Você está na página 1de 66

International Journal of Recent

Technology and Engineering


ISSN : 2277 - 3878
Website: www.ijrte.org
Volume-7 Issue-4S, November 2018
Published by:
Blue Eyes Intelligence Engineering and Sciences Publication

y and Engine
og
ol e
ri n
hn

g
ent Tec

Ijrte
Rec
EX

N
O
In
P

of

OR TI
L

ING VA
INNO
t

l er
na na
nal Jour tio
www.ijrte.org
Exploring Innovation
Editor-In-Chief Chair
Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal
(M.P.), India

Associated Editor-In-Chief Chair


Dr. Vinod Kumar Singh
Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Associated Editor-In-Chief Members


Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said


Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology, Port Training Institute, Arab Academy for Science, Technology and Maritime
Transport, Egypt

Dr. Mayank Singh


PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.

Scientific Editors
Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran.

Dr. Moinuddin Sarker


Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.

Dr. Shanmugha Priya. Pon


Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania

Dr. Veronica Mc Gowan


Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.

Dr. Fadiya Samson Oluwaseun


Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.

Dr. Robert Brian Smith


International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra


Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair


Dr. Deepak Garg
Professor & Head, Department of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members


Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah


Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue


Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.

Dr. Hugo A.F.A. Santos


ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia


Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg


Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.

Technical Program Committee Chair


Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members


Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas


Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov


Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr. Ch.V. Raghavendran


Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang


Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,
Hochiminh, Vietnam.

Dr. Wilson Udo Udofia


Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Convener Chair
Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India

Editorial Chair
Dr. Sameh Ghanem Salem Zaghloul
Department of Radar, Military Technical College, Cairo Governorate, Egypt.

Editorial Members
Dr. Uma Shanker
Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India

Dr. Rama Shanker


Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumar


Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India

Dr. Brijesh Singh


Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,
Ahmedabad (Gujarat), India.

Dr. J. Gladson Maria Britto


Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad (Telangana), India.

Dr. Sunil Tekale


Professor, Dean Academics, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad
(Telangana), India.
Volume-7 Issue-4S, November 2018, ISSN: 2277-3878 (Online)
S. Page
No Published By: Blue Eyes Intelligence Engineering & Sciences Publication No.

Authors: S.R.Saratha, Vijeta Iyer, R.Manju


Paper Title: Subspace Homotopy Methods for Solving Nonlinear Equations
Abstract: The concept of Newton subspace homotopy method has been introduced in this paper. As Newton –
Homotopy method can’t be used for all the functions in topological spaces. So an algorithm has been developed by
finding a subspace of the given space for which the subspace homotopy function has been found.

Keywords: Homotopy, Newton-Raphson Method, Subspace Homotopy, Matlab 2010 AMS Subject Classification:
55P10, 55P35, 55P99.
1.
References:
1. Abbasbandy, S (2003). ‘Improving Newton-Raphson method for nonlinear equations by modified Adomian decomposition method’ Applied 1-4
Mathematics and Computation, 145 (2-3).pp.887-893.
2. Saratha S R, Sai Sundara Krishnan G, Vijeta Iyer (2017) ‘Homotopy on Subspace Topology’. International Journal of Pure and Applied
Mathematics, Volume 116 No. 12 2017, 189-197.
3. Nor Hanim Abd. Rahman,Arsmah Ibrahim, Mohd Idris Jayes (2011) ‘ Newton Homotopy Solution for Nonlinear Equations Using Maple14,
Journal of Science and Technology | ISSN 2229-8460 | Vol. 3 No. 2 December 2011
4. Palancz B, Awange J.L, Zaletnyik P and Lewis R.H (2010) ‘Linear homotopy solution of nonlinear systems of equations in geodasy’ Journal
of Geodasy 84(1).pp.79-95.
5. Borsuk, K. (1967). Theory of Retracts. Polish Scientific Publishers, Warsaw.
6. Dugundji, J. ( 1966). Topology. Allynand Bacon, Boston.
Authors: T Thulasimani
Application of Scheduling using Critical Path Method to Hydraulic Performance of Impeller for a
Paper Title:
Multistage Submersible Pump
Abstract: The present study is an application of scheduling using critical path method without any restriction in
resource.The study describes a full evaluation on hydraulic performance of impeller for a multistage submersible
pump. Based on the planning project duration for completion wasfifty two weeks. However, the application of
critical path to the study resulted tothirty nine weeks, a difference of 13 weeks reduction.

Keywords: Critical path analysis, scheduling, hydraulic performance of impeller for a multistage submersible
2.
pump.
5-7
References:
1. Christopher M (2000),” The agile supply chain: competing in volatile markets”.Industrial Marketing Management 29: 37-44.6
2. Kielmas M (2015),” History of the Critical Path Method”. Small BusinessChronCom Demand Media.1
3. Gray CF, Larson EW., ”Project management: The managerial process”. Asia: McGraw-Hill; 2010.
4. Bricknell L., “Project planning: Part I. In: Oossthuizen T, Venter R, eds. Project management in perspective”. South Africa: Oxford
University Press; 2011.
5. Hadju M., “Network scheduling techniques for construction project management”. Netherlands: Netherlands Kluwer Academic Publisher;
1997.
Authors: N. Rajathi, N. Suganthi, Shilpa R.
Paper Title: Automatic Electricity Bill Generating System
Abstract: The traditional way of reading energy meter is an expensive work where the reader of the meter has to
go in person to each meter and take the meter reading manually. This manual reading goes into into the billing
software to generate the bill to automate the payment process. This method of reading has short comings, such as
reading error and involves more labors. To overcome this issue, an automatic power meter reading and billing
system is proposed. Automation of energy meter reading and billing data entry process would reduce the laborious
task and financial wastage. The proposed work measures the energy consumption in each house and generates the
bill automatically with Arduino and Wi-Fi. The main goal of this work is to reduce the energy consumption in
houses by notifing the owner continuously about the amount of units that are consumed. The goal of this work is to
automate the billing process by checking the electricity unit’s consumption in a house and hence subsequently
reduces the manual labor. The calculations are carried out automatically and the bill is updated on the Internet by the
3. help of Wi-Fi. The bill amount can be checked by the owner anywhere and at any time by visiting the website or the
online portal.
8-11
Keywords: Arduino, Electric meter, Wi-Fi module, Billing

References:
1. Ashna.k , Sudhish N George. “GSM Based Automatic Energy Meter Reading System with Instant Billing” 978-1-4673-5090-7©2013
IEEE
2. Liting Cao, Jingwen Tian and Dahang Zhang “Networked Remote Meter-Reading System Based on Wireless Communication Technology”
IEEE International Conference on Information Acquisition, August 20 – 3, 2006, Weihai, Shandong, China.
3. Vinu V Das, “Wireless Communication System for Energy Meter Reading” International Conference on Advances in Recent Technologies
in Communication and Computing 2009.
4. [4] T. Chandler, “The technology development of automatic metering and monitoring systems,” in IEEE International Power Eng. Conf.,
Dec. 2005.
5. Smart meter Implementation Strategy Prospectus. July 2010. DECC, Of gem/Ofgem E-Serve.
6. M. Faisal and A. Mohamed, “A new technique for power quality based condition monitoring,” in 17th Conf. Electrical Power Supply
Industry, Oct. 2008.
7. Md. Wasi-ur-Rahman, Mohammad Tanvir Rahman, Tareq Hasan Khan and S.M. Lutful Kabira, “Design of an Intelligent SMS based
Remote Metering System”, Proceedings of the 2009 IEEE International Conference on Information and Automation June 22 -25, 2009,
Zhuhai/Macau, China.
8. Aryo Handoko Primicanta, Mohd Yunus Nayan, Mohammad Awan,”Hybrid System Automatic Meter Reading”, Computer Technology and
Development, 2009. ICCTD'09.
9. S.Arun,Dr, Sidappa Naidu ,“Hybrid Automatic Meter Reading System”,in July 2012 International Journal of Advanced Research in
Computer Science and Software Engineering.
10. Sapna Ganurkar, Pravesh Gour.”Prepaid Energy Meter for Billing System Using Microcontroller and Recharge Card”, International Journal
Of Core Engineering & Management (IJCEM) Volume 1, Issue 1, April 2014.
11. Tarek Khalifa, Kshirasagar Naik and Amiya Nayak “A Survey of Communication Protocols for Automatic Meter Reading Applications” in
IEEE Communications Surveys & Tutorials, vol. 13, no. 2, second quarter 2011.
12. Suganthi N, Arun R, Saranya D and Vignesh N, “Smart Security Surveillance Rover”,International Journal of Pure and Applied
Mathematics, Vol. 116, No.12, 2017, 67-75.
13. Vanitha, V, Sumathi,VP,Cynthia,J and Illakia,B “Next Generation Vehicle Diagnostic Systems”, International Journal of Pure and Applied
Mathematics Volume 116 No. 11 2017, 251-259.
Authors: Sumathi VP, Vanitha V, Divyadarshini M
GDP based Medal Count Analysis in Summer Olympics Games for Two Decades - An Exploratory
Paper Title:
Analysis
Abstract: The Olympics games started way long back with many participants and winners from all over the world.
The game involved in many disciplines and made a bigger impact on the participants and the audience as well. A
big data boom is on the horizon, so it's more important than ever to take control of this data. Instinctively this
analysis recognise that to perform better than the competitors, this need accurate evidence and data to base the
decisions on. The game had its debut in the year 1896 and the progress till now is recorded with the athlete's
respective years,disciplines,total medal counts. The goal of this thesis included improved understanding of the
competing countries and to develop the players’ skills more efficiently for both the extremes (First 10 and Last 10
countries). The analysis is taken by the data of last 5 summer Olympics Games using statistical methods such as
correlation factor. Performance analysis is based on the correlation factor with respect to country’s GDP (Gross
Domestic Product), total medal counts and gold medal counts. This analysis results in an outcome for both extremes
meant to amplify the information, which can make the users get higher knowledge about their competitors and
country to proceed. There are attributes(year,GDP in million) taken from the dataset and derived attributes(country
wise total medal count and country wise men and women athletes count and distinct medal counts for men and
women) obtained and analysed to give the knowledge of both extreme countries’ (First 10 and Last 10 countries)
4. performance in each year. Finally, the analysed data is plotted in graphs, which can help to find the successes as
well asdisappointments. 12-16
Keywords: exploratory data analysis; olympics analytics ; performance; medal count analysis; gross domestic
product (GDP); analysis;competitors skillsets; disciplines; regular expository; statistical methods; sample variance;
graphs;

References:
1. Lozano S et al., “ Measuring the performance of nations at the Summer Olympics using data envelopment analysis,” Journal of Operational
Research Society. vol. 53, May 2002.
2. Yang Yu, Xiao Wang. World Cup 2014 in the Twitter World: “A big data analysis of sentiments in U.S. sport fans’ tweet.Computers in
Human Behavior”,vol. 48, July 2015.
3. Yongjun Li et al., “ Performance evaluation of participating nations at the 2012 London Summer Olympics by a two-stage data
envelopment analysis”,.International Journal of Operational Research. December 2014.
4. Jayantha K, Ubayachandra E G.Going for Gold Medals:” Factors affecting Olympic Performance.International Journal of Scientific and
Research Publications”,vol.5.6,June 2015.
5. Akalank Jayakumar ,Title “Is gdp of country and medal count are related”., In blog.September 2016.
6. Hartley Brody, Title:”Global Dominance: Olympics Vs GDP”.,In blog.August 2106.
7. Sumathi, VP, Kousalya, K, Vanitha, V, Cynthia, J, (2018), ‘ Crowd estimation at a social event using call data records’, Int. J. Business
Information Systems, Vol 28, No. 2, pp 446-461.
Authors: D. Arun Kumar, J. Merline Shyla, Francis P. Xavier
Synthesis and Optical, Photoconductivity Study of Safranin O Dye Sensitized Titania/Silica oxide
Paper Title:
system Prepared by Modified Sol-gel Method
Abstract: Binary TiO2/SiO2 oxides were prepared by modified sol-gel method and calcined at 500oC for 5 hours.
The TiO2/SiO2nanocomposites was sensitized with different concentrations of Safranin O dye solutions ranging
from 1x10-2 mM to 5x10-2mM. The amount of dye adsorbed, amount of dye absorbed per unit mass and percentage
of dye adsorbed increases with increase of concentration of dye. The Safranine O dye-sensitized
TiO2/SiO2nanocomposites exhibit an intense peak at 520 nm due to n→π* transition enhances the spectral response
of TiO2/SiO2nanocomposites to visible light. The field dependent dark and photoconductivity studies reveals that
the dark and photocurrent are increase linearly with applied field. From the photoconductivity results, it was
5.
observed from the plots that for the highest concentration of dye sensitized (5x10-5 M), the photo current density
increases by an order of 75 in comparison with that of TiO2/SiO2nanocomposites. 17-22

Keywords: TiO2-SiO2, Oxides, Composites, Mesoporous, Photoconductivity, Semiconductors, Dye Sensitization.

References:
1. Hagfeldt A, Gratzel, M Molecularphotovoltaics, Acc. Chem. Res. 33 (2000) 269-277.
2. Klein S, Thorimbert S, W.F. Maier, Amorphous MicroporousTitania–Silica Mixed Oxides: Preparation, Characterization, and Catalytic Redox
Properties, J. Catal. 163 (1996) 476-488.
3. R. Mariscal, M. López-Granados, J.L.G. Fierro, J.L. Sotelo, C. Martos, R. van Grieken Morphology and Surface Properties of Titania−Silica
Hydrophobic Xerogels, Langmuir 16 (2000) 9460-9467.
4. Fraile J. M, García J. I, Mayoral J. A, Vispe E, Catalytic sites in silica-supported titanium catalysts: silsesquioxane complexes as models, J.
Catal. 233 (2005) 90-99.
5. Martin A. Green, Keith Emery, Yoshihiro Hishikawa, Wilhelm Warta Solar cell efficiency tables, photovolt. res. Appl. 19 (2011) 84-92.
6. Arun Kumar D, Francis P. Xavier, MerlineShyla J, Natural dye sensitization of TiO2 thin films using Lawsone dye extracted from
LawsoniaInermis for solar cell applications, Archives of Applied Science Research 4 5 (2012) 2122-2132.
7. PlinioInnocenzi, Alessandro Martucci, Massimo Guglielmi, Andrea Bearzotti, Enrico TraversaElectrical and structural characterization of
mesoporous silica thin films as humidity sensors 76 1-3 (2001) 299-303.
8. Aguado J, Grieken R V, Munoz M.J.L, Marugan J, Comprehensive study of the synthesis characterization and activity of TiO2 and mixed
TiO2/SiO2 photo catalyst. Applied Catalysis A: General. 312 (2006) 202-212
9. Anders Hagfeldt, BengtDidriksson, Tommy Palmqvist, Henrik Lindstrom, Sven Sodergren, HåkanRensmo, Sten-Eric Lindquist, Verification
of high efficiencies for the Gratzel-cell. A 7% efficient solar cell based on dye-sensitized colloidal TiO2 films, Solar Energy Materials and
Solar Cells 31 4 (1994) 481-488.
10. Ponniah D, Xavier F, Electrical and electroreflectance studies on ortho-chloranil-doped polyanalinePhysica B 392 1-2 (2007) 20-28
11. Arun Kumar K, Prakash SM, Low cost removal of Basic dye from aqueous solution using silk cotton hull, Journal of Environmental Research
and Development 3 (2009) 728-734.
12. Subba Reddy Y, Jeseentharani V, Jayakumar C, Nagaraja KS, Jeyaraj B Adsorptive removal of malachite green (oxalate) by low cost
adsorbant, Journal of Environmental Research and Development 7 (2012) 275-284.
13. Zhou Lijun, Shanshan Yan, BaozhuTian, Jinlong Zhang, Masakazu Anpo, Preparation of TiO2–SiO2 film with high photocatalytic activity on
PET substrate, Materials Letters 60 (2006) 396–399.
14. KyeongYoul Jung, Seung Bin Park, Photoactivity of SiO2/TiO2 and ZrO2/TiO2 mixed oxides prepared by sol-gel method, Materials letter 58
(2004) 2897-2900.
15. Li-Lan Yang, Yi-Sheng Lai, Chen JS, Compositional tailored sol-gel SiO2-TiO2 thin films: crystallization, chemical bonding configuration
and optical properties, Journal of Materials Research 20 (2005) 3141-3149.
16. Arun Kumar D, MerlineShyla J, Francis P. Xavier, Synthesis and characterization of TiO2/SiO2nanocomposites for solar cell applications,
Applied nanosciences 2 (2012) 429-436.
17. Yin Zhao, Chunzhong Li, Xiuhong Liu, FengGu, Haibo Jiang, Wei Shao, Ling Zhang, Ying He Synthesis and optical properties of TiO2
nanoparticles, Materials Letter 61 (2007) 79-83.
18. J Mohan, Organic Spectroscopy Principles and Applications, Narosha Publishing House Pvt. Ltd, 2ndedn. New Delhi, 2009, pp 28-95.
19. Aziz RadhiyanAbd, SopyanIis, Synthesis of TiO2-SiO2 powder and thin film photocatalysts of sol-gel method, International Journal of
Chemistry 48 (2009) 951-957.
20. XiaoyiShen, YuchunZhai, Yang Sun, HuiminGu, Preparation of monodisperse spherical SiO2 by microwave hydro-thermal method and
kinetics of dehydrated hydroxyl, J Mater Sci Technol. 26 (2010) 711-714.
21. MerlineShyla J, Electro-optical characterization of titanium dioxide-organic dye composites and fabrication of dye-sensitized solar cell using
sol-gel coated TiO2 electrodes, Ph.D thesis, University of Madras, Chennai, 2005, pp. 196.
22. Marie-Isabella Baraton, Nano-TiO2 for solar cells and photocatalytic water splitting: scientific and technological challenges for
commercialization, The open Nanoscience Journal 5 (2011) 64-77.
23. Brian O'regan, Michael Grätzel, A low-cost, high-efficiency solar cell based on dye-sensitized colloidal TiO2 films,Nature 353 (1991) 737 –
740.
24. Dhar S, Chakrabarti S Electroless, Ni plating on n and p-type porous silicon Si for ohmic and rectifying contacts, Semicond. Sci. Technol. 11
(1996) 1231-1234.
25. Arun Kumar D, Francis P. Xavier, MerlineShyla J, Investigations on the variation of conductivity and photoconductivity of CuO thin films as
a function of layers of coating, Archives of Applied Science Research 4 5 (2012) 2174-2183.
26. Simon J, Andre JJ Molecular Semiconductors: Photoelectrical properties and solar cells, Springer-Verlag, Germany, 1985, pp. 6.
27. Ponniah JD, Electrical conductivity and Spectral investigations of pure and doped polyanaline complexes, Ph.D thesis, University of Madras,
Chennai, 2005, pp. 27.
28. Xavier FP, Optical and Transport properties of Phthalocyanine and related compounds, UMI, Ann Arbor, 1993, pp. 48.
29. Arun Kumar D, Alex Xavier J, MerlineShyla J, Francis P. Xavier, Synthesis and structural, optical and electrical properties of
TiO2/SiO2nanocomposites, Journal of Materials Science 48 10 (2013) 3700-3707.
Authors: Deeparani M, Kalamani M, Krishnamoorthi M
Paper Title: A Survey on Ultrasound Image Segmentation Algorithm for Detection of Female Pelvic Masses
Abstract: Imaging is a very precious tool for diagnostic purpose and various modalities provides an excellent way
for viewing the anatomy of the organs. These various imaging modalities are used for differentiating normal and
diseased anatomy. For providing support to these imaging modalities computers are used for processing and
analysis. This research paper provides a review of recent image segmentation algorithms for medical images. From
the recent survey, the various methods and applications of medical image segmentation are discussed. The narrative
of this paper is focused on different image segmentation algorithms used for computer aided diagnosis of female
pelvic masses for ultrasound.

Keywords: Female Pelvic Masses, Ultrasound Images, Segmentation Algorithms, Clustering

6. References:
1. Faria S.C, “Evaluation of the Patient with a Pelvic Mass”, Indian J RadiolImag , 25 (2):137–47, 2015. 23-25
2. LidiyaThampi, Varghese Paul, “Abnormality recognition and feature extraction in female pelvic ultrasound imaging,” Informatics in
Medicine, 23 February 2018.
3. Alcazar JL, “ The role of ultrasound in the assessment of uterine cervical cancer”, J ObstetGynaecol India 64(5):311–6, 2014.
4. Sonia H. Contreras Ortiza, TsuichengChiua, Martin D. Foxa, “Ultrasound image enhancement: A review” Biomedical Signal Processing and
Control, 7, 419– 428, 2012.
5. Y. Zimmer and S. Akselrod, “Image segmentation in obstetrics and gynecology,” Ultrasound Med. Biol, vol. 26, no. 1, pp. S39–S40, 2000.
6. Dilna K T and D.JudeHemanth, “Detection of Uterus Fibroids in Ultrasound Images: a survey” International Journal of Pure and Applied
Mathematics. ISSN: 1311-8080, Volume 118 No. 16, 139-159, 2018.
7. R. Muzzolini, Y. H. Yang, and R. Pierson, “Multiresolution texture segmentation with application to diagnostic ultrasound images,” IEEE
Trans. Med. Imag., vol. 12, no. 1, pp. 108–123, 1993.
8. R. Muzzolini, Y. H. Yang, and R. Pierson, “Texture characterization using robust statistics,” Pattern Recognition., vol. 27, no. 1, pp. 119–
134, 1994.
9. Shivakumar K. HarlapurRavindra S. Hegadi, “Segmentation and Analysis of Fibroid from Ultrasound Images” , International Journal of
Computer Applications, 2015.
Authors: P. Kannappan, R. Dhanasekaran
7. Structural and Optical Characterization of ZnS Nanoparticles Synthesized by Low Temperature
Paper Title:
Solid-State Method
Abstract: The ZnS nanoparticles were synthesized by solid state reaction method. The synthesized sample was
characterized by powder XRD, SEM, EDAX, UV-visible, fluorescence and FT Raman analysis. The powder XRD
analysis shows the broad (111), (220) and (311) peaks which confirms the formation of cubic structure. The SEM
image shows the agglomerated spherical shape of morphology. The EDAX analysis shows the composition of Zn
and S are 46.47% and 53.53% respectively. The UV-Visible spectrum analysis shows the absorption wavelength as
325 nm and calculated band gap 3.81 eV. The fluorescence study reveals the near band edge emission at 363 nm and
defect level peaks were observed in the higher wavelength of the photoluminescence spectrum. FT Raman analysis
shows the vibration frequency at 234 cm-1 is due to the longitudinal optical (LO) mode of Zn-S lattice.

Keywords: ZnS, XRD, SEM, EDAX, Optical Properties

References:
1. Navneet Kaur, Sukhmeen Kaur, Jagpreet Singh and Mohit Rawat, J
Bioelectron Nanotechnol 1(2016) 1-5 26-28
2. B. Khamala, L. Franklin, Y. Malozovsky, A. Stewart, H. Saleem, D.
Bagayoko, Computational Condensed Matter 6 (2016) 18-23
3. Ashish Tiwari, S. J. Dhoble, RSC Advances, 6(2016) 64400-64420
4. Houcine Labiadh, Karima Lahbib, Slah Hidouri, Soufiane Touil, Tahar BEN Chaabane Asian Pacific Journal of Tropical Medicine 9 (2016)
757- 762
5. Xianfu Wang, Hongtao Huang, Bo Liang, Zhe Liu, Di Chen, Guozhen Shen, Critical Reviews in Solid State and Materials Sciences, 38
(2013) 57-90.
6. Li Dao-hua, He Shao-fen, Chen Jie, Jiang Cheng-yan, Yang Cheng, IOP Conf. Series: Materials Science and Engineering 242 (2017) 012023
7. Guinier, A. X-ray Diffraction, Freeman, San Francisco 1963.
8. Edgar Mosquera, Nicolas Carvajal Materials Lett.129 (2014) 8-11
9. Yingyot Infahsaeng Sarute Ummartyotin, Results in Phys., 7(2017) 1245-1251
10. M. Dimitrievska, H. Xie, A. J. Jackson, X. Fontane, M. Espindola-Rodriguez, E. Saucedo, Perez-Rodriguez, A. Walsh, V.Izquierdo-Roca,
Phys.Chem. Chem.Phys. 18(2016)7632
11. E. A. Vinogradov, B. N. Mavrin, N. N. Novikova, V. A. Yakovlev, and D. M. Popova, Laser Phys. 19(2009)162-170.
12. Y.C. Cheng, C. Q. Jin, F. Gao, X.L. Wu, W. Zhong, S.H. Li, Paul K, Chu, J. Appl. Phys. 106(2009)123505-5
Authors: A. Mahudeswaran, J. Vivekanandan, P. S. Vijayanand, J. Chandrasekaran
Investigations Onnewnanostructuredpoly (M-Toluidine-Co-3-Aminobenzoic Acid) Copolymer in
Paper Title:
Presence of DBSA Surfactantmoleclule by Insitu-Polymerisation
Abstract: A novel nanostructured poly (m-toluidine-co-3-aminobenzoic acid) copolymer has been prepared using
dodecylbenzenesulphonic acid as surfactant and ammonium persulphate as oxidant at different monomer
concentrations. The synthesized copolymer was soluble in solventslike DMSO, NMP, DMF and THF. The
copolymers were subjected various analytical characterization methods such as electronic spectroscopy, FTIR
spectroscopy, X-ray diffraction method, scanning electron microscopy and electrical conductivity. The UV-visible
spectra reveals the π – π* and n-π* transitions at 313 nm and 517 nm respectively. FTIR absorption bands confirm
benzenoid and quinoid rings in the copolymer chain. The X-ray diffraction study reveals that the copolymer is
amorphous in nature. The DC electroactive nature of the copolymer is found to be 10-9 to 10-10 S/cm.The
synthesized copolymer will show a change in resistance when exposed to the humidity and ammonia vapor sensors.

Keywords: Conjugated Polymer, Copolymer, Surfactant, Sensors

References:
1. Lange, U, Roznyatovskaya, NV &Mirsky, VM 2008, ‘ Conducting polymers in chemical sensors and arrays’, AnalyticaChimicaActa,
vol. 614, no.1, pp. 1-26.
2. Qiu, Y, Duan, L & Wang, L 2002, ‘Flexible organic light-emitting diodes with poly-3,4-ethylenedioxythiophene as transparent anode’,
Chinese Science Bulleting, vol. 47, no.23, pp. 1979-1982.
3. Bejbouji, H, Vignau, L, Miane, JL, Dang, MT, Oualim, EM, Harmouchi, M &Mouhsen, A 2010, ‘Polyaniline as a hole injection layer on
organic photovoltaic cells’, Solar Energy Materials and Solar Cells, vol. 94, no. 2, pp. 176-181.
8. 4. Zhang, J, Sun, B, Ahn, HJ, Wang, C & Wang, G 2013, ‘Conducting polymer-doped polypyrrole as an effective cathode catalyst for LiO2
batteries’, Materials Research Bulletin, vol. 48, no. 12, pp. 4979 – 4983.
29-33
5. Diniz, FB, Andrade, GF, Martins, CR &Azevedo WM 2013, ‘A comparative study of epoxy and polyurethane based coatings containing
polyaniline-DBSA pigments for corrosion protection on mild steel’, Progress in Organic Coatings, vol. 76, no.5, pp. 912-916.
6. Panigrahi, R &Srivastava, SK 2015, ‘Tollen’s reagent assisted synthesis of hollow polyaniline microsphere/Ag nanocomposites and its
applications in sugar sensing and electromagnetic shielding’, Materials Research Bulletin, vol. 64, no.1 pp. 33-41.
7. Ram, MK, Maccioni, E &Nicolini C 1997, ‘The electrochromic response of polyaniline and its copolymeric systems’, Thin Solid Films, vol.
303, no.1-2, pp. 27-33.
8. Shi, B, Ren, J, Wang, A, Liu, X & Wang, Y 2009, ‘Synthesis and characterization of wormhole-like mesostructuredpolyaniline’, Journal of
Materials Science’, vol.44, pp. 6498-6504.
9. Cao, Y, Smith, P &Heeger, AJ 1992, ‘Counter-ion induced processability of conducting polyaniline and of conducting polyblends of
polyaniline in bulk polymers’, Synthetic Metals. vol. 48, no.1, pp. 91-97.
10. Vogel, S &Holze, R 2005, ‘Spectroelectrochemistry of intrinsically conducting aniline-thiophene copolymers’, ElectrochimicaActa, vol.50,
no.7-8, pp. 1587-1595.
11. Aleshin, AN, Lee, K, Lee, Y, Kim, DY & Kim CY 1999, ‘Comparison of electronic transport properties of soluble polypyrrole and soluble
polyanilne doped with dodecylbenzene sulfonic acid’, Synthetic Metals, vol.99, no.1, pp. 27-33.
12. Massoumi, B &Mozaffari, Z 2014, ‘Synthesis and properties of electroactivepolyaniline-graft-poly (2-hydroxy ethyl metacrylate)
copolymers’, Functional Polymers: Polymer Science Series B, vol.36, no.3, pp. 369-376.
13. Sevil, UA, Emel, C &Olgun, G 2014,‘Electrical conductivity and spectroscopic characterization of Blends of poly(2-chloroaniline)/
polyaniline P(2ClANI)/PANI copolymer with PVC exposed to gamma-rays’, Radiation Physics and Chemistry, vol. 94, no. 1, pp. 45-48.
14. Mu, S 2004, ‘Electrochemical copolymerization of aniline and o-aminophenol’, Synthetic Metals, vol. 143, no. 3, pp. 259-268.
15. Sharma, S & Kumar D 2010, ‘Study on solvatochromic behavior of polyaniline and alkyl substituted polyanilines’, Indian journal of
Engineering Materials Science, vol. 17, no.3, pp. 231-237
16. Shreepathi, S &Hoolze R 2007, ‘Benzoyl-Peroxide-Initiated Inverse emulsion copolymerization of Aniline and o-Toluidine: Effect of
Dodecylbenzenesulfonic Acid on the Physicochemical Properties of the Copolymers’, Macromolecular Chemistry and Physsics, vol. 208,
no.6, pp. 609-621
17. Taka, T, Laakso, J &Levon, K 1994, ‘Conductivity and structure of DBSA protonated polyaniline’, Solid State Communications, vol.92, no.
5, pp. 393-396.
18. Vijayanand, PS, Mahudeswaran, A, Vivekanandan J &Kumbar, SG, 2015, ‘Efficient synthesis of nanostructured poly (aniline-co-m-
aminobenzoic acid) copolymer in presence of DBSA Surfactant’, Tenside Surfactants Detergents, vol. 52, no.3, pp. 230-235.
19. Shahi, M., Moghimi, A., Naderizadeh, B., &Maddah, B. (2011). Electrospun PVA–PANI and PVA–PANI–AgNO composite nanofibers.
ScientiaIranica, vol. 18, pp.1327–133
20. S Feng, X. M. (2010). Synthesis of Ag/polypyrrole core–shell nanospheres by a seeding method. Chinese Journal of Chemistry, vol. 28,
pp.1359–1362.
21. Chen, W &Xue, G 2010, ‘Formation of conducting polymer nanostructures with the help of surfactant crystallite templates’, Frontiers of
Materials Science, vol. 4, no. 2, pp. 152-157.
22. Ren, L Li, K & Chen, X 2009, ‘Soft template method to synthesize polyanilinemicrotubes doped with methyl orange’, Polymer Bulletin, vol.
63, no.1, pp. 15-21.
23. Kumar, D 2000, ‘Synthesis and characterization of poly (aniline-co-o-toluidine) copolymer’, Synthetic Metals, vol. 114, no. 3, pp. 369-372.
24. Jonforsena, M, Grigaleviciusb, S, Anderssor, MR &Hjertberg, T 1999, ‘Counter-ion induced solubility of polypyrridines’, Synthetic Metals,
vol.102, no. 1-3, pp. 1200-1201.
25. Gupta, K, Jana, PC &Meikap AK 2010, ‘Optical and electrical transport properties of polyaniline-silver nanocomposite’, Synthetic Metals,
vol. 160, no. 13-14, pp. 1566-1573.
26. Chiang, JC & MacDiarmid, AG 1986, ‘‘Polyaniline’: Protonic acid doping of the emeraldine form to the metallic regime’, Synthetic Metals,
vol.13, no.1-3, pp. 193-205
27. Biswas, S, Dutta, B & Bhattacharya, S 2014, ‘Consequence of silver nanoparticles embedment on the carrier mobility and space charge
limited conduction in doped polyaniline’, Applied Surface Science, vol. 292, pp. 420-431.
28. Zhang, L & Wan, M 2003, ‘Self-Assembly of polyaniline-from nanotubes to hollow microspheres’, Advanced Functional Materials, vol. 13,
no.13, pp. 815-820.
29. Haba, Y, Sega, E, Narkis, M, Titelman, GI &Siegmann, A 2000, ‘Polyaniline-DBSA/polymer blends prepared via aqueous dispersions’,
Synthetic Metals, vol.110, no.3, pp. 189-193.
Authors: Sasikumar. C, Sundaresan. R, Nagaraja. M
Paper Title: Hydrogen Production and Power Generation from Ocean Waves
Abstract: Oceans get heated repetitive by the solar radiation from sun. Ocean covers almost 85% of the globe
surface; ocean power has high potential for both electricity production and other byproducts. Solar energy
contributes to a reduction of greenhouse gases when compared to energy generated from fossil fuels. Ocean energy
source will be an apt solution for meeting global demands of electricity. The nonrenewable energy resources of
petroleum and other co2 sources are increasing the pollution level and causing the environmental affects. in future
decades fossil sources like oil and coal might be shortage and huge hike in capital cost of coal. This research paper
focuses a method of generating power by utilizing the temperature variation between the ocean surface and colder
deep waters. This paper further discusses the electrolysis process for converting the power produced in an ocean
thermal energy conversion system into hydrogen, environmental effect and special conditions of these processes.

Keywords: Hydrogen; Energy from Ocean; Renewable.

References:
1. http://peswiki.com/index.php/Directory:Sea_Solar_Power
2. http://www.esru.strath.ac.uk/EandE/Web_sites/02- 03/ocean_thermal_energy/group%20project/exports/otecex.html
3. Sun F, Ikegami Y, BaojuJia and Arima H, “Optimization design and Exergy analysis of organic rankine cycle in ocean thermal energy
conversion”, Applied Ocean Research, 35, 38– 46, 2012.
4. Nihous G C, “An estimate of Atlantic Ocean thermal energy conversion (OTEC) resources”, Ocean Engineering 342210–2221 2007.
9. 5. Soerensen H C and Weinstein A, “Ocean energy: position paper for IPCC”, In: Proc of IPCC scoping meeting on Ren. En.Sources, Lubeck,
Germany; 2008. 34-36
6. Scruggs J and Jacob P, “Harvesting ocean wave energy”, Science 323:1176; 2009.
7. Cornett A M A, “Global wave energy resource assessment”, In: Proc of the eighteenth international offshore and polar eng. Conference,
Canada: Vancouver; 2008.
8. http://www.nelha.org/about/history.html
9. Vega L A, “Ocean Thermal Energy Conversion Primer”, Marine Technology Society Journal, Vol. 6, No.4, Winter 2002/2003, pp. 25-35.
10. Masutani S M and Takahashi P K, “Ocean thermal energy conversion”, University of Hawaii at Manoa, Honolulu, HI, USA, 2001
Academic Press.
11. Kazim A and Veziroglu T N, “Role of PEM fuel cells in diversifying electricity production in the United Arab”, Emirates,International
Journal of Hydrogen Energy Vol.28, no. 3, 349–355, 2003.
12. Penner S S, “Steps Toward the Hydrogen Economy”, Center for Energy Research, The Environmental Literacy Council, 2002.
13. Avery W H, and Berl W G, “Solar energy from the tropical oceans”, International Journal of Hydrogen Energy, Vol. 24, No.4, 1999, pp.
295–298.
14. http://www.colano-corp.com/otec_tech.htm
15. Ikegami Y, Fukumiya K, Jitsuhara K O S and Uehar H, “Hydrogen Production Using OTEC”, Proceedings of The Twelfth (2002)
International Offshore and Polar Engineering Conf, pp.626-630.
16. Yamada N, Hoshi A and Ikegami Y, “Performance simulation of solar-boosted ocean thermal energy conversion plant”, Renewable Energy,
Vol. 34, 2009, pp. 1752–1758.
17. Kobayashi H, “Water from the Ocean with OTEC”, Forum on Desalination using Renewable Energy, 2002.
18. http://www.esru.strath.ac.uk/EandE/Web_sites/02-03/ocean_thermal_energy/group %20project/exports/otecex.html
19. Bechtel M and Netz E, “Ocean Thermal Energy Conversion”.
20. Etemadi A, Emdadi A, Afshar O A and Emami Y, “Electricity Generation by the Ocean Thermal Energy”, Energy Procedia, ICSGCE 2011,
Chengdu, China, 2011.
Authors: M. Dinesh Kumar
Paper Title: Automation of Sand Core Drilling Process in Casting Industries
Abstract: Casting industries use different types of materials for making materials of complex shapes. Sand core
10. is one of the cost effective methods for such a process. In order to get a shape a sand core is used. Core is a device
used in casting and molding processes to produce materials of different shapes. Sand core is a delicate material
37-38
which is highly prone to damages when handled manually. The productivity is also less due to the damages of
manual handling. This paper discusses about the sand core drilling process used in industries manually and
automating those processes using rack and pinion method with relay logic control mechanism.
Keywords: Sand Core, Industries, Drilling Methods.

References:
1. Aadnoy, BerntSigve. "Effects of reservoir depletion on borehole stability." Journal of Petroleum Science and Engineering 6.1 (1991): 57-61..
2. A. Thirugnanam, Praphul das and Lenin Rakesh, Department of Mechanical Engineering," Design and Fabrication of Rack and Pinion Lift"
Middle-East Journal of Scientific Research 20 (6): 744-748, 2014 ,ISSN 1990-9233,© IDOSI Publications, 2014,DOI:
0.5829/idosi.mejsr.2014.20.06.11372
3. Howard H. Gerrish, William E. Dugger Jr. and Richard M. Roberts Copyright: 2009 Creating Relay Logic Diagrams
4. Aadnoy, BerntSigve, and EirikKaarstad. "History model for sand production during depletion." SPE EUROPEC/EAGE Annual Conference
and Exhibition. Society of Petroleum Engineers, 2010.
Authors: S. Sudhahar, D. Sharmila
Paper Title: Stabilization of Linear/Nonlinear Autonomous Systems using Lyapunov Functions
Abstract: This paper investigates the Lyapunov function construction of the linear/nonlinear autonomous systems
for stability. The control Lyapunov functions are used to stabilize the system without sacrificing the transient state
performance and trade-off between stability and performance of the system because safety of operation is very
important then the performances of the system. The linear quadratic optimal control problems are solved based on
the control Lyapunov functions for the tracking and disturbance rejection of both SISO and MIMO systems. The
effectiveness of the proposed control Lyapunov functions for the system stability and performances shown through
the numerically simulated examples.

Keywords: Lyapunov functions, Linear/Non linear Autonomous System, LQR, Safety Margins.

References:
1. Katsuhiko Ogata, “Modern Control Engineering” PHI Learning Private Limited, New Delhi, 2012.
2. Gopal M, “Digital Control and State Variable Methods: Conventional and Intelligent Control Systems” Tata McGraw Hill Education Private
11. Limited, New Delhi, 2009.
3. Wim Michiels and Silviu-lulian Niculescu, “Stability and Stabilization of Time-Delay Systems an Eigen value-Based Approach” Society for 39-44
Industrial and Applied Mathematics, Philadelphia, 2007.
4. Qiang Yu and Baowei Wu, “Generalized Lyapunov function theorems and its applications in switched systems” Systems & Control Letters,
Vol.77, pp.40-45, 2015.
5. Mario Sassano and Alessandro Astolfi, “Dynamic Lyapunov functions” Automatica, Vol. 49, pp. 1058–1067, 2013.
6. D. G. Schultz and J. E. Gibson, “The variable gradient method for generating Lyapunov functions” Transactions of the American Institute
of Electrical Engineers, Part II: Applications and Industry, Vol. 81, Issue: 4, 1962.
7. Muhammad Zakiyullah Romdlony and Babu Jayawardhana, “Stabilization with guaranteed safety using Control Lyapunov–Barrier Function”
Automatica, Vol. 66, pp. 39–47, 2016.
8. Eugenio Alcala, Vicenç Puig, Joseba Quevedo, Teresa Escobet, Ramon Comasolivas, “Autonomous vehicle control using a kinematic
Lyapunov-based technique with LQR-LMI tuning” Control Engineering Practice, Vol.73, pp.1-12, 2012.
9. Rohit Gupta, Uroš V. Kalabic, Anthony M. Bloch and Ilya V. Kolmanovsky, “Solution to the HJB equation for LQR-type problems on
compact connected Lie groups” Automatica, Vol. 95, pp. 525-528, 2018.
10. Guillaume Mercère, Régis Ouvrard, Marion Gilson and Hugues Garnier, “Subspace based methods for continuous-time model identification
of MIMO systems from filtered sampled data” Proceedings of the European Control Conference 2007, Kos, Greece, July 2-5, 2007.
11. MATLAB toolbox: user’s guide, Math works, Inc, 2009.
12. Raaja Ganapathy Subramanian Jovitha Jerome, and Vinodh Kumar Elumalai, “Adaptive PSO For optimal LQR tracking control of 2 DoF
laboratory helicopter” Applied Soft Computing, Vol. 41, pp.77-90, 2016.
Authors: G. Sathish Kumar, K. Premalatha, N. Aravindhraj, M. Nivaashini, M. Karthiga
Paper Title: Secured Cryptosystem using Blowfish and RSA Algorithm for The Data in Public Cloud
Abstract: Data Security makes the finest importance in the area of cloud computing. Cryptosystem will provide
the greater security for the data in the cloud. Many encryption techniques are available for secured data storage with
its own advantages and disadvantages. There is a problem of Key escrow and certificate revocation in the identity
based encryption. Personality based encryption is free from security mediator. The certificate less encryption
technique will overcome the key escrow issue and the certificate revocation issue. The task of key production is
shared between the cloud and client in the certificateless encryption. In the proposed framework, the data holder
encodes the data utilizing his/her secret key. Following that the information holder encode the secret key twice to
frame a intermediate key. At that point he/she will send this encoded information and middle of the road keys to the
cloud. The cloud will unscramble the middle of the road key in part and send the mostly decoded key and scrambled
information to the planned beneficiary. The client will decode again the somewhat decoded information which is
sent by the cloud and the client will get the required key for decoding with the goal that the client can decode it
12. totally. The information holder can send similar information to numerous customers with least expense.
45-49
Keywords: Blowfish, Cryptography, Cloud, Security, Encryption.

References:
1. Abdalla ., “Searchable encryption revisited: Consistency properties, relation to anonymousibe, and extensions”, Journal of . Cryrocraphy.,
voloume. 21, no. 3, pp. 350391, Marrch 2008.
2. Boneh “Fine-grained control of security capabilities”, ACM Trans. Internet Technol., volume.4, no.1, 6082, February. 2004.
3. E. Fujisaki et. Al., “Secure integration of asymmetric and symmetric encryption schemes”. In M. J. Wiener, editor, Proceeding . Annual
International Cryptology Conference Santa Barbara, 1999, volume 1666, pp.537554. Springer,1999.
4. https://www.cse.wustl. edu /~jain/cse567-06/ftp/encryption_perf/
5. Rui Guo, Qiaoyan Wen, Huixian Shi, Zhengping Jin, and Hua Zhang, Certificateless Public Key Encryption Scheme with Hybrid Problems
and Its Application to Internet of Things, in Mathematical Problems in Engineering, Volume 2014, Article ID 980274.
6. S. Al-Riyami and K. Paterson, Certificateless public key cryp- tography, in Proc. ASIACRYPT 2003, C.-S. Laih, Ed. Berlin, Germany
Springer, LNCS 2894, pp. 452473.
7. Green and G. Ateniese. Identity-based proxy re- encryption.Internzational Journal of , Applied Cryptography and Network Security Applied
Cryptography and Network Security 2007, volume 42
8. S. S. M. Chow, C. Boyd, and J. M. G. Nieto, Security mediated certificateless cryptography, in Proc. 9th Int. Conf. Theory Practice
PKC, New York, NY, USA, 2006, pp.508524.
9. Nubila Jaleel, Chinju, Mediated certificateless cryptosystem for the security of data in public cloud in IJRET: International Journal of
Research in Engineering and Technology, eISSN: 2319-1163.
Authors: C. Premavathi, P. Thangaraj
Efficient Hand-dorsa Vein Pattern Recognition using KNN classification with Completed histogram
Paper Title:
CB in TP Feature Descriptor
Abstract: Hand-dorsa Vein Recognition System identifies an individual using the human hand vein features. Image
capturing, extracting the features, keeping the features in a descriptor and making classification are important
methods in hand-dorsa vein Recognition. In this paper, the feature descriptor and classification method is proposed
for an efficient recognition system. A completed CB in TP has been proposed to represent selected features from
Hand vein image system. K-nearest classification method with various proximity measure calculations is analysed to
make an efficient classification system. A new minimum distance classification is proposed with dataset and the
results are checked for accuracy and reliability. The proposed technique is calculated on a NCUT Dataset contains
2040 imagesfrom Prof. Yiding Wang, North China University of technology (NCUT) (Wang et al, 2010).
Proximityprocess as Chi-square, City block, Euclidean, Chebychevalong with Murkowski are calculated and
compared used for the better performance. The new resultsproveto facilitate the future feature descriptor achieved
excellent performance for classification system.
13.
Keywords: Feature Descriptor, K-Nearest Image Classification. 50-55

References:
1. T. Ojala, M. Pietikäinen, and D. Harwood, “A comparative study of texture measures with classification based on feature
distributions,” Pattern Recognition, vol. 29, no. 1, pp. 51–59, 1996. View at Publisher ·View at Google Scholar · View at Scopus
2. M. Heikkil, M. Pietikinen, and C. Schmid, “Description of interest regions with center-symmetric local binary patterns,” in Proceedings of 5th
Indian Conference of Computer Vision, Graphics and Image Processing, vol. 4338, pp. 58–69, 2006.
3. S. Liao, M. W. K. Law, and A. C. S. Chung, “Dominant local binary patterns for texture classification,” IEEE Transactions on Image
Processing, vol. 18, no. 5, pp. 1107–1118, 2009. View at Publisher · View at Google Scholar · View at Scopus
4. Tan and B. Triggs, “Enhanced local texture feature sets for face recognition under difficult lighting conditions,” IEEE Transactions on Image
Processing, vol. 19, no. 6, pp. 1635–1650, 2010. View at Publisher· View at Google Scholar · View at Scopus
5. A.K. Jain, Fundamentals of Digital Signal Processing. Englewood Cliffs, NJ: Prentice- Hall, 1989.
6. G. Zhang, X. Huang, S. Z. Li, Y. Wang, and X. Wu, “Boosting local binary pattern (LBP) based face recognition,” in Proc. Advances in
Biometric Person Authentication, ser. Lecture
7. C. Shan, S. Gong, and P. W. McGowan, “Robust facial expression recognition using local binary patterns,” in Proc. IEEE International
Conference on Image Processing, 2005, pp.
Authors: K. Sathis Kumar, K. Paramasivam
Paper Title: Survey on Particle Swarm Optimization Techniques in Network-on-Chip
Abstract: Network-on-Chip (NoC) an interconnection framework is proposed by Numerous number of Intellectual
Property cores in the nature of System-on-Chip(SoC). Communication challenges in a global nature with respect to
nanoscale technology is provided by NoC. A configuration of NoC with its least average traffic in communication,
consumption of power and area covered in chip is the needed in real time applications. Effective routing, mapping
the cache hierarchy, memory and application mapping are the main parameter to increase the efficiency in aNoC.
This can be done with optimization techniques. With optimization technique, NoC can be configured such that the
latency, consumption of power, and chip area engaged in aNoC are made to be minimal. This paper provides a
survey of Particle Swarm Optimization (PSO) algorithm techniques to optimize NoC routing, Mapping of memory
and application mapping to provide performance improvement.

Keywords: Network-on-chip (NoC); Cache Hierarchy; algorithms in routing; Particle Swarm Optimization (PSO);
Quality of Service (QoS), NoC design, Chip Multiprocessor

References:
1. XuChuan-pei, Yan xiao-feng and Chen Yu-qian, “A Technique for NoC Routing Based on Hybrid Particle Swarm Optimization algorithm”,
Third International Conference on Genetic and Evolutionary Computing, 2009.
14. 2. Wang Lei, Ling Xiang, “Energy- and Latency-Aware NoC Mapping Based on Chaos Discrete ParticleSwarm Optimization”, International
Conference on Communications and Mobile Computing, 2010. 56-58
3. Leonid Yavits, Amir Morad, Ran Ginosar, “Cache Hierarchy Optimization”, IEEE Computer Architecture Letters, Vol. 13, No.2, 2014.
4. Pradip Kumar Sahu, PuttaVenkatesh, SunilrajuGollapalli, “Application Mapping onto Mesh Structured Network-on-Chip using Particle
Swarm Optimization”, IEEE Computer Society Annual Symposium on VLSI, 2011
5. Hu J, Marculescu R. “Energy-aware mapping for tile-basedNoC architectures under performance constraints”, Proceedings of the 2003
Conference on Asia South PacificDesignAutomation , Kitakyushu , 2003, 233 – 239.
6. Lei T, Kumar S, “A two-step genetic algorithm for mappingtask graphs to a network on chip architecture”, Proceedings of the Euro micro
Symposium on DigitalSystem Design, Belek-Antalya, 2003, 180 – 187.
7. Ascia G, Catania V, Palesi M, “An evolutionary approach to network-on-chip mapping problem”, Proceedings of the2005 IEEE Congress
on Evolutionary Computation,Edinburgh, 2005, 112 – 119.
8. Murali S, De Micheli G, “Bandwidth-constrained mapping ofcores onto NoC architectures”, Proceedings of the Design,Automation and
Test in Europe Conference and Exhibition, Paris, 2004, 896 – 901.
9. L. Benini, G, .De Micheli, “Networks on chips: a newSoCparadigm,”IEEE Computer, vol. 35, 2002. pp. 70-78.
10. William J. Dally, Brian Towles, “Route packets, notwires: on-chip inteconnectionnetworks”,Proceedings of the38th annual Design
Automation Conference, ACM, NewYork, NY, USA, 2001, pp. 684-689.
11. Tang Lei, Shashi Kumar, “A two-step genetic algorithmfor mapping task graphs to a network on chip architecture”, Proceedings of the
Euromicro Symposium on Digital SystemsDesign, IEEE Computer Society, Washington, DC, USA,2003, pp. 180-187.
12. Alameldeen, “Using compression to improve chip multiprocessorperformance”, PhD thesis, University of Wisconsin, Madison, WI, 2006.
13. Cassidy and A. Andreou, “Beyond Amdahl Law -An objectivefunction that links performance gains to delay and energy”, IEEETransactions
on Computers, vol. 61, no. 8, pp. 1110-1126, Aug 2012.
14. Krishna, A. Samih, and Y. Solihin. "Data sharing in multi-threadedapplications and its impact on chip design", ISPASS, 2012.
15. Morad, T. Morad, L. Yavits, R. Ginosar, U. C. Weiser. "GeneralizedMultiAmdahl: Optimization of Heterogeneous Multi-Accelerator
SoC,"IEEE Computer Architecture Letters, 2012.
16. L.Benini, “Application Specific NoC Design,” Proceedings ofIEEE Design, Automation and Test in Europe Conference, 2006
vol. 1, pp. 1–5.
17. P. Pande, C. Grecu, M. Jones, A. Ivanov and R. Saleh,“Performance Evaluation and Design Trade-offs for MP-SOC
Interconnect Architectures,” IEEE Transactions on Computers, Vol.54, No. 8, pp.1025–1040, 2005
18. N. Koziris et al.,”An Efficient Algorithm for the Physical Mappingof Clustered
TaskGraphsontoMultiprocessorArchitectures,”Proceedingsof 8thEuroPDP, pp. 406-413, 2000.
Authors: Sakthivelmurugan.E, Senthilkumar G Ramakrishnan.A, Selvamuthukumaran.D
Paper Title: Analysis of Searching Task using Chain Method in Swarm Robotics
Abstract: Swarm robotics is an emerging field within collective mobile robotics and largely inspired by studies
of insect’s behavior. In defense system swarm robots are highly demanded for dangerous as well as difficult
operation such as land mine detection. Land mine detection operation is similar to searching task that identifies the
mines and pacifies them. From the literature survey it was found that very least of such type of problem is addressed.
This project aims to search the given environment effectively, without missing out any mines; it would be better to
form a chain of robots and search the area. Performance measures are affected by various factors like number of
robot, area in which robots are working, presence of obstacles, etc., these factors are analyzed by Taguchi
experimental design. From the analysis it was identified that speed of the chain, searching area, strategy and the
interaction between searching area and strategy area were significantly affecting the performance of chain.

Keywords: Chain formation, Swarm Robotics, Strategy, Searching Area


15.
References: 66-70
1. Bonani. M, Dorigo. M (2006), “Group transport along a robot chain in a self organised robot colony”. In: proc. Of the 9th Int. Conf. on
Intelligent Autonomous Systems, IOS Press, Amsterdam, The Netherlands, 433-442.
2. Garnier. S., Gautrais, J., Theraulaz, G(2007), “The biological principles of swarm intelligence”. Swarm Intelligence, 13–31.
3. Nouyan. S, Dorigo. M (2004), “Chain Formation in a Swarm Robots”. Technical Report TR/ IRIDIA.
4. Nouyan.S (2006), “Chain Based Path Formation in Swarm of Robotics”. Technical Report TR/ IRIDIA.
5. Paul M. Maxim, William M. Spears and Diana F.Spears (2009), “Robotic Chain Formations”, Robotics Enterprise Program, United States
Department of Defense.
6. Lambrinos. D, Moller. R, Labhart. R, Pfeifer. R and Wehner. R (2000) “A mobile robot employing insect strategies for navigation”, The
Journal of robotics and autonomous systems, pp 39-64.
7. Kube. C. R and Zhang H (1997), “Task Modelling in Collective Robotics”. Autonomous Robots, Vol.4 No.1, Kluwer Academic, pp.53–72.
8. Meyer. J. A and Filliat. D (2003), “Map-Based Navigation in Mobile Robots - II. A Review of Map-Learning and Path-Planning Strategies”.
The Journal of Cognitive Systems Research, Vol.4: pp. 283-317.
9. Krishnaiah. K and Shahabudeen. P, “Applied Design of Experiments and Taguchi Methods”, The Book ISBN-978-81-203-4527-0, pp. 85-
153.
Authors: M. Ranjitham, N. V. Manjunath
An Analytical and Experimental Investigation of Cold-Formed Stiffened Channel Section in
Paper Title:
Compression
Abstract: This research paper reports on the numerical, experimental study of the cold formed steel column. The
primary objective is to study the buckling modes, load carrying capacity and failure load of the stiffened channel
sections. The buckling mode and load carrying capacity was determined using both analytical and experimental
investigation. Analytical investigation is carried using finite element model in ANSYS 16.1 and results are
documented for comparison. Two types of columns are considered one without stiffeners which is open cold formed
steel thin walled section, with web width of 80 mm, thickness 5mm and length of lip is 25mm.Another member with
stiffeners having web width of 80 mm thickness 5mm and length of lip is 25mm. The thickness of intermediate
stiffeners is varied from 10 mm, 20 mm and 30 mm. The length of the Cold formed steel column is 1000 mm. The
comparison of analytical and experimental study shows that error percentage is 5% only. It’s observed that cold
formed steel column may fail due to local and distortional buckling. This failure can be rectified by introducing
stiffener throughout the length of the column. Also use of stiffener in the column increase the load carrying capacity.
The load carrying capacity was increased by increasing width of the stiffener.

Keywords: cold formed steel, stiffener, finite element analysis and local buckling.
16. References:
1. Kwon, Y.B., Kim, B.S. and Hancock, G.J. (2009), “Compression tests of high strength cold-formed steel channels with buckling 71-74
interaction”, J. Constr. Steel Res., 65, 278-289.
2. Dinis, P.B., Young, B. and Camotim, D. (2014), “Local distortional interaction in cold-formed steel rack-section columns”, Thin Wall.
Struct., 81, 185-194.
3. W. Schafer, M.ASCE ‘Local, Distortional, and Euler Buckling of ThinWalled columns’, Journal of Structural Engineering,Vol. 128,
pp.289 -299.
4. Ben Young and Kim J. R. Rasmussen. 1999. Behavior of cold - formed singly symmetric columns, Thin Walled Structures, vol. 33, pp. 83 -
102.
5. Ben Young, (2004) ‘Tests and Design of Fixed-Ended Cold-Formed Steel Plain Angle Columns’, Journal of Structural Engineering,
Vol.130, pp.1931-1940.
6. Manikandan, P &Sukumar, S &Kannan, K. (2018). Distortional buckling behaviour of intermediate cold-formed steel lipped channel section
with various web stiffeners under compression. International Journal of Advanced Structural Engineering. 10.1007/s40091-018-0191-3.
7. Lue, D.M., Chung, PT., Liu, JL. et al. Int J Steel Struct (2009) 9: 231. Springer-Verlag 1598-2351.
8. J. Bonada, M. Casafont, F. Roure, M.M. Pastor, Selection of the initial geometrical imperfection in nonlinear FE analysis of cold-formed
steel rack columns, Thin-Walled Structures, Volume 51, 2012, Pages 99-111,ISSN 0263-8231.
9. Aruna, G &Sukumar, S &Velayutham, Karthika. (2015). Study on cold-formed steel built-up square sections with intermediate flange and
web stiffeners. Asian Journal of Civil Engineering. 16. 919-931.
10. HareeshMuthuraj, S.K. Sekar, MahenMahendran and O.P. Deepak (2017), Post buckling mechanics and strength of cold-formed steel
columns exhibiting Local-Distortional interaction mode failure. Structural Engineering and Mechanics Volume 64, Number 5, December10
2017, pages 621-640.
11. Jia-Hui Zhang, Ben Young, Compression tests of cold-formed steel I-shaped open sections with edge and web stiffeners, Thin-Walled
Structures, Volume 52, 2012, Pages 1-11, ISSN 0263-8231.
Authors: Karthikamani R, Sathish Kumar.R, Divya.N
Paper Title: Application of Sensors in Railway Tracks for Safety
Abstract: Safety is important in context to any physical mobility. The journey in train has now become more
dangerous because of some natural and man-made phenomenon such as floods, earthquakes, cracks in railway
tracks, climatic changes etc. To get rid of such dangerous situation sensors are used for safe journey. Many
techniques such as crack detection using vibration sensor, obstacle detection using IR sensor, crack and obstacle
detection using laser, image processing etc have been used. But the proposed system came out with a brilliant idea of
using PIR sensor and electrochemical fatigue sensor for obstacle and crack detection. The system also uses GSM
based message alerting so that engine driver can stop the train according the message received.

Keywords: Safety, Cracks, Obstacles, PIR Sensor, Electrochemical Fatigue Sensor, GSM.

References:
1. Mrs. V.Mahalakshmi , Dr.K.O.Joseph,” GPS based railway track survey system,” international journal of computer applications in
engineering sciences, august 2013.
2. Mehaboob.Mujawar, Sangam.Borkar,” Design and implementation of wireless security system for railway tracks,” IEEE international
conference on power, control, signals and instrumentation engineering (icpcsi-2017).
17. 3. Siegfried Miickel, Frank Scherer, Peter F. Schuster,” Multi-Sensor Obstacle Detection on Railway Tracks”.
4. Sarvesh Suhas Kapre , Saurabh Sahebrao Salunkhe , Rohan Manoj Thakkar , Akshay Prakash Pawar,Omkar Ashok Malusare,” Advanced 75-77
Security Guard with PIR Sensor for Commercial and Residential use,” International journal for advance research in engineering and
technology.
5. Brent M. Phares, PE, Ph.D,” Demonstration of the electrochemical fatigue sensor system at the Transportation technology center facility.”
6. Vinil Kumar.V, Divya.N, Mr. K.S.Vairavel,” Smart Door Lock Opening In Cars Using Face Recognition,” International Journal of Latest
Engineering Research and Applications (IJLERA) ISSN: 2455-7137 Volume – 02
7. https://www.elprocus.com/gsm-architecture-features-working/
8. D.Naresh Kumar, M.Uday, G. Brahmini, A.Mounika Reddy, M.Sagar Kumar,” Railway Track Crack Detecting System,” International
Journal of Scientific Development and Research (IJSDR) www.ijsdr.org
9. M.Hari Prabhu, R.Hemalatha, S.Bhuvaneshwari,” Automatic Railway Security System Using Multisensors,” International Electrical
Engineering Journal (IEEJ) Vol. 7 (2016) No.1
10. Ankita Jadhav, Pallavi Bhangre , Snehal Gaikwad, Amol Deshpande,” Railway Track Security System,” International Journal of
Engineering Research & Technology (IJERT)
11. M.R Nikolaus Mahler Faruque Ahmed,” An Obstacle Detection System for Automated Trains.”
12. https://www.electricaltechnology.org/2018/01/gsm-global-system-mobile-communications.html
13. Krishnapriya K B , Sreelakshmi K U , Vivek John ,” Railway Level Crossing Gate Control & Measurement System for Railway Track
Condition Monitoring,” International Journal of Innovative Research in Science, Engineering and Technology.
14. Nisha S.Punekar 1 , Archana A.,” Improving Railway Safety with Obstacle Detection and Tracking System using GPS-GSM Model,”
International Journal of Scientific & Engineering Research, Volume 4, August-2013.
Authors: Karthik Prabhu T, Nagarajan, Jagadesh P, Eswaramoorthi P.
Paper Title: Behaviour of the Steel Slag Blended Concrete by Determination of Its Elastic Properties
Abstract: The behavior of the steel slag blended concrete is experimented, by partially replacing Coarse aggregate
by steel slagto study the mechanical properties by experimenting the cylinder compressive strength (CCSHH), the
modulus of elasticity (MEY) and modulus of rupture (MRE). The steel slag is used as a supplementary material in
the concrete. The partial replacement for the coarse aggregate replacement was done up to 8% and partial
replacement of fine aggregate with steel slag was done up to 30% and the test procedure for determining the
mechanical properties of concrete was confined to ASTM STP 169D, ACI :318 and IS 516 - 1959 codal regulations.
The Comparison was done with the conventional concrete and the steel slag replaced concrete in terms of strength
and economy for replacement mixes. Further modeling of the relationships between the mechanical properties of
CCSHH, MEY and MRE of the replacement mixes was done and validated with NZS: 3101- New Zealand Standard
code 3101, AS: 3600-Australian Standard code 3600) and ACI: 318-American Concrete Institute code 318)

Keywords: Enterkey about five words or phrases in alphabetical order, separated by commas. For a list of suggested
keywords see: https://ieee-tmi.org/tmi-keywords.asp?s=author

18. References:
1. Martys NS 1996 Survey of concrete transport properties and their measurement. NISTIR 5592, US Department of Commerce. 1–40 78-80
2. Yu, P 1999 Structure of calcium silicate hydrate (C-S-H): near-, mid-, and far infrared spectroscopy. J. American Ceramic Society82:742–
748
3. Jagadesh.P, Ramachandramurthy A, Murugesan Rand Sarayu K 2015 Micro analytical studies on sugar cane bagasse ash. Sadhana –
Academy of science40:1629-1638
4. Maslehuddin M, Alfarabi Sharif M, Shameem M, Ibrahim M and Barry M S (2003),"Comparison of properties of steel slag and crushed
limestone aggregate concretes", J. Construction and building materials, vol :17(2), pp. 105-112
5. KarthikPrabhu T and Subramanian K 2016 Experimental Studies on RCP by using Cost Effective and Recycled Materials for Improving the
Strength and Reducing the Cost of Pavement.Asian Journal of Research in Social Sciences and Humanities, 6: 1 -14
6. BIS (Bureau of Indian Standards). (2013a). “Ordinary Portland Cement 53 Grade- Specification” IS 12269 IS 1199, New Delhi, India.
7. BIS (Bureau of Indian Standards). (2016). “Specification of coarse and fine aggregates from natural sources for concrete.” IS 383,
NewDelhi, India.
8. ASTM. (2009). “Standard test method for bulk density (“unit weight”) and voids in aggregate.” ASTM C29/C29M-09, West Conshohocken,
PA.
9. Caijun Shi (2004), "Steel Slag—Its Production, Processing, Characteristics, and Cementitious Properties", J. Mater. Civ. Eng., 16(3): 230-
236
10. BIS (Bureau of Indian Standards). (1959a). “Methods of sampling and analysis of concrete.” IS 1199, New Delhi, India.
11. BIS (Bureau of Indian Standards). (1959b) Reaffirmed 2004. “Methods of tests for strength of concrete.” IS 516, New Delhi, India
12. BIS (Bureau of Indian Standards). (2012). “Specification for cement concrete flooring tiles.” IS 1237, New Delhi, India.
13. DIN (DeutschesInstitut fur NormungeV). (1991-06). “Testing of hardened concrete (specimens prepared in mould).” DIN 1048 Part 5 1991,
Germany.
14. Ganjian, E., Khorami, M., and Maghsoudi, A. A. (2009) “Scrap-tyre-rubber replacement for aggregate and filler in concrete.” Constr. Build.
Mater., 23(5), 1828–1836.
15. RILEM, CPC-18. (1988). “Measurement of hardened concrete carbonation depth.” Mater. Struct., 21(6), 453–455.
16. Manju R, Sathya S and Sylviya B (2017),“Shear Strength of High-Strength Steel Fibre Reinforced Concrete Rectangular Beams”,
International Journal of Civil Engineering and Technology, Vol. 8, Issue 8, pp. 1716-1729.
17. Ramadevi K, “A study on Properties of Concrete with Ceramic Waste Replaced for Fine Aggregate (2017),” International Journal of Civil
Engineering and Technology, Vol. 8, Issue 8, pp. 1730-1737.
Authors: PA. Prabakaran, G. L. Sathyamoorty, M. Adhimayan
An Experimental and Comparative Study on Canal Lining Exploitation Geosynthetic Material,
Paper Title:
Cement Mortar and Material Lining
Abstract: This project is principally supported water insufficiency, a serious cause for individuals for all functions
chiefly for irrigation. to beat this and to boost the potency of water flow and discharge in canals, the lining ways for
canals ought to be modified as less permeable , increase in velocity and discharge. Canal lining is that the method of
reducing flow loss of irrigation water by adding an imperviable layer. Technological development and producing of
recent materials helps in varied functions. One such issue was the event of geosynthetic materials that was wide
employed in construction fields in conjunction with concrete or as a separate material because the replacement for
concrete. we have a tendency to selected PVC geosynthetic material for lining the canal rather than concrete, brick
masonry and traditional material lining for canals. we have a tendency to create a comparative study for 3 canal
linings like PVC, brick masonry and material lining close to Pollachi of alittle paradigm model in Mr. Sekar farm
and notice the foremost economical material appropriate for canal lining altogether forms

Keywords: Canal Analysis’s, Effective Discharge, Most Economical-Comparative Study.

References:
1. A report on “Studies on issues related on gap between Irrigation potential created and utilised”, IIM, Lucknow.
2. A technical report on “Canal lining demonstration project” year 7durability report, September 1999
19. 3. A. Mishra et.al(2001), Hydraulic modeling of kangsabatimain canal for performance assessment, Journal of Irrigation and Drainage
Engineering, Vol. 127, No. 1, January/February, 2001. Conference on geotextiles, Geomembranes and Related products”, Singapore,59.Pg
573-578. 81-83
4. A.K. Rastogi(1992), FEM modelling to investigate seepage losses from the lined Nadiad branch canal, India, Journal of
Hydrology,Elsevier,Vol.138,Issue1-2, sept.,1992, pages 153-168.
5. B J Batliwala,J N Patel,P D Porey,2014, “Seepage Analysis of Kakrapar Right Bank Main Canal of Kakrapar Project, Gujarat, India”
IJSRD, Vol11
6. Charles M. Burt et.al(2010), Canal Seepage Reduction by Soil Compaction , Journal of Irrigation and Drainage Engineering, Vol. 136, No.
7, July 1, 2010. ©ASCE
7. David McGraw et.al(2011), Development of tools to estimate conveyance losses in the Truckee River, USA ,Hydrogeology Journal
Springer-Verlag 2011 Economic Analysis Guidebook, Department of Water Resource, California.
8. ErhanAkkuzu et.al(2007), Determination of Water Conveyance Loss in the Menemen Open Canal Irrigation Network, Turk J Agric For 31
(2007) 11-22 c TUB‹TAK
9. ErhanAkkuzu1 (2011), The Usefulness of Empirical Equations in Assessing Canal Losses Through Seepage in Concrete-Lined Canal,
Journal of Irrigation and Drainage Engineering. /(ASCE)IR.1943-4774.0000414.
10. Eric Leigh et.al, (2002), Seepage Loss Test ResultsIn Cameron County Irrigation District No. 2, Report Prepared for Cameron County
Irrigation District No. 2 by Eric Leigh and Guy Fipps, P.E.2 in December 18, 2002
11. Garg SK, Irrigation And hydrolic structure by Khanna Publishers 2006
12. I.J. McGowen1(2001), Identifying channel seepage using pre-dawn thermal imagery, Geoscience and Remote Sensing Symposium, IEEE
2001,On page(s): 1631-1633 vol.4
13. J.P. Giroud,J.G. Zornberg, and A. Zhao,7 October 2000,“Hydraulic Design of Geosynthetic and Granular Liquid Collection
Layers”Geosynthetics International is published by the Industrial Fabrics Association International, Special Issue on Liquid Collection
Systems, Vol. 7, Nos. 4-6, pp. 285-380.
14. A.I.Comer, September1994, “Water Conservation strategies using Geosynthetic. Fifth International
Authors: M. Jamuna
Paper Title: Statistical Analysis of Ground Water Quality Parameters in Erode District, Taminadu, India
Abstract: Water that can be used for drinking, cooking, land farming, etc should be free from physical and
chemical contaminants. The major source of drinking water is ground water. The pore spaces and the fractures in
rocks carries the major amount ground water which is found beneath the Earth’s surface. The objective of this study
is to predict the ground water quality in the Erode district of Tamil Nadu, India. A total number of 26 samples were
collected from different regions of the district. The present study deals with the analysis of physical-chemical
parameters, Multivariate statistical analysis for predicting the ground water quality in the Erode district. Multivariate
statistical method involves determination of correlation and factor analysis. Interpretation of analytical data showed
the water quality variance. Finally it was found that there is a variance of about 63.273% in ground water quality
during the pre-monsoon season and about 73.624% in post monsoon season.
20.
Keywords: Groundwater, Physical-Chemical Parameters, Multivariate Statistical Methods, Correlation Analysis, 84-89
Factor And Cluster Analysis

References:
1. Aabha P Sargaonkar, Apurba Gupta and Sukumar Devotta (2008), “Multivariate Analysis of Groundwater Resources in Ganga-Yamuna
Basin,” Journal of Environmental science and Engineering, Vol. 50, No. 3, pp. 215-222.
2. Abdulmuhsin S. Shihab, Yousra T. Abdul Baqi (2010), "Multivariate Anlaysis of Ground Water Quality of Makhmor Plain/ North Iraq,"
Journal of Damascus University., vol(26), no(1).
3. Ali M. Subyani and Masoud E. Al Ahmadi (2009), "Multivariate Statistical Analysis of Groundwater Quality in Wadi Ranyah, Saudi Arabia,"
JAKU: Earth Sci., vol. 21, no. 2, pp. 29-46.
4. Andrea R. Pearce, Donna M. Rizzo, and J. Mouser (2011), “Subsurface characterization of groundwater contaminated by landfill leachate
using microbial community profile data and a nonparametric decision-making process,” Water Resources Research, Vol. 47.
5. Asif Mahmood, Waqas Muqbool, Muhammad Waseem Mumtaz and Farooq Ahmad (2011), "Application of Multivariate Statistical
Techniques for the Characterization of Ground Water Quality of Lahore, Gujranwala and Silakot (Pakistan)," Pak. J. Anal. Environ. Chem.,
vol 12, no 1 & 2, pp. 102-112.
6. Bajpayee. S, Das. R, Ruj. B, Adhikari. K, Chatterjee. P.K. (2012), "Assessment by multivariate statistical analysis of ground water
geochemical data of Bankura, India," International journal of Environmental sciences., vol. 3, no. 2.
7. Charmaine Jerome and Anitha Pius (2010), “Evaluation of water quality index and its impact on the quality of life industrial area in
Bangalore, South India,” American Journal of Scientific and Industrial Research.
8. Dharmaraja. J, Vadivel. S, Ganeshkarthick. E (2012), “Physico-Chemical Analysis of Ground Water Samples of Selected Districts of
Tamilnadu And Kerala,” International Journal of Scientific & Technology Research., Vol. 1.
9. Gajendran. C and Thamarai. P (2008), “Study on Statistical Relationship between Ground Water quality parameters in Nambiyar River Basin,
Tamil Nadu, India,” Poll Res, Vol. 27 (4), pp. 679-683.
10. Golzar Hossain. MD, Selim Reza. A.H.M, Lutfun-Nessa. MST and Syed Samsuddin Ahmed (2013), “Factor and Cluster Analysis of water
quality data of the Groundwater Wells of Kushtia, Bangladesh: Implication for Arsenic Enrichment and Mobilization,” Journal Geological
Society of India., Vol. 81, pp. 377-384.
11. Praveena. S.M, Aris. A.Z (2010), “Groundwater resources assessment using numerical model: A case study in low-lying coastal area,”
International Journal of Environmental Science, Vol. 7(1), pp. 135-146.
12. Suvedha. M, Gurugnanam. B, Suganya. M and Vasudevan. S (2009), “Multivariate statistical Analysis of Geochemical Data of Groundwater
in Veeranam Catchment Area, Tamil Nadu,” Journal Geological Society of Inida., Vol. 74, pp. 573-578.
Authors: Lisa Mary Thomas, S.K.Shivaranjani
Paper Title: Strength and Light Transmittance of Plastic Fiber Concrete
Abstract: The present consumption of electricity at a high rate for illumination purposes calls for new and
innovative methods to use the natural source of lighting ie.sunlight. This study aims the use of plastic fiber in
concrete in order to transmit sunlight into buildings. The properties of the cement, aggregate and plastic fiber were
analyzed. The cube specimen prepared was tested for light transmittance property and compressive strength. Loss of
signal strength was found to be 0.2V when attenuation experiment was carried out. The intensity of light coming
from the concrete cube was found to be sufficient for viewing purpose. The cube specimens also gave sufficient
strength results which makes it suitable for its use in purposes.

Keywords: Plastic Fiber, Attenuation, Light Intensity, Compressive Strength


21.
90-92
References:
1. Jianping He,Zhi Zhou ,2011,”Study On Smart Transparent ConcreteProduct And Its Performance", Journal of advanced smart materials and
smart structures technology ,pg 25-38
2. Bhavin K Khashiyani,Varsha Raina,Feb 2013”A Study On Transparent Concrete: A Novel Architecture Material To Explore Construction
Sector", International journal of engineering and innovative technology Vol 2 issue 8
3. Prof. A.A. Momin et al,2014,IOSR Journal of Mechanical and Civil Engineering(IOSR-JMCE)pg 67-72
4. Jianping He et al.2011, Study on Smart Transparent Concrete Product and Its Performances,The 6th International Workshop on Advanced
Smart Materials and Smart Structures Technology ANCRiSST2011,July 25-26, 2011, Dalian, China
5. Kalymnios, D. Plastic Optical Fibers (POF) in sensing – current status and prospects. 17th International Conference on OpticalFiber Sensors
SPIE, 5855, 2005
6. Vishnu A,Mohana V,Manasi S,V Ponmalar, Use of polyethylene terephthalate in concrete-A Brief reviewInternational Journal of Civil
Engineering and Technology (IJCIET) Volume 8, Issue 7, July 2017, pp.1171-1176
Authors: Nishaant Ha, Anand T, Sachin Prabhu P, Dayaanandan M
Paper Title: Risk Mitigation of Construction Projects in Hilly Areas
Abstract: In construction industry, there is no risk free project.There are various types of risk associated in a hilly
construction project. Risk is identified and then risk assessment and analysis is done. Then risk management and risk
mitigation process is carried out in order to reduce risk. Various types of risk associated with hilly construction
projects are identified from case study, papers and field study. The identified risk factors are grouped under 9
categories. Risk factor is characterized by its occurrence and impact. The occurrence and impact score for different
types of risk are collected from site and online survey from experts and weighted average mean interval score is
calculated. From the score value obtained, the risk priority is given using risk heat map. Then find feasible strategy
to mitigate the risk in hilly areas.

Keywords: Risk Management, Risk Factors, Risk Assessment, Risk Factors, Risk Priority, Feasible Strategy

References:
1. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-5, October 2013 A
22. Study of Risk Management Techniques for Construction Projects in Developing Countries, Patel Ankit Mahendra, Jayeshkumar R. Pitroda,
J. J. Bhavsar 93-95
2. Darius migilinskas; Leonasustinovicity, et.al(2008) “Methodology of Risk and Uncertainty Management in Constructions Technologies and
Economical Problems”ISARC-2008.
3. G.P.Ganapathy; C.L.Hada (2012), “Landslide Hazard Mitigation in the Nilgiris District, India – Environmental and Societal Issues”
International Journal of Environmental Science and Development, Vol. 3, No. 5, October 2012.
4. P.Ganapathy; K.Mahendran (2010) “Need and Urgency of Landslide Risk Planning for NilgiriDistrict,Tamil Nadu State”,International
Journal Of Geomatics And Geosciences Volume 1, No 1, 2010.
5. Hyun –hochoi; HYO-NAM Cho et.al(April 2004), “Risk assessment methodology for underground construction project” J Constr. Eng.
Management.
6. Dr Patrick. X.W. Zou1; Dr Guomin Zhang et,al “Identifying Key Risks in Construction Projects: Life Cycle and Stakeholder Perspectives”
7. V.Sathishkumar; P.N.Raghunath et.al(31 January 2015). “Critical Factors Influencing to Management Risk in Construction Projects”, The
International Journal Of Engineering And Science (IJES).
8. S.M. Renuka, C.Umarani, et.al.(2014). “A Review on Critical Risk Factors in the Life Cycle of Construction Projects” Journal of Civil
Engineering Research 2014, 4(2A): 31-36 DOI: 10.5923/c.jce.201401.07.
9. Nishaant Ha, Anand T “Durability Gaining in an Old Structure Using Retrofitting Techniques” International journal of Civil Engineering
and Technology (IJCIET)-Vol.8, Issue 8, August 2017.
10. Anand T, Nishaant Ha “Implementing Challenges of Extended Producer Responsibility” International journal of Civil Engineering and
Technology (IJCIET)- Vol.8, Issue 7, July 2017.

23. Authors: R.Rajkumar, A. James Albert, S.P. Siddique Ibrahim


Feature Selection with Enhanced Bat Algorithm and Modified Recursive Bayesian Deep Neural
Paper Title:
Network (Mrbdnn) For Temperature Prediction
Abstract: Weather forecasting is major problemin ecological science. Existing statistical and Climate models are
ineffective prediction tools of the long run temperature. Exact weather forecasting is tedious tasks that deal with
huge amount of data . In this paper, an Enhanced Bat Algorithm (EBA) is proposed for selection of features from the
temperature dataset. High dimensionality of data based on DNN with RMBLR are attempted in this work. Based on
analysis of monthly high, average and low temperatures data sets, a novel Recursive Modified Bayesian Linear
Regression (RMBLR) algorithm based on Deep Neural Network (DNN) is presented in this study.

Keywords: Feature Selection, BAT Algorithm, Recursive Bayesian, Temperature Prediction, Deep Neural
Network.

References:
1. Biaobing Huang, Guihe Qin, Rui Zhao, Qiong Wu, AlirezaShahriari, “Recursive Bayesian echo state network with an adaptive inflation
factor for temperature prediction” , Neural Computer and Application, November 12, 2016.
2. Y.Radhika, M.Shashi, “Atmospheric temperature prediction using Support Vector Machine”, International Journal of Computer Theory and
Engineering, Vol.1, No.1, April 2009.
3. Dipi A. Patel, R.A.Christian, “Ambient atmospheric temperature prediction using fuzzy knowledge-rule based for inland cities in India”, 96-99
World Applied Sciences Journal, 2012.
4. TarunRao, N.Rajasekhar, Dr.T.V.Rajinikanth, “An efficient approach for weather forecasting using Support Vector Machine”, International
Conference on Computer Technology and Science, Vol.47, 2012.
5. Amartya Raj Gurung, “Forecasting weather system using Artificial Neural Network (ANN): A survey paper”, International journal of Latest
Engineering Research and applications (IJLERA), Vol.02, October 2017.
6. Deepak RanjanNayak, AmitavMahapatra, Pranati Mishra, “A survey on rainfall prediction using Artificial Neural Network”, International
Journal of Computer Applications, Vol.72, No.16, June 2013.
7. Herbert Jaeger, Harald Hass, “Harnessing nonlinearity: predicting chaotic systems and saving energy in wireless communication”, Science,
Vol.304, April 2, 2004.
8. S.S.De, A.Debnath, “Artificial neural network based prediction of maximum and minimum temperature in summer monsoon months over
India”, Applied Physics Research, Vol.1, No.2, November 2009.
9. Shaminder Singh, PankajBhambri, Jasmeen Gill, “Time series based temperature prediction using back propagation with genetic algorithm
technique”, International Journal of Computer Science Issues, Vol.8, Issue 5, No.3 September 2011.
10. Pankaj Kumar, “Minimum weekly temperature forecasting using ANFIS”, Computer Engineering and Intelligent Systems, Vol.3, No.5,
2012
11. C. Zhen, Z. Yongquan, and L. U. Mindi, “A simplified Adaptive Bat Algorithm Based on Frequency”, J.Comput. Inf. Syst., vol. 9: 16, pp.
6451–6458, 2013.
Authors: M.Mohankumar, M Anand Kumar, S. Aruna Devi, R. Suresh Kumar
Requirement Analysis Document in Google Drive For Green And Sustainable Software Engineering
Paper Title:
Approach
Abstract: This study shows how a requirement analysis can help to organizations become more
environmentally sustainable in a structured and efficient manner, for this we have analyzed the Google Drive
document as a requirement analysis document with the help of that document we try to cover the software
requirement specification from the customer, then we try to observe the if that document located in desktop pc
what is the cumulative processor energy, IA energy and GT energy, if that document shared with cloud
environment minimum and maximum communication of resource sharing details are analyzed for user base and
data center of various regions, finally the load event details are observed for the requirement document shared in
the Google drive , This result show that the technologies delivers specific suggestions for improvement both on
reducing the environmental foot print of ICT and on using ICT as a green solution for software requirement
analysis process.

Keywords: Green ICT, IA Energy, GT Energy, Google Drive, Software Requirement Specification

References:
1. R. Chitchyan et al., "Sustainability Design in Requirements Engineering: State of Practice," 2016 IEEE/ACM 38th International
24. Conference on Software Engineering Companion (ICSE-C), Austin, TX, 2016, pp. 533-542.
2. D. Mendez Fernandez, S. Wagner Naming the Pain in Requirements Engineering: Design of a Global Family of Surveys and First
Results from GermanyIn: Proc. of the 17th International Conference on Evaluation and Assessment in Software Engineering (EASE 100-106
’13), ACM, 2013.
3. S. Dhingra, Savithri G, M. Madan and Manjula R, "Selection of prioritization technique for software requirement using Fuzzy Logic
and Decision Tree," 2016 Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, 2016, pp.
1-11.
doi: 10.1109/GET.2016.7916822
4. UmmaKhatunaJannat ,” Green Software Engineering Adaption In Requirement Elicitation Process”2016 international journal of
scientific & technology research volume 5, issue 08, august 2016 issn 2277-8616
5. A. Hankel and P. Lago, "How organisations can assess and improve their green ICT activities in a standard and efficient way," 2016
ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT), Bangkok, 2016, pp. 1-6
6. Erik Jagroep” Extending software architecture views with an energy consumption perspective Computing, 2017, Volume 99, Number
6, Page 553
7. Paul p.k,”Is green computing a social software engineering domain?”,2016 international journal of applied science and engineering
4(2).PP.67-73
8. Becker, Colin (2016) Requirements: The Key to Sustainability. IEEE Software, 33 (1). pp. 56-65. ISSN 07407459
9. C. C. Venters et al., "Characterising Sustainability Requirements: A New Species Red Herring or Just an Odd Fish?," 2017 IEEE/ACM
39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS), Buenos Aires, 2017, pp.
3-12.
10. VivekShukla, DhirendraPandey and Raj Shree. Article: Requirements Engineering: A Survey. Communications on Applied
Electronics3(5):28-31, November 2015. Published by Foundation of Computer Science (FCS), NY, USA
11. C. Becker, D. Walker and C. McCord, "Intertemporal Choice: Decision Making and Time in Software Engineering," 2017 IEEE/ACM
10th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE), Buenos Aires, 2017, pp. 23-29
12. C. Marimuthu K. Chandrasekaran," Software Engineering Aspects of Green and Sustainable Software: A Systematic Mapping Study".
Proceedings of the 10th Innovations in Software Engineering Conference Jaipur, India 2017 PP[ 34-44]
13. Komeilraisian,” Current Challenges And Conceptual Model of Green And Sustainable Software Engineering,”Journal of Theoretical
and Applied Information Technology
31st December 2016 -- Vol. 94. No. 2 – 2016
14. D. Torre, G. Procaccianti, D. Fucci, S. Lutovac and G. Scanniello, "On the Presence of Green and Sustainable Software Engineering in
Higher Education Curricula," 2017 IEEE/ACM 1st International Workshop on Software Engineering Curricula for Millennials (SECM),
Buenos Aires, 2017, pp. 54-60.
15. Rashid,” Developing Green and Sustainable Software Using Agile Methods in Global Software Development: Risk Factors for
Vendors”,2017 Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering
ENASE 2016 PP 247—253
16. Maqbool Ahmed Muhammad Azeem,” Requirement Engineering the backbone of a
project”,2017,www.researchgate.net/publication/318787262,
17. H. Reza, R. Sehgal, J. Straub and N. Alexander, "Toward model-based requirement engineering tool support," 2017 IEEE Aerospace
Conference, Big Sky, MT, 2017, pp. 1-10.
18. H. H. Khan, M. N. bin Mahrin and S. btChuprat, "Situational requirement engineering framework for Global Software
Development," 2014 International Conference on Computer, Communications, and Control Technology (I4CT), Langkawi, 2014, pp.
224-229.
19. S. Sitthithanasakul and N. Choosri, "Application of software requirement engineering for ontology construction," 2017 International
Conference on Digital Arts, Media and Technology (ICDAMT), Chiang Mai, 2017, pp. 447-453.
20. S.Arunadevi, Dr.VijetaIyer, “A Study on M/M/C Queueing Model under Monte Carlo Simulation in Traffic Model”, 2017, International
Journal of pure and Applied Mathematics(IJPAM), No:12, vol 116, pg:199-207.
21. http://sustainabilitydesign.org
Authors: S. R. Saratha, Vijeta Iyer, R. Manju
Paper Title: Subspace Homotopy Methods for Solving Nonlinear Equations
Abstract: The concept of Newton subspace homotopy method has been introduced in this paper. As Newton –
Homotopy method can’t be used for all the functions in topological spaces. So an algorithm has been developed by
finding a subspace of the given space for which the subspace homotopy function has been found.

Keywords: Homotopy, Newton-Raphson Method, Subspace Homotopy, Matlab 2010 AMS Subject
Classification: 55P10, 55P35, 55P99.
25.
References:
7. Abbasbandy, S (2003). ‘Improving Newton-Raphson method for nonlinear equations by modified Adomian decomposition method’ 107-110
Applied Mathematics and Computation, 145 (2-3).pp.887-893.
8. Saratha S R, Sai Sundara Krishnan G, Vijeta Iyer (2017) ‘Homotopy on Subspace Topology’. International Journal of Pure and Applied
Mathematics, Volume 116 No. 12 2017, 189-197.
9. Nor Hanim Abd. Rahman,Arsmah Ibrahim, Mohd Idris Jayes (2011) ‘ Newton Homotopy Solution for Nonlinear Equations Using
Maple14, Journal of Science and Technology | ISSN 2229-8460 | Vol. 3 No. 2 December 2011
10. Palancz B, Awange J.L, Zaletnyik P and Lewis R.H (2010) ‘Linear homotopy solution of nonlinear systems of equations in geodasy’
Journal of Geodasy 84(1).pp.79-95.
11. Borsuk, K. (1967). Theory of Retracts. Polish Scientific Publishers, Warsaw.
12. Dugundji, J. ( 1966). Topology. Allynand Bacon, Boston.
Authors: Vijeta Iyer, S R Saratha, V Sudha
Paper Title: Function- ϵ-Chainble Sets Inbitopological Space
Abstract: Inthis paper,the concept of function-ϵ – chainabilitybetween two sets in bitopological spaces using
continuous function has been introduced which is the extension of function-ε-chain between two points of the
bitopological space. A characterization of function- ϵ-chainability betweentwo sets has been discussed in respect
of function – ϵ-chains between their points. Also, some results of [1] have been generalized for bitopological
spaces.Subject Classification: AMS (2000):54A99

Keywords: Simple chain, function -ϵ-chain between points in bitopological space, function - ϵ-chain between
sets in bitopological space.
26.
References:
1. Shrivastava kiran, agrawal geeta, Characterization of ε-chainable sets in metric spaces, Indian Journal of Pure and Applied 111-113
Mathematics, 33(6):933-940, 2002
2. Munkers, james R, Topology, A first Course PHI, 1987.
3. Lipschutz, S., Schaum’s outline of theory and problems of General Topology, 1965.
4. Kelly, j.l., general Topology, Van Nostrand Reinhold Company, New York, 1969.
5. Joshi, k.d., Introduction to General Topology, Wiley Eastern Limited, 1992.
6. Steen, lynn arthur; seebach, j. Arthur jr.(1995)[1978], Counterexamples in topology (Dover reprint of 1978 ed.), Berlin, New York:
Springer- Verlag.
7. Iyer vijeta, shrivastava kiran, choudhary priya, Chainability in topological spaces through continuous functions, International Journal of
Pure and Applied Mathematics, Vol. 84, No. 3, 2013, 269-277.
8. Iyer vijeta, saratha s r, Chainability in bitopological spaces through continuous functions, (communicated).
9. Priya choudhary, kiran shrivastava, vijeta iyer, Characterization of function-ε-chainable sets in topological space, Mathematical Theory
And Modeling, Vol.3, No.6,2013, 189-192.
Authors: Ramalatha Marimuthu, Navaneethakrishnan R, Alagu Meenakshi, Uma Maheswari S
Paper Title: Catch them young: Importance of career planning in Indian school education systems
Abstract: Higher Education Systems receive a lot of attention from the researchers on identifying good
28. teaching practices in higher education to make it student attractive since it is the nearest point of education
towards career and early life education is often ignored. But the primary factor in the choice of higher education 114-118
in India is the current popularity of the stream (on the basis of the mass and media opinion) and not the aspiration
and interest of the students. The lack of systematic student profiling to understand their strengths and encourage
them in the correct career path is the major drawback of the Indian School Education System. This paper
provides a framework for the steps to be followed to introduce life career planning education in schools and the
various factors to be considered while profiling the students.

Keywords: student profiling, SWOT analysis, school education, career and life planning

References:
1. https://timesofindia.indiatimes.com/home/education/ news/ 60-of-engineering- graduates- unemployed/ articleshow/ 57698133. Cms
2. https://www.gnu.org/education/edu-system-india.en.html
3. Arjit Ghosh, Rittika Chanda Parruk, Sasha Sheppard, "Indian School Education System An Overview", The British Council, India, 2014.
4. Kamlesh Gakhar, Harjeet Kour, "Scenario Of Present Education System: A Comparative Study Of Haryana And Its Neighbouring
States", International Journal of Social Science & Interdisciplinary
Research Vol.1 Issue 8, August 2012
5. Gretchen Rhines Cheney, Betsy Brown Ruzzi and KarthikMuralidharan, "A Profile of the Indian Education System", National Center on
Education and the Economy, 2006
6. Gautam, Mohan & Singh, Sunny &Fartyal, Gopal&Tiwari, Ankit& Singh Arya, Kuldeep. (2016). Education System in Modern India.
International Journal of Scientific Research And Education. 10.18535/ijsre/v4i01.16.
7. Urvashi Sahni, "Primary Education in India:Progress and Challenges" Brookings Report, January 2015
8. Akash A.R., Ramalatha Marimuthu, Navaneethakrishnan R, Kanagaraj S, "Cultural factors impacting the Global Energy transition- a
review, International Conference on Renewable Energies, Power Systems and Green Inclusive Economy, 23-24, April 2018, Casablanca,
Morocco.
9. Dr.V.Mohana Sundaram, SWOT analysis of Indian Higher Education, ECONSPEAK, A Journal Of Advances In Management, IT and
Social Sciences, Volume 1, Issue 3 (September, 2011)
10. Guide on Life Planning Education and Career Guidance for Secondary Schools, Career Guidance Section, School Development
Division, Education Bureau, (May 2014)
11. Ramalatha Marimuthu, S.Sathyavathi, “Impact of service learning and social immersion on education and career building of young
Indian Engin eering graduates – A case study”, IEEE International Women in Engineering Conference on Electrical, Electronics and
Com[puter Engineering, Pune December 2016.
Authors: K.Paramasivam,Suresh kumar N
Minimum Power Consumption High Efficiency Bypassing-Based 2D Multiplier Design using 65nm
Paper Title:
CMOS Technology
Abstract: Presently, in VLSI design, Power management has turn out to be a major issue. In this research, a
Minimum Power Consumption Bypassing-Based 2D Multiplier Design using 65nm CMOS Technology was
presented. When matched up with digital row bypassing based multiplier design, digital column bypassing based
multiplier design and digital low power two-dimension bypassing based multiplier design, the experimentation
outcomes shown our presented Multiplier Design decreases 31.2% of the power dissipation for 4*4 Multiplier.

Keywords: low power, multiplier, CMOS, bypassing

References:
1. Sureshkumar N, K.Paramasivam, “Bypassing-Based Multiplier Design: A Tutorial and Research Survey”, International Journal of Applied
Engineering Research, ISSN 0973-4562 Vol. 10 No.29 (2015) pp:22606-22613.
2. G.Senthil Kumar and Dr.K.Paramasivam“Test Power Minimization of VLSI Circuits: A Survey” in the IEEE sponsored 4th International
Conference on Computing Communication and Networking Technologies – ICCCNT 2013 at Vivekanandha College of Engineering for
Women, Tiruchengode, 4-6th July 2013. The paper is available in IEEE Xplore PortalDOI:10.1109/ICCCNT.2013.6726569. pp.1-6.
29. 3. S.Chitra, Dr.K.Paramasivam, “Design of Adiabatic Logic Cells for Efficient Power Reduction and Area Characteristics”,
International Journal of Systems, Algorithms & Applications, Volume 2, Issue 11, November 2012, ISSN Online: 2277-2677.
4. V. G. Moshnyaga and K. Tamaru, “A comparative study of switching activity reduction techniques for design of low power 119-123
multipliers,” IEEE International Symposium on Circuits and Systems, pp.1560-1563,1995.
5. A. Wu, “High performance adder cell for low power pipelined multiplier,” IEEE International Symposium on Circuits and Systems, pp.57–
60, 1996.
6. T. Ahn and K. Choi, “dynamic operand interchange for low power,” Electronics Letters, Vol. 33, no. 25, pp.2118-2120, 1997.
7. J. Choi, J. Jeon and K. Choi, “Power minimization of functional units by partially guarded computation,” International Symposium on
Low-power Electronics and Design, pp.131-136, 2000
8. J. Ohban, V. G. Moshnyaga, and K. Inoue, “Multiplier energy reduction through bypassing of partial products,” IEEE Asia-Pacific
Conference on Circuits and Systems, pp.13–17, 2002.
9. M. C. Wen, S. J. Wang and Y. M. Lin, “Low power parallel multiplier with column bypassing, “IEEE International Symposium on Circuits
and Systems, pp.1638-1641, 2005.
10. G. N. Sung, Y. J. Ciou and C. C. Wang, “A power-aware 2- dimensional bypassing multiplier using cell- based design flow,” IEEE
International Symposium on Circuits and Systems, pp.3338-3341, 2008.
11. J. T. Yan and Z. W. Chen, “Low-power multiplier design with row and column bypassing,” IEEE International SOC Conference, pp.227-
230, 2009.
12. Jin-Tai Yan, Zhi-Wei Chen “Low-Cost Low-Power Bypassing-Based Multiplier Design” IEEE International Symposium on Circuits and
Systems,pp 2338-2341, 2010.
13. C.Kalamani, K. Paramasivam “Survey of Low Power Testing Using Compression Techniques”, International Journal of Electronics and
Communication Technology /Volume-4, Issue-4, Oct-Dec 2013.
Authors: K.Paramasivam, Suresh Kumar N
Paper Title: Design AndAnlaysis Of Low Power Full Adder Using 65nm CMOS Technology
Abstract: This Paper deals with Low-Power full adder using 65nm CMOS Technology by taking merits of
existing full-adders. The proposed one-bit full adder has least power consumption. The proposed adder compared
30. and then analyzed average power, Area and Max power with existing full adder. The designs have been simulated
shown results using Tanner EDA tool.
124-127
Keywords: CMOS, Area, Average power

References:
1. Sureshkumar N, K.Paramasivam, “Bypassing-Based Multiplier Design: A Tutorial and Research Survey”, International Journal of Applied
Engineering Research, ISSN 0973-4562 Vol. 10 No.29 (2015) pp:22606-22613.
2. G.Senthil Kumar and Dr.K.Paramasivam“Test Power Minimization of VLSI Circuits: A Survey” in the IEEE sponsored 4th International
Conference on Computing Communication and Networking Technologies – ICCCNT 2013 at Vivekanandha College of Engineering for
Women, 8
3. 2013. The paper is available in IEEE Xplore PortalDOI:10.1109/ICCCNT.2013.6726569. pp.1-6.
4. S.Chitra, Dr.K.Paramasivam, “Design of Adiabatic Logic Cells for Efficient Power Reduction and Area Characteristics”,
International Journal of Systems, Algorithms & Applications, Volume 2, Issue 11, November 2012, ISSN Online: 2277-2677.
5. S. Goel, A. Kumar, and M. A. Bayoumi, “Design of robust, energy efficient full adders for deep-sub micrometer design using hybrid-CMOS
logic style,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 14,no. 12, pp. 1309–1321, Dec. 2006.
6. Jan M. Rabaey, AnanthaChadrakasan, BorivojeNikolic ;”Digital Integrated Circuits: Design approach”. of IEEE International
Conference on Power, Control and Embedded System (ICPCES), 28 Nov.-1Dec. 2010.
7. N. Zhuang and H. Wu, “A new design of the CMOS full adder,” JSSC, vol. 27, no. 5, May 1992, pp. 840-844.
8. Jan M. Rabaey, AnanthaChadrakasan, BorivojeNikolic;”Digital integrated Circuits : Design approach” .of IEEE International Conference on
Power, Control and Embedded System (ICPCES), 28 Nov.-1Dec. 2010.
9. Shubhajit Roy Chowdhury, Aritra Banerjee, Aniruddha Roy, HiranmaySaha, “A high Speed 8 Transistor Full Adder Design using Novel 3
Transistor XOR Gates”, International Journal of Electronics, Circuits and Systems 2, p-218,2008
10. Shiv Shankar Mishra, Adarsh Kumar Agrawal and R.K.Nagaria ”A comparative performance analysis of various CMOS design techniques
for XOR and XNOR circuits”, International Journal on Emerging Technologies, ISSN : 0975-8364.
11. Saradindu Panda, A. Banerjee, B.Maji, Dr.A.K.Mukhopadhyay, ”Power and Delay Comparison in between Different types of Full Adder
Circuits”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, ISSN: 2278 - 8875.
12. FengboRen, and DejanMarkovi,” True Energy-Performance Analysis of the MTJ-Based Logic-in-Memory Architecture ”,IEEE transactions
on electron devices,vol:57,no:5, may 2010.
13. Shivshankar Mishra, V. Narendar, Dr. R. A. Mishra, ” On the Design of High-Performance CMOS 1-Bit Full Adder Circuits”, International
Conference on VLSI, Communication and Instrumentation,2011.
14. C.Kalamani, K. Paramasivam “Survey of Low Power Testing Using Compression Techniques”, International Journal of Electronics and
Communication Technology /Volume-4, Issue-4, Oct-Dec 2013.
Authors: S.TamilElakkiya, K.Karthika,K.Jasmine
Paper Title: RTOS based Online Condition Monitoring and Diagnosis of Electrical Equipment
Abstract: In an electrical system if the maintenance process carried over in scheduled manner there is a chance
that would leads to unexpected failure before our next scheduled maintenance break. RTOS based Online
condition monitoring techniques for electrical equipment mainly includes system status, system performance,
system recovery and automatic diagnosis. If the electrical systems are more complex, its better to split into number
of tasks. These tasks would have different priorities and timing deadline. By using priority scheduling algorithm
the various tasks were managed. With the help of C language, the program has been written to assign the task
priorities, timing deadline to monitor the tasks, and also recovery actions should be carried over if any fault occurs.
This program has been flashed at ARM7 processor and based upon that the entire system works. This emulation
supports online condition monitoring to monitor and diagnosis of electrical equipment in real time.

Keywords: RTOS, ARM7 processor, Matlab-Simulink, LPC2148 kit,Priority scheduling algorithm.


31.
References: 128-131
1. Y. Rao and M. Chandorkar, “Rapid prototyping tool for electrical load emulation using power electronic converters,” in Industrial
Electronics Applications, 2009. ISIEA 2009. IEEE Symposium on, vol. 1, 4-6 2009, pp. 106–111.
2. http://www.linuxjournal.com/article/
3. http://www.reliableembeddedsystems.com/pdfs/2010
4. G. Zhang, L. Chen, and A. Yao, “Study and comparison of the rthal- based and adeos-based rtai real-time solutions for linux,” Computer
and Computational Sciences, International Multi-Symposiums on, vol. 2, pp.771–775, 2006.
5. N. Vun, H. Hor, and J. Chao, “Real-time enhancements for embedded linux,” Parallel and Distributed Systems, International Conference
on, vol. 0, pp. 737–740, 2008.
6. K. E. McKone, R. G. Schroeder, and K. O. Cua, “Impact of total productive maintenance practices on manufacturing performance,”
Journal of Operations Management, vol. 19, no. 1, pp. 39–58, 2001.
7. F. K. Pil and T. Fujimoto, “Lean and reflective production: the dynamic nature of production models,” International Journal of Production
Research, vol. 45, no. 16, pp. 3741–3761, 2007.
8. Viruthambal K., Arunkumar B, “RTOS Based Dynamic Scheduler in Power Quality Applications,” International Journal of Scientific
Engineering and Technology (ISSN : 2277-1581),Volume No.2, Issue No.6, pp : 554-559
Authors: N. Ramsundram,NishaKhanam
Paper Title: Impact Of Climate Change On Reservoir Inflow Predictions: A Case Study
Abstract: Hydrological cycle is inherent of climate processes with lot of interactions thereby making the system
to be complex. The modeling of hydrological cycle to simulate the water resource has been well researched for
more than a decade. In the recent past the studies are initiated to capture the influence of climate parameters on the
hydrological cycle. One of the major inferences from the above is that,influence of climate parameters in arid and
semiarid climatic region is not very significant. To understand the generalized behavior stated by the research
community on arid regions, in this research paper we explored the inflow database of stanely reservoir, Tamilnadu.
A modeling framework has been developed that predicts the reservoir inflow considering the future climatic
32.
scenarios. From the developed model,we inferred that the generalized stated on arid region valid only in case of
regional / macro modeling, and it does not valid for specific case as micro climate variables influences the 132-135
hydrological cycle.

Keywords: hydrological cycle, reservoir inflow, prediction, climate variables.

References:
1. Arnell N W,(2004),” Climate change and global water resources: SRES emissions and socio-economic scenarios”, Global Environmental
Change, 14(1), 31-52.
2. Askew,(1987), “Climate change and water resources:, in: S.I. Solomon, M. Beran, W. Hogg (Eds.), The Influence of Climate Change and
Climatic Variability on the Hydrologic Regime and Water Resources, vol. 168IAHS Publishers, 421–430.
3. Chattopadhyay N, M. Hulme, (1997),” Evaporation and potential evapotranspiration in India under conditions of recent and future climate
change:, Agricultural and Forest Meteorology, 87(1),55-73.
4. Fischer, G., F.N. Tubiello, H. van Velthuizen, and D.A. Wiberg, (2007),”Climate change impacts on irrigation water requirements: Effects
of mitigation, 1990-2080”. Technol. Forecasting Soc. Change, 74, 1083-1107.
5. Leavesley G.H., (1994),”Modeling the effects of climate change on water resources–a review”, Climatic Change, 28, 159–177.
6. Mall R.K, A. Gupta, R. Singh, R.S. Singh, L.S. Rathore, (2006),”Water resources and climate change: an Indian perspective”, Current
Science, 90, 1610–1626.
7. Mujumdar, P. P., and S. Ghosh (2008), Modeling GCM and scenario uncertainty using a possibilistic approach: Application to the
Mahanadi River, India, Water Resour. Res., 44
8. Mukerrji R, (2009), “Vulnerability and adaptation experiences from Rajasthan and Andhra Pradesh: water resource management”, SDC
V&A Programme, India.
9. Rodriguez Diaz J.A., E.K.Weatherhead., J.W.Knox and E.Camacho (2007), Climate Change impacts on irrigation water requirements in
the Guadalquivir river basin in spain, Reg Environ Change, 7, 149–159.
10. Samuel Hitz, Joel Smith, (2004),” Estimating global impacts from climate change”, Global Environmental Change, 14(3), 201-218.
11. Sathaye, J and Shukla, PR and Ravindranath, NH, (2006) “Climate change, sustainable development and India: Global and national
concerns”. In: Current Science, 90 (3). 314-325.
Authors: V.Jeyasudha, Satheesh Kumar KRP
Paper Title: Study and Comparison of Steel Haunched and Tapered Beam
Abstract: Steel framed buildings are flexible, ductile and light weight compared to that of reinforced concrete
buildings. Intense research had been conducted in the last decades regardingthe fatigue and ductility behaviour of
structural steel beam. Prismatic beams are the beams with uniform cross-section in the entire span of the beam.
Non-prismatic beams are used to increase the efficiency of the beam, by increasing the strength per unit mass than
that of prismatic beam. In this study, the load-deformation, stress-strain analysis, the fatigue and ductile behaviour
of non-prismatic steel beams with hunched and tapered ends was compared with prismatic beam for different
loading condition. The beams were subjected to static loading conditions during analysis.

33. Keywords: Prismatic beam, non-prismatic beam, stress-strain analysis, static loading, fatigue and ductile
behavior. 136-138

References:
1. NimbalkarAmol N. and Laxman V. Awadhani. Experimental and Numerical Analysis of Trapezoidal Corrugated Web Beam to
Determine its Strength and Mode Shapes. International Engineering Research Journal, 1955-1961.
2. Anu Jolly, VidyaVijayan 2. (2015). Structural Behaviour of Reinforced Concrete Haunched Beam A Study on ANSYS and ETABS.
International Journal of Innovative Science, Engineering & Technology, 3(8), 495-500.
3. Abinayaa, A., Ramadevi, K. (2018). Analytical investigation of all - Steel buckling restrained braces. International Journal of Civil
Engineering and Technology, 9(3),232-239.
4. Premalatha, J., Manju, R., Senthilkumar, V. (2017). Seismic response of multistoreyed steel frame with viscous fluid-scissor jack
dampers. International Journal of Civil Engineering and Technology, 8(8),289-312.
Authors: Senthil kumar P , Sivakumar K, Kannan P R
Paper Title: Fuzzy Sliding Mode Control for Active vibration control of hydraulic actuated vehicle suspension
Abstract: Fuzzy Sliding model control (FSMC) has been suggested to control hydraulic actuated nonlinear
active suspension using full car model. The development of efficient classical controller for active suspension has
been difficult due to complex nature of full car mathematical model, nonlinear effect in suspension and
unpredictable behaviour of hydraulic actuator. The sliding mode controller (SMC) has an ability to handle
uncertain parameter, nonlinearity and complex mathematical model of dynamic system. Chattering phenomenon
remains to be the only obstacle for nonlinear sliding mode controller which can be eliminated by integrating fuzzy
logic with sliding mode control. In this work, fuzzy sliding mode controller proposed for hydraulic actuated
nonlinear active suspension to handle nonlinearity, uncertainty in parameter variation and chattering effect. The
simulation is carried out using Seven degree of freedom based full car model to measure body displacement,
acceleration, roll and pitch angle of vehicle. The response of full car model confirms the feasibility of fuzzy sliding
mode controller for hydraulic actuated active suspension.

Keywords: Fuzzy sliding mode control, Vibration control, Active suspension, Actuator dynamics.
34.
References:
1. Hrovat D. “Optimal active suspension structures for quarter-car vehicle models”. Automatica. 1990; 26:845-60. 139-145
2. Thompson AG, Davis BR. “Optimal linear active suspensions with derivative constraints and output feedback control”. Vehicle System
Dynamics. 1988; 17:179-92.
3. Thompson A. “An active suspension with optimal linear state feedback. Vehicle System Dynamics”. 1976; 5(4):187-203.
4. Wilson DA, Sharp RS, Hassan SA. “The application of linear optimal control theory to the design of active automotive suspensions.
Vehicle System Dynamics”. 1986; 15(2):105-18.
5. Hrovat D. “Applications of optimal control to advanced automotive suspension design”. Journal of Dynamic Systems Measurement and
Control. 1993; 115: 328.
6. Alleyne AG, Liu R. “Systematic control of a class of nonlinear systems with application to electrohydraulic cylinder pressure control”.
IEEE Transactions on Control Systems Technology. 2000; 8: 623-34.
7. Yagiz N, Hacioglu Y, Taskin Y. “Fuzzy sliding-mode control of active suspensions”. IEEE Transactions on Industrial Electronics. 2008;
55: 3883-90.
8. Sun W, Gao H, Yao B. “Adaptive robust vibration control of full-car active suspensions with electrohydraulic actuators”. IEEE
Transactions on Control Systems Technology. 2013; 21: 2417-22.
9. Gohrle C, Schindler A, Wagner A, et al. “Design and vehicle implementation of preview active suspension controllers”. IEEE
Transactions on Control Systems Technology. 2014; 22: 1135-42.
10. Utkin V. “Variable structure systems with sliding modes”. IEEE Transactions on Automatic Control. 1977; 22(2):212-22.
11. Ertugrul M, Kaynak O, Sabanovic A. “A comparison of various VSS techniques on the control of automated guided vehicles”. IEEE
Transactions on Industrial Electronics, 1995; 2: 837-842.
12. Jafarov EM, Tasaltin RA. “Robust sliding-mode control for the uncertain MIMO aircraft model F-18”. IEEE Transactions on Aerospace
and Electronic Systems. 2000; 36(4):1127-41.
13. Kim C, Ro PI. A sliding mode controller for vehicle active suspension systems with non-linearities. Proceedings of the Institution of
Mechanical Engineers, Part D: Journal of Automobile Engineering. 1998; 212(2):79-92.
14. Sam YM, Osman JH, Ghani MR. “A class of proportional-integral sliding mode control with application to active suspension system”.
Systems & Control Letters. 2004; 51(3):217-23.
15. Yagiz N, Yuksek I, Sivrioglu S. “Robust control of active suspensions for a full vehicle model using sliding mode control”. JSME
International Journal Series C Mechanical Systems, Machine Elements and Manufacturing. 2000; 43(2):253-8.
16. Zadeh LA. “Fuzzy sets”. Information and Control. 1965; 8:338-53.
17. Sathishkumar M, Sakthivel R, Kwon OM, Kaviarasan B. “Finite-time mixed H∞ and passive filtering for Takagi–Sugeno fuzzy
nonhomogeneous Markovian jump systems”. International Journal of Systems Science. 2017; 48(7):1416-27.
18. Sakthivel R, Sathishkumar M, Mathiyalagan K, Anthoni SM. “Robust reliable dissipative filtering for Markovian jump nonlinear systems
with uncertainties”. International Journal of Adaptive Control and Signal Processing. 2016.
19. Sakthivel R, Sathishkumar M, Ren Y, Kwon OM. “Fault-tolerant sampled-data control of singular networked cascade control systems”.
International Journal of Systems Science. 2017: 1-12.
20. Pan H, Sun W, Gao H, Jing X. “Disturbance observer-based adaptive tracking control with actuator saturation and its application”. IEEE
Transactions on Automation Science and Engineering. 2016; 13(2):868-75.
21. Pan H, Sun W, Gao H, Jing X. “Disturbance observer-based adaptive tracking control with actuator saturation and its application”. IEEE
Transactions on Automation Science and Engineering. 2016; 13: 868-75.
22. Sun W, Pan H, Gao H. “Filter-based adaptive vibration control for active vehicle suspensions with electrohydraulic actuators”. IEEE
Transactions on Vehicular Technology. 2016; 65(6):4619-26.
23. Lin J, Lian RJ, Huang CN, et al. “Enhanced fuzzy sliding mode controller for active suspension systems”. Mechatronics. 2009; 19: 1178-
90.
Authors: V. Chelladurai1, P. Karthikeyan2a, S. Thangamani2b
Urbanization Effects On the Surface Water Resources and Land Use in Udumal petregion Using Rs
Paper Title:
& Gis
Abstract: The continuous increase in population and the urbanization resulted in over exploitation of natural
resources which directly affects the land use pattern and use of water. A study was framed to assess the changes
in the land and water resources management in the Udumalpet taluk region during 1991-2009. The changes in
land use pattern, growth and reduction in surface water body area in the region was analysed using ArcGIS 9.3
software.The land use pattern analysis results showed that the cultivable land and build-up land level increased
during the study period (1991-2009), and a trend of decrease in water holding structures and uncultivable land
area. The growth of area with buildings was 82.64%, in this region and in the urban area switch of land to
buildings was 2.16 times of overall build up area increase. The area of surface water bodies at the urban and rural
areas were declined by 7.31% and 4.78%, respectively during this study period (1991-2009).The portable water
demand forecast analysis showed that the portable water requirement in 2041 would be 2.31 and 1.63 times
higher than the portable water requirement in 2011 at the urban, and rural areas, respectively.

Keywords: Land use pattern change, land cover change, Urbanization, portable water requirement

References:
1. FAO, 2007. Coping with water scarcity - Challenge of the twenty-first century, World water day issue.
2. Census of India. 2011. Rural-Urban Distribution of Population, Provisional Population Totals, Government of India Publications,
35. New Delhi.
3. Montgomery, M.A., and M. Elimelech. 2007. Water and sanitation in developing countries: including health in the equation.
Environmental Science & Technology. 1: 12–24.
146-150
4. USEPA, 2008. Environment Protection Agency (EPA) Report on Environment. United State Environment Protection Agency.
5. Vink, A.P.A., 1983. Landscape Ecology and Land Use. Longman, New York. 171.
6. Chowdhury, R. K. and R. Rahman, 2008. Multi-criteria decision analysis in water resources management: The Malnichara channel
improvement. International Journal of Environmental Science and Technology, 5(2): 195-204.
7. Chaudhary, B.S., 2003. Integrated Land and Water Resources Management in Southern Part of Haryana using Remote Sensing and
Geographical Information Systems (GIS).Ph.D. Thesis, University of Rajasthan, Jaipur.
8. Latha, J.C., S. Saravanan and K. Palanichamy, 2010. A Semi – Distributed Water Balance Model for Amaravathi River Basin using
Remote Sensing and GIS. International Journal of Geomatics and Geosciences, 1(2): 252-263.
9. Kandasamy, P. and M. Chellamuthu, 2012. Dry Spell Analysis for Water management Planning. International Journal of Applied
Science and Engineering Research, 1(1): 127-137.
10. Sundarakumar, K., M. Harika, S.K. Aspiya Begum, S. Yamini and K. Balakrishna, 2012. Land use and land cover change detection
and urban sprawl analysis of Vijayawada city using multi-temporal Landsat data. International Journal of Engineering Science and
Technology, 4(1): 170-178.
11. Tan, M.X.L., H. Xie and C. Lu, 2005. Urban land expansion and arable land loss in China - A case study of Beijing-Tianjin-Hebei
region. Land Use Policy, 22: 187–196.
12. Cetin, M. 2009. A satellite-based assessment of the impact of urban expansion around a lagoon. International Journal of
Environmental Science and Technology,
6(4): 579-590.
13. Ningrui, D., H. Ottens and R. Sliuzas, 2010. Spatial impact of urban expansion on surface water bodies - A case study of Wuhan,
China. Landscape and Urban Planning, 94: 175–185.
14. Yin, J., Z. Yin, H. Zhong, S. Xu, X. Hu, J. Wang and J. Wu, 2011. Monitoring urban expansion and land use/land cover changes of
Shanghai metropolitan area during the transitional economy (1979–2009) in China. Environ Monit Assess, 177:609–621.
Authors: G.M.Tamilselvan,V.Ashishkumar,S.Jothi Prasath ,S.Mohammed Yusuff
36. Iot Based Automated Water Distribution System With Water Theft Control And Water Purchasing
Paper Title:
System
Abstract: The expanded living spaces in provincial and urban territory require great quality water
dissemination administration framework. In this way, there is a basic prerequisite to outline a programmed water
supply framework to accomplish rise to measure of water conveyance to every one of the natural surroundings.
Internet of things, another idea is employed as a part of the planned framework for programmed water circulation
and fault identification. The key idea of this paper is to plan a cost proficient framework to accomplish better water
supply by regular supervising and furthermore controlling it from a central server to eliminate problems in the
supply of water to the habitats. The proposed design utilizes an Arduino as minicomputer, water flow sensor, and
solenoid valves. Arduino is utilized to control the valve and flow meter. The purchase of water should be possible
by utilizing cayenne application in which the requisite of water for any of the habitats can be fixed. To associate
the Arduino board with the internet the Arduino Ethernet Shield V1 is utilized. It depends on the Wiz net W5100
Ethernet chip (datasheet). The Wiz net W5100 gives a system (IP) stack fit for dealing with both TCP and UDP
packets. The proposed design takes care of the issue of overflow, over utilization, acquiring of water and makes an
appropriate distribution.

Keywords: Arduino, Distribution, Monitoring, Purchasing of Water, Solenoid Valves, Water Flow Sensor, Water
Supply. 151-156

References:
1. E. V. Ebere , Oladipo Onaolapo Francisca , “Microcontroller based automated water level control system”, International Journal of
Innovative Research in Computer and Communication Engineering, Vol.1, No. 6. 2013, pp.1-6.
2. Gaikwad Sonali Ashok, “Water antitheft and quality monitoring system by using PLC and SCADA”, International journal of electrical and
electronic engineering research, ISSN 2250-155X. Vol.3, No.2, June 2013, pp.355-364.
3. Hassaan Th.H.Thabet, “Design and implementation of a Pi Controller for an automated building water supply system using PLC
techniques,” Journal of Theoretical and Applied Information Technology, Vol. 5,May 2011.
4. P.MukeshAravind, S.Sukhumar, S.Karthik, “PLC based automatic corporation water distribution system using solar energy”, International
Journal of Engineering Research and Technology (IJERT), Vol.2, No.12, December 2013.pp.3100-3105.
5. A. J. Whittle, M. Allen, A. Preis and M. Iqbal “Sensor networks for monitoring and control of water distribution system” The 6th
International Conference on Structural Health Monitoring of Intelligent Infrastructure, Hong Kong 9-11 December 2013, Journal of
Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 6, No.1, pp. 4-23.
6. Sagar Khole, Tushar Kople and A.P More, “Automated Drinking water supply system and theft identification using Embedded
technology”, International Journal of Innovative Research in Computer and Communication Engineering,Vol.3, 2015,pp.1-6.
7. Ahmad T. Jaiad, and Hamzah Sabr Ghayyib, “Controlling and Monitoring of Automation of Water Supply system based on IOT with theft
identification”, International journal of research –GRANTHAALAYAH, Vol.5, No.5, 2017.
Authors: J.Rajasingh, S.Sivasakthi, M.Thirumalaimuthukumaran
Paper Title: Existence of solution of hypothalamo- pituitary -adrenocortical mathematical model
Abstract: Homotopy analysis method is attempted to evaluate the hypothalamo- pituitary - adrenocortical
mathematical model. The effects of hypothalamo- pituitary adrenocortical,corticotrophin releasing hormone,
denocorticotropin, are discussed in this work.
AMS Subject Classiftcation: 65L11, 65L99, 92C50

Keywords: hypothalamo- pituitary -adrenocortical, corticotrophin, adenocorticotropin.

References:
1. Tsigos C, Chrousos GP, Hypothalamic-pituitary-adrenal axis, neuroendocrine factors and stress. J Psychosom Res ; 53(2002):
865-71.
37. 2. Paunovic VR, Babinski T. Biological psychiatry 1: The molec- ular basis of mental processes. Faculty of Medicine, University
of Belgrade, Belgrade,Serbian, (1995). 157-161
3. Gonzalez-Heydrich J, Steingard RJ, Kohane I. A computer simulation of the hypothalamo-pituitary-adrenal axis. In:
Eighteenth annual proceedingsof the symposium for computer applications in medical care (SCAMC), (1994) 1010.
4. Lenbury Y, Pacheenburawana P. Modelling fluctuation phe- nomena in the plasma cortisol secretion system in normal man.
Biosystems; 26(1991):117-25.
5. .Londergan CH, Peacock-Lopez E. Dynamic model of hor- monal systems coupled by negative feedback. Biophys. Chem.
(1998);73 :85-107
6. .Mehdi Ganjiani Hossein Ganjiani, Solution of coupled sys- tem of nonlinear differential equations using homotopy analysis
method. Nonlinear Dyn. 56 (2009): 159-167.
7. Veldhuis J D, Iranmanesh A, Naftolowitz D, Tatham N, Cas- sidy F, Carroll BJ. Corticotropin secretary dynamics in hu- mans
under low glucocorticoid feedback. J. Clin. Endocrinol Metab ;86 (2001): 5554-63.
8. Brown EN, Meehan PM, Dempster AP. A stochastic differen- tial equation model of diurnal cortisol patterns. Am. J. Physiol
Endocrinol Metab ;280 (2001): E 450-61
Authors: J.Rajasingh, R.Murugesu, S.John Alexis
Paper Title: Existence of Solution of Forest Cross-Diffusion Model
Abstract: Homotopy perturbation method is attempted to evaluate the cross-diffusion forest boundary
dynamics. The effects of exothermic and endothermic parameters are are discussed.
AMS Subject Classiftcation: 37N25, 35Q92, 92D40, 92D25, 35B20, 37N25.
38.
Keywords: Homotopy perturbation method, forest boundary dynamics .
162-167
References:
1. M.Y. Antonovsky, E.A. Aponia, Y.A. Kuznetsov, Spatial- temporal structure of mixed- age forest boundary: The sim- plest
mathematical model, InternationalinstituteforApplied Systems Analysis (Laxenburg, Austria,1989), pp. WP 89-54.
2. M.Y. Antonovsky, W. Clark, Y.A. Kuznetsov, The influence of pests on forest age structure dynamics: The simplest math-
ematical models, International institute for Applied Systems Analysis (Laxenburg, Austria, 1987) , pp. WP-87-70.
3. M.Y. Antonovsky, R. Fleming, Y.A. Kuznetsov, W. Clark, Forest pest interaction dynamics: The simplest mathematical
models, Theor.Popul.Biol. 37 (1990)343-357.
4. M.Y. Antonovsky, M.D. Korzukhin, Mathematical modelling of economic and ecological -economic processes.Integrated
Global Monitaring of Environmental pollution, Proc.2nd Inter- national Symp., (Leningrad:Hydromet,Tbilisi, USSR, 1981), pp.
353-358.
5. C. Arslanturk, Performance analysis and optimization of radi- ating fins with a step change in thickness and variable thermal
conductivity by Homotopy Perturbation Method, Heat Mass Transfer 47(2011) 131-138.
6. M.S.H. Chowdhury, I. Hashim, Analytical solutions to heat transfer equations by homotopy perturbation method, Phys.
Lett. A 372(2008) 1240-1243.
7. L.H. Chuan, Tohru Tsujikawa, Atsushi Yagi,Statinary Solu- tions to Forest Kinematic Model, Glasgow Math. J 51 (2009)1- 17.
8. M.S.H. Cowdhury, I. Hashim, O. Abdulaziz, Comparison of Homotopy Analysis Method And Homotopy-Perturbation
Methodfor purelynonlinearfin-type problems, CommunNon- linear Sci. Numer. Simul. 14(2009) 371-378.
9. Gianluca Mola, Atsushi Yagi, A Forest model with Memory,
10. Funcialaj Ekvacioj 52 (2009) 19-40.
11. J.H. He,Homotopy perturbation technique,Comput. Methods Applied Mech. Eng., 178 (1999)257-262.
12. Y.A. Kuznetsov, M.Y. Antonovsky, V.N. Biktashev and A. Aponina, A cross-diffusion model of forest boundary dynamics, J
Math. Biol. 32 (1994) 219-232.
13. L. Quanqua, Qualitative Analysis for a cross diffusion model of forest, Science in China(series A), 41(1998) (6).
14. Y.P. Wu, Stability of Travelling Waves for a Cross-Diffusion Model, Journal Of Mathematical Analysis And Applications 215 (1997)
388-414.
Authors: S.P.Siddique Ibrahim, M. Sivabalakrishnan, S.P. Syed Ibrahim
Paper Title: Lazy Learning Associative Classification in MapReduce Framework
Abstract: he core objective of the work is to propose a distributed environment based lazy learning Associative
Classification (AC). Associative Classification is a hybrid version of data mining tasks which integrated both
Association Rule Mining (ARM) and Classification technique to construct accurate classifier. Unfortunately, the
AC used for learning these classifier are less popular in real time for building application due to its higher
computation time complexity and memory constraints in large volume of datasets. Moreover, single processor’s
CPU resources and memory are limited, which makes the algorithm incompetent to handle such datasets. To
overcome such downsides, we proposed a distributed and parallel computing for lazy learning associative
classification for accelerating algorithm performance by projecting the testing instances with large training
datasets. In this work, we have implemented MapReduce based algorithms which reduce the computation by
eliminates the need of constructing generalized classifier. It also well handled rare rules and generated institutive
rules. The proposed algorithm may be suitable in area such as network intrusion detection, fraud detection, crowd
analysis, rare disease prediction and crime analysis. Our algorithm has been compared with well known existing
algorithms in relations of precision and running time. The experiments result has strengthened the proposed
algorithm well handle the rare rules in distributed environment and is making better performance even the size of
the datasets is huge.

Keywords: Association Rule Mining, Rare rules, Lazy Learning, Associative Classification.

References:
1. Agrawal R. and Srikant R. “Fast algorithms for mining association rule” Proceedings of the twentieth International conference on very
large databases. 1994, pp. 487-499.
2. B. Liu and Y. Ma, “Mining association rules with multiple minimum supports,” in Proc. fifth ACM International Conf. Knowledge
discovery data mining, 1999, pp. 337–341.
39. 3. Apache Drill, http://drill.apache.org May 2015).
4. Apache Spark, https://spark.apache.org (Accessed: May 2015). 168-172
5. Apache Storm, https://storm.apache.org (Accessed: May 2015).
6. M. I. A. Ajlouni, W. Hadi, J. Alwedyan, Detecting phishing websites using associative classification, European Journal of Business and
Management 5 (15) 2013, pp. 36-40.
7. N.Abdelhamid A, Ayesh .F “A Multi class Associative Clasfication algorithm” Information Knowledge Management, 2012.
8. E. Baralis, P. Garza, “ A Lazy approach to pruning classification rules” Proceedings of IEEE Internaltional conference on DataMining,
2012, pp. 35-42.
9. B. Liu, W.Hsu, et.al., “Integrating classification and association rule mining”, In proc. of the Fourth International Conference on
Knowledge Discovery and Data Mining, 1998, pp. 80-86.
10. Baralis. E, Chiusano. S, A Lazy Approach to Associative Classification, IEEE Transactions on Knowledge and Data Engineering, v.20 n.2,
p.156-171, February, 2008.
11. Quinlan. J, “Induction of decision trees”. Machine Learning, pp, 81–106, 1986.
12. Han. J, and Pei. J, “CMAR: Accurate and Efficient Classification Based on Multiple Class-Association Rules,” Proc. of IEEE International
Conference on Data Mining (ICDM ’01), Nov. 2001.
13. [Guoqing Chen, et.al., “A new approach to classification based on association rule mining”, Science Direct, Decision Support Systems 42
,2006, pp. 674– 689.
14. J. Dean, S. et.al., “A MapReduce: A flexible data processing tool”, Comm. ACM 53 (1), 2010, pp.72–77.
15. Apache Spark: October 2015. (Https:// spark.apache.org)
16. L. Neumeyar, B.Robbings, “ Distributed stream computing platform” Proc. of IEEE Int. conference on data mining workshop, 2010, pp.
170-177.
17. [Apache Storm: October 2015. (https:// storm.apache.org)
18. S. Melnik, A.Gubarev, “ Interactive analysis of web-scale datasets”, Proc. VLDBndow, 2010, pp. 330-339.
19. Apache Drill: October 2015. (http:// drill.apache.org)
20. Vowplawabbit.:October 2015(http://hunch.net/~vw/).
21. Bifet,G.Holmes, “Massive online analysis”, 2010, pp. 1601-1604.
22. Wu, X., et.al. 2007.Top 10 algorithms in data mining. Knowledge Information System, 2008, pp. 1-37.
23. Cendrowska J. “An Algorithm for inducing modular rules” Internal. Jour. of Man-Machine Studies. Vol.27, 1987, pp. 349-370.
24. Syed Ibrahim. S.P, Nataraj R.V., “LLAC: Lazy Learning in Associative Classification” in the Springer Lecture Series (CCIS) Part I, 2011,
PP. 631 – 638.
25. UCI Machine Learning Repository: Data Sets [Online] (2010). Available: http://archive.ics.uci.edu/ml/datasets.html.
Authors: M.N.Saroja, S.Kannan,K.R. Baskaran
40. Paper Title: Analysing the purchase behavior of a customer for improving the sales of a product
Abstract: Modern techniques such as predictive analytics have gained a lot of research attraction these days.
In the competitive world, it is important for a business people to predict the pulse of customer to shine. With
predictive analytics, it is possible to see what a customer will buy next. The goal is to increase the profit earned by
a company. In this paper, various hypothesis tests have been conducted for analysing the purchases of a customer.
Initially, the purchases have been analysed by grouping the purchases gender wise and by analysing what group of
people buy more products. It also finds out which group prefers for promotion codes and discounts and for what
type of products they preferred more. In which store, the sales of products are more and in which state, the sales
are maximum. Based on this, techniques for improving the sales of a product is suggested.

Keywords: Data Analytics, Purchasing behaviour, product recommendation, Predictive Analytics, Data
mining

References:
1. Mahsa Familmaleki, Alireza Aghighi and Kambiz Hamidi, “Analyzing the Influence of Sales Promotion on Customer Purchasing
Behavior”, International Journal of Economics & Management Sciences, Volume 4, 2015 173-175
2. Aurangzeb Mughal, Asif Mehmood, Ammar Mohi-ud-deen, Bilal Ahmad, “The Impact of Promotional Tools on Consumer Buying
Behavior: A Study from Pakistan” , Journal of Public Administration and Governance, Volume 4, 2014
3. B.V.Sangvikor and Hemant J.Katole, “A study of consumer purchase behaviour in organized retail outlets” Journal of Business and Retail
Management Research, Volume 7, Issue 1, October 2012
4. https://www.rstudio.com
5. AshminKaul, MansiVirani, ChaitanyaKaul and TejaGummalla “Evaluating Techniques for Mining Customer Purchase Behavior and
Product Recommendation” International Journal of Computer Applications (0975 – 8887) Volume 126 – No.5, September 2015.
6. Bagozzi, R., Gurhan-Canli, Z., Priester, J., “The Social Psychology Of Consumer Behaviour”, Open University Press, Buckingham, PA,
2002, pp 60-63.
7. Belch G, Belch, M.A Kerr G and Powell I “Advertising and Promotion Management” An Integrated Marketing Communication
Perspective, McGraw-Hill, Sydney, Australia, 2009, p.13.
8. K.R.Baskaran, C. Kalaiarasan, “Improved Performance By Combining Web Pre-Fetching Using Clustering With Web Caching Based On
Svm Machine Learning Method”, International Journal of Computers Communications & Control, ISSN 1841-9836,Vol.11, No.2, April
2016, pp. 166-177
9. K. R. Baskaran, C. Kalaiarasan, “Pre-Eminence Of Combined Web Pre-Fetching And Web Caching Based On Machine Learning
Technique”, Arabian Journal For Science And Engineering
10. (Springer Journal), ISSN 1319-8025, Vol. 39, No.11, November 2014, pp. 7895-7906
Authors: X.Francis Jency, V.P.Sumathi, Janani Shiva Sri
Paper Title: An exploratory data analysis for Loan prediction based on nature of the clients
Abstract: In India, the number of people applying for the loans gets increased for various reasons in recent
years. The bank employees are not able to analyse or predict whether the customer can payback the amount or not
(good customer or bad customer) for the given interest rate. The aim of this paper is to find the nature of the client
applying for the personal loan. An exploratory data analysis technique is used to deal with this problem. The result
of the analysis shows that short term loans are preferred by majority of the clients and the clients majorly apply
loans for debt consolidation. The results are shown in graphs that helps the bankers to understand the client’s
behaviour.

Keywords: Loan analysis, exploratory data analysis technique, client’s analysis, financial categories analysis
41. References:
1. A. Goyal and R. Kaur, “A survey on Ensemble Model for Loan Prediction”, International Journal of Engineering Trends and Applications 176-179
(IJETA), vol. 3(1), pp. 32-37, 2016.
2. A. J. Hamid and T. M. Ahmed, “Developing Prediction Model of Loan Risk in Banks using Data Mining”.
3. G. Shaath, “Credit Risk Analysis and Prediction Modelling of Bank Loans Using R”.
4. A. Goyal and R. Kaur, “Accuracy Prediction for Loan Risk Using Machine Learning Models”.
5. M. Sudhakar, and C.V.K. Reddy, “Two Step Credit Risk Assessment Model for Retail Bank Loan Applications Using Decision Tree Data
Mining Technique”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 5(3), pp. 705-
718, 2016.
6. Gerritsen, R. (1999). Assessing loan risks: a data mining case study. IT professional, 1(6), 16-21.
7. Hsieh, N. C., & Hung, L. P. (2010). A data driven ensemble classifier for credit scoring analysis. Expert systems with Applications, 37(1),
534-545.
8. https://en.wikipedia.org/wiki/Exploratory_data_analysis
9. https://pandas.pydata.org/pandas-docs/stable/
10. https://www.experian.com/blogs/ask-experian/credit-education/score-basics/what-is-a-good-credit-score/
Authors: P.Parameswari, C.Ramachandran , R. Rassika
Paper Title: Heart Disease Prediction System Using Enhanced Apriori
Abstract: Heart disease is frightening the people around the world and in some countries it is the number one
disease which leads to death. Biomedical research efforts help to prevent and treat heart disease in a better way.
Handling large amount of data is often very tedious with traditional methods which lead into problems, particularly
in high level of complexity and vagueness factors. Mining frequent patterns from large databases has emerged as
an important area in data mining research and knowledge discovery community; this also contributes so much to
42.
health care domain. This heart prediction system helps to predict heart related problems at an early stage. The
180-182
proposed system predicts heart related issues of a person based on questions and the answers given to the
prediction system. To have better results in minimum time duration an Enhanced Apriori algorithm was
introduced which is an improvement of Apriori algorithm. The experimental results proved that the proposed
approach performs faster and memory efficient with more number of patterns. It was also proved that the
prediction rate of Enhanced Apriori was also good (94%) than Apriori (87%).
Keywords: Prediction, Data Mining , Heart Disease, Apriori, Association Rule Mining

References:
1. Wilson, F. N. 1948. The clinical value of chest leads. British Heart Journal 10 (2): 88–91.
2. Parameswari, P, Abdul Samath, J & Saranya, S 2015, Efficient birch clustering algorithm for categorical and numerical data using
modified co-occurrence method, International Journal of Applied Engineering
3. Research, vol. 10, no. 11, pp. 27661-27673 .
4. Truett J. J, Cornfield, and W. B. Kannel. 1967. A multivariate analysis of the risk of coronary heart disease in Framingham. Journal of
Chronic Diseases 20:511-24.
5. Rose. G. and H. Blackburn. 1968. Cardiovascular survey methods: WHO technical report series no. 56. Geneva: World Health
Organization..
6. Aribarg, T., Supratid, S., Lursinsap, C, 2012. Optimizing the modified fuzzy ant-miner for efficient medical diagnosis. Applied Intelligence
;37(3):357–376.
7. Silverstein, C., Brin, S., Motwani, R. and Ullman, J, 1998. Scalable Techniques for Mining Causal Structures, Technical Report,
Department of Computer Science, Stanford University.
8. Luepker, R. V., A. Evans, P. McKeigue, and K. S. Reddy, 2004. Cardiovascular Survey Methods. 3rd edition Geneva: World Health
Organization.
9. Blair S. N., J. B. Kampert, H. W. Kohl, C. E. Barlow, C. A. Macera, R. S. Paffenbarger, and L. W. Gibbons, 1996. Influences of
cardiorespiratory fitness and other precursors on cardiovascular disease and all-cause mortality in men and women. Journal of the
American Medical Association 276: 205-210.
10. Rakesh Agrawal and Ramakrishnan Srikant , 1994. Fast algorithms for mining association rules in large databases. Proceedings of the 20th
International Conference on Very Large Data Bases, VLDB, pages 487-499, Santiago, Chile, September .
Authors: R.K. Kavitha,W. Jaisingh
Paper Title: A Study on the Student Experiences in Blended Learning Environments
Abstract: In recent times, teaching and learning methods have a direct impact on students' learning experiences.
Blended learning is a combination of face-to-face and online delivery methods which influences students'
perceptions on the learning environments to a great extent. Learning analytics is a growing trend at all levels of
education. The objective of the paper is to examine the student’s experiences in blended learning environments.
Relevant data has been collected from undergraduate and postgraduate students who are exposed to a blended
learning environment while learning programming subjects. Learning analytics has been applied on the collected
data. It can be inferred from the results that the blended learning approach is more beneficial for students who are
skilled in using certain computer programs and applications. The study results also provide new insights into the
student preferences for learning in such knowledge sharing collaborative environments.

Keywords: Blended learning, Learning analytics, Collaboration, Knowledge sharing.

References:
1. Kintu, M. J., & Zhu, C. (2016). Student characteristics and learning outcomes in a blended learning environment intervention in a
Ugandan University. Electronic Journal of e-Learning, 14(3), 181–195.
2. Chen, C.C., & Jones, K.T. (2007). Blended learning vs. traditional classroom settings: Assessing effectiveness and student perceptions in
43. an mba accounting course. The Journal of Educators Online, 4(1), 1-15.
3. Akkoyunlu, B., & Soylu, M.Y. (2008). A study of student’s perceptions in a blended learning environment based on different learning
183-186
styles.Educational Technology & Society, 11(1), 183-193.
4. Chandra, V., & Fisher, D.L. (2009). Students’ perceptions of a blended web-based learning environment. Learning Environment Research,
12, 31-44.
5. Donnely, R. (2010). Harmonizing technology with interaction in blended problem-based learning. Computers & Education, 54(2), 350-359.
6. López-Pérez, M., Pérez-López, M. C., & Rodríguez-Ariza, L. (2011). Blended learning in higher education: Students’ perceptions and their
relation to outcomes. Computers & Education, 56(3), 818-826.
7. Yeh, Y. C., Huang, L. Y., & Yeh, Y. L. (2011). Knowledge management in blended learning: Effects on professional development in
creativity instruction. Computers & Education, 56(1), 146-156.
8. Goyal, E., & Tambe, S. (2015). Effectiveness of Moodle-enabled blended learning in private Indian Business School teaching NICHE
programs. The Online Journal of New Horizons in Education, 5(2), 14–22.
9. Islam, A. K. M. N. (2014). Sources of satisfaction and dissatisfaction with a learning management system in
10. post-adoption stage: A critical incident technique approach. Computers in Human Behaviour, 30, 249–261.
11. Kwak, D. W., Menezes, F. M., & Sherwood, C. (2013). Assessing the impact of blended learning on student performance. Educational
Technology & Society, 15(1), 127–136.
12. Kavitha,R.K., Jalaja Jayalakshmi, V., Rassika, R., (2018). Collaborative learning in Computer Programming Courses using E-Learning
Environments. International Journal of Pure and Applied Mathematics, Volume 118 No. 8 2018, 183-189
13. Sarka Hubackova., Ilona Semradova., (2016). Evaluation of Blended Learning. Procedia - Social and Behavioral Sciences 217, 551 – 557.
14. Dr.M.Manikantan, Mr.R.Lakshmana Kumar, Ms.Amala Jayanthi.M., (2017). Improvising the Web Search Results Using Enhanced Lingo
Algorithm in Big Data Analysis for Health care, Journal of Advanced Research in Dynamical and Control Systems Vol. 9. Sp– 14 / 2017.
15. Parameswari, P, Abdul Samath, J, Saranya, S (2015), ‘Efficient birch clustering algorithm for categorical and numerical data using
modified co-occurrence method’, International Journal of Applied Engineering Research, vol. 10, no. 11, pp. 27661-27673 .
Authors: Gunasekaran M, Gopalakrishnan B Manikantan. M
Paper Title: EMDAI: An Emergency Message Diffusion for Accident Information in Vehicular Ad Hoc Networks
Abstract: A Vehicular Ad Hoc Networks (VANETs) brings the breakthrough in industries. In highways the
road safety and travel comfort are accomplished through vehicle-to-vehicle and vehicle-to-roadside unit
communications. A major issue in safety application is to diffuse emergency message to all the other vehicles
immediately without redundancy. There are number of works have been proposed to disseminate the emergency
44. message, but those works suffer from delay and bandwidth consumption due to redundancy. This paper considers
vehicle-to-vehicle communication for emergency message diffusion without the assistance of roadside units. In 187-197
this paper, an Emergency Message Diffusion for Accident Information (EMDAI) approach is proposed for the
efficient communication of emergency message. The EMDAI approach ensures the broadcasting of Short Range
Message (SRM) and Long Range Message (LRM) to all the vehicles with minimum delay. A Non-Redundant
Acyclic Group (NAG) technique is introduced to form a group to avoid the broadcast storm problem. In addition,
the proposed EMDAI approach provides assistance to the ambulance to reach the Point of Incidence (PoI) in a
short span of time. The performance analysis is done on reliability, channel occupancy, delay, message
transmission per involved vehicle and traffic clearance delay. The results prove that the proposed EMDAI
approach outperforms the existing protocol.

Keywords: Vehicular Ad Hoc Networks, Emergency Message Diffusion, Accident Information, Ambulance
Assistance and Broadcast Storm Problem.

References:
1. Chen, R., Jin, W-L., Regan, A. (2010). Broadcasting safety information in vehicular networks: Issues and Approaches, IEEE Network,
vol. 24, no. 1, pp. 20-25.
2. Rahman, S, A., Mourad, A., Barachi, M, E., Orabi, W, A. (2018). A novel on-demand vehicular sensing framework for traffic condition
monitoring, Vehicular communications, Elsevier, vol. 12, pp. 165-178.
3. Chou, Y-H., Chu, T-H., Kuo, S-Y., Chen, C-Y. (2018). An adaptive emergency broadcast strategy for vehicular ad hoc networks, IEEE
Sensor Journal, vol. 18, no. 12, pp. 4814-4821.
4. Panichpapiboon, S., Pattara-Atikom, W. (2012). A review of information dissemination protocols for vehicular ad hoc network, IEEE
Communications Surveys & Tutorials, vol. 14, no. 3, pp. 784-798.
5. Tseng, YC., Ni, SY., Chen, YS., Sheu, JP. (2002). The broadcast storm problem in a mobile ad hoc network, Wireless Networks, vol. 8, no.
2/3, pp. 153-167.
6. Ghodrati, AD. (2013). Reduces broadcast storm using clustering in VANTEs, International Research Journal of Applied and Basic
Sciences, vol. 7, no. 13, pp. 979-987.
7. Huang, J., Huang, Y., Wang, J. (2014). Vehicle density based forwarding protocol for safety message broadcast in VANET, The Scientific
World Journal, vol. 2014, pp. 1-9.
8. Sun, MT., Feng, WC., Lai, TH., Yamada, K., Okada, H. (2000). GPS-based message broadcast for adaptive inter-vehicle communications,
in Proc. of the 52nd Vehicular Technology Conference, pp. 2685-2692.
9. Cha, SH. (2014). A Survey of Broadcast Protocols for Vehicular Ad-hoc Networks, Smart Computing Review, vol. 4, no. 4, pp. 246-255.
10. Dedicated short range communications (DSRC), http://www.leearmstrong.com/DSRC/ DSRCHomeset.htm.
11. Wu, J., Li, H. (2001). A Dominating-set-based routing scheme in Ad Hoc Wireless Networks, Telecommunications Systems, vol. 18, no.1-
3, pp. 13-36.
12. Korkmaz, G., Ekici, E., Ozguner, F., Ozguner, U. (2004). Urban multihop boradcat protocol for inter-vehicle communication systems,
Proceedings of the 1st ACM International Workshop on vehicular ad hoc networks, pp.76-85.
13. Osafune, T., Lin, L., Lenardi M. (2006). Multi-hop vehicular broadcast, 6th International conference on ITS Telecommunications
Proceedings, Chengdu, pp. 757-760.
14. Yu, S., Cho, G. (2006). A selective flooding method for propagating emergency messages in vehicle safety communications, in Proc. of
International Conference on Hybrid Information Technology, pp. 556-561.
15. Vegni, AM., Stramacci, A., Natalizio, E. (2012). SRB: A selective reliable broadcast protocol for safety applications in VANET, in Proc.
of International Conference on Selected Topics in Mobile & Wireless Networking.
16. Muthamizh, B., Sathya, SS., Chitra, M. (2014). Spanning tree based broadcasting for VANET, International Journal of P2P Network
Trends and Technology, vol. 7, pp. 21-25.
17. Nakorn, NN., Rojviboonchai, K. (2010). DECA: Density-aware reliable broadcasting in vehicular ad hoc networks, in Proc. of the
International Conference on Electrical Engineering/Electronics Computer Telecommunications and Information Technology, pp. 598-602.
18. Wu, D., Zhang, Y., Bao, L., Regan, AC. (2013). Location-based crowd sourcing for vehicular communications in hybrid networks, IEEE
Transactions on Intelligent Transportation systems, vol. 14, no. 2, pp. 837-846.
19. Wu, Q., Domingo-FERRER J., Gonzalez, U. (2010). Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communication,
IEEE Transactions on vehicular technology, vol.59, no. 2, pp. 559-573.
20. Lytrivis, P., Thomaidis, G., Tsogis, M., Ambitis, A. (2011). An advanced cooperative path prediction algorithm for safety applications in
vehicular networks, IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 3, pp. 669-679.
21. Javier, F., Ruiz, PM., Stojmenovic, I. (2012). Acknowledgment-based broadcast protocol for reliable and efficient data dissemination in
vehicular ad hoc networks, IEEE Transactions on Mobile Computing, vol.11, no.1, pp.33-46.
22. Jeong, J., Guo, S., Gu, Y., He, T., Du, DHC. (2011). Trajectory-based data forwarding for light-traffic vehicular ad hoc networks, IEEE
Transactions Parallel and Distributed Sytems, vol. 22, no. 5, pp. 743-756.
23. Xu, Q., Sengupta, R., Jiang, D., Chrysler, D. (2003). Design and analysis of highway safety communication protocol in 5.9 GHz Dedicated
Short Range Communication Spectrum, Proceedings of IEEE VTC, vol.57, no. 4, pp. 2451-2455.
24. Nekovee M. (2009). Epidemic algorithms for reliable and efficient information dissemination in vehicular ad hoc networks, IET Intelligent
Transportation System, vol. 3, no. 2, pp. 104-110.
25. Chu, Y-C., Huang, N-F. (2011). An efficient traffic information forwarding solution for vehicle safety communications on Highways,
IEEE Transactions on Intelligent Transportation Systems, vol 13, No 2, pp. 631-643.
26. Ros, FJ., Ruiz, PM. (2013). Minimum broadcasting structure for optimal data dissemination in vehicular networks, IEEE Transactions on
vehicular technology, vol. 62, no. 8, pp. 3964-3972.
27. Zhuang, Y., Pan, J., Luo, Y., Cai, L. (2011). Time and location- critical emergency message dissemination for vehicular ad hoc networks,
IEEE Journal on Selected Areas in Communications, vol. 29, no. 1, pp. 187-196.
28. Parameswari, P., Manikantan, M.,(2017). GEO - INTELLIGENCE SYSTEM: A Framework for Agricultural Improvements, International
Journal of Pure and Applied Mathematics, vol. 116, no.12, pp. 117-125.
Authors: W. Jai Singh,R.K. Kavitha
A Novel Method for Detection of Retinal Lesions Using Statistical Based Segmentation with
Paper Title:
Supervised Classifier
Abstract: Lesion from the retinal images are one among the main sources of visual deficiency. It impacts veins
in the light-sensitive tissue known as retina. Various kinds of marks in Diabetic Retinopathy (DR) will represent
the abnormalities in the retina. The automated lesion segmentation in retinal pictures is a vital task in computer-
aided detection systems. The research article proposes a computational framework for detection of lesion in retina
images. In the initial process, Gabor filtering technique is used to enhance the lesion regions. Second, the
45. segmentation of the suspicious region is based on expectation maximization bootstrap subgroup and mathematical
morphology. A hybrid feature set is selected from the suspicious region. Finally, a classification method is applied 198-200
to pin-point the lesions in the suspicious region. The projected technique has been evaluated on two public
databases: DRIVE and STARE. The experimental result shows the proficiency and viability of the proposed
strategy, and it can possibly be utilized to analyze DR clinically.

Keywords: Lesion, Diabetic Retinopathy, lesion, Segmentation, Feature extraction, Classification, Computer
aided detection.
References:
1. Lim, Registration of new blindness in Singapore for 1985–1995. Singapore Medical Journal. 39 (3), 1998, 104–106.
2. International Diabetes Federation, [Online] http://www.idf.org/wdd-index/.
3. Ramon Pires and Herbert F. Jelinek, Assessing the Need for Referral in Automatic Diabetic Retinopathy Detection, IEEE
Transactions on Biomedical Engineering, Vol. 60, 2013, pp 3391 – 3398.
4. H. Taylor, J. Xie, S. Fox, R. Dunn, A. Arnold, and J. Keeffe, “The prevalence and causes of vision loss in indigenous australians: The
national indigenous eye health survey,” Med. J. Aust., vol. 192, no. 6, pp. 312–318, 2010.
5. Liu, Beiji Zou, Jie, Wei Yue, Zailiang Chen, and Guoying , “A location-to-segmentation strategy for automatic exudatesegmentation in
colour retinal fundus images”, Computerized Medical Imaging and Graphics, Vol. 55 2017 78–86.
6. HeHuang and HeMa Automatic detection of neovascularization in retinal images using extreme learning machine, Neuro
computing, Vol 277, 2018, pp. 218-227.
7. UsmanAkram M, ShehzadKhalid, Anam Tariq, ShoabA.Khan and FarooqueAzam, “Detection and classification of retinal lesions for
grading of diabetic retinopathy”, Computers in Biology and Medicine 45(2014)161–171.
8. Efron. B, “Bootstrap methods: Another look at the Jacknife”, Annals of Statistics, Vol.7, No. 1, 1979, pp: 1-26.
9. Desire Sidibe and Ibrahim Sadek, Discrimination of retinal images containing bright lesions using sparse coded features and SVM, Vol.
62, 2015, pp. 1750184.
10. Singh, W. J., and Nagarajan, B. Automatic diagnosis of mammographic abnormalities based on hybrid features with learning
classifier. Computer methods in biomechanics and biomedical engineering, Vol 16, 2013, 758-767.
11. Walter, T., Klein, Massin, P., Erginay, A contribution of imageprocessing to the diagnosis of diabetic retinopathy-detection of exudates
in color fundus images of the human retina. IEEE Transaction on Medical Imaging, Vol 21, 1236–1243, 2002.
12. Qing, Beiji Zou, Jie Chen, Wei, Kejuan Yue, Zailiang and Guoying Zhao, “A location-to-segmentation strategy for automatic exudate
segmentation in colour retinal fundus images”, Computerized Medical Imaging and Graphics 55, 2017.
13. Jai Singh W, S. Devaarul and R.K. Kavitha, “Detection of Abnormalities in Color Fundus Images of Diabetic Retinopathy using
Bootstrap Segmentation with Learning Classifier”, International Journal of Pure and Applied Mathematics, Volume 116 No. 12 2017,
pp: 87-95.
Authors: K. Muthukumar, M. Suman Mohan
Paper Title: Hazard Operability Study (HAZOP) in a Fertiliser Plant
Abstract: Hazard Operability (HAZOP) study is especially valuable for recognizing shortcomings in
frameworks (existing or proposed) including the stream of materials, individuals or information, or various
occasions or exercises in an arranged grouping or the methodology controlling such a succession. The HAZOP
study was carried out in one of the fertiliser industries in India. The investigation was done for five unique tasks
having 17 hubs, unusual working conditions and bothersome exercises which may happen are recognized and
considered amid the examination utilizing suitable guide words like No, More, Less, As well as and so on. More
stream, more temperature, more weight and additionally in the hubs are having unfavourable impact and prompt
consideration is required. 101 reasons for deviation were distinguished. The causes are as given: disappointments
in the dimension estimation instrument, non direction of the siphon, execution of creation process physically,
erosion of the caustic way, obstruction of the passages, blemished check valves, mechanical issues of check
valves, spillage of the channels, and blending of water in the framework. 35.7 % of all dangers were inadmissible,
37% risky, 19.8 % satisfactory yet required re examination, and 7.5% worthy with no requirement for any
restorative activity. To keep any calamitous results, we prescribe to do HAZOP think about.

Keywords: HAZOP, Analysis, Guide words, Nodes, Abnormal, Consequences.

References:
1. IEC 61882:2001 Hazard and operability studies (HAZOP studies). Application guide.
2. Dunjo J, Fthenakis V, Vílchez JA, Arnaldos J. Hazard and operability (HAZOP) analysis. A literature review. J Hazard Mater 2010; 173
(1–3): 19-32.
3. Wang F, Gao J, Wang H. A new intelligent assistant system for HAZOP analysis of complex process plant. J Loss Prev Process Ind 2012;
25 (3): 636-642.
46. 4. Khan FI, Abbasi SA. Major accidents in process industries and an analysis of causes and consequences. J Loss Prev Process Ind 1999;
12(5): 361-78. 201-207
5. Johnson RW. Beyond-compliance uses of HAZOP/LOPA studies. J Loss Prev Process Ind 2010; 23 (6): 727-733.
6. Rossing NL, Lind M, Jensen N, Jorgensen S. A Goal Based HAZOP Assistant Original. COMP AID CH 2009; 26: 1129- 1134.
7. Kitajima T, Fuchino T, Shimada Y, Naka Y, Yuanjin L, Iuchi K, Kawamura K. A New Scheme for Management-of-Change Support
Based on HAZOP Log. COMP AID CH 2010; 28: 163- 168.
8. Preisig HA, Manenti F HAZOP - an automaton-inspired approach. COMP AID CH 2012; 30: 1242-1246.
9. Reza A, Christiansen E. A case study of a TFE explosion in a PTFE manufacturing facility. Process Saf Prog 2007; 26(1): 77- 82.
10. Kwamura K, Naka Y, Fuchino T, Aoyama A, Takagi N. Hazop support system and its use for operation. COMP AID CH 2008; 25: 1003-
1008.
11. Mata JL, Rodriguez M. HAZOP studies using a functional modeling framework COMP AID CH 2012; 30:1038-1042.
12. Labovsky J, Lassak P, Markos J, Jelemensky L. Design, optimization and safety analysis of a heterogeneous tubular reactor by using the
HAZOP methodology. COMP AID CH 2007; 24: 1241-1246.
13. Kletz TA. Hazop-past and future. Reliable Eng Sys Safety 1997; 55(3): 263-6.
14. Mearns K, Whitaker S, Flin R. Benchmarking safety climate in hazardous environments: a longitudinal, inter-organizational approach.
Risk Anal 2001; 21(4): 771–786.
15. Jeerawongsuntorn C, Sainyamsatit N, Srinophakun T. Integration of safety instrumented system with automated HAZOP analysis: An
application for continuous biodiesel production. J Loss Prev Process Ind 2011; 24 (4): 412-419.
16. 16.Shirazeh Arghami, Sedigheh Abbasi, Shakiba Bakhtom ,Mansour Ziaei 2014 “Comparing of HAZOP and ETBA Techniques in
Safety Risk Assessment at Gasoline Refinery Industry” by African Journal of Basic & Applied Sciences 6 (1): 01-05, 2014. 17.
Siddiquia N.A., Abhishek Nandana, Madhuben Sharmaa and Abhinav Srivastavaa, , “Risk Management Techniques HAZOP & HAZID
Study” International Journal On Occupational Health & Safety, Fire & Environment – Allied Science-Vol. 1 Issue 1 July-Sept,2014 (005-
008).
17. 18. Dennis P, Nolan PE. Application of HAZOP and What-If Safety Reviews to the Petroleum, Petrochemical and Chemical Industries.
1st ed. Noyes Publications. USA, 1994: pp. 67-84.
18. 19. Earthy JV. Hazard and operability study as an approach to software safety assessment. Hazard Anal. 1992; 9(5): 50-9.
19. 20. Fencott C, Hebbron BD. The application of HAZOP studies to integrated requirements models for control systems. ISA Trans. 1995;
34(3): 297-308.
20. 21. Redmill F, Chudleigh MF, Catmur JR. Principles underlying a guideline for applying HAZOP to programmable electronic systems.
Reliab Eng Sys Safety.1997; 55(3): 283-93.
21. 22. Muhlbauer WK. Pipeline Risk Management Manual: Ideas, Techniques, and Resources. Gulf Professional Publishing. 2004; pp. 29-
36.
22. 23.Selva Kumar V and Ramanathan L “Generalized Hazop Analysis for Process Plant” International Journal for Scientific research and
development Volume : 3, Issue : 1 2015.

Authors: M.C.S. Geetha, K. Divya Sri


Paper Title: A Study on Traffic Analyses in Social Media Network of Twitter through Data Mining Techniques
Abstract: Social media helps to share the data around the globe. In this world, data is shared everywhere with
the advent of social media, so that people from one place can share the data and their comments to others. Social
Media provides comfortable way for sharing one information out of their interests. It can be used to contact their
friends as well as making more friends and also search person with same kind of ideas and interests. It is very
useful for any disasters occurred. At the time of tragedies social media paves a way for finding them and assist
them. However sharing of the information in the social media like twitter, the traffic problem might be occurred
due to heavy traffic. The social media user wants a minimum traffic to transmit the data without gap. In order to
overcome this problem, this paper helps to study the comparison of various data mining techniques for smooth
transfer of data.

Keywords: Social Media Twitter, Data Mining technique, content sharing and traffic analyses.

References:
1. . De Choudhury, Y.-R. Lin, H. Sundaram, K. S. Candan, L. Xie, and A. Kelliher. How does the data sampling strategy impact the
discovery of information di_usion in social media? In Proceedings of the 4th International AAAI Conference on Weblogs and Social
Media, pages 34{41, 2010.
2. A. Go, L. Huang, and R. Bhayani. Twitter sentiment classification using distant supervision. In CS224N Project Report, Stanford, 2009.
3. Harshita Rajwani, “Dynamic Traffic Analyzer Using Twitter”
4. Maximilian Walther and Michael Kaisser, ”Geo-spatial Event Detection in the Twitter Stream”, P. Serdyukov et al. (Eds.): ECIR 2013,
47. LNCS 7814, pp. 356367, 2013.cS pringer VerlagBerlinHeidelberg 2013.
5. Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, “Tag, You Can See It! Using Tags for Access Control in Photo Sharing”,
208-211
Conference on Human Factors in Computing Systems, May 2012.
6. A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. Sable
Privacy Security, 2008.
7. Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, Elena Demidova , I Know What You Did Last Summer!:Privacy-Aware Image
Classification and Search , Proceedings of the 35th international ACM SIGIR conference on Research and development in information
retrieval, 2012
8. Anna Cinzia Squicciarini, “Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites”, IEEE Transactions On
Knowledge And Data Engineering, vol. 27, no. 1, January 2015.
9. Ms.B.Hema and Ms.S.Sivagami, “Survey on secure and time confined image sharing on websites”.
10. Anna C. Squicciarini, Mohamed Shehab, Federica Paci “Collective Privacy Management in Social Networks”.
11. Sangeetha. J 1, Kavitha, “An Improved Privacy Policy Inference over the Socially Shared Images with Automated Annotation Process”.
12. Neha Mehta, Mamta Kathuria, Mahesh Singh, “Comparison of Conventional & Fuzzy Clustering Techniques: A Survey”.
13. Vikram Singh and Balwinder Saini “An Effective Tokenization Algorithm for Information Retrieval System” CS & IT-CSCP 2014
14. Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo,” Earthquake Shakes Twitter Users: Real-time Event Detection by Social Sensors”,
2010.
15. H. Takemura and K. Tajima, “Tweet classification based on their lifetime duration,” in Proc. 21st ACM Int. CIKM, Shanghai, China,
2012,pp. 2367–2370.
16. M.C.S.Geetha, I.Elizabeth Shanthi, “A Survey and Analysis on Regression Data Mining Techniques in Agriculture”, International
Journal of pure and applied mathematics, Volume 118 No. 8 Feb 2018, pg no. 341-347 ISSN: 1311-8080 (print) ISSN: 1314-3395
(online).
17. Parameswari, P., Manikantan, M.,(2017). GEO - INTELLIGENCE SYSTEM: A Framework for Agricultural Improvements,
International Journal of Pure and Applied Mathematics, vol. 116, no.12, pp. 117-125.
18. Ratan Mishra and Anant Jaiswal, “Ant colony Optimization: A Solution of Load balancing in Cloud”,in International Journal of Web &
Semantic Technology (IJWesT), Vol.3, No.2, pp. 33-50, 2012.
Authors: Ramalatha Marimuthu, Navaneethakrishnan R , Alagu Meenakshi, Uma Maheswari S
Paper Title: Catch Them Young: Importance of Career Planning in Indian School Education Systems
Abstract: Higher Education Systems receive a lot of attention from the researchers on identifying good teaching
practices in higher education to make it student attractive since it is the nearest point of education towards career
and early life education is often ignored. But the primary factor in the choice of higher education in India is the
current popularity of the stream (on the basis of the mass and media opinion) and not the aspiration and interest of
the students. The lack of systematic student profiling to understand their strengths and encourage them in the
correct career path is the major drawback of the Indian School Education System. This paper provides a
framework for the steps to be followed to introduce life career planning education in schools and the various
factors to be considered while profiling the students.
48.
Keywords: student profiling, SWOT analysis, school education, career and life planning 212-216

References:
1. https://timesofindia.indiatimes.com/home/education/ news/ 60-of-engineering- graduates- unemployed/ articleshow/ 57698133. Cms
2. https://www.gnu.org/education/edu-system-india.en.html
3. Arjit Ghosh, Rittika Chanda Parruk, Sasha Sheppard, " Indian School Education System An Overview", The British Council, India,
2014.
4. Kamlesh Gakhar, Harjeet Kour, "Scenario Of Present Education System: A Comparative Study Of Haryana And Its Neighbouring
States", International Journal of Social Science & Interdisciplinary
5. Research Vol.1 Issue 8, August 2012
6. Gretchen Rhines Cheney, Betsy Brown Ruzzi and Karthik Muralidharan, "A Profile of the Indian Education System", National Center
on Education and the Economy, 2006
7. Gautam, Mohan & Singh, Sunny & Fartyal, Gopal & Tiwari, Ankit & Singh Arya, Kuldeep. (2016). Education System in Modern India.
International Journal of Scientific Research And Education. 10.18535/ijsre/v4i01.16.
8. Urvashi Sahni, "Primary Education in India:Progress and Challenges" Brookings Report, January 2015
9. Akash A.R., Ramalatha Marimuthu, Navaneethakrishnan R, Kanagaraj S, "Cultural factors impacting the Global Energy transition- a
review, International Conference on Renewable Energies, Power Systems and Green Inclusive Economy, 23-24, April 2018, Casablanca,
Morocco.
10. Dr.V.Mohana Sundaram, SWOT analysis of Indian Higher Education, ECONSPEAK, A Journal Of Advances In Management, IT and
Social Sciences, Volume 1, Issue 3 (September, 2011)
11. Guide on Life Planning Education and Career Guidance for Secondary Schools, Career Guidance Section, School Development
Division, Education Bureau, (May 2014)
12. Ramalatha Marimuthu, S.Sathyavathi, “Impact of service learning and social immersion on education and career building of young
Indian Engin eering graduates – A case study”, IEEE International Women in Engineering Conference on Electrical, Electronics and
Com[puter Engineering, Pune December 2016.
Authors: N. Jayakanthan, M. Manikantan, R. Rassika
Paper Title: An Investigation of Quality Enhancement in Online Shopping and Inventory Maintenance
Abstract: Online shopping is the culture of current e-commerce scenario. It provides lot of choices and
opportunities. Every day million of transactions are performed and billion dollars are traded. But the major
drawback of online shopping system is latency in order fulfillment and inventory management. There is a
imperative for a system to address the time efficiency of the above process. To improve the performance of online
commerce here with we propose a model called “ShoppyDo”. The Bee colony optimization modes performs stock
clustering. The Pathrouter, a greedy algorithm is used to optimize the short path to improves the efficiency. The
proposed model address the latency issues in order fulfillment

Keywords: E-Commerce, Efficiency, ACO algorithm, Resource allocation

References:
49. 1. Abdul Gaffar Khan, ”Electronic Commerce: A Study on Benefits and Challenges in an Emerging E-conomy”,Golobal Journal of
Management and Business Research, Vol. 6, Issue.1, 2016.
2. Babar Alam Iqbal,”E-Commerce Vs Mobile Commerce” 217-219
3. International Journal of Applied Research Vol.2, 2013,pp.02-24.
4. Cecil Eng Huang Chua, “The evaluation of E-commerce research A Stake holders perspective”, Journal of Electronic Commerce
Research, Vol 6, No.4, 2005.
5. Rajneesh Shahjee, “The Impact of Electronic Commerce on Business Organization “, Scholarly Research Journal on Inter disciplinary
studies, Vol.4, Issue.27, 2006.
6. Irene Bertschek, “The Adoption of Business to Business E-Commerce: Emperical Evidance for German Companies “, Discussion
Paper, pp.1-25.
7. Diyan Ivanov, The impact of e-commerce on small-size companies in Sweden, June 2012.
8. Shaji Thomas, “Recent Trends in E-Commerce”, International Research Journal of Engineering and Technology, Vol.6, Issue.6,2015.
9. N.Jayakanthan, M.Manikantan and R.Viveak, The enhanced learning model to improve the quality
10. of Eshopping and stock management“,International Journal of Pure and Applied Mathematics, Vol. 115, No. 2, 2018, pp. 837-841.
11. [9] N.Jayakanthan and A.V.Ramani, Graph based Classifier
12. to Detect Malicious URLs, International Journal of
13. Mechanical and Production Engineering Research and
14. Development Vol.7, Issue.5, pp. 223-234, 2017.
Authors: Amala Jayanthi.M, Lakshmana Kumar.R, HariPriya.K.P
Paper Title: Influence of Students’ Personality Traits on Learning Style
Abstract: Students are the soul of Academics. The Goal of the education is students centric. The Motto of the
education is to groom the students’ knowledge, skillsets and behavior under well-trained academician supervision
in academics. Bloom’s theory on learning activity states, as the learning progress, a person’s not only grows in
his/her knowledge and mental skills (i.e. Cognitive) but also in his/her emotions (i.e. Affective). Educational Data
Mining is one of the budding research area in educational sector. It helps to enhance the standard of the academic
system by understanding the educational method and their involvement within the higher manner. Personality is a
blend of an individual emotional, Attitudinal, Behavioral responses. Personality is an intrinsic influence of
emotions. As personality preferred learning style also an influence of attitude/behavior. This research is to study
the influence of the personality trait of students on their Learning Style. The personality is of the students is
evaluated using Eysenck Personality Inventory. The Learning form of the students is decided by the Honey and
Mumford Learning Inventory. This paper finds out the impact of personality on the Learning style preferences of
the students in their learning process by employing the supervised and unsupervised techniques on the students’
50. dataset. Navies Bayes Classification and K-Means clustering is utilized to classify the learners under their
Learning and Personality classes. The study determines the existence of positive association between the students’ 220-223
Personality and Learning Style through descriptive and predictive modelling using mapping or function. This
investigation allows the teaching community to understand students’ Personality and Learning Style in the learning
environment provide education with appropriate teaching style.

Keywords: Navies Bayes Classification, K-Means Clustering, Bloom’s Taxonomy, Affective Domain, Eysenck
Personality Inventory, Personality Types, Honey and Mumford Learning Styles and Inventory.

References:
1. Hans Jürgen Eysenck&Sybil B. G. Eysenck (1975). Manual of the Eysenck Personality Questionnaire. London: Hodder and Stoughton
2. Sybil B. G. Eysenck, Hans Jürgen Eysenck& Paul Barrett (1985).Arevised version of the Introvert scale". Personality and Individua
Differences6 (1): 21–29. DOI:10.1016/0191-8869(85)90026-1.
3. Brown, D. H. (2000). Principles of language learning & teaching. (4th New York: Longman. (pp. 142-152)
4. Relations Between Affect and Personality: Support for the Affect-Level and Affective-Reactivity Views. JamesJ. Gross, Steven K. Sutton
andTimothy Ketelaar
5. A study on the relationship between extroversion-introversion and risk-taking in the context of second language acquisition, Zafar Shahila,
Meenakshi, K.International Journal of Research Studies in Language Learning 2012 January, Volume 1 Number 1, 33-40
6. Khalian,M.,Borounjeni,F.Z.,Mustapa,N.,Sulaiman,M.N. : k-Means Divide and Conquer Clustering . In : International Conference on
Computer and Automation Engineering, PP.306-309.IEEE Computer Society , Los Alamitos (2009).
7. Choi, S.C., Hart, P.E., Stork, D.G,: Pattern Classification, 2nd edn.John . Wiley& sons Inc., Chichester (2000).
8. Wu.X. Kumar, V., Quinlan. J.R., Ghosh. J., Yang. Q., Motoda.H. McLachalan, G.J., Ng, A., Liu B., Yu P.S., Yu, P.S., Zhou, Z,-h.,
Steinbach, M., Hand, D.J., Steinberg. D.: Top 10 Algorithms in Data mining Knowl.laf.Syst.14:!-37(2008)
9. Ayers, E., Nurgent,R., Dean , N.: Skill Set Profile Clustering Based on Student Capability Vectors Compute from Online Tutoring Data .In
: Baker,R.S.J.D.,Barnes.T., Beck,J.E.(eds) Proceedings of 1st International Conference on Educational Data Mining
,Montreal,Qubec,Canada,June 20-21,pp210-217(2008)
10. Pavik Jr., P.I., Cen , H., Wu, L., Koedinger, K.R.: Using Item-type Performance Covariance to Improve the skill Model of an Existing
Tutor . In: Proceedings 1 st International Conference on Educational Data mining, Canada, June 20-21.pp.77-86(2008)
11. Green, T.M., Jeong, D.H., Fisher. B.: Using Personality Factors to Predict Interface Learning Performance. In: 43 rd Hawaii International
Conference on System Sciences. IEEE Computer Society, Honolulu, HI, January 5-8, pp. 1-10. IEEE Computer Society, Los Alamitos
(2010)
12. Chiu, C .: Cluster Analysis for Cognitive Diagnosis : Theory and Applications . Ph.D.Dissertation, Educational Psychology, University of
Illinois at Urbana Champaign (2008)
13. Averse., Nugent , R., Dean ,N: A Comparison of student skill Knowledge Estimates Educational Data mining In: 2nd International
Conference on Educational Data mining, Cordoba ,Spain, July 1-3 ,pp.1-10(2009)
14. Nghe,N.T., Janecek,P., Haddawy.P: A Comparative Analysis of Techniques for predicting Academic Performance. Paper Presented at 37
th ASEE/IEEE Frontiers in Education Conference, Milwaukee,WI, October 10-13(2007)
15. Marshall.L, Austin, M.: The relationship between software skills and Subject specific Knowledge, Theory and Practice .Learning and
Teaching Projects.
16. L. Arockiam., S.Charles, V.Arul Kumar., P.Cijo. A Recommender System for Rural and urban Learners.Trends in Computer Science,
Engineering and Information TechnologyCommunications in Computer and Information Science, 2011, Volume 204, Part 1, 619-627,
DOI:10.1007/978-3-642-24043-0_63
17. Han.J., Kamber, M.: Data mining Concepts and Techniques, 2nd edn. Morgan Kaufmann Publishers. San Francisco (2006)
18. Gabriela-Alina Sauciuc , Categorization in the Affective Domain , In: Kokinov, B., Karmiloff-Smith, A., Nersessian, N. J. (eds.) European
Perspectives on Cognitive Scienc, New Bulgarian University Press, 2011 ISBN 978-954-535-660-5
19. Frijda, N. H. (1986). The emotions. New York:Cambridge University Press.
20. Weiner, B., & Graham, S. (1984). An attributional approach to emotional development. In C. E. Izard, J. Kagan, & R. B. Zajonc (Eds.),
Emotions, cognition,and behavior. New York: Cambridge University Press.
21. 1norazlina Khamis ,Sufian Idris “Issues and Solutions in Assessing Object-oriented programming Skills in the Core Education of
Computer Science and Information Technology”, 12th WSEAS International Conference on COMPUTERS, Heraklion, Greece, July 23-
25, 2008.
22. Xindong Wu · Vipin Kumar · J. Ross Quinlan · Joydeep Ghosh Qiang Yang · Hiroshi Motoda · Geoffrey J. McLachlan · Angus Ng Bing
Liu Philip S. Yu · Zhi-Hua Zhou · Michael Steinbach · David J. Hand · Dan
23. Steinberg, “Top 10 algorithms in data mining”, Springer-Verlag London Limited, Knowl Inf Syst 14:1–37, 2008.
24. Ayers, E, Nugent, R, Dean, N. .Skill Set Profile Clustering Based on Student Capability Vectors Computed from Online Tutoring
Data..Educational Data Mining 2008: 1st International Conference on Educational Data Mining,Proceedings ,R.S.J.d. Baker, T. Barnes,
and J.E. Beck (Eds), Montreal, Quebec, Canada, June 20-21, pp.210-217, 2008
25. M. Ramaswami and R. Bhaskaran, “A Study on Feature Selection Techniques in Educational Data Mining, Journal of Computing,
Volume 1, Issue 1, December 2009.
26. Madjid Khalilian, Farsad Zamani Boroujeni, Norwati Mustapha, Md.Nasir Sulaiman, "K-Means Divide and Conquer Clustering,",
International Conference on Computer and Automation Engineering ,IEEE Computer Society, pp. 306-309, 2009.
27. Adrian Furnham"Personality and Learning Style – A Study of Three Instruments,"Person.individ.diff.Vol.13,No.4, pp. 429-438, 1992.
28. Kavitha, RK & Irfan Ahmed, MS 2015, ‘Knowledge sharing through pair programming in learning environments: An empirical study’,
Education and Information Technologies, Springer, US, vol. 20, no. 2, pp. 319-333.
29. Kavitha,R.K., Jalaja Jayalakshmi, V., Rassika, R., (2018). Collaborative learning in Computer Programming Courses using E-Learning
Environments. International Journal of Pure and Applied Mathematics, Volume 118 No. 8 2018, 183-189
30. Kavitha,R.K., Jalaja Jayalakshmi, V., Kaarthiekheyan, V., (2017). Adoption of Knowledge Management Framework in Academic Setting –
An Experimental Study Conducted for Capturing Student’s Learning in Computer Laboratories. International Journal of Pure and Applied
Mathematics, Volume (116) No. 12, pp. 77-85.
Authors: Amala Jayanthi.M, Lakshmana Kumar.R, HariPriya.K.P
Paper Title: Impact of Learning Style and Personality Traits on Students’ in Academics
Abstract: The objective of education exclusively aims on students. The goal of education said to be achieved
once the students’ knowledge, skill set and attitude is groomed under the efficient supervision of well-trained
educators. Benjamin Bloom’s theory on learning process, a person not only get groomed in his knowledge and
mental abilities (i.e. Cognitive) but also in his emotions (i.e. Affective).One’s personality is defined as the
unification of emotional, attitudinal, behavioral responses (i.e. Affective). Learning is the way toward getting new
data or capacity to fabricate data from definitely known data.Learning is influenced by the human behavior (i.e.
Affective).Human behavior is influenced by the living environment. Education aims to provide efficient and
peaceful environment to mold students’ personality and learning skills. Educational Data Mining is one of the
budding applications in educational sector. It helps to understand better the students’ learning activity and their
overall involvement in the activity. This allows the further improvement of the quality and the productivity of the
51. educational system. Eysenck Personality Inventory and Criterion Reference Model used to determine the
personality of the students. This exploration is to contemplate the impact of the Personality characteristics and 224-227
Learning Styles on the scholarly execution of the understudies as indicated by Bloom’s Theory. Eysenck
Personality Inventory and Criterion Reference Model used to decide the identity of the understudies. Supervised
and unsupervised techniques are used to analyze students’ dataset. Students are clustered based on the Personality,
Learning Style and Performance by employing Multi-Layer Perceptron and EM clustering Technique. Descriptive
and Predictive modelling is applied to determine the association between students’ Personality, Learning Styles
and Academic Performance using mapping or function. The study depicts the existence of positive correlation
between student’s Personality traits, Learning styles and Academic Performance. This research helps the educators
to understand students’ Behavioral, Attitudinal and Emotional Growth during the learning process as a Personality
and their learning ability. It helps the educators’ to provide appropriate training for improving their expertise in
academics accordingly.
Keywords: Multi-Layer Perceptron (MLP), Expectation Maximization (EM) clustering, Criterion Reference
Model, Bloom’s Taxonomy, Honey and Mumford’s Learning Questionnaire, Eysenck Personality Questionnaire,
Personality Types.

References:
1. Hans Jürgen Eysenck & Sybil B. G. Eysenck (1975). Manual of the Eysenck Personality Questionnaire. London: Hodder and Stoughton.
2. Sybil B. G. Eysenck, Hans Jürgen Eysenck & Paul Barrett (1985). "A revised version of the Introvert scale". Personality and Individual
Differences 6 (1): 21–29. DOI:10.1016/0191- 8869(85)90026-1.
3. Brown, D. H. (2000). Principles of language learning & teaching. (4th ed.). New York: Longman. (pp. 142-152)
4. Relations Between Affect and Personality: Support for the Affect-Level and Affective-Reactivity Views. James J. Gross, Steven K.Sutton
and Timothy Ketelaar
5. A study on the relationship between extroversion- introversion and risk-taking in the context of second language acquisition, Zafar
Shahila, Meenakshi, K. International Journal of Research Studies in Language Learning 2012 January, Volume 1 Number 1, 33-40
6. Choi, S.C., Hart, P.E., Stork, D.G,: Pattern Classification, 2nd edn.John . Wiley& sons Inc., Chichester (2000).
7. Wu.X. Kumar, V., Quinlan. J.R., Ghosh. J., Yang. Q., Motoda.H. McLachalan, G.J., Ng, A., Liu B., Yu P.S., Yu, P.S., Zhou, Z,-h.,
Steinbach, M., Hand, D.J., Steinberg. D.: Top 10 Algorithms in Data mining Knowl.laf.Syst.14:!-37(2008)
8. Ayers, E., Nurgent,R., Dean , N.: Skill Set Profile Clustering Based on Student Capability Vectors Compute from Online Tutoring Data .In
: Baker,R.S.J.D.,Barnes.T., Beck,J.E.(eds) Proceedings of 1st International Conference on Educational Data Mining
,Montreal,Qubec,Canada,June 20-21,pp210-217(2008)
9. Pavik Jr., P.I., Cen , H., Wu, L., Koedinger, K.R.: Using Item-type Performance Covariance to Improve the skill Model of an Existing
Tutor . In: Proceedings 1 st International Conference on Educational Data mining, Canada, June 20-21.pp.77-86(2008)
10. Green, T.M., Jeong, D.H., Fisher. B.: Using Personality Factors to Predict Interface Learning Performance. In: 43 rd Hawaii International
Conference on System Sciences. IEEE Computer Society, Honolulu, HI, January 5-8, pp. 1-10. IEEE Computer Society, Los Alamitos
(2010)
11. Chiu, C .: Cluster Analysis for Cognitive Diagnosis : Theory and Applications . Ph.D.Dissertation, Educational Psychology, University of
Illinois at Urbana Champaign (2008)
12. Averse., Nugent , R., Dean ,N: A Comparison of student skill Knowledge Estimates Educational Data mining In: 2nd International
Conference on Educational Data mining, Cordoba ,Spain, July 1-3 ,pp.1-10(2009)
13. Nghe,N.T., Janecek,P., Haddawy.P: A Comparative Analysis of Techniques for predicting Academic Performance. Paper Presented at 37
th ASEE/IEEE Frontiers in Education Conference, Milwaukee,WI, October 10-13(2007)
14. Marshall.L, Austin, M.: The relationship between software skills and Subject specific Knowledge, Theory and Practice .Learning and
Teaching Projects.
15. L. Arockiam., S.Charles, V.Arul Kumar., P.Cijo. A Recommender System for Rural and urban Learners. Trends in Computer Science,
Engineering and Information Technology Communications in Computer and Information Science, 2011, Volume 204, Part 1, 619-627,
DOI:10.1007/978-3-642-24043-0_63
16. Han.J., Kamber, M.: Data mining Concepts and Techniques, 2nd edn. Morgan Kaufmann Publishers. San Francisco (2006)
17. Gabriela-Alina Sauciuc , Categorization in the Affective Domain , In: Kokinov, B., Karmiloff-Smith, A., Nersessian, N. J. (eds.) European
Perspectives on Cognitive Scienc, New Bulgarian University Press, 2011 ISBN 978-954-535-660-5
18. Frijda, N. H. (1986). The emotions. New York: Cambridge University Press.
19. Weiner, B., & Graham, S. (1984). An attributional approach to emotional development. In C. E. Izard, J. Kagan, & R. B. Zajonc (Eds.),
Emotions, cognition, and behavior. New York: Cambridge University Press.
20. 1norazlina Khamis ,Sufian Idris “Issues and Solutions in Assessing Object-oriented programming Skills in the Core Education of
Computer Science and Information Technology”, 12th WSEAS International Conference on COMPUTERS, Heraklion, Greece, July 23-
25, 2008.
21. Xindong Wu · Vipin Kumar · J. Ross Quinlan · Joydeep Ghosh Qiang Yang · Hiroshi Motoda · Geoffrey J. McLachlan · Angus Ng Bing
Liu Philip S. Yu · Zhi-Hua Zhou · Michael Steinbach · David J. Hand · Dan
22. Steinberg, “Top 10 algorithms in data mining”, Springer-Verlag London
23. Limited, Knowl Inf Syst 14:1–37, 2008.
24. Ayers, E, Nugent, R, Dean, N. .Skill Set Profile Clustering Based on Student Capability Vectors Computed from Online Tutoring
Data..Educational Data Mining 2008: 1st International Conference on Educational Data Mining,Proceedings ,R.S.J.d. Baker, T. Barnes,
and J.E. Beck (Eds), Montreal, Quebec, Canada, June 20-21, pp.210-217, 2008
25. M. Ramaswami and R. Bhaskaran, “A Study on Feature Selection Techniques in Educational Data Mining, Journal of Computing,
Volume 1, Issue 1, December 2009.
26. Madjid Khalilian, Farsad Zamani Boroujeni, Norwati Mustapha, Md.Nasir Sulaiman, "K-Means Divide and Conquer Clustering,",
International Conference on Computer and Automation Engineering ,IEEE Computer Society, pp. 306-309, 2009.
27. R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
28. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,”
IEEE Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
29. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
30. Adrian Furnham"Personality and Learning Style – A Study of Three Instruments,"Person.individ.diff.Vol.13,No.4, pp. 429-438, 1992.
31. Kavitha, RK & Irfan Ahmed, MS 2015, ‘Knowledge sharing through pair programming in learning environments: An empirical study’,
Education and Information Technologies, Springer, US, vol. 20, no. 2, pp. 319-333.
32. Kavitha,R.K., Jalaja Jayalakshmi, V., Rassika, R., (2018). Collaborative learning in Computer Programming Courses using E-Learning
Environments. International Journal of Pure and Applied Mathematics, Volume 118 No. 8 2018, 183-189
33. Kavitha,R.K., Jalaja Jayalakshmi, V., Kaarthiekheyan, V., (2017). Adoption of Knowledge Management Framework in Academic Setting –
An Experimental Study Conducted for Capturing Student’s Learning in Computer Laboratories. International Journal of Pure and
Applied Mathematics, Volume (116) No. 12, pp. 77-85.
Authors: T.Anand, P.Sachin Prabhu,
Improvement of Project Performance by Constraint Analysis and Root Cause Analysis of Last
Paper Title:
Planner System
Abstract: An effective planning is required to overcome cost over-run and time over-run problems in
construction which could be achieved with the help of lean concept. The aim of lean is to maximize the value, in
other words minimizing the wastes. Last Planner System(LPS) is one such lean concept developed in order to
52. improve the project performance by reducing the inefficiencies faced in construction project.The objective of this
paper to present the results obtained from implementing the Last Planner System in the construction of an 228-230
apartment project. A list of constraints have been found out during constraint analysis and various remedial
measures have been suggested for look ahead planning. Based on number of occurrences of constraints, root
cause analysis was done to determine the causes for variation in Percentage of Plan Completed(PPC). The
effectiveness and reliability of the project was found to be increased about 75% after implementation of Last
Planner System(LPS). A list of success factors and barriers for improvement of project performance have also
been listed.

Keywords: Last Planner System, Look ahead planning, Constraint analysis, Root cause analysis, Percentage
of plan completed.

References:
1 Yong Woo Kim-’Management Thinking in the Earned Value Method System and the Last Planner System’, pp 223-228, 2010.
2 DhananjaySubhashraoPatil, Amit Shankar Munje - ‘Comparative study of Last Planner System over Traditional Construction prcesses’,
ISSN: 2279- 0535, Volume: 3, Issue: 4 (June-July 2014).
3 A. Nieto-Morote and F. Ruz-Vila- ‘Last Planner Control System Applied to a Chemical Plant Construction’, Vol. 138, No. 2, February 1,
2012.
4 Brad W. Wambeke, M.ASCE, Min Liu, M.ASCE and Simon M. Hsiang – ‘Using Last Planner and a Risk Assessment Matrix to Reduce
Variation in Mechanical Related Construction Tasks’, Vol. 138, No.4, pp 491–498,2012.
5 Jose L. Fernandez-Solis, Ph.D., Vishal Porwal, SarelLavy, Ph.D., M.ASCE, Ali Shafaat, Zofia K. Rybkowski, Ph.D. Kiyoung Son, Ph.D.
and Nishi Lago(2013) – ‘Survey of Motivations, Benefits, and Implementation Challenges of Last Planner System Users’, Vol. 139, No.
4, pp 354-360April 1, 2013.
6 RemonFayek Aziz, Sherif Mohamed Hafez – ‘Applying lean thinking in construction and performance improvement’, pp 679-695, May
27, 2013.
7 UsamaHamedIssa – ‘Implementation of lean construction techniques for minimizing the risks effect on project construction time’, pp
697-704, 2013.
8 Anand T – ‘Implementing challenges of extended producer responsibility’, pp-1188-1194, August 2017.
9 Anita S – ‘Integrated Panchayat Response system using open source GIS’, pp 273-278, August 2017.
Authors: J.Premlatha, G.L.Sathyamoorthy, S.Anita,
Paper Title: Utilization of Plastic Waste and Foundry Waste in Flexible Pavements
Abstract: The materials used for pavement is bitumen, coarse aggregate, fine aggregate and soil, concerned
about this throughout the globe research works are under progress to find alternative materials for pavement
construction and obviously the plastic waste from municipal solid waste and foundry sand from industrial waste
materials are one such category. Plastic is a toxic and persistent material. The municipal solid waste which is a
major environmental threat contains about 16 to 25% of plastic. Another environmental threat is foundry sand
which is the waste product from casting industries.The foundry sand can be used in various engineering
applications. This will solve the depletion of regular use materials and also disposal of foundry waste. There is a
need for bulk use of plastic waste from municipal solid waste and foundry sand from foundry industrial wastes in
our country. This paper elaborates about the materials and its suitability for flexible pavement construction that is
economically feasible. Industrial waste replaced from cumulative weight of aggregate to understand the load
carrying capacity of the flexible pavement

Keywords: plastic waste, foundry sand, bitumen

53. References:
1. “Use of recycled plastic in concrete: a review”R Siddique, J Khatib, I Kaur - Waste management, 2008 - Elsevier
2. “Emerging road materials and innovative applications”A Goel, A Das - National conference on materials 2004 - researchgate.net 231-233
3. “Using foundry sand in green infrastructure construction” SL Bradshaw, CH Benson, EH Olenbush on the State of the Art , 2010 -
ascelibrary.org
4. “Geotechnical performance of highway embankment constructed using waste foundry sand”P Fox, D Mast - Joint Transportation
Research Program, 1998 - docs.lib.purdue.edu
5. “Use of waste polyethylene in bituminous concrete mixes” B Prusty - 2012 - ethesis.nitrkl.ac.in
6. “Utilization of Waste Foundry Sand (WFS) as Impermeable Layer (Drainage Blanket) for Pavement Structures” P Solmaz, AG Gedik, -
Advances in Transportation Engineering 2008 - books.google.com
7. “Partial replacement of waste foundry sand and recycled aggregate in concrete”-SaritaChandrakanth and Asst.Prof. Ajay.A.Hamane-
IJMTER-2016
8. https://avestia.com/ICCSTE2016_Proceedings/files/paper/138.pdf
9. https://www.aboutcivil.org/marshall-stability-test-astm-d6927-06-standard.html
10. “Experimental study on bitumen mix using geo fabric increasing the california bearing ratio of flexible pavement”-Dhavashankaran D1
Harikannan S2-Technical Research organization
11. “Use of Waste Plastic in Flexible Pavements-Green Roads”-YashMenaria, RupalSankhla-Centre for Environmental Planning &
Technology, Ahmedabad, India
12. “An Experimental Study On Behavier Of Modified Bitumen Using Recycled Plant” Dr.A.Gandhimathi , S.Abinaya, International
Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 8, August 2017
13. “Use of polyethylene terephthalate in concrete-A brief review” A.Vishnu, V.Ponmalar, International Journal of Civil Engineering and
Technology (IJCIET) Volume 8, Issue 7, July 2017
Authors: G.L.Sathyamoorthy
Substrate removal kinetics for Anaerobic Hybrid Reactor (AHR) treating Dairy industrial
Paper Title:
wastewater
Abstract: Anaerobic Hybrid Reactor (AHR) is one of the most commonly used high rate reactors for treating
the domestic and industrial wastewater which offers the advantages of Up flow Anaerobic Sludge Blanket Reactor
(UASBR) and Up flow Anaerobic Filter Reactor (UAFR) in a single reactor. In the present study determination of
54. kinetic constants of the AHR was aimed by conducting experimental studies on a laboratory scale Anaerobic
Hybrid Reactor(AHR) using different shapes of Poly Propylene Inter Media in the AHR and the dairy industrial
234-240
wastewater as substrate. The mathematical equations Grau second-order model and Stover Kincannon model were
found appropriate models for the design of Anaerobic Hybrid Reactors (AHRs).

Keywords: Anaerobic Hybrid Reactor (AHR), Kinetic Constants, Inert Media, Dairy Wastewater, Organic
Loading Rate (OLR), Substrate
References:
1. Banu J.R et al, “Treatment of domestic waste water using upflow anaerobic sludge blanket reactor”, International Journal of
Environmental Science and technology(4)3,pp363-370,(2007)
2. Hichey.R.F et al, “Startup operation monitoring and control of high rate anaerobic treatment systems”, Water Science
Technology(24),pp207-255,(1991)
3. Hu Hong-Ying et al, “Effects of adding inert spheres into the filter bed on the performance of biofilters for gaseous toluene removal”,
Biochemical engineering journal (23),pp123-130,(2005)
4. Javala.H.N et al, “Treatment of dairy waste water using an up flow anaerobic sludge blanket reactor”, Journal of Agricultural Engineering
Research(73),pp59-63,(1999)5.
5. Najafpour G.D et al, “Biological Treatment of Dairy waste water in an up flow Anaerobic Sludge-Fixed Film bioreactor,American-
Eurusian J.Agric.& Environ,Sci 4(2),pp251-257,(2008)
6. Nurdan Bủyủkkamaci,Ayse Filibeli “Determination of kinetic constants of an anaerobic hybrid reactor”,Process Biochemistry 38,pp73-
79(2002)
7. Nurdan Bủyủkkamaci,Ayse Filibeli,”Concentrated Waste water treatment studies using an anaerobic hybrid Reactor”, Process
Biochemistry,38,pp771-775 (2002)
8. Standard Methods for the Examination of Water and Wastewater. 18 th edn. American Public Health Association (APHA)/American Water
Works Association/Water Pollution Control Federation, Washington DC, USA. (1992)
9. G.L.Sathyamoorthy”A Novel Approach to Sago Industrial Wastewater using Anaerobic Hybrid Reactor (AHR) International Journal of
Civil Engineering and Technology, 8(7), 2017, pp1229–1238, ISSN No: 0976-6316 (2017)
10. Thanikal J.V., Torrijos M., Habouzit F., Moletta R. “Treatment of distillery vinasse in a high rate anaerobic reactor using low-density
polyethylene supports”. Water Sci. Tech, 56(2), pp17–24. (2007)
11. Wilson F.et al “Influence of media-packing ratio on performance of anaerobic hybrid reactor”,Biosource Technology,71,pp151-
157,(2000)
Authors: Bhavna Bharath, Suganthi N
Paper Title: A Comprehensive Survey of Multimodal Image Fusion Schemes
Abstract: Multimodal images are scenes with anatomy details that are captured using two different devices.
Different imaging techniques give complementary details about what is visualized. Infrared and visual images are
examples of multimodal images that are fused together in order to obtain a single comprehensive fused image.
Combining multimodal images yield enhanced features for image analysis, feature extraction and detection.
Infrared and Visual image fusion will fuse the source images into single extensive image to raise image quality
.This will in turn decrease the redundancy in image data. This is broadly used in different applications to improve
the perception of the scene. The reliability, accuracy and complementary details of the scene in the resultant fused
image makes these approaches be used in multiple areas. Recently, many fusion methods have been formulated
due to the sprouting demands & advancement of image depiction schemes. However, a unified survey paper about
this field has not been published in a few years. Consequently, we make a survey report to record the methodical
advancements of visual and infrared image fusion. In this paper, firstly the overview of applications of IR and VI
image fusion is represented. Secondly, we present the existing state of the art fusion techniques. Finally, image
quality metrics are discussed to measure the efficiency of the fusion algorithm. Although, this survey halts with
various fusion methods that have been proposed earlier there is still room for improvement in research in the field
of multimodal image fusion.

Keywords: Multimodal, Image Analysis, Image Fusion.

References:
1. Zhang Bahua, Zhao Ying ," A fusion algorithm for infrared and visual based saliency analysis and non-sub sampled shearlet transform",
Infrared Phys. Tech. 73(2015).
2. Zhadong Liu, Yi Chai , "A novel fusion scheme for visual and infrared images based on compressive sensing", Optics Comm. 335(2015).
55. 3. Xudong Kang, Haitao Yin , "Pixel level image fusion: a survey of the state of the art", Information fusion 33(2017).
4. Huajun Feng, Qi Li "Detailed preserved fusion of visible and infrared images using regional saliency extraction and multiscale image 241-246
decomposition", Optical Comm 341(2015).
5. Xinan Fan, Min Li ,"A thermal infrared and visible image fusion based approach for multitarget detection under complex environment",
Math. Problem Engg(2015).
6. Bhatnagar, Liu, "A novel image fusion framework for night-vision navigation and surveillance.9(2015).
7. Alex James, Belur ,"Medical image fusion: a survey of the state of the art", Inform. fusion 19(2014).
8. Amanda Muler, Narayan," Cognitively engineered multisensor image fusion for military applications,Inform, fusion 10(2009).
9. X.Zhang, L.Yuan, "Infrared target detection and location for visual surveillance using fusion scheme of visible and infrared images", Math
problems engg .3(2013).
10. Tarek, Nizar, "Finite asymmetric generalized gaussian mixture models learning for infrared object detection", Comp.Vis.Image
Underst.117(2013).
11. V.Alcanatis, T.Burks, "Image fusion of visible and thermal images for fruit detection",Biosys.Eng.103(2009).
12. C.Homa, W.Arnold, "Fusion of visual and infrared thermography images for advanced assessment in non destructive testing",Rev.Sci.Inst
84(2013).
13. [.Gonzalez, Z.Fang, "Pedestriam detection at day/night time with visible and FIR cameras: a comparison", Sensors 16(2016).
14. D.Dixon, J.Lewis, "Task based scan path assessment of multisensor video fusion in complex scenarios",Inform .fusion.11(2010).
15. Mohammad Talha, Rustam Stokin, "Particle filter tracking of camouflaged targets by adaptive fusion of thermal and visible spectra camera
data",IEEE sensors.14(2014).
16. Seong Kong, Jing Heo, "Recent advances in visual and infrared face recognition-a review",Comput.Vis.Image Underst.97(2005).
17. George Bebi, Aglika Gyaourov ," Face recognition by fusing thermal infrared and visible imagery",Image Vis.Comput.24(2006).
18. Hermosilla, G.Faras, "Fusion of visible and thermal descriptors using GA for face recognition", Sensors 15(2015).
19. [R.Ragavendran , Ashok Rao," Pso based fusion of near infrared and visible images for improved face verification",Pattern regn.44(2011).
20. Buzha Wuuile, Yilng Yang,"Direct fusion of geostationary meteorological satellite visible and infrared images based on thermal physical
properties",Sensors(2015).
21. F. Liu, L.Jiao, "Multi contourlet based adaptive fusion of infrared and visinle remote sensing images",IEEE geosci.Remote sensing Letters
7(2010).
22. X.U.Lang, D.J.L.Quing, "Visible and infrared video fusion using unifrom curvelt and saptio temporal informatiom(2015).
23. Fuyan Xu, Kan Ren,"Super resolution images fusion via compressed sensing and low rank matrix decomposition,Infrared tech.68(2015).
24. [Gema Piella ," A general framework for multi resolution image fusion from pixels to regions,"Inform fusion 4 (2003).
25. Y.Yan, J.Zhang,"Objective quality evaluation of visible and infrared color image fusion",Opt.Engg.50(2011).
26. Jinping Fan, Xiayoi Feng,"Fusion method for infrared and visible images by using non-negative sparse representation",Inf.
Phys.Tech.67(2014).
27. Qan Jiang, Rencan Nie ,Xin Jin,"A survey of infrared and visual image fusion methods",Infrared Phy Tech.85(2017).
28. L Latha, S Thangasamy," On improving the Performance of Multimodal biometric authentication through Ant colony optimization", Wseas
Transactions on Information Science and Applications, Issue 12, Volume 8, December 2011.
29. ]L Latha, M Pabitha, S Thangasamy," Effectual human authentication for critical security applications using retinal images", ICTACT
Journal on Image and Video Processing, 2010.
30. L Latha, S Thangasamy, "Providing multimodal biometric authentication using five competent traits" , The Imaging Science Journal, 2013.
31. L Latha, S Thangasamy ," Robust Way of Multimodal Biometric Score Normalization",Journal of Applied Security Research, 2012.
Authors: Nithya Roopa S., Prabhakaran M,Betty.P
Paper Title: Speech Emotion Recognition Using Deep Learning
Abstract: Emotion recognition is the part of speech recognition which is gaining more popularity and need for it
increases enormously. Although there are methods to recognize emotion using machine learning techniques, this
project attempts to use deep learning and image classification method to recognize emotion and classify the
emotion according to the speech signals. Various datasets are investigated and explored for training emotion
recognition model are explained in this paper. Some of the issues on database, existing methodologies are
addressed in the paper. Inception Net is used for emotion recognition with
the paper. Inception Net is used for emotion recognition with IEMOCAP datasets. Final accuracy of this emotion
recognition model using Inception Net v3 Model is 35%(~).

Keywords: speech recognition; emotion recognition; automatic speech recognition; deep learning; image
recognition; speechtechnology; signal processing; image classification

References:
1. S. Furui, T. Kikuchi, Y. Shinnaka, and C. Hori, “Speech-to-Text and Speech-to-Speech Summarization,” vol. 12, no. 4, pp. 401–408,
2004.
2. M. El Ayadi, M. S. Kamel, and F. Karray, “Survey on speech emotion recognition: Features, classification schemes, and databases,”
Pattern Recognit., vol. 44, no. 3, pp. 572–587, 2011.
3. Y. Lecun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, 2015.
56. 4. J. Schmidhuber, “Deep Learning in neural networks: An overview,” Neural Networks, vol. 61, pp. 85–117, 2015.
5. J. Ngiam, A. Khosla, M. Kim, J. Nam, H. Lee, and A. Y. Ng, “Multimodal Deep Learning,” Proc. 28th Int. Conf. Mach. Learn., pp. 689– 247-250
696, 2011.
6. F. Dipl and T. Vogt, “Real-time automatic emotion recognition from speech,” 2010.
7. S. Lugovic, I. Dunder, and M. Horvat, “Techniques and applications of emotion recognition in speech,” 2016 39th Int. Conv. Inf.
Commun. Technol. Electron. Microelectron. MIPRO 2016 - Proc., no. November 2017, pp. 1278–1283, 2016.
8. B. Schuller, G. Rigoll, and M. Lang, “Speech emotion recognition combining acoustic features and linguistic information in a hybrid
support vector machine - belief network architecture,” Acoust. Speech, Signal Process., vol. 1, pp. 577–580, 2004.
9. S. G. Koolagudi and S. R. Krothapalli, “Emotion recognition from speech using sub-syllabic and pitch synchronous spectral features,” Int.
J. Speech Technol., vol. 15, no. 4, pp. 495–511, 2012.
10. J. Rong, G. Li, and Y. P. P. Chen, “Acoustic feature selection for automatic emotion recognition from speech,” Inf. Process. Manag., vol.
45, no. 3, pp. 315–328, 2009.
11. F. Noroozi, N. Akrami, and G. Anbarjafari, “Speech-based emotion recognition and next reaction prediction,” 2017 25th Signal Process.
Commun. Appl. Conf. SIU 2017, no. 1, 2017.
12. Graves, A. Mohamed, and G. Hinton, “Speech Recognition with Deep Recurrent Neural Networks,” in 2013 IEEE International
Conference on Acoustics, Speech and Signal Processing, 2013, pp. 6645–6649.
13. C.-W. Huang and S. S. Narayanan, “Characterizing Types of Convolution in Deep Convolutional Recurrent Neural Networks for Robust
Speech Emotion Recognition,” pp. 1–19, 2017.
14. H. M. Fayek, M. Lech, and L. Cavedon, “Evaluating deep learning architectures for Speech Emotion Recognition,” Neural Networks, vol.
92, pp. 60–68, 2017.
15. M. Badshah, J. Ahmad, N. Rahim, and S. W. Baik, “Speech Emotion Recognition from Spectrograms with Deep Convolutional Neural
Network,” 2017 Int. Conf. Platf. Technol. Serv., pp. 1–5, 2017.
16. Busso et al., “IEMOCAP: Interactive emotional dyadic motion capture database,” Lang. Resour. Eval., vol. 42, no. 4, pp. 335–359, 2008.
17. C. Szegedy, V. Vanhoucke, J. Shlens, and Z. Wojna, “Rethinking the Inception Architecture for Computer Vision,” 2014.
Authors: T. Thulasimani
Application of Scheduling using Critical Path Method to Hydraulic Performance of Impeller for a
Paper Title:
Multistage Submersible Pump
Abstract: The present study is an application of scheduling using critical path method without any restriction in
resource. The study describes a full evaluation on hydraulic performance of impeller for a multistage submersible
pump. Based on the planning project duration for completion was fifty two weeks. However, the application of
critical path to the study resulted to thirty nine weeks, a difference of 13 weeks reduction.

57. Keywords: Critical path analysis, scheduling, hydraulic performance of impeller for a multistage submersible
pump.
251-253
References:
1. Christopher M (2000),” The agile supply chain: competing in volatile markets”.Industrial Marketing Management 29: 37-44.6
2. Kielmas M (2015),” History of the Critical Path Method”. Small Business Chron Com Demand Media.1
3. Gray CF, Larson EW., ”Project management: The managerial process”. Asia: McGraw-Hill; 2010.
4. Bricknell L., “Project planning: Part I. In: Oossthuizen T, Venter R, eds. Project management in perspective”. South Africa: Oxford
University Press; 2011.
5. Hadju M., “Network scheduling techniques for construction project management”. Netherlands: Netherlands Kluwer Academic
Publisher; 1997.
Authors: M. Mohankumar, M Anand Kumar, S.Aruna Devi, R.Suresh Kumar
58. Requirement Analysis Document in Google Drive for Green and Sustainable Software Engineering
Paper Title:
Approach
Abstract: This study shows how a requirement analysis can help to organizations become more
environmentally sustainable in a structured and efficient manner, for this we have analyzed the Google Drive
document as a requirement analysis document with the help of that document we try to cover the software
requirement specification from the customer, then we try to observe the if that document located in desktop pc
what is the cumulative processor energy, IA energy and GT energy, if that document shared with cloud
environment minimum and maximum communication of resource sharing details are analyzed for user base and
data center of various regions, finally the load event details are observed for the requirement document shared in
the Google drive , This result show that the technologies delivers specific suggestions for improvement both on
reducing the environmental foot print of ICT and on using ICT as a green solution for software requirement
analysis process.

Keywords: Green ICT, IA Energy, GT Energy, Google Drive, Software Requirement Specification

References:
1. R. Chitchyan et al., "Sustainability Design in Requirements Engineering: State of Practice," 2016 IEEE/ACM 38th International
Conference on Software Engineering Companion (ICSE-C), Austin, TX, 2016, pp. 533-542.
2. D. Mendez Fernandez, S. Wagner Naming the Pain in Requirements Engineering: Design of a Global Family of Surveys and First Results
from GermanyIn: Proc. of the 17th International Conference on Evaluation and Assessment in Software Engineering (EASE ’13), ACM,
2013.
3. S. Dhingra, Savithri G, M. Madan and Manjula R, "Selection of prioritization technique for software requirement using Fuzzy Logic and
Decision Tree," 2016 Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, 2016, pp. 1-11.
doi: 10.1109/GET.2016.7916822
4. Umma Khatuna Jannat ,” Green Software Engineering Adaption In Requirement Elicitation Process”2016 international journal of
scientific & technology research volume 5, issue 08, august 2016 issn 2277-8616
5. A. Hankel and P. Lago, "How organisations can assess and improve their green ICT activities in a standard and efficient way," 2016 ITU
Kaleidoscope: ICTs for a Sustainable World (ITU WT), Bangkok, 2016, pp. 1-6
6. Erik Jagroep” Extending software architecture views with an energy consumption perspective Computing, 2017, Volume 99, Number 6,
Page 553
7. Paul p.k,”Is green computing a social software engineering domain?”,2016 international journal of applied science and engineering 254-260
4(2).PP.67-73
8. Becker, Colin (2016) Requirements: The Key to Sustainability. IEEE Software, 33 (1). pp. 56-65. ISSN 07407459
9. C. C. Venters et al., "Characterising Sustainability Requirements: A New Species Red Herring or Just an Odd Fish?," 2017 IEEE/ACM
39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS), Buenos Aires, 2017, pp. 3-
12.
10. Vivek Shukla, Dhirendra Pandey and Raj Shree. Article: Requirements Engineering: A Survey. Communications on Applied
Electronics3(5):28-31, November 2015. Published by Foundation of Computer Science (FCS), NY, USA
11. C. Becker, D. Walker and C. McCord, "Intertemporal Choice: Decision Making and Time in Software Engineering," 2017 IEEE/ACM
10th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE), Buenos Aires, 2017, pp. 23-29
12. C. Marimuthu K. Chandrasekaran," Software Engineering Aspects of Green and Sustainable Software: A Systematic Mapping Study".
Proceedings of the 10th Innovations in Software Engineering Conference Jaipur, India 2017 PP[ 34-44]
13. Komeil raisian,” Current Challenges And Conceptual Model of Green And Sustainable Software Engineering,” Journal of Theoretical and
Applied Information Technology
31st December 2016 -- Vol. 94. No. 2 – 2016
14. D. Torre, G. Procaccianti, D. Fucci, S. Lutovac and G. Scanniello, "On the Presence of Green and Sustainable Software Engineering in
Higher Education Curricula," 2017 IEEE/ACM 1st International Workshop on Software Engineering Curricula for Millennials (SECM),
Buenos Aires, 2017, pp. 54-60.
15. Rashid,” Developing Green and Sustainable Software Using Agile Methods in Global Software Development: Risk Factors for
Vendors”,2017 Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering
ENASE 2016 PP 247—253
16. Maqbool Ahmed Muhammad Azeem,” Requirement Engineering the backbone of a project ”, 2017, www.researchgate.net/ publication/
318787262,
17. H. Reza, R. Sehgal, J. Straub and N. Alexander, "Toward model-based requirement engineering tool support," 2017 IEEE Aerospace
Conference, Big Sky, MT, 2017, pp. 1-10.
18. H. H. Khan, M. N. bin Mahrin and S. bt Chuprat, "Situational requirement engineering framework for Global Software
Development," 2014 International Conference on Computer, Communications, and Control Technology (I4CT), Langkawi, 2014, pp. 224-
229.
19. S. Sitthithanasakul and N. Choosri, "Application of software requirement engineering for ontology construction," 2017 International
Conference on Digital Arts, Media and Technology (ICDAMT), Chiang Mai, 2017, pp. 447-453.
20. S.Aruna devi, Dr.Vijeta Iyer, “A Study on M/M/C Queueing Model under Monte Carlo Simulation in Traffic Model”, 2017, International
Journal of pure and Applied Mathematics(IJPAM), No:12, vol 116, pg:199-207.
21. http://sustainabilitydesign.org
Authors: V.Jeyasudha, Satheesh Kumar KRP
Paper Title: Study and Comparison of Steel Haunched and Tapered Beam
Abstract: Steel framed buildings are flexible, ductile and light weight compared to that of reinforced concrete
buildings. Intense research had been conducted in the last decades regardingthe fatigue and ductility behaviour of
structural steel beam. Prismatic beams are the beams with uniform cross-section in the entire span of the beam.
Non-prismatic beams are used to increase the efficiency of the beam, by increasing the strength per unit mass than
that of prismatic beam. In this study, the load-deformation, stress-strain analysis, the fatigue and ductile behaviour
59. of non-prismatic steel beams with hunched and tapered ends was compared with prismatic beam for different
loading condition. The beams were subjected to static loading conditions during analysis. 261-263
Keywords: Prismatic beam, non-prismatic beam, stress-strain analysis, static loading, fatigue and ductile
behavior.

References:
1. NimbalkarAmol N. and Laxman V. Awadhani. Experimental and Numerical Analysis of Trapezoidal Corrugated Web Beam to
Determine its Strength and Mode Shapes. International Engineering Research Journal, 1955-1961.
2. Anu Jolly, VidyaVijayan 2. (2015). Structural Behaviour of Reinforced Concrete Haunched Beam A Study on ANSYS and ETABS.
International Journal of Innovative Science, Engineering & Technology, 3(8), 495-500.
3. Abinayaa, A., Ramadevi, K. (2018). Analytical investigation of all - Steel buckling restrained braces. International Journal of Civil
Engineering and Technology, 9(3),232-239.
4. Premalatha, J., Manju, R., Senthilkumar, V. (2017). Seismic response of multistoreyed steel frame with viscous fluid-scissor jack
dampers. International Journal of Civil Engineering and Technology, 8(8),289-312.
Authors: PA.Prabakaran, G.L.Sathyamoorty, M.Adhimayan
An Experimental and Comparative Study on Canal Lining Exploitation Geo Synthetic Material,
Paper Title:
Cement Mortar and Material Lining
Abstract: This project is principally supported water insufficiency, a serious cause for individuals for all
functions chiefly for irrigation. to beat this and to boost the potency of water flow and discharge in canals, the lining
ways for canals ought to be modified as less permeable , increase in velocity and discharge. Canal lining is that the
method of reducing flow loss of irrigation water by adding an imperviable layer. Technological development and
producing of recent materials helps in varied functions. One such issue was the event of geosynthetic materials that
was wide employed in construction fields in conjunction with concrete or as a separate material because the
replacement for concrete. we have a tendency to selected PVC geosynthetic material for lining the canal rather than
concrete, brick masonry and traditional material lining for canals. we have a tendency to create a comparative study
for 3 canal linings like PVC, brick masonry and material lining close to Pollachi of alittle paradigm model in Mr.
Sekar farm and notice the foremost economical material appropriate for canal lining altogether forms

Keywords: canal analysis’s, Effective discharge, most economical-comparative study.

References:
1. A report on “Studies on issues related on gap between
2. Irrigation potential created and utilised”, IIM,Lucknow.
3. A technical report on “Canal lining demonstration project” year 7durability report, September 1999
60. 4. Mishra et.al(2001), Hydraulic modeling of kangsabatimain canal for performance assessment, Journal of Irrigation and Drainage
Engineering, Vol. 127, No. 1, January/February, 2001. Conference on geotextiles,Geomembranes and Related products”, Singapore,59.Pg 264-266
573-578.
5. A.K. Rastogi(1992), FEM modelling to investigate seepage losses from the lined Nadiad branch canal, India, Journal of
Hydrology,Elsevier,Vol.138,Issue1-2, sept.,1992, pages 153-168.
6. B J Batliwala,J N Patel,P D Porey,2014, “Seepage Analysis of Kakrapar Right Bank Main Canal of KakraparProject, Gujarat,India”
IJSRD, Vol11
7. Charles M. Burt et.al(2010), Canal Seepage Reduction by Soil Compaction , Journal of Irrigation and Drainage Engineering, Vol. 136,
No. 7, July 1, 2010. ©ASCE
8. David McGraw et.al(2011), Development of tools to estimate conveyance losses in the Truckee River, USA ,Hydrogeology Journal
Springer-Verlag 2011 Economic Analysis Guidebook,Department of Water Resource, California.
9. ErhanAkkuzu et.al(2007), Determination of Water Conveyance Loss in the Menemen Open Canal Irrigation Network, Turk J Agric For
31 (2007) 11-22 c TUB‹TAK
10. ErhanAkkuzu1 (2011), The Usefulness of Empirical Equations in Assessing Canal Losses Through Seepage in Concrete-Lined Canal,
Journal of Irrigation and Drainage Engineering. /(ASCE)IR.1943-4774.0000414.
11. Eric Leigh et.al, (2002), Seepage Loss Test ResultsIn Cameron County Irrigation District No. 2, Report Prepared for Cameron County
Irrigation District No. 2 by Eric Leigh and Guy Fipps, P.E.2 in December 18, 2002
12. Garg SK, Irrigation And hydrolic structure by Khanna Publishers 2006
13. I.J. McGowen1(2001), Identifying channel seepage using pre-dawn thermal imagery, Geoscience and Remote Sensing Symposium, IEEE
2001,On page(s): 1631-1633 vol.4
14. J.P. Giroud,J.G. Zornberg, and A. Zhao,7 October 2000,“Hydraulic Design of Geosynthetic and Granular Liquid Collection
Layers”Geosynthetics International is published by the Industrial FabricsAssociation International, Special Issue on Liquid Collection
Systems, Vol. 7, Nos. 4-6, pp. 285-380.
15. A.I.Comer, September1994, “Water Conservation strategies using Geosynthetic.Fifth International
Authors: V.Vanitha, V.P.Sumathi, R.Kalaiselvi
Paper Title: Automatic Ticket Validation System for Indian Railways
Abstract: Railway system places a vital role in public transportation. Railways are widely used
commutation by the public. There are many services provided by it like a ticket, catering, etc. Ticketing system
has evolved from paper ticketing system to electronic ticketing system. In a metro train, the system provides
smart card where a passenger can recharge and buy tickets using that, this may be regular or seasonal ticket smart
card which will calculate the fare for travel. In order to book tickets for long distance travel, passengers can buy
e-ticket via an internet or can in person at railway stations. In case of e-ticket, the tickets would be validated by
ticket examiner (TTE) with a valid original identity proof. Passengers will be in trouble if they forget to take the
ID card. Lack of Ticket Examiner leads minimal verification of the passenger's ticket. In the proposed system by
the use of online services with the internet, passengers can add their own unique national Identity proof (Aadhaar
61. card) while booking tickets, which helps automatic ticket validation. Biometric checks of the passenger take
place at the entrance and exit of each compartment of the train. With the help of cloud storage, the details can be 267-271
validated by comparing Aadhaar database. In case of mismatching tickets alarm rings and alert message will be
sent to Ticket Examiner. Using GPS on a train, location can be obtained and the source and destination of the
passenger can be validated. Checking at the exit path, the destination can be checked and can avoid the persons
travelling long distance with short distance travelling ticket. Also, the system prevents the person travels without
buying tickets. The proposed system is implemented using Raspberry Pi, fingerprint scanner and GPS Receiver.

Keywords: Indian Railways, automatic ticket validation, biometric checking, Aadhaar data base.

References:
1. G. M. D, A. K. Scariah, L. R. Pannapara, M. Jessica, and J. Joseph, “Smart Ticketing System for Railways in Smart Cities using
Software as a Service Architecture,”International conference on I-SMAC (IoT in Social,Mobile,Analytics and cloud) pp. 828–833, 2017.
2. T. Chen, Z. Zhou, and J. Zhang, “Railway Passenger Service Mode on ‘ Internet + ,’” Springer International Publishing AG 2018
Advances in smart vehicular technologyvol. 3, no. 2016.
3. M. Arnone, T. Delmastro, G. Giacosa, M. Paoletti, and P. Villata, “The Potential of E-ticketing for Public Transport Planning: The
Piedmont Region Case Study,” Transp. Res. Procedia, vol. 18, no. June, pp. 3–10, 2016.
4. W. He, Y. He, and M. M. Tentzeris, “Modeling, design and experimentation of a UHF RFID tag antenna embedded in railway tickets,”
IEEE Antennas Propag. Soc. AP-S Int. Symp., vol. 2015–October, pp. 1416–1417, 2015.
5. J. Yang, J. Zhou, D. Fan, and H. Lv, “Design of intelligent recognition system based on gait recognition technology in smart
transportation,” Multimedia. Tools Appl., vol. 75, no. 24, pp. 17501–17514, 2016.
6. S. Karthick and A. Velmurugan, “Android suburban railway ticketing with GPS as ticket checker,” Proc. 2012 IEEE International
Conference Advanced Communication Control Computing Technoogy. ICACCCT 2012, no. 978, pp. 63–66, 2012.
7. S. Patil, “An Intelligent Ticket Checker Application for Train using QR Code,” National Conference on Advancements in Computer &
Information Technology pp. 15–20, 2016.
8. D. Li et al., "Client/server framework-based passenger line ticket system using the 2-D barcode on a mobile phone," Proc. Int. Conf. E-
bus. E-Government, ICEE 2010, pp. 97–100, 2010.
9. M. M. Swarup, A. Dwivedi, C. Sonkar, R. Prasad, M. Bag, and V. Singh, “A QR Code Based Processing For Dynamic and Transparent
Seat Allocation in Indian Railway,”IJCSI International Journal of Computer Science Issuesvol. 9, no. 3, pp. 338–344, 2012.
10. R. Tanwar, A. K. Nazari, V. Deep, and N. Garg, “Railway Reservation Verification by Aadhar Card,”International Conference on
Computational Modelling and IssuesProcedia Comput. Sci., vol. 85, no. Cms, pp. 970–975, 2016.
11. J. Meenakumari, “Enhanced &Integrated E-Ticketing-An One Stop Solution,” International Journal of Advanced Research on Computer
Science and Management Studies, vol. 7782, pp. 400–403, 2015.
12. N. Jadhav, P. Dolas, M. Kurrey, K. Dhawale, and P. C. V Rane, “Railway Ticket Scanner System,” International Journal of Advanced
Research of Computer and Communication Engineering vol. 5, no. 3, pp. 36–37, 2016.
13. S. Chandrappa, D. Lamani, S. Vital, and N. U. Meghana, “Automatic Control of Railway Gates and Destination Notification System
using Internet of Things ( IoT ),” I.J. Education and Management Engineering no. September, pp. 45–55, 2017
14. S. L. Ghìron, S. Sposato, C. M. Medaglia, and A. Moroni, “NFC ticketing: A prototype and usability test of an NFC-based virtual
ticketing application,” Proc. - 2009 1st Int. Work. Near F. Commun. NFC 2009, pp. 45–50, 2009.
15. K. Fan et al., “NFC Secure Payment and Verification Scheme with CS E-Ticket,”Hindawi Security and Communication Networks vol.
2017, 2017.
16. M.-P. Pelletier, M. Trépanier, and C. Morency, “Smart card data use in public transit: A literature review,” Transp. Res. Part C Emerg.
Technol., vol. 19, no. 4, pp. 557–568, 2011.
17. Janani R and Vanitha V “A Survey on Smart Ticketing and Verification System for Indian Railways” Fifth International Conference on
Current Trends in Engineering & Technology 2018.
18. V.Vanitha, V.P.Sumathi, J.Cynthia and B.Illakia, “NEXT GENERATION VEHICLE DIAGNOSTIC SYSTEMS”, International
Journal of Pure and Applied Mathematics, Volume 116 No. 11, 2017, 251-259
19. Suganthi N, Arun R, Saranya D and Vignesh N published a paper titled “Smart Security Surveillance Rover” in International Journal of
Pure and Applied Mathematics, Vol. 116, No.12, 2017, 67-75.
Authors: Rameswari.R ,Divya.N
Paper Title: Smart Health Care Monitoring System Using Android Application: A Review
Abstract: The innovation is changing the scene of the world and driving us towards a down to earth specialized
world. The rising part of ICT and IOT has made an enormous effect on human services. It enhances the nature of
care, builds the patient security and information insurance and limit working and regulatory cost. The media
transmission gadgets are easier to understand and utilized by everybody around the globe which have decreased
the correspondence hole to a zero level. The paper clarifies a portion of the correspondence innovation and the
particular conventions for moving the information in a protected way (i.e.,) how the imperative indications of
patients of patients of patients are sent to the medical consultant for the further treatment.

Keywords: IoT, ICT, Media transmission, Conventions, Information assurance, Security.

References:
1. AyaskantaMishra,BiswarupChakraborty,” AD8232 based Smart Healthcare System using
2. Internet of Things (IoT),”International Journal of Engineering Research&Technology(IJERT) ,Vol. 7 Issue 04, April-2018 .
3. .Ayaskanta Mishra, AkankshaKumari, PoojaSajit, PranjalPandey,”Remote Web Based Ecg Monitoring Using MQTT Protocol For IOT
In Healthcare,” International Journal Of Advance Engineering And Research Development Volume 5, Issue 04, April -2018.
4. .BhaskarNiraghatam,M V Ramanamurthy.” Heart Beat Monitoring System And Security Using Android ,” International Journal of
Advanced Research in Computer Science Volume 8, No. 7, July – August 2017.
5. R.Harini, B. Rama Murthy , K.TanveerAlam,”Development Of ECG Monitoring System Using Android App,”International Conference
62. on Emerging Trends in Engineering , Science And Management 17th And 18th March 2017.
6. Gaurav Raj, Neelam Rup Prakash, Jagjit Singh Randhawa.”IoT Based EMG Monitoring System,”International Research Journal of 272-278
Engineering And Technology (IRJET), Volume: 04 Issue: 07 July -2017.
7. Hao-Yun Kao, Chun-Wang Wei, Min-Chun Yu, Tyng-Yeu Liang, Wen-HsiungWu,Yenchun Jim Wu.” Integrating a Mobile Health
Applications for Self-Management to enhanceTelecare System,”Telematics and Informatics 35 (2018) 815–825.
8. Godavarthi Rajesh, M.K. Srilekha.”Advanced Healthcare Monitoring System Using Cc3200microcontroller,” International Journal Of
Pure And Applied Mathematics Volume 115 No. 8 2017, 419-424.
9. SpurthyTalakala, M.Hari Krishna.” Instantaneous Health Care Monitoring System d Smart Phone,” Journal Of Electronic Control
Systems And Control Instrumentation Engineering Volume 2 Issue 2
10. Devashri Deshmukh1, Ulhas B. Shinde2, Shrinivas R. Zanwar3 .” Android Based Health Care Monitoring System,” International Journal
Of Advance Scientific Research And Engineering Trends Volume 2 ,Issue 7 ,Jan 2017.
11. .FarahNasri, AbdellatifMtibaa.,” Smart Mobile Healthcare System Based On WBSN And 5G,” International Journal Of Advanced
Computer Science And Applications, Vol. 8, No. 10, 2017.
12. SarfrazFayaz Khan.” Health Care Monitoring System In Internet Of Things (Lot) By Using RFID,” 2017 The 6th International
Conference On Industrial Technology And Management.
13. .Prashant Salunke1 | Rasika Nerkar2,”Iot Driven Healthcare System For Remote Monitoring Of Patients,”International Journal For
Modern Trends In Science And Technology Volume: 03, Issue No: 06, June 2017.
14. .OlutayoBoyinbode.” A Cloud-Based Body Area Sensor Network Mobile Healthcare System,” International Journal OfAdvanced
Research In Computer Science And Software EngineeringVolume 7, Issue 5, May 2017.
15. .Higinio Mora ID , David Gil ID , Rafael Muñoz Terol D , Jorge Azorín,D AndjulianSzymanski.” An Iot-Based Computational
Framework For Healthcare Monitoring In Mobile Environments,”Sensors 2017.
16. Kavitha.Y, Lavanya.M, Mounika.A, Sasirekha.KN.VignaVinod Kumar.” A Secure Iot-Based Modern Healthcaresystem Using Body
Sensor Network,” International Journal Of Innovative Research In Science, Engineering And Technology, Volume 6, Special Issue 3,
March 2017.
17. .Ranjeet Kumar, RajatMaheshwari, AmitAggarwal, M. ShanmugasundaramAnd Sundar S.” Iot Based Health Monitoring System Using
Android App,” ARPN Journal of Engineering and Applied Sciences Vol. 12, No. 19, October 2017.
18. Syed Muhammad Waqas Shah, Maruf Pasha,” IoT-Based Smart Health Unit,”Journal of Software, Volume 12, Number 1, January 2017.
19. AhmedImteaj and Muhammad KamrulHossain.” A Smartphone based Application to Improve theHealth Care System of Bangladesh,”
20. Won-Jae Yi, JafarSaniie,” Patient Centered Real-Time Mobile HealthMonitoring System,” E-Health Telecommunication Systems and
Networks, 2016, 5, 75-94
21. Joon-Soo Jeong, Oakyoung Han2 And Yen -You You.”A Design Characteristics Of Smart Healthcare System As The Iot Application,”
Indian Journal Of Science And Technology, Vol 9(37), October 2016.
22. Hanqing Chao, Yuan Cao, Junping Zhang, , Fen Xia, Ye Zhou, and Hongming Shan.”Population Density-based Hospital
Recommendation with Mobile LBS Big Data.”2018 IEEE International Conference on Big Data and Smart Computing.
23. Edison R. Valencia-Nuñez, Hamilton V. Montenegro López, Lorenzo J. Cevallos-Torres,” Probabilistic Model for Managing the Arrival
Timesof Pre-Hospital Ambulances Based on theirGeographical Location (GIS),” 2018 IEEE.
24. .Maradugu Anil Kumar, Y.RaviSekhar,” Android Based Health Care Monitoring System,” IEEE Sponsored 2nd International
Conference On Innovations In Information Embedded And Communication Systems ICIIECS'15.
25. Muhammad WasimMunir, Syed Muhammad Omair, M.ZeeshanUlHaque,” An Android based Application for Determine a Specialized
Hospital Nearest to Patient's Location,” International Journal of Computer Applications (0975 – 8887) Volume 118 – No. 9, May 2015.
26. .Daryl Abel, BulouGavidi, Nicholas Rollings and Rohitash Chandra,” Development of an Android Application for anElectronic Medical
Record System in an Outpatient Environment for Healthcare in Fiji,” Technical Report, Aicrg, Software Foundation, Fiji, March 2015.
Authors: Jenice Aroma R, Syed Ali Fathima S.J, Raniya Harini R
A Short Investigation on Effective Spectral Properties of Multispectral and Hyper Spectral Images
Paper Title:
for Object Detection
Abstract: The Satellite based imaging system which is based on a network of artificial satellites is more
efficient for remote monitoring of our ecosystem. It provides geospatial positioning and high precision
information regarding the local time which can be used in global positioning, air and sea traffic and so on.
Effective monitoring of our ecosystem has been achieved through remote sensing which extracts even fine spatial
details of the earth, thus producing an image with good resolution for better clarity to be analyzed. This paper
discusses about two different variants of satellite imaging on spatial objects which varies with the spatial
significance. These satellite imaging instruments are primarily stresses on the pixel count for ejecting an accurate
and more specific image. Increase in spatial resolution produces an accurate and precise overview about the
chosen spatial entity thereby supporting the data collection technology and offers effective data interpretation.
This can bring out better discrimination among the various resolution strategies and their relevance to a specific
need.

Keywords: air and sea traffic and so on.

References:
1. Shefali Aggarwal, "Principles of Remote Sensing, Satellite Remote Sensing and GIS Applications in Agricultural Meteorology",
Proceedings of the Training workshop, pp. 39-65, 2003.
2. Resolution of Remote Sensing - [Online]: www.edc.uri.edu/nrs/classes/NRS409/RS/Lectures/HowRemoteSensonWork.pdf
3. Jenice Aroma R, Kumudha Raimond , "An Overview of Technological Revolution in Satellite Image Analysis", Journal of Engineering
Science and Technology Review ,9 (4), 1- 5, 2016.
4. SWIR- [Online]: https://www.geoimage.com.au/SWIR%20Series/resolution
5. Menglong Li, HuanXie, Weidong Wang, Xiuhua Li, Chaowei Wang, Yinghai Zhang , "An Advanced Anti-Collision Algorithm Based on
Inter-Tag Communication Mechanism in RFID- Sensor Network", Mobile Ad Hoc and Sensor Systems (MASS), 2015.
6. Satellite Navigation - [Online]: https://www.techopedia.com/definition/30440/satellite-navigation
7. Aseffa M. Melesse, Qihaoweng, Prasad S. Thenkabail and Grabriel B. Senay, "Remote sensing sensors and application in environmental
63. resource mapping and modelling", Sensors, 7(12), 2007.
8. Multispectral vs. Hyperspectral- [Online] :www.iirs.gov.in/iirs/sites/default/files/StudentsThesis/VARUN_Mtech_2013-15.pdf
9. C. Lanaras, E. Baltsavias, K. Schindler, "Advances in hyperspectral and multi spectral image fusion and spectral unmixing", MDPI 279-283
Sensors, 2007.
10. Spatial resolution in Digital Images - [Online]: http://micro.magnet.fsu.edu/primer/java/digitalimaging/processing/spatialresolution/-
11. High (spatial) Resolution vs. Low Resolution Images - A Planner’s viewpoint –Mahavir.
12. Jonathan R. B. Fisher, Eileen A. Acosta, P. James Dennedy-Frank, Timm Kroeger & Timothy M. Boucher, "Impact of satellite imagery
spatial resolution on land use classification accuracy and modeled water quality", .
13. Sarah A. Boyle,Christina M. Kennedy, Julio Torres, Karen Colman, Pastor E. Pérez-Estigarribia, Noé U. de la Sanch , "High-Resolution
Satellite Imagery Is an Important yet Underutilized Resource in Conservation Biology", PLOS ONE, 2014 .
14. Very high resolution satellite data - [Online]: http://earth.space/blog/satellite-data-need-geoscience-application/
15. About high resolution satellite images - [Online]: http://www.dhi-gras.com/products/satelliteimages
16. Quick-bird - [Online]: http://glcf.umd.edu/data/quickbird/description.shtml
17. GEOEYE-1 – [Online]: https://spacedata.copernicus.eu/web/cscda/missions/rapideye
18. IKONOS - [Online]: http://www.euspaceimaging.com/satellites/ikonos
19. RAPIDEYE - [Online]: https://spacedata.copernicus.eu/web/cscda/missions/rapideye
20. RAPIDEYE - [Online]: http://www.harrisgeospatial.com/DataImagery/SatelliteImagery/MediumResolution/RapidEye.aspx
21. PLEIADES - [Online]: https://pleiades.cnes.fr/en/PLEIADES/GP_applications.htm
22. SPOT-5 - [Online]: https://www.geoimage.com.au/satellite/spot-5
23. Hyperspectral Remote Sensing – [Online]: http://www.csr.utexas.edu/project/rs/hrs/hyper.html
24. Eyal Ben Dor, Tim Malthus, Antonio Plaza, and Daniel Schläpfer , Hyperspectral Remote Sensing 2, 15-18.
25. Emma Underwood, Susan Ustin, Deanne DiPietro, "Mapping non-native plants using hyperspectral imagery", Remote Sensing of
Environment, Vol. 86, 2003.
26. Tapas R. Martha, K.Babu Govindharaj, K. Vinod Kumar, Damage and geological assessment of the 18 September 2011 Earthquake in
Sikkim, India using very high resolution satellite data, Geoscience Frontiers, 2014.
27. Hyperion – [Online]: https://e01.usgs.gov/sensors/hyperion
28. Hyperspectral Imagery - [Online]: https://www.hyspex.no/hyperspectral_imaging/
29. Eyal Ben Dor, Tim Malthus, Antonio Plaza, and Daniel Schlapfer, Hyperspectral Remote Sensing 2, 15-18.
30. K. Staen , Terrestrial Imaging Spectroscopy – Some Future Perspectives.
31. Jenice Aroma R and Kumudha Raimond, "A Review on availability of Remote Sensing Data", TIAR 2015, 150-155.
32. Google Earth Explorer - [Online]: https://earthexplorer.usgs.gov/.
33. Senthil S, Suguna M, and Cynthia .J,” mapping the vegetation soil and water region analysis of tuticorin district using landsat images”,
International Journal on Innovations in Engineering Sciences and Technology, 3(01),2018.
Authors: Nalini Nagendran, Kriti Asrani, Devaki P
Paper Title: An Online Question & Answer Platform
Abstract: (A Question and Answer Software is a software that focuses on answering the questions one might
put up on an online platform. These are usually implemented by large organizations which aim on implementing
a platform where users can clear their doubts about their respective fields. It varies from small scale to large scale
or from topic to topic. Many of these platforms may restrict access to either their employees or make it a public
one. The disadvantages of the existing systems are less security, searching efficiency is less, chances of faking
answer. One may access these sites/applications from another's system in case they are not public or access the
ones which are and post answers which aren't relevant. Sometimes people even lie on such platforms and there
might not be any checker to cross-analyze these answers. Now one might also want similar answers to their
question which may resolve their query beforehand. Problems which are undertaken are first, making sure that
there is more security and safety. Second, helping the users to search answers for similar questions which may
answer their question beforehand and even highlight other important points worth knowing. There had to be a
way to find if the answers are worth trusting. One can’t just blindly trust anything they read on the internet. They
either look for other users who've said the same thing or maybe a trustworthy person like an expert. So in order
to resolve these problems, the software created focuses on ensuring that a user has to make an account in order to
64. access the website. Both users and experts can make their accounts and help out people with their queries. Third,
there would be a similarity check that would allow the person to review similar questions and get more 284-288
information. Lastly, this is a system which allows you to grade the answer you read with respect to how much it
helped a person so others can trust the answer and its eligibility and see if it’s legit. One can find a number of
such platforms, varying from technical to a know-all domain. Quora or Yahoo! Answers are standalone Question
and Answer Softwares and along with StackOverflow, Qhub, and they all are open source.)

Keywords: Software, questions, answers, platform, similar, query.

References:
1. M. R. Morris, J. Teevan, and K. Panovich. A Comparison of Information Seeking Using Search Engines and Social Networks. In In
Proc. of ICWSM, 2010.
2. M. R. Morris, J. Teevan, and K. Panovich. What do People Ask Their Social Networks, and Why? A Survey Study of Status Message
Q&A Behavior. In Proc. of CHI, 2010.
3. Z. Gyongyi, G. Koutrika, J. Pedersen, and H. Garcia-Molina. Questioning Yahoo! Answers. In Proc. of QAWeb, 2008.
4. Yahoo! Answers Team. Yahoo! Answers BLOG. http://yahooanswers.tumblr.com
5. B. Li and I. King. Routing Questions to Appropriate Answers in Community Question Answering Services. In Proc. of CIKM, 2010.
6. Reed, M. G., Syverson, P. F., & Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected areas
in Communications, 16(4), 482-494.
Authors: Nalini Nagendran, Ashwini Kolhe
Paper Title: Security And Safety With Facial Recognition Feature For Next Generation Automobiles
Abstract: This is the era of automated cars or self-driving cars. All car vendors are trying to come up with
different advancements in the cars (Like Automatic car parking, Automatic Lane changing, automatic braking
systems, android auto, car connect, Vehicle to external environment technology etc). In the automation industry,
TESLA, Google and Audi are the most competent leader among each other as well as for other automation
business also. Modern vehicles are all equipped with different technologies like navigation system, driver
assistant mode, weather mode, Bluetooth, and other safety features which brings broader impact to quality of
human’s life, environmental sustainability. This paper explains how the proposed feature, unlocks the
semiautonomous cars or autonomous cars safely and provides the safety to the entry level cars. The
acknowledged pictures are put away in the picture database amid confront acknowledgment by utilizing Support
Vector Machine (SVM) classifier. Information from confront pictures through picture pressure utilizing the two-
dimensional discrete cosine change transformation (2D-DCT). A self-arranging map (SOM) utilizing an
unsupervised learning method is utilized to order DCT-based element vectors into gatherings to distinguish if the
picture is "available" or "not available" in the picture database. The face is detected by the event that the
framework perceives faces, only the authentic users are able to start the ignition of the car and untheorized users
65. are not allow to start the ignition.
289-294
Keywords: Face detection, Controller, Autonomous vehicles, safety , new feature , driverless cars , SVM

References:
1. Hteik Htar Lwin, Aung Soe Khaing, Hla Myo Tun “Automatic Door Access System Using Face Recognition” INTERNATIONAL
JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 4, ISSUE 06, JUNE 2015 ISSN 2277-8616 294
2. Zhaoxia Zhu , Fulong Chen “Fingerprint Recognition-Based Access Controlling System for Automobiles” 2011 4th International
Congress on Image and Signal Processing
3. Yongmin Lia,*, Shaogang Gongb , Jamie Sherrahc , Heather Liddellb “Support vector machine based multi-view face detection and
recognition” Y. Li et al. / Image and Vision Computing 22 (2004) 413–427
4. Unnati A. Patel, Dr. Swaminarayan Priya R. « Development of Student Attendence Management System Using RFID and Face
Recognition : A Review “International Journal of Advance Reasearch in Computer Science And Management Stsudies. Vol. 2, issue
8,August 2014
5. Yeka Joseph Abueh and Hong Liu “Message Authentication in Driverless Cars” 978-1-5090-0770-7/16/$31.00 ©2016 IEEE
6. Keshav Bimbraw “Autonomous Cars: Past, Present and Future”IEEE
7. Brian Markwalter “The Path to Driverless Cars The Path to Driverless Cars” Digital Object Identifier 10.1109/MCE.2016.2640625
APRIL 2017 ^ IEEE Consumer Electronics Magazine
8. William B. Rouse “The Systems, Man, and Cybernetics of Driverless Cars”
9. Paul Viola, Michael J. Jones, Robust Real-Time Face Detection, International Journal of Cumputer Vision 57(2), 2004.
10. Ayushi Gupta, Ekta Sharma, NehaSachan and Neha Tiwari. Door Lock System through Face Recognition Using MATLAB. International
Journal of Scientific Research in Computer Science and Engineering, Vol-1, Issue-3, 30 June 2013.
11. I.Yugashini, S. Vidhyasri, K.Gayathri Devi, Design And Implementation Of Automated Door Accsessing System With Face
Recognition, International Journal of Science and Modern Engineering(IJISME), Volume-1, Issue-12, November 2013.
12. Liton Chandra Paul, Abdulla Al Sumam. Face Recognition Using Principal Component Analysis Method. International Journal of
Advanced Research in Computer Engineering & Technology (IJARCET),Volume 1, Issue 9, November 2012
13. Liam Ellis1, Nicolas Pugeault2, Kristoffer O¨ fja¨ll1, Johan Hedborg1, Richard Bowden2, Michael Felsberg1 “ Autonomous Navigation
and Sign Detector Learning ” 978-1-4673-56478-03/123/$31.00 ©20123 IEEE
14. Young-Hwan Lee, Toun gseop Kim, Heung-jun Kim , In Kyoung Shin,Hyochang Ahn,YuKyong Lee “ Mdofied Active Shape Model for
Realtime Facial Feature Tracking on iPhone ” 2016 10th International Conference on Innovative Mobile and Internet Services in
Ubiquitous Computing
15. Shaif Choudhury, Soummyo Priyo Chattopadhyay, Tapan Kumar Hazra “Vehicle Detection and Counting using Haar Feature-Based
Classifier” 978-1-5386-2215-5/17/$31.00 ©2017 IEEE
16. Chapelle, O. (1998). Support Vector Machines et Classification d'Images.
Authors: Adharsh R, Chandru T. K, Dinesh Kumar M.
Paper Title: Interactive Coding Platform for Students
Abstract: Programming has become one of the most demanded skill of a working professional in almost every
industry. Even though we have a lot of platform to work on and learn from, we are not properly trained in this
domain . This has increased the need for a platform that is targeted only for the colleges students to develop a
coding culture among them , right from the start. The project that we aim to develop solves this particular issue
and will also enhance the skills of the students by continuous feedback learning. The end-product will be a web
application which the teachers can use to set problems and give assignments while the students will use the
application to solve the assignments. The application will be developed using : VueJS in the front-end , the
database will be MongoDB and the back-end will be composed of ExpressJS and NodeJS entities. Thus, MEVN
is the technology stack on which the web application will be built because most of the operations in the project
will be I/0 based and NodeJS is the perfect tool to handle asynchronous calls. The data will be transferred in the
form of a JSON contract for easy interpretation. The web application will be composed of REST api endpoints
for performing various operations. The application will be built on MicroServices Architecture to support
modularity, scalability and ease of use. Some of the features provided by the application are performance
66. comparison of the students, customizable test environment, compilation and execution of the code, cloud storage
for sensitive data and support for many languages. Thus, this web application will solve the critical need for 295-299
skills that are to be possessed by the individuals graduating out of the college as demanded by the IT industry.

Keywords: Programming, Micro services, MEVN stack, REST

References:
1. Jürgen Hausladen, Birgit Pohn, Martin Horauer, "A cloud-based integrated development environment for embedded systems",
Mechatronic and Embedded Systems and Applications (MESA) 2014 IEEE/ASME 10th International Conference on, pp. 1-5, 2014.
2. Shih-Chieh Su, Chih-Chang Yu and Chan-Hsien Lin, "Development of a web-based programming learning platform," 2016 International
Conference on Fuzzy Theory and Its Applications (iFuzzy), Taichung, 2016, pp. 1-1.
3. Anuradha Kanade , Arpita Gopal and Shantanu Kanade , “A study of normalization and embedding in MongoDB”,Gurgaon , 27 March
2014., pp. 134-139.
4. F. Thung, T. F. Bissyandé, D. Lo and L. Jiang, "Network Structure of Social Coding in GitHub," 2013 17th European Conference on
Software Maintenance and Reengineering, Genova, 2013, pp. 323-326.
5. Ning Zhang, Tianmei Wang, Shuyun Zhang and Xuefeng Li, "Platform construction and implementation of software development course
group," 2011 International Conference on Computer Science and Service System (CSSS), Nanjing, 2011, pp. 3372-3375.
6. Andrew John Poulter , Steven J. Johnston and Simon J.Cox,”Using the MEAN stack to implement a RESTful service for an
Internet of Things”, Milan, Italy, 14-16 Dec.2015,pp. 10-12.
Authors: Raju C, Krishnamoorthi M
Paper Title: A Comprehensive Survey on Virtual Migration Techniques in Cloud Computing
Abstract: In recent growth of business challenges the landscape of the cloud computing under major change.
Especially the management of datacenter is challenging task because of its increase in capital and operational
expenses due to the spending on its workforce. The paramount importance of any data center is to reduce energy
cost and computation cost by effectively utilizing the available physical machines. Virtualization is a key
technology in datacenter to provide demand specific virtual resources as per application requirement. Migration
helps in avoiding under utilization of resources also in overloaded conditions from the flood of requests coming
in these days. The trend in choosing the right migration techniques in cloud data center depends on the nature of
the deadline it follows from the utilization of the resources. The goals in virtual migration are the effective
management in load balancing of servers, reduced power consolidation of server by right model, faster
recognition to the server failure and minimizing the overall system maintenance. In this paper, we discuss some
67. of the latest techniques used in the virtual migration based on their key performance metric like total transfer
data, migration time and total down time. 300-303

Keywords: Cloud Computing, Migration, Pre-Copy, Post-Copy and Hybrid Copy.

References:
1. Lei Shi, Yi Shi, Xing Wei, Xu Ding, and Zhenchun Wei “Cost Minimization Algorithms for Data Center Management”, IEEE
Transactions on parallel and distributed systems, vol. 28, no. 1, January 2017
2. Gandhi, V. Gupta, M. Harchol Balter, and A. Kozuch, “Optimality analysis of energy-performance trade-off for server farm
management,” Elsevier Perform. Eval., vol. 67, no. 11, pp. 1155–1171, Nov. 2010.
3. R. W. Ahmad et al., “A survey on virtual machine migration and server consolidation frameworks for cloud data centers,” J. Netw.
Comput. Appl., vol. 52, pp. 11–25, Jun. 2015.
4. R Yu, Y Zhang, S Gjessing, W Xia, K Yang, “Toward cloud-based vehicular networks with efficient resource management” IEEE
Network (Volume: 27, Issue: 5, September-October 2013
5. F. Zhang, X. Fu, and R. Yahyapour, “Layermover: Storage migration of virtual machine across data centers based on three-layer image
structure,” in Proc. IEEE 24th Int. Symp. Modeling Anal. Simulat. Comput. Telecommun. Syst. (MASCOTS), London, U.K., 2016, pp.
400–405.
6. P. Samadi, J. Xu, and K. Bergman, “Virtual machine migration over optical circuit switching network in a converged inter/intra data
center architecture,” in Proc. Opt. Fiber Commun. Conf. Exhibit. (OFC), Los Angeles, CA, USA, 2015, pp. 1–3.
7. R. W. Ahmad et al., “Virtual machine migration in cloud data centers: A review, taxonomy, and open research issues,” J. Super Comput.,
vol. 71, no. 7, pp. 2473–2515, 2015.
8. H. Liu, H. Jin, C.-Z. Xu, and X. Liao, “Performance and energy modeling for live migration of virtual machines,” Cluster Comput.,vol.
16, no. 2, pp. 249–264, 2013.
9. Kapil, E. S. Pilli, and R. C. Joshi, “Live virtual machine migration techniques: Survey and research challenges,” in Proc. IEEE 3rd Int.
Adv. Comput. Conf. (IACC), 2013, pp. 963–969.
10. T. Wood, “Improving data center resource management, deployment, and availability with virtualization,” Ph.D. dissertation, Dept.
Comput. Sci., Univ. Massachusetts at Amherst, Amherst, MA, USA, 2011.
11. J. Opara-Martins, R. Sahandi, and F. Tian, “Critical review of vendor lock-in and its impact on adoption of cloud computing,” in Proc.
Int. Conf. Inf. Society (i-Soc.), London, U.K., 2014, pp. 92–97.
12. Fei Zhang , Guangming Liu, Xiaoming Fu, Ramin Yahyapour, “A Survey on Virtual Machine Migration:
13. Challenges, Techniques, and Open Issues, IEEE Communications Surveys & Tutorials, Vol. 20, No. 2, Second Quarter 2018.
14. P. G. J. Leelipushpam and J. Sharmila, “Live VM migration techniques in cloud environment—A survey,” in Proc. IEEE Conf. Inf.
Commun. Technol. (ICT), 2013, pp. 408–413.
15. Shribman A, Hudzia B Pre-Copy and post-copy VM live migration for memory intensive applications. In: Proceedings of the Euro-Par
2012: Parallel Processing Workshops: Springer; 2013. p. 539–47.
16. Xu et al., “iAware: Making live migration of virtual machines interference-aware in the cloud,” IEEE Trans. Comput., vol. 63, no. 12,
pp. 3012–3025, Dec. 2014.
17. T. Treutner and H. Hlavacs, “Service level management for iterative pre-copy live migration,” in Proc. 8th Int. Conf. Netw. Service
Manag., Las Vegas, NV, USA, 2012, pp. 252–256.
18. M. R. Hines, U. Deshpande, and K. Gopalan, “Post-copy live migration of virtual machines,” ACM SIGOPS Oper. Syst. Rev., vol. 43, no.
3, pp. 14–26, 2009.
19. Hu, L., Zhao, J., Xu, G., Ding, Y., Chu, J.,” live virtual machine migration based on hybrid memory copy and delta compression.” Appl.
Math. Inf. Sci. 7 (2L), 639–646, 2013
20. Jin, H., Deng, L., Wu, S., Shi, X., Pan, X., “ Live virtual machine migration with adaptive, memory compression” IEEE International
Conference on Cluster Computing and Workshops, pp. 1–10, 2009
21. Riteau, P., Morin, C., Priol, T.. “ improving live migration of virtual clusters over WANs with distributed data deduplication and content-
based addressing” In: Proceedings of the 17th International Conference on Parallel Processing - Volume Part I, Euro-Par’11. Springer-
Verlag, pp. 431–442,2011
22. Knauth, T., Fetzer, C., “Vecycle: recycling vm checkpoints for faster migrations.” In: Proceedings of the 16th Annual Middleware
Conference, Middleware ’15. ACM, pp. 210–221,2015
Authors: S. Sathyavathi, K. R. Baskaran, S. Kavitha
Paper Title: Non-Invasive Diabetes Mellitus Detection Using Facial Block Color
Abstract: Diabetes Mellitus (DM) is a condition in which glucose level in the body is much higher than the
normal. The traditional way to diagnosis DM is Fasting Plasma Glucose (FPG) test. As this method is slightly
painful and uncomfortable several another method which are more comfortable and non-invasive are found. In
this paper, we propose a new non-invasive method to detect DM based on facial block color features using
various classification algorithms. Facial images are first captured using a specially designed non-invasive device,
and calibrated to ensure consistency in feature extraction and analysis. Four facial blocks are extracted
automatically from face image and used to represent a face features. A facial color gamut is constructed with six
color centroids (red, yellow, light yellow, gloss, deep red, and black) to compute a facial color feature vector,
characterizing each facial block. Finally, the features are classified using J48. ForJ48, two sub dictionaries, a
Healthy facial color features sub dictionary and DM facial color features sub dictionary, are employed in the
classification process. Apart from this we also use ZeroR, Support vector machine (SVM)[8] ,J48 to determine
the accuracy, precision and recall using the data set that comprises of healthy and DM samples. Finally, we
68. compare all these algorithms and choose the efficient one using its accuracy level.
304-306
Keywords: Non-Invasive, Algorithm Efficiency, Health Enhancement

References:
1. A. Ganesh , A. Yang, J. Wright, S. Sastry and Y. Ma “Robust face recognition via sparse representation,” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 31, no. 2, pp. 210–227, Feb. 2009.
2. D. Zhang and X. Wang, “An optimized tongue image color correction scheme,” IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 6, pp.
1355– 1364, Nov. 2010.
3. B. Pang, D. Zhang and K. Q. Wang, “Tongue image analysis for appendicitis diagnosis,” Inf. Sci., vol. 175, no. 3, pp. 160–176, 2005.
4. I. Lemahieu , J. M. A. D. Naeyaert, W. Philips and Y. V. Haeghen , “An imaging system with calibrated color image acquisition for use
in dermatology,” IEEE Trans. Med. Imaging, vol. 19, no. 7, pp. 722–730, Jul. 2000.
5. R. Kenet et al., “Clinical diagnosis of pigmented lesions using digital epiluminescence microscopy,” Arch. Dermatol., vol. 129, pp. 157–
174, 1993.
6. T. Schindewolf et al., “Evaluation of different image acquisition techniques for a computer vision system in the diagnosis of malignant
melanoma,” J. Amer. Acad. Dermatol., vol. 31, no. 1, pp. 33–41, 1994.
7. B. Pang, D. Zhang , N. M. Li, K. Q. Wang, and Z. Zhang, “Computerized diagnosis from tongue appearance using quantitative feature
classification,” Amer. J. Chin. Med., vol. 33, no. 6, pp. 859–866, 2005.
Authors: N. Suganthi , N. Rajathi, Farithul Inzamam M
Paper Title: Elephant Intrusion Detection and Repulsive System
Abstract: Elephant intrusion causes a major problem like crop damage, human death and injuries. Elephant
Intrusion has been on the rise in the forest border areas with groups of elephants entering into human habitation
69.
and creating a heavy loss to grown plants in agriculture land and their properties. The surveillance and tracking
307-310
of elephants by humans alone may not always be effective. Mostly the elephants enter into the agriculture land in
the night. Detecting elephant intrusion and driving it back is very difficult by the farmers because human cannot
watch full night. So, we develop a system which detects the elephant intrusion, creates an alert and repel the
elephant away from human habitat. Elephant intrusion detection are useful to avoid human elephant conflict as
they stray into agriculture areas searching for food, resulting to economic losses and in extreme cases human
casualties. Hence a system to detect elephant intrusion into human habitat and to alert the habitat and forest
officials is essential.

Keywords: resulting to economic losses and in extreme cases human casualties.

References:
1. Dr. M. Prabhu “An Efficient Surveillance System to Detect Elephant Intrusion into Forest Borders Using Seismic Sensors”.
International Journal of Advanced Engineering Technology E-ISSN 0976-3945, volume-7, issue-1, january-march, 2016.
2. R. Maheshwari “Development of Embedded Based System to Monitor Elephant Intrusion in Forest Border Areas Using Internet of
Things”. International Journal of Engineering Research ISSN 2319-6890, volume-5, issue-7, july, 2016.
3. R. Hemalatha,T. Kanmani,C. Keerthana,S. Ponlatha,I. Selvamani “Detection And Prevention of Elephants Intrusion Into Crop Fields
Near Forest Areas”. International Journal Of Innovative Research In Technology,Science & Engineering(IJIRTSE) ISSN: 2395-5619,
volume-2, issue-6, june,2016.
4. S.J. Sugumar and R. Jayaparvathy “An Improved Real Time Detection System for Elephant Intrusion along the Forest Border Areas”.
The Scientific World Journal Article ID 393958, volume-2014, January, 2014.
5. S.J. Sugumar,and R. Jayaparvathy “Design of A Quadruped Robot for Human-Conflict Elephant Conflict Mitigation”. Artificial Life
and Robotics, Volume-18, December, 2013.
6. Rizki Dian Rahayani, Arif Gunawan, Agus Urip Ariwibowo “Implementation of Radio Frequency as Elephant Presence Detector for
the Human Elephant Conflict Prevention”. Innovative Systems Design and Engineering ISSN 2222-1727 (Paper) ISSN 2222-2871
(Online), Volume-5, Number-5, 2014.
7. V. Kanchana “Survey Paper on Elephant Tracking Using Acoustic Sensor”. International Journal of Science and Engineering
Development Research-IJSDR. ISSN: 2455-2631, Volume 1, Issue 3, March 2016.
8. R. Newlin Shebiah and B.Deeksha “Early Warning System from Threat of Wild Animals Using Raspberry Pi”. SSRG International
Journal of Electronics and Communication Engineering ISSN: 2348-8549, Special Issue, March 2017.
9. King, L. E., Lawrence, A., Douglas-Hamilton, I. and Vollrath, F., “Beehive fence deters crop-raiding elephants”. Afr. J. Ecol., 2009, 47,
131–137
10. Singh, A. P. and Chalisgaonkar, R., Restoration of corridors to facilitate the movement of wild Asian elephants in Rajaji–Corbett
elephant range, Irrigation Department, India, May 2006.
11. Venkataraman, A. B., Saandeep, R., Baskaran, N., Roy, M., Madhivanan, A. and Sukumar, R., Using satellite telemetry to mitigate
elephant–human conflict: an experiment in northern West Bengal, India. Curr. Sci., 2005, 88, 1827–1831.
12. Wijesinghe, L. et al., Electric fence intrusion alert system (eleAlert). In Global Humanitarian Technology Conference, IEEE
Conference, Seattle, WA, 2011, pp. 46–50.
13. Hao, Q., Brady, J., Guenther, B. D., Burchett, J. B., Shankar, M. and Feller, S., Human tracking with wireless distributed pyro electric
sensors. IEEE Sensors J., 2006, 6, 1683–1696.
14. Mainwaring, A. and Polastre, J., Wireless sensor networks for habitat monitoring. In WSNA’02, Atlanta, Georgia, USA, 28 September
2002.
15. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. and Rubenstei, D., “Energy-efficient computing for wildlife tracking: design trade-
offs and early experiences with ZebraNet”. In Special Issue: Proceedings of the 10th Annual Conference on Architectural Support for
Programming Languages and Operating Systems, San Jose, CA, December 2002, vol. 30.
16. Graham, M. D., Adams, W. M. and Kahiro, G. N., Mobile phone communication in effective human–elephant conflict management in
Laikipia County, Kenya. Oryx, 2012, 46, 137–144
17. Suganthi N, Arun R, Saranya D and Vignesh N “Smart Security Surveillance Rover”, International Journal of Pure and Applied
Mathematics, Vol. 116, No.12, 2017, 67-75.
18. V.Vanitha, V.P.Sumathi, J.Cynthia and B.Illakia, “Next Generation Vehicle Diagnostic Systems”, International Journal of Pure and
Applied Mathematics Volume 116 No. 112017,251-259.
Authors: Jeba N, Sudha V
Paper Title: A Comprehensive Survey on Waste Management and its Challenges
Abstract: Now-a-days waste management seems to be a challenge in every city right from its inception to
its disposal. Waste management involves the collection of waste from its source, transportation and its disposal at
the respective location. Garbage collections bins are flooded due to incremental increase in waste which emits
foul odour causing health hazards, diseases and environmental pollution. In this paper, we survey on the
mechanisms available for scientific collection and disposal of waste along with its challenges. From the
descriptive survey we analyse the present scenario in waste management. It is explicit that issues are prevailing
in policies and technologies available for the treatment and management of wastes and insufficient trained
manpower to collect, dispose and process the wastes.

Keywords: IoT, Waste Management, Smart City, Waste Disposal.

References:
70. 1. S. Balandin, S. Andreev, and Y. Koucheryavy, Internet of Things, Smart Spaces, and Next Generation Networks and Systems, vol.
9247, no. June. Cham: Springer International Publishing, 2015. 311-313
2. M. A. Al Mamun, M. A. Hannan, A. Hussain, and H. Basri, “Theoretical model and implementation of a real time intelligent bin status
monitoring system using rule based decision algorithms,” Expert Syst. Appl., vol. 48, pp. 76–88, 2016.
3. Sultana, P., Challa, S., Jayavel, S., "IOT based garbage monitoring system", IOT based garbage monitoring system, 2017, pp. 127 -
135.
4. C. Tao and L. Xiang, “Municipal solid waste recycle management information platform based on internet of things technology,” in
Proc. IEEE Int. Conf. Multimedia Inf. Netw. Secur., 2010, pp. 729–732.
5. Ravi Kishore Kodali; VenkataSundeep Kumar Gorantla, "Smart solid waste management", 3rd International Conference on Applied
and Theoretical Computing and Communication Technology (iCATccT), 2017, pp. 200 – 204
6. Shobana, G., Sureshkumar, R., "Automated garbage collection using GPS and GSM", International Journal of Pure and Applied
Mathematics, 2018, pp. 751 - 755.
7. P. Haribabu; Sankit R Kassa; J. Nagaraju; R. Karthik; N. Shirisha; M. Anila, "Implementation of an smart waste management system
using IoT", International Conference on Intelligent Sustainable Systems (ICISS), 2017, pp. 1155 – 1156
8. M. A. Al Mamun, M. A. Hannan, A. Hussain, and H. Basri, “Integrated sensing systems and algorithms for solid waste bin state
management automation,” IEEE Sens. J., vol. 15, no. 1, pp. 561– 567, 2015
9. V. Catania and D. Ventura, “An Approch for Monitoring and Smart Planning of Urban Solid Waste Management Using Smart-M3
Platform,” in Proceedings of 15th Conference of Open Innovations Association FRUCT, 2014, pp. 24–31.
10. B. Chowdhury and M. U. Chowdhury, “RFID-based real-time smart waste management system,” in 2007 Australasian
Telecommunication Networks and Applications Conference, 2007, pp. 175–180.
11. Al Mamun, M. A. Hannan, A. Hussain, and H. Basri, “Wireless Sensor Network Prototype for Solid Waste Bin Monitoring with Energy
Efficient Sensing Algorithm,” in 2013 IEEE 16th International Conference on Computational Science and Engineering, 2013, pp. 382–
387.
12. F.Reverter,M.Gasulla, and R. Pallas-Areny, “Capacitive level sensing for solid-waste collection,” in Proc. IEEE Conf. Sensors, 2003,
pp. 7–11.
13. F. Vicentini, A. Giusti, A. Rovetta, X. Fan, Q. He, M. Zhu, and B. Liu, “Sensorized waste collection container for content estimation
and collection optimization,” Waste Manage., vol. 29, no. 5, pp. 1467–1472, 2009.
14. Longhi, et al., “Solid waste management architecture using wireless sensor network technology,” in Proc. IEEE 5th Int. Conf. New
Technol. Mobility Secur., 2012, pp. 1–5.
15. A. Medvedev, P. Fedchenkov, A. Zaslavsky, T. Anagnostopoulos, and S. Khoruzhnikov, “Waste management as an IoT enabled service
in Smart Cities,” in Proc. IEEE 15th Int. Conf. Next Generation Wired/Wirel. Advanced Netw. Syst. 8th Conf. ruSMART, 2015, pp.
104–115.
16. M. Mes, M. Schutten, and A. Perez-Rivera, “Inventory routing for dynamic waste collection,” Waste Manage., vol. 34, no. 9, pp. 1564–
1576, 2014.
17. T. Anagnostopoulos and A. Zaslavsky, “Robust waste collection exploiting cost efficiency of IoT potentiality in smart cities,” in Proc.
IEEE 1st Int. Conf. Recent Adv. Internet Things, 2015, pp. 1–6.
Authors: S. Kavitha, K. R. Baskaran, S. Sathyavathi
Paper Title: Heart Disease with Risk Prediction using Machine Learning Algorithms
Abstract: Nowadays health connected issues are terribly high, and it can'tbe simply foretold earlier to avoid
complications. Wellness heart condition cardiopathycar diovascular disease} (HD) may be a common disease for
the individuals more matured cluster thirty-five to fifty. the sector of information mining has concerned within
the medical domain, With the historical knowledge, mining algorithms are able to predict and classify the
abnormality in conjunction with its risk levels. The previous studies related to predict heart problems have used
several features which has been collected from patients. The accuracy level of prediction and the number of
features is very less in the previous systems. To improve the prediction accuracy the planned system, consider
additional range of options and implements a Weighted Principle Analysis (WPCA) and changed Genetic
Algorithm(GA) The planned technique helps the medical domain for predicting HD with its numerous co-morbid
(types of heart diseases) conditions. The system has 2 main objectives, that are rising diagnosing accuracy and
reducing classification delay. The WPCA represents with the effective cacophonous criteria that has been applied
into the genetic Algorithm. The system effectively identifies the disease and its sub types, the sub type which is
referred as the level of class such as normal and mild or extreme.Using combinatorial methods from data mining
decision making has been simplified and the proposed work achieved 96.34% accuracy, which is higher than the
known approaches in the literature.

Keywords: Data mining, Classification, Weighted Principle Analysis (WPCA), Modified Genetic algorithm
(GA), Heart Disease.
71.
References: 314-317
1. Thomas, J., and R. Theresa Princy. "Human heart disease prediction system using data mining techniques." Circuit, Power and
Computing Technologies (ICCPCT), 2016 International Conference on. IEEE, 2016.
2. Wilson, Peter WF, et al. "Prediction of coronary heart disease using risk factor categories." Circulation 97.18 (1998): 1837-1847.
3. http://www.americanbusinessmag.com/2010/04/symptoms-of-a-heart-attack-2/
4. Palaniappan, Sellappan, and RafiahAwang. "Intelligent heart disease prediction system using data mining techniques." Computer
Systems and Applications, 2008. AICCSA 2008.IEEE/ACS International Conference on.IEEE, 2008.
5. Khaing, HninWint. "Data mining based fragmentation and prediction of medical data." Computer Research and Development (ICCRD),
2011 3rd International Conference on. Vol. 2. IEEE, 2011.
6. Patel, Ajad, Sonali Gandhi, SwethaShetty, and BhanuTekwani. "Heart Disease Prediction Using Data Mining." (2017).
7. Wghmode, MrAmol A., MrDarpanSawant, and Deven D. Ketkar. "Heart Disease Prediction Using Data Mining Techniques." Heart
Disease (2017).
8. http://archive.ics.uci.edu/ml/datasets/Heart+Disease
9. S.Kanagaraj, N.Rajathi, R.Brahmanambika, K.Manjubarkavi,, “Early Detection of Dengue Using Machine Learning Algorithms” ''
International Journal of Pure and Applied Mathematics " , Special Issue, February, 2018.
10. K.R. Baskaran, V. Vijilesh, R. Nedunchezhian and R.S. Kumar
“Combining Intelligent Web Caching with Web Pre-Fetching Techniques To Predict Tourist Places '', International Journal of Pure and
Applied Mathematics " Volume 116 No. 12 2017, 97-105
11. K.R.Baskaran, C. Kalaiarasan, “Improved Performance By Combining Web Pre-Fetching Using Clustering With Web Caching Based
On Svm Machine Learning Method”, International Journal of Computers Communications & Control, ISSN 1841-9836,Vol.11,
No.2, April 2016, pp. 166-177
12. K. R. Baskaran, C. Kalaiarasan, “Pre-Eminence Of Combined Web Pre-Fetching And Web Caching Based On Machine Learning
Technique”, Arabian Journal for Science and Engineering (Springer Journal), ISSN 1319-8025, Vol. 39, No.11, November 2014, pp.
7895-7906
Authors: Alamelu M Sindhuja, Balaji S
Paper Title: Automatic water Irrigation System Approach for Smart Homes
Abstract: In agriculture, irrigation plays an important role. Normally, we have many issues in irrigating the
plants. Over irrigation of plants leads to decay of plants and low irrigation of plants leads to retardation of crop
growth, late flowering. To overcome from this issues the proposed system define a method called Automatic
72. Irrigation system for Smart Homes (AI-SH). The proposed model build an automatic irrigation system approach
using Arduino in which moisture sensor senses the moisture content present in the soil. According to the 318-320
moisture content level water will be pumped to the soil by the DC motor. The sensor continuously monitors the
soil moisture content, when it reaches the required water tank level will be used for planting water and its water
level will be continuously monitored from an Ultrasonic sensor using distance value. If the range goes beyond
the certain level, then the system will send message notification to the user mobile. By this proposed AI –SH
approach the user can know the pouring method of water for home plants. If the user he/she are far away from
their home can also monitor the plant water easily and quickly.

Keywords: soil moisture sensor, ultra sonic sensor, motor driver circuit

References:
1. Abhishek Gupta , Shailesh Kumawat , Shubham Garg, “ Automatic Plant watering system ”, Imperial Journal of Interdisciplinary
Research (IJIR) Vol-2, Issue-4, 2016.
2. Ms. Deweshvree Rane, P. R. Indurkar, D. M. Khatri, “Review paper based on automatic irrigation system based on RF module”, IJAICT
Volume 1, Issue 9, January 2015
3. N.B. Bhawarkar, D.P. Pande, R.S. Sonone,Mohd. Aaquib , P.A. Pandit, and P. D.Patil,“Literature Review for Automated Water Supply
with Monitoring the Performance System”, International Journal of Current Engineering and Technology, Vol. 4, No. 5.2014.
4. Shaik. Kaja Rahamtulla, M.Harsha Priya, “Drinking Water Supply Control and Water Theft Identification System” , International Journal
of scientific research and management Volume1,Issue 9, PP. 483-487,2013.
5. Gowtham.R , Varunkumar.M.C, Tulsiram.M.P, “Automation in Urban Drinking Water Filtration, Water Supply Control, Water Theft
Identification Using PLC and SCADA and Self Power Generation in Supply Control System ”, International Journal of Advanced
Research in Electronics and Communication Engineering ,Volume 3, Issue 7, July 2014
6. M.Alamelu, Ramalatha Marimuthu, “A survey on healthcare and social network collaborative service utilization using internet of
things”, Vol.9,pp.1010-1030, Journal of Advanced Research in Dynamical and Control Systems,2017
7. M.Alamelu, A.M.J. Mohamed Zubair Rahman, “Evaluation of service transactions and selection of quality offered services in a business
environment”, American Journal of Applied Sciences Vol.11, Issue No.2,pp. 207-215, 2014.
8. M.Alamelu, S.Karthikeshwar, V.Deelipan, C.T.Gowtham, “Mismatch cancer colour prediction analysis on Big Data”, Research Script,
pp.4-7, 2016.
9. V.Senthil, M.Alamelu, A.M.J. Zubair Rahman, “Optimized Service Level Agreement Negotiation system for web services”,
International Journal of Computer Network and Security, Vol.4, No.1, 2012.
10. Ramalatha Marimuthu, M.Alamelu, “Driver fatigue detection using image processing and accident prevention”, International Journal of
pure and Applied mathematics, Vol.116, No.11, pp.91-99,2017.
11. M.Alamelu, T.S.Pradeep kumar , “ PERM based service prediction model for Ground water level analysis”, TAGA journal of
Technology, 1612-1621,2018
12. M.Alamelu, AMJ Zubair Rahman ,‘Validation and classification of web services using Equalization Validation Classification’ Journal of
Internet banking and commerce,Vol.17, Issue 3, pp.2-21,2012.
Authors: M. Suguna, D. Prakash, Cynthia. J
Paper Title: Secure Data Access Privacy Preserving using Cloud Services
Abstract: In spite of the tremendous computationaladvantages, outsourcing data to the public cloud is also
preventing customers’ direct control over the systems that use their data, which unavoidably brings in new
security challenges. Cloud computing gives numerous advantages and unparalleled convenience for the cloud
customers to get the on-demand access of cloud provided that the local infrastructure limitations need not be
taken into account. While accessing data, there may be a co-operative relationship among different users which
makes sharing and exchanging of information, a tedious process. The view of current security solutions is mainly
on authentication to apprehend that the data of an individual cannot be approached illegally, but there arose a
privacy issue when a user request for data sharing to other users through cloud server. The users’ privacy may be
exposed by challenged access request itself regardless of whether the data access permission for the user is
obtained or not. In the proposed system, a privacy-preserving authentication protocol is employed to prevent the
above privacy complications. In this technique, authority of data through shared access is achieved by the
process of sending anonymous access request which gives privacy to the cloud users. Access control is based on
attributes so that the cloud users can only access their own authorized data fields. Advanced encryption standard
algorithm is used to achieve data anonymity and data protection. The proposed method dealt with secure privacy
preserving data access authority is attractive for multiple-user in cloud real time storage.

Keywords: Cloud computing, authentication protocol,shared authority, privacy preservation, data anonymity.
73.
References: 321-324
1. K. Yang and X. Jia "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing", IEEE Trans. Parallel
and Distributed Systems, vol. 24, no. 9, pp.1717 -1726, 2013.
2. M. Nabeel , N. Shang and E. Bertino "Privacy Preserving Policy Based Content Sharing in Public Clouds", IEEE Trans. Knowledge and
Data Eng., vol. 25, no. 11, pp.2602 -2614, 2013
3. S. Sundareswaran , A.C. Squicciarini and D. Lin "Ensuring Distributed Accountability for Data Sharing in the Cloud", IEEE Trans.
Dependable and Secure Computing, vol. 9, no. 4, pp.556 -568, 2012
4. H. Wang "Proxy Provable Data Possession in Public Clouds", IEEE Trans. Services Computing, vol. 6, no. 4, pp.551 -559, 2012
5. Q. Wang , C. Wang , K. Ren , W. Lou and J. Li "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud
Computing", IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp.847-859 -25, 2011
6. L.A. Dunning and R. Kresman "Privacy Preserving Data Sharing with Anonymous ID Assignment", IEEE Trans. Information Forensics
and Security, vol. 8, no. 2, pp.402 -413, 2013
7. C. Wang , Q. Wang , K. Ren , N. Cao and W. Lou "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Trans.
Services Computing, vol. 5, no. 2, pp.220 -232, 2012
8. Y. Tang , P.C. Lee , J.C.S. Lui and R. Perlman "Secure Overlay Cloud Storage with Access Control and Assured Deletion", IEEE Trans.
Dependable and Secure Computing, vol. 9, no. 6, pp.903 -916, 2012
9. S. Ruj , M. Stojmenovic and A. Nayak "Decentralized Access Control with Anonymous Authentication for Securing Data in Clouds",
IEEE Trans. Parallel and Distributed Systems, vol. 25, no. 2, pp.384 -394, 2014
10. J. Chen , Y. Wang and X. Wang "On-Demand Security Architecture for Cloud Computing", Computer, vol. 45, no. 7, pp.73 -78, 2012
11. Y. Zhu , H. Hu , G. Ahn and M. Yu "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage", IEEE
Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp.2231 -2244, 2012
12. X. Liu , Y. Zhang , B. Wang and J. Yan "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud", IEEE Trans.
Parallel and Distributed Systems, vol. 24, no. 6, pp.1182 - 1191, 2013.

74. Authors: Suguna.M, Priyanga B, Prakash D.


Paper Title: Automated Generation of Question Answering System using Semantic Web
Abstract: Question answering system provides answer to user’s question according to the requirement.
Question answering used in Information Retrieval processing, Natural Language, Artificial Intelligence (AI),
Document Retrieval, Automatic evaluations. In QA system, once the question is posted by the client, the system
need to find meaning of the words such as synonyms and provide correct answer to the user. It is very difficult to
find answer from large collection of information available in Internet. The process involved in QA is question
generation, answer filtering and store in the database. The proposed approach is used to retrieve the answers for
the posted query in an efficient manner and reduce time consumption. WAD approach is used to analyze the
answer and rank the accuracy of the answer with the existing method.

Keywords: Answer Ranking, Natural Language Processing, Cloud, Named Entity Recognition, Information
Retrieval.

References:
1. West, R., Gabrilovich, E., Murphy K, Sun, S., Gupta, R.: Lin D, Knowledge base completion via search-based question answering. In:
ACM Proceedings of the 23rd international conference on World wide web, pp.515-526, (2016).
2. Rini Wongso, Meiliana, Derwin Suhartono.: Question AnsweringSystem using Named Entity Recognition. In: 3rd
Internationalconference on Information Tech.,Computer,and Electrical Engineering (ICITACEE), pp.19-21, (2016).
325-327
3. MdMoinul Hoque, Paulo Quaresma: A Content-Aware HybridArchitecture for Answering Questions from Open-domain Texts. In:19th
International Conference on Computer and InformationTechnology,pp.18-20, (2016).
4. Pooja, P., Walke, ShivkumarKarale: Implementation Approaches for Various Categories of Question Answering System. In: IEEE
Conference on Information and Communication Technologies, pp.8-15, (2015).
5. Soricut, R., Brill, E.: Automatic question answering using the web: Beyond the factoid. In: Journal of Information Retrieval-Special
Issue on Web Information Retrieval, Vol.9, pp.191-206, (2014).
6. PetrSosnin: Question-Answer Modeling in Conceptual Design of Automated Systems. In: IEEE MELECON, pp.16-19, (2012).
7. Lopez, V., Uren, V., Motta, E., Pasin, M., AquaLog: An ontology-driven question answering system for organizational semantic
intranets. In: Web Semantics: Science, Services and Agents on the World Wide Web, Vol.5, No.2, pp.72-105, ( 2013).
8. Lally, A., Prager, M., McCord, M., Boguraev, B., Patwardhan, S., Fan, S., Fodor, R., Chu-Carroll, J.: Question analysis: How watson
reads a clue. In: IBM Journal of Research and Development, Vol.56, No.3.4, pp.2-1, (2012).
9. Monahan, S., Lehmann, J., Nyberg, J., Plymale, J., Jung, A.: Cross-lingual cross-document conference with entity linking. In: TAC
2011 Workshop, (2011).
10. Hierschman, L.; Gaizauskas, R.: Natural Language question Answering. In: ACM proceedings of the Natural Language Engineering
vol7, No.4, pp 275-300, (2010).
11. Suchanek, F., Kasneci, G., Weikum, G.: Yago: a core of semantic knowledge. In: ACM proceedings on WWW, pp.697-706, (2011).
12. Babanne, V., Patil, S., Joshi, D.: Intelligent Question answering System. In: International Journal of Scientific & Engineering Research,
Volume 4, Issue 5, (2013).
13. Web site: www.searchdocs.net.
14. Web site:www.cs.cmu.edu/QA-data.
Authors: P. Shenbagam, N. Rajkumar
Paper Title: Predictive Analysis for Identifying the Relationship between Forest Cover and Tiger Population
Abstract: This paper analyzes the forest cover in India as a whole and also in terms of states. The species
growth with respect to the forest cover and the survival of species based on their Kingdoms of Classification is
studied. The dependencies between the forest covers of India with the flora of India is studied. With respect to
fauna, this paper discusses the state population of India’s national animal, Tiger and its relationship to the degree
of deforestation over years. This also studies the wasteland cover and the areas of improvement for the
betterment of Indian flora and vegetation. This also checks for relationships, dependencies and variations
between flora and fauna to obtain patterns for improving the Indian Ecosystem.

Keywords: environment, prediction analysis, forest cover, Deforestation, Tiger population

References:
1. C. Sudhakar Reddy, Kalloli Dutta and C. S. Jha, “Analyzing the gross and net deforestation rates in India”, Forestry and Ecology
Group, 2011.
2. Kaushik Das, Abhijit Guha Roy, “Landscaping of Random Forests through controlled deforestation”, Second National Conference
on Communication (NCC), 2016.
75. 3. Jean Francois Mas, Gabriela Cuevas, “Local Deforestation patterns in Mexico – An approach using geographically weighted
regression”, 1st International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM),
2015.
328-330
4. E. Menaka; S. Suresh Kumar; M.Bharathi, “Change detection in deforestation using high resolution satellite image with Haar
Wavelet Transforms”, International Conference on Green High Performance Computing (ICGHPC), 2013.
5. N. Rajathi, L.S. Jayashree, “Soil Moisture Forecasting Using Ensembles of Classifiers”, Springer, 2016.
6. [6]. Sreenivasan Narayanan, “Saving the Indian Tiger - A study on the effects of Wildlife (Protection) Amendment Act 2006 and
National Tiger Conservation Authority”, 2014.
7. [7]. Neil Carter, Simon Levinb, Adam Barlowc, Volker Grimmd, “Modeling tiger population and territory dynamics using an agent-
based approach”, Ecological Modelling, 2015.
8. [8]. Aditya Joshi, Srinivas Vaidyanathan, Samrat Mondol, Advait Edgaonkar, Uma Ramakrishnan, “Connectivity of Tiger (Panthera
tigris) Populations in the Human-Influenced Forest Mosaic of Central India”, PLOS Genetics, 2013.
9. [9]. C. Sudhakar Reddy Et al., “Quantification and Monitoring of Deforestation in India over Eight Decades”, Biodiversity and
Conservation, 2015.
10. [10]. Bibek Yumnam, Yadvendradev V. Jhala, Qamar Qureshi, Jesus E. Maldonado, Rajesh Gopal, Swati Saini, Y. Srinivas, Robert
C. Fleischer, “Prioritizing Tiger Conservation through Landscape Genetics and Habitat Linkages”, PLOS Genetics, 2014.
11. [11]. R. Anuradha, N. Rajkumar, “A Novel Approach in Mining Specialized Coherent Rules in a Level-Crossing Hierarchy”,
International Journal of Fuzzy Systems, 2017.
12. [12]. K.R. Baskaran, C. Kalaiarasan, “Improved Performance by Combining Web Pre-Fetching Using Clustering with Web Caching
Based on SVM Learning Method”, International Journal of Computers Communications & Control, ISSN 1841-9836, 11(2):167-
178, April 2016.
Authors: P. Devaki, S. Selvanayaki, R. Marudhachalam
Impact of Academic and Social Factors on the Academic Performance of First Year Engineering
Paper Title:
Student
Abstract: To study about the learning outcome and measuring the same has considerable amount of
complexity. Each student has his/her own way of learning pattern and every individual is prone to deviate from
learning because of the pace of distraction for them. This study focuses on measuring and assessing students
learning outcome. Assessment primarily starts with the measurement of outcomes. Measurable outcomes involve
student’s behavior / outcome, assessment method and criteria for success. Learning outcomes are measured with
student’s knowledge, skills, regularity in attending regular classes, daily activities / time spent on each activity
and values on completion of a courses/program. It can be measured directly or indirectly. This study will
formulate a strategy to improve the success rate of the students.

Keywords: outcomes, learning outcome, program outcome, assessment and students behavior

References:
1. Laura j. Pyzdrowski, Ye sun, Reagan Curtis, David Miller, Gary Winn and Robin A. M. Hensel, “Readiness and attitudes as indicators
for succession college calculus”, International journal of science and mathematics education (2013) 11:529y554, National science
council, Taiwan 2012 pp. 530-554.
2. Jamie c, Cavalier , James d, Kleinfrank j, Cavalie, “Effects of cooperative learning on performance, attitude, and group behaviors ina
technical team environment” , Etr&d, vol 43, no. 3, 1995, pp. 61- 71, ISSN 1042-1629.
3. Paul e. Brauchle, Joyce r. Mclarty, James Parker “A portfolio approach to using student performance data to measure teacher
effectiveness”, Journal of personnel evaluation in education 3:pp:17-30, 1989.
4. Darrell fisher & Tony Rickards, “Associations between teacher-student interpersonal behaviour and student attitude to mathematics”,
76. Mathematics education research journal 1998, vol. 10, no.1, 3-15.
5. A Russell SmithJr, Cathy Cavanaugh and W Allen Moore, “Instructional multimedia: An investigation of student and instructor
attitudes and student study behavior”, Smith et al. BMC medical education 2011, 11:38. http://www.biomedcentral.com/1472- 331-334
6920/11/38.
6. King-dowsu, “The effects of a chemistry course with integrated Information communication technologies on university students learning
and attitudes”, International Journal of Science and Mathematics Education (2008) pg : 225-249
7. M’hamed Tighezza, “Modeling relationships among learning, attitude, self-perception, and science achievement for grade
8Saudistudents”, International Journal of Science and Mathematics Education 2013.
8. Zareenzaidi, Tara jaffery, Afshanshahid, ShaheenMoin, AhsenGilani, William Burdick, “Change in action: using positive deviance to
mprove student clinical performance ”, Adv in Health SciEduc (2012) 17:pg: 95–105.
9. Neng-tang Norman Huang ,Li-Jia Chiu , Jon-chao Hong, “Relationship among students’ problem-solving attitude,perceived value,
behavioral attitude, and intention to participate in a science and technology contest”, International Journal of Science and Math
Education.
10. Alexander T. Jackson , Bradley J. Brummel , Cody L. Pollet , David D. Greer “An evaluation of interactive tabletops in elementary
mathematics education”, Education Tech Research Dev (2013) 61:311–332.
11. Kris M. Y. Law, KristijanBreznik, “Impacts of innovativeness and attitude on entrepreneurial intention: among engineering and non-
engineering students”, Int J Technol Des Educ, Doi 10.1007/s10798-016-9373.
12. ShiJerLou, YiHuiLiu, Ru Chu Shih ,Kuo Hung Tseng, “The senior high schoolstudents’ learning behavioral model of STEM in PBL” ,
Int JTechnolDes Educ (2011) 21:161-183, DOI 10.1007/s10798-010-9112, pp161–183.
13. Apostolos Mavridis, AikateriniKatmada, ThrasyvoulosTsiatsos, “Impact of online flexible games on students’ attitudetowards
mathematics”, Education Tech Research Dev.,DOI: 10.1007/s11423-017-9522-5.
14. SuleTasliPektas, FeyzanErkip “Attitudes of design students toward computer usage in design”, International Journal of Technology and
Design Education (2006) 16,pp 79-95, DOI: 10.1007/s10798-005-3175-0.
15. IndhuPriya S & Dr. Devaki P., 2017,"Evaluating Students Performance in Placements Activity-A Survey" in International Journal of
Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Vol.6, no. 1.
16. Indhu Priya S. & Dr. Devaki P, 2017, “ Performance Evaluation of Students Based on Skillset with Data Analytics”, International
Journal of Pure and Applied Mathematics, Vol. 118, No. 182018, Pg. 3937 – 3945.
Authors: Devaki.P, Renuka.T, Sridhevi.S
Paper Title: Fishermen Helping System
Abstract: The idea of this project is to prevent the fishermen’s boat from crossing the boundary while going to
the sea for fishing. When the boat is on board, its position is tracked and checked if it is crossing the border.
Once the boat is about to cross the safe border and enter into the prohibited zone, a notification is sent to the
control unit in the land and a buzzer is also set in the control unit. The control unit controls and turns the boat
into the safe side. This prevents the boat from crossing the country’s border and the fishermen and their boat can
also reach the shore safely. The position of the boat is tracked by using the GPS (Global Positioning System) and
every movement of the boat can be noted. By using a GSM module, the boat can be connected to the control unit
in the land. The position of boat is sent to the control unit using a GSM module via cloud. When the border is
crossed by the boat, the buzzer goes on in the control unit and the boat is immediately controlled.
77.
Keywords: GPS, GSM Module, Relay, Relay Driver. 335-338
References:
1. Dinesh Kumar R, Shubin Aldo M, J. Charles Finny Joseph, 2016, "Alert System for Fishermen Crossing Border using Android",
International Conference on Electrical, Electronics and Optimization Techniques, DOI link:
https://doi.org/10.1109/ICEEOT.2016.7755630
2. AmitKushwaha,VineetKushwaha, 2011,"Location Based Services using Android Mobile Operating System", International Journal of
Advances in Engineering & Technology, Vol. 1,Issue 1,pp.14-20
3. HYPERLINK "http://ieeexplore.ieee.org/search/searchresult.jsp?searchWithin=%22Authors%22:.QT.Majid%20A.%20Al-
Taee.QT.&newsearch=true"Majid
A. Al-TaeeHYPERLINK "http://ieeexplore.ieee.org/search/searchresult.jsp?searchWithin=%22Authors%22:.QT.Majid%20A.%20Al-
Taee.QT.&newsearch=true" , Omar B. Khade, Nabeel A. Al-Saber, 2007, "Remote Monitoring of Vehicle Diagnostics and Location
Using a Smart Box with Global Positioning System and General Packet Radio Service", International conference on Computer Systems
and Applications.
4. Etter, Costa, Broens, 2006,"A Rule-Based Approach Towards Context-Aware User Notification Services",International conference on
Pervasive Services.
5. PulathisiBandara, UdanaBandara, 2008,"A Practical Approach for Location-Aware and Socially-Relevant Information Creation and
Discovery for Mobile Users",IEEE International Symposium on Wireless Communication Systems.
6. Virrantaus, K. &Markkula, J, etal., 2001, "Developing GIS - supported location-based services",Second International conference on Web
Information Systems Engineering.
7. Y. Fujita, T. Nawaoka& E. Hirohata, 1988 ,"Development of a mapping and guidance database for automobile navigation
system",41stIEEE Vehicle Technology conference.
8. J.E. Bardram,2004, "Applications of Context-Aware Computing in Hospital Work-Examples and Design Principles", Proceedings of the
ACM Symposium on Applied Computing, Pg 1574 – 1579.
9. M. Shiels(2008), "Boom times ahead for mobile web" 2008. BBC News Report: http://news.bbc.co.uk/2/hi/technology/7522305.stm
10. R.G. Brown, P. W. McBurney, 1988. "Self-Contained GPS Integrity Check Using Maximum Solution Separation", Navigation/ Vol 35,
No 1.
11. Yi-Bing Lin, Yun-Wei Lin, Chung-Yun Hsiao, Shie-Yuan Wang, 2017, “Location–based IoT Applications on Campus”, Journal of
Pervasive and Mobile Computing, Vol 40, No. C, Pg 660-673.
12. Bin Guo,DaqingZhang, ZhuWang, ZhiwenYu, XingsheZhou, 2013 “Opportunistic IoT: Exploring the harmonious interaction between
human and the internet of things”, Journal of Network and Computer Applications Vol. 36, No 6, Pg 1531–1539
13. Louis Louw&Mark Walker, 2018, “Design and implementation of a low cost RFID track and trace system in a learning factory”,
Conference on Learning Factories - Advanced Engineering Education & Training forManufacturing Innovation, Science direct
14. Muhammad Tariq, HammadMajeed, Mirza Omer Beg, FarrukhAslam Khan,AbdelouahidDerhab, 2018, “Accurate detection of sitting
posture activities in a secure IoT basedassisted living environment”, Future Generation Computer Systems.
15. Devaki P, Illakiya J, Indumathi R, Arul Priya M 2017,“Geospatially and Literally Analysing Tweets”, Journal of Advanced Research in
Dynamical and control Systems, ISSN 1943-023X, Issue 14-Special Issue, Pg- 1002 -1009
Authors: M. Alamelu T. S. Pradeep Kumar
Paper Title: Unique Identical Weightage (UIW) Model for Real Time Customer Search Queries
Abstract: commerce systems plays the vital role in Information Technology and communication applications.
Compared to the technology of olden days, people now days buys their required products and services from the
online service transactions. Buying and selling products are frequently increasing factor for both the buyer and
seller. From the customer point of view searching of quality products with the consumable cost is a big
challenge. The proposed system Unique Identical weightage (UIW) system reveals about the customer searching
analysis using the weightage system approach. The UIS analysis system will track the identity of the customer
queries with respect to the searching categories. The proposed system will make the classification based on the
customer searching criteria. Ranking weightage is allotted based on the searching method and finally produce the
judgemental range of searching choices to the customer. The advantage of the system will provide quick
searching solutions to the customer. This method outperforms the existing system in reducing the time wasted by
a customer for searching a product.

Keywords: E Commerce, Weightage based system, Search Query, Identical Weightage system
78.
References:
1. Zhengbao Jiang, Zhicheng Dou, Member, Ji-Rong Wen, “ Generating query facts using knowledge Bases”, IEEE transactions on 339-342
knowledge and data engineering, vol. 29, no. 2, february 2017.
2. Jiaping Zhao, Laurent Itti, “Classifying time series using local descriptors with hybrid sampling” IEEE transactions on knowledge and
data engineering, vol. 28, no. 3, march 2016.
3. M.Alamelu, AMJ ZubairRahman ,‘Validation and classification of web services using Equalization Validation Classification’ Journal
of Internet banking and commerce,Vol.17, Issue 3, pp.2-21,2012.
4. Steven O. Kimbrough, Thomas Y. Lee, UlkuOktem, Modeling for Decision Support in Network-Based Services, vol. 42, pp. 196,
2012.
5. C. David Kreyenhagen, T. I. Aleshin, J. E. Bouchard, A. M. I. Wise and R. K. Zalegowski, "Using supervised learning to classify
clothing brand styles," 2014 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, 2014, pp. 239-
243.
6. M.Alamelu, RamalathaMarimuthu, “A survey on healthcare and social network collaborative service utilization using internet of
things”, Vol.9,pp.1010-1030, Journal of Advanced Research in Dynamical and Control Systems,2017
7. M.Alamelu, A.M.J. Mohamed ZubairRahman, “Evaluation of service transactions and selection of quality offered services in a
business environment”, American Journal of Applied Sciences Vol.11, Issue No.2,pp. 207-215, 2014.
8. JayakumarSadhasivam, Alamelu M, Radhika R, Ramya S, Dharani K and SenthilJayavel, “Enhanced way of securing automated teller
machine to track the misusers using secure monitor tracking analysis”,IOP Conf. Series: Materials Science and Engineering, 263, 2017.
9. M. Alamelu, S. Karthikeshwar, V. Deelipan, C. T. Gowtham, “Mismatch cancer colour prediction analysis on Big Data”, Research
Script, pp.4-7, 2016.
Authors: Shobana G, Vigneshwara B, Maniraj Sai A.
Paper Title: Twitter Sentimental Analysis
Abstract: In this current era, social media plays a important role in data exchange, sharing their thoughts.
Emotional Effect of a person maintains an important role on their day to day life. Sentiment Analysis is a
procedureof analyzing the opinions and polarity of thoughts of the person. Twitter is a main platform on sharing
the thought's, opinion and sentiments on different occasions. Twitter Sentimental Analysis is method of
analyzing the emotions from tweets (message posted by user in twitter). Tweets are helpful in extracting the
79. Sentimental values from the user. The data provide the Polarity indication like positive, negative or unbiassed
values. It is focused on the person’s tweets and the hash tags for understanding the situations in each aspect of 343-346
the criteria. The paper is to analyse the famous person’s id’s (@realdonaldtrump) or hash tags (#IPL2018) for
understanding the mindset of people in each situation when the person has tweeted or has acted upon some
incidents. The proposed system is to analyze the sentiment of the people using python, twitter API, Text Blob
(Library for processing text). As the results it helps to analysis the post with a better accuracy.

Keywords: (@realdonaldtrump), (#IPL2018), Text Blob (Library for Processing Text).


References:
1. Jansen,B.J.; Zhang,M.; Sobel,K.; and Chowdury,A. (2009), “Twitterpower: Tweets as electronic word of mouth”, Journal of the
American Society for Information Science and Technology 60(11):2169–2188.
2. Pak, A., and Paroubek, P (2010), “Twitter as a corpus for sentiment analysis and opinion mining”. In Proc. of LREC.
3. Pang, B., and Lee, L. (2008), ”Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval” 2(1-2):1–
135.
4. Wilson, T. Wiebe, J.; and Hoffmann, (P. 2009),”Recognizing contextual polarity: An exploration of features for phrase-level sentiment
analysis. Computational Li nguistics”, 35(3):399–433.
5. M Hu and B Liu. (2004),”Mining and summarizing customer reviews. KDD”.
6. L. Barbosa, J. Feng. “Robust Sentiment Detection on Twitterfrom Biased and Noisy Data”. COLING 2010: Poster Volume,pp. 36-44.
7. J. Kamps, M. Marx, R. J. Mokken, and M. De Rijke, “Using wordnet to measure semantic orientations of adjectives,” 2004.
8. Alec Go, Richa Bhayani, and Lei Huang. 2009. Twitter sentiment classification using distant supervision. Technical report, Stanford.
9. David Zimbra, M. Ghiassi and Sean Lee, “Brand-Related Twitter Sentiment Analysis using Feature Engineering and the Dynamic
Architecture for Artificial Neural Networks”, IEEE 1530-1605, 2016.
10. Varsha Sahayak, Vijaya Shete and Apashabi Pathan, “Sentiment Analysis on Twitter Data”, (IJIRAE) ISSN: 2349-2163, January 2015.
11. Peiman Barnaghi, John G. Breslin and Parsa Ghaffari, “Opinion Mining and Sentiment Polarity on Twitter and Correlation between
Events and Sentiment”, 2016 IEEE Second International Conference on Big Data Computing Service and Applications.
12. Mondher Bouazizi and Tomoaki Ohtsuki, “Sentiment Analysis: from Binary to Multi-Class Classification”, IEEE ICC 2016 SAC
Social Networking, ISBN 978-1-4799-6664-6.
13. Nehal Mamgain, Ekta Mehta, Ankush Mittal and Gaurav Bhatt, “Sentiment Analysis of Top Colleges in India Using Twitter Data”,
(IEEE) ISBN -978-1-5090-0082-1, 2016.
14. https://www.geeksforgeeks.org/twitter-sentiment-analysis-using-python.” Twitter Sentimental analysis for Realdonaldtrump” Devaki P,
Ilakiya, J, Indumathi, R and Arul Priya, M,
15. “Geospatially and literally analysing tweets”, Journal of Advanced Research in Dynamical and Control Systems Volume 9, Issue
Special Issue 14, 2017, Pages 1002-1009
Authors: Syed Ali Fathima S J, Jenice AromaR
Paper Title: Simulation of Fire Safety Training Environment using Immersive Virtual Reality
Abstract: The Real Time Environments that are very difficult and dangerous to practice can be simulated
using Virtual Reality (VR) and canbe used as a learning tool. The use of immersive VR supports to demonstrate
the three dimensional virtual environment in detail and helps the user to learn about the concepts of fire hazards
and practice escape mechanisms in fire surrounded situations. A game like interface techniques is used for VR
fire-safety training interaction in order to improve motivation for learning and were encouraged to explore the
virtual world. People interact with objects and navigate through environment that are virtually present with full
control using a VR controller which gives a feel of an active user. The identification of few fire hazards
circumstances at home and office environments are performed based on which a similar virtual environment is
designed to practice fire safety and escape techniques.A PASS training for fire extinguishers was included as a
core concept of the project. PASS stands for Pull, Aim, Squeeze and Sweep while using a fire extinguisher.
80. Knowing these techniques in times of trouble could be really helpful and mandatory.
347-350
Keywords: Fire Safety, Fire extinguishers, Immersive, PASS Training, Virtual Reality (VR), Game interface

References:
1. Smith, S. & Ericson, E. Virtual Reality (2009) 13: 87. https:// doi.org/10.1007/s10055-009-0113-6
2. Cha, M., Han, S., Lee, J., Choi, B., 2012. A virtual reality based fire training simulator integrated with fire dynamics data. Fire Saf. J. 50,
12–24.
3. U. Rüppel, K. Schatz, Designing a BIM-based serious game for fire safety evacuation simulations, Adv. Eng. Inform. 25 (4) (2011) 600–
611, http://dx.doi.org/10.1016/j.aei.2011.08.001.
4. H. Li, Z. Ma, Q. Shen, S. Kong, The virtual experiment of innovative construction operations, Autom. Constr. 12 (5) (2003) 561–575,
http:// dx.doi.org/10.1016/S0926-5805(03)00019-0.
5. https://www.ted.com/topics/virtual+reality , last accessed date 9.04.18
6. https://www.youtube.com/user/UnrealDevelopmentKit , last accessed date 9.04.18
7. https://www.osha.gov/SLTC/etools/evacuation/portable_use.html , last accessed date 9.04.18
Authors: Nishant Kaushik, Parveen Sultana H, Senthil Jayavel
Paper Title: Remote Authentication using Face Recognition with Steganography
Abstract: In today’s world securing data from the hackers and other unauthorized attackers is a critical task.
Almost all the system has some kind of authentication which allows the user to access their data. Most of these
system are limited to one layer of security like textual passwords. The authentication using textual password is
famous as it is straightforward. But the simplicity comes at the cost of vulnerability. These authentication
methods are prone to spyware and dictionary attacks. As the systems are becoming more powerful than ever, it is
easy to launch a dictionary attack. Another form of attack is to monitor the request and response between the
client and server. It is possible when the attacker has gained physical access to the communication medium.
81. Intruder just has to analyze the packets to figure out the delicate information such as password. There are many
networks that cannot afford any kind of breach. Steganography, the art of hiding the existence of message by
351-354
embedding the secret message into another medium, can be exploited in authentication system. Steganography
has emerged as technology with various applicationwhich introduced steganalysis, the process to detect the
hidden information. The user has to undergo face recognition as well as textual authentication. Since any of the
request and response between server and client will not have password in plain text form, it is not possible to
breach the password. The system is combination of face recognition and steganography.

Keywords: Remote Authentication, Steganography, Cryptography

References:
1. Vishnu S babu and Prof. Helen K J. “A Study on Combined Cryptography and Steganography:” International Journal of Research and
Studies in Computer Science and Engineering Volume 2, Issue 5, May 2015, PP 45 - 49 ISSN 2349 - 4840 (Print) & ISSN 2349 -
4859(online).
2. SnehaBansod and GunjanBhure, "Data Encryption by Image Steganography", International Journal of Information and Computation
Technology, ISSN 0974-2239, Volume 4, Number 5, 2014.
3. Sutaone, M.S., Khandare, M.V, “Image based steganography using LSB insertion technique”, IEEE WMMN, pp. 146-151, January
2008.
4. DushyantGoyal and Shiuh - Jeng Wang, “Steganographic Authentications in conjunction with Face and Voice Recognition for Mobile
Systems”.
5. JasleenKour ,DeepankarVerma , “ Steganography Techniques – A Review Paper” International Journal of merging Research in
Management &Technology ISSN: 2278 - 9359 (Volume - 3, Issue - 5) May 2014.
6. SumeetKaur, SavinaBansal, and R. K. Bansal., “Steganography and Classification of Image Steganography Techniques”. International
Conference on Computing for Sustainable Global Development.
7. Amr A. Hanafy, Gouda I. Salama and Yahya Z. Mohasseb “A secure covert communication model based on video steganography”
11331. 978 - 1 - 4244 - 2677 - 5 IEEE 2008.
8. NishantKaushik and Dr. Parveen Sultana. “Remote Authentication Using Face Recognition with Steganography”. Vol (02) _Issue (04)
April 2018.
Authors: Sasikumar C, Aswath C, Surendrakumar K, Suryaprakash A
Paper Title: Design and fabrication of a solar car
Abstract: The primary goal of this venture was to structure and create the Electric Solar Vehicle which is
intended for single-seated vehicle fuelled by 2 kW BLDC centre engine (motor). Electric sun oriented vehicle is
fabricated to improve a safe and Eco-friendly transportation. In the current scenario, due to increase in
population and usage of vehicles, the consumption of fossil fuels like petrol and diesel are keep on increasing.
Due to this, the availability of fossil fuel will reduce in turn to increase in demand and cost and it will be
exhausted in future. Because of this, it is necessary to find the alternate fuel to operate the vehicles. In the non
renewable energy sources, Solar energy is one which is freely available. Daylight is viewed as a wellspring of
vitality which can be utilized for many applications. Sun based vitality is being utilized to create power through
daylight. The fundamental segment to fabricate a sunlight based vehicle with a sun based board solar panel and a
battery to store the electrical vitality. The sun based cells gather a bit of the sun's vitality and store it into the
batteries of the solar based vehicle. After the vitality is stored in the batteries, it is accessible for use and the
engine and controller is made to drive the vehicle. There are two arrangements of batteries; one of which will get
the electrical vitality from the solar board to drive the engine and another will be utilized as helper control source
82. which will give expected capacity to other electrical gadgets being utilized in the vehicle. After that the engine
controller changes the measure of vitality that streams to the engine to compare to the throttle. The engine 355-357
utilizes that vitality to drive the wheels.

Keywords: BLDC Motor and controller, Batteries, Solar panel, Seamless pipes, Steering set, Tyres and brake
set.

References:
1. Asia’s biggest solar vehicle championship organised by Imperial
2. Society of Innovative Engineers (ISIE) releases 5th Electric Solar Vehicle Championship (ESVC) 2017-2018 Rulebook and we referred
the rules and regulations to fabricate our vehicle.
3. Sharma P, Vashistha S, Pal S, Parihar R S, Singh S, Garg S and Vishnoi A, ���Solar Powered Vehicle”, Imperial International
Journal of Eco-friendly Technologies, Vol. 1, issue-1 (2016), pp.209-212.
4. Singhal A, Shukla L, Gupta A, Iqbal M, Singh D and Gupta M K, “Solar Electric Powered Hybrid Vehicle”, Journal of Electronic
Design Technology, ISSN: 2229-6980 (online), , Vol. 6, Issue 3.
5. Wamborikar Y S, Sinha A, “Solar Powered Vehicle”, Proceedings of the World Congress on Engineering and Computer Science, San
Francisco, USA, Vol. II, WCECS 2010.
6. Vishal S, “Design analysis and manufacturing of new technology Solar Car”, International Research Journal of Engineering and
Technology (IRJET), e-ISSN: 2395-0056, Vol. 4, Issue 8, 2017.
Authors: P. Saravana Kumar, T. V. P. Sundararajan, J. Poornimasre
Paper Title: Fuzzy Based Estimation of Enhanced Colour Illumination for Digital Images
Abstract: Communication between living beings is more essential with the fundamentals of digital
forgeries to make an effort to develop a step by step procedure for image detection in a powerful way with the
use of various media elementary pictorial representation of any information can be easily manipulated using
editing software. Communication between users is carried by image transmission, in which major issue is
security that is without any alteration. Image forgery detection is technique for detecting any unauthorized
process in image. In compared with existing, use fuzzy classifier to accurate results for comparison instead
of SVM classifier. Weintroduced detection method against image splicing, that is joining of two different image
fragments. This detection is brought by using conflicting of illuminating colours in whole image. Using
83.
illuminate estimation, extracting features such as shape and colour of images and finally classified in Fuzzy logic
classifier. Performance of forgery detection is evolved as accuracy using testing process. From our experimental 358-361
results, conclude that high accuracy provided by extract combining shape and colour features of image,
which compared with other.

Keywords: Fuzzy classifier; Feature extraction; Segmentation; Illuminant map; SVM Classifier; Image forgery;

References:
1. Milletari, Fausto, Nassir Navab, and Seyed-Ahmad Ahmadi. "V-net: Fully convolutional neural networks for volumetric medical image
segmentation." 3D Vision (3DV), 2016 Fourth International Conference on. IEEE, (2016).
2. Chen, Liang-Chieh, et al. "Attention to scale: Scale-aware semantic image segmentation." Proceedings of the IEEE conference on
computer vision and pattern recognition. (2016).
3. Carvalho, Tiago, et al. "Illuminant-based transformed spaces for image forensics." IEEE transactions on information forensics and
security 11.4 (2016): 720-733.
4. Matsushita, Yasuyuki, et al. "Illumination normalization with time-dependent intrinsic images for video surveillance." IEEE
Transactions on Pattern Analysis and Machine Intelligence26.10 (2004): 1336-1347.
5. Maini, Raman, and Himanshu Aggarwal. "Study and comparison of various image edge detection techniques." International journal of
image processing (IJIP) 3.1 (2009): 1-11.
6. Melin, Patricia, et al. "Edge-detection method for image processing based on generalized type-2 fuzzy logic." IEEE Transactions on
Fuzzy Systems 22.6 (2014): 1515-1525.
7. Guyon, Isabelle, and André Elisseeff. "An introduction to feature extraction." Feature extraction. Springer, Berlin, Heidelberg, (2006):
1-25.
8. Abe, Shigeo. "Feature selection and extraction." Support Vector Machines for Pattern Classification. Springer, London, (2010): 331-
341.
9. Hordley, Steven D. "Scene illuminant estimation: past, present, and future." Color Research & Application: Endorsed by Inter‐Society
Color Council, The Colour Group (Great Britain), Canadian Society for Color, Color Science Association of Japan, Dutch Society for
the Study of Color, The Swedish Colour Centre Foundation, Colour Society of Australia, Centre Français de la Couleur 31.4 (2006):
303-314.
10. Finlayson, Graham D. "Corrected-moment illuminantestimation." Proceedings of the IEEE International Conference on Computer
Vision. (2013).
11. Zhao, Xudong, et al. "Passive image-splicing detection by a 2-D noncausal Markov model." IEEE Transactions on Circuits and
Systems for Video Technology 25.2 (2015): 185-199.
12. Tian, Shangxuan, et al. "Multilingual scene character recognition with co-occurrence of histogram of oriented gradients." Pattern
Recognition 51 (2016): 125-134.
13. Rahmani, Hossein, et al. "HOPC: Histogram of oriented principal components of 3D pointclouds for action recognition." European
conference on computer vision. Springer, Cham, 2014.
14. Lee, Woo-Young, Kwang-EunKo, and Kwee-Bo Sim. "Robust lip detection based on histogram of oriented gradient features and
convolutional neural network under effects of light and background." Optik-International Journal for Light and Electron Optics 136
(2017): 462-469.
15. Dalal, Navneet, and Bill Triggs. "Histograms of oriented gradients for human detection." Computer Vision and Pattern Recognition,
2005. CVPR 2005. IEEE Computer Society Conference on. Vol. 1. IEEE, (2005).
16. Oreifej, Omar, and Zicheng Liu. "Hon4d: Histogram of oriented 4d normals for activity recognition from depth
sequences." Proceedings of the IEEE conference on computer vision and pattern recognition. (2013).
17. Barron, Jonathan T., and Jitendra Malik. "Shape, illumination, and reflectance from shading." IEEE transactions on pattern analysis and
machine intelligence 37.8 (2015): 1670-1687.
18. Sun, Yi, et al. "Deepid3: Face recognition with very deep neural networks." arXiv preprint arXiv: 1502.00873 (2015).
19. Deng, Zhenyun, et al. "Efficient kNN classification algorithm for big data." Neurocomputing 195 (2016): 143-148.
20. Nascimento, Sérgio MC, Kinjiro Amano, and David H. Foster. "Spatial distributions of local illumination color in natural
scenes." Vision Research 120 (2016): 39-44.
21. Joze, Hamid Reza Vaezi, and Mark S. Drew. "Exemplar-based color constancy and multiple illumination." IEEE transactions on
pattern analysis and machine intelligence 36.5 (2014): 860-873.
22. Carvalho, Tiago, et al. "Illuminant-based transformed spaces for image forensics." IEEE transactions on information forensics and
security 11.4 (2016): 720-733.
23. Chen, Yushi, et al. "Deep feature extraction and classification of hyperspectral images based on convolutional neural networks." IEEE
Transactions on Geoscience and Remote Sensing 54.10 (2016): 6232-6251.
24. Azar, Ahmad Taher, and Aboul Ella Hassanien. "Dimensionality reduction of medical big data using neural-fuzzy classifier." Soft
computing 19.4 (2015): 1115-1127.
25. Camastra, Francesco, et al. "A fuzzy decision system for genetically modified plant environmental risk assessment using Mamdani
inference." Expert Systems with Applications42.3 (2015): 1710-1716.
26. Bagis, Aytekin, and Mehmet Konar. "Comparison of Sugeno and Mamdani fuzzy models optimized by artificial bee colony algorithm
for nonlinear system modelling." Transactions of the Institute of Measurement and Control 38.5 (2016): 579-592.
Authors: P. UvaDarshni, S.Monisha, K.Narrmadha
Paper Title: IOT Based Decision Support System for Agriculture Yield Enhancements
Abstract: In agriculture Expert systems are used in a wide range of operation. Farmers mostly depend on
agricultural specialists for decision making. These systems are used by farmers and others without the knowledge
of computerusage.In this paper we present the part of expert system in agriculture and its approaches in crop
production. It is a knowledge build system for information generation with existing knowledge. This supports
farmers in identifying economically strong decision for crop management. On considering the success of expert
system, various such systems were developed. IOT plays a key role in agriculture. The abstraction of IOT and its
architecture is discussed in this paper. Expert system builds on Internet of Things (IOT) uses the input data
gathered in real time is proposed in this paper. In this paper, an expert system in cloud based infrastructure is
used. IOT components such as &Cube (IOT Gateway) and Mobius (IOT service platform) are integrated in
proposed system. In the proposed system, Kalman filter (KF) is used in sensor node to minimize the noise in
sensor fusion. This paper illustrates the need of expert system in agriculture and the advantages of IOT based
84. farming.
362-366
Keywords: In the proposed system, Kalman filter (KF) is used in sensor node to minimize the noise in sensor
fusion

References:
1. “Expert System Applications: Agriculture”,AhmedRafea Central Laboratory for Agricultural Expert Systems P.O.Box 100 Dokki Giza
Egypt rafea@esic.claes.sci.eg.
2. AvneetPannu, (2015) “Survey on Expert System and its Research Areas”, International Journal of Engineering and Innovative
Technology (IJEIT) Volume 4, Issue 10, April 2015.
3. “The Applications Of WiFi-based Wireless Sensor Network In Internet Of Things And Smart Grid”, Li Li , Hu Xiaoguang, Chen Ke.
4. Design and Implementation of a Connected Farm for Smart Farming System,MinwooRyu, Jaeseok Yun, Ting Miao, Il-YeupAhn, Sung-
Chan Choi, Jaeho Kim.
5. 2008 “An Example of Agricultural Expert SystemsBeing Used in India” 1 Pinaki CHAKRABORTY, 2 Dr.Dilip Kumar
CHAKRABARTI.
6. G.N.R. Prasad, Dr. A. Vinaya Babu,(2006) ” A Study on Various Expert Systems in Agriculture”
7. RaheelaShahzadi ,JavedFerzund ,Muhammad Tausif , Muhammad AsifSuryani,(2016) ” Internet of Things based Expert System for
Smart Agriculture”,(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 9, 2016.
8. Wireless Sensor Network for Smart Irrigation and Environmental Monitoring: A Position Article Raul Moraisa , A. Valente b , and C.
Serôdio c IJSTE–International Journal of Science Technology &Engineering|Vol.1,Issue 5, November 2014| ISSN(online):2349-784X,”
9. Expert Systems In Agriculture: OVERVIEW” SaketMishra , B.Tech. Student Department of Information Technology, ASET, Amity
University, Noida.
10. RICEsmart: An Expert System to Enhance RiceYield”, Shailendra Kumar Yadav1 , Niraj Singhal2 andVivek Yadav3
11. Suhas M patil, Sakkaravarthi R, (2017) “INTERNET OF THINGS BASED SMART AGRICULTURE SYSTEM USING
PREDICTIVE ANALYTICS”.
12. Expert System for Agriculture Extension “ ,Sujai Das *, LaxmikantaNayak
13. Farm Operation Monitoring System with Wearable Sensor Devices Including RFID”, 1 Tokihiro Fukatsuand 2 Teruaki Nanseki.
14. Xian-Yi Chen, Zhi-Gang Jin ,(2012) “Research on Key Technology and Applications for Internet of Things”,2012 International
Conference on Medical Physics and Biomedical Engineering.
15. S. J. Yelapure , Dr. R. V. Kulkarni,(2012)“Literature Review on Expert System in Agriculture”, International Journal of Computer
Science and Information Technologies, Vol. 3 (5).
Authors: R. Sathish Kumar, R. Karthikamani, S. Vinodhini
Paper Title: Mathematical Morphology for Recognition of Hard Exudates from Diabetic Retinopathy Images
Abstract: Diabetic retinopathy is the most frequent form of diabetic eye disease. It will typically affects people
who have diabetes for a significant number of years. Retinopathy becomes particularly dangerous because it will
affect all diabetics and, increases the risk of blindness, when it is left untreated.To avoid total loss of sight the
ophthalmologist will treat the patients by sophisticated laser treatment,if detected effectively at an initial period.
One of the main symptoms of initial stage of diabetic retinopathy is analysis of Hard exudates. At the early stage,
using mathematical morphology the exudates are identified and removed.

Keywords: Diabetic retinopathy, Mathematical morphology, Fuzzy logic.

References:
1. Basha, S.S., Prasad, K.S.(2008)”Automatic detection of hard exudates in diabetic retinopathy using morphological segmentation and
fuzzy logic”, Int. J. Comput. Sci. Netw. Secur., 8, (12), 211–218
2. M.C Gillaes,. and T.Y.Wong. (2007). “Management of diabetic retinopathy: A systematic review”, “The Journal of the American
Medical Association, JAWA, 298(8), 902–916”.
85. 3. Gonzalez R.C., Eddins S.L.: “Morphological reconstruction from digital image processing using MATLAB”, “MATLAB Digest –
Academic Edition”. 367-370
4. H.F. Jelinek, C.Depardieu, ., Huang, W.,Cree, M.J.(2005) “Towards vessel characterisation in the vicinity of the optic disc in digital
retinal images”. “Image and Vision Computing Conf., 41–47”.
5. V.V. Kumari, N.S.Narayanan.(2010) “Diabetic retinopathy – early detection using image processing techniques”, Int. J. Comput. Sci.
Eng., 357–361.
6. NayomiGeethanjaliRanamuka, RavindaGayan N. Meegama, (2013) “Detection of hard exudates from diabetic retinopathy images using
fuzzy logic”, “IET Image Processing ·, ISSN 1751-9659”.
7. N.G. Ranamuka, R.G.N. Meegama (2013). “Detection of hard exudates from diabetic retinopathy images using fuzzy logic, Image
Processing, IET 7(2), 121-130”.
8. L.Xu, and S. Luo (2009). “Support vector machine based method for identifying hard exudates in retinal images, IEEE Youth
Conference on Information Computing and Telecommunication”.
9. Parivallal,R, Nagarajan,B, SathishKumar,R,(2012) “Zernike Feature Based Pattern Retrieval using Artificial Neural Network’ Indian
Journal of Engineering and Technology, Vol. 6 No 1 & 2”.
10. Sathish Kumar, R, Nagarajan, B &Karthikamani, R (2016), “Security Enhancement for Automated Captcha Recognition System in Web
Pages’, Transylvanian Review, vol. XXIV, no. 10, 1640-1645.”
11. Sathish Kumar, R, Nagarajan, B &Karthikamani, Dr. M. Gunasekaran, “Region-Based Object Extraction using Adaptive Neuro-Fuzzy
Inference System Combined with Support Vector Machine, Asian Journal of Research in Social Sciences and Humanities, Vol. 7, No. 2,
February 2017, pp. 412-427”.
Authors: R. Sathish Kumar, R. Karthikamani, S. Vinodhini
Paper Title: Mathematical Morphology for Recognition of Hard Exudates from Diabetic Retinopathy Images
Abstract: Diabetic retinopathy is the most frequent form of diabetic eye disease. It will typically affects people
who have diabetes for a significant number of years. Retinopathy becomes particularly dangerous because it will
affect all diabetics and, increases the risk of blindness, when it is left untreated.To avoid total loss of sight the
ophthalmologist will treat the patients by sophisticated laser treatment,if detected effectively at an initial period.
One of the main symptoms of initial stage of diabetic retinopathy is analysis of Hard exudates. At the early stage,
using mathematical morphology the exudates are identified and removed.

Keywords: Diabetic retinopathy, Mathematical morphology, Fuzzy logic.

86. References:
12. Basha, S.S., Prasad, K.S.(2008)”Automatic detection of hard exudates in diabetic retinopathy using morphological segmentation and 367-370
fuzzy logic”, Int. J. Comput. Sci. Netw. Secur., 8, (12), 211–218
13. M.C Gillaes,. and T.Y.Wong. (2007). “Management of diabetic retinopathy: A systematic review”, “The Journal of the American
Medical Association, JAWA, 298(8), 902–916”.
14. Gonzalez R.C., Eddins S.L.: “Morphological reconstruction from digital image processing using MATLAB”, “MATLAB Digest –
Academic Edition”.
15. H.F. Jelinek, C.Depardieu, ., Huang, W.,Cree, M.J.(2005) “Towards vessel characterisation in the vicinity of the optic disc in digital
retinal images”. “Image and Vision Computing Conf., 41–47”.
16. V.V. Kumari, N.S.Narayanan.(2010) “Diabetic retinopathy – early detection using image processing techniques”, Int. J. Comput. Sci.
Eng., 357–361.
17. NayomiGeethanjaliRanamuka, RavindaGayan N. Meegama, (2013) “Detection of hard exudates from diabetic retinopathy images using
fuzzy logic”, “IET Image Processing ·, ISSN 1751-9659”.
18. N.G. Ranamuka, R.G.N. Meegama (2013). “Detection of hard exudates from diabetic retinopathy images using fuzzy logic, Image
Processing, IET 7(2), 121-130”.
19. L.Xu, and S. Luo (2009). “Support vector machine based method for identifying hard exudates in retinal images, IEEE Youth
Conference on Information Computing and Telecommunication”.
20. Parivallal,R, Nagarajan,B, SathishKumar,R,(2012) “Zernike Feature Based Pattern Retrieval using Artificial Neural Network’ Indian
Journal of Engineering and Technology, Vol. 6 No 1 & 2”.
21. Sathish Kumar, R, Nagarajan, B &Karthikamani, R (2016), “Security Enhancement for Automated Captcha Recognition System in Web
Pages’, Transylvanian Review, vol. XXIV, no. 10, 1640-1645.”
22. Sathish Kumar, R, Nagarajan, B &Karthikamani, Dr. M. Gunasekaran, “Region-Based Object Extraction using Adaptive Neuro-Fuzzy
Inference System Combined with Support Vector Machine, Asian Journal of Research in Social Sciences and Humanities, Vol. 7, No. 2,
February 2017, pp. 412-427”.
Authors: R. Rajanandkumar, S. Ashokan
Paper Title: Mn2+-Doped with ZnS Nanoparticle Synthesized by Chemical Co-Precipitation Technique
Abstract: Manganese (Mn2+) ions doped with Zinc sulfide (ZnS) nanoparticles are synthesized by chemical
co-precipitation technique. The samples characterized by physical, optical and magnetic properties. XRD results
show the 2θ peaks that appear due to reflections from the (100), (002) and (101) cubic crystal planes of ZnS and
distinguished to be hexagonal wurtzite structure. At 700oC, ZnS is changed over into ZnO stage due to oxidation
reaction. The photoluminescence range of nanoparticles appears as wide glow in green visible region that shows
the possibility of creating photonic gadgets. The calculated bandgap (Eg) values is 2.3951 eV. Magnetic
hysteresis study of magnetic field (B) indicate the material has good magnetic property similar to intensity
magnetization permeability.

Keywords: Hysteresis Curve; XRD; Magnetic properties


87.
References:
1. S. Neeleshwar, C.L. Chen, C.B. Tsai, Y.Y. Chen, Phys. Rev. B 71 (2005) 201307. 371-373
2. N. Karar, F. Singh, B.R. Mehta, J. Appl. Phys. 95 (2004) 656.
3. S. Sapara, A. Prakash, A. Ghangrekar, N. Periasamy, D.D. Sharma, J. Phys. Chem. B 109 (2005) 1663.
4. W. Chen, V.F. Aguekian, N. Vassiliev, A. Yu. Serov, N.G. Filosofov, J. Chem. Phys. 123 (2005) 124707.
5. Z. Quan, Z. Wang, P. Yang, J. Fang, Inorg. Chem. 46 (2007) 1351.
6. R. Beaulac, P. I. Archer, D. R. Gamelin, J. Solid State Chem, 181 (2008) 1582.
7. J. Ge, J. Wang, H. Zhang, X. Wang, Q. Peng, Ya Li, Adv. Funct. Mater. 15 (2005) 303.
8. J.Z. Liu, P.X. Yan, G.H. Yue, J.B. Chang, D.M. Qu, R.F. Zhuo, J. Phys. D: Appl. Phys. 39 (2006) 2352.
9. Y.Q. Li, J.A. Zapien, Y.Y. Shan, Y.K. Liu, S.T. Lee, Appl. Phys. Lett. 88 (2006) 013115.
10. S.K. Mandal, A.R. Mandal, S. Das, J. Appl. Phys. 101 (2007) 114315.
11. S. Kar, S. Biswas, S. Chaudhuri, P.M.G. Nambissan, Nanotechnology 18 (2007) 225606.
12. J. Nogues, J. Sort, V. Langlais, V. Skumryev, S. Surinach, J.S. Muñoz, M.D. Baro, Phys. Rep. 422 (2005) 65.
13. O. Iglesias, A. Labarta, X. Batle, J. Nanosci. Nanotechnol. 8 (2008) 2761.
14. W G Peng, G W Cong, S C Qu and Z G Wang, nanotechnology 16, 1469 (2005).
15. Chen Jianfeng, Li Yaling, Wang Yuhong, Yun jmmy, and Cao Dapeng, Mater. Res. Bull. 39, 185 (2004).
Authors: J. Cynthia, C. Bharathi Priya, P. A. Gopinath
Paper Title: IOT based Smart Parking Management System
Abstract: In this fast-growing economy, the number of vehicle users increases exponentially demanding more
parking space. Pervasive presence of smart phone encourages users to prefer mobile application based solutions.
Growth of IoT has paved way for integration of mobile devices, wireless communication technologies and
mobile Applications. This paper proposes an IoT based Smart parking system that integrates with mobile
Application. It provides a comprehensive parking solution both for the user and owner of the parking space.
Features are provided for reserving a parking space, authenticating a reserved user, identifying nearest free space
depending on the size of the vehicle, navigating to the parking slot and computes accounts information on daily,
weekly and monthly basis. IR sensors are used to identify if a parking spot is free. Availability of a free slot with
its location information is transmitted using WIFI module technology, microcontroller and wireless
communication technology to the server and is retrieved though a mobile application. RFID tag attached to a
vehicle is used to authenticate a user who reserves the parking slot on a hourly, daily, weekly or monthly basis. A
scheduling algorithm is used to identify the nearest free slot based on the size of a vehicle. The owner of the
parking space can get the analytics of the number of free and available slots for a given period, the occupancy
88. rate on week days and weekend and the amount collected for a given period and can use it for fixing variable
parking fees. The mobile application is designed to provide rich customer experience. 374-379

Keywords: Smart Parking, IoT, Mobile Application, RFID, Analytics

References:
1. Supriya Shinde1, AnkitaM Patial2, pSusmedha Chavan3,Sayali Deshmukh4, and Subodh Ingleshwar5 “IOT Based Parking System
Using Google”, I-SMAC,2017,pp.634-636.
2. HemantChaudhary, PrateekBansal., B.Valarmathi,” Advanced CAR Parking System using Arduino”, ICACCSS, 2017.
3. Nastaran Reza NazarZadeh, Jennifer C. Dela,”Smart urban parking deducting system” ICSCE, 2016, pp-370-373.
4. PavanKumarJogada and VinayakWarad, “Effective Car Parking Reservation System Based on Internet of things Technologies
“.BIJSESC, 2016, Vol. 6, pp.140-142.
5. Prof. Yashomati R. Dhumal1, Harshala A. Waghmare2, Aishwarya S. Tole2, Swati R. Shilimkar2,”Android Based Smart Car Parking
System”-IJREEIE, Vol. 5, Issue 3, pp-1371-74,mar-2016.
6. Faiz Ibrahim Shaikh, Pratik NirnayJadhav, Saideep Pradeep Bandarakar” Smart Parking System based on embedded system and sensor
Network” IJCA, vol.140.pp.45-51.Apr-2016.
7. RicardGarra, Santi Martinez, and Francesc Seb’e” A Privacy-Preserving Pay-by-phone Parking system”IEEE-TVT, pp.1-10, Dec-2016.
8. Amir O. Kotb, Yao-chunShen, and Yi Huang “Smart parking Guidance, Monitoring and Reservation: A Review,” IEEE-ITSM, pp.6-
16.Apr-2017.
9. Ching-FeiYang, You-HueiJu, Chung-Ying Hsieh “Iparking -a real-time parking space monitoring and guiding system”, Elsevier, pp.301-
305. Apr-2017.
10. Fei-Yue Wang, Liu-Qing Yang, Fellow, Jian Yang,” Urban Intelligent Parking system based on Parallel Theory”, IEEE-ICNC, 2016.
11. Fei-Yue Wang, Liu-Qing Yang, Fellow, Jian Yang, [2016],” Urban Intelligent Parking system based on Parallel Theory”, IEEE-
Computing, Networking and Communications, Mobile Computing and Vehicle Communications.
12. TarekAlmahdi and chittrurivenkatratnum, [2016]”Intelligent automated parking System hacking intimation Features,”IEEE-computing
and engineering.
13. Huey-Der Chu, Yong-QuanYeh, Yi-Cheng Lin, Meng-hung Lai, Yi-Jie Lin, [2017],” The Study Intelligent Roadside Park Charging
Systems”, IEEE- International Conference on Applied System Innovation, pp.1064-67.
14. D.J.Bonde,”Automated car parking systemCommanded by Android application”, IEEE Conf., 05-03, Jan 2014.
15. YangengGeng, Christos G. Cassandras,” A new ‘Smart parking’ system Infrastructure and Implementation “, 1278- 1287 Science
Direct, Social and Science behavioural sciences, 2012.
16. M.AtaurRehman, M.M.Rashid, A. Farhana and N. Farhana, “Automatic parking management And parking fee collection based on
number Plate recognition”, International journal of Machine learning and Computing.
17. Norazwinawati Bashar Uddin, R. Yusnita, FarizaNorbaya,”intelligent parking space Detection system based on image processing”,
International Journal of Innovation, Management and Technology, 2012.
18. M. A. R. Sarkar, A. A. Rokoni, M. O. Reza, M. F. Ismail, “Smart parking system with image Processing facility”, I. J. Intelligent System
and Application, 2012.
19. F. Losilla, A.J Garcia-Sanchez, F. Garcia-Sanchez and J. Garcia- Haro, “On the Role of Wireless Sensor Networks in intelligent
Transportation Systems, ICTON, Pp. 2161- 2056, 2012.
20. J. Chinrungrueng, S. Dumnin and Pongthornseri, “I Parking: A Parking Management Framework”, 11th International
Conference on ITS Telecommunications, Pp.63-68, 2011.
21. Y. Hirakata, A. Nakamura, K. Ohno and M. Itami, “Navigations System using ZigBee Wireless Sensor Network for Parking”, 12th
International Conference on ITSTelecommunications, Pp. 605-609, 2012.
22. [http://www.laweekly.com/news/five-los-angeles-parking-secrets-and-111-places-to-park- google-map-4171416].
23. [https://socialcops.com/case-studies/data-collection-for-location-mapping-parking-lots-india/].
24. S. Senthil , M. Suguna , J. Cynthia, “Mapping The Vegetation Soil And Water Region Analysis Of Tuticorin District Using Landsat
Images”, IJIEST ISSN (2455-8494), Vol.03, No. 01, Jan 2018
25. C.BharathiPriya,,Dr.S.Siva Kumar, “ A survey on localization techniques in wireless sensor networks”, International Journal of
Engineering & Technology, 7 (1.3) (2018) 125-129
Authors: Vanith V, Sumathi VP, Soundariya V
Paper Title: An Exploratory Data Analysis of Movie Review Dataset
Abstract: The film industry plays a major role in the planetary or world-wide economy. It is the symbolic
contributor to the global economy. Every year more than hundreds to thousands of movies are released to the
public audience with the hope that the movies getting released will be the next block buster. According to the
movie industry statistics, six to seven movies out of ten movies gets unprofitable, only one third of the movie
gets success. The producers, studios, investors, sponsors in the movie industry are alike interested in predicting
the box office success of the movie. This paper work is on analysing the film genre, the release date around
holidays, the release month of movies, the languages and country with more movies from the movie review
dataset. There are attributes (country, languages, genre, movie release date, budget and revenue) taken from the
dataset and the derived attributes (release month of the movie derived from release date of movie and profit from
budget and revenue) is analysed to determine the movie performance. The analysed data is plotted in graphs for
89. statistical observation of the movie success.
380-384
Keywords: predicting box office success, block buster, film genre, genre count, release month, movie profit,
and movie review dataset.

References:
1. Quader, N., Gani, M. O., & Chaki, D. (2017, December). Performance evaluation of seven machine learning classification techniques for
movie box office success prediction. In Electrical Information and Communication Technology (EICT), 2017 3rd International
Conference on (pp. 1-6). IEEE.
2. Jain, V. (2013). Prediction of movie success using sentiment analysis of tweets. The International Journal of Soft Computing and
Software Engineering, 3(3), 308-313.
3. Vinodhini, G., & Chandrasekaran, R. M. (2012). Sentiment analysis and opinion mining: a survey. International Journal, 2(6), 282-292.
4. Basari, A. S. H., Hussin, B., Ananta, I. G. P., & Zeniarja, J. (2013). Opinion mining of movie review using hybrid method of support
vector machine and particle swarm optimization. Procedia Engineering, 53, 453-462.
5. Sumathi, VP, Kousalya, K, Vanitha, V, Cynthia, J, (2018), ‘ Crowd estimation at a social event using call data records’, Int. J. Business
Information Systems, Vol 28, No. 2, pp 446-461.
Authors: K. Saranya, S. Jayanthy
Paper Title: BCI based EEG Signals for Emotion Classification
Abstract: The human brain which is the central processing unit of the human machine is responsible for
multiple tasks such as perception, cognition, attention,emotion, memory and action. In human life emotions
significantly affect one’s wellbeing. Providing methodologies to access to human emotions would be a key for
successful human machine interaction. Understanding Brain Computer Interface (BCI) techniques to identify the
emotions also help in aiding people to interact with the world like a common man. Many techniques were
90. devised to identify the human emotions of which usage of EEG signals to classify the emotions as happiness,
fear, anger and sadness were found promising. These emotions are evoked by many means such as showing
385-389
subjects pictures of smile and cry facial expressions, by hearing to emotionally mixed audios or by watching
videos and at time combination of these.This paper is a survey of all the optimized methods to filter the EEG
signal and comparative study of the various classification methods used to classify the emotions is carried out
and a multimodal classification technique which makes use of EEG signals and at the same time efficiency is
measured with Natural Language Processing(NLP) is proposed for improving the accuracy.

Keywords: EEG signal, Emotion Classification, BCI, multimodal, NLP.


References:
1. Christiane Goulart, Javier Castillo, Carlos Valadão, TeodianoBastos, ElieteCaldeira,”EEG analysis and mobile robot as tools for
emotion characterization in autism,”from 5th Congress of the Brazilian Biotechnology Society (SBBIOTEC) Florianópolis, Brazil. 10-
14 November 2013.
2. HimaanshuGaubaa, Pradeep Kumara, ParthaPratimRoya, Priyanka Singh a,DebiProsadDograb, BalasubramanianRamana,”Prediction of
advertisement preference by fusing EEG response and sentiment analysis,”Department of Computer Science and Engineering,
Indian Institute of Technology, Roorkee, Neural Networks 92 (2017) 77–88.
3. NoppadonJatupaiboon, Setha Pan-ngum and PasinIsrasena,”Real-Time EEG-Based Happiness Detection System,”Department of
Computer Engineering, Faculty of Engineering, Chulalongkorn University, Bangkok 10330,Thailand, Hindawi Publishing
Corporation,TheScientificWorld Journal Volume 2013, Article ID 618649, 12 pages
4. Z. Khalili, M. H. Moradi,”Emotion Recognition System Using Brain and Peripheral Signals:Using Correlation Dimension to
Improve the Results of EEG” ,Proceedings of International Joint Conference on Neural Networks, Atlanta, Georgia, USA, June 14-19,
2009.
5. Robert Jenke, Angelika Peer, and Martin Buss,”Feature Extraction and Selection for Emotion Recognition from EEG”,IEEE
Transactions on affective computing, vol. 5, no. 3, july-september 2014.
6. Steven G. Masonand Gary E. Birch,” A General Framework for Brain–Computer Interface Design”, IEEE Transactions on neural
systems and rehabilitation engineering, vol. 11, no. 1, march 2003.
7. MandeepKaur , P. Ahmed, M. QasimRafiq"Technology Development for Unblessed People using BCI: A Survey" International
Journal of Computer Applications (0975 – 8887)
8. Gary Garcia Molina, TsvetomiraTsoneva, Anton Nijholt," Emotional Brain-Computer Interfaces"
9. TeodianoFreireBastos-Filho,AndreFerreira,AnibalCotrinaAtencio, Sridhar Arjunan,DineshKumar"Evaluation of Feature Extraction
Techniques in Emotional State Recognition", International Conference on Intelligent Human Computer Interaction, Kharagpur, India,
December 27-29, 2012
10. Mina Mikhail,Khaled El-Ayat, James A. Coan, John J.B. Allen,"Using minimal number of electrodes for emotion detection using
brain signals produced from a new elicitation technique" Int. J. Autonomous and Adaptive Communications Systems, Vol. 6, No. 1,
2013
11. Xiao-Wei Wang, Dan Nie, Bao-Liang Lu,"Emotional state classification from EEG data using machine learning approach "
Neurocomputing,Elsevier,2013
12. RohanHundia,"Brain Computer Interface-Controlling Devices Utilizing The Alpha Brain Waves" International journal of scientific
& technology research volume 4, issue 01, January 2015.
13. Saranya, K., Hema, M.S., Chandramathi, S.”Data fusion in ontology based data integration,” International Conference on Information
Communication and Embedded Systems, ICICES 2014
14. Saranya.K., Jayanthy.S, Machine Learning Techniques for Onto-based Emotional classification of text, International Journal of Pure and
Applied Mathematics,2018
Authors: K.Saranya, S. J. Syed Ali Fathima, Mohd N Azri Ismail
Paper Title: Enhancing Customer Engagement using Beacons
Abstract: Most of the people these days use mobile phones for almost everything. Many technologies have
been used in a smartphone which provides a variety of services like Social networking, payment, marketing etc.
A new way of marketing which uses BLE beacon technology can be incorporated with a mobile application
which is used to send personalized notifications to customers using the Indoor positioning system using Beacons.
Existing GPS can’t be used for Indoor Positioning System, as there are some shortcomings like power
consumption and also the accuracy of the system indoors due to obstructions to the satellite. RFID technology is
accurate indoors but the range is too small which is only up to 15 meters. To overcome this Beacon is used which
is a low-cost, low-energy transmitter equipped with Bluetooth Low Energy or BLE also known as Bluetooth 4.0
or Bluetooth Smart that can end proximity-based, context-aware messages over distances ranging from 15 cm to
70m.The Hardware used here is a beacon which transmits a signal which contains a Unique ID at regular
intervals which can be detected within a certain range. A custom Mobile App is developed which receives the
signal while in a certain proximity of the beacon and is programmed to calculate the distance. The Custom
Mobile App connects to a Web server which makes use of the Unique Id received along with the signal to
91. retrieve information corresponding to that Unique ID. The Web server contains a Database which keeps track of
all the Unique Id’s and the appropriate information corresponding to each Unique ID. 390-393

Keywords: Bluetooth Low Energy, Accuracy Positioning, Indoor Positioning, Radio map- based positioning,
Practical Path Loss Model

References:
1. 1.MyunginJi, Jooyoung Kim, JuilJeon, YoungsuCho.,”Analysis of Positioning Accuracy corresponding to the number of BLE beacons in
Indoor Positioning System”ISBN 978-89-968650-5-6
2. DalalZaim and MostafaBellafkih.” BLE based Geomarketing system” ISBN-978-1-5090-5781-8
3. The potential of Beacon technology (techcrunch.com/2014/11/01/unlocking-the-potential-of-beacon-technology/)
4. iBeacon Architecture(www.slideshare.net/johngifford/create-rich-mobile-apps-using-salesforce1-and-i-beacon
5. Beacon V. IOS 8.” Chain Store Age 90.5 (2014): 11A-13A. Business Source Complete.Web. 24 Sept. 2014.
6. Brousell, Lauren. “5 Things You Need To Know.” Cio (13284045) (2014): 18. Business Source Complete.Web. 24 Sept. 2014
7. Evans, Michelle. “The Rise of Beacon Technology and Prospects of it Displacing NFC (Part 2).” 1 November. 2013. Euromonitor
Interview Series. Elon University Belk Library,
8. O’Donnell, Fiona. “Marketing to Sports Fans – US.” July 2014. Mintel.Elon University Belk Library, Elon, NC. 24 Oct. 2014.
<http://academic.mintel.com
Authors: S. Kirubakaran, S. Karthick, S. P. Prakash
Paper Title: Increasing Privacy for Private Database in Cloud Environment
Abstract: After Personal computing, main frame and client server Cloud computing is a fifth generation
92. computing. It focuses on resource sharing and computations and is a network based environment. The data will
be stored enduringly information in servers on the internet and cached momentarily on clients. It has the 394-397
advantage of sinking cost by allocation of computing and resource storage. Azure, EC2 Application og Google,
Aneka are the processor that utilize for its operation for effective computations. The necessary resources are
utilized by user through the internet. The will be raise in confidentiality issue when provider depends on other
provider for resource utilizing. As there is no limits in cloud computing the data can be physically positioned
anywhere in the globe. Hence the problems regarding data authentication and privacy are in raise. The privacy
can be obtained by imposing access policy or by encrypting using cryptographic tools. Without leaking the
important information of the owner the safety can be made ensured by safeguarding from hackers. In this
proposed work a implementation authentication and authentication based on data access module and anonymity.
Programming is carry out using JAVA platform and back up management using MySQL and Advanced
Encryption Standard security algorithm is apply for ensuring security framework.

Keywords: Data Authentication, Anonymity, Encryption standard, Security.

References:
1. Garfinkel SL, “A less personal computer Technology Review”’, May 2010.
2. Stone, B. & Vance, A, “Companies slowly join cloud computing”’. New York Times, 2010.
3. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R. & Molina, J, “Controlling data in the cloud: outsourcing
computation without outsourcing control”, In Proceedings of the 2009 ACM workshop on Cloud computing security.
4. Shi, E., Bethencourt, J., Chan, T.H., Song, D. & Perrig, A., “Multi-dimensional range query over encrypted data”’ In IEEE Symposium
on Security and Privacy, 2007.
5. Sion, R. & Carbunar, B’ “On the computational practicality of private information retrieval”, In Proceedings of the Networkand
Distributed Systems Security Symposium 2007.
6. Rivest, R.L., Adleman, L. & Dertouzos, M.L., “On data banks and privacy homomorphisms”, Foundations of secure computation 1978..
7. Yao, A.C, “Protocols for secure computations”’ In IEEE 23rd Annual Symposium on Foundations of Computer Science.
8. Micciancio, D, “A first glimpse of cryptography's Holy Grail”’ Communications of the ACM, 2010.
9. Shen, E., Shi, E. & Waters, B, “Predicate privacy in encryption systems”’ In Theory of Cryptography Conference 2009.
10. Gentry, C. & Boneh, D, “A fully homomorphic encryption scheme”’ Stanford University 2009.
11. Goldreich, O, “Foundations of cryptography–A prime”’. Foundations and Trends in Theoretical Computer Science, 2005.
12. Sudha, M., Rao, D.B.R.K. & Monica, M, “A comprehensive approach to ensure secure data communication in cloud
environment”’ International Journal of Computer Applications 2010.
13. Pearson, S, “Taking account of privacy when designing cloud computing services”, In Software Engineering Challenges of Cloud
Computing, 2009.
14. Wang, J. & Le, J, “Based on private matching and min-attribute generalization for privacy preserving in cloud computing”, Sixth
International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010.
Authors: Yamunathangam, K. Pritheka, P. Varuna
Paper Title: IOT Enabled Air Pollution Monitoring and Awareness Creation System
Abstract: The air pollution rates now a days are drastically increasing in all the developed and the developing
countries which requires a more portable and cost effective solution. The proposed system includes the design for
monitoring air pollution and creating awareness among the public. This paper aims at using IOT along with
cloud to make the services real time and faster. The proposed system is installed in a particular locality where
there is acute air pollution. The level of each hazardous pollutant is monitored at periodic intervals. The Air
Quality Index (AQI) for the observed pollutants is determined and awareness is created among the public
through an android app which displays the level of each observed pollutant and also the air quality index in that
particular location. Thus the quality of air in that area can be understood by the public by viewing the
concentration of the gases in both numerical and graphical format. Further this system is to be extended in future
by allowing the public to register themselves in an app which pushes weekly or monthly air quality report
through message which reaches the user as a notification that is more comfortable in access.

Keywords: Arduino, hazardous pollutants, AQI, Thingspeak, Android

References:
93. 1. Kgoputjo Simon Elvis Phala, Anuj Kumar, and Gerhard P.Hancke, “Air Quality Monitoring System Based on ISO/IEC/IEEE
21451 Standards” ,IEEE Sensors Journal, Vol. 16, No. 12, June 15, 2016. 398-400
2. Khaled Bashir Shaban, Senior Member, IEEE, Abdullah Kadri, Member, IEEE, and Eman Rezk,“Urban Air Pollution Monitoring
System”,With Forecasting Models, IEEE Sensors Journal, Vol. 16, No. 8, April 15, 2016.
3. Ramagiri Rushikesh and Chandra Mohan Reddy Sivappagari, “ Development of IoT based Vehicular Pollution Monitoring System”,
International Conference on Green Computing and Internet of Things (ICGCIoT),2015.
4. Dongyun Wang, Chenglong jiang, Yongping Dian, “Design of air quality monitoring system based on internet of things”,10th
International Conference on Software, Knowledge, Information Management & Applications (SKIMA),2016.
5. Akshata Tapashetti and Divya Vegiraju, “IoT-Enabled Air Quality Monitoring Device - A Low Cost Smart Health Solution”,IEEE
Global Humanitarian Technology Conference,2016.
6. Navreetinder Kaur,Rita Mahajan ,Deepak Bagai, ” Air Quality Monitoring System based on Arduino Microcontroller”,International
Journal of Innovative Research in Science,Engineering and Technology Vol. 5, Issue 6, June 2016.
7. Marin B. Marinov, Ivan Topalov, Elitsa Gieva and Georgi Nikolov, “Air Quality Monitoring in Urban Environments”, 39th International
Spring Seminar on Electronics Technology (ISSE),2016.
8. Santosh G Bhandarakawathe, Prof.S. B. Somani, “A Survey on WiFi Based Air Pollution Monitoring System”, International Journal of
Innovative Research in Computer and Communication Engineering Vol. 5, Issue 3, March 2017.
9. Ch.V.Saikumar, M.Reji P.C.Kishoreraja , “IOT based Air Quality Monitoring system”,International Journal of Pure and Applied
Mathematics Volume 117 No. 9 2017, 53-57.
10. Neha R. Rewatkar,Prof. Deepali M. Khatri, “A Review: Cost Effective IOT Based Air Pollution Monitoring and Air Quality Analysis”,
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169,Volume: 5 Issue: 1,2017
11. Siva Shankar Chandrasekaran, Sudharshan Muthukumar and Sabeshkumar Rajendran, “Automated Control System for Air Pollution
Detection in Vehicles”, 4th International Conference on Intelligent Systems, Modelling and Simulation,2013.
Authors: V. Sudha, N. Jeba, R. Akiladevi
94. Paper Title: A Survey on the Modern Technologies used in Public Toilets
Abstract: In a country like India, where 60% of the world population do open defecation public toilets play a 401-402
vital role. Though now-a-days open defecation is reducing by the open toilets constructed by the government, the
maintenance of these toilets in hygienic manner is still an issue. The usage of the public toilets is reduced due to
the improper maintenance of the toilets and foul smell from it. Moreover, the peoples started using the open
places which leads to many health problems. One of the health issue caused is the diarrhoea. In India, this disease
kills one child per minute. Hence, the issue of maintenance of the public toilet has to be dealt seriously. In this
paper, we survey on the technologies proposed for modern public toilet facilities.

Keywords: Open Defecation, Open Toilets, Water, And Maintenance.

References:
1. S.Bilgi, O.Ozturk, A.G. Gulnerman, “Navigation system for blind, hearing and visually impaired people in ITU Ayazaga campus”,
ICCNI, IEEE Conference December 2017.
2. Cynthia J. and Sumathi Vembu, “Adaptive Service Discovery Protocol for Mobile Ad hoc Networks”, Eurpean Journal of Scientific
Research, Vol. 49, 6-17, 2011.
3. Dr Donata Dubber and Dr Laurence Gill, “Water saving technologies to reduce water consumption and waste water production in Irish
households”” STRIVE report.
4. J.Huang, S.Yu and H.Syu, “Development of the Smart Toilet Equipment with Measurements of Physiological Parameters”, UIC/ATC,
page 9-16, IEEE Computer Society, 2012.
5. F.Lan, G.Zhai, W.Lin,”Lightweight smart glass system with audio
aid for visually impaired people”, TENCON 2015, January.
6. M. Murati, “Factors of Host and Environmental that Affecting Behaviour of Open Defecation”, Thesis, Semarang Master Program of
Epidemiology School of Public Health Diponegoro University.
7. Kin Wai Michael Siu, “Design Quality of Public Toilet Facilities”, Int. J. Rel. Qual. Saf. Eng., 13, 341, 2006.
8. Kitisak Osathanunkul, K.Hantrakul, P.Pramokchon, P.Khoenkaw, N.Tantitharanukul, “Configurable automatic smart urinal flusher based
on MQTT protocol”, ICDAMT, 2017.
9. G.S.Nandakumar, V.Sudha and D.Aswini, “Fault detection in overhead power transmission”, IJPAM, volume 118, 377-381, 2018.
10. P.Panek, G.Edelmayer, Christian Daye and W.L.Zagler, “Concept and Evaluation Mehtodology of Adjustable Toilets for Old Persons
and People with Disabilities”, The 3rd European Medical and Biological Engineering Conference, EMBEC’05, Pg. 20-25, November
2005
11. Parth M. Sarode, “Design and Implementation of Automatic Flush System for Sanitation in Public Toilets”, JRBAT, Vol. II, Issue (7),
Nov 2015: 56-58.
12. http://www.indiawaterportal.org/articles/factors-affecting-toilet-adoption-rural-india
13. http://www.wrap.org.uk/sites/files/wrap/EN667R_v2_Feb_9_2009.pdf
14. https://www.digitaltrends.com/home/google-smart-bathroom-patent/
Authors: Aswini D, Guruprasath. J, Raghuselvapraveen. S
Paper Title: An Exploratory Data Analysis of Bowler’s Performance in IPL
Abstract: Indian premier league is one of the most popular cricket league. So, it attracts more cricket
admirers. Bowlers are the one of key players for the every team especially in twenty – twenty cricket. Their
performance change the match result. In this study, the bowler’s performance is analysed in every season of the
Indian Premier League (IPL). Performance parameters chosen are number of wickets, number of maiden overs
bowled, economy rate and number of boundaries. Among the various parameters, economy rate and wickets are
the significant for the match. We also analysed which bowler performed consistently and also whom performed
well in good batting pitch.

Keywords: wickets taken, maiden overs bowled, economy rate, consistent, bowler’s performance.

References:
95. 1. Prakash, C. D., Patvardhan, C., & Lakshmi, C. V. (2016). MAYO Index for Deep Analytics of Price and Performance of IPL
Players. International Journal of Computer Applications, 150(2). 403-406
2. Saikia, H., Bhattacharjee, D., & Lemmer, H. H. (2012). Predicting the performance of bowlers in IPL: an application of artificial neural
network. International Journal of Performance Analysis in Sport, 12(1), 75-89.
3. Kumar, A., & Sindhu, R. (2014). Reflecting Against Perception: Data Analysis of IPL Batsman.
4. Dey, P. K., Ghosh, D. N., & Mondal, A. C. (2011). A MCDM approach for evaluating bowlers performance in IPL. Journal of
emerging trends in Computing and Information Sciences, 2(11), 563-73.
5. Sankaran, S. (2014). Comparing Pay versus Performance of IPL Bowlers: An application of Cluster Analysis. International Journal of
Performance Analysis in Sport, 14(1), 174-187.
6. Khan, U. M., Kabir, Z., & Malik, A. W. (2015). Perception Model to Analyze Football Players' Performances. In PACIS (p. 146).
7. www.howstat.com/cricket/Statistics/Players/PlayerHomeAway.asp?
8. https://en.wikipedia.org/wiki/Indian_Premier_League
9. https://en.wikipedia.org/wiki/List_of_Indian_Premier_League_records_and_statistics
10. https://en.wikipedia.org/wiki/Icon_player
11. https://www.iplt20.com/
12. https://timesofindia.indiatimes.com › News › Sports News
13. www.cricbuzz.com/cricket-series/2430/indian-premier-league-2016/matches
Authors: Thiruvaazhi.U, Arthi.R
Paper Title: Threats to Mobile Security and Privacy
Abstract: Market research reports from Forrester estimates the global mobile penetration to be around 50% in
2017 and is forecast to reach 66% by 2022. In India, Mobile Internet Penetration using Smart Phone has reached
96. 36% as of 2016 from 0.1% in 1998. With the grand new push towards Digital India and low cash transactions,
mobile transactions including mobile payments have seen significant thrust in the recent times. Many startups as
407-412
well as major enterprises and government has been continually providing and promoting many mobile apps for
variety of transactions from multimedia messaging to digital payments. In this paper, we present a survey of the
threats and a clear demonstration of the risks of usage of mobile on security and privacy of the person using it
and his/her communications.
Keywords: Smart Phone has reached 36% as of 2016 from 0.1% in 1998.

References:
1. [Forrester, 2017] Forrester Report of SatishMeena and Sanjay Kumar, “Forrester Data: Mobile, Smartphone, And Tablet Forecast, 2017
To 2022 (Global)” accessed from
2. https://www.forrester.com/report/Forrester+Data+Mobile+Smartphone+And+Tablet+Forecast+2017+To+2022+Global/-/E-RES138971 ,
July 2017, Forrester
3. [Statista 2015] Statista Data on “Share of mobile phone users that use a smartphone in India from 2014 to2019 “accessed from
4. https://www.statista.com/statistics/257048/smartphone-user-penetration-in-india/ , 2015, Statista.com
5. [Symantec MTIR 2018]Symantec “Mobile Threat Intelligence Report 2017” accessed from
https://www.symantec.com/content/dam/symantec/docs/reports/mobile-threat-intelligence-report-2017-en.pdf, April 2018
6. [Symantec Q1 MTIR 2018] Symantec “Ten Years of (Hacking) iOS”, Q1 2017 Mobile Threat Intelligence Report from
7. https://www.symantec.com/content/dam/symantec/docs/reports/skycure-mobile-threat-intelligence-report-q1-2017-en.pdf , 2017
8. 5. [Symantec ISTR 2018] Symantec “Internet Security Threat Report 2018”, from
9. http://resource.symantec.com/LP=5538?cid=70138000000rm1eAAA , March 2018
10. 6. [Verizon MSI 2018] Verizon “Mobile Security Index 2018”, from
11. http://www.verizonenterprise.com/verizon-insights-lab/mobile-security-index/2018/ , 2018
12. 7. [Zimperium 2017], Zimperium Global Threat Report 2017 from
13. “https://go.zimperium.com/threat_report_q2_2017”,
14. 2017
15. 8. [McAfee MTR Q1 2018], “McAfee Mobile Threat Report Q1, 2018”, from
16. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2018.pdf , 2018
17. 9. G. Delac, M. Silic and J. Krolo, "Emerging security threats for mobile platforms," 2011 Proceedings of the 34th International
Convention MIPRO, Opatija, 2011, pp. 1468-1473.
18. 10. L.Latha, S.Thangasamy, “A robust person authentication system based on score level fusion of left and right irises and retinal
features”, Procedia Computer Science, Volume 2, 2010, Pages 111-120, ISSN 1877-0509, from
19. http://www.sciencedirect.com/science/article/pii/S1877050910003443.
20. 11. L Latha and S Thangasamy. “Providing multimodal biometric authentication using five competent traits”, The Imaging Science
Journal, Volume 61, Pages 212 – 218, Taylor & Francis, from
21. https://doi.org/10.1179/1743131X11Y.0000000033
Authors: Anandha Moorthy Appusamy, Prakash Eswaran, Madheswaran Subramaniyan
Investigation on Dry Sliding Wear Behaviour of Self-Lubricating Metal Matrix Composites
Paper Title:
Reinforced with Fly ash and Solid Lubricant
Abstract: The present study is focussed to explore the dominant factors on metal removal of self-lubricating
composite materials through rotating disc. The proposed composite material is reinforced with fly ash and Boron
Nitride. As referred with ASM standard AA2218 alloy is suitable for tribological applications. Composites
samples are processed by liquid metal stir casting route. AA2218 matrix alloy was reinforced with Five, Ten and
Fifteen weight percentage of fly ash as hard reinforcement particles and five percentages. Levels of Boron
Nitride as the second stage fortification particles in the composite material. Ninety percentage of hardness value
has been correlated with tensile strength of the composite material. The hardness of the amalgamated specimens
are experimented, test results shows that BHN values are significantly higher than the structural material. Dry
sliding wear behavior of test samples are experiment with pin-on-disc apparatus. Affecting parameters of load on
pin, weight level of support content and sliding speed on amount of wear was tested. Formation of trials through
DOE approach utilizing Taguchi technique was embraced to break down the exploratory outcomes. Because of
Taguchi investigation, mix of most appropriate qualities is accounted for. Motion to-commotion proportion and
examination of change (ANOVA) is been utilized to explore the impact of process parameters on wear rate.

Keywords: Wear, Hardness, ASM, Design of Experiment & Analysis of Variance.

97. References:
1. Rohatgi PK, Nikhil Gupta and Weiss D, “Applications of Fly-ash in Synthesizing Low Cost Metal Matrix Composites for Automotive
and other Engineering Applications”, Journal of Minerals, Metals and Materials society , (2006), Volume 58, Issue No.11, pp.71-76. 413-416
2. Radhakrishna K and Mahendra KV, “Fabrication of Al-4.5% Cu Alloy with Fly-ash Metal Matrix Composites and its
Characterization”, Material Science, (2007), Volume 25, Issue No.1, pp. 57-68.
3. Lefebvre LP, White B and Thomas Y, “Effects of Lubricants and Compacting Pressure on the Processability and Properties of
Aluminum P/M Parts”, Journal of Light Metals, (2002), Volume 2, pp. 239-246.
4. Venkateswaran S and Suresh N, “Influence of Cenosphere Fly ash on the Mechanical properties and Wear of permanent moulded euetic
Al-Si alloys”. Material Science, (2010), Volume 28, Issue No.1.
5. ŞenerKarabulut, “Optimization of surface roughness and cutting force during AA7039/Al 2O3 metal matrix composites milling using
neural networks and Taguchi method”, Measurement (2015), Volume 66, pp 139 - 149.
6. Kaushik & Singhal, “Wear conduct of aluminum matrix composites: A parametric strategy using Taguchi based GRA integrated with
weight method”, Cogent Engineering (2018).
7. Ulhas K. G.B. and Annigeri Veeresh Kumar, “Method of stir casting of Aluminum metal matrix Composites: A review”, Materials
Today, (2017), Volume 4, Issue 2, pp. 1140 – 1146.
8. Derby B and Walker JR, “Metal matrix composites: production by the stir casting method”, Journal of Material Processing
Technology, (1999), Volume 92-93, pp. 1-7.
9. MT.Sijo, “Analysis of Stir Cast Aluminium Silicon Carbide Metal Matrix Composite: A Comprehensive Review”, Procedia
Technology, (2016), Volume 24, pp. 379- 385.
10. Cappleman GR, “The interface region in squeeze-infiltrated composites containing &alumina fibre in an aluminium matrix”, J. Mater.
Sci., (1985), Vol. 20, pp. 2159-2168.
11. Inegbenebor AO, “Aluminum Silicon Carbide Particulate Metal Matrix Composite Development Via Stir Casting Processing”, Silicon,
(2018), Volume 10, Issue No. 2, pp. 343-347.
12. Zongyi M, Jing B and Yinxuan G, “Abrasive wear of discontinuous SiC reinforced aluminium alloy composites”, Wear, (1991),
Volume 148, Issue 1, pp. 287 - 293.
Authors: Nandakumar G. S, Viswanandhne S.
98.
Paper Title: A Survey on Item Selection Approaches for Computer Based Adaptive Testing
Abstract: Assessment is an essential part in determining the level of attainment of education. In spite of
availability of several formal and informal methods, Computer Based Assessment (CBT) is predominantly used
for very large scale assessments. Adaptive Testing has better estimation capabilities if the standard of its items
(questions) match the ability of the candidate. Items that are too simple or too difficult give unpredictable
reactions and can't give much information about the ability of the student. It is therefore essential to select items
from the large pool so that the selected item gives maximum information about the ability of the student. This
paper reviews the various methods for the item selection during the computerized adaptive testing.

Keywords: Computer Adaptive Testing, Item selection approaches.

References:
1. Richard M. Luecht and Stephen G. Sireci,” A Review of Models for Computer-Based Testing”, in College Board, ReSearch Report
2011-12
2. Mariana Lilley and Trevor Barker, “An Evaluation of a Computer Adaptive Test in a UK University Context”, University of
Hertfordshire, United Kingdom 417-419
3. Daniel R. Eignor, Martha L. Stocking, Walter D.Way, Manfred Steffen , “Case Studies In Computer Adaptive test Design through
Simulation”, Educational Testing service, NewJersey, November 1993
4. Mansoor Al-A'ali, “Implementation of an Improved Adaptive Testing Theory”, International Forum of Educational Technology &
Society (IFETS), ISSN 1436-4522,2007
5. Dr. V. Natarajan, “Basic Principles of IRT And Application to Practical Testing & Assessment”, in IACAT conferences at Amsterdam,
Asilomar (US),2008
6. Hua-Hua Chang and Zhiliang Ying, “a-Stratified Multistage Computerized Adaptive Testing With b Blocking”, in Sage Publication,
Educational Testing Service, Vol. 25 No. 4, December 2001, 333–341
7. Wim J. van der Linden, “Constrained Adaptive Testing with Shadow Tests”, Statisticsfor Social and Behavioral Sciences, DOI
10.1007/978-0-387-85461-8 2
8. Wei He,” Comparison of Four Item-Selection Methods for Severely Constrained CATs”, Northwest Evaluation Association
(NWEA),2013
9. Chingwei David Shin, YuehmeiChien, Walter Denny Way, Len Swanson,” Weighted Penalty Model for Content Balancing in CATS”, in
Pearson, April 2009.
10. Van der Linden, W. J. (1998). Bayesian item-selection criteria for adaptive testing. Psychometrika, 62, 201–216
11. Randall D. Penfield , Applying Bayesian Item Selection Approaches to Adaptive Tests Using Polytomous Items, 2006
Authors: K K Megavarthini, S Vignesh, S Paul Joshua, A P Gokulraj, V Indirakumar
Design and Implementation of Alert System for Monitoring the Ambient Temperature Using Cloud
Paper Title:
Computing In Hospital Regions
Abstract: The incubators in most of all the hospitals require a device for monitoring the ambient
temperature in order to ensure the prevention of illness or issues related to growth in new babies. The concept of
temperature monitoring is said to affect the environmental condition of the incubator based on several external
factors. The technique of cloud computing through Ubidots software can be used to analyze the variation in
temperature of the incubator. This also shows that the alert system can be incorporated for sensing the rise in
temperature and indicating the same to hospital users. The alert unit which has been developed and installed in
the hospitals are provided with an option to become beneficial for most of the patients.

Keywords: temperature monitoring; alert system; incubators; environmental condition; cloud computing;
hospital zones
99.
References: 420-422
1. Radu-Corneliu Marin, Radu-Ioan Ciobanu, Ciprian Dobre, "Improving Opportunistic Networks by Leveraging Device-to-Device
Communication", Communications Magazine IEEE, vol. 55, no. 11, pp. 86-91, 2017.
2. M. R. C. Trusca, S. Albert and M. L. Soran, "The benefits of data center temperature monitoring," 2015 Conference Grid, Cloud &
High Performance Computing in Science (ROLCG), Cluj-Napoca, 2015, pp. 1-3.
3. Daniel Rosner, Razvan Tataroiu, Laura Gheorghe, Razvan Tilimpea, "UNCHAIN - Ubiquitous Wireless Network Communication
Architecture for Ambient Intelligence and Health Scenarios", Secure Internet of Things (SIoT) 2014 International Workshop on, pp.
44-51, 2014.
4. Evangelos K. Markakis, Asimakis Lykourgiotis, Ilias Politis, Anastasios Dagiuklas, Yacine Rebahi, Evangelos Pallis, "EMYNOS:
Next Generation Emergency Communication", Communications Magazine IEEE, vol. 55, no. 1, pp. 139-145, 2017.
5. C. Cesar Medeiros Davi, D. Silva Silveira and F. Buarque de Lima Neto, "A Framework Using Computational Intelligence Techniques
for Decision Support Systems in Medicine," in IEEE Latin America Transactions, vol. 12, no. 2, pp. 205-211, March 2014.
6. Ubidots : IoT platform - Internet of Things, http://help.ubidots.com/iot-projects-tutorials
7. Lisha Yu, Wai Man Chan, Yang Zhao, Kwok-Leung Tsui, "Personalized Health Monitoring System of Elderly Wellness at the
Community Level in Hong Kong", Access IEEE, vol. 6, pp. 35558-35567, 2018.
Authors: A. Parvathy Karthika, V. Gayathri
Paper Title: Experimental Studies on Durability Aspects of High Strength Concrete using Flyash and Alccofine
Abstract: The experimental work is to study the influence of FLY ASH and ALCCOFINE 1203 in achieving
High Strength Concrete (HSC). This study analyses the performance of various combinations of concrete in
which cement is partially replaced with 30% fly ash with different proportions of alccofine of grade 1203, micro
fine silica includes 0%, 4%, 8%, 12% respectively. Super plasticizer Conplast SP430 of 1.5% for every specimen
100. is added in order to improve the workability of the mix. Specimens are casted for M 60 grade as per mix design
using manufactured sand (M sand) as fine aggregate. Durability tests conducted includes rapid chloride 423-427
penetration test, water absorption test, carbonation test and water permeability test. Scanning electron
microscopic analysis was carried out to determine the development of micro structural configuration of the
concrete.

Keywords: High Strength Concrete, Rapid Chloride Penetration Test, Water Absorption Test, Carbonation
Test, Water Permeability Test, and Scanning Electron Microscopy.

References:
1. Alok Kumar, Oshin Parihar, Rahul Chaudhary, ShivPrakash Singh, (2016) “Use of Alccofine 1206 to achieve high strength durable
concrete” SSRG-International Journal of Civil Engineering, vol. 3 Issue 5
2. IS 3812(PART I):2013 " Specification for Pulverized Fuel Ash, Part 1: For Use as Pozzolana in Cement, Cement Mortar and Concrete"
3. IS: 516 – 1959" Method of Tests for Strength of Concrete"
4. IS40311988" Methods of physical tests for hydraulic cement"
5. IS 2386(PART 3)" Methods of test for aggregates for concrete"
6. IS 383: 1970 "Specification for coarse and fine aggregate from concrete for natural resources"
7. M.S. Shetty "concrete technology".
8. Saurabh Gupta, Sanjay Sharma, Devinder Sharma (2015) “A Review on Alccofine : A supplementary cementitous material”
International Journal of ModernTrends in Engineering and Research vol. 2 Number 8.
9. Swamy, (1999) “Role of Slag in the development of Durable and Sustainable High Strength Concretes" proceedings of International
Symposium on concrete technology for sustainable development in the 21s Century, Hyderabad, pp. 186-121.
10. Yatin Patel, Shah B. K., Patel P. J, (2013) “Effect of Alccofine 1203 and Fly Ash Addition on the Durability of High Performance
Concrete” International Journal of Scientific Research and Development, Vol. 1, Issue 3, ISSN (online) 2321-0613.
Authors: C. Maheswari, E.B.Priyanka, S.Thangavel, P. Parameswari
Paper Title: Development of Unmanned Guided Vehicle for Material Handling Automation for Industry 4.0
Abstract: In the current scenario, the industries are implementing automation in every field works. Industries
are trying to reduce the labor cost and processing time which is taken by the human. This proposed work will be
helpful for handling the materials efficiently. That is, for picking the raw materials from the storehouse and
carrying it on the vehicle and transporting to the workshop where it is being machined. To replace the labor cost
and to reduce the processing time, this type of vehicle can be used. The UGV picks the raw materials that had to
be machined from the storehouse to the workshop where the machining processes are done. ARDUINO UNO R3
ATMEGA 328P controller is the heart of the system which controls the vehicle movement and arm actuation.
The robotic arm consists of 5 servo motors with the gripper at its end. The vehicle with three wheels is helpful
for carrying the materials from one place to another place. Three IR sensors are used for detecting the black line
on which the vehicle has to move. Sensor 1 and 2 are used for sensing the black line. Whenever it is sensed the
vehicle has to move forward or left or right. The third sensor indicates the storehouse or the workshop. When the
robot reaches the storehouse, which is indicated by the third IR sensor, the vehicle stops and ARDUINO UNO
R3 actuates the arm and simulates it to carry the goods. The vehicle automatically starts and carries it to the
workshop without any human interruptions. Hence, the proposed project is useful for carrying and transporting
the raw materials and finished goods efficiently with the less consumption of time. This research includes the
robotic arm with a gripper, an Autonomous vehicle with three wheels, ARDUINO UNO R3 controller, Motor
driver, three InfraRed sensors (IR) and Single-Mode Power Supply (SMPS).

Keywords: Unmanned guided vehicle, Robotic arm, ARDUINO UNO R3 ATMEGA 328P, Material
Handling+

101. References:
1. I.F.A. Vis. "Survey of research in the design and control of automated guided vehicle systems," European Journal of Operational 428-432
Research, 2006, vol. 170, pp. 677–709.
2. T.Ganesharajah, N.G. Hall,and C. Sriskandarajah. “Design and analysis of operational issues in AGV-served manufacturing systems,”
Annals of Operation Research, 1998,vol.76, pp.109-154.
3. A. Kelly, B. Nagy, D. Stager,and R. Unnikrishnan. “An infrastructure-free automated guided vehicle based on computer vision,” IEEE
Roboticsand Automation Magazine, 2007, vol. 14, pp. 24-34.
4. Chen C, Wang B and Ye Q T. “Application of automated guided vehicle (AGV) based on inductive guidance for the newsprint rolls
transportation system,” J. of Dong Hua Univ. (Engl. Ed.), 2004, Vol. 21, pp. 88-92.
5. F. Tomoya, O. Jun, A. Tamio et al."Semi-guided navigation of AGV system through iterative learning techniques" IEEE international
conference on intelligent robotics system.,2001,vol.2, pp.968-973.
6. G Beccari, S Caselli, F Zanichelli and et al. “Vision-based line tracking and navigation in structured environments,” IEEE Int.
Symposium on computational intelligence in robotics and automation, 1997, pp. 406-411.
7. C.Maheswari, E.B.Priyanka, B.Meenakshipriya, Fractional order based PID controller tuned by coeffiecient diagram method and PSO
algorithms for SO2 emission control process, Journal of system and control engineering,2017, vol.231,pp.587-589.
8. Priyanka E.B, C.Maheswari, Parameter monitoring and control during petrol transportation using PLC based PID controller, Journal of
Applied Research and Technology, 14 (5)(2016) 125-131.
9. Priyanka E.B, C. Maheswari, S. Thangavel, Remote monitoring and control of an oil pipeline transportation system using a Fuzzy-PID
controller, Flow Measurement and Instrumentation, (2018) Article in press. https://doi.org/10.1016/j.flowmeasinst.2018.02.010.
10. P.Parameswari, Dr.M.Manikantan 2017,’Geo-Intelligence System: A Frame work for agricultural improvements’, International Journal
of Pure and Applied Mathemetics, vol 116,no 12,pp 117-125.
11. Parameswari, P, Abdul Samath, J &Saranya, S 2015, ‘Efficient birchclustering algorithm for categorical and numerical data using
modified co-occurrence method’, International Journal of Applied Engineering Research, vol. 10, no. 11, pp. 27661-27673.
12. Parameswari, P, Abdul Samath, J &Saranya, S 2015, ‘Scalable Clustering Using Rank Based Preprocessing Technique for Mixed Data
Sets Using Enhanced Rock Algorithm’, International Journal of Advanced Research in Computer Science and Software Engineering, vol.
5, no. 5, pp. 1327-1334.
13. Wu X, Lou P H and Tang D B. “Integrated motion control of path tracking and servo control for an automated guided vehicle,” Chinese
J. of Mech. Eng., 2011, vol. 47, pp. 43-48.
14. T. Deyle, N. Hai, M. S. Reynold et al. “ RFID based guided robots for pervasive automation” IEEE Pervasive Computer, 2010, vol.9,
pp.37-45.
Authors: Kiruthikaa K V, Vijay Franklin J, Yuvaraj S
Analysis of Prediction Accuracy of Heart Diseases using Supervised Machine Learning Techniques
Paper Title:
102. for Developing Clinical Decision Support Systems
Abstract: Heart diseases are taking on hands as the vital mortality deciding factor in the current era. Most of
433-437
the people around the world are experiencing a time-scheduled and stressful work life, which often leads to
increase in the percentage of healthy people affected by heart diseases. It is mandatory to solve this raising issue
by predicting the occurrence of the disease as earlier as possible with the help of variety of available solutions.
Machine learning techniques can be applied to analyze and predict whether a person is likely to have heart
disease or not. In this paper, we made a detailed investigation on prediction accuracy rate of heart diseases using
different supervised machine learning techniques, which will pave the way for researchers to choose the efficient
technique(s) in order to design and develop clinical decision support systems that predicts the occurrence of heart
diseases in people efficiently.

Keywords: Heart Disease, Machine Learning, Prediction Accuracy, Clinical Decision Support Systems

References:
1. T. S. Brisimi, T. Xu, T. Wang, W. Dai, W. G. Adams and I. C. Paschalidis, "Predicting Chronic Disease Hospitalizations from
Electronic Health Records: An Interpretable Classification Approach," in Proceedings of the IEEE, vol. 106, no. 4, pp. 690-707, April
2018.
2. J. Zhang et al., "Coupling a Fast Fourier Transformation with a Machine Learning Ensemble Model to Support Recommendations for
Heart Disease Patients in a Telehealth Environment," in IEEE Access, vol. 5, pp. 10674-10685, 2017.
3. R. G. Saboji, "A scalable solution for heart disease prediction using classification mining technique," International Conference on
Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017, pp. 1780-1785.
4. S. Pouriyeh, S. Vahid, G. Sannino, G. De Pietro, H. Arabnia and J. Gutierrez, "A comprehensive investigation and comparison of
Machine Learning Techniques in the domain of heart disease," IEEE Symposium on Computers and Communications (ISCC), 2017,
pp. 204-207.
5. T. Karayılan and Ö. Kılıç, "Prediction of heart disease using neural network," International Conference on Computer Science and
Engineering (UBMK), 2017, pp. 719-723.
6. K. Pahwa and R. Kumar, "Prediction of heart disease using hybrid technique for selecting features," 4th IEEE Uttar Pradesh Section
International Conference on Electrical, Computer and Electronics (UPCON), 2017, pp. 500-504.
7. A. Rairikar, V. Kulkarni, V. Sabale, H. Kale and A. Lamgunde, "Heart disease prediction using data mining techniques," International
Conference on Intelligent Computing and Control (I2C2), 2017, pp. 1-8.
8. S. A. Sabab, M. A. R. Munshi, A. I. Pritom and Shihabuzzaman, "Cardiovascular disease prognosis using effective classification and
feature selection technique," International Conference on Medical Engineering, Health Informatics and Technology (MediTec), 2016,
pp. 1-6.
9. M. A. Jabbar and S. Samreen, "Heart disease prediction system based on hidden Naive Bayes classifier,” International Conference on
Circuits, Controls, Communications and Computing (I4C), 2016, pp. 1-5.
10. T. John Peter and K. Somasundaram, “Study and Development of Novel Feature Selection Framework for Heart Disease Prediction”,
International Journal of Scientific and Research Publications, Volume 2, Issue 10, 2012.
11. J. Singh, A. Kamra and H. Singh, "Prediction of heart diseases using associative classification," 5th International Conference on
Wireless Networks and Embedded Systems (WECON), Rajpura, 2016, pp. 1-7.
12. S. Radhimeenakshi, "Classification and prediction of heart disease risk using data mining techniques of Support Vector Machine and
Artificial Neural Network," 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi,
2016, pp. 3107-3111.
13. M.A.Jabbar, B.L.Deekshatulu and Priti Chandra, “Intelligent heart disease prediction system using random forest and evolutionary
approach”, Journal of Network and Innovative Computing, 2016, Volume 4, pp.175-184.
14. Isra’a Ahmed Zriqat, Ahmad Mousa Altamimi, Mohammad Azzeh (2016)” A Comparative Study for Predicting Heart Diseases Using
Data Mining Classification Methods”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 12,
2016.
15. S. Bashir, U. Qamar and M. Younus Javed, "An ensemble based decision support framework for intelligent heart disease diagnosis,"
International Conference on Information Society (i-Society 2014), 2014, pp. 259-264.
16. M. Gudadhe, K. Wankhade and S. Dongre, "Decision support system for heart disease based on support vector machine and Artificial
Neural Network," International Conference on Computer and Communication Technology (ICCCT), 2010, pp. 741-745.
Authors: S.Arun Jayakar, M. Kalimuthu, S. Sakthiya Ram, G. M. Tamilselvan
Paper Title: Implementation of Industrial Internet of Things based Industrial Tank Level Control Process
Abstract: The Industrial internet of Things (IIoT) is wide used to interconnect the industrial process with the
cloud and it will be shared by many of users, this process variable which is measured from the plant will be
controlled through the clout using industrial internet of things. This process will increases the reliability,
sensitivity, linearity, high precision, effectiveness, sensible watching and management options in process
industries. The proposed work gives the solution for the users to controlling the parameter by applying the IoT
for the industrial level process system which is nothing but cylindrical tank system, watching and alter set point
and controller parameters from remote places using cloud services. In this paper, a simple arrangement of level
process system prototype is considered for the experimental purpose and the PID control algorithm is selected as
a controller part.

103. Keywords: Level – Linear Tank- Cloud Computing

References: 438-443
1. Luigi Atzori, Antonio Iera , Giacomo Morabito, The Internet of Things: A survey, Computer Networks, Vol. 54, no. 15, pp. 2787–
2805, 2010.
2. Harsh Kaji, Shruti Annigeri “Designing PID Controller using LabVIEW for Controlling Fluid Level of Vessel” International Journal
of Engineering Research and Applications Vol. 3, Issue 2, March -April 2013.
3. Min Xia, , Teng Li, Yunfei Zhang, Clarence W. de Silva, Closed-loop design evolution of engineering system using condition
monitoring through internet of things and cloud computing, Computer Networks, Available online 7 January 2016.
4. P.Aravind, M.Valluvan and M.Saranya,”Simulation Based Modelling and Implementation of Adaptive Control Technique for
Nonlinear Process Tank” International Journal for Computer Applications, Entitled Volume 68, No.16, April 2013.
5. Sung-Min Seo, Seung-Wan Kim, Jin-Woo Jeon, Jee-Hyun Kim, HeeSoo Kim, Jung-Hwan Cho, Won-Ho Lee, Se-Hwan Paek,
Food contamination monitoring via internet of things, exemplified by using pocket-sized immunosensor as terminal unit, Sensors and
Actuators B: Chemical, Vol. 233, pp. 148-156, 2016.
6. Monika Mital, , Victor Chang , Praveen Choudhary, Ashis Pani, Zhili Sun, Adoption of cloud based Internet of Things in India: A
multiple theory perspective, International Journal of Information Management, available online 12 March 2016.
7. D.Dinesh Kumar , B.Meenakshipriya, S.Sakthiya Ram, "Design Of PSO, BFO, ACO Based PID Controller For Two Tank Spherical
Interacting System”, International Journal of Power Control Signal and Computation(IJPCSC) Vol 8. No.1 2016 Pp.129-133.
Authors: Nithya.K, Krishnamoorthi.M, Kalamani.M
Tweets: Review of Micro-Blog Based Recommendation Systems (RS) for News Recommendation
Paper Title:
(NR)
Abstract: Micro-blogs are an approach for social media users to articulate their views and interests by
posting the short messages (Tweets) as news. In general, an enormous quantity of news tweets generated
everyday for the person who does not have enough time to read all the online news based on their interest. The
objective of the News Recommendation Systems (NRS) is to classify and filter out unrelated online news and to
suggest only the relevant news to the users based on their preferences. The NRS is working based on her/his
social media activities, news reading history, location and other online activity histories. This research article
will present a wide-range of analysis about the social media NRS from various research articles in the literature
by considering the approaches used for recommendation, various performance measures and the data sets used.

Keywords: News Recommendation System, Social Media activities

References:
1. Derek Davis, Gerardo Figueroa, and Yi-Shin Chen, “SociRank: Identifying and Ranking Prevalent News Topics Using Social Media
Factors” IEEE Transactions on Systems, Man, And Cybernetics: Systems, Vol. 47, No. 6, June 2017.
2. Dandan Jiang, XiangfengLuo, JunyuXuan, and Zheng Xu, “Sentiment Computing for the News Event Based on the Social Media Big
Data” IEEE Access on Intelligent Sensing On Mobile and Social Media Analytics, Vol. 5, March 2017 pp. 2373-2382.
3. ZhiweiJin, Juan Cao, Yongdong Zhang, Jianshe Zhou, and Qi Tian, “Novel Visual and Statistical Image Features for Microblogs News
104. Verification”, IEEE Transactions on Multimedia, Vol. 19, No. 3, March 2017 pp.598-608.
4. Bichen Shi, GevorgPoghosyan, Georgiana Ifrim, and Neil Hurley, “Hashtagger+: Efficient High-Coverage Social Tagging of Streaming
News”, IEEE Transactions on Knowledge and Data Engineering, Vol.30, No.1, January 2018 pp.43-58. 444-448
5. ArkaitzZubiaga, Ahmet Aker, KalinaBontcheva, Maria Liakata and Rob Procter, “Detection and Resolution of Rumours in Social
Media: A Survey”, ACM Computing Surveys, Vol. 51, No.2, Article 32. February 2018, pp.32:1– 32:36
6. Stuart E. Middleton, Symeon Papadopoulos and YiannisKompatsiaris, “Social Computing for Verifying Social Media Content in
Breaking News”, IEEE Internet Computing, March/April 2018 pp. 83-89
7. AnithaAnandhan, LiyanaShuib, MaizatulAkmar Ismail and GhulamMujtaba, “Social Media Recommender Systems: Review and Open
Research Issues”, IEEE. Translations and content mining, Volume 6, 2018, pp.15608 -15628
8. Cheng Chen, XiangwuMeng, ZhenghuaXu, and Thomas Lukasiewicz, “Location-Aware Personalized News Recommendation With
Deep Semantic Analysis”, IEEE. Translations and content mining, Vol. 5, July 2017, pp.:1624-1638.
9. ShaymaaKhater, Denis Graˇcanin, Senior Member, IEEE, and Hicham G. Elmongui, “Personalized Recommendation for Online Social
Networks Information: Personal Preferences and Location-Based Community Trends”, IEEE Transactions on Computational Social
Systems, Vol. 4, No. 3, September 2017, pp.:104-119.
10. XIAO Yingyuan, AI Pengqiang, Ching-Hsien Hsu1, WANG Hongya and JIAO Xu1, “Time-Ordered Collaborative Filtering for News
Recommendation”, China Communications, December 2015, pp.: 53-62.
11. Twitter Home Page [Online] Available: http://twitter.com
12. Rita Georgina Guimarães, Renata L. Rosa, Denise De Gaetano, Demóstenes Z. Rodríguez, (Senior Member, Ieee), and GraçaBressan,
“Age Groups Classification in Social Network Using Deep Learning”, IEEE.Translations and content mining, Vol. 5, 2017, pp. 10805-
10816.
13. Nithya K, Kalaivaani PCD and Thangarajan R, “An enhanced data mining model for text classification”, International Conference on
Computing, Communication and Applications (ICCCA - 2012), IEEE Xplore, Print ISSN: 2325-6001.
14. Nithya K, Saranya M and Dhivyaa C R, “Concept Based Labeling of Text Documents Using Support Vector Machine”, International
Journal on Recent and Innovation Trends in Computing and Communication, Vol. 2 Issue. 3, pp. 541-544.
Authors: T. Jasparvinithasundari
Performance Analysis of Low Noise Amplifier using Junction Less GAA TFET and Conventional
Paper Title:
MOSFET
Abstract: The risingdemands to overcome the disadvantage of conventional MOSFET such as physical
limitations due to its short channel effects has stimulated the development of a number of better device
geometries and materials. Few of such novel devices are FinField Effect Transistor, Nanowire and FETs based
on Carbon Nanotube, having characteristics like quasi two- as well as one-dimensional channel geometries for
better electrostatics. While a lot of these efforts aims only on building up high-performance devices, the making
of a roadmap to forecast analog circuit performance added with the large scale integration for these technologies
is essential. In this paper we have incorporated Junctionless gate all around TFET for analog circuit design, thus
leading to ease of fabrication because of absence of doping concentration gradients for specific regions. In
addition low power consumption is obtained by TFETs as they are less prone to second order effects. The
common source low noise amplifier circuit has been designed using the device as well as MOSFET and their
105. performances are analyzed using various parameters like gain and noise figure.

Keywords: Junctionless Gate all around TFET, MOSFET, Low Noise Amplifier, Gain, Noise figure. 449-452

References:
1. A.MariaJossy, T.Vigneswaran (2014), “ A Perspective Review of Tunnel Field Effect Transistor with Steeper Switching Behavior and
Low off Current (IOFF) for Ultra Low Power Applications”, International Journal of Engineering and Technology (IJET), pp.no 223-
232.
2. BehnamSedighi, Xiaobo Sharon Hu, Huichu Liu, Joseph J.Nahas, Michael Niemer(2015), “Analog circuit Design using Tunnel-FETs,
IEEE Transactions on Circuits and Systems”, Vol. 62 No. 1, pp.no 39-48.
3. Bernhard SCHMITHUSEN, Andreas SCHENK, and wolfgang FICHTNER, “Simulation of noise in semiconductor devices with dessis-
ISE using the direct impedance field method”, Technical report, 2000/08, June 2000.
4. Andreas SCHENK, Bernhard SCHMITHUSEN, Andreas WETTSTEIN, Axel ERLEBACH, Simon BRUGGER, Fabian.M.BUFLER,
Thomas FEUDEL, and wolfgang FICHTNER, “Simulation of RF noise in MOSFETs using different transport models”, IEICE Trans.
Electron, E86- C(3):481-489, March 2003.
5. C. Alper, L. De Michielis, N. Dag˘tekin, L. Lattanzio, D. Bouvet, A.M. Ionescu(2013), “Tunnel FET with non-uniform gate capacitance
for improved device and circuitlevel performance”, Elsevier Solid-State Electronics 84, pp.no 205–210.
6. MostafizurRahman, Mingyu Li, Jiajun Shi, SantoshKhasanvis, and C. Andras Moritz(2014), “A New Tunnel-FET based RAM Concept
for Ultra-Low Power Applications”, Nanoarch, page 57-58.
7. Moon Seok Kim, Huichu Liu, KarthikSwaminathan, Xueqing Li, SumanDatta, Vijaykrishnan Narayanan(2014), “Enabling Power-
Efficient Designs with III-V Tunnel FETs”, Compound Semiconductor Integrated Circuit Symposium (CSICs).
8. RakhiNarang, ManojSaxena, R. S. Gupta, and MridulaGupta(2013), “Device and Circuit Level Performance Comparison of Tunnel
FET Architectures and Impact of Heterogeneous Gate Dielectric”, Journal of semiconductor technology and science, Vol.13, No.3,
pp.no 224 – 236.
9. Sebastianostrangio, Pierpaolopalestri, David esseni, Luca selmi, Felicecrupi, Simon richter, Qing-tai zhao, and Siegfried mantl.(2015),
“Impact of TFET Unidirectionality and Ambipolarity on the Performance of 6T SRAM Cells”, Journal of electron devices society, Vol.
3, No. 3, pp.no. 223-232.
10. Seongjae Cho, Hyungjin Kim, HeesukJhon, In Man Kang, Byung-Gook Park, James S.Harris(2013), “Mixed mode simulation of
Nanowire Ge/GaAsHeterojunction Tunneling Field effect transistor for circuit applications”, IEEE Journal of the Electron Devices
Society, Vol.1,No.2, pp.no 48 – 53.
11. Yin-Nien Chen, Ming-Long Fan, Vita Pi-Ho Hu, Pin Su, and Ching-Te Chuang (2014) , “Evaluation of Stability, Performance of Ultra-
Low Voltage MOSFET, TFET, and Mixed TFET-MOSFET SRAM Cell With Write-Assist Circuits, IEEE Journal on Emerging and
Selected topics in circuits and systems, Vol. 4, No. 4,pp.no 389-399.
12. M. W. Akram, BahnimanGhosh, PunyaslokaBal, and Partha (January 2014), “Mondal P-type double gate junctionlesstunnel field
effect transistor”, Journal of semiconductors, Vol.32, No.1.
13. Pranav Kumar Asthana, BahnimanGhosh, YogeshGoswami, and Ball Mukund Mani Tripathi, (2014), “High-Speed and Low-Power
Ultradeep-Submicrometer III–V Hetero-junctionlessTunnel Field-Effect Transistor” , IEEE Transactions on Electron Devices
Authors: Sasikumar C, Aswath C, Surendrakumar K, Suryaprakash A
Paper Title: Design and Fabrication of a Solar Car
Abstract: The primary goal of this venture was to structure and create the Electric Solar Vehicle which is
intended for single-seated vehicle fuelled by 2 kW BLDC centre engine (motor). Electric sun oriented vehicle is
fabricated to improve a safe and Eco-friendly transportation. In the current scenario, due to increase in
population and usage of vehicles, the consumption of fossil fuels like petrol and diesel are keep on increasing.
Due to this, the availability of fossil fuel will reduce in turn to increase in demand and cost and it will be
exhausted in future. Because of this, it is necessary to find the alternate fuel to operate the vehicles. In the non
renewable energy sources, Solar energy is one which is freely available. Daylight is viewed as a wellspring of
vitality which can be utilized for many applications. Sun based vitality is being utilized to create power through
daylight. The fundamental segment to fabricate a sunlight based vehicle with a sun based board solar panel and a
battery to store the electrical vitality. The sun based cells gather a bit of the sun's vitality and store it into the
batteries of the solar based vehicle. After the vitality is stored in the batteries, it is accessible for use and the
engine and controller is made to drive the vehicle. There are two arrangements of batteries; one of which will get
the electrical vitality from the solar board to drive the engine and another will be utilized as helper control source
106. which will give expected capacity to other electrical gadgets being utilized in the vehicle. After that the engine
controller changes the measure of vitality that streams to the engine to compare to the throttle. The engine 453-455
utilizes that vitality to drive the wheels.

Keywords: BLDC Motor and controller, Batteries, Solar panel, Seamless pipes, Steering set, Tyres and
brake set.

References:
1. Asia’s biggest solar vehicle championship organised by Imperial Society of Innovative Engineers (ISIE) releases 5th Electric Solar
Vehicle Championship (ESVC) 2017-2018 Rulebook and we referred the rules and regulations to fabricate our vehicle.
2. Sharma P, Vashistha S, Pal S, Parihar R S, Singh S, Garg S and Vishnoi A, ���Solar Powered Vehicle”, Imperial International
Journal of Eco-friendly Technologies, Vol. 1, issue-1 (2016), pp.209-212.
3. Singhal A, Shukla L, Gupta A, Iqbal M, Singh D and Gupta M K, “Solar Electric Powered Hybrid Vehicle”, Journal of Electronic Design
Technology, ISSN: 2229-6980 (online), , Vol. 6, Issue 3.
4. Wamborikar Y S, Sinha A, “Solar Powered Vehicle”, Proceedings of the World Congress on Engineering and Computer Science, San
Francisco, USA, Vol. II, WCECS 2010.
5. Vishal S, “Design analysis and manufacturing of new technology Solar Car”, International Research Journal of Engineering and
Technology (IRJET), e-ISSN: 2395-0056, Vol. 4, Issue 8, 2017.
Authors: R. Gomathi, S. Logeswari
Paper Title: Challenges in Information Mining from Semantic Web Data
Abstract: The quantity of web pages is growing in our day to day life and quantity of semantic web data on the
web is also growing quickly. With the raise in information, the semantic web data also gets increased. This
becomes a policy for the researchers to use data mining algorithms to manipulate the semantic web data.
Although Semantic web has a wide and extensive selection of applications, there is a less amount of investigation
in applying the data mining techniques in semantic web. This manuscript explains the research behaviour in the
semantic web applications and data mining. It also addresses the challenges faced in this area of investigation.

107. Keywords: Semantic Web Data, Internet, Data Mining, RDF Data
456-458
References:
1. O. Mustapaşa, A. Karahoca, D. Karahoca and H. Uzunboylu, “Hello World, Web Mining for E-Learning,” Procedia Computer Science,
Vol. 3, No. 2, 2011, pp. 1381- 1387. doi:10.1016/j.procs.2011.01.019
2. H. Liu, “Towards Semantic Data Mining,” Proceedings of the 9th International Semantic Web Conference, Shanghai, 7-11 November
2010, pp. 1-8.
3. D. Jeon and W. Kim, “Development of Semantic Decision Tree,” Proceedings of the 3rd International Conference on Data Mining and
Intelligent Information Technology Applications, Macau, 24-26 October 2011, pp. 28- 34.
4. A. Jain, I. Khan and B. Verma, “Secure and Intelligent Decision Making in Semantic Web Mining,” International Journal of Computer
Applications, Vol. 15, No. 7, 2011, pp. 14-18. doi:10.5120/1962-2625
5. A. Segura, C. Vidal-Castro, V. Menéndez-Domínguez, P. G. Campos and M. Prieto, “Using Data Mining Techniques for Exploring
Learning Object Repositories,” The Electronic Library, Vol. 29, No. 2, 2011, pp. 162-180. doi:10.1108/02640471111125140
6. Hitzler, P, Krotzsch, M & Rudolph, S 2011, ‘Foundations of Semantic Web technologies’, CRC Press.
7. DuCharme, B 2013, ‘Learning Sparql’, O'Reilly Media.
8. http://www.thearling.com/text/dmwhite/dmwhite.htm
9. Shah Neha K,” Introduction of Data mining and an Analysis of Data mining Techniques”, Indian Journal of Applied
Research,vol.3,No.5,2013.
10. T. Sunil kumar,, Dr. K. Suvarchala,” A Study: Web Data Mining Challenges and Application for Information Extraction”, IOSR
Journal of Computer Engineering,vol.7,No.3,pp.24-29,2012.
11. Menemencioglu, Oguzhan, and Ilhami M. Orak. "A review on semantic web and recent trends in its applications." In Semantic
Computing (ICSC), 2014 IEEE International Conference on, pp. 297-303. IEEE, 2014.
Authors: Haritha J, Vinodhini S, Ramya E, Gayathri S
Paper Title: EB Charge Monitoring System using Embedded System
Abstract: The word ‘monitoring’ means to observe a situation for any changes which may occur over time. In
order to know the state of the system have to be monitored continuously. This helps to update about some
important factors. In current situation people come to know about their electricity consumption only when a
person from Electricity Board comes to take readings. This method can be avoided by this project by
continuously monitoring the electricity consumption. “Electricity Board charge monitoring” helps to know about
the daily electricity usage by counting the revolutions made by the disc. A microcontroller is adopted for sensing
108. and displaying the information. The main advantage of this project is to know about the power consumption
every time, thus resulting in the awareness of charge for power usage.
459-461
Keywords: ‘Monitoring’ Means To Observe A Situation For Any Changes Which May Occur Over Time.

References:
1. A.K.Sawhney - “Electrical and Electronic Measurements and Instrumentation”, Dhanapat Rai& Co (P) Ltd, 2004 Edition.
2. Muhammad Ali Mazidi and Janice Gillispile Mazidi.“Microcontroller and Embedded System” Pearson Education, Fifth Edition.
3. www.atmel.com.
4. www.datasheetcatalog.com.
5. www.howstuffworks.com.
Authors: T.Rajesh, S.Arun jayakar, M.Kalimuthu, G. M.Tamilselvan
Paper Title: Robust Controller Design for Fixed field-DC Motor Speed Control
Abstract: The speed and position control of DC motor is an important task in spinning machines, Fans,
Blowers, Conveyors, Centrifugal Pumps, Lifts, Weaving Machine based real time applications. In this proposed
manuscript various robust controller design has been implemented for fixed field DC motor speed control with
various desired set speed and position values , which provides quicker settling time, minimum peak overshoot,
minimum rise time and low steady state error while its dynamic transient change with respect to load
characteristics. Based on first principle method, modeling of DC motor has been carried out as both Transfer
function and state space model. Model based robust feedback controller design (LQR, H-Infinity) provides
optimum set point tracking results when compared to conventional controller. The open loop response, Time
domain and Disturbance handling analysis have been encountered in MATLAB simulation and then the
experimental results are validated by conducting closed loop feedback control test with different load
characteristics.

Keywords: Based on first principle method

References:
1. Md Akram Ahmad, Pankaj Rai, “Speed control of a DC motor using Controllers” Automation, Control and Intelligent Systems,2014;
2(6-1): 1-9
2. V.M.Hern´and ez-Guzm´an, F.Mendoza Mondrag´on, and R.V.Carrillo Serrano, “Velocity regulation in PMSMs using standard field
109. oriented control plus adaptation”, Asian J. Control, vol. 17, no. 6, pp. 2382–2388, Nov. 2015.
3. C. Basilio and S. R. Matos, ”Design of PI and PID Controllers With Transient Performance Specification”, ,” IEEE Trans. Education,
vol. 45, Issue No. 4, 2002, pp. 364370 462-465
4. V. Petrovic, R. Ortega, and A.M. Stankovic, “Interconnection and damping assignment approach to control of PM synchronous
motors”,IEEE Trans. Control Syst. Technol., vol. 9, no. 6, pp. 811–820, Nov. 2001.
5. Aamir Hashim and Obeid Ahmed, “Optimal Speed Control for Direct Current Motors Using Linear Quadratic Regulator”, Journal of
Science and Technology Engineering and Computer Sciences, vol. 14, no. 3, 2013.
6. Lor´ıa, R.Ortega, P. J. Nicklasson, and H. Sira-Ram´ırez, PassivityBasedControl of Euler-Lagrange Systems. London, U.K.: Springer
London, 1998
7. Shashi Bhushan Kumar, Mohammed Hasmat Ali*,Anshu Sinha, “Design and Simulation of Speed Control of DC Motor by Artificial
Neural Network Technique “International Journal of Scientific and Research Publications, Volume 4, Issue 7, July 2014.
8. V.M.Hern´and ez-Guzman, F.Mendoza Mondrag´on, and R.V.Carrillo Serrano, “Velocity regulation in PMSMs using standard field
oriented control plus adaptation”, Asian J. Control, vol. 17, no. 6, pp. 2382–2388, Nov. 2015.
9. H.H.Choi, T.D.Do, and J.W.Jung, “θ-D approximation technique for nonlinear optimal speed control design of surface-mounted
PMSM drives”, IEEE/ASME Trans. Mechatronics, vol. 20, no. 4, pp. 1822–1831, Aug. 2015.
10. Aditya Pratap Singh, “Speed Control of DC Motorusing Pid Controller Based on Matlab” Innovative Systems Design and
Engineering, Vol.4, No.6, 2013 - Selected from International Conference on Recent Trends in Applied Sciences with Engineering
Applications.
11. K.Belda and D.Vosmik, “Explicit generalized predictive control of speed and position of PMSM drives”, IEEE Trans. Ind. Electron.,
vol. 63, no. 6, pp. 3889–3896, Jun. 2016.
12. S.Junco and A.Donaire “On the addition of integral action to port-controlled Hamiltonian systems”, Automatica, vol. 45, no. 8, pp.
1910–1916, Aug. 2009.
13. L.M.Grzesiak and T.Tarczewski “Constrained state feedback speed control of PMSM based on model predictive approach”, IEEE
Trans. Ind. Electron., vol. 63, no. 6, pp. 3867–3875, Jun. 2016.
14. Aamir Hashim and Obeid Ahmed, “Optimal Speed Control for Direct Current Motors”, Journal of Science and Technology
Engineering and Computer Sciences, vol. 14, no. 3, 2013.
15. Bhaskar Lodh , “Simulink Based Model for Analysing the Ziegler – Nichols Tuning Algorithm as applied on Speed Control of DC
Motor”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Issue 1,
January 2014.
Authors: Tamilselvi S, DharaniT, Padmini S, Nivetha S, Sangeetha M, Arunava Das, Balakrishnaraja R
Paper Title: Gc-Ms Analysis of Albizia Amara and Phyla Nodiflora Ethanolic Leaf Extracts
Abstract: Medicinal plants were used to treat diseases traditionally since ancient times. The present work
aims to investigate the bioactive constituents through GC MS analysis of ethanolic leaf extracts of Albiziaamara
and Phyla nodiflora which are of medicinal importance and used traditionally to wash hair. Phytochemical
screening confirmed the presence of saponins, terpenoids, alkaloids and glycosides in Albiziaamara. In Phyla
nodiflora alkaloids, flavanoids, terpenoids and glycosides were reported. The characterization of the compounds
by Gas chromatography–mass spectrometry (GC-MS) technique has reported the presence of eight compounds in
Albiziaamara and eleven compounds in Phyla nodiflora. These compounds possess different pharmacological
properties like anti-microbial, antioxidant, anti-inflammatory and hepatoprotective properties.

Keywords: medicinal plant, bioactive constituents, Albiziaamara, Phyla nodiflora, GCMS analysis

References:
1. Sabir, M. S., Ahmad, D. S., Hussain, I. M., &Tahir, K. M., “Antibacterial activity of Elaeagnusumbellata (Thunb.) a medicinal plant
from Pakistan”, Saudi medical journal, 2007, 28, 2, 259-263.
2. Rajkumar, T., Satheesh Kumar, E., &Sinha, B. N., “Evaluation of antioxidant properties of Albiziaamara leaves”, Int J Adv Pharm
BiolSci, 2010, 2, 99-106.
3. Akilandeswari, S., Senthamarai, R., Valarmathi, R., Savarinsha, J. A., &Selvan, A. T., “Evaluation of anti-inflammatory and anti-
arthritic activity of Albizialebbeck and Albiziaamara extracts”, Biomed, 2009, 4, 3, 295-302.
4. Praveen, P., Thippeswamy, S., Mohana, D. C., &Manjunath, K., “Antimicrobial efficacy and phytochemical analysis of Albiziaamara
110. (Roxb.) Boiv.an indigenous medicinal plant against some human and plant pathogenic bacteria and fungi”, Journal of Pharmacy
Research, 2011, 4, 3, 832-835.
5. Kumar, P. S., Sucheta, S., Deepa, V. S., Selvamani, P., &Latha, S., “Antioxidant activity in some selected Indian medicinal plants”, 466-473
African journal of Biotechnology, 2008, 7, 12.
6. 6 Gasper, B., &Nshimo, C. M., “In vitro antimicrobial activity of albiziaamara leaves”, Eur. J, 1988, 89, 240-243.
7. Kokila, K., Priyadharshini, S. D., &Sujatha, V., “Phytopharmacological properties of Albizia species: a review”, Int J Pharm PharmSci,
2013, 5, 3, 70-73.
8. Nivetha S, Padmini S, Tamilselvi S., “A review on phytopharmacological properties of arappu”, International research journal of
pharmacy, 2017, 8, 11.
9. Chaudhary, B. A., Jabeen, M., Jillani, U., &Uzair, M., “Phyla nodiflora (verbenaceae) &58; a review”, Pakistan Journal of
Pharmaceutical Research, 2016. 2, 1, 49-54.
10. Sharma, R. A., & Singh, R., “A review on Phyla nodifloraLinn.: a wild wetland medicinal herb”, Int. J. Pharm. Sci. Rev. Res, 2013, 20,
1, 57-63.
11. Priya, S. E., &Ravindhran, R., “Pharmacognostical characterization of Phyla nodiflora L. (Verbenaceae): A valuable medicinal plant”,
Asian Journal of Pharmaceutical and Clinical Research, 2015, 8, 3, 256-261.
12. Khan, A., Shah, R. D., &Pallewar, S., “Evaluation of Anti-inflammatory and Analgesic Activity of Ethanolic extracts of Inularacemosa
and Albiziaamara”, Int J PharmacogPhytochem Res, 2010, 3, 22-27.
13. Priya, S. E., &Ravindhran, R., “Phytochemical Analysis and Antimicrobial Properties of Extracts from Aerial Parts of Phyla nodiflora
(L) Greene”, Int. J. Curr. Microbiol. App. Sci, 2015, 4, 2, 347-358.
14. Ravikumar, V. R., &Sudha, T., “Phytochemical and microbiological observations on Phyla nodiflora”, Int J of Res in Pharmacy and
Chemistry, 2011, 1, 2, 117-120.
15. MeenaDeviha S., Pavithra M.K.S., "Antifungal activity by ethanolic extracts of medicinal plants against Malassezia furfur: A potential
application in the treatment of Dandruff", International Journal of PharmTech Research, 2015, 8, 3, 443-440.
16. Pavithra M.K.S., MeenaDeviha S., Sowmya R., Sowparnika M., Balakrishnaraja R., Kannan K.P., "Studies on the antimicrobial activity
of Evolvulusalsinoides, Murrayakoenigii, Lawsoniainermis, Hibiscus rosa-sinensis, Azadirachtaindica against Malassezia furfur using
fractional factorial design", International Journal of Research in Ayurveda and Pharmacy, 2016, 7, 1, 77-73.
Authors: Prabha Devi D, Iniya Shree S
Paper Title: Recognition and Investigation of Skin Cancer using Morphological Operations
Abstract: In today’s world Skin cancer (Melanoma) has become a very common disease. Melanoma is the
cancer cells which exhibit as the abnormal cells from skins that can be developed in any other parts of the body.
Over exposure to UV rays is the main cause for Melanoma. Other way that causes Melanoma is the tanning beds.
Skin cancers are classified into three different types as follows: Basal-Cell skin Cancer (BCC), squamous-cell
skin cancer (SCC) and melanoma. Melanoma causes enormous and irreparable damage. Symptoms incorporate a
mole that can change in its volume, contour, and color. The effective way to prevent Melanoma is by decreased
exposure to UV rays and tanning beds. The stipulated approach followed by dermatologist is rightful supervision
of the Skin. As this approach is time and power consuming, a new feature based classification for the detection of
skin in various features of images as described in this paper. This approach reduces the professionals work. The
111. morphological operation is used to differentiate the cancerous cell from the image .The skin texture features are
obtained from processed image and used for classification of images as malignant and non-malignant. 474-477

Keywords: Morphological operations, TDS, Melanoma, Features

References:
1. Bono, S. Tomatis, and C. Bartoli, The ABCD system of melanoma detection: A spectrophotometric analysis of the asymmetry,border,
color, and dimension, "Cancer", vol. 85, no. 1, pp. 72–77, January 1999
2. Pehamberger H, Binder M, Steiner A, Wolff K. In vivo epiluminescence microscopy: improvement of early diagnosis of melanoma. J
Invest Dermatol,100:356S–62S, 1993
3. Bafounta ML, Beauchet A, Aegerter P, Saiag P. Is dermoscopy (epiluminescence microscopy) useful for the diagnosis of melanoma?
Results of a meta-analysis using techniques adapted to the evaluation of diagnostic tests. Arch Dermatol,137:13,43–50. 2001
4. G.Argenziano, H. Soyer, S. Chimenti, R. Talamini, R. Corona, F. Sera, and M. Binder, Dermoscopy of pigmented skin lesions: Results
of consensus meeting via the Internet Journal of the American Academy of Dermatology, vol. 48, pp. 679–693, 2003
5. R. Garnavi, Computer-aided diagnosis of melanoma, Ph.D. dissertation, University of Melbourne, Australia, 2011
6. M.E. Celebi, H. Iyatomi, G. Schaefer, and W. V. Stoecker, Lesion border detection in dermoscopy images Computerised Medical
Imaging and Graphics, vol. 33, no. 2, pp. 148–153, 2009
7. H. Iyatomi, H. Oka, M. Saito, A. Miyake, M. Kimoto, J. Yamagami, S. Kobayashi, A. Tanikawa, M. Hagiwara, K. Ogawa, G.
Argenziano, H. P. Soyer, and M. Tanaka, Quantitative assessment of tumour extraction from dermoscopy images and evaluation of
computer-based extraction methods for an automatic melanoma diagnostic system Melanoma Research, vol. 16, no. 2, pp. 183–190,
2006
8. R. Garnavi, M. Aldeen, M. E. Celebi, A. Bhuiyan, C. Dolianitis, and G. Varigos, Automatic segmentation of dermoscopy images using
histogram thresholding on optimal color channels International Journal of Medicine and Medical Sciences, vol. 1, no. 2, pp. 126–134,
2010
9. Ng, B. Fung, and T. Lee, Determining the asymmetry of skin lesion with fuzzy borders Computers in Biology and Med., vol. 35, pp.
103– 120, 2005
10. M. Celebi, H. Kingravi, B. Uddin, H. Iyatomi, Y. Aslandogan, W. Stoecker, and R. Moss, A methodological approach to the
classification of dermoscopy images, Computerized Medical Imaging and Graphics, vol. 31, pp. 362–373, 2007
Authors: G.Sreenivasa Reddy, T.Bramhananda Reddy, M.Vijaya Kumar
Simulation and Analysis of Perturb and Observe MPP Tracking Algorithm under Uniform and Non-
Paper Title:
Uniform Irradiation
Abstract: The PV array generating power is always directly affected by various conditions such as angle of
inclination, temperature, irradiation of sun, shading effect, and solar array configuration. In practice, PV arrays
are commonly partially shaded by trees, clouds, nearby buildings, bird droppings and other utilities which leads
to multiple peaks appear in the P-V curve, a global maximum and one or several local peaks. In this paper, the
"perturb and observe" (P&O) maximum power point tracking (MPPT) algorithm employed for tracking the
maximum power point under uniform and non-uniform irradiation conditions. Initially, this paper presents the P
and O algorithm operation, later the boost converter performance details and finally the combination of a boost
converter with P and O algorithm. The evaluation process has been carried systematically for the uniform and
non-uniform solar irradiance and finally, the results are analyzed.

Keywords: Solar Photovoltaic array (PV); Uniform and non Uniform irradiation; Partial shading; Maximum
Power Point tracking (MPPT); Perturb and Observe (P&O); Boost Converter.

References:
1. G.Villalva, J.R.Gazoli, “Comprehensive approach to modeling and simulation of photovoltaic arrays,” IEEE Trans. Power Electron.,,
vol. 24, no. 5, pp. 1198–1208,2009.
2. F.Murtaza et.al., “Comparative Anlaysis of Maximum Power Point Tracking Techniques,” IEEE, vol. 12, pp. 83-88, 2013.
3. Soubhagya Kumar Dash et al., “ Comparative Analysis of MPP for Solar PV Application using MATLAB/simulink,” vol.14, May 2014.
4. Esram and P.L. Chapman, “Comparison of photovoltaic array maximum power point tracking techniques,” IEEE Trans. on Energy
conversion., vol. 22, no. 2, pp. 439–449, 2007.
5. Nicola Femia, Member IEEE, “Optimization of Perturb and Observe Maximum Power Point Tracking Method”, IEEE 2005.
112. 6. Scarpa, S. Buso, and G. Spiazzi, “Low-complexity MPPT technique exploiting the PV module MPP locus characterization,”IEEE
Trans.Ind.Electron.,vol.56.no.5,pp. 1531-1538, May 2009
7. L. Chen, Y. Wang, J. S. Lai, Y. S. Lee, and D. Martin, “Design of parallel inverters for smooth mode transfer micro-grid applications,” 478-483
IEEE Trans. Power Electron, vol. 25, no. 1, pp. 6-15, Jan.2010.
8. S. Yang, T. J. Liang, and J. F. Chen, “Transformer less dc-dc converters with high voltage gain,” IEEE Trans.Ind.Electron., vol.56, no.8,
pp.3144-3152, Aug.2009.
9. L. Luo, “Six self-lift dc-dc converters, voltage lift technique,” IEEE Trans. Ind. Electron., vol. 48, no. 6, pp. 1268–1272, Dec. 2001.
10. L. Luo and H. Ye, “Positive output super-lift converters,” IEEE Trans.Power Electron., vol. 18, no. 1, pp. 105–113, Jan. 2003.
11. L. Luo and H. Ye, “Positive output multiple-lift push-pull switchedcapacitor Luo-converters,” IEEE Trans. Ind. Electron., vol. 51, no.
3,pp. 594–602, Jun. 2004.
12. Jun and A. Ioinovici, “Switching-mode dc-dc converter with switched capacitor based resonant circuit,” IEEE Trans. Circuits Syst. I,
Fundam.
13. Axelrod,Y. Berkovich and A. Ioinovici, “Switched –capacitor/switched inductor structures for getting transformerless hybrid dc-dc
PWM converters,” IEEE Trans. circuits Syst. I, Reg.Papers, vol.55, no.2,pp.687-696, Mar. 2008.
14. Xuefeng Hu and Chunying Gong, “A High Voltage Gain DC–DC Converter Integrating Coupled-Inductor and Diode–Capacitor
Techniques,” ,” IEEE Trans.Power Electron., vol. 29, no. 2, pp.789-800, Feb. 2014.
15. Zhao and F. C. Lee, “High-efficiency, high step-up dc-dc converters,”IEEE Trans. Power Electron., vol. 18, no. 1, pp. 65–73, Jan. 2003.
16. Prudente, L.Pfitscher, G.Emmendoerfer, E.Romaneli, and R.Gules,"Voltage multiplier cells applied to non-isolated DC-DC
converters,"IEEE Trans. Power Electron., vol. 23, no.2, March 2008.
17. Viraj Savakhande, C.L.Bhattar and Pctejasvi L.Bhattar, “A Voltage-Lift DC-DC converter using Modular Voltage Multiplier Cell For
Photovoltaic Application” International conference on circuit, power and cumputing technologies(ICCPCT),April 2017.
18. B.Savakhande,C.L.Bhattar and P L.Bhattar, “Voltage-lift DC-DC Converters For Photovoltaic Application-A Review” International
Conference of Data Management, Analytics and Innovation(ICDMAI),Feb.2017.
19. A.Chwale,V.B.Savakhande and H.T.Jadhav, “An interleaved flyback inverter for grid connected photovoltaic systems” International
conference on circuit, power and cumputating technologies (ICCPCT), April 2017.
20. Bunyamin Tamyurek, and Bilgehan Kirimer, “An Interleaved High-Power Flyback inverter for Photovoltaic Applications,” IEEE Trans.
Power Electron., vol. 30, no. 6, 3228–3241, Jun. 2015.
21. Sreenivasa Reddy, T. Bramhananda Reddy, M.Vijaya Kumar. "A MATLAB based PV Module Models analysis under Conditions of
Nonuniform Irradiance", Energy Procedia, 117 (2017) pp. 974–983.
Authors: P.N. Jayanthi, S. Ravishankar
Paper Title: Optimization Driven Beam Forming in 2D Linear Array for MIMO Systems
Abstract: The advancements in the multimedia applications gained the attention of users and are considered
as an important technique for wireless networks. Multiple Input Multiple Output (MIMO) systems depend on the
113. wireless channels propagation. This work proposes a technique, named Exponential-Monarch Butterfly
Optimization (Exponential-MBO), for initiating beamforming in 2D linear array under a MIMO system. The 484-491
proposed Exponential-MBO algorithm is responsible for computing the optimal weights for the beamforming in
the MIMO systems. At first, the preferred beam pattern attributes for the 2D array in the MIMO system are
described using the initial beam patterns. Then, the fitness function of Exponential-MBO is derived to determine
the pattern attributes in the required direction using the azimuth and the elevation beam pattern. The proposed
Exponential-MBO algorithm determines the optimal weights for generating the patterns for beamforming in the
MIMO system. The channel is estimated using the Least Square (LS) channel estimation method along with
Quadrature Amplitude Modulation (QAM) multi-carrier modulation. The implementation of the proposed
Exponential-MBO is in MATLAB, and its performance is evaluated by varying the channel. The proposed
Exponential-MBO shows superior performance in terms of power gain and Bit Error Rate (BER).

Keywords: MIMO-OFDM, Beamforming, Elevation beam pattern, Azimuth, QAM-multi-carrier

References:
1. PrabinaPattanayak and Preetam Kumar,”Quantized feedback scheduling for MIMO-OFDM broadcast networks with subcarrier
clustering”,Ad Hoc Networks,Vol :65,pp :26-37, October 2017.
2. ]Xin Xiong, Bin Jiang, Xiqi Gao, and Xiaohu You, “QoS Guaranteed User Scheduling and Pilot Assignment for Large-Scale MIMO-
OFDM Systems”, IEEE Transactions on Vehicular Technology “,Vol: 65, No: 8,pp: 6275 - 6289, August 2016.
3. Kianoush Hosseini, Wei Yuand Raviraj S. Adve,”Large-Scale MIMO versus Network MIMO forMulticell Interference
Mitigation”,IEEE Journal of Selected Topics in Signal Processing, Vol:8,no:5, pp:930-941.
4. Arin Minasian,Shahram Shahbaz Panahi and Raviraj S.,”Distributed Massive MIMO Systems withNon-Reciprocal Channels: Impacts
and RobustBeamforming”,IEEE Transactions on Communications,pp: 1-1,July 2018.
5. Said E. El-Khamy, Ahmed S. Eltrass and Huda F. El-Sayed,”Design of thinned fractal antenna arrays foradaptive beam forming and
sidelobereduction”, IET Microwaves, Antennas & Propagation :Vol: 12, no: 3, pp: 435 – 441,2018.
6. Boufeldja Kadri, MiloudBoussahla and Fethi Tarik Bendimerad,”Phase-Only Planar Antenna Array Synthesis with Fuzzy Genetic
Algorithms”,International Journal of Computer Science Issues, IJCSI, Vol:7, no:2, January 2010.
7. Ju-Hong Lee and Yung-Han Lee,” Two-Dimensional Adaptive Array Beamforming With Multiple Beam Constraints Using a
Generalized Sidelobe Canceller”, IEEE Transactions on Signal Processing, Vol: 53, No: 9, pp: 3517 - 3529,Sept. 2005.
8. Gopi Ram, P. S. Pal, D. Mandal, R. Kar and Sakti Prasad Ghosal,”Social Emotional Optimization Algorithm forBeamforming of
Linear Antenna Arrays”,In proceedings of TENCON 2014 - 2014 Region 10 Conference,pp:1-5,IEEE.
9. Lei Wang,”Array Signal Processing Algorithmsfor Beamforming and Direction Finding”, Doctoral dissertation, University of York.
10. IoannisTzanidis, Yang Li, Gary Xu,Ji-Yun Seol and JianZhong (Charlie) Zhang,”2D Active Antenna Array Design for FD-MIMO
Systemand Antenna Virtualization Techniques”, International Journal of Antennas and Propagation, 2015.
11. Junhui Qian , Zishu He, Wei Zhang, Yulong Huang, Ning Fu and Jonathon Chambers, ”Robust adaptive beamforming for multiple-
input multiple-output radar with spatial filtering techniques”, Signal Processing,Vol:143, pp:152-160, February 2018.
12. Xue, C., He, S., Huang, Y., Wu, Y. and Yang, L., "An efficient beam-training scheme for the optimally designed subarray structure in
mmWave LoS MIMO systems," EURASIP Journal on Wireless Communications and Networking, vol.1, pp.31, 2017.
13. Lee, S.J., "On the training of MIMO-OFDM channels with least square channel estimation and linear interpolation," IEEE
Communications Letters, vol.12, no.2, 2008.
14. Seyman, M.N. and Taşpınar, N., "Pilot tones optimization using artificial bee colony algorithm for MIMO–OFDM systems," Wireless
personal communications, vol.71, no.1, pp.151-163, 2013.
15. Gai-Ge Wang, Suash Deb, Zhihua Cui, "Monarch butterfly optimization", Neural Computing and Applications, pp. 1–20, May 2015.
16. Michael S. Saccucci , Raid W. Amin, and James M. Lucas,Exponentially weighted moving average control schemes with variable
sampling intervals," Communications in Statistics - Simulation and Computation, vol. 21, no.3, pp. 627-657, 1992.
Authors: Nandini K. S, S.A. Hariprasad
Paper Title: Shortest-Path Routing in Wireless Mesh Networks under Time Varying Link-Cost Metric
Abstract: In a wireless Mesh Network, with cognitive radios, the cost of the available communication links
can vary with respect to time due to the schedules of the primary users. Under this condition, to find the time
dependent shortest paths for the secondary users is a challenging task. At a particular time slot, if no forward
links are available at a node, the data packet which has just arrived have to halt (or wait) until the availability of
one or more forward paths. Then the data packet suffers halting delay. Thus the overall arrival time could be
more than that of an alternate path. Therefore, in this paper we provide an innovative method of reducing the
halts along the path. We also have to minimize the length of the topological (physical) distance along the selected
path. Thus, in our paper, two objectives, the earliest arrival time as well as minimum shortest topological path,
are realized. The weight assigned to each objective can be adjusted according to the requirements. To solve this
bi-objective optimization problem, we propose a new modification to the well-known Dijkstra shortest path
algorithm which takes care of the actual link cost and also the halting cost.

Keywords: Cognitive Radio Network, Spectrum sensing, Secondary users, Time dependent cost Matrices,
Probability of Interference, Optimal Assignment
114.
References: 492-505
1. Amjad, M. H. Rehmani and S. Mao, "Wireless Multimedia Cognitive Radio Networks: A Comprehensive Survey," in IEEE
Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-1, 2018. (Early Access article).
2. M. Alias and R. G. K, “Cognitive radio networks: A survey”,International Conference on Wireless Communications, Signal Processing
and Networking (WiSPNET), 2016, pp. 1981–1986.
3. Bouabdallah, B. Ishibashi and R. Boutaba, "Performance of Cognitive Radio-Based Wireless Mesh Networks," IEEE Transactions on
Mobile Computing, vol. 10, no. 1, 2011,pp. 122-135.
4. R. Chowdhury and I. F. Akyildiz, "Cognitive Wireless Mesh Networks with Dynamic Spectrum Access," in IEEE Journal on Selected
Areas in Communications, vol. 26, no. 1, 2008,pp. 168-181.
5. B. Battula, M. S. Gaur, D. Gopalani, K. Radhika and S. Shiwani, "A dynamic medium access mechanism for cognitive radio wireless
mesh networks," International Conference on Signal Processing and Communication (ICSC), Noida,2015, pp. 434-438.
6. M. F. Rabbi, D. B. Rawat, M. A. Ahad and T. Amin, "Analysis of multi-hop opportunistic communications in cognitive radio
network," SoutheastCon 2015, Fort Lauderdale, FL,2015, pp. 1-8.
7. Akyildiz, I., Wang, X., & Wang, W, “Wireless mesh networks: A survey. Elsevier Computer Networks”, 47(4), 2005, pp 445–487.
8. Deo, N., and pang, C. Y, “Shortest path algorithms: Taxonomy and annotation.”, Networks, volume 14, Issue 2,1984, pp 275-323.
9. Cooke and E. Halsey, "The shortest route through a network with time dependent internodal transit times", Journal of Mathematical
Analysis and Applications, 1966,pp 492-498.
10. Klafszky, E. Determination of shortest path in a network with time-dependent edge-lengths. Math. Oper. Stat, 1972,pp 255-257.
11. Dreyfus, S. E. An appraisal of some shortest path algorithms. Oper. Rex I7, 1969,pp 395-412.
12. Halpern, J. The shortest route with time dependent length of edges and limited delay possibilities in nodes. Z. Oper. Res. 21 (1977),
1977, pp117-124.
13. E. Kaufman, R. L. Smith (1993). "Fastest paths in time-dependent networks for intelligent-vehicle-highway systems application".
IVHS Journal 1, 1-11.
14. Daniel Delling and Dorothea Wagner. Time-dependent route planning. In Robust and Online Large-Scale Optimization, volume 5868
of Lecture Notes in Computer Science,2009, pp 207–230.
15. Orda and R. Rom. Shortest-path and minimum-delay algorithms in networks with time-dependent edge-length. J.ACM, 37(3), 1990,pp
607–625.
16. Ding, J. Yu, and L. Qin. Finding time-dependent shortest paths over large graphs. In Proc. EDBT, pages 205–216. ACM, 2008.
17. C. Dean. Continuous-time dynamic shortest path algorithms. Master’s thesis, Massachusetts Institute of Technology, 1999.
18. Zhan-yu and G. p. Liu, "Earliest-arrival path: A global optimized transmission for networked control systems," 2017 36th Chinese
Control Conference (CCC), 2017, pp. 7909-7914.
19. Abdelfattah Idri, Mariyem Oukarfi, Azedine Boulmakoul, Karine Zeitouni and AliMasri “A new time-dependent shortest path
algorithm for multimodal transportation network,” Procedia Computer Science Volume 109, 2017, pp 692-697.
20. https://ahmedhanibrahim.wordpress.com/2016/04/15/solving-time-dependent-graph-using-modified-dijkstra-algorithm/.
21. Shylashree N, “Non-crossing rectilinear shortest minimum bend paths in the presence of rectilinear obstacles”, Journal of
Telecommunication and Information Technology, no. 3, 2018, pp 82-91.
Authors: Nandini K. S, S.A. Hariprasad
Paper Title: Two Stage Block Truncation Coding for Lower Mean Square Error
Abstract: In a wireless Mesh Network, with cognitive radios, the cost of the available communication links
can vary with respect to time due to the schedules of the primary users. Under this condition, to find the time
dependent shortest paths for the secondary users is a challenging task. At a particular time slot, if no forward
links are available at a node, the data packet which has just arrived have to halt (or wait) until the availability of
one or more forward paths. Then the data packet suffers halting delay. Thus the overall arrival time could be
more than that of an alternate path. Therefore, in this paper we provide an innovative method of reducing the
halts along the path. We also have to minimize the length of the topological (physical) distance along the selected
path. Thus, in our paper, two objectives, the earliest arrival time as well as minimum shortest topological path,
are realized. The weight assigned to each objective can be adjusted according to the requirements. To solve this
bi-objective optimization problem, we propose a new modification to the well-known Dijkstra shortest path
algorithm which takes care of the actual link cost and also the halting cost.

Keywords: Cognitive Radio Network, Spectrum sensing, Secondary users, Time dependent cost Matrices,
Probability of Interference, Optimal Assignment

References:
22. Amjad, M. H. Rehmani and S. Mao, "Wireless Multimedia Cognitive Radio Networks: A Comprehensive Survey," in IEEE
Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-1, 2018. (Early Access article).
23. M. Alias and R. G. K, “Cognitive radio networks: A survey”,International Conference on Wireless Communications, Signal Processing
and Networking (WiSPNET), 2016, pp. 1981–1986.
24. Bouabdallah, B. Ishibashi and R. Boutaba, "Performance of Cognitive Radio-Based Wireless Mesh Networks," IEEE Transactions on
Mobile Computing, vol. 10, no. 1, 2011,pp. 122-135.
115. 25. R. Chowdhury and I. F. Akyildiz, "Cognitive Wireless Mesh Networks with Dynamic Spectrum Access," in IEEE Journal on Selected
Areas in Communications, vol. 26, no. 1, 2008,pp. 168-181. 478-483
26. B. Battula, M. S. Gaur, D. Gopalani, K. Radhika and S. Shiwani, "A dynamic medium access mechanism for cognitive radio wireless
mesh networks," International Conference on Signal Processing and Communication (ICSC), Noida,2015, pp. 434-438.
27. M. F. Rabbi, D. B. Rawat, M. A. Ahad and T. Amin, "Analysis of multi-hop opportunistic communications in cognitive radio
network," SoutheastCon 2015, Fort Lauderdale, FL,2015, pp. 1-8.
28. Akyildiz, I., Wang, X., & Wang, W, “Wireless mesh networks: A survey. Elsevier Computer Networks”, 47(4), 2005, pp 445–487.
29. Deo, N., and pang, C. Y, “Shortest path algorithms: Taxonomy and annotation.”, Networks, volume 14, Issue 2,1984, pp 275-323.
30. Cooke and E. Halsey, "The shortest route through a network with time dependent internodal transit times", Journal of Mathematical
Analysis and Applications, 1966,pp 492-498.
31. Klafszky, E. Determination of shortest path in a network with time-dependent edge-lengths. Math. Oper. Stat, 1972,pp 255-257.
32. Dreyfus, S. E. An appraisal of some shortest path algorithms. Oper. Rex I7, 1969,pp 395-412.
33. Halpern, J. The shortest route with time dependent length of edges and limited delay possibilities in nodes. Z. Oper. Res. 21 (1977),
1977, pp117-124.
34. E. Kaufman, R. L. Smith (1993). "Fastest paths in time-dependent networks for intelligent-vehicle-highway systems application".
IVHS Journal 1, 1-11.
35. Daniel Delling and Dorothea Wagner. Time-dependent route planning. In Robust and Online Large-Scale Optimization, volume 5868
of Lecture Notes in Computer Science,2009, pp 207–230.
36. Orda and R. Rom. Shortest-path and minimum-delay algorithms in networks with time-dependent edge-length. J.ACM, 37(3), 1990,pp
607–625.
37. Ding, J. Yu, and L. Qin. Finding time-dependent shortest paths over large graphs. In Proc. EDBT, pages 205–216. ACM, 2008.
38. C. Dean. Continuous-time dynamic shortest path algorithms. Master’s thesis, Massachusetts Institute of Technology, 1999.
39. Zhan-yu and G. p. Liu, "Earliest-arrival path: A global optimized transmission for networked control systems," 2017 36th Chinese
Control Conference (CCC), 2017, pp. 7909-7914.
40. Abdelfattah Idri, Mariyem Oukarfi, Azedine Boulmakoul, Karine Zeitouni and AliMasri “A new time-dependent shortest path
algorithm for multimodal transportation network,” Procedia Computer Science Volume 109, 2017, pp 692-697.
41. https://ahmedhanibrahim.wordpress.com/2016/04/15/solving-time-dependent-graph-using-modified-dijkstra-algorithm/.
42. Shylashree N, “Non-crossing rectilinear shortest minimum bend paths in the presence of rectilinear obstacles”, Journal of
Telecommunication and Information Technology, no. 3, 2018, pp 82-91.

Você também pode gostar