queue length of individual gateways candidates. A wide-WANET structure is

proposed conforming to four different network standards and simulated using enhanced AODV

and IPv6 addressing format. It has been proved through simulations that the parameters in

consideration has shown improved better performance by implementing Multiple-metrics

Gateway Selection Criterion whereby facilitating extension of Internet facilities by cohering

nodes of varying network standards.

Keywords: Hop Count; Infrastructure less; Multiple-metrics Gateway Selection Criterion;

Routing Queue Length; wide-WANET;

References: 1. Gaur PK, Marwaha A “Scalability Analysis using Auto-configuration process for coalescing of

heterogeneous Wireless ad-hoc networks” International Journal of Applied Engineering Research, Research India Publications, 12(14), 2007, pp. 4427-4432.

2. Bayer N, Xu B, Hischke S, “An Architecture for connecting Ad hoc Networks with the IPv6 Backbone

(6Bone) using a Wireless Gateway”, European Wireless, vol. 100, 2004. 3. Khan KUR, Reddy AV, Zaman RU, Kumar M, “An effective gateway discovery mechanism in an integrated

internet-MANET (IIM)” Int Conf Adv Comput Eng, 2010, pp. 24–28.

4. Ratanchandani P, Kravets R, “A Hybrid Approach to Internet Connectivity for Mobile Ad Hoc Networks”, Wirel Commun Netw, vol. 3, 2003, pp.1522–1527.

5. Ahlund C, Zaslavsky A, “Integration of ad hoc network and IP network capabilities for mobile hosts”, 10th

Int Conf Telecommun ICT, vol. 1, 2003, pp. 482–489. doi: 10.1109/ICTEL.2003.1191288 6. Armuelles I, Robles T, Siebert M, “On Ad Hoc Networks in the 4G Integration Process”, Third Annual

Mediterranean Ad Hoc Networking Workshop, 2004.

7. Bader F, Pinart C, Christophi C, “User-centric analysis of perceived QoS in 4G IP mobile/wireless networks” IEEE Int Symp Pers Indoor Mob Radio Commun PIMRC, vol. 3, 2003, pp. 2047–2053.

8. Djouama A, Mokdad L, Abdennebi M, Tohmé S, “Topology control for enhanced QoS on infrastructure-less

heterogeneous radio networks” Proc - Conf Local Comput Networks, LCN, 2009, pp. 414–419. 9. Zachariah T, Klugman N, Campbell B, “The Internet of Things Has a Gateway Problem”, Proc 16th Int Work

Mob Comput Syst Appl - HotMobile’15, 2015, pp. 27–32.

10. Glória A, Cercas F, Souto N, “Design and implementation of an IoT gateway to create smart environments”, Procedia Comput Sci, vol. 109, 2017, pp. 568–575.

11. Villiers G De, Byl A Van der, Wilkinson RH, “Developing a WSN internet gateway for an African context”,

Int J Sens Networks, vol. 20(1), 2016. 12. Choi J, Dagefu FT, Sadler BM, Sarabandi K, “Low-Power Low-VHF Ad-Hoc Networking in Complex

Environments”, IEEE Access, vol. 5, 2017, pp. 24120–24127.

13. El-Moshrify H, Mangoud MA, Rizk M, “Gateway discovery in Ad hoc On-Demand Distance Vector (AODV) routing for internet connectivity”, Natl Radio Sci Conf NRSC, Proc, vol 2, 2007, pp. 1–8.

14. Perkins, C. E., Royer, E. M. & Das, S., “Ad hoc on demand distance vector (AODV) routing for IP version

6” Internet Draft, 2000.

883-886

143

Authors: Tejinder Kaur, Rachna Manchanda, Chanpreet Kaur

Paper

Title:

Parameters for stability of reconfigurable memory and 6T SRAM cell

Abstract: As the technology is improving, channel length of MOSFET is scaling down. In

this environment stability of SRAM becomes the major concern for future technology. Static

noise margin (SNM) plays a vital role in stability of SRAM. This paper gives an introduction

to the reconfigurable memory and 6T SRAM cell. It includes the implementation,

characterization and analysis of reconfigurable memory cell and its comparison with the

conventional 6T SRAM cell for various parameters like read margin, write margin, data

retention voltage, temperature and power supply fluctuations and depending upon these

analysis we find SNM for 6T and 8T SRAM cell. The tool used for simulation purpose is IC

Station by Mentor Graphics using 350nm technology at supply voltage of 2.5volts.

Keywords: SNM, 6T SRAM, DRV, CR, 8T SRAM

References: 1. Ken Mai, “Design and analysis of Reconfigurable Memories”, Dissertation, Stanford University, 2005. 2. Andrei Pavlov & Manoj Sachdev, “CMOS SRAM Circuit Design and Parametric Test in Nano-Scaled

Technologies”, Intel Corporation, University of Waterloo, 2008 Springer Science and Business Media B.V.,

pp: 1-202. 3. K. Mai et al., “Smart Memories: A Modular Reconfigurable Architecture,” Proceedings, International

Symposium on Computer Architecture, pp. 161-71, June 2000.

4. Ken Mai, Ron Ho, Elad Alon, Dean Liu, Younggon Kim, Dinesh Patil, and Mark A. Horowitz, “Architecture and Circuit Techniques for a 1.1-GHz 16-kb Reconfigurable Memory in 0.18 micron CMOS”, IEEE Journal

of Solid-State Circuits, vol. 40, 2005, pp:261-275.

5. Qiaoyan Yu and Paul Ampadu “Cell Ratio Bounds for Reliable SRAM Operation”, IEEE, 2006, pp: 1192-1195.

6. Kumar, A.; Qin, H.; Ishwar, P.; Rabaey, J.; Ramchandran, K.; “Fundamental Bounds on Power Reduction

during Data-Retention in Standby SRAM” ; IEEE International Symposium, vol. 27(30), 2007, pp. 1867 – 1870.

7. Debasis Mukherjee, Hemanta Kr. Mondal and B.V.R. Reddy, “Static Noise Margin Analysis of SRAM Cell

for High Speed Application”, IJCSI International Journal of Computer Science Issues, vol. 7, 2010.

8. B. Amrutur and M. Horowitz, “Speed and Power Scaling of SRAM’s,” IEEE Journal of Solid-State Circuits,

2000.

9. E. Seevink and F. List, “Static Noise Margin Analysis of MOS SRAM Cells”, Solid-State Circuits, IEEE Journal of, vol. 5, 1987, pp. 748-754.

10. L. Chang, D. Fried and J. Hergenrother, “Stable SRAM cell design for the 32 nm node and beyond”, VLSI Technology, 2005. Digest of Technical Papers. 2005 Symposium on, 2005, pp. 128-129.

887-892

Authors: Nidhi Syal, Preeti Bansal

Paper

Title:

3D NoC Network using Adaptive Algorithm for 8x8x4 Mesh

Abstract: This paper presents a qualitative analysis of 3D routing algorithm in 8x8x4 mesh

network topology. The traffic distribution in 3D routing algorithm has limited bandwidth

along vertical links. Different traffic patterns were used during simulation. The simulation is

performed on different traffic pattern. The proposed 3D algorithm has been used to perform

better in terms of latency and throughput in comparison with existing routing algorithm. The

simulation is done with synthetic traffic pattern in a 8×8×4 3D mesh system design which

shows that with existing routing algorithm the network is powerful and steady under various

traffic patterns, A weighted adaptive routing algorithm for 8×8×4 3D mesh NoC frameworks

with arbitrary traffic pattern reveals to accomplish critical execution improvement in terms of

Maximum delay and throughput with existing XYZ routing algorithm. Throughput for WARA

at packet injection ratio 0.26 is 0.0009893 and maximum delay at packet injection ratio 0.26 is

976.

Keywords: 3D NoC Mesh; Adaptive routing; Vertical interconnect; CMOS technology;

Packaging density

893-899

144

References: 1. W.J. Dally and B. Towles, “Route packets, not wires: On-chipinterconnection networks,” in Proc. DAC, 2001,

pp. 684-689.

2. I. Loi, S. Mitra, T.H. Lee, S. Fujita, and L. Benini, “A low-overhead fault tolerance scheme for TSV-based

3D network on chip links,” inProc. ICCAD, 2008, pp. 598-602. 3. A.-M. Rahmani et al., “Congestion aware, fault tolerant, and thermally

4. efficient inter-layer communication scheme for hybrid NoC-bus 3D architectures,” in Proc. NOCS, 2011, pp.

65-72 5. A. Jantsch and H. Tenhunen, Networks on Chip. Kluwer AcademicPublishers, 2003.

6. B.S. Feero and P.P. Pande, “Networks-on-chip in a three-dimensionalnvironment: a performance evaluation,”

IEEE Trans. Comput., vol. 58, no. 1, pp. 32-45, Jan. 2009. 7. H. Matsutani and M. Koibuchi,“Tightly-coupled multi-layer topologies for 3-D NoCs,” in Proc. ICPP,

2007, pp. 75-75.

8. C. Seiculescu, S. Murali, L. Benini and G. De Micheli, “Sunfloor 3D : a tool for networks on chip topology synthesis for 3D systems on chips,” inProc. DATE, 2009, pp. 9-14.

9. V.F. Pavlidis and E.G. Friedman, “3-D topologies for networks-on- chip,” IEEE Trans. VLSI Syst., vol. 15,

no. 10, pp. 1081-1090, Oct. 2007. 10. V.F. Pavilidis and E.G. Friedman, Three-dimensional IntegrationCircuit Design, Morgan Kaufmann, 2008.

11. A.-M Rahmani et al., “Power and area opitmization of 3D networks-on- chip using smart and efficient

vertical channels,” in Proc. PATMOS, 2011, pp. 278-287. 12. H. Sangki, “3D super-via for memory applications,” Micro-SystemsPackaging Initiative (MSPI) Packaging

Workshop, 2007.

13. C. Liu et al., “Vertical interconnects squeezing in symmetric 3D meshNetwork-on-chip,” in Proc. ASP-DAC, 2011, pp. 357-362.

14. K. Puttaswamy and G.H. Loh, “Thermal herding: microarchitecturetechniques for controlling hotspots in high-performance 3D-integratedprocessors,” in Proc. ISCA, 2008, pp. 251-261.

15. S. Saito et al., “MuCCRA-Cube : a 3D dynamically reconfigurableprocessor with inductive-coupling link,” in

Proc. FPL, 2009. 16. J. Lee, M. Zhu, K. Choi, J.H. Ahn, and R. Sharma, “3D network-on-chip with wireless links through

inductive coupling,” in Proc. International SoC Design Conference (ISOCC), pp.353-356, Nov. 2011.

17. S. Pasricha, “Exploring serial vertical interconnects for 3D ICs,” in Proc. DAC, 2009, pp.581-586. 18. A.-M Rahmani et al., “ARB-NET: a novel adaptive monitoring platform for stacked mesh 3D NoC

architecturs,” in Proc. ASP-DAC, 2012, pp.413-418.

19. Intel Corporation, “A touchstone delta system description,” in: IntelAdvanced Information, 1991. 20. C.J. Glass and L.M. Ni, “The turn model for adative routing,” in Proc.ISCA, 1992, pp. 278-287.

21. M. Li, Q. Zeng, and W. Jone, “DyXY – a proximity congestion-awaredeadlock-free dynamic routing method

for network on chip,” in Proc.DAC, 2006, pp. 849-852.

22. G. Ascia, V. Catania, M. Palesi, and D. Patti, “Implementation andanalysis of a new selection strategy for

adaptive routing in networks-on-chip,” IEEE Trans. Comput., vol. 57, no. 6, pp. 809-820, June. 2008.

23. S. Ma, N.E. Jerger, and Z. Wang, “DBAR: an efficient routing algorithm to support multipleconcurrent applications in networks-on-chip”, in Proc. ISCA, 2011, pp. 413-424.

24. M. Ebrahimi et al., “CATRA- congestion aware trapezoid-based routing algorithm for on-chip networks,” in

Proc. DATE, 2012, pp. 320-325. 25. S.Y. Lin et al., “Traffic-and thermal aware routing for throttled three-dimensional network-on-chip systems,”

in Proc. VLSI-DAT, 2011, pp. 1-4.

26. .Sehgal,V.K., 2015. Markovian models based stochastic communication in networks-in-package. IEEE Transactions on Parallel and Distributed Systems, 26(10), pp.2806-2821.

27. Rui Ben, Fen Ge, Xintian Tong, Ning Wu, Ying Zhang, Fang Zhou, “ A Multicast Routing Algorithm for 3D

Network-on-Chip in Chip Multi_Processors”, Proceedings of the World Congress on Engineering 2018 Vol I WCE 2018, July4-6, 2018, London, U.K..

Authors: Sunayna Khurana, Baljinder Kaur, Jaswinder Singh

Paper

Title:

The Impact of Demographic Factors on Satisfaction of Users for various Digital Payment

Methods

Abstract: There has been significant progress in the usage of digital payment methods as

alternative payment options instead of using cash. Although a majority of researches are still

focusing on factors of adoption of digital payment methods, the present work moved on to the

next level by examining users’ present level of satisfaction. Further, this work augmented by

investigating the impact of demographic factors (gender, age, education, occupation, marital

status and income) on users’ satisfaction with use of various digital payment methods in

Amritsar, Punjab, India. A structured questionnaire was used to collect the data from 163 users

of various digital payment methods. The data were analyzed using statistical techniques. The

results show a significant effect of age, gender, education, occupation, marital status and

145.

income of respondents on users’ satisfaction. The results of the present work revealed valuable

insight into users’ satisfaction with six prevailing digital payment methods vis-à-vis

demographic factors.

Keywords: Digital Payment Methods, Demographic Factors, Satisfaction, Age, Gender,

Education and Occupation.

References: 1. Izogo, E.E., Nnaemeka, O.C., Ama, O., Onuoha, Ezema, K.S., “Impact of Demographic Variables on

Consumers’ Adoption of E-banking in Nigeria: An Empirical Investigation”, European Journal of Business and

Management, vol. 4(17), 2012. ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online). 2. G. Worku G , A. Tilahun , MA Tafa,“The Impact of Electronic Banking on Customers’ Satisfaction in

Ethiopian Banking Industry (The Case of Customers of Dashen and Wogagen Banks in Gondar City)”, 4 J Bus

Fin Aff, BSFA an open access journal, vol. 5(2), 2013. ISSN: 2167-0234 3. Goh Mei Linga , Yeo Sook Ferna , Lim Kah Boona , Tan Seng Huata , “Understanding Customer Satisfaction

of Internet Banking: A Case Study In Malacca”, Fifth International Conference on Marketing and Retailing (5TH

INCOMaR), vol. 37, 2016, pp. 80-85.

4. http://cashlessindia.gov.in/digital_payment_methods.html

5. Jeanne M. Hogarth, Jane Kolodinsky, Tatiana Gabor, “Consumer payment choices: paper, plastic, or

electrons?” Int. J. Electronic Banking, vol. 1(1), 2008. 6. Muslim Amin, Sajad Rezaei, Maryam Abolghasemi, "User satisfaction with mobile websites: the impact of

perceived usefulness (PU), perceived ease of use (PEOU) and trust", Nankai Business Review International, vol.

5(3), 2014, pp.258-274.https://doi.org/10.1108/NBRI-01-2014-0005 7. Shamsher Singh and Ravish Rana, “Study of Consumer Perception of Digital Payment Mode”, Journal of

Internet Banking and Commerc, vol. 22(3), 2017. (http://www.icommercecentral.com)

8. Shraddha Parab and Supriya Bhalerao, “Choosing statistical test” ,Int J Ayurveda Res., vol. 1(3), 2010, pp. 187–191.

doi: 10.4103/0974-7788.72494

9. Siddiqui U.A. & Khan M. S., “An Exploratory Study on Effect of Demographic Factors on Consumer Satisfaction and its Determinants in E-Retailing”, Management Studies and Economic Systems (MSES), vol.

3(3), 2017, pp. 159-171.

10. T. Y Chang, “Dynamics of Banking Technology Adoption: An Application to Internet Banking”, University of Warwick workshops, the European Association for Research in Industrial Economics Conference, 2003

11. The Report of High Level Committee on Deepening of Digital Payment, 2019.

https://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/CDDP03062019634B0EEF3F7144C3B65360B280E420

AC.PDF

12. Vijay M. Kumbhar, “Alternative Banking Channels and Customers’ Satisfaction: An Empirical Study of Public

and Private Sector Banks”, International Journal of Business and Management Tomorrow, vol. 1(1), 2011. 13. Winfred Yaokumah, Peace Kumah, and Eric Saviour Aryee Okai “Demographic Influences on E-Payment

Services”, International Journal of E-Business Research, vol. 13(1), 2017.

900-905

146

Authors: Shakiv Pandit, Dr. Sumit Kaur, Ms. Lofty Saini

Paper

Title:

Automated Edge-based Segmentation and Evolutionary-SVM Algorithm of Fingertips

Bones for Radiographs

Abstract: Skeletal Bone is world-wide used to standard growth for prediction and

assessment for children in endocrinology. A survey of the various papers and found these two

methods used for BAA are GPs and TW2 (Greulich Pyle and Tanner Whitehouse) methods.

Radiograph bone of the patient matched with SR (Standard Radiographs) using Graphics and

consequences, determined in GP technique, whereas in TW2 technique scoring method is used

for assessment for BA. The clinical practice depends on the level of maturity for 20*20

features including the features based on Epiphysis, Diaphysis and Metaphysis in radius

features, Ulna, 1st and 3rd fingers and the carpal Bones, so it is difficult and time-consuming.

The major problems are time-consuming to assess the bone using clinical methods and

scanning phase challenging to predict the X-ray images. The research work has implemented a

novel method using evolutionary support vector machine method to assess the bone age based

on hand, wrist X-ray images, and resolve the issues in existing processes. To develop a

filtration and optimized feature vector extraction and selection method to smooth the hand

wrist X-ray images. To implement in-depth learning approach using ESVM to classify the

assessment rate based on the X-ray Bone Images. After that evaluation of the performance

metrics such as error rate, and Accuracy Rate and compared with the various methods. In the

proposed work’s conclusion has accurately achieved value is 98.7% and existing method

906-911

performance in 1-year assessment 98%, and 2years 97.5 %.

Keywords: Bone Age Assessment, Evolutionary Support Vector Machine, GP and TW2

Method, and Hand Wrist X-ray Images.

References: 1. Thangam, P., Mahendiran, T. V., & Thanushkodi, K, “Skeletal Bone Age Assessment-Research

Directions”, Journal of Engineering Science & Technology Review, vol. 5(1), 2012.

2. Iglovikov, V. I., Rakhlin, A., Kalinin, A. A., & Shvets, A. A, “Paediatric Bone age assessment using deep

convolutional neural networks”, In Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support. Springer, Cham, 2018, pp. 300-308.

3. Choi, J. A., Kim, Y. C., Min, S. J., & Khil, E. K, “A simple method for bone age assessment: the capitohamate

planimetry”, European radiology, vol. 28(6) , 2018, pp. 2299-2307. 4. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

5. Pietka, E., Gertych, A., Pospiech, S., Cao, F., Huang, H. K., & Gilsanz, V, “Computer-assisted bone age

assessment: Image preprocessing and epiphyseal/metaphyseal ROI extraction”, IEEE transactions on medical imaging, vol. 20(8), 2001, pp. 715-729.

6. Tristán-Vega, A., & Arribas, J. I, “A radius and ulna TW3 bone age assessment system”, IEEE Transactions on

Biomedical Engineering, vol. 55(5), 2008, pp. 1463-1476. 7. Yuh, Y. S., Liu, C. C., Chang, J. D., & Yu, S. S, “Later stage bone age assessment on hand radiographs”, In 2012

7th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE, 2012, pp. 1329-1332.

8. Hsieh, C. W., Jong, T. L., & Yang, C. S, “Development of the cloud platform for bone age assessment based on tanner and whitehouse method”, In 2013 International Conference on Machine Learning and Cybernetics IEEE,

vol. 3, 2013, pp. 1185-1188.

9. Son, S. J., Song, Y., Kim, N., Do, Y., Kwak, N., Lee, M. S., & Lee, B. D, “TW3-Based Fully Automated Bone Age Assessment System Using Deep Neural Networks”, IEEE Access, vol. 7, 2019, pp. 33346-33358.

10. Tristán-Vega, A., & Arribas, J. I, “A radius and ulna TW3 bone age assessment system”, IEEE Transactions on

Biomedical Engineering, vol. 55(5), 2008, pp. 1463-1476. 11. Thangam, P., Saravanan, R., & Thanushkodi, K, “Robust techniques for automated Bone Age Assessment”,

In 2013 International Conference on Current Trends in Engineering and Technology (ICCTET) IEEE, 2013, pp.

92-94 12. Pietka, E., Gertych, A., Pospiech, S., Cao, F., Huang, H. K., & Gilsanz, V, “Computer-assisted bone age

assessment: Image preprocessing and epiphyseal/metaphyseal ROI extraction”, IEEE transactions on medical

imaging, vol. 20(8), 2001, pp. 715-729. 13. Mora, S., Boechat, M. I., Pietka, E., Huang, H. K., & Gilsanz, V, “Skeletal age determinations in children of

European and African descent: applicability of the Greulich and Pyle standards”, International Pediatric Research

Foundation, vol. 50(5), 2001, pp. 624. 14. Mansourvar, M., Asemi, A., Raj, R. G., Kareem, S. A., Antony, C. D., Idris, N., & Baba, M. S, “A fuzzy

inference system for skeletal age assessment in living individual”, International Journal of Fuzzy Systems, vol.

19(3), 2017, pp. 838-848. 15. Schulze, P. J., & Buurman, R, “Absence of the posterior arch of the atlas”, American Journal of

Roentgenology, vol. 134(1), 1980, pp. 178-180.

16. Ohalloran, R. L., & Lundy, J. K, “Age and ossification of the hyoid bone: forensic implications”, Journal of Forensic Science, vol. 32(6), 1987, pp. 1655-1659.

17. Lee, H., Tajmir, S., Lee, J., Zissen, M., Yeshiwas, B. A., Alkasab, T. K., “Fully automated deep learning system

for bone age assessment”, Journal of digital imaging, vol. 30(4), 2017, pp. 427-441. 18. Choi, J. A., Kim, Y. C., Min, S. J., & Khil, E. K, “A simple method for bone age assessment: the capitohamate

planimetry”, European radiology, vol. 28(6), 2018, pp. 2299-2307.

19. Koitka, S., Demircioglu, A., Kim, M. S., Friedrich, C. M., & Nensa, F, “Ossification area localization in pediatric hand radiographs using deep neural networks for object detection”, PloS one, vol. 13(11), 2018.

20. Son, S. J., Song, Y., Kim, N., Do, Y., Kwak, N., Lee, M. S., & Lee, B. D, “TW3-Based Fully Automated Bone Age Assessment System Using Deep Neural Networks”, IEEE Access, vol. 7, 2019, pp. 33346-33358.

147

Authors: Arun Goel, Alka Jindal

Paper

Title:

Use of Periocular Biometric in Face Recognition

Abstract: Biometrics is a technology to identify people based on their physical and

behavioral traits. Enhancement in the field of biometrics have led to development of a trait that

is non intrusive, widely acceptable and can be captured remotely with effective features. Face

biometric is widely used trait all over world. Due to less efficiency of face biometric in non

cooperative environment, researchers suggest to use a sub region of face that is more effective.

Periocular biometric is region surrounding the eyes having modalities including eyebrows,

eyelashes, eyelids, tear duct and skin texture. This paper explores use of periocular region and

its modalities in face recognition including periocular databases and its use in future for

912-917

.

various applications.

Keywords: eyebrow, eyelash, eyelid, face, periocular, skin texture, tear duct

References: 1. U. Park, R. R. Jillela, A. Ross, and A. K. Jain, “Periocular Biometrics in the Visible Spectrum,” IEEE

Transactions on Information Forensics and Security, vol. 6(1), 2011, pp. 96–106. 2. S. Bharadwaj, H. S. Bhatt, M. Vatsa, and R. Singh, “Periocular biometrics: When iris recognition fails,” in

2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS),

2010, pp. 1–6. 3. “UBIPr, UBI Periocular Dataset.” [Online]. Available: http://socia-lab.di.ubi.pt/~ubipr/index.html.

[Accessed: 21-Mar-2019].

4. “FOCS dataset.” [Online]. Available: https://cvrl.nd.edu/projects/data/#face-and-ocular-challenge-series-focs-data-collection. [Accessed: 21-Mar-2019].

5. A. Sharma, S. Verma, M. Vatsa, and R. Singh, “On cross spectral periocular recognition,” in 2014 IEEE

International Conference on Image Processing (ICIP), 2014, pp. 5007–5011. 6. “CSIP DataSet.” [Online]. Available: http://csip.di.ubi.pt/dbase. [Accessed: 21-Mar-2019].

7. P. J. Phillips et al., “Overview of the Face Recognition Grand Challenge,” in 2005 IEEE Computer Society

Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, 2005, pp. 947–954. 8. “FERET dataset.” [Online]. Available: https://www.nist.gov/programs-projects/face-recognition-

technology-feret. [Accessed: 21-Mar-2019].

9. AR Database.” [Online]. Available: http://www2.ece.ohio-state.edu/~aleix/ARdatabase.html. [Accessed: 21-Mar-2019].

10. F. Juefei-Xu and M. Savvides, “Unconstrained periocular biometric acquisition and recognition using COTS PTZ camera for uncooperative and non-cooperative subjects,” in 2012 IEEE Workshop on the

Applications of Computer Vision (WACV), 2012, pp. 201–208.

11. R. Jillela and A. Ross, “Matching face against iris images using periocular information,” in 2014 IEEE International Conference on Image Processing (ICIP), 2014, pp. 4997–5001.

12. J. Xu, M. Cha, J. L. Heyman, S. Venugopalan, R. Abiantun, and M. Savvides, “Robust local binary pattern

feature sets for periocular biometric identification,” in 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2010, pp. 1–8.

13. J. Adams, D. L. Woodard, G. Dozier, P. Miller, K. Bryant, and G. Glenn, “Genetic-Based Type II Feature

Extraction for Periocular Biometric Recognition: Less is More,” in 2010 20th International Conference on Pattern Recognition, 2010, pp. 205–208.

14. F. Juefei-Xu and M. Savvides, “Subspace-Based Discrete Transform Encoded Local Binary Patterns

Representations for Robust Periocular Matching on NIST’s Face Recognition Grand Challenge,” IEEE Transactions on Image Processing, vol. 23(8), 2014, pp. 3490–3505.

15. D. L. Woodard, S. J. Pundlik, J. R. Lyle, and P. E. Miller, “Periocular region appearance cues for biometric

identification,” in 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, 2010, pp. 162–169.

16. A. Joshi, A. Gangwar, R. Sharma, A. Singh, and Z. Saquib, “Periocular recognition based on Gabor and

Parzen PNN,” in 2014 IEEE International Conference on Image Processing (ICIP), 2014, pp. 4977–4981. 17. M. Uzair, A. Mahmood, A. Mian, and C. McDonald, “Periocular biometric recognition using image sets,”

in 2013 IEEE Workshop on Applications of Computer Vision (WACV), 2013, pp. 246–251.

18. F. Juefei-Xu, Khoa Luu, M. Savvides, T. D. Bui, and C. Y. Suen, “Investigating age invariant face recognition based on periocular biometrics,” in 2011 International Joint Conference on Biometrics (IJCB),

2011, pp. 1–7.

19. K. Kishore Kumar and M. Pavani, “Periocular Region-Based Age-Invariant Face Recognition Using Local Binary Pattern,” in Microelectronics, Electromagnetics and Telecommunications, vol. 521, 2019, pp. 713–

720.

20. M. Uzair, A. Mahmood, A. Mian, and C. McDonald, “Periocular region-based person identification in the visible, infrared and hyperspectral imagery,” Neurocomputing, vol. 149, 2015, pp. 854–867.

21. J. Merkow, B. Jou, and M. Savvides, “An exploration of gender identification using only the periocular

region,” in 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems

(BTAS), 2010, pp. 1–5.

22. J. R. Lyle, P. E. Miller, S. J. Pundlik, and D. L. Woodard, “Soft biometric classification using periocular

region features,” in 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2010, pp. 1–7.

23. F. Juefei-Xu and M. Savvides, “Fastfood dictionary learning for periocular-based full face hallucination,”

in 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 2016, pp. 1–8.

24. B. Patel, “Evaluation of periocular features for kinship verification in the wild.” Elsevier, Jul-2017.

25. “Datasets | KinFaceW database.” [Online]. Available: http://www.kinfacew.com. [Accessed: 08-Mar-2019].

26. F. Alonso-Fernandez, J. Bigun, and C. Englund, “Expression Recognition Using the Periocular Region: A

Feasibility Study,” arXiv:1810.09798 [cs], Oct. 2018. 27. P. Lucey, J. F. Cohn, T. Kanade, J. Saragih, Z. Ambadar, and I. Matthews, “The Extended Cohn-Kanade

Dataset (CK+): A complete dataset for action unit and emotion-specified expression,” in 2010 IEEE

Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, 2010, pp. 94–

101.

28. P. E. Miller, A. W. Rawls, S. J. Pundlik, and D. L. Woodard, “Personal identification using periocular skin

texture,” in Proceedings of the 2010 ACM Symposium on Applied Computing - SAC ’10, 2010, p. 1496.

29. R. Abiantun and M. Savvides, “Tear-duct detector for identifying left versus right iris images,” in 2008 37th IEEE Applied Imagery Pattern Recognition Workshop, 2008, pp. 1–4.

30. K. Hollingsworth, K. W. Bowyer, and P. J. Flynn, “Identifying useful features for recognition in near-

infrared periocular images,” in in IEEE Int. Conf. on Biometrics: Theory, Applications, and Systems, 2010, pp. 1–8.

31. K. P. Hollingsworth, S. S. Darnell, P. E. Miller, D. L. Woodard, K. W. Bowyer, and P. J. Flynn, “Human

and Machine Performance on Periocular Biometrics Under Near-Infrared Light and Visible Light,” IEEE Transactions on Information Forensics and Security, vol. 7(2), 2012, pp. 588–601.

32. J. Kunjur, T. Sabesan, and V. Ilankovan, “Anthropometric analysis of eyebrows and eyelids: An inter-racial

study,” British Journal of Oral and Maxillofacial Surgery, vol. 44(2), 2006, pp. 89–93. 33. W.-K. Kong and D. Zhang, “Detecting Eyelash and Reflection for Accurate Iris Segmentation,”

International Journal of Pattern Recognition and Artificial Intelligence, vol. 17(6), 2003, pp. 1025–1034.

34. Yujie Dong and D. L. Woodard, “Eyebrow shape-based features for biometric recognition and gender classification: A feasibility study,” in 2011 International Joint Conference on Biometrics (IJCB), 2011, pp.

1–8.

35. T. H. N. Le, U. Prabhu, and M. Savvides, “A novel eyebrow segmentation and eyebrow shape-based

identification,” in IEEE International Joint Conference on Biometrics, 2014, pp. 1–8.

36. A. Kumar and C.-W. Tan, “Human Identification from at-a-distance Images by Simultaneously Exploiting

Iris and Periocular Features,” p. 4. 37. D. L. Woodard, S. Pundlik, P. Miller, R. Jillela, and A. Ross, “On the Fusion of Periocular and Iris

Biometrics in Non-ideal Imagery,” in 2010 20th International Conference on Pattern Recognition, 2010,

pp. 201–204. 38. A. Joshi, A. K. Gangwar, and Z. Saquib, “Person recognition based on fusion of iris and periocular

biometrics,” in 2012 12th International Conference on Hybrid Intelligent Systems (HIS), 2012, pp. 57–62.

39. “FRGC dataset.” [Online]. Available: https://cvrl.nd.edu/projects/data/#face-recognition-grand-challenge-frgc-v20-data-collection. [Accessed: 21-Mar-2019].

40. “MBGC dataset.” [Online]. Available: https://cvrl.nd.edu/projects/data/#multiple-biometric-grand-

challenge-mbgc-version-2-data-collection. [Accessed: 21-Mar-2019]. 41. “IMP Dataset.” [Online]. Available: http://www.iab-rubric.org/resources/impdatabase.html. [Accessed: 21-

Mar-2019].

42. R. Jillela and A. Ross, “Mitigating effects of plastic surgery: Fusing face and ocular biometrics,” in 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2012, pp.

402–411.

43. N. Aginako, “Periocular and iris local descriptors for identity verification in mobile applications.” Elsevier,

2017.

44. “VISOB dataset.” [Online]. Available: http://sce2.umkc.edu/cibit/dataset.html. [Accessed: 21-Mar-2019].

45. H. Patel, C. K. Modi, M. C. Paunwala, and S. Patnaik, “Human Identification by Partial Iris Segmentation Using Pupil Circle Growing Based on Binary Integrated Edge Intensity Curve,” in 2011 International

Conference on Communication Systems and Network Technologies, 2011, pp. 333–338.

46. “CASIA Databases.” [Online]. Available: http://biometrics.idealtest.org/. [Accessed: 24-Feb-2019].

Authors: Mukesh Kumar Mann, Vishal Ahlawat, Sunil Nain, Malkit Gir, Aman Beniwal

Paper

Title:

Wear and Friction Behaviour of Kans Grass Fiber/Polyester Composites

Abstract: The friction and wear behaviour of kans grass fiber (KGF) polyester composites

were examined. An amount of 0, 10, 13.35, 18 and 20.08 vol % was reinforced into the

polyester resin for composite development using hand layup technique. The tribo-test

specimens of size 4×4×50 mm were cut from the fabricated composites and tested on wear and

friction testing machine at 0.5-1.5 m/s of sliding velocity and a constant load of 5 N for 60

seconds. It was found that the neat polyester specimen possessed less wear resistance than the

KGF composites at almost all the sliding conditions. The fiber content and variation in sliding

velocity slightly influenced the friction behaviour. The increase in fiber vol% from 10 to 20.08

marginally increased the average friction coefficient of the KGF composite specimens at 0.5

m/s and 1.5 m/s whereas fluctuating behaviour was noticed at intermediate sliding velocity.

Keywords: friction and wear behaviour, kans grass fiber, polyester composites.

References: 1. A. M. Eleiche and G. M. Amin, “The effect of unidirectional cotton fibre reinforcement on the friction and

wear characteristics of polyester,” Wear, vol. 112, no. 1, pp. 67–78, 1986. 2. L. T. Drzal, A. K. Mohanty, and M. Misra, “Bio-composite materials as alternatives to petroleum-based

composites for automotive applications,” Magnesium, vol. 40, no. 60, pp. 1–3, 2001.

918-921

148

3. V. K. Thakur, M. K. Thakur, and R. K. Gupta, “raw natural fiber–based polymer composites,” International Journal of Polymer Analysis and Characterization, vol. 19, no. 3, pp. 256–271, 2014.

4. A. Nourbakhsh and A. Ashori, “Wood plastic composites from agro-waste materials: Analysis of mechanical

properties,” Bioresource technology, vol. 101, no. 7, pp. 2525–2528, 2010. 5. U. Nirmal, B. F. Yousif, D. Rilling, and P. V. Brevern, “Effect of betelnut fibres treatment and contact

conditions on adhesive wear and frictional performance of polyester composites,” Wear, vol. 268, no. 11–12,

pp. 1354–1370, 2010. 6. J. Holbery and D. Houston, “Natural-fiber-reinforced polymer composites in automotive applications,” Jom,

vol. 58, no. 11, pp. 80–86, 2006.

7. H. Ku, H. Wang, N. Pattarachaiyakoop, and M. Trada, “A review on the tensile properties of natural fiber reinforced polymer composites,” Composites Part B: Engineering, vol. 42, no. 4, pp. 856–873, 2011.

8. B. Barari et al., “Mechanical characterization of scalable cellulose nano-fiber based composites made using

liquid composite molding process,” Composites Part B: Engineering, vol. 84, pp. 277–284, 2016. 9. R. A. Ibrahim, “Tribological performance of polyester composites reinforced by agricultural wastes,”

Tribology International, vol. 90, pp. 463–466, 2015.

10. C. E. Correa, S. Betancourt, A. Vázquez, and P. Gañan, “Wear resistance and friction behavior of thermoset matrix reinforced with Musaceae fiber bundles,” Tribology International, vol. 87, pp. 57–64, 2015.

11. N. A. Nordin, F. M. Yussof, S. Kasolang, Z. Salleh, and M. A. Ahmad, “Wear rate of natural fibre: long

kenaf composite,” Procedia Engineering, vol. 68, pp. 145–151, 2013.

12. V. Ahlawat, A. Malik, and C. Singh, “Parametric Optimization and Wear Behavior of Fiber-Reinforced

Polyester Composites,” IUP Journal of Mechanical Engineering, vol. 8, no. 3, 2015.

13. V. Ahlawat, S. Kajal, and A. Parinam, “Experimental analysis of tensile, flexural, and tribological properties of walnut shell powder/polyester composites,” Euro-Mediterranean Journal for Environmental Integration,

vol. 4, no. 1, p. 1, 2019.

14. V. Ahlawat, A. Parinam, and S. Kajal, “Experimental study of tensile and flexural properties of kans grass fiber reinforced polyester composites,” 2018.

15. P. K. Bajpai, I. Singh, and J. Madaan, “Tribological behavior of natural fiber reinforced PLA composites,”

Wear, vol. 297, no. 1–2, pp. 829–840, 2013.

149

Authors: Manmeet Kaur, Surinder Singh, Preeti Bansal, Gaurav Kumar

Paper

Title:

Smart Routing with Segmental Routing mechanism for Wireless Mesh Network (WMN)

Abstract: The wireless mesh networks (WMN) are the growing mediums of connectivity for

the purpose of internet or intranet connectivity. The routing among the WMN becomes a

challenging task with the rise in the number of nodes across the network and the larger data

volumes. In this paper, the work has been carried out on the growing WMNs with the dynamic

number of nodes. The node availability aware neighbor formation and status tracking

mechanism has been applied in this scheme in order to keep the network updated about the

working nodes and to eliminate the non-functional nodes from the connected mesh network.

The neighbor query process is utilized for the path building towards the base stations (BTS) or

Sink node in the given WMN networks. Additionally; the routing information is collected from

all of the neighboring nodes towards the destination paths using the desired mechanism for the

path discovery under the segmental routing mechanism for WMN, which has been created with

the capability of handling the network path failures dynamically in the local domain of the

given network zone. The performance of the proposed model has been analyzed in the form of

energy consumption, end-to-end delay and detailed energy & packet based analysis

Keywords: Segmental routing, WMN routing, Mesh networking, Route recovery

References: 1. Kwon, Kiwoong, Minkeun Ha, Taehong Kim, Seong Hoon Kim, and Daeyoung Kim. "The stateless point to

point routing protocol based on shortcut tree routing algorithm for IP-WSN." In Internet of Things (IOT), 2012 3rd International Conference on the, 2012, pp. 167-174.

2. Bechkit, Walid, Mouloud Koudil, Yacine Challal, Abdelmadjid Bouabdallah, Brahim Souici, and Karima

Benatchba. "A new weighted shortest path tree for convergecast traffic routing in WSN." In Computers and Communications (ISCC), 2012 IEEE Symposium on, 2012, pp. 187-192.

3. Delaney, D., Russell Higgs, and G. O'Hare. "A stable routing framework for tree-based routing structures in

wsns." 2014, pp. 1-1. 4. Ghadimi, Euhanna, Olaf Landsiedel, Pablo Soldati, Simon Duquennoy, and Mikael Johansson. "Opportunistic

Routing in Low Duty-Cycled Wireless Mesh networks." ACM Transactions on Mesh networks vol. 10(4),

2014.

5. Sahin, Dilan, Vehbi Cagri Gungor, Taskin Kocak, and Gurkan Tuna. "Quality-of-service differentiation in single-path and multi-path routing for wireless mesh network-based smart grid applications." Ad Hoc

922-926

Networks, 2014.

6. Singh, Dharmendra, Shubhanjali Sharma, Vinesh Jain, and Jyoti Gajrani. "Energy efficient source based tree

routing with time stamp in WSN." In Signal Propagation and Computer Technology (ICSPCT), 2014

International Conference on, 2014, pp. 120-124. 7. Tunca, Can, Sinan Isik, M. Donmez, and Cem Ersoy. "Distributed Mobile Sink Routing for Wireless Mesh

networks: A Survey." 2014, pp. 1-21.

8. Chakraborty, Dibakar. "i-QCA: An intelligent framework for quality of service multicast routing in multichannel multiradio wireless mesh networks." Ad Hoc Networks vol. 33, 2015, pp. 221-232.

9. Lall, Shruti, B. T. J. Maharaj, and PA Jansen van Vuuren. "Null-frequency jamming of a proactive routing

protocol in wireless mesh networks." Journal of Network and Computer Applications, 2015.

10. Lai, I-Wei, Wen-Chung Kao, and Nobuo Funabiki. "Cross-layer selective routing for active access-point

minimization in wireless mesh network." InConsumer Electronics-Taiwan (ICCE-TW), 2015 IEEE International Conference on, 2015, pp. 482-483.

11. Al-Saadi, Ahmed, Rossitza Setchi, Yulia Hicks, and Stuart M. Allen. "Routing Protocol for Heterogeneous Wireless Mesh Networks." IEEE Transactions on Vehicular Technology, vol. 65 (12), 2016, pp. 9773-9786.

12. Zhou, Anfu, Min Liu, Zhongcheng Li, and Eryk Dutkiewicz. "Joint Traffic Splitting, Rate Control, Routing,

and Scheduling Algorithm for Maximizing Network Utility in Wireless Mesh Networks." IEEE Transactions

on Vehicular Technology, vol. 65(4), 2016, pp. 2688-2702.

13. Murugeswari, R., S. Radhakrishnan, and D. Devaraj. "A multi-objective evolutionary algorithm based QoS

routing in wireless mesh networks." Applied Soft Computing, vol. 40, 2016, pp. 517-525.

14. Sakamoto, Shinji, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, and Fatos Xhafa. "Implementation of a New

Replacement Method in WMN-PSO Simulation System and Its Performance Evaluation." In Advanced Information Networking and Applications (AINA), 2016 IEEE 30th International Conference on, 2016, pp.

206-211.

15. Hassan, Sharma, Singh “Detection and Mitigation of Selfish Node in Wireless Mesh Networks (WMN’s)” international journal of technology and computing (ijtc), ISSN-2455-099X, vol. 5(5), 2019.

150

.

Authors: Alankrita Aggarwal, Kanwalvir Singh Dhindsa, P. K. Suri

Paper

Title:

Usage Patterns and Implementation of Random Forest Approach for Software Risk and

Bugs Predictions

Abstract: The software bugs predictions whereby the datasets of different types of bugs are

evaluated for further predictions. In this research manuscript, the pragmatic evaluation of

random forest approach is done and compared with results with traditional artificial neural

networks (ANN) so that the results can be compared. From the outcome, the extracts from

random forest are better on the accuracy level with the test datasets used in a specific format.

The process of Random Forest (RF) Approach is adopted in this work that gives the effectual

outcomes in most of the cases as compared to ANN and thereby the usage patterns of RF are

performance aware. The paradigm of RF is used widely for the engineering optimization to

solve the complex problems and generation of the dynamic trees. The outcomes and results

obtained and presented in this work is giving the variations in favor random forest based

optimization for the software risk management and predictive mining. The need of the

proposed work and background of the study includes the effective and performance based

software bugs detection. The current problem addressed includes the accuracy and multi-

dimensional evaluations. The key methodology adopted here to solve the existing problem is

the integration of Random Forest approach and the findings are quite effective and cavernous

in assorted aspects.

Keywords: Artificial Neural Network, Random Forest Approach, Software Risk

Management, Software Risk Prediction, Soft Computing for Software Bugs Prediction

References: 1. Yavari, M. Zavvar, S. M. Mirhassannia, M. R. Nehi, A. Yanpi, and M. H. Zavvar, “Classification of Risk in

Software Development Projects using Support Vector Machine”, Journal of Telecommunication Electronics

Computer Engineering, vol. 9(1), 2017, pp. 1–5.

2. D. Greer, E. E. Odzaly, and D. Stewart, “Agile risk management using software agents”, Journal of Ambient Intelligence and Humanized computing, vol. 9(3), 2018, pp. 823-841.

3. F. Lu, H. Bi, M. Huang, and S. Duan, “Simulated Annealing Genetic Algorithm Based Schedule Risk

Management of IT Outsourcing Project”, Mathematical Problems in Engineering, 2017, pp. 1-17. 4. M. Tießler, D. M. Fernández, M. Kalinowski, M. Felderer, and M. Kuhrmann, “On Evidence-based Risk

Management in Requirements Engineering,”, International Conference on Software Quality, 2018, pp. 39–59.

5. T. Rauter, N. Kajtazovic, and C. Kreiner , “Asset-Centric Security Risk Assessment of Software Components,” 2nd International workshop on MILS: Architecture and Assurance for Secure Systems, 2016, pp. 1-17

6. Abdelrafe MS, ”Managing Software Project Risks Using Stepwise and Fuzzy Regression Analysis Modeling

927-932

Techniques”, 2016.

7. C. Krishna and K. Subrahmanyam, “A Decision Support System for Assessing risk using Halstead approach and

Principal Component Analysis,”, vol. 9(4), 2016, pp. 3383–3387.

8. P. Purandare, “An entropy based approach for risk factor analysis in a software development project” International Journal of Applied Engineering Res., vol. 11(4), 2016, pp. 2258–2262.

9. M. Choetkiertikul, H. K. Dam, T. Tran, and A. Ghose, “Predicting delays in software projects using networked

classification,”, Proc. - 2015 30th IEEE/ACM International Conference of Automation Software engineering , ASE 2015, 2016, pp. 353–364.

10. Elzamly, B. Hussin, S. S. A. Naser, and M. Doheir, “Predicting Software Analysis Process Risks Using Linear

Stepwise Discriminant Analysis: Statistical Methods,” Int. J. Adv. Inf. Sci. Technol., vol. 38(38), 2015, pp. 108–115.

11. Mohanty, R., & Ravi, V, “Machine Learning Techniques to Predict Software Defect. In Artificial Intelligence:

Concepts, Methodologies, Tools, and Applications”, IGI global, 2017, pp. 1473-1487. 12. Singh, R., Raja, R., & Chopra J, ” Software Defect Prediction Using Averaging Likelihood Ensemble

Technique”, 2017

13. Ali, M. M., Huda, S., Abawajy, J., Alyahya, S., Al-Dossari, H., & Yearwood, J. A, ” Parallel framework for software defect detection and metric selection on cloud computing”, Cluster Computing, vol. 20(3), 2017, pp.

2267-2281.

14. Osman, H., Ghafari, M., & Nierstrasz, O, “Automatic feature selection by regularization to improve bug

prediction accuracy.”, In Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE), IEEE

Workshop on IEEE, 2017, pp. 27-32.

15. Maddipati, S. S., Pradeepini, G., & Yesubabu, A, ” Software Defect Prediction using Adaptive Neuro Fuzzy Inference System.” International Journal of Applied Engineering Research, vol. 13(1), 2018, pp. 394-397.

16. Lalit Mohan Goyal, Mamta Mittal, Iqbaldeep Kaur, Sumit Kaur, Amit Verma, D. Jude Hemanth, “Performance

Enhanced Growing Convolutional Neural Network Based Approach for Brain Tumor Segmentation in Magnetic Resonance Brain Images”, Applied Soft Computing, (SCIE Indexed journal), 4.004 (Second Revision Submitted)

17. Xuan, J., Jiang, H., Hu, Y., Ren, Z., Zou, W., Luo, Z., & Wu, X, ”Towards Effective Bug Triage with Towards

Effective Bug Triage with Software Data Reduction Techniques”, arXiv preprint, 2017. arXiv: 1704.04761

151

.

Authors: Ajit Singh, Sultan Ahmad, Mohammad Imdadul Haque

Paper

Title:

Big Data Science and EXASOL as Big Data Analytics tool

Abstract: Big data and Data science are the two top trends of recent years. Both can be

combined together as big data science. This leads to the demand for new system architectures

which facilitates the development of processes which can handle huge data volumes without

deterring the agility, flexibility and the interactive feel which suits the exploratory approach of

a data scientist. Businesses today have found ways of using data as the principal factor for

value generation. These data-driven businesses apply a variety of data tools as data analysis is

one of the chief elements in this process. In order to raise data science to the new

computational level that is required to meet the challenges of big data and interactive advanced

analytics, EXASOL has introduced a new technological approach. This tool enables us more

effective and easy data analysis.

Keywords: Big Data Science, EXASOL, Big Data, Data Science.

References:

1. Chen, J., Chen, Y., , Xiaoyong D.U., Cuiping L.I., Jiaheng L.U. ,Suyun Z., Xuan Z., “Big

data challenge: a data management perspective”, Front. Comput. Sci., vol. 7(2), 2013, pp. 157–164.

2. Kalra, B., Yadav, S., and Chauhan, D.K. . “A Review of Issues and Challenges with Big Data”, International

Journal of Computer Science and Information Technology Research, vol. 2(4), 2014, pp.97-101. 3. Jaseena K.U and David, J.M., “Issues, Challenges, and Solutions: Big Data Mining”, Computer Science &

Information Technology, 2014, pp. 131–140.

4. Fan, J.,Han, F., Liu, H., “Challenges of Big Data analysis . National Science Review”, vol. 1, 2014 , pp. 293–314. 5. Mandale, A. and Gadage, S., “Big Data Analytics: Challenges, Tools”. International Journal of Innovative

Research in Computer Science & Technology, vol. 3(3), 2015, pp. 10-14.

6. Jin, X., Wah, B.W., Cheng, X., and Wang, Y., “Significance and Challenges of Big Data Research”, Big Data Research, vol. 2, 2015, pp. 59–64.

7. Kubina, M., Varmus, M., and Kubinova, I., “Use of big data for competitive advantage of company” Procedia

Economics and Finance, vol. 26, 2015, pp. 561-565. 8. Pai, V. “Big Data New Challenges, Tools and Techniques”, International Journal of Engineering Research and

Modern Education, vol. 1(1), 2016, pp. 743-750.

9. Mohan, A. Big Data Analytics: Recent Achievements and New Challenges. International Journal of Computer Applications Technology and Research, vol. 5(7), 2016, pp. 460-464.

933-937

10. Schroeder, R. “Big data business models: Challenges and opportunities”. Cogent Social Sciences, vol. 2, 2016, pp.

1-15.

11. Jelonek, D. “Big data analytics in the Management of Business”. MATEC Web of Conferences, vol. 125, 2017.

12. Alsghaier, H., Akour, M., Shehabat, I., and Aldiabat. S., “The importance of big data analytics in business: A case study”, American Journal of Software Engineering and Applications, vol. 6(4), 2017, pp. 111-115.

13. Tukkoji, C and Seetharam, “A Comprehensive Survey on Big-Data Issues, Challenges and Management

Approaches on Cloud Environment”, International Journal of Advanced Research in Computer and

Communication Engineering, vol. 6(2), 2017.

14. Naganathan, V, “Comparative Analysis of Big Data, Big Data Analytics: Challenges and Trends”, International

Research Journal of Engineering and Technology, vol. 5(5), 2018, pp. 1948-1964. 15. Rahaman.A., Rajesh. S, Rani, G., “Challenging tools on Research Issues in Big Data Analytics” International

Journal of Engineering Development and Research, vol. 6(1), 2018, pp. 637-644.

16. https://www.exasol.com/en/community/resources/resource/a-peek-under-the-hood/ Whitepaper: EXASOL :A Peek Under The Hood

17. https://www.exasol.com/en/community/resources/resource/a-drill-down-into-exasol/ Whitepaper : A Drill-Down

into EXASOL

152.

Authors: Rakhi Sharma, Dr. Sukhdeep Kaur, Dr. P N Hrisheekesha, Dr. Pooja Sahni

Paper

Title:

TREE shape micro-strip Antenna using stack layer DGS

Abstract: This paper describes a tree structure antenna with defected ground structure &

CPW feeding. In this proposed antenna, Swasthik layer defected ground structure has been

considered to achieve wide-band & ultra-wideband (UWB) characteristics for impedance

matching. The simulation bandwidth matching from S11<-10dB and frequency from 5GHz-

20GHz. The Swasthik shape antenna is designed for the enhancement of multiband frequency

applicable for L-band, D-band & SHF-band. The antenna performance evaluating the dense

antenna that is applicable for portable communication devices.

Keywords: defected ground structure, CPW feeding, microstrip antenna, FR4 epoxy

References:

1. ParulDawar, N. S. Raghava, Asok De. “UWB Metamaterial-Loaded Antenna for C-Band Applications”,

International Journal of Antennas and Propagation, 2019

2. Tale Saeidi, Idris Ismail, Wong Peng Wen, Adam R. H. Alhawari, Ahmad Mohammadi. “Ultra-Wideband Antennas

for Wireless Communication Applications”, International Journals of Antennas and Propagation, 2019

3. A. Nouri, G. R. Dadashzadeh. “A Compact UWB Band-Notched Printed Monopole Antenna With Defected Ground Structure”, IEEE Antennas and Wireless Propagation Letters, 2011

4. D. Guha, M. Biswas, Y.M.M Antar. “Microstrip Patch Antenna With Defected Ground Structure for Cross

Polarization Supression”, IEEE Antennas and Wireless Propagation Letters, 2005 5. Pei, Jing, An Guo Wang, and Wen Leng. “A Novel Arc-Shaped Printed Antenna for WLAN Applications”, Applied

Mechanics and Materials, 2011

6. Geetanjali Singla, Rajesh Khana. “Modified CPW-fed rotated E-slot antenna for LTE/WiMAX applications”, International Journal of Microwave and Wireless Technologies, 2014

7. SonaliKatoch, Harshita Jotwani, ShuchismitaPani, AsmitaRajawat. “A Compact dual band antenna for IOT

applications”, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT),2015 8. AshnaKakkar, Nirdosh, Shalini Sah. “A tri-band circular patch microstrip antenna with different shapes in DGS for

Ku and K applications”, 2017 2nd International Conference on

9. Anil Kr Gautam, SwatiYadav, Binod Kr Kanaujia. “A CPW-Fed Compact UWB Microstrip Antenna”, IEEE Antennas and Wireless Propagation letters, 2013

10. “Table of contents”, IEEE Transactions on Antenna and Propagation, 2018

938-943

Authors: Ankur Singhal, Vinay Bhatia, Abhishek Sharma

Paper

Title:

Optical Networks for Optimized and cost effective Performance

Abstract: Recently there is rapid increase of multimedia applications in the access networks.

The focus of this paper is to suggest a novel system architecture that can provide efficient and

cost effective solutions for the access networks. To offer economical solutions with higher

bandwidth optical networks are designed with passive components. In the presented system,

512 subscribers can access information for aggregated system line rate of 80Gbps. Proposed

frameworks are subjected to intensive investigation in terms of Modulation Format, External

Modulator, Photo Detector so that system architectures perform at an optimized level. Also, the

access network is designed without the use of reach extender devices like optical amplifier or

153

repeater so that installation and the recurring cost are minimized.

Keywords: Access networks, Central office, Cost, Modulation formats, Optical networks,

References: 1. Kulkarni, S., andSayed, M., “FTTH based Broadband Access Technologies: Key Parameters for Cost Optimized

Network Planning,” Bell Labs Technical Journal, 14 (04), (2010), pp. 297-310. 2. Breuer, D.,Geilhardt, F.,Hulsermann, R., Kind, M., Lange, C.,Monath,T., andWeis, E. “Opportunities for Next-

Generation Optical Access,” IEEE Communications Magazine, 49 (02), (2011),pp. S16-S24.

3. Arevalo, G., Hincapie, R., and Gaudino, R., “Optimization of Multiple PON Deployment Costs and Comparison between GPON, XGPON, NGPON2 and UDWDM PON,”Optical Switching and Networking, 25, (2017), pp. 80-

90.

4. Goyal, R., and Kaler, R.S., “A Novel Architecture of Hybrid (WDM/TDM) Passive Optical Networks with Suitable Modulation Format,” Optical Fiber Technology, 18(06), (2012), pp. 518-522.

5. Dixit, A.,Lannoo, B.,Das, G.,Colle, D., Pickavet, M.,andDemeester, P., “Flexible TDMA/WDMA Passive Optical

Network: Energy Efficient Next-Generation Optical Access Solution,” Optical Switching and Networking,10 (04), (2013), pp. 491-506.

6. Urban, P.J.,Pluk, E.G.C.,Laat, M.M.,Huijskens, F.M.,Khoe, G.D.,Koonen, A.M.J.,and Waardt, H., “1.25-Gbps

Transmission over an Access Network Link with Tunable OADM and a Reflective SOA,” Photonics Technology Letters, 21 (06), (2009), pp. 380-382.

7. Kaur, A.,Singh, M.L.,and Sheetal, A., “Simulative Analysis of Co-Existing 2.5 G/10G Asymmetric XG-PON

System using RZ and NRZ Data Formats,” Optik-International Journal of Light and Electron Optics, 125 (14), (2014), pp. 3637-3640.

8. Pandey, G.,andGoel, A., “Performance Analysis of Symmetrical 10 Gbps Colorless WDM-PONusing Subcarrier Modulated Downstream and Wavelength Converted Upstream through RSOA,” Optik-International Journal of

Light and Electron Optics, 125 (17), (2014), pp. 4951-4954.

9. Nhat, N.D.,Elsherif, M.A., Minh, H.L.,and Malekmohammadi, A., “NRZ versus RZ over Absolute added Correlative Coding in Optical Metro Access Networks,” Optics Communications, 387, (2017), pp. 30-36.

10. Elmagzoub, M.A.,Mohammad, A.B.,Shaddad, R.Q., and Gailani, S.A., “Physical Layer Performance Analysis of

Hybrid and Stacked TDM-WDM 40G-PON for Next Generation PON,” Optik-International Journal of Light and Electron Optics, 125 (20), (2014), pp. 6194-6197.

11. Yin, A.,Li, L.,and Zhang, X., “Analysis of 2.5 Gbit/s GPON Downlink Optical-Receiver Performance,” Optics

Communications, 282 (02), (2009), pp. 198-203. 12. Anuar, M.S.,Aljunid, S.A.,Arief, A.R.,and Saad, N.M., “PIN versus Avalanche Photodiode Gain Optimization in

Zero Cross Correlation Optical Code Division Multiple Access System,” Optik-International Journal of Light and

Electron Optics, 124 (04), , (2013), pp. 371-375.

944-948

154

Authors: Akanksha Gaur, Mohammad Arif

Paper

Title:

Software Test Suite Minimization using Ant Colony Optimization

Abstract: In the fast pacing technological era, the key to a successful software industry is

quick delivery of high quality software to the clients. This high quality is achieved by

performing software testing on the product. The high quality product ensures stakeholder’s

satisfaction which in turn spreads good word about the software industry making it a success.

In this paper, we will focus on the problems faced during regression testing and how the same

can be handled. Regression testing is a critical activity done during the software maintenance

phase of the software development cycle. However, it has countless underlying issues like

effective test case generation and prioritization, etc which need to be dealt with. These issues

demand effort, time and cost of the testing. Different techniques and methodologies have been

proposed for taking care of these issues. Use of Ant Colony Optimization (ACO) for test suite

minimization has been an area of interest for many researchers. This paper presents an

implementation of ACO for test suite minimization, showcasing how arbitrary nature of ACO

helps choose an optimal solution to the problem.

Keywords: Analysis, Ant Colony Optimization, Software testing, Test suite minimization

References: 1. G.M. Kapfhammer, “Software Testing,” Chapter in book, Department of Computer Science, Allegheny College,

June 2003. 2. Basu, Anirban (2015). Software Quality Assurance, Testing and Metrics. PHI Learning, ISBN 978-81-203-5068-7.

3. S. Yoo. and M. Harman, “Regression testing minimization, selection and prioritization: a survey.” , Software

Testing Verification and Reliability, 2010. doi: 10.1002/stvr.430.

949-953

4. E. Engström, P. Runeson, "A Qualitative Survey of Regression Testing Practices," Lecture Notes on Computer Science (LNCS), Springer Verlag, 2010, pp. 3-16.

5. Caro, G. Di and Dorigo, M., “AntNet: Distributed stigmergetic control for communications networks” Journal of

Artificial Intelligence Research, vol. 9, 1998, pp. 317-365. 6. M. Dorigo, V. Maniezzo, and Colorni, A. “Ant System: Optimization by a colony of cooperating agents” IEEE

Transactions on Systems, Man and Cybernetics, vol. 3(26), 1996, pp. 29-41.

7. L. Marsh, C. Onof, “Stigmergic epistemology, stigemergic cognition”, Cognitive Systems Research, vol. 9, 2008, pp. 136.

8. A. Ramarajan, S. Usha “Diversity Based Genetic Algorithm for Efficient Test Case Selection”, International

Journal of Advanced Research in Computer and Communication Engineering, vol. 5(4), 2016. 9. B. Suri, S. Singhal “Evolved regression test suite selection using BCO and GA and empirical comparison with

ACO”, CSIT, vol. 3(2–4), 2015, pp. 143–154.

10. M. Arif, K. I. Rahmani “Adaptive ARA (AARA) for MANETs”, IEEE Xplore in the Proceedings of 3rd Nirma University International Conference on Engineering [NUiCONE 2012], 2012. ISBN 978-1-4673-1720-7.

11. M. Arif, T. Rani. “ACO based Routing for MANETs”, International Journal of Wireless & Mobile Networks

(IJWMN). vol. 4(2),2012, pp. 163-174. ISSN: 0975 - 3834[Online]; 0975 - 4679 [Print]. 12. M. Arif, T. Rani. “Enhanced Ant Colony based Routing in MANETs”. Proceedings of 5th IEEE International

Conference on Advanced Computing & Communication Technologies [ICACCT-2011], 2011, pp. 48-54. ISBN

81-87885-03-3.

13. H. Li and C. Peng Lam, “Software Test Data Generation Using Ant Colony Optimization,” Transactions on

Engineering, Computing and Technology, 2005.

14. R.S. Parpinelli, H.S. Lopes, and A.A. Freitas, “Data mining with an ant colony optimization algorithm,” IEEE Transactions on Evolutionary Computation, vol. 6, 2002, pp. 321–332.

15. P. Zhao, P. Zhao, and X. Zhang, “New Ant Colony Optimization for the Knapsack Problem,” Proceedings of the

7th International Conference on Computer-Aided Industrial Design and Conceptual Design, 2006, pp 1-3. 16. K. Doerner, W.J. Gutjahr, “Extracting Test Sequences from a Markov Software Usage Model by ACO,”

Proceedings of GECCO 2003, LNCS Springer-Verlag Berlin Heidelberg, vol. 2724, 2003, pp. 2465-2476.

17. F.P. McMinn, M. Holcombe, “The State Problem for Evolutionary Testing,” Proceedings of GECCO 2003, LNCS, Springer Verlag, vol. 2724, 2003, pp. 2488-2500.

18. B. Suri and S. Singhal, “Implementing Ant Colony Optimization” for Test Case Selection and Prioritization”,

International Journal on Computer Science and Engineering, vol. 3(5), 2011, pp. 1924-1932. 19. L. M Goyal, M. Mittal and J. K.. Sethi, “Fuzzy Model Generation using Subtractive and Fuzzy C–Means

Clustering”, CSI Transaction on ICT, Springer, 2016, pp 129-133

20. A. Saxena, M. Mittal and L.M. Goyal, “Comparative Analysis of Clustering Methods”, International Journal of Computer Applications, vol.118(21), 2015, pp. 30-35.

21. M. Mittal, L.M. Goyal, D. J. Hemanth and J. K. Sethi, “Clustering Approaches for High-Dimensional Databases:

A Review”, WIREs Data Mining KnowlDiscov, John Wiley & Sons, 2019, pp. 1-14. DOI: 10.1002/widm.1300

22. M. Mittal, L.M. Goyal, J. K. Sethi and D.J. Hemanth, “Monitoring the Impact of Economic Crisis on Crime in

India Using Machine Learning”, Computational Economics, Springer, 2018, pp. 1-19.

23. Rajesh Singh, Anita Gehlot, Mamta Mittal, Rohit Samkaria and Sushabhan Choudhury, “Application of iCloud and Wireless Sensor Network in Environmental Parameter Analysis”, International Journal of Sensors, Wireless

Communications and Control, vol 7(3), 2018, pp. 170-177.

24. Singh A., Mittal M., Kapoor N, “Data Processing Framework Using Apache and Spark Technologies in Big Data” Big Data Processing Using Spark in Cloud. Studies in Big Data, vol 43, 2018, pp 107-122.

25. Mamta Mittal, D. Jude Hemanth, Valentina Emilia Balas and Ragavendra Kumar, “BigData for Parallel

Computing” Advances in Parallel Computing Series ,IOS Press, 2018. 26. Mamta Mittal, Lalit Mohan Goyal, Jasleen Kaur Sethi and D Jude Hemanth, “Monitoring the Impact of Economic

Crisis on Crime in India Using Machine Learning”, Computational Economics, Springer , 2018, pp. 1-19.

27. Goyal L. M., M. Mittal and Sethi, J. K., “Fuzzy Model Generation using Subtractive and Fuzzy C–Means Clustering”, CSI Transaction on ICT, Springer, 2016, pp 129-133

28. Nidhi Beniwal, Mittal M., Goyal L.M. & Monika, “Enhance Ad-hoc On-Demand Distance Vector Routing Protocol”, Indian Journal of Computer Science and Engineering, vol 8 (3), 2017, pp. 463-469.

29. Aakash Saini, Mamta Mittal, Shweta Singh, “An FPGA Based Efficient Surveillance System: A Split Processing

Approach”, International Journal of Imaging and Robotics, vol. 18(3), 2018. 30. Shivani Chauhan, Mamta Mittal, Aakash Saini, “Microstrip Patch Antenna: A Design to Study the Parametric

Trade-off”, International Journal of Research, vol. 4(14), 2017, pp 2646- 2654. ISSN 2348-6848

Authors: Nikhat Azhar, Mohd. Haroon

Paper

Title:

Dynamic Load balancing by Round Robin and Warshall Algorithm in Cloud Computing

Abstract: Cloud Computing is a well- known technology that delivers scalable, fault–

tolerant, consistent, secure and reliable computational services. Cloud figure out grants its

services in subscriptions means user have to pay as much they use. Due to the continuously

progressing and increasing area, cloud figure out is a very good topic for researchers. The main

area of interest in cloud figure out is virtualization, collates, software defined network, network

function virtualization and many more. There are limited load collates algorithms are used in

155

cloud, and all algorithms having its own advantages and disadvantages. This is the requirement

of time to invent a new efficient algorithm in load collate in cloud figure out, through which

we can get maximum throughput, minimum response time, etc. Here in this research paper

authors are proposing a new approach of dynamic load collate, which mainly depends on the

distance between datacenter to host. Simulation is done by CloudSim toolkit. Authentication

and effectiveness of the proposed load collate algorithm are checked by comparative analysis

with existing load collate algorithm.

Keywords: load collate, cloud figure out, host, virtual machine, cloud simulator

References: 1. Rajat1, Dr. Sanjeev Kumar, ”cloud based load balancing architecture: a study”, IJCSE March 2017-Sept, vol. 8(2)

, 2017, pp.112-116. 2. Aanjey Mani Tripathi*, Sarvpal Singh. “A literature review on algorithms for the load balancing in cloud

environments and their future trends" , Computer Modelling & New Technologies 2017, vol. 21(1), 2017, pp 64-

73,

3. Kumar Mishra, "needs, objective and major challenges in cloud-A Systematic review", International Journal of

Computer Applications, vol.. 131(18), 2017.

4. Shreedhar g. Domanal, G. Ram Mohana reddy.”Optimal Load Balancing in cloud computing by efficient utilization of virtial machine”. 978-1-4799-36309/14@ IEEE 2014.

5. Ritu Garg, Mamta Mittal, Le Hoang Son , “Reliability and Energy Efficient Workflow Scheduling in Cloud

Environment”, Cluster Computing, 2019, pp. 1-15 6. Ponam Kumari, mohit Saxena, “A round robin based load approach Scalable demands and maximized resourse

availability ”, International Journal of engineering and Computer science, ISSN: 2319-7242, Val. 5(8), 2016 . 7. Geethu Gopinath PP(1), Shriram K.Vasudevan, "An in-depth analysis and study Load technique in the Cloud

environment". ELSEVIER 2015.

8. Prashant Maheta, "utilizing round robin Concept for load balancing algorithm at virtual machine level in cloud environment", conference paper in International Journal of Computer Application, May 2014, Doi:

10.5120/16332-5612.

9. Divya Chaudhry, Rajinder Singh chiller. " A New Load technology in cloud environment" International

journal of computer application, vol. 69(23), 2013.

10. Hamid Shoja, Hossein Nahid, Reza Azizi, “A Comparative Survey on Load Balancing Algorithms in Cloud ”, 5th ICCCNT 2014, 2014, pp.11- 13, IEEE – 33044

11. Supreeth S 1, Shobha Biradar 2, “Scheduling Virtual Machines for Load balancing in Cloud Platform”,

International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064, vol. 2(6), 2013. 12. Nikhat Azhar, Mohd Haroon,” A Novel Method for Load Balancing In Cloud Computing: Round Robin with

Floyd-Warshall Algorithm”. International Journal of Science and Research(IJSR), vol. 8(2), 2019.

. Akinniyi Ojo∗, Ngok-Wa Ma∗, Isaac Woungang, “Modified Floyd-Warshall Algorithm for Equal Cost Multipath

in Software-Defined Data Center", IEEE ICC 2015-Workshop on advance in software-defined and context-aware

cognitive networks 2015 (IEEE SCAN-2015). 14. Rajkumar Buyya, Rajiv Ranjan and Rodrigo N.Calheiros, “Modeling and Simulation of Scalable Cloud

Environments and the Clouds Toolkit: Challenges and Opportunities”. published online 24 August in Wiley

Online Library, vol. 41(1), 2011, pp. 23–50. 15. Komal Mahajan*, Ansuyia Makroo* and Deepak Dahiya *, "Round Robin with Server Affinity: A VM Load

balancing Algorithm for Cloud-Based Infrastructure". J Inf Process Syst, vol. 9(3)

954-964

Authors: Loveleen Kaur, Dr.Rajbir Kaur, Dr.Navroop Kaur

Paper

Title:

Energy Efficient Decision based Routing Technique using Fog Computing Paradigm

Abstract: In the era of new technologies, Fog computing becomes very popular in today’s

scenario. Fog computing paradigm brings a concept that extends cloud computing to the edge

and close proximity to the Internet of Things (IoT) network. The fundamental components of

fog computing are fog nodes. Additionally, fog nodes are energy efficient nodes. Numerous

fog nodes are deployed in the associated fields that will handle the Internet of Things (IoT)

sensors computation. Meanwhile, the Internet of Things (IoT) faces challenges, among which

energy efficiency is one of the most prominent or critical challenges in the current scenario.

However, sensor devices are an energy constraint that creates hotspot during the routing

process. For this reason, to handle such constraints, this paper presents an effective hotspot

mechanism using fog nodes that demonstrate the routing process and directed the sensors to

choose the routing path as selected by the fog node. Moreover, fog node will act as a decision

156

maker node and maintain the energy efficiency of sensors during the routing as fog nodes are

energy efficient nodes. As it moves towards the emergency situation, the most appropriate and

effective routing approach has been designed who maintain the energy level of sensors will be

high during the routing process. The proposed routing technique could be better performance

for the sake of efficient routing in terms of energy consumption and prolonging network

lifetime.

Keywords: Fog Computing, IoT, Energy Consumption, Fog nodes and Hotspot.

References: 1. O. Bello and S. Zeadally, “Intelligent Device-to-Device Communication in the Internet of Things,”

Ieeexplore.Ieee.Org, vol. 10, no. 3, pp. 1–11, 2015.

2. Kevin, “That ‘internet of things’ thing,” RFID J., vol. 22, no. 7, pp. 97–114, 2009. 3. K. Gusmeroli, S., Haller, S., Harrison, M., Kalaboukas, K., Tomasella, M., Vermesan, O., & Wouters, Vision

and challenges for realizing the internet of things, vol. 1, no.

APRIL. 2009.

architectural elements, and future directions,” Futur. Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.

4. S. Engineering, M. Program, G. Square, and E. Zayed, “An Energy-Efficient Multi-Objective Scheduling Model

for Monitoring in Internet of Things,” vol. 4662, no. c, pp. 1–12, 2012.

5. W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge Computing: Vision and Challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, 2016.

6. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture,

Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet Things J., vol. 4, no. 5, pp.

1125–1142, 2017. 7. S. He, J. Chen, and Y. Sun, “Coverage and connectivity in duty-cycled wireless sensor networks for event

monitoring,” IEEE Trans. Parallel Distrib. Syst., vol. 13, no. 3, pp. 475–482, 2012.

8. P. Kamalinejad, C. Mahapatra, Z. Sheng, S. Mirabbasi, V. C. M. Leung, and Y. L. Guan, “Wireless energy harvesting for the Internet of Things,” IEEE Commun. Mag., vol. 53, no. 6, pp. 102–108, 2015.

9. N. Kaur and S. K. Sood, “An Energy-Efficient Architecture for the Internet of Things (IoT),” IEEE Syst. J., pp.

1–10, 2015. 10. M. Dong, K. Ota, and A. Liu, “RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless

Sensor Networks,” IEEE Internet Things J., vol. 3, no. 4, pp. 511–519, 2016.

11. Y. Bi, L. Sun, J. Ma, N. Li, I. A. Khan, and C. Chen, “HUMS: An autonomous moving strategy for mobile sinks in data-gathering sensor networks,” Eurasip J. Wirel. Commun. Netw., vol. 2007, 2007.

12. R. Mahmud, R. Kotagiri, and R. Buyya, “Fog Computing: A Taxonomy, Survey and Future Directions,” pp. 1–

28, 2016. 13. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and Its Role in the Internet of Things,” Proc.

first Ed. MCC Work. Mob. cloud Comput., pp. 13–16, 2012. 14. A. Dastjerdi, R. B.- Computer, and undefined 2016, “Fog computing: Helping the Internet of Things realize its

potential,” Ieeexplore.Ieee.Org, 2016.

15. C. C. Byers, “Architectural Imperatives for Fog Computing: Use Cases, Requirements, and Architectural Techniques for Fog-Enabled IoT Networks,” IEEE Commun. Mag., vol. 55, no. 8, pp. 14–20, 2017.

16. P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: architecture, key technologies, applications

and open issues,” J. Netw. Comput. Appl., vol. 98, pp. 27–42, 2017. 17. M. Aazam and E. N. Huh, “Fog Computing: The Cloud-IoT/IoE Middleware Paradigm,” IEEE Potentials, vol.

35, no. 3, pp. 40–44, 2016.

18. M. Hajibaba and S. Gorgin, “A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing,” J. Comput. Inf. Technol., vol. 22, no. 2, pp. 69–84, 2014.

19. M. Yannuzzi and R. Milito, “Key ingredients in an IoT recipe Fog Computing,.pdf,” pp. 325–329.

20. M. Elappila, S. Chinara, and D. R. Parhi, “Survivable Path Routing in WSN for IoT applications,” Pervasive Mob. Comput., vol. 43, pp. 49–63, 2018.

21. F. Zawaideh, “An Energy Efficient Clustering Algorithm for Wireless Sensor Networks ( EECA ),” no.

September, pp. 39–44, 2012. 22. F. Li, M. Xiong, L. Wang, H. Peng, J. Hua, and X. Liu, “A novel energy-balanced routing algorithm in energy

harvesting sensor networks,” Phys. Commun., 2018.

23. K. Wang, Y. Wang, Y. Sun, S. Guo, and J. Wu, “Green Industrial Internet of Things Architecture: An Energy-Efficient Perspective,” IEEE Commun. Mag., vol. 54, no. 11, pp. 48–54, 2016.

24. J. Luo, J. Hu, D. Wu, and R. Li, “Opportunistic routing algorithm for relay node selection in wireless sensor

networks,” IEEE Trans. Ind. Informatics, vol. 11, no. 1, pp. 112–121, 2015. 25. T. Qiu, Y. Lv, F. Xia, N. Chen, J. Wan, and A. Tolba, “ERGID: An efficient routing protocol for emergency

response Internet of Things,” J. Netw. Comput. Appl., vol. 72, pp. 104–112, 2016.

26. S. B. Shah, Z. Chen, F. Yin, I. U. Khan, and N. Ahmad, “Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor net,” Futur. Gener. Comput. Syst., vol. 81, pp. 372–381, 2018.

27. D. Sun, X. Huang, Y. Liu, and H. Zhong, “Predictable Energy Aware Routing based on Dynamic Game Theory

in Wireless Sensor Networks,” Comput. Electr. Eng., vol. 39, no. 6, pp. 1601–1608, 2013. S. Wen, C. Huang, X. Chen, J. Ma, N. Xiong, and Z. Li, “Energy-efficient and delay-aware distributed routing

with cooperative transmission for Internet of Things,” J. Parallel Distrib. Comput., 2017.

965-970

157

.

Authors: Maneet Kaur Bohmrah, Harjot Kaur

Paper

Title:

Autonomic Fog Computing: Towards Sustainable and Reliable Integration of Cloud &

Internet of Things

Abstract: With the growth of IoT based applications day by day huge volume of data is

generated, which becomes a challenging issue for researchers. Fog computing is seem to be an

effective solution for managing huge volume of data which is mainly security critical and time

sensitive produced by IoT devices or sensors. In this paper we first present an integration of

cloud and IoT as substantial number of application scenarios empowered by their Integration

and discuss threats challenges & existing solutions related to it. Followed by this, we discussed

fog computing which supports the integration of cloud and IoT, further the issues related to fog

has been explored. We proposed a concept of self-awareness in Fog computing termed as

Autonomic Fog Computing. Autonomic fog computing is introducing the features of Self-

management and hence increase the efficiency and enhance the overall system performance.

Keywords: Cloud Computing, Internet of Things, CloudIoT, Self-management, Self-

configuration, Fog Computing, and Autonomic Fog Computing.

References: 1. Mell, T. Grance, The nist definition of cloud computing, 2011. 2. L.M. Vaquero, L. Rodero-Merino, J. Caceres, M. Linder, A break in the clouds: towards a cloud definition, ACM

SIGCOMM Comput. Commun. Rev. vol. 39(1)2008 50-55.

3. T. Dillon, C. Wu, E. Chang, Cloud Compuing: issues and challenges, 24th IEEE international conference on Advanced information Networking and Applications, IEEE, 2010, pp.1-6.

4. Commission of the European Communities, Early Challenges 1801, Regarding the ‘‘Internet of Things”, 2008. 5. D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), The Internet of Things, 1661 Springer, 2010. ISBN: 978-1-4419-

1673-0.

6. J. Zhou, T. Leppanen, E. Harjula, M. Ylianttila, T. Ojala, C. Yu. H. Jin Cloudthings: A common architecture for integrating the internet of things and cloud computing, in: CSCWD, IEEE, 2013.

7. H. C. Chao, internet of things and cloud computing for future Internet, Ubiquitous Intelligence and Computing,

in: Lecture Notes in Computer science, 2011. 8. A. Botta, W. de Donato, V. Persico, A. Pescape, Integration of Cloud Computing and Internet of Things: A

survey, 0167-739X, Elsevier 2015.

9. S.Sbashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comput. Appl. vol. 34(1) 2011 pp 1-11.

10. N. Grozev, R. Buyya, Inter-Cloud architectures and application brokering: survey, Soft-pract, Exp. vol. 44(3) 2014

pp 369-390. 11. W. He. G. Yan, L. D. Xu, Developing vehicular data cloud services in the iot environment, IEEE Trans. Ind. Inf.

vol. 10(2)(2014)1587-1595.

12. Y.-K.Ji, Y,-I. Kim, S.Park, Big Data summarization using semantic feature for IoT on Cloud, 2014. 13. F. Zhao, Sensors meet the cloud: planetary –scale distributed sensing and decision making in: cognitive

informatics (ICCI), 9th IEEE international conference, IEEE, 2010, p.998.

14. G. Aceto, A. Botta, W. de Donato, A.Pescape, Cloud monitoring: A survey, Comput. Netw. vol. 57(9) (2013)2093-2115.

15. L. M. Vaquero, L. Rodero-Merino, Finding Your Way in the Fog: Towards a Comprehensive Definition of Fog

Computing, SIGCOMM Comput. Commun. Rev. vol. 44 (5) (2014) 27–32. doi:10.1145/2677046.2677052 16. F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog Computing and its Role in the Internet of Things, Proceedings of

the 1st Edition of the MCC Workshop on Mobile Cloud Computing, 2012, pp. 13–16.

doi:10.1145/2342509.2342513 17. T. H. Luan, L. Gao, Z. Li, Y. Xiang, L. Sun, Fog Computing: Focusing on Mobile Users at the Edge. Preprint,

available online arXiv:1502.01815.

18. Parashar M, Hariri S. Autonomic computing: an overview, up 2004. J.-P. Banaˆtre (ed). LNCS, Springer Verlag, vol. 3566, 2005, pp. 247–259.

19. Kephart J, Chess D. The vision of autonomic computing. IEEE Comput. vol. 36, 2003, pp. 41–50.

20. Singh S, Chana I, Singh, Buyya R. SOCCER: self-optimization of energy-efficient cloud resources. ClustComput. vol. 19(4), 2016, pp. 1787-1800.

21. Chen G, Jin H, Zou D, Zhou BB, Qiang, Hu G. SHelp: automatic self-healing for multiple application instances

in a virtual machine environment. IEEE International Conference on Cluster Computing, 2010. 22. Lama P, Zhou X. AROMA: automated resource allocation and configuration of MapReduce environment in the

cloud. Proceedings of the 9th International Conference on Autonomic Computing, 2012.

23. Konstantinou I, Kanter V, Tsoumakos D, Koziris N. COCCUS: self-configured cost-based query services in the cloud. Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, 2013.

24. Inderpreet Chopra and Maninder Singh. 2014. SHAPE—an approach for self-healing and self-protection in

complex distributed networks. J. Supercomp, vol. 67(2), 2014, pp. 585–613. DOI:http://dx.doi.org/10.1007/s11227-013-1019-3

971-979

25. Gill SS, Chana I, Singh, Buyya R. CHOPPER: an intelligent QoS-aware autonomic resource management

approach for cloud computing. Clust Comput. 2017, pp. 1-39. https://doi.org/10.1007/s10586-017-1040-z.

26. Gill SS, Buyya R, Chana I, Singh, Abraham A. BULLET: particle swarm optimization based scheduling

technique for provisioned cloud resources.J Netw Syst Manag. vol. 26(2), 2018, pp. 361-400. 27. Gill SS, Buyya R, Chana I, Singh, RADAR: Self-configuring and self-healing in resource management for

enhancing quality of cloud services Concurrency Computat Pract Exper. 2019; 31: e4834.

wileyonlinelibrary.com/journal/cpe ©2018 John Wiley & Sons, Ltd. 1 of 29 https://doi.org/10.1002/cpe.4834 28. Kaur, Maneet and Kaur, Harjot, Autonomic Computing for Sustainable and Reliable Fog Computing (February

23, 2019). Proceedings of International Conference on Sustainable Computing in Science, Technology and

Management (SUSCOM), 2019, pp. 26-28. Available at SSRN: https://ssrn.com/abstract=3363069 or http://dx.doi.org/10.2139/ssrn.3363069

158.

Authors: Dr. Krupesh A. Chauhan, Rushabh A. Shah

Paper

Title:

Application of Time and Motion study for Performance Enhancement of Building

Construction Industry

Abstract:Construction industry is, as we all know growing at very fast rate to match the

current and innovative requirements. Still there are so many reasons of delaying and cost

overruns in construction industry. Out of which one of the main reason is Lean waste. These

wastes are always hidden and we often neglect or do not give them importance for any

analysis or scheduling work. To identify and to avoid those wastes, lean tools need to be

implemented on such kind of projects. In this study lean tool in terms of Time and motion

study is applied on plastering work of Three building construction sites of Surat, Gujarat, India

(Site 1: Pratham, Site 2: IFM, Site 3: Celebration Home). Leant tool is applied on plastering

work, which is divided in 3 Main activities, and those main 3 activities further divided in 9

different part. Time study is a direct and continuous observation of a task, using a timekeeping

device (e.g., decimal minute stopwatch, computer-assisted electronic stopwatch, and videotape

camera) to record the time taken to accomplish a task. Motion studies are performed to

eliminate waste. Data was collected for sites during different time and of different types of

labors. The analysis result show that some of the activities are having higher time than the

average time that will force the task to overruns.

Keywords:Lean Tool, Motion Study, Plastering work, Time Study.

References: 1. Abdul Talib Bon, Aliza Ariffin. An Impact Time Motion Study on Small Medium Enterprise Organization.

2. Adnan Enshassi, Sherif Mohamed, Ziad Abu Mustafa1 and Peter Eduard Mayer (2007) Factors affecting labour

productivity in building projects in the Gaza strip. J. of Civil Engg and Management .p245-254

3. Ann Hendrich, Marilyn Chow, Boguslaw A. Skierczynski, Zhenqiang Lu (2008). A 36 – Hospital Time and

Motion.

4. B. Kumar (1999). Industrial Engineering. Khanna Publishers, Delhi.

5. Brian Price (1989). Frank and Lillian Gibreth and the Manufacture and Marketing of Motion Study, 1908 –

1924.

6. Business and Economic History, Second Series, Volume Eighteen, 1989 Business History Conference ISSN

0849.

7. Eok Su Sim, Hyoung Gon Lee, Jung Chul Lee, Jin Woo Park (2004). Efficient Work Measurement System.

8. Ferguson, David S., Don’t Call it “time and motion study”, IIT Solutions, Norcross. May 1997. Vol. 29, Issue 5.

9. Finkler, Steven A., A Comparison of work-sampling and time-and-motion techniques for studies in health

services research, Health Service Research, Chicago. Dec 1993. Vol. 28, Issue 5.

10. Foster (2003). Operational Management – Time and Motion Study.ppt.

11. Fred E. Meyers (1992). Motion and Time Study – Improving Work Methods and Management.

12. Grace Au, Ray J. Paul (1993). Visual Interactive Modelling: A Pictorial Simulation Specification System,

European.

13. Gilbreth, Frank B. Motion Study: A Method for Increasing the Efficiency of the Workman. Whitefish, MT:

Kissenger Publishing, 2008.

14. H. Randolph Thomas (1991) Labor Productivity and work sampling the bottom-line, J.Cons. Eng. Management.,

p.p-423-444.

15. Jacob Je-Chian Lin,Wei-Han Hung,Shih-Chung Kang, American Society of Civil, Engineers,

DOI:10.1061/(ASCE)CP.1943-5487.0000408,2014.

16. Jay Heizer and Barry Render (2006). “Operations Management” Eight Edition, Pearson Education.

17. Jeffrey S. Smith (2003). Survey on the Use of Simulation for Manufacturing System Design and Operation.

980-984

18. Jigar H. Balar, Hiren A. Rathod, Mr. Rushabh Shah, IJSRD - International Journal for Scientific Research &

Development| Vol. 6, Issue 03, 2018 | ISSN (online): 2321-0613.

19. Koehler, Kenneth G., Time Cost Analysis, CMA, Hamilton. May 1992. Vol. 66, Issue 4.

20. Management Thought’, Management & Organisational History, vol. 6, no. 2, pp. 145-161.

21. Marvin E. Mundel and David L. Danner (1994). Motion and Time Study – Improving Productivity, Seventh

Edition.

22. M.N.Pal, A.K.Chatterjee Indian Adaptation Introduction to Work Study. International Labour Office, Geneva

23. NEELMANI • September 21, 2013 • Big civil engineering projects, Civil Engineering Projects, Editorial

24. O. C Jensen, S. Stage, P.Noer (2004). Injury and Time Studies of Working Process in Fishing. Journal of Safety

Of Manufacturing Systems, Vol. 22 / No 2 2003 Pages 157 – 171.

25. Puniavathi Puranam, Pramila. & R. Adavi, Time and Motion Study, Analysis Through Statistics.

26. Ralph M. Barnes (2001). Motion and Time Study – Design and Measurement of Work. Seventh Edition. John

Wiley and Sons Inc.J. Jones.

27. Rajshri Shrishirmala, R. R. Salgude (2015), “Time And Motion Study of a Residential Site”, International

Journal of Innovative and Emerging Research in Engineering, ISSN: 2394 – 3343

28. Vipulkumar V. Mori1 Yuvrajsinh B. Kanchava2 Pravin A. Karetha3 Manish B. Charola4, IJSRD - International

Journal for Scientific Research & Development| Vol. 3, Issue 02, 2015 | ISSN (online): 2321-0613

29. Yvan J. Beliveau, Shrikant S. Dixit, Taylan Dal and AymanA. Morad, ASCE 119:180-191( 1993).

159.

Authors: Mouamil Khan, Sandeep Singla, Sualiheen Ahmad

Paper

Title:

Accident Mitigation and Management Measures for NH-44(India) from Khannabal to

Qazigung in Jammu-Kashmir

Abstract:Accidents are not natural but they are caused is a common cliché in the area of

traffic safety. Thus, if accidents are caused, surely the reasons responsible for them could be

identified and appropriate remedial measures developed and implemented to the extent

feasible. This study lays emphasis on the safety analysis and accident studies of National

Highway -1A(NH-44) on the 24 Km long stretch of road from Khanabal to Qazigund which is

the main connecting link of Kashmir valley to Jammu and the rest of the country. As such this

road is subjected to heavy vehicular traffic carrying passengers and goods and is the main

strategic road of the state of Jammu and Kashmir State, it is one of the busiest and dangerous

roads of the country. The problem of traffic flow is very acute due to complex flow of

vehicular traffic, presence of mixed traffic along with pedestrians. Traffic accidents lead to

loss of life and property. Also the stretch under study is subjected to rough weather conditions

particularly during the winters. The primary objective of this study is to carry out the safety

analysis of National Highway-1A(NH-44) on the 24 Km long stretch of road from Khanabal to

Qazigund and provide a solution to the traffic accidents which occur on this 24 Km long

stretch of road from Khanabal to Qazigund. The National Highway-44 (formerly known as

NH 1A) connecting Kashmir Valley to the rest of the country has always been susceptible to

accidents.

Keywords: Accident Mitigation, Jammu and Kashmir, Counter Measures, Priority Index,

highway.

References: 1. M. D., "Road accidents in India," ATSS research, 2009.

2. T. O. S. M. F. M. Mohan D, "Road safety in India: challenges and opportunities.". 3. S. SK., "Road traffic accidents in India: issues and challenges.," Transportation research procedia., 2017.

4. R. M., "National statistics of road traffic accidents in India.," Journal of Orthopedics, Traumatology and

Rehabilitation., 2013. 5. F. kallu, "www.greaterkashmir.com," [Online].

6. Bukhari, "www.risingkashmir.com," 2016. [Online].

7. IRC-53, Road Accident Forms A-1 and A-4, National Highway Authority of India(NHAI), Ministry of Surface Transport, New Delhi: The Indian Road Congress(IRC) publication, 1982.

8. IRC-66-1976, Recommended practice for Sight Distance on 9. Rural National Highways, New Delhi, The Indian Road Congress(IRC), New Delhi, 1976.

10. IRC-73-1980, Geometric Design Standards for Rural(Non-Urban) Highways, New Delhi: Indian road congress,

1980. 11. IRC-SP-44-1996, Highway safety Code, The Indian Road Congress(IRC) special publication44, New Delhi,

Indian Road Congress, 1996.

12. IRC-SP-55-2001, Guidelines on safety in road construction zones, National Highway Authority of India(NHAI), Ministry of Surface Transport, New Delhi: The Indian Road Congress(IRC) publication, 2001.

985-997

13. S. C. Khanna, Highway Engineering,9th edition, Mahavir Marg, NemChand & Brothers, Roorkee, 2011.

14. A. P. Mehar R, "A systematic approach for formulation of a road safety improvement program in India,"

Procedia-Social and Behavioral Sciences., 2013.

15. R. GK., "Road Traffic Safety Management in India–Analysis–Exploring Solutions.," International Journal pr Application or Innovation in Engineering & Management (IJAIEM)., 2013.

16. A. J. J. W. Ombisa BA, "Causes and Mitigation Measures for Road Traffic Accidents in Public Service Vehicles

in Kenya.," 2010.

160.

Authors: Yogita Patra, Shruti Tripathi

Paper

Title:

Agile Software Development: Reusability and Customizability is key to Competitive

Advantage

Abstract:The study addresses the research issue of how software firms can compete in a

dynamic industry through creating agile software development processes. It gives an insight

into what a firm needs to do to equip its software process engineers to create flexible processes

which can be customized specifically for the customer or reused for another customer without

having to recreate them. Can these perceived process dimensions impact the competitive

advantage of the firm? Survey design was used to collect responses from 100 software firms.

Senior managers in the delivery departments were taken as respondents. The model and

hypothesis were assessed on AMOS using structural equation modelling for path analysis. The

results suggested that firms that can reuse the codes and customize the services specific to

customers through training and development initiatives taken for employees are able to create

competitive advantage in the industry. The improvement in the processes be having direct

impact on the economic efficiency of the firm.

Keywords: Competitive advantage, Software development, Training and development,

Structural Equation Modelling.

References: 1. Armstrong & Shimizu, C. E. (2007). A Review of Approaches to Empirical Research on the Resource-Based

View of the Firm. Journal of Management, 33(6), Pp. 959-986.

2. Batt and Banerjee, R. M. (2011). The scope and trajectory of strategic HR research: evidence from American and

British journals. The International Journal of Human Resource Management,Vol. 23, No. 9, Pp. 1739–1762.

3. Browning Edgar Gray & Garrett, V. F. (2009). Realising competitive advantage through HRM in New Zealand

service industries. The Service Industries Journal, Pp 741–760.

4. C. Zheng. (2009). Correlational Study of Organizational Innovation Capability and Two Factors:Innovation

Drivers and Organizational Culture . ProQuest Dissertations and Theses database (UMI No. 3394575). , Pp. 203–209.

5. Certo & Peter. (1990). Case Enrichment Portfolio for Selected Cases in Strategic Management. McGraw-Hill

Publishing Company.

6. Hair et al. (2006). Multivariate data analysis.

7. Hardesty Bearden and Carlsonc, D. M. (2007). Persuasion knowledge and consumer reactions to pricing tactics.

Journal of Retailing, Volume 83, Issue 2,, Pp. 199-210.

8. Little, B. (2014). Best practices to ensure the maximum ROI in learning and development. "Industrial and

Commercial Training, Vol. 46 Iss 7, pp. 400 - 405.

9. Nidumolu & Knotts, S. R. (1998). The Effects of Customizability and Reusability on Perceived Process and

Competitive Performance of Software Firms. MIS Quarterly, Vol 22, No. 2, Pp. 105-137 .

10. Pleval, M. e. (1994). AT & T Global Business Communications Systems: Linking HR with Business Strategy.

Organizational Dynamics, 22(3), Pp. 59-72.

11. Powell, T. C. (2001). Competitive Advantage: Logical And Philosophical Considerations. Strategic Management

Journal, Pp. 875-888.

12. Ramos-Rodríguez and Ruíz-Navarro, A.-R. J. (2004). Changes in the Intellectual Structure of Strategic

Management Research: A Bibliometric. Strategic Management Journal, Vol. 25, No. 10, Pp. 981-1004.

13. Reddington Martin & Bondarouk, M. G. (2015). Chapter 4 Linking HR Strategy, e-HR Goals, Architectures, and

Outcomes: A Model and Case Study Evidence. In Electronic HRM in Theory and Practice (pp. Pp. 55-81). Emerald publication.

14. Sajeevanie, T. (July 2015). Strategic Human Resource Management and Theoretical Background: A Critical

Review Perspective . Proceedings of the Third Asia-Pacific Conference on Global Business, Economics, Finance

and Banking (AP15Singapore Conference) ISBN: 978-1-63415-751-3 .

15. Schoonover, S. C. (2000). HumanResource Competencies for the Year 2000: The Wake-Up Call. Society for

Human Resource Management. , Pp 27.

16. Singh, K. (2003). Strategic HR orientation and firm performance in India. Int. J. of Human Resource

Management 14:4 , Pp. 530–543.

998-1003

17. Sinkula Baker and Noordewier, J. M. (1997). A Framework for Market-Based Organizational Learning: Linking

Values, Knowledge, and Behavior. Journal of the Academy of Marketing Science, Volume 25, No. 4, Pp 305-

318.

18. Sung & Choi, S. Y. (2018). To invest or not to invest: strategic decision making toward investing in training and

development in Korean manufacturing firms. The International Journal of Human Resource Management, VOL.

29, NO. 13, Pp. 2080–2105.

19. Vlachos, I. (2008). The effect of human resource practices on organizational performance: evidence from

Greece. The International Journal of Human Resource Management Vol. 19, No. 1, Pp. 74-97.

20. Walker, J. (1990). Human Resource Strategy. Graw Hill International Edition.

21. Wang, H.-L. (2013). Theories for competitive advantage. In Being practical with theory: a window into business

research (pp. Pp. 33-43). University of Wollongong: http://ro.uow.edu.au/buspapers/408.

22. Wang, H.-L. (2014). Theories for competitive advantage. In H.-L. Wang, Being Practical with Theory: A

Window into Business Research (pp. Pp. 33-43). Wollongong, Australia: University of Wollongong.

161.

Authors: Sunita Chaki, Dr Kshamta Chauhan, Anita Daryal

Paper

Title: Financial Performance of Banks in India: Are Banks Sound Enough to be Banked Upon

Abstract: The seemingly untamable Non-Performing Assets are leading the Indian banks

towards a highly unstable environment. The financial soundness of the banks is mandatory for

any economy considering it is one of the most significant and a pre-requisite of a stable

economy.The present study examines the financial performance parameters of banks with a

probable variation among public and private sector banks for a period between 2005 and 2018.

The study is divided into three sections. The first section studies the financial performance of

the Scheduled Commercial Banks (SCBs), Public & Private Sector Banks in three identified

time bands of last thirteen years. The second section assesses the probable variation in asset

quality among Private and Public Sector Banks through statistical inferences. The third section

finally examines the probability of variations in asset quality in the three time bands identified

in the study. The study concludes a very high volatility among the SCBs during the said period

and found Private Sector Banks to be more consistent and bore better stability parameters

compared to Public Sector Banks. The statistically inferred results through T-test, Welch test

and Post-Hoc test support a significant variation among both the sectors along with presence

of significant variations in asset quality.

Keywords: financial performance, asset quality, profitability, ROA, GNPA, CRAR, capital

adequacy, global financial crisis.

References: 1. W. Bank, “Doing Business-India 2019,” 2019.

2. Assocham and E&Y, “ARCs – at the crossroads of making a paradigm shift,” 2016.

3. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2012-13,” 2013. 4. S. Mundra, “Financial Stability in a Weak Global Environment,” in Financial Stability in a Weakening Global

Economic Environment, 2016, p. 2016.

5. Reserve Bank of India, “Financial Stability Report 2013-14,” 2013. 6. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2005-06,” 2006.

7. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2008-09,” 2009.

8. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2014-15,” 2014. 9. A. Derviz and J. Podpiera, “Predicting Bank CAMELS and S & P Ratings The Case of the Czech Republic,” vol.

44, no. 1, pp. 117–130, 2008.

10. K. B. L. Mathur, “Should They be privatised,” Econ. Polit. Wkly., vol. 37, no. 23, pp. 2245–2256, 2012. 11. M. Sathye, “Privatization, Performance, and Efficiency: A Study of Indian Banks,” vol. 30, no. 1, pp. 7–16,

2005. 12. J. B. Thomson, “Predicting Bank Failures in the 1980s,” no. 1988, 1990.

13. S. Kumar and R. Sharma, “Performance Analysis Of Top Indian Banks Through Camel,” Int. J. Adv. Res.

Manag. Soc. Sci., vol. 3, no. 7, pp. 81–92, 2014. 14. C. S. Balasubramanium, “Non Performing Assets and Profitability of Commercial Banks in India:Assessment

and Emerging Issues,” Abhinav,Journal Res. Commer. Manag., vol. 1, no. 7, pp. 41–52, 2012.

15. F. N. Echekoba, C. F. Egbunike, and E. G. Kasie, “Determinants of Bank Profitability in Nigeria : Using Camel Rating Model,” no. January, 2014.

16. A. Roman and A. Camelia, “Analysing the Financial Soundness of the Commercial Banks in Romania : An

Approach Based on the Camels Framework,” Procedia Econ. Financ., vol. 6, no. 13, pp. 703–712, 2013. 17. N. Rozzani and R. A. Rahman, “Camels and Performance Evaluation of Banks in Malaysia : Conventional

Camels and Performance Evaluation of Banks in Malaysia : Conventional Versus Islamic,” no. July 2014, 2013.

1004-1010

18. A. B. Review, “A Study on Testing the Operating Efficiency of Indian Banking Sector with Special Reference to

the Select Financial Soundness Indicators – An Empirical Approach,” vol. VII, no. 3, pp. 72–83, 2011.

19. H. V. Kaur, “Analysis of Banks in India — A CAMEL Approach,” vol. 2, pp. 257–280, 2010.

20. M. Evans, “An Indonesian Study of the Use of CAMEL ( S ) Ratios as Predictors of Bank Failure An Indonesian Study of the Use of CAMEL ( S ) Ratios as Predictors of,” vol. 10, no. 1, 2005.

21. M. Ibrahim, “A Comparative Performance of Two Banks in United Arab Emirates,” vol. 5, no. 21, pp. 24–30,

2014. 22. W. K. Wang, W. M. Lu, and Y. H. Wang, “The relationship between bank performance and intellectual capital

in East Asia,” Qual. Quant., vol. 47, no. 2, pp. 1041–1062, 2013.

23. I. Keramidou, A. Mimis, and A. Fotinopoulou, “Exploring the relationship between efficiency and profitability,” vol. 20, no. 5, pp. 647–660, 2013.

24. S. Banerjee and M. Velamuri, “The Conundrum of Profitability Versus Soundness NU Abstract,” Rev. Financ.

Econ., 2015. 25. S. Kumar and R. Gulati, “Measuring efficiency , effectiveness and performance of Indian public sector banks,”

2010.

26. D. Gasbarro, “The Changing Relationship Between CAMEL Ratings and Bank Soundness during the Indonesian Banking Crisis,” pp. 247–260, 2002.

27. M. Mercan, A. Reisman, R. Yolalan, and A. B. Emel, “The effect of scale and mode of ownership on the

financial performance of the Turkish banking sector: Results of a DEA-based analysis,” Socioecon. Plann. Sci.,

vol. 37, no. 3, pp. 185–202, 2003.

28. P. Singh, “Efficiency Assessment Parameters of Public Sector Banks in India,” 2015.

29. P. Manoj, “Financial Soundness of Old Private Sector Banks In India With a Focus on Kerala Based OPBs: A ‘CAMEL’ Approach,” Am. J. Sci. Res., no. 11, pp. 132–149, 2010.

30. A. Quality, “Asset Quality of Indian Banks : Way Forward 1,” 2016.

31. S. S. Shukla, “Analysing Financial Strength of Public and Private Sector Banks : A CAMEL Approach,” vol. 7, no. 8, 2015.

32. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2016-17,” 2017.

33. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2004-05,” 2005. 34. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2007-08,” 2008.

35. Reserve Bank of India, “Report on Trend and Progress of Banking in India2009-10,” 2010.

36. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2010-11,” 2011. 37. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2015-16,” 2015.

38. Reserve Bank of India, “Report on Trend and Progress of Banking in India 2017-18,” 2018.

162.

Authors: Evren Kanalici, Gokhan Bilgin

Paper

Title: Scattering Wavelet Hash Fingerprints for Musical Audio Recognition

Abstract: Fingerprint design is the cornerstone of the audio recognition systems in which

aims robustness and fast retrieval. Short-term Fourier transform and Mel-spectral

representations are common for the task in mind, however these extraction methods suffer

from being unstable and having limited spectral-spatial resolution. Scattering wavelet

transform (SWT) provides another approach to these limitations by recovering information

loss, while ensuring translation invariance and stability.We propose a two-stage feature

extraction framework using SWT coupled with deep Siamese hashing model for musical audio

recognition. Similarity-preserving hashes are the final fingerprints and in the projected

embedding space, similarity is defined by a distance metric. Hashing model is trained by

roughly aligned and non-matching audio snippets to model musical audio data via two-layer

scattering spectrum. Our proposed framework provides competitive performance results to

identify audio signals superimposed with environmental noise which can be modeled as real-

world obstacles for music recognition. With a very compact storage footprint (256 bytes/sec.),

we achieve 98.2% ROC AUC score on GTZAN dataset.

Keywords:Audio fingerprinting, CNNs, Scattering wavelet transform, Siamese networks,

Embedding hash models.

References: 1. A. Wang et al. An industrial strength audio search algorithm. In Ismir, volume 2003, pages 7–13. Washington,

DC, 2003.

2. A. Wang. The shazam music recognition service. Communications of the ACM, 49(8):44–48, 2006.

3. A. S. Master, T. P. Stonehocker, B. J. Levitt, J. Huang, and K. Mohajer. Systems and methods for sound

recognition, Mar. 8 2016. US Patent 9,280,598.

4. Google sound search. https://support.google.com/ googleplaymusic/answer/2913276.

5. J. Haitsma and T. Kalker. A highly robust audio fingerprinting system. In Ismir, volume 2002, pages 107–115,

1011-1015

2002.

6. Y. Ke, D. Hoiem, and R. Sukthankar. Computer vision for music identification. In 2005 IEEE Computer Society

Conference on Computer Vision and Pattern Recognition (CVPR’05), volume 1, pages 597–604. IEEE, 2005.

7. J. Z. Wang, G. Wiederhold, O. Firschein, and S. X. Wei. Wavelet-based image indexing techniques with partial

sketch retrieval capability. In Proceedings of ADL’97 Forum on Research and Technology. Advances in Digital

Libraries, pages 13–24. IEEE, 1997.

8. S. Baluja and M. Covell. Audio fingerprinting: Combining computer vision & data stream processing. In 2007

IEEE International Conference on Acoustics, Speech and Signal Processing-ICASSP’07, volume 2, pages II–213. IEEE, 2007.

9. B. Gfeller, R. Guo, K. Kilgour, S. Kumar, J. Lyon, J. Odell, M. Ritter, D. Roblek, M. Sharifi, M. Velimirovi c, et

al. Now playing: Continuous low-power music recognition. arXiv preprint arXiv:1711.10958, 2017.

10. J. Bruna and S. Mallat. Invariant scattering convolution networks. IEEE transactions on pattern analysis and

machine intelligence, 35(8):1872–1886, 2013.

11. S. Mallat. Group invariant scattering. Communications on Pure and Applied Mathematics, 65(10):1331–1398,

2012.

12. J. Anden and S. Mallat. Deep scattering spectrum. IEEE Transactions on Signal Processing, 62(16):4114–4128,

2014.

13. H. Lai, Y. Pan, Y. Liu, and S. Yan. Simultaneous feature learning and hash coding with deep neural networks. In

Proceedings of the IEEE conference on computer vision and pattern recognition, pages 3270–3278, 2015.

14. F. Schroff, D. Kalenichenko, and J. Philbin. Facenet: A unified embedding for face recognition and clustering. In

Proceedings of the IEEE conference on computer vision and pattern recognition, pages 815–823, 2015.

15. G. Tzanetakis and P. Cook. Musical genre classification of audio signals. IEEE Transactions on speech and

audio processing, 10(5):293–302, 2002.

16. G. Tzanetakis and P. Cook. Gtzan genre collection. http://marsyas.info/downloads/datasets.html, 2002.

17. A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang, Z. DeVito, Z. Lin, A. Desmaison, L. Antiga, and A. Lerer.

Automatic differentiation in pytorch. 2017.

18. M. Andreux, T. Angles, G. Exarchakis, R. Leonarduzzi, G. Rochette, L. Thiry, J. Zarka, S. Mallat, E. Belilovsky,

J. Bruna, et al. Kymatio: Scattering transforms in python. arXiv preprint arXiv:1812.11214, 2018.

19. A. Hermans, L. Beyer, and B. Leibe. In defense of the triplet loss for person re-identification. arXiv preprint

arXiv:1703.07737, 2017

20. F. Font, G. Roma, and X. Serra. Freesound technical demo. In Proceedings of the 21st ACM international

conference on Multimedia, pages 411–412. ACM, 2013

163.

Authors: Catarina de Nazaré Pereira Pinheiro, Adriene Rodrigues Barbosa

Paper

Title:

Analysis of Pathological Manifestations in Buildings at The University City Prof. José da

Silveira Netto, Located in Belém-PA

Abstract: Abstract: The reinforced concrete structures are present in most constructions

around the world and can be defined as a composite material of concrete reinforced with steel

bars. Those structures may exhibit pathologies during the construction stage or after, due to

several types of failures, whether is in the project, execution or maintenance. The

Universidade Federal do Pará, has great influence over Brazil, being considered the biggest

university in the north of the country. Despite its relevance, the university campus presents

numerous problems in their building structures. The purpose of this paper is to identify the

pathologies in the older and most recent reinforced concrete buildings existing at the Cidade

Universitária Prof. José da Silveira Netto, Guamá campus, located in Belém, state's capital,

enabling the evaluation of corrective maintenance needs of the most deteriorated

constructions. To support the case study, it was performed a visual analysis with photographic

register, allied to theoretical study regarding the subject, enabling the identification of possible

causes of the alterations. The results show pathologies from many fields, from structure design

until foundation of the buildings. The reduction in the occurrence of those manifestations

would be possible, with better supervision during the construction process and preventive

maintenance, whose lack of were the main cause of the identified pathologies.

Keywords:Building Pathologies Evaluation; Case Study; Pathological Manifestations

References: 1. ABNT, Associação Brasileira de Normas Técnicas. NBR 15575 Edificações habitacionais – Desempenho.

Brasil, 2013.

2. ALVES, J. R. Levantamento das manifestações patológicas em fundações e estruturas nas edificações, com até

dez anos de idade, executadas no estado de Goiás. 131f. Dissertação. Escola de Engenharia Civil – Universidade Federal de Goiás, 2009.

3. AZEREDO, H. A. O Edifício Até sua Cobertura. São Paulo. Ed. Edgar Blucher Ltda, 1977.

1016-1020

4. BASTOS, P. S. S. Fundamentos do concreto armado: Notas de aula. Unesp, Bauru, 2006.

5. HELENE, P. R. L. Manual para Reparo, Reforço e Proteção de Estruturas de Concreto. 2. ed. São Paulo: Ed.

Pini, 1992.

6. HELENE, P. R. L. Contribuição ao estudo da corrosão em armaduras de concreto armado. 231 f. Tese (Livre-Docência) – Escola Politécnica da Universidade de São Paulo, São Paulo, 1993.

7. LAPA, J.S. Patologia, Recuperação e Reparo das Estruturas de Concreto. 56f. Monografia – Curso Engenharia

Civil, Universidade Federal de Minas Gerais, Minas Gerais, 2008. 8. MAFRA, J.; BALTAZAR, B.; ARAÚJO, A.; GUSMÃO, R.; SOUZA, A. Análise das manifestações patológicas

visando concepção de plano de manutenção corretiva para o Centro de Convenções Benedito Nunes, em Belém-

Pa, Congresso Internacional sobre Patologia e Reabilitação de Estruturas. Crato (Ceará), 2017. 9. MEHTA, P. K.; MONTEIRO, P. J. M. Concreto: estrutura, propriedades e materiais. São Paulo: Ed. PINI, 1994.

10. SOUZA, V.C.M.; RIPPER, Thomaz. Patologia, recuperação e reforço de estruturas de concreto. 262 p. São

Paulo. Ed. PINI, 1998. 11. RIPPER, T. Patologia, recuperação e reforço de estruturas de concreto. 262f. 1. ed. São Paulo: Editora PINI

Ltda, abril, 2009.CUNHA, Maria Clementina Pereira. (Org.) O Direito à Memória: patrimônio histórico e

cidadania. São Paulo: Departamento do Patrimônio Histórico, 1992, p. 25.

164.

Authors: Catarina de Nazaré Pereira Pinheiro, Adriene Rodrigues Barbosa

Paper

Title:

Pathological Manifestation and Restoration Procedures Analysis of the Historic Building,

located in Belém-PA

Abstract:The city of Belém, capital of the Brazilian state of Pará, a four hundred years old

city, is considered rich with history and cultural diversity. Amongst its historical

constructions, the Library “Arquivo Público” - Public Archives – stands out for its great

importance, not only for its own history and architecture, but also for keeping very relevant

documents in its collection. Among the archives, the oldest document is dated from 1649,

close to the year of the city’s foundation. However, until the beginning of 2014, the building

was in a dreadful preservation state. Aiming the conservation of the city’s historic and cultural

heritage, the renovation of the building was initiated, focusing especially on the restoration of

the original architectural pieces, preserving the artistic heritage of the construction. This paper

aims to analyze the pathologies found on site and evaluate the restoration process of this

historical building, to verify the repair procedures made and to present the results of the

construction work.

Keywords:Pathologies; Restoration; Construction Repair; Building Maintenance; Historic

Heritage; Structural Rehabilitation.

References: 1. ABNT, Associação Brasileira de Normas Técnicas. NBR 15575 Edificações habitacionais — Desempenho.

2013.

2. ABNT, Associação Brasileira de Normas Técnicas. NBR 5674 – Manutenção de Edificações — Requisitos para

o sistema de gestão de manutenção. 2012.

3. ARENDT, C. O. (1997) Exaustivo Caminho da Recuperação. Congresso Ibero Americano de Patologia das

Construções, Porto Alegre: CPGEC/UFRGS, Porto Alegre.

4. BERTOLINI, L. Materiais de Construção: patologia, reabilitação, prevenção; tradução Leda Maria Marques Dias

Beck. São Paulo: Oficina de Textos, 2010.

5. CUNHA, Maria Clementina Pereira. (Org.) O Direito à Memória: patrimônio histórico e cidadania. São Paulo:

Departamento do Patrimônio Histórico, 1992, p. 25.

6. CARRASCO, E. V. M., “Apostila: Estruturas Usuais de Madeiras”, Dpto de Estruturas,UFMG, 2009.

7. POSSA, E.; Demoliner, C. A. (2013) Desempenho, durabilidade e vida útil das edificações: abordagem geral.

8. PERES, R. M. (2001) Levantamento e Identificação de Manifestações Patológicas em Prédio Histórico – Um

estudo de caso. Dissertação (Mestrado em Engenharia Civil) – programa de Pós-Graduação em Engenharia Civil – UFRGS, Porto Alegre. 142 p.

9. TOMAZ, Paulo Cesar. A preservação do Patrimônio Cultural e sua trajetória no Brasil. São Paulo: Fênix –

Revista de História e Estudos Culturais Maio/ Junho/ Julho/ Agosto de 2010 v. 7 year VII no 2.

10. VIANA, A. O. V. N. A biblioteca e arquivo público (do pará): resumo histórico. Revista de Biblioteconomia de

Brasília, v. 3, n. 1, p. 85-102, 1975. Available in: <http://www.brapci.inf.br/v/a/3697>. Access in: 15 Jan. 2018..

1021-1027

165.

Authors: Sandeep Kumar Chandel, Dr. Rajesh Goyal, Dr.Sandeep Singla

Paper

Title:

Utilization of Construction Waste as Partial Replacement of Aggregates in Cement

Concrete

Abstract:This paper contains study of marble waste as replacement of fine and coarse

aggregates in concrete. Entire planet is facing an issue of environment and climate. In this era

sustainable development is in huge demand. Sustainable development has way of possibility

by revising, rethinking, reducing, reusing. The use of construction waste materials in concrete

industrial is playing key role to its economic, eco-friendly, green paybacks and engineering.

This review reports on the utilization of waste marble as aggregate in concrete production

industry. On the base of the reviewed studies, it was experiential that construction waste used

in place of coarse aggregate contribute to the workability and mechanical properties of

concrete. When natural aggregates relaced with coarse marble aggregates, ceramic tiles,

recycled aggregates, it attained the best results at full replacement ratio. Additionally, waste

construction materials in coarse aggregate form improves the mechanical properties over the

dust form. These sustainable alternatives not only enhance mechanical properties of concrete

but also boost economy.

Keywords:Environment friendly, waste of Construction, waste from marble, tile waste,

aggregates, sustainability, Aggregates, strength of concrete.

References: 1. Andre, A., de Brito, J., Rosa, A., Pedro, D., 2014. Durability performance of concrete incorporating coarse

aggregates from marble industry waste. J. Clean. Prod. 65, 389e396.

2. Andr_e, A.J.N.P., July 2012. Performance in Durability Terms of Concrete Incorporating Waste Coarse

Aggregates from the Marble Industry. Instituto Superior Tecnico, Universidade Tecnica de Lisbona, Lisbon. 3. Aruntas H.Y., Gürü, M., Dayı, M., Tekin, _I., 2010. Utilization of waste marble dust as an additive in cement

production. Mater. Des. 31 (8), 4039e4042.

4. Binici, H., Shah, T., Aksoganc, O., Kaplan, H., 2008. Durability of concrete made with granite and marble as recycle aggregates. J. Mater. Proc. Technol. 208 (1e3), 299e308.

5. Corinaldesi, V., Moriconi, G., Naik, T.R., 2010. Characterization of marble powder for its use in mortar and

concrete. Constr. Build. Mater. 24 (1), 113e117. 6. Gameiro, F., de Brito, J., Correia da Silva, D., 2014. Durability performance structural concrete containing fine

aggregates from waste generated by marble quarrying industry. Eng. Struct. 59, 654e662.

7. Gautam, N., Krishna, V., Srivastava, A., 2014. Sustainability in the concrete construction. Int. J. Environ. Res. Dev. ISSN: 2249-3131 4 (1), 81e90.

8. Elçi, H., Utilisation of crushed floor andwall tilewastes as aggregate in concrete production,Journal of Cleaner

Production(2015), http://dx.doi.org/10.1016/j.jclepro.2015.07.003 9. Hameed, M.S., Sekar, A.S.S., 2009. Properties of green concrete containing quarry rock dust and marble sludge

powder as fine aggregate. ARPN J. Eng. Appl. Sci. ISSN: 1819- 6608 4 (4), 83e89

10. Hasan Sahan Arel “Recyclability of waste marble in concrete production” Journal of Cleaner Production 131 (2016) 179e188

11. Hebhoub, H., Aoun, H., Belachia, M., Houari, H., Ghorbel, E., 2011. Use of waste marble aggregates in

concrete. Constr. Build. Mater. 25 (3), 1167e1171. 12. Shahid Kabir, A.Al-Shayeb, Imran M Khan 2016 Recycled construction debris as concrete aggregates for

sustainable construction material, International conference on Sustainable Design, Engineering and Construction,

Procedia Engineering 145 ( 2016 ) 1518 – 1525Published by Elsevier Ltd. 13. Marco Pepe, Romildo D. Toledo Filho, Eduardus A.B. Koenders, Enzo M. (2014), Alternative processing

procedures for recycled aggregates in structural concrete, Construction and Building Materials 69 (2014) 124–

132, http://dx.doi.org/10.1016/j.conbuildmat.2014.06.084 14. Monica, Ms, Dhoka, C., 2013. Green concrete: using industrial waste of marble powder, quarry dust and paper

pulp. Int. J. Eng. Sci. Invent 2 (10), 67e70. ISSN (online): 2319- 6734, ISSN (print):2319-6726

15. Nagarajan, V.K., Devi, S.A., Manohari, S.P., Santha, M.M., 2014. Experimental study on partial replacement of cement with coconut shell ash in concrete. Int. J. Sci. Res. ISSN: 2278-3075 3 (3), 651e661.

16. Omar, O.M., Abd Elhameed, G.D., Sherif, M.A., Mohamadien, H.A., 2012. Influence of limestone waste as

partial replacement material for sand and marble powder in concrete properties. HBRC J. 8 (3), 193e203.

17. Pathan, V.G., Pathan, G., 2014. Feasibility and need of use of waste marble powder in concrete production.

IOSR J. Mech. Civ. Eng. (IOSR-JMCE) 23e26 e-ISSN: 2278- 1684, p- ISSN: 2320-334X. 18. Paul O Awoyera, Julius M. Ndambauki, Joseph O Akinmusuru, David O. Omole, (2016)Characterization of

ceramic waste aggregate Concret, HBRC Journal, http://dx.doi.org/10.1016/j.hbrcj.2016.11.003

19. Rai, B., Khan, N.H., Abhishek, Kr, Tabin, R.S., Duggal, S.K., 2011a. Influence of marble powder/granulesinconcretemix. Int. J. Civ. Struct. Eng. ISSN: 0976-43991 (4), 827e834.

20. Rai, B., Khan, N.H., Abhishek, Kr, Tabin, R.S., Duggal, S.K., 2011a. Influence of marble

powder/granulesinconcretemix. Int. J. Civ. Struct. Eng. ISSN: 0976-43991 (4), 827e834. 21. Rai, B., Naushad, K.H., Abhishek, Kr, Rushad, S.T., Duggal, S.K., 2011. Influence of marble powder/granules

in concrete mix. Int. J. Civ. Struct. Eng. 1 (4).

22. Sadek, D.M., El-Attar, M.M., Ali, H.A., 2016. Reusing of marble and granite powders in self-compacting concretefor sustainable development. J. Clean. Prod. 121, 19e32

23. Silva, R.V., de Brito, J., Dhir, R.K., 2014. Properties and composition of recycled aggregates from construction

and demolition waste suitable for concrete production.Constr. Build. Mater. 65, 201e21

1028-1032

24. Sudarshan, D.K., Vyas, A.K., 2016. Impact of marble waste as coarse aggregate on properties of lean cement

concrete. Case Stud. Constr. Mater

25. Talah, A., Kharchi, F., Chaid, R., 2015. Influence of marble powder on high performance concrete behavior.

Proced. Eng. 114, 685e690. 26. Tennich, M., Kallel, A., Ouezdou, M.B., 2015. Incorporation of fillers from marble and tile wastes in the

composition of self-compacting concretes. Constr. Build. Mater. 91, 65e70.

27. Uyguno_glu, T., Topçu, _I.B., Çelik, A.G., 2014. Use of waste marble and recycled aggregates in self-compacting concrete for environmental sustainability. J. Clean. Prod.84, 691e700

28. Sadek, D.M., El-Attar, M.M., Ali, H.A., 2016. Reusing of marble and granite powders in self-compacting

concretefor sustainable development. J. Clean. Prod. 121, 19e32 29. Silva, R.V., de Brito, J., Dhir, R.K., 2014. Properties and composition of recycled aggregates from construction

and demolition waste suitable for concrete production.Constr. Build. Mater. 65, 201e217

30. Sudarshan, D.K., Vyas, A.K., 2016. Impact of marble waste as coarse aggregate on properties of lean cement concrete. Case Stud. Constr. Mater

31. Talah, A., Kharchi, F., Chaid, R., 2015. Influence of marble powder on high performance concrete behavior.

Proced. Eng. 114, 685e690

166.

Authors: Amit Bhatia, Sandeep Singla

Paper

Title: Ergonomic Evaluation and Customized Design of Kitchen

Abstract: Ergonomics is the science of planning the environment for comfortable working.

Ergonomic plays an important role in designing a kitchen area free from fatigue, decreasing

the unnecessary movements and excessive expenditure of workers energy and time. A poorly

planned kitchen construction affects work efficiency requiring more effort and more time

while working on the poorly designed kitchen counters. Kitchens vary from area to area which

may or may not be designed on the basis of ergonomics. However, some women working in

the kitchen experience discomfort or injury when working in the kitchen. A standard-design of

a kitchen was considered as reference to have the optimal dimensions of the various

components of the kitchen. For this, first a survey questionnaire was prepared to know about

the problems encountered by the women working in kitchen. Anthropometric data of 30

participants from different cities was collected. The kitchen and its counters heights were

designed on the basis of the anthropometric data of the same participants. Rapid upper limb

assessment (RULA) and Rapid entire body assessment (REBA) Employee assessment

worksheet was used for the analysis of postures of kitchen workers while working in the

Standard-designed kitchen. Images of various postures of all the women volunteers were

captured while working in the kitchen. After analysis of which, it was concluded that the

participants were working exceeding the safe limit. Again the participants were asked to work

in the kitchen designed on the basis of anthropometric data. The same procedure was followed

and the results were evaluated for both standard-designed kitchen and ergonomically designed

kitchen. Subsequently, it was inferred that there is a lack of ergonomics awareness among the

kitchen workers and its designers. Assessment of postures using REBA and RULA shows that

the majority of women are working beyond their safe limit in the standard-designed kitchen.

In future, the work can be done to rationalize the kitchen dimensions that should be used in its

designing.

Keywords: Anthropometric data, Ergonomics, Kitchenette, MSD (Musculoskeletal disorders),

Optimal dimensions, REBA, RULA, Standard-designed kitchen.

References: 1. J Kishtwaria, P Mathur and A Rana, “Ergonomic Evaluation of Kitchen work with reference to space

designing”, in J Hum Ecol, 2007 21:43-46.

2. Nowakowski, Przemyslaw, “Kitchen Chores Ergonomics: Research and Its Application”, 2018, pp. 43-52.

3. Braton, N.J., “Occupational causes of disorders in the upper limb”, in British Medical. J., 1992, pp. 309-311.

4. Sultana, Sajida and Prakash, Chitra, “The ergonomic perspective of the home makers in using kitchens”, in

Asian J. Home Sci., 2014, 9 (1): 25-28.

5. S Gangopadhyay, T Bandyopadhyay, “Ergonomics study on analysis of normal activities of Indian women in

kitchen”, in Biomedicine, 1999, pp. 123-128.

6. N Agrawal, D & A Madankar, T & S Jibhakate, M., “Study and Validation of Body Postures Of Workers

Working In Small Scale Industry through RULA,” in International Journal of Engineering Science and Technology, Vol. 3 No.10 October 2011

1033-1039

7. Maguire et al, 2011, “Age friendly kitchens: a study based on social history and ergonomics”, in 6th

International Conference on Inclusive Design: The Role of Inclusive Design in Making Social Innovation

Happen. Royal College of Art, London, UK, 2011.

8. Lynn McAtamney and E Nigel Corlett, “RULA: a survey method for the investigation of world-related upper

limb disorders”, Applied Ergonomics, 1993 24(2):91-99.

9. Charu,. “Developing Ergonomically Designed Kitchen Aid for Reducing Physiological Stress of Women

Working in Standing Type Kitchen”, 2014. Available:

10. http://krishikosh.egranth.ac.in/handle/1/5810016061

11. Mahajan, Swati Ashok and Patwardhan, S.L., “A study of ergonomic approach to kitchen work centers”, Asian J.

Home Sci., 2015, 10 (2): 371-374.

12. Baroto Tavip Indrojarwo Eko Nurmianto, Ellya Zulaikha, “Design Study of Ergonomic Kitchen for Small

Dwelling With Family Interaction Concept”.

13. Kiran Shete, Harshal Tukaram Pandve and Tanmayee Puntambekar. “Role of Ergonomics in Kitchen Related

Back Problems”, J Ergonomics 2015.

167.

Authors: Neeraj Parashar, Sandeep Singla, Anuj Sachar and Anjali Gupta

Paper

Title: Optimal Municipal Solid Waste Management of a City in North India

Abstract: This paper studies the present system of collection, transportation and disposal of

Municipal Solid Waste (MSW) being followed in the city of Panchkula, in North India. It is

found that the present system of MSW management in Panchkula is unscientific, inefficient

and a major potential environment and health hazard. The trends of waste generation and its

qualitative as well as quantitative characteristics have been studied in this paper and paired

comparison techniques tool has been used to arrive at the most suitable, sustainable and

environment friendly solution for the management of MSW in Panchkula. Each element of the

proposed MSW management system has been discussed in detail. The paper leads to the

conclusion that a participative, inclusive and decentralized system would be best suited for the

city.

Keywords: Municipal solid waste, composting, ranking, land filling, segregation.

References: 1. Population Census of India https://census2011.co.in/ 2. Bhalla Anuj, Dr, 2014 , “Decadal Population Growth Rate of Haryana: A Spatial Temporal Analysis”,

Geography-An International Journal-125,Vol-XIII(6), Aug 2017, PP 74-75.

3. Official Website of Panchkula http://panchkula.nic.in on 24 May 2019. 4. Kaushal Yuvraj,2018, “Spotlight: The Smoky Mountain of Panchkula”, Hindustan Times, Panchkula, 28 Jun

2018.

5. CPCB website www.cpcb.nic.in/ 6. Peavy Howard S., Rowe Donald R., Tchobanologous G.,(1985), “Environmental Engineering”, McGraw Hill,

NY.

7. Baetz B. W and Korol R. M. (1995), “Evaluating Technical Alternatives on Basis of Sustainability”, J. of Professional Issues in Engg. Education and Practice. Vol.121, no.2, p. 102.

8. Gupta Vivek 2017, “Panchkula Pangs: No Work All Fight”, HT, Panchkula, 01 May 2017 and “City Laid to

Waste: Great Mess Called Panchkula Garbage”, HT, Panchkula,04 May 2017. 9. Thakur Bhartesh Singh, 2017, “How MC Panchkula Failed its People”, HT 23 April 2017.

10. Dutta Saptarishi, 2017, “Panchkula Garbage Problems Mount Despite a Proposed New Landfill”, HT, 06b Oct

2017. 11. The Times Of India, Panchkula, 11 Mar 2019, “Waste Segregation Training for Panchkula Residents”.

12. Singhal S and Pandey S (2001) “ Solid waste management in India – Status and future directions”, TERI

Information monitor on Environmental Science, Vol.6, No.1, pp 1-4. 13. Goel Sudha, 2008, “Municipal Solid Waste Management in India – A Critical review”. Journal of Environment

Science and Engineering.50.319-328.

14. Parashar Neeraj, 2007, “A Comprehensive and Critical Study of Solid Waste Management System of A Modern And Planned City of North India”, A thesis submitted to PEC Chandigarh, in partial fulfillment of the

requirements for the award of the degree of Master of Engineering in Environmental Engineering.

1040-1048

168.

Authors: Anuj Sachar, Manish Kaushal, Ashish Kumar, Sandeep Singla

Paper

Title: Analysis of Chandigarh Periphery for the Urban Containment

Abstract: The vision of great architect Le Corbusier for an agricultural greenbelt surrounding

Chandigarh was to provide an outer beauty by linking rural India to the city. The goal of the

greenbelt was to create distinction between rural and urban practices, although it has suffered

to restrict expansion and protect functional rural landscape. Today, the symmetry of

Chandigarh periphery is destroyed due to rapid urban encroachment and unregulated

construction. The present conditions were surveyed, analyzed and solutions were prepared

from the assessments of contemporary urban containment practices in the developed countries.

All the solution was examined on the basis of their effectiveness. In this case if the assessed

solutions are successfully implemented, the desired measures will provide agricultural

protection, urban development and rural aspect.

Keywords: Periphery, Chandigarh, Urban Containment, Greenbelt and Encroachment.

References: 1. Prakash, Aditya. "Concepts and principles for Haryana's new capital: beyond Corbusier (Chandigarh)."

Environments 19, no. 2 (January 1988): 5-11

2. Nelson, Arthur C., and Casey J. Dawkins. Urban Containment in the United States: History, models and

techniques for regional and metropolitan growth management. Planning Advisory Service, Chicago: American

Planning Association, 2004..

3. Town and Country Planning Association. "Nothing Gained by Overcrowding! A Centenary Celebration and Re-

¬‐exploration of Raymond Unwin's Pamphlet -¬‐ 'How the Garden City Type of Development May Benefit Both

Owner and Occupier'." London: Town and Country Planning Association, April 2012.

4. Easley, V. Gail. Staying Inside the Lines: Urban Growth Boundaries. Chicago: American Planning Association,

1992.

5. Anthony, Jerry. "Do State Growth Management Regulations Reduce Sprawl?" Urban Affairs Review 39, no. 3

(January 2004): 376-¬‐397.

6. DeGrove, John M., and Deborah A. Miness. Planning and Growth Management in the States. Cambridge, MA:

Lincoln Institute of Land Policy, 1992.

7. Jacobs, Allan B. "Observations on Chandigarh." Journal of the American Institute of Planners, November 2007.

8. Chalana, Manish. "Centering the Periphery." Journal of Planning History. Forthcoming article, accessed 2014.

9. Abigail Weber. ‘’Within the Edge: A Revised approach to Urban Containment within Chandigarh Periphery”

2014.

10. Chandigarh Administration. "Draft Chandigarh Master Plan 2031".

11. Greater Mohali Area Development Authority. "Regional Plan 2008-2058." Plan.

12. Haryana Urban Development Authority. Historical Background.

1049-4052

169.

Authors: Mohammed Noor Shaida, Sandeep Singla

Paper

Title: Global Biomedical Waste Management Issues and Practices

Abstract:Biomedical waste is a special type of waste which carries high potential of infection

and injury. Hospital waste management means the management of waste produced by

hospitals using techniques that will check the spread of diseases through hospital waste. This

study was conducted to examine health care waste management practices in different

hospitals. The related data has been collected from various international journals, books and

websites. The data is analyzed by finding biomedical waste management issues and challenges

around the world by gap analysis. Hospital waste generation, segregation, collection,

transportation and disposal practices were not in accordance with standard guidelines. The

average waste generation in most of the hospitals was almost equivalent to other under

developed countries but less than that of developed countries. Conclusions: The hospital

waste in the majority of hospitals was mismanaged. No proper hospital waste management

plan existed has been done except at few hospitals. In this research the analysis of current

biomedical wastes management, and some steps for management of healthcare is proposed.

Keywords:Biomedical waste management, generation, segregation, disposal, guidelines

References: 1. Al-Habash. M and Al-Zubi. 2012. Efficiency of medical waste management performance, health sector and its

impact on environment in Jordan applied study. Al-Balqa’ Applied University, Amman University College,

Amman-11118- Jordan. World applied Sciences Journal 19 (6): 880-893, 2012, ISSN 1818 – 4952 @ IDOSI

1053-1059

Publications, 2012. DOI: 10.5829/idosi.wasj.2012.19.06.2775

2. Biljana ShikoskaCena. Dimova, Gjorgji Schumanovand Vlado Vankovski. 2016. biomedical waste

management. Mac Med Review 2016; 70(1): 1-8. DOI:10.1515/mmr-2016-0001. Retrieved on April 11. 2019

from 3. Central Pollution Control Board. 2017. Protocol for Performance Evaluation and Monitoring of the Common

Hazardous Waste Treatment Storage and Disposal Facilities including Common Hazardous Waste Incinerators.

Ministry of Environmental and Forest. Parivesh Bhawan, East Arjun Negar, Delhi-110 032. Retrieved on May 25. 2019 from

http://cpcb.nic.in/displaypdf.php?id=aHdtZC9SZXZpc2VkX0d1aWRlbGluZXNfZm9yX0Jpby1tZWRpY2FsX1

dhc3RlX0luY2luZXJhdG9yLnBkZg== 4. Gupta. R. 2018. Manual for biomedical waste management. Government Medical College and Hospital – 32,

Chandigarh. Retrieved on May 25. 2019 from

https://www.worksafe.qld.gov.au/__data/assets/pdf_file/0006/88710/guide-handling-cytoxic-drugs-related-waste.pdf

5. HWM guideline. 2018. Guideline for Management of Healthcare waste as per biomedical waste management

rules, 2016. By Directorate general of Health Services Ministry of Health and Family Welfare and Central Pollution Control Board Ministry of Environment, Forest and Climate Change. Retrieved on May 25. 2019 from

http://cpcb.nic.in/uploads/hwmd/Guidelines_healthcare_June_2018.pdf

6. ICRC. 2011. Biomedical waste management. International committee of the Red Cross, 1202 Geneva,

Switzerland, November 2011. Retrieved on May 25. 2019 from

https://www.icrc.org/en/doc/assets/files/publications/icrc-002-4032.pdf

7. Imani Centre for policy and education. 2016. Biomedical waste management in Ghana. East Legon, Accra, Ghana, March 4.2016. Retrieved on February 20. 2019 from http://www.imaniafrica.org/wp-

content/uploads/2016/05/BIOMEDICAL-WASTE-MANAGEMENT-IN-GHANA.pdf

8. Melanen. M. 2016. Waste Management in Hospitals, Case project with Ecosir Oy and Eksote. Saimaa University of Applied Sciences, Faculty of Business Administration Lappeenranta, International. Bachelor's Thesis.

Retrieved on March 06. 2019 from https://www.theseus.fi/handle/10024/116209

9. Pandey. A, Ahuja. S, Madan. M and Asthana. A. K. 2016. Bio-Medical Waste Management in Tertiary Care Hospital: An Overview. Journal of Clinic and Diagnostic Research. Retrieved on March 12. 2019 from

10.7860/JCDR/2016/22595.8822

10. Qiao. Z, Nie. L and Wu. H. 2014. Medical Waste Management in China: Case Study of Xinxiang. China Agricultural University, Beijing and Xinxiang Medical University, Xinxiang, China. Copyright © 2014 by

authors and Scientific Research Publishing Inc.

11. This work is licensed under the Creative Commons Attribution International License (CC BY). 12. http://creativecommons.org/licenses/by/4.0/

13. Queensland Government. 2018. Guide for handling cytotoxic drugs and related waste. Office of industrial

relations, Workplace Health and Safety Queensland. PN10522 Version 4. Retrieved on June 05. 2019 from

https://www.worksafe.qld.gov.au/__data/assets/pdf_file/0006/88710/guide-handling-cytoxic-drugs-related-

waste.pdf

14. Soyam1. G. C, Hiwarkar1. P. A, Kawalkar1. U. G, Soyam. V. C, Gupta. V. K. 2017. KAP study of bio-medical waste management among health care workers in Delhi. International Journal of Community Medicine and

Public Heal, th. Soyam GC et al. Int J Community Med Public Health. pISSN 2394-6032 | eISSN 2394-

60402017 Sep;4(9):3332-3337 15. Training Component of the Project “Environmentally Sound Management of Medical Wastes in India”

Endeavour of GEF, UNIDO, MoEFCC and State Governments of Gujarat Karnataka, Maharashtra, Odisha and

Punjab, First Published 2018, by the United Nations Industrial Development Organization. Retrieved on February 22. 2019 from

http://envfor.nic.in/sites/default/files/5.%20Waste%20handlers%20manual_FLIP%20CHART.pdf

16. Vasistha. P, Ganguly. R, Gupta. A. K. 2015. Questionnaire Method for Assessing Biomedical Waste Management in Shimla City–Case Studies of Public and Private Hospitals. Journal of Civil Engineering and

Environmental Technology. p-ISSN: 2349-8404; e-ISSN: 2349-879X; Volume 2, Issue 16; October-December, 2015 pp. 11-14, Krishi Sanskrit Publications

170.

Authors: Sayed Behbood Hosaini, Sandeep Singla

Paper

Title: Significant Factors of Delay in Construction Projects in Afghanistan

Abstract: This research investigates the factors, which cause delay in construction projects in

Afghanistan. Delay is one of the major challenges during the implementation of the

construction projects, and it is the late completion of the activities or works of a project

compared to the planned. A large number of construction projects in Afghanistan are facing

delay during the implementation. Project delay negatively affects the prestige and dignity of

the government organizations and in general, failures and weaknesses of the projects created

distance between the people and the government and shows incapacity of the Government in

the implementation of the projects all around the country in Afghanistan. Several similar

studies from developing countries have been reviewed and a survey has been conducted for

1060-1069

data collection from the different public organizations of Afghanistan. The analysis of the

collected data points out the significant causes of delay in construction project in Afghanistan

as; ineffective planning and scheduling of a project by contractor, delay in progress payments

by client, poor site management and supervision of contractors by consultant and client,

financial difficulties by contractor, insufficient controlling and monitoring by consultant and

client, non-availability of experienced technical staff of contractor, late in reviewing and

approving design documents by client, lack of communication and coordination between the

parties, delay in delivery of materials to site, inadequate contractor experience, political

influences and warlords intervention. Finally, this thesis provides applicable recommendations

to minimize or eliminate the causes of delay in construction projects in Afghanistan.

Keywords: significant factors, delay, construction projects, Afghanistan.

References: 1. Asian Development Bank (ADB) completion report. (2010). Afghanistan: Andkhoy–Qaisar Road Project.

2. 2. Retrieved May 12, 2016, Special Inspector General for Afghanistan Reconstruction (SIGAR). (2011a). Better

Planning and Oversight Could Have Reduced Construction Delays and Costs at the Kabul Military Training

Center. SIGAR Audit-12-2

3. 3. Special Inspector General for Afghanistan Reconstruction (SIGAR). (2011b). Afghan National Security

University Has Experienced Cost Growth and Schedule Delays, and Contract Administration Needs

Improvement. SIGAR Audit-12-3.

4. 4. Special Inspector General for Afghanistan Reconstruction (SIGAR). (2012). Fiscal Year 2011 Afghanistan

Infrastructure Fund Projects Are behind Schedule and Lack Adequate Sustainment Plans. SIGAR Audit-12-12.

5. 5. David, M., & Ore, K.J. (2010). Business Q&A, what major challenges have you observed with completing

construction projects in Afghanistan. Retrieved April 25, 2015

6. 6. Sadeqi, H. (2014). The main challenges of development projects in Afghanistan. Retrieved August 18, 2015.

7. 7. Barmak, W. (2013). Main challenges of National Solidarity projects in Afghanistan. Retrieved June 2015.

8. 8. Nushin, W. (2012). Factors which are Causing Projects Failure in Afghanistan [Web log post].

9. 9.The World Bank. (2012). Restructuring Paper on a Proposed Project Restructuring of Afghanistan Kabul

Aybak Mazar e Sharif Power Project.

10. 10.Special Inspector General for Afghanistan Reconstruction (SIGAR). (2009). Actions needed to resolve

construction delays at the counter-narcotics justice centre. SIGAR Audit-09-4.

11. 11.Retrieved Special Inspector General for Afghanistan Reconstruction (SIGAR). (2011a). Better Planning and

Oversight Could Have Reduced Construction Delays and Costs at the Kabul Military Training Center. SIGAR Audit-12-2. Retrieved May 12, 2016

12. 12.Special Inspector General for Afghanistan Reconstruction (SIGAR). (2010b). ANP District Headquarters

Facilities in Helmand and Kandahar Provinces Have Significant Construction Deficiencies Due to Lack of

Oversight and Poor Contractor Performance. SIGAR Audit-11-3.

13. 13. Special Inspector General for Afghanistan Reconstruction (SIGAR). (2012c). Fiscal Year 2011 Afghanistan

Infrastructure Fund Projects Are behind Schedule and Lack Adequate Sustainment Plans. SIGAR Audit-12-12.

Retrieved May 12, 2016.

14. 14. Special Inspector General for Afghanistan Reconstruction (SIGAR). (2013). Knduz Afghan National Police

Provincial Headquarters: After Construction Delays and Cost Increases, Concerns Remain About the Facilities Usability and Sustainability. SIGAR Inspection-13-4. Retrieved May 12, 2015.

15. 15. Special Inspector General for Afghanistan Reconstruction (SIGAR), (2010c).

16. 16.Significant Factors Causing Cost Overruns in the Construction Industry in Afghanistan By: Ghulam Abbas

Niazia, *, Noel Paintingb.2017.

171.

Authors: Deependra Prashad Bhatta, Sandeep Singla, Manish Kaushal, Anuj Sachar

Paper

Title: Effect of Retrofitting on Beam-Column Joints

Abstract: During the serviceable life of R.C.C structures they are found to show evidence of

distress due to various reasons. To bring such structures back to their functional/serviceable

condition these structures need urgent attention and enquiry for finding out reasons of distress

along with appropriate remedial treatments so as to increase serviceable life of such structures

and bring them back to their functional use. So the process of retrofitting involves upgrading

and enhancing the strength of deficient structures and their components. Safety of life is a

priority issue to be addressed in process of retrofitting. For preventing injury and death of

occupants and for preventing damage to structural components and collapse of structure as a

whole, some retrofitting techniques try to deal with the issue to avoid damage. As a retrofitting

1070-1076

technique, ferrocement technique is one of commonly used procedure of improving strength

which is due to their good durability, less cost, easy availability and ease in application with

requirement of intricate formwork. Application of ferrocement can be quickly done on the

damaged structural elements without any requirements of chemical bonding agents. Also the

ferrocement application requires less skill labour in comparison to other retrofit solutions

available these days. Ferrocement is light in weight, easy to construct & have low self weight

which is why it is preferred to other techniques of retrofitting. It has higher tensile strength

then R.C.C. Also the thickness of ferrocement is a fraction of thickness of R.C.C. structural

elements which makes it a complementary material for prefabricated structures. In the present

study six R.C.C. Beam column joint specimens were casted. Two controlled specimens were

initially stressed to ultimate load (100% damage) and other four specimens are stressed to

prefixed percentages of ultimate load. All six specimens were then retrofitted using

ferrocement for upgrading the strength of Beam column joints in flexure and shear. Chicken

wire mesh is wrapped all around the specimen. From the study it is observed that retrofitted

specimens has shown considerable decrease in deflection if we compare them to controlled

specimens. Also the percentage decrease in deflection for specimens subjected to 75% and

50% of ultimate loads is considerably higher to those specimens which are subjected to 100%

damage i.e. ultimate load

Keywords: Retrofitting, Beam-column joint, bond, development length, jacketing, Wire

mesh, deflection, shear, ferrocement.

References: 1. Makki Ragheed Fatehi “Response of Reinforced Concrete Beams Retrofitted by Ferrocement” International

journal of Scientific and Technology Research, Vol 3, Issue 9, Sep 2014, ISSN 2277-8616.

2. S Patil Sandesh, Ogale R.A , Dwivedi Arun Kumar, “Performance of Chicken Mesh on Strength of Beams

Retrofitted using Ferrocement Jackets” Journal of Engineering Vol.2, Issue 7, July 2012, PP01-10 3. Kaushik, S.K; Gupta.V.K.and Rahman.M.K. “Efficiency of mesh overlays of ferrocement elements” Journal of

ferrocement 17(4) 1987.

4. Desia, R., “Field Shake Test Programme at Latur, Western India,” News letter,Earthquake Hazard Centre, New Zealand, V. 3, No.2, pp. 4-5 (1999).

5. Ong, K.C.G., Paramasivam, P., and Lim, C.T.T.,” Flexural strengthening of reinforced concrete beams using

ferrocement laminates”. Journal of ferrocement, Vol 22, No 4, pp 331-342 (1992). 6. Desayi, P., and El-Kholy, S.A., “Deflection and cracking behaviour of lightweight fiber reinforced ferrocement”,

Journal of Ferrocement, Vol. 22, No2, pp 135-150 (1992).\

7. Mukherjee, Abhijit, Joshi, Mangesh, “FRPC reinforced concrete beam-column joints under cyclic excitation”. Composite Structures 70 (2005) 185–199.

8. Al-Salloum, Y.A., Alsayed, S. H., Almusallam, T. H. & Siddiqui, N. A. “seismic performance of shear deficient

exterior rc beam-column joints repaired using CFRP composite. 9. Ahmad Gobarah et al 2002, “Seismic rehabilitation of beam-column joints using FRP laminates”. (2002)

10. Wasti, S.T., Erberik, M.A., Sucuoglu, H.., and Kaur, C., “Studies on Strengthening of Rural Structures

Damaged in the 1995 Dinar Earthquakes,” Proceedings of the Eleventh European Conference on Earthquake Engineering, Paris, France (1998).

11. IS 1489:1991 (Part -1) Portland-Pozzolana Cement Specifications.

12. IS 13920 Ductile Detailing Of Reinforced Concrete Structures Subjected To Seismic Forces -Code Of Practice

172.

Authors: Prahlad Prasad and Brajkishor Prasad

Paper

Title: Performance Behavior of Eccentrically Braced Steel Frame under Seismic Loading

Abstract: Recent past growth of multi-story buildings structures with emphasis on steel has

been found satisfactory. For solving the better-quality accommodation in the region where the

chances of earthquakes are likely, role of bracing system enhances the performance of

building under lateral load effect of earthquakes. Various methods of bracing systems are

available in practices however, eccentrically braced frames (EBFs) are fairly new lateral force

resisting system established to resist seismic event in a probable manner. Properly designed

and detailed EBFs perform in a ductile manner through shear or flexural yielding of link

element. The ductile yielding indicates wide hysteresis loop, which is excellent energy

dissipation essential for high seismic event. The seismic performance of multi-story steel

frame is designed according to the Indian code (IS800:2007). A simple computer-based

1077-1090

pushover analysis is a procedure for performance-based design of buildings subjected to

earthquake loading. Pushover analysis gets much importance in the past due to its ease and

efficiency of the results. In this study eight frames were taken,among these, six frames which

were braced as V, Inverted V, and Diagonal and remaining two are frames without bracing in

two alternate heights (4 and 8 story). Seismic response of frames is studied using non-linear

static analysis (pushover analysis) in terms of base shear, roof displacement, spectral

displacement, spectral acceleration and story drift.

Keywords: Steel Frame, Braced Frame, Pushover Analysis, Base Shear, Story Drift.

References: 1. Popov, Egor P., and Michael D. Engelhardt. "Seismic eccentrically braced frames." Journal of Constructional

Steel Research 10 (1988): 321-354.

2. Popov, E. P., J. M. Ricles, and K. Kasai. "Methodology for optimum EBF link design." Proceedings, Tenth

World Conference of Earthquake Engineering. Vol. 7. 1992.

3. World Conference on Earthquake Engineering. Beijing. 2008.

4. Mohammed Idrees Khan and Mr. Khalid Nayaz Khan, “Seismic Analysis of Steel Frame with Bracings using

Pushover analysis.”International Journal of Advanced Technology in Engineering and Science, Volume No.02,

Issue No. 07, July 2014.

5. Goel, Rakesh K. "Evaluation of nonlinear static procedures using strong-motion building records." Civil and

Environmental Engineering (2003): 70.

6. Chopra, Anil K., and R. Goel. "Modal pushover analysis of SAC buildings."Proceedings SEAOC Convention,

San Diego, California. 2001.

7. Federal Emergency Management Agency (FEMA),( 1997).NEHRP

8. IS 1893 Part 1 (2002),”Indian Standard Criteria for Earthquake Resistant Design of Structures”, Bureau of Indian

Standards, New Delhi

9. IS: 800 (2007), General Construction in Steel – Code of Practice, Bureau of Indian Standards, New Delhi, 2007

10. Applied Technology Council, ATC-40. Seismic evaluation and retrofit of concrete Buildings, California, 1996;

Vols. 1 and 2.

11. SAP2000, C. S. I. "Computers and Structures Inc." Berkeley, CA, USA (2013).

173.

Authors: Rashbha Sharma, Geetanjali and Rajesh Khanna

Paper

Title:

An H-Shaped Microstrip Antenna with Meandered Slot Lines and H-Shaped DGS For

Multiband Operation

Abstract: In this paper, a microstrip antenna is presented. It has an H-shaped patch which

uses meandered slots an H-shaped DGS beneath the microstrip line to support multiband

operation with enhanced bandwidth. The simulated and measured results are plotted to see the

performance of the antenna in terms of S11 parameter. The proposed designed resonates at

3.56, 8.04 and 10.57 GHz with a peak gain of 8.39 dB with considerable impedance

bandwidth and return loss values at the desired bands. The radiation pattern plots show the

conformability with the application it is designed for. The planar structure with a water-

resistant substrate makes it suitable for weather radar and other 5G applications.

Keywords: Defected ground structure (DGS), meandering, MSA: microstrip antenna,

transverse-electromagnetic mode (TEM).

References:

1. Girish Kumar, K.P. Ray , Broadband Microstrip Antennas. ARTECH HOUSE, INC 2003. 2. Juhua Liu, Shaoyong Zheng, Yuanxin Li, And Yunliang Long, “Broadband Monopolar Microstrip Patch

Antenna With Shorting Vias And Coupled Ring," Ieee Antennas And Wireless Propagation Letters, Vol. 13,

2014. 3. S. W. Lee and Y. J. Sung, “Reconfigurable Rhombus-Shaped Patch Antenna With Y-Shaped Feed for

Polarization Diversity,” DOI 10.1109/LAWP.2014.2358651, IEEE Antennas and Wireless Propagation Letters.

4. Neng-Wu Liu, Lei Zhu, Wai-Wa Choi and Jin-Dong Zhang, “A Low Profile Differentially-Fed Microstrip Patch Antenna with Broad Impedance Bandwidth under Triple-Mode Resonance”, DOI

10.1109/LAWP.2018.2850045, IEEE Antennas and Wireless Propagation Letters.

5. Olivier Caytan, Sam Lemey, Sam Agneessens, Dries Vande Ginste, Piet Demeester, Caroline Loss, Rita Salvado and Hendrik Rogier, “Half-Mode Substrate-Integrated-Waveguide Cavity-Backed Slot Antenna on Cork

Substrate”, DOI 10.1109/LAWP.2015.2435891, IEEE Antennas and Wireless Propagation Letters.

6. Symon K. Podilchak, Jonathan C. Johnstone, Mathieu Caillet, Michel Clenet, ´and Yahia M. M. Antar,“A

1091-1097

Compact Wideband Dielectric Resonator Antenna with a Meandered Slot Ring and Cavity Backing,” DOI

10.1109/LAWP.2015.2480547, IEEE Antennas and Wireless Propagation Letters.

7. Chow-Yen-Desmond Sim, Tuan-Yung Han and Yan-Jie Liao , “A Frequency Reconfigurable Half Annular Ring

Slot Antenna Design”, DOI 10.1109/TAP.2014.2314314, IEEE Transactions on Antennas and Propagation. 8. Jiade Yuan, Jiamin Zheng, and Zhizhang (David) A Compact Meandered Ring Antenna Loaded with Parasitic

Patches and a Slotted Ground for Global Navigation Satellite Systems (GNSS)”,DOI

10.1109/TAP.2018.2869209, IEEE Transactions on Antennas and Propagation. 9. Md. Mehedi Hasan, Mohammad Rashed Iqbal Faruque and Mohammad Tariqul Islam, “Dual Band Metamaterial

Antenna For LTE/Bluetooth/WiMAX System”, Scientific Reports (2018) 8:1240 | DOI:10.1038/s41598-018-

19705-3. 10. Mukesh Kumar Khandelwal, Binod Kumar Kanaujia and Sachin Kumar, “Defected Ground Structure:

Fundamentals, Analysis, and Applications in Modern Wireless Trends”, Hindawi International Journal of

Antennas and Propagation Volume 2017, Article ID 2018527. 11. D. Guha, S. Biswas, and Y. M. M. Antar, Defected Ground Structure for Microstrip Antennas, in Microstrip and

Printed Antennas: New Trends, Techniques and Applications, John Wiley & Sons, London, UK, 2011.

12. H. Saini, A. Kaur, A. Thakur, R. Kumar, and N. Kumar, "Compact multiband ground slotted patch antenna for X-band applications," 2nd IEEE International Conference on Recent Advances in Engineering & Computational

Sciences (RAECS), Chandigarh, 2015, pp. 1-6

13. James J. R., Hall P. S., and Wood C., “Microstrip Antenna Theory and Design”, London, United Kingdom, Peter

Peregrinus, pp. 87-89, 1981-include it in references and Put ref no. for this here

14. Constantine A. Balanis, “ANTENNA THEORY ANALYSIS AND DESIGN”, John Wiley & Sons,2005..

174.

Authors: Anudeep Arora, Dr.Durgesh Batra

Paper

Title:

Export Competitiveness of Indian Oilseeds: The Method of Constant Market Share

(CMS) with Special Reference to Groundnut

Abstract: This research Paper examines the export competiveness of oilseeds. The main and

huge production in agriculture is oilseeds which make India on the first number in Production

of oilseeds in the world. Oilseeds compose one of the significant groups of cash crops in

Indian agriculture. India has a proportional benefit in agriculture and there is a considerable

potential in raising farm returns and employment by stepping up agro base exports. The

constant market share (CONSTANT MARKET SHARE) study framework is used to

decompose changes in India’s share of the worldwide market for goods export in to

competitiveness and structural consequence over 2001-2017. The CONSTANT MARKET

SHARE Method is universally used to observe empirically the country’s export performance.

This paper is addressed to examine the regions export performance by applying CONSTANT

MARKET SHARE Method.

Keywords: CONSTANT MARKET SHARE, Export, Export Competitiveness, Trade

Specialization, Groundnut, Oilseed, Export Potential.

References: 1. Balassa, Bela (1977), “'Revealed' Comparative Advantage Revisited: An Analysis of Relative Export Shares of

the Industrial Countries, 1953-1971”, The Manchester School of Economic & Social Studies, 1977, vol. 45, issue

4, pp. 327-44.

2. Verghese SK (1979) Developments in International Competitiveness in India in 1970. Economic and Political

Weekly 14: 1718-1726.

3. Balance, Robert H, Helmut Forstner and Tracy Murray (1987), “Consistency Tests of Alternative Measures of

Comparative Advantage”, the Review of Economics and Statistics, Vol. 69, No. 1, pp. 157-161. 2.

4. Reddy, B. D. R., Lalith Achoth and B. V. Chenappa Reddy., 1998, Export Competitiveness of Groundnut

Empirical Evidence from Karnataka. Astha Vijnana, Vol.15 (3): pp. 263-270.

5. Bhavani T.A (2001), “Determinants of firm-level export performance: a case study of Indian Textile garments

and apparel industry”, The Journal of International Trade & Economic Development.10:1, 65-92.

6. Datta, S.K., 2001. How to Judge Global Competitiveness of Indian Agribusiness: Methodological Issues and

Lessons for India. In S.K.Datta and S.Y.Deodhar (Eds), Implications of WORLD TRADE ORGANIZATION

Agreements for Indian Agriculture. Oxford and IBH Publishing Co.Pvt.Ltd, New Delhi.

7. Samar Verma (November, 2002) “Export Competitiveness Of Indian Textile And Garment Industry” .

8. Verma S (2002) Export Competitiveness of Indian Textile and Garment Industry Working.Indian Council for

Research on International Economic Relations 94.

9. Ranjana Kumar (2005) “Constrains facing Indian agriculture: Need for policy intervention”, Indian journal of

agricultural economics, Vol. 60, No. 01, Jan –March.

10. RS Deshpande (March, 2005) “Karnataka Oilseed Production”.

11. Zhang, Xiu-ling and Liu, M., 2008. Experimental study on the international competition power of China’s peanut

industry. Journal of Henan Agricultural Sciences, 11.

1098-1105

12. Bhatt PR (2010) China’s Competitiveness in World Economy Foreign Trade 44: 19-41.

13. Jiang Y, Zhang Q, Chai J (2010) The Empirical Research of the Competitiveness based on the

Informationization of China’s Textile & Clothing Industry. The Conference on Web Based Business Management.

14. HailegiorgisBiramoAllaro (2011) “Export Performance of Oilseeds and ITS Determinants in Ethiopia”.

15. Devendra S (2013) Performace of Indian Textile and Clothing Industry in the United States Market A Post ATC

Analysis. Journal of Research in Commerce & Management 2: 64-76.

16. Sharma SK, Bugalya K (2014) Competitiveness of Indian agriculture sector a case study of cotton crop Procedia

- Social and Behavioral Sciences 133: 320-335.

17. Dr. N C Pahariya (2014) “Impact Assessment of Trade Liberalisation in Oilseeds Sector : Rajasthan”.

18. Akmal, N., W. Akhtar, H. Shah, M. A. Niazi and T. Saleem, 2014. The structure and competitiveness of

Pakistan’s Basmati Rice exports. Asian Journal of Agriculture and Rural Development, 4 (4): 304-312.

19. Sunil Kumar Niranjan (2016) “WORLD TRADE ORGANIZATION Agreement on Indian Oilseed Agriculture”.

20. Cann O (2016) what is competitiveness? World Economic Forum.

175.

Authors: Nik Alif Amri Nik Hashim, Sathish Kumar Velayuthan, Abdullah Muhamed Yusoff,

Zaimatul Awang, Fauzan Hafiz Muhammad Safri

Paper

Title:

Validating the Measuring Instrument for Motivation Factors towards Visiting Spa and

Wellness Tourism Destinations in Kuala Lumpur

Abstract: Visiting Spa and wellness tourism destinations is a new social trend among

wellness tourist around Malaysia as this industry is still at a growth stage in the product

lifecycle. However, limited interest has been paid on the study of domestic tourist motivation

to visit the spa and wellness tourism destination. Thus, by applying the quantitative approach,

the purpose of this pilot study is to assess the validity and reliability of the instrument used in

measuring the motivation factors towards visiting spa and wellness tourism destinations in

Kuala Lumpur. A total of 150-sample data were analysed using the statistical software IBM

SPSS version 23. Before that, content and face validity, reliability and data normality were

examined based on expert assessment. The result of the pilot study indicated that the

measuring instruments used in this study are reliable, and the data is proved of rational

normality. The findings of this study provided overall support for the proposed measuring

instrument for further research.

Keywords: Motivation, Visit, Spa, Wellness, Domestic Tourist.

References: 1. Athena H.N Mak, K. K. (2009). Health or Self-indulgence? The Motivation And Characteristic Among Spa

Goers. International Journal of Tourism Research, 185-199.

2. Bulmer, M.G. (1970). Principles of Statistics. United States: Dover Publication Inc.

3. Das, K. R., & Imon, A. H. M. R. (2016). A brief review of tests for normality. American Journal of Theoretical and Applied Statistics, 5(1), 5-12.

4. Global Wellness Summit. (2016). Summit Mission. Retrieved from http://www.globalwellnesssummit.com

5. Hashemi, S.M., Jusoh, J., Kiumarsi, S., & Mohammadi, S. (2015). Influence Factors Of Spa and Wellness Tourism on Revisit Intention: The Mediating Role of International Tourist Motivation and Tourist Satisfaction.

International Journal of Research, 3(7),1-11.

6. Henna Konu and Tommi Laukkanen. (2009). Roles Of Motivation Factors In Predicting The Tourist's Intention To Make Wellbeing Holidays - A Finnish Case. ANZMAC , 1-9.

7. Hyde-Smith, M. J., (2012).The Wellness Spa: Construct Definition and Performance Evaluation(Unpublished

Doctoral dissertation) Auckland University of Technology. 8. Sekaran, U., Bougie, R. (2017). Research Methods for Business: A Skill Building Approach. United Kingdom:

John Wiley & Sons, Ltd, Publication.

9. Smith, M., & Puczkó, L., (2008).Health and wellness tourism. Routledge.

1106-1108

176.

Authors: Manjit Singh, Mukesh Mann

Paper Title: Thermal Diffusion Flow Analysis in Unsaturated Loamy Soil using UPWIND and

QUICK Numerical Simulation

Abstract: Understanding of energy transport in saturated porous media and unsaturated

porous media provides vital information regarding the development of thermal porous

reservoirs, industrial filter applications, water reservoirs and low-temperature fluid flow

applications. The present paper focus is on presenting the solution of thermal energy diffusion

through unsaturated loamy soil using finite difference method approach. The unsteady

temperature profile comparison as time function at different spatial locations and as function

1109-1112

of spatial location at different time interval are compared using UPWIND and QUICK

approach method using thermal diffusion case. MATLAB software is used to simulate above

approach for simulation.

Keywords : Mathematical modeling, Finite difference method, Loamy soil

References: 1. H. Darcy, "Les fontainesPubliques de la Ville de Dijon," Vols. Dalmont, Paris, 1856.

2. M. Muskat, The flow of homogeneous fluid through porous media, United State of America: Mcgraw Hill,

1937. 3. J. Dupuit, "EstudesThéoriques et Pratiques sur le mouvement des Eaux dans les canauxdécouverts et à

travers les terrains perméables," (Second ed.)., Paris, Dalmont, 1863.

4. H. Brinkman, "A calculation of viscous force exerted by a flowing fluid on a dense swarm of particles," Applied Scientific Research, vol. 1, pp. 27-34, December 1949.

5. Mukesh Kumar; Manjit Singh; Chanpreet Singh; Ganga Charyulu;, "Modeling for heat conduction transfer

through porous media," International Journal of Advance in computing and information technology, Issue-5, pp. 469-474, 2012.

6. W. Stephen, "Flow in Porous Media I: A Theoretical Derivation of Darcy's Law," Transport in Porous

Media 1, D. Reidel Publishing Company, pp. 3-25, 1986. 7. S. Irmay, "Sur le mouvement des eaux dans le sol," Rev. Universelle des Mines, vol. 3, no. 4, 1947.

8. Manjit Singh; Sandeep Jindal; Amit Gupta; Virender Chahal, "Numerical Analysis of soil-water flow in

fixed Horizontal pipe," International journal of theoretical and applied mechanics ISSN 0973-6085, pp. volume 12, number 3, 533-541, 2017.

9. H. K. Dahle, M. A. Celia and S. M. Hassanizadeh, "Bundle-of-Tubes Model for Calculating Dynamic

Effects in the Capillary- Pressure-Saturation Relationship," Transport in Porous Media, vol. 58, pp. 1-2, 2005.

10. D. Yang, R. P. Currier and Duan Z. Zhang, "Ensemble phase averaged equations for multiphase flows in

porous media. Part 1: The bundle-of-tubes model," International Journal of Multiphase Flow, vol. 35, p. 628–639, 2009.

11. Manjit Singh; Chanpreet Singh; D. Gangacharyulu, "Modelling for flow through unsaturated porous media

with constant and variable density conditions using local thermal equilibrium," International Journal of Computer Application (0975-8887), pp. 24-30, 2016.

12. Manjit Singh; Chanpreet Singh; D. GangaCharyulu, "Numerical Analysis on variations of thermal and

hydraulic properties during water flow through unsaturated soil," in Advances in fluid and thermal engineering, Singapur, Springer, 2019, pp. 357-368.

13. D. G. Fredlund, "Unsaturated Soil Mechanics in Engineering Practice," Journal of geotechnical and

geoenvironmental engineering, vol. 132, pp. 286-321, 2006. 14. K. Vafai and S. J. Kim, "Analysis of surface enhancement by a porous substrate," ASME J. heat transfer,

vol. 112, pp. 700-706, 1990.

15. Y. Mahmoudi and N. Karimi, "Numerical investigation of heat transfer enhancement in a pipe partially filled with a porous material under local thermal non equilibrium condition," International journal of heat

and mass transfer, vol. 68, pp. 161-173, 2014.

16. C. Singh, Convective Heat Transfer in Porous Media for Energy Storage, VDM Verlag, 2009. 17. Manjit Singh; Chanpreet Singh; Ganga Charyulu, "Review of hydraulic conductivity and permeability

relation in flow through porous medium," International Journal of Engineering Studies, volume 6, pp. 429-

434, 2014.