64

InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department
Page 2: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Editor-In-Chief Chair Dr. Shiv Kumar

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE

Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal

(M.P.), India

Associated Editor-In-Chief Chair Dr. Dinesh Varshney

Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota

Ph.D. (CSE), MCA, MSc (Mathematics)

Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

Ph.D(CSE), MS(CSE), BSc(EE)

Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime

Transport, Egypt

Dr. Mayank Singh

PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT

Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-

Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker

Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)

Stamford, USA.

Dr. Shanmugha Priya. Pon

Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East

Africa, Tanzania

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,

China.

Dr. Fadiya Samson Oluwaseun

Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

Cyprus, Turkey.

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra

Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair Dr. Deepak Garg

Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue

Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Page 3: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura, Egypt.

Dr. Hugo A.F.A. Santos

ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia

Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg

Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng

Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas

Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov

Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr. Ch.V. Raghavendran

Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang

Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,

Hochiminh, Vietnam.

Dr. Wilson Udo Udofia

Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Manager Chair Mr. Jitendra Kumar Sen

Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair Dr. Sameh Ghanem Salem Zaghloul

Department of Radar, Military Technical College, Cairo Governorate, Egypt.

Editorial Members Dr. Uma Shanker

Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India

Dr. Rama Shanker

Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumar

Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India

Dr. Brijesh Singh

Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,

Ahmedabad (Gujarat), India.

Page 4: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

S. No Volume-8 Issue-5S3, July 2019, ISSN: 2249-8958 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication Page No.

1. 1

.

Authors: B.Deepa ,V.Maheswari ,V.Balaji

Paper Title: Encoding And Decoding Using Edge Labeling Of A Path Graph

Abstract: In this paper,we make plaintext through product edge labeling by using a path graphand Caeser

cipher method.We dividetheplaintext into two letter blocks. The formatted two letter blocks are encrypted by

matrix multiplication and we decipher the message by using the Inverse atrix multiplication with additive three

concept.We investigate the above technique using square matrices.

Keywords: Plaintext,Ciphertext, Encryption,Decryption, Matrices, Inverse Matrices, Rotation letters.

AMS subject classification MSC (2010) No: 05C78

References:

[1] Davidkahn, The codebreakers: The story of secret writing, Revised ed.1996. ISBN 0-684-83130-9.

[2] LesterS.Hill, Concerning Certain Linear Transformation Apparatus of Cryptography, The American

Mathematical Monthly Vol.38,1931,pp.135-154.

[3] LesterS.Hill, Cryptography in a Algebraic Alphabet, The American Mathematical Monthly Vol.36, June-

July 1929, pp.306-312.

[4] JanCA.Van Dev Lubbe, Basic Methods of Cryptography, Cambridge University Press, United Kingdom

(2002).

[5] Chris Christensen ,Caesar Ciphers, Spring 2010, HNR 304.

[6] J.BaskerBabujee, V.Vishnupriya, Encrypting number using pair labeling in path graph, IJPAM: Volume 114,

No.2 (2017)

1-4

1.

Authors: Kuppala Sushmanth Sai,Yaramala Srinath,P.Sabitha,Bejawada Venkatesh,RaghavendranR

Paper Title: Mood Sensing using Facial Landmarks

Abstract: Communication plays a pivotal role in every person’s life.There are various types of

communications in which some are verbal and some are non-verbal. Expressions on a person’s face are a type of

non-verbal communication.Expressions on the face can be used to define how the person is feeling, recognizing

them helps to enhance the human-machine interaction.Thus we propose a system that is un-affected by the

illumination changes or the light changes. Expressions on the human face can be computed by using

CLM,constrained local models inserts a dense model to a new input image to get the emotions stats .SVM

classifier is used to distinguish the input image into different emotion categories. Results showed a remarkable

increase in efficiency and performance.Change in lighting conditions will have a very little effect on the

efficiency of the system.

Keywords: SVM, MEM, CLM

References:

[1] Kaihao Zhang, Yongzhen Huang “Facial Expression Recognition Based on Deep Evolutional Spatial-

Temporal Networks”,IEEE Transactions on Image processing 2017.

[2] Gozde Yolcu, Ismail Oztel, Serap Kazan, Cemil Oz, Kannappan Palaniappan, Teresa E. Lever, Filiz Bunyak

“Deep Learning-based Facial Expression Recognition for Monitoring Neurological Disorders”IEEE

international conference on bio informatics”

[3] Su-Jing Wang ; Wen-Jing Yan ; Xiaobai Li ; Guoying Zhao ; Chun-Guang Zhou ; Xiaolan Fu ; Minghao

Yang ; Jianhua Tao, “Micro-Expression Recognition Using Color Spaces, IEEE Transactions Image

Processing 2015

[4] Washef Ahmed ; Soma Mitra ; Kunal Chanda ; Debasis Mazumdar “Assisting the autistic with improved

facial expression recognition from mixed expressions” IEEE international conference on computer vision

2013”

[5] S. Ramanathan ; Ashraf Kassim ; Y.V. Venkatesh ; Wu Sin Wah “Human Facial Expression Recognition

using a 3D Morphable Model” IEEE conference on Image Processing 2006.

[6] M. Pantic ; I. Patras“Dynamics of facial expression: recognition of facial actions and their temporal

segments from face profile image sequences” IEEE Transactions on Systems, Man, and Cybernetics, Part B

(Cybernetics) 2006.

1-4

2. 3 Authors: A. Shiny, Reuma Akhtar, Saurav Singh, K. Sujana, D.V. Neelesh

Page 5: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Paper Title: An Efficient Method to Extract Geographic Information

Abstract: A ton of vital geographic information about spots, including points of interest, areas and personal

information such as neighborhoods, phone numbers etc. can be found on the Internet. However, such

information is not openly available using legitimate means. Furthermore, the given information is temperamental

as it is static and not refreshed every now and again enough. In this paper, using the results of an internet list, an

effective method to manage and collect datasets of spot names is demonstrated. The strategy proposed is to use

the Google web crawler Application Programming Interface in order to recoup site pages related with express

territory names and types of spots and after that analyses the resultant website pages to remove addresses and

names of places. Using the data gathered from internet, the final result compiled is a dataset of spot names. We

survey our philosophy by using accumulated data found using street view of Google Maps by examining signs

belonging to businesses found in images. The conclusion exhibited by the results was that the modelled

procedure efficiently created spot datasets on par with Google Maps and defeated the results of OSM.

Index Terms: datasets, geographic information, points of interest, spot names.

References:

[1] Raeymaekers S., Bruynooghe M., Van den Bussche J. Learning (k,l)-Contextual Tree Languages for

Information Extraction. In: Gama J., Camacho R., Brazdil P.B., Jorge A.M., Torgo L. (eds) Machine

Learning: ECML 2005. Lecture Notes in Computer Science, vol 3720. Springer, Berlin, Heidelberg, 2005.

[2] Skoutas, Dimitrios, Dimitris Sacharidis, and Kostas Stamatoukos. "Identifying and Describing Streets of

Interest." In EDBT, pp. 437-448, 2016.

[3] Keßler C, Maué P, Heuer JT, Bartoschek T. Bottom-up gazetteers: Learning from the implicit semantics of

geotags. In International Conference on GeoSpatial Sematics (pp. 83-102). Springer, Berlin, Heidelberg,

2009.

[4] Al-Olimat HS, Thirunarayan K, Shalin V, Sheth A. Location name extraction from targeted text streams

using gazetteer-based statistical language models. arXiv preprint arXiv:1708.03105, Aug 2017

[5] Arampatzis A, Van Kreveld M, Reinbacher I, Jones CB, Vaid S, Clough P, Joho H, Sanderson M. Web-

based delineation of imprecise regions. Computers, Environment and Urban Systems, 2006.

[6] Zhang Y, Chiang YY, Knoblock C, Zhang X, Yang P, Gao M, Ma Q, Hu X. Extracting geographic features

from the Internet: A geographic information mining framework. Knowledge-Based Systems, Mar 2019.

[7] Goldberg DW, Wilson JP, Knoblock CA. Extracting geographic features from the internet to automatically

build detailed regional gazetteers. International Journal of Geographical Information Science, Jan 2009.

[8] Brindley P, Goulding J, Wilson ML. Generating vague neighbourhoods through data mining of passive web

data. International Journal of Geographical Information Science, Mar 2018.

[9] Beitzel SM, Jensen EC, Frieder O, Lewis DD, Chowdhury A, Kolcz A. Improving automatic query

classification via semi-supervised learning. In Fifth IEEE International Conference on Data Mining

(ICDM'05), Nov 2005.

[10] Nguyen HT, Cao TH. Named entity disambiguation: A hybrid statistical and rule-based incremental

approach. InAsian Semantic Web Conference (pp. 420-433). Springer, Berlin, Heidelberg, Dec 2008

5-10

4.

Authors: Ms. P. Suganya, R. Chandu, RVSN VamsiKrishn, M. Pavan Kumar, Cherukuri milind

Paper Title: Secure Cloud Data Integrity Using Auditing And Ring Signatures For User Identity

Abstract –The main aim of the project is to check the integrity of the data that is present in the cloud. There is a

tend to show that a way to firmly, flexibly share data with others data. The project mainly deals with integrity

checking of the data that the user obtain from the data owner. A Symmetric key is generated by the data owner

in order to maintain the data integrity in a particular file using AES. This particular symmetric key is associated

with the data owner and the user only. When the cloud file is shared the sensitive information should not be

exposed to others except data owner and user. This process helps in hiding the sensitive information from other

users. Usually digital signature are used to verify the users and grant them access to the particular file that the

user needs to share the data. So as to properly maintain the integrity of the whole data, public auditing is

performed. A public verifier needs to choose for the acceptable public key to verify the integrity of the data. As

the result, the integrity of the data is maintained in the process via digital signatures and public keys under PKI.

Keywords: PKI, AES.

References:

[1] P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” Nat’l Inst. of Standards

and Technology, 2009.

15-19

Page 6: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[2] A. Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,”

[3] IEEE Comm. Magazine, vol. 50, no. 9, pp. 24-25,Sept. 2012

[4] R. Moreno-Vozmediano, R.S. Montero, and I.M. Llorente, “Key Encounters in Cloud Computing to

Empower the Future Internet of Services,” IEEE Internet Computing,v ol.17,no. 4,pp. 18-25July/Aug.2013.

[5] K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE

Internet Computing, vol. 14, no. 5, pp. 14-22, Sept.

[6] K. Ren, C. Wang, Q. Wang, "Security challenges for the public cloud", IEEE Internet Comput., vol. 16,

no. 1, pp. 69-73, Jan. 2012.

[7] G. Ateniese et al., "Provable data possession at untrusted stores", Proc. 14th ACM Conf. Comput.

Commun. Secur., pp. 598-609, 200

[8] A. Juels, B. S. Kaliski, "Pors: Proofs of retrievability for large files", Proc. 14th ACM Conf. Comput.

Commun. Secur., pp. 584-597, 2007

[9] K.Vijayakumar·C,Arun,Continuous security assessment of cloud based applications using distributed

hashing algorithm in SDLC,Cluster Computing DOI 10.1007/s10586-017-1176-x,Sept 2017

[10] K.Vijayakumar·C,Arun, Analysis and selection of risk assessment frameworks for cloud based

enterprise applications”, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017

5.

Authors: Vinita Malik, Sukhdip Singh

Paper Title: Assessing Risks and Cloud Readiness of Pervasive Applications

Abstract: The evolution of revolutionary computational paradigms has been witnessed in terms of the

pervasive systems which not only offer evolving service portfolio but also integrated sensor data from

variable sources but surfaces various challenges of data interaction, integration and adaptation. This

research has been provisioned with the comprehensive focus on pervasive devices user interaction, access

control modeling, identity management, trust and service discovery modeling. In addition, we also proposed a

deep insight into Pervasive computing characteristics, risks, risks models, environmental, ethical and social

impacts. We have explored pervasive computing environment risk models by considering social, human and

environmental risks. This state of art will create a case for developing new models for access control, identity,

trust, risk management in ubiquitous or pervasive computing environments. The research also deals with cloud

readiness of a pervasive power reader application for PaaS environment using a smart vendor solution. The

cloud readiness score is evaluated by questionnaire qualitative information and source code scan. Various

boosters and roadblocks are found out to give score to cloud readiness for any application.

Index Terms: Pervasive/Ubiquitous Computing, Risks, Trust, Access Control, Privacy, Identity Management,

Cloud Readiness

References:

[1] 1.A.A.H.Mousa.A.A.H, “Ubiquitous/Pervasive Computing” , International Journal of Innovative

research & development‖,vol 2 ,pp:276-282,2013

[2] M.Weiser, “ The computer for the 21st century, Scientific American”, 265(No. 3), pp : 94 –104

[3] Y.Ren, A.Boukerche., “ Modelling and managing trust for wireless and mobile adhoc networks”, In:

proceedings of

[4] IEEE conference on Communications (ICC), 2008

[5] J.M.Seigneur, “ Trust, Security and Privacy in global computing” , PhD theses , Trinity College Dublin

, 2005

[6] S.A.Weis, “ Security parallels between people and pervasive devices” , in : Proceedings of the 3rd

IEEE International conference on pervasive computing and communications workshop ,pp. 105-109,2005

[7] Z Hayat, J.Reeve., “Ubiquitous security for ubiquitous computing” ,Information Security technical

report ,12, pp. 172-178,2007

B. Abdulrazak., Y. Malik, “Review of challenges, Requirements and approaches of pervasive computing

system Evaluation”, IETE Technical Review, 29,6, pp.506-522,2012

[8] L.M.Hilty, C.Som , “ Assessing the Human, Social and Environmental risks of pervasive computing”

,Human and Ecological Risk Assessment ,10, PP. 853-874,2004

[9] J.Sen, “Ubiquitous Computing: Applications, Challenges and future trends”, PP. 1-41,2012

[10] C.A.D Costa., “Towards a General software Infrastructure for ubiquitous Computing, Journal of

Pervasive Computing” , IEEE CS , pp.64-73,2008

[11] R. Richardson., “CSI Computer Crime and Security Survey”, Computer security institute, 2009

[12] CarnegieMellon University, http://www.cert.org/octave/download/intro.html 9. Insight

Consulting, http://dtps.unipi.gr/files/notes/ 2009

[13] Clusif,

[14] http://www.clusif.asso.fr/fr/production/ouvrages/pdf/MEHARI- 2010-Overview.pdf

[15] Insight Consulting, http://dtps.unipi.gr/files/notes/ 2009-

2010/eksamino_5/politikes_kai_diaxeirish_asfaleias/ egxeiridio_cramm.pdf

[16] T. Ledermuller, N.L.Clarke, “ Risk assessment for mobile devices”, Lecture notes in computer science

20-25

Page 7: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

,(2011), 210-221

[17] F.Liu,Y.Chen., K.Dai.,Z.Wang, “ Research on risk probability estimating using fuzzy

clustering for dynamic security assessment” ,LNAI,3642,pp. 539-547,2005

[18] R.Sandhu, P. Samarati, “Access control: principles and practice. IEEE Communications

Magazine”, 32(9),pp. 40–48.,1994

[19] R.Sandhu, E.Coyne, H. Feinstein, C. Youman, , “Rolebased access control models”. IEEE

Computer,

[20] 29(2), 38–47,1996

[21] S.Park,Y. Han, & T. Chung, , “Context-role based access control for context-aware

application”. In Lecture

[22] notes in computer science: Vol. 4208. High performance computing and communications (pp. 572–

580). Berlin/Heidelberg: Springer,2006

[23] M.J.Covington, P.Fogla, Z.Zhan, M.Ahamad, “A context-aware security architecture for

emerging applications”,. In Proc. 18th annual computer security applications conference (ACSAC ’02),

Washington, 2002 (p. 249). Los Alamitos: IEEE Computer Society,2002

[24] J.Joshi, E.Bertino, A.Ghafoor,. “Hybrid role hierarchy for generalized temporal role based

access

[25] control model.”, InProc. 26th international computer software and applications conference on

prolonging software life: development and redevelopment (COMPSAC ’02), Washington, DC (pp. 951–956).

Los Alamitos: IEEE Computer Society,2002

[26] H.Zhang, Y.He, Z., “ Spatial context in role- based access control .In Lecture notes in

computer science”:Vol. 4296. Information Security and Cryptology—ICISC2006, November 2006 (pp. 166–

178),2006

[27] Z.Guangsen, P.Manish, Context-aware dynamic access control for pervasive applications. In

Proc. communication networks and distributed systems modeling and simulation conference, SanDiego,

California (pp.219–225) ,January 2004 Y.Kim, C.Mon, D. Jeong ,”Context-aware access contro

mechanism forubiquitous applications”. In Lecture notes in computer science: Vol. 3528. Advances in web

intelligence (pp. 236–

[28] Berlin/Heidelberg: Springer,2005

[29] A. Ahmed, N. Zhang., “ Towards the realization of context risk aware access control in

pervasive computing, Telecommunication Systems”, 45:127-137,2010

[30] M.Langheinrich., “ A Privacy awareness system for ubiquitous computing environments”, In:

Proceedings of UbiComp ,LNCS , 237-245,2002

[31] U. Jendriche, M. Kreutzer, “ Pervasive privacy with identity management”,In : Proceedings of

the workshop on Security in ubiquitous computing , 2002

[32] J.A.Muhtadi, R. Campbell., “ Routing through the mist Privacy preserving communication in

ubiquitous computing environment”, In : Proceedings of the international conference on distributed computing

systems ,2002

[33] A.Beressford, F.Stajano., “ Location privacy in pervasive computing” ,IEEE pervasive

computing ,46-55,2003

[34] D.Nguyen.E. Mynatt., “ Privacy mirrors: Understanding and shaping socio technical ubiquitous

computing”, Technical report ,2002

[35] X.Liang, J.Landay, “Modelling privacy control in context aware systems” , IEEE Pervasive

computing ,59-63,2002

[36] M.Tentori. ,J. Favela., “Privacy aware autonomous agents for privacy healthcare”, IEEE

Computer Society,

[37] 55-62,2006

[38] A. Al-Karkhi., A.Al-Yasiri, “Privacy,trust and identity in pervasive computing : A review of

technical challenges and future research , international journal of distributed and parallel systems” , Vol 3 ,2012

[39] A.Lee, , J.Boyer, C. Drexelius, P.Naldurg, ,R.Hill, Campbell, Supporting dynamically

changing authorizations in pervasive communication systems‖, in the 2nd International Conference on Security

in Pervasive Computing,2005

[40] J.M .Seigneur, S. Farrell, C.D.Jensen, , “―Secure ubiquitous computing based on entity

recognition”,in the UBICOMP2002 - Workshop on Security in Ubiquitous Computing, (Goteborg,

Sweden),2002

[41] F. Stajano, R. Anderson, “The resurrecting duckling: Security issues for ad-hoc wireless

networks”. in Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer

Science, 172-194, B. Christianson, B. Crispo, and M. Roe (Eds.),1999

[42] J. Al-Muhtadi, R.Hill, R. Campbell , “―Context and location-aware encryption for pervasive

computing environments‖, in the Pervasive Computing and Communications Workshops, PerCom

Workshops2006. Fourth Annual IEEE International Conference on, (Pisa),2006

[43] A. Al-Karkhi and A. Al-Yasiri “Asserting User Identity in Pervasive Computing

Environments Using a Non-Intrusive Technique”‖, ISBN: 978-1-902560-24-3 ,2010 PGNet.

[44] S. Creese, M. Goldsmith, B. Rosco, I. Zakiuddin, “Authentication for pervasive computing‖.

,in the Proceedings of the First International Conference on Security in Pervasive Computing, (Boppard,

Page 8: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Germany),2003

[45] T. Grandison, M.Sloman, , “A survey of trust in internet applications”, IEEE Communications

Surveys and Tutorials, 3(4),2000

[46] W.Wagealla, S.Terzis, “Trust based model for privacy control in context–aware systems”‖, in

the 2nd Workshop on Security in Ubiquitous Computing, Washington, USA,2003

[47] L.Kagal, T.Finin, A.Joshi, Trust-based security in pervasive computing environments‖. IEEE

Computer, 34(12), 154-157,2001

[48] Anas EL HUSSEINI, Abdallah M'HAMED, Bachar EL HASSAN, Mounir MOKHTARI, “A

Novel Trust- Based Authentication Scheme for Low-Resource Devices in Smart Environments “, The 2nd

International Conference on Ambient Systems, Networks and Technologies (ANT-2011), Niagara Falls :

Canada, Procedia CS,vol.5,362-369,2011

[49] M.Sharmin.S.I, Ahamed.,S. Ahemed., “ SSRD+ : A Privacy aware trust and security model for

resource discovery in pervasive computing environment” , 30th Annual international computer software and

applications conference,2006

[50] A.Boukerche., Y.Ren., “ A trust based security system for ubiquitous and pervasive

computing environment, computer communications”, 4343-4351, 2008

[51] S.Singh, A.Katiyar, “Pervasive computing service discovery in secure framework

environment”, International research journal of Engineering and technology , (2018), 380- 387

[52] A.Koehler, A.C. Som., “ Effects of Pervasive computing on sustainable development” ,IEEE

Technology and Society magazine ,(2005),15-23

[53] Claudio Da Rold, Gilbert Vander Heiden, “Applying a Cloud First Checklist to ensure successful

sourcing and Business IT Alignment”, Gartner Inc, G00296404, pp: 1-22, 2016

[54] Claudia Loebbecke, Bernhard Thomas, “Assessing cloud readiness: Introducing the magic metrices

used by Continental AG”, IFIP AICT 366, pp: 270-281, 2011

[55] https://www.castsoftware.com/products/highlight

[56] .http://codeload.github.com/smartuni/smartpowerreader/zip/maste

[57] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development

environments,J Ambient Intell Human Computing,DOI 10.1007/s12652-017-0503-7,Springer May 2017.

[58] K. Vijayakumar, Arun C, “Integrated cloud-based risk assessment model for continuous integration”,

International Journal Reasoning-based Intelligent Systems, Vol. 10, Nos. 3/4, 2018.

3.

Authors: Shiny A, Rikhil G R, Namita Vagdevi Cherukuru, Alen Mammen Ivan, Sunil Prakash J

Paper Title: Complex Event Processing Of Market Data through Data Modeling In Big Data

Abstract: Mathematical Finance utilizes advance refined mathematic models and advanced computer

techniques to forecast the movement of worldwide markets. To possess an ability to react intelligently to the

fast-paced changes in the business is a winning factor. Complex event processing with advanced toolchains

plays a crucial role in the explosive growth and diversified forms of market data. To resolve such issues, we

have developed a model based on Big Data that processes the intricate tasks to assess the market data. The

model executes complex events in a data-driven mode in parallel computing on copious data sets, this model is

known as StatCloud. To implement StatCloud, we have used datasets from the Bombay Stock Exchange to

determine the performance. We execute the model with the help of Data analysis techniques and Data

Modelling. The experiment results show that this model obtains high throughput and latency. It executes data

dependent tasks through a data-driven strategy and implements a standard style approach for developing

Mathematical Finance analysis models. This integrated model facilitates the work process of complex events in a

financial organization to enhance the efficiency to implement the right strategies by the financial engineers.

Index Terms: Mathematical Finance, Big Data Analysis, Complex Event Processing, Data parallelization,

Parallel Computing, Statistics.

References:

[1] W. Härdle, T. Kleinow, and G. Stahl, Applied Quantitative Finance: Springer Berlin, 2002.

[2] E. Thorp, "A perspective on quantitative finance: Models for beating the market," The Best of

Wilmott, p. 33, 2005.

[3] B. Fang and P. Zhang, "Big Data in Finance," in Big Data Concepts, Theories, and Applications, S.

Yu and S. Guo, Eds., ed Cham: Springer International Publishing, 2016, pp. 391-412.

[4] X. Shi, P. Zhang, and S. U. Khan, "Quantitative Data Analysis in Finance," in Handbook of Big Data

Technologies, A. Y. Zomaya and S. Sakr, Eds., ed Cham: Springer International Publishing, 2017, pp. 719-753.

[5] J. Chevalier and G. Ellison, "Risk taking by mutual funds as a response to incentives," Journal of

Political Economy, vol. 105, pp. 1167-1200, 1997.

[6] R. A. Brealey and E. Kaplanis, "Hedge funds and financial stability: An analysis of their factor

exposures," International Finance, vol. 4, pp. 161-187, 2001.

[7] T. J. Chemmanur and P. Fulghieri, "Investment bank reputation, information production, and financial

intermediation," The Journal of Finance, vol. 49, pp. 57- 79, 1994.

[8] B. Brown, M. Chui, and J. Manyika, "Are you ready for the era of ‘big data’," McKinsey Quarterly,

vol. 4, pp. 24- 35, 2011.

11-17

Page 9: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[9] BSE (2016-2018). BSE India Market Data. Available: https://www.bseindia.com/market_data.html

[10] P. Brandimarte, Numerical methods in finance and economics: a MATLAB-based introduction: John

Wiley & Sons, 2013

[11] X. Dong, "New development on market microstructure and macrostructure: Patterns of US high

frequency data and a unified factor model framework," State University of New York at Stony Brook, 2013.

[12] O. E. Barndorff‐Nielsen, "Econometric analysis of realized volatility and its use in estimating

stochastic volatility models," Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol.

64, pp. 253-280, 2002.

[13] K. Vijayakumar and C. Arun, “Continuous Security Assessment of Applications in Cloud

Environment”, International Journal of Control Theory and Applications, ISSN: 0974-5645 volume No. 9(36),

Sep 2016, Page No. 533-541.

[14] R.Joseph Manoj, M.D.Anto Praveena, K.Vijayakumar, “An ACO–ANN based feature selection

algorithm for big data”, Cluster Computing The Journal of Networks, Software Tools and Applications, ISSN:

1386-7857 (Print), 1573-7543 (Online) DOI: 10.1007/s10586-018-2550-z, 2018.

[15] K. Vijayakumar and V. Govindaraj, “An Efficient Communication Technique for Extrication and

Cloning of packets on cloud”, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10

No.66 May 2015

4.

Authors: Manidipa Roy, Ashok Mittal

Paper Title: Compact Circular Polarization Design for Equilateral Triangular Micro strip Antenna

Abstract: This article focuses on designing a single-feed circularly polarized equilateral triangular microstrip

patch antenna. The axial ratio bandwidth of the antenna is around 190 MHz. The antenna has been etched at

specific locations for achieving circular polarization. The suppression of surface waves is also being focused

upon for gain enhancement. The array of cylindrical metallic pins is embedded near the radiating side of the

patch antenna. The gain enhancement of around 3.23 dB is observed. The antenna is designed for use in satellite

communications.

Index Terms: compact, circular polarization, slots, axial ratio.

References:

[1] Ramesh Garg, Prakash Bhartia, Microstrip Antenna Design Handbook, Artech House, London

[2] J.R.James, P.S.Hall, Handbook of Microstrip Antenna, Peter Peregrinus, London

[3] C. A. Balanis, Modern Antenna Handook, Wiley & Sons, Hoboken, NJ, 2008

[4] Keith R. Carver, James W. Mink, Microstrip Antenna technology, IEEE Transactions on Antennas and

Propagation, Vol.Ap-29,No.1, January 1981

[5] G. Steven, Q.Luo and F. Zhu, Circularly Polarized Antennas, John Wiley & Sons, UK, 2014.

[6] T. Cai, G. Wang, X. Zhang and J. Shi, Low-profile compact circularly polarized antenna based on fractal

metasurface and fractal resonator, IEEE Antennas Wireless Propagation Letters, Vol. 14, pp. 1072-1076,

2015

[7] Nasimuddin, X. Qing and Z. N. Chen, Compact circularly polarized slotted patch antenna for GNSS

applications, IEEE Trans. Antennas Propagat., Vol. 62, No. 12, pp. 6506-6509, 2014.

[8] V.V. Reddy and N.V.S.N. Sarma, Compact circularly polarized asymmetrical fractal boundary microstrip

antenna for wireless applications, IEEE Antennas Wireless Propag. Lett., vol. 13, pp. 118-121, 2014

[9] W.S. Chen, C.K. Wu, K.L. Wong, Inset microstripline-fed circularly polarized microstrip antennas, IEEE

Trans. Antennas Propag., vol. 48, no. 8, pp. 1253- 1254, 2000

[10] Rajkishor Kumar and Raghvendra Kumar Chaudhary, Circularly polarized rectangular DRA coupled

through orthogonal slot excited with microstrip circular ring feeding structure for Wi-MAX applications,

International Journal of RF and Microwave Computer-Aided Engineering, Volume 28, Issue 1, January

2018

[11] Manidipa Roy, Prateek Juyal, “Surface Wave Reduction in Circularly Polarized Microstrip Patch Antenna

mounted on Textured Pin Substrate”, IEEE AEMC 2011

18-20

5.

Authors: Manidipa Roy, Ashok Mittal

Paper Title: A Slotted Tri-Band Patch Antenna Embedded On Textured Pin Dielectric

Abstract: The propagation of surface waves in the microstrip patch antenna proves to be proves to serious

hindrance to radiation mechanism of the antenna. The periodic arrangement of shorting pins is embedded in the

dielectric substrate at specific location to enhance the gain by around 4-5dB. The slotted perturbations have been

done for achieving tri-band characteristics. The antenna is suitable for operation at three resonant frequency

bands centered at 2.2421 GHz, 5.7632GHz and 7.7633GHz, which makes it suitable for WLAN applications.

Index Terms: microstrip, slots, side patch, tri- band, WLAN

References:

21-22

Page 10: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[1] Ramesh Garg, Prakash Bhartia, “Microstrip Antenna Design Handbook”, Artech House, London

[2] J.Brown, M.A., “Artificial Dielectrics Having Refractive Indices Less Than Unity”,Proc. IEE, Radio

Section, Monograph.62, 1953

[3] Walter Rotman, ”Plasma Simulation By Artificial dielectrics and Parallel Plate Media”, IRE Transactions

on Antennas and Propagation,January 1961

[4] R.J.King, David V. Thiel, Kwang S. Park,”The Synthesis of Surface Reactance using an Artificial

Dielectric”, IEEE Transactions onAntennas and propagation, Vol. AP-31, No. 3, May1983

[5] Dan Seivenpiper, Zhang, Broas, “High Impedance Electromagnetic Surfaces with a Forbidden Frequency

band”, IEEE Transactions on Antennas and Propagation, Vol.-47,No.11, November 1999

[6] Silveinha, ”Electromagnetic Characterization of textured surfaces using textured Pins”, IEEE Transactions

on Antennas and Propagation, Vol.Ap-56,No.2, February 2008

[7] Varada Rajan Komanduri, David R. Jackson, Jeffery T. Williams and Amit R. Mehrotra, “A General

Method for Designing Reduced Surface Wave Microstrip Antennas”, IEEE Transactions On Antennas And

Propagation, Vol. 61,. 6, June 2013

[8] Keith R. Carver, James W. Mink,”Microstrip Antenna technology”, IEEE Transactions on Antennas and

Propagation, Vol.Ap-29,No.1, January 1981

[9] D.M.Pozar,”Rigorous Closed Form Expressions for the Surface Wave Loss of Printed Antennas”,

Electronic Letters, Vol.26, No.13, June 1990

6.

Authors: Deekonda Sai Manish, Nabeel Shahid, Anand Raj, Dr.P.Mohamed Fathimal

Paper Title: A Novel Method to Perform Search Query Using Brainwave Signals

Abstract— The main aim of the proposed paper is to search the information using brain waves instead of

searching using the text query. Electroencephalography (EEG) is an electrophysiological checking strategy to

record the electrical activity of the mind. EEG estimates voltage changes coming about because of ionic current

inside the neurons of the mind. EEG alludes to the account of the mind’s unconstrained electrical movement

over a time frame, as recorded from different nodes put on the scalp. For training, When the user has read a

question, the brain waves are recorded with the help of sensors like Neurosky device in the form of EEG signals

values like Alpha, Beta, and Gamma and are stored in a dataset. The brainwaves of different persons are

recorded for different questions and are stored. The features are reduced using PCA and the centroid of the

values are calculated using the K-means clustering algorithm. For testing, when the user thinks about a question

in the list, the brain waves are recorded and compared with the values available in the dataset. Using KNN

Algorithm, the proposed system outputs the respective question which will be submitted to the search engine. K-

Means clustering algorithm is used to calculate the cluster centroid. Once the centroid is calculated for each

question, we plot each centroid in a 2-D plane. For a random question from the pool of existing questions, we

use the KNN algorithm to find the nearest match. When the match is found, the question corresponding to it is

submitted to the search engine.

Index Terms- Brain Waves, EEG(Electroencephalography), PCA, K-Means, KNN, Neurosky Device.

References:

[1] Separation Of Alpha, Beta, Gamma & Theta Activities In EEG To Measure The Depth Of Sleep And

Mental Status Shah Aqueel Ahmed, Syed Abdul Sattar, D. Elizabath Rani-2013

[2] Brain Wave Recognition of Words Article in Proceedings of the National Academy of Sciences · January

1998 by PATRICK SUPPES, ZHONGLIN LU AND BING HAN

[3] BRAIN WAVE SENSOR SYSTEM FOR ACCIDENT PREVENTION IN VEHICLES S. Pradeep Kumar

and A. Wisemin Lins, VELS University, Pallava-8, April 2017

[4] STUDY AND APPLICATION OF BRAIN WAVES (ALPHA, BETA) FOR USER AMBIENT

ENVIRONMENT CONTROL G. Ambica et al, International Journal of Computer Science and Mobile

Computing, Vol.4 Issue.10, October- 2015.

[5] Ahmad Azhari, Leonel Hernandez,(2016)-Brainwaves feature classification by applying K-Means clustering

using single-sensor EEG, International Journal of Advances in Intelligent Informatics, ISSN: 2442-6571.

[6] A Survey on Thoughts to Text Using Brainwave Pattern Dipti Pawar, Kapil Kamale, Ishaan Singh,

Vishwajeet Kharote, Prajwal Goswami Assistant Professor, Dept. of Computer, Pune, India May-2017.

[7] Ahmad Azhari, Murein Miksa Mardhia,(2017)-Principal component analysis implementation for brainwave

signal reduction based on cognitive activity, International Journal of Advances in Intelligent

23-27

Page 11: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Informatics,ISSN: 2442-6571.

[8] Mind Wave Neurosky device description: https://store.neurosky.com/pages/mindwave

7.

Authors: Rahul Kshetri, Ajay, Shivasheesh Kaushik, Vinay Sati

Paper Title: Tool Wear Analysis during Turning of Hard Material by Simulink

Abstract- Present work is an attempt to develop a simulink model of tool wear by machining of Bearing Steel

(62 HRC) using cubic boron nitride (CBN) tool. The available mathematical model in the scholarly literature is

used to make the simulation model using MATLAB software. Three components of tool wear adhesive wear,

abrasive wear & diffusion wear are considered separately for their modeling and later modeling of total wear is

done. Variation of tool wear is studied with respect to cutting speed. The developed simulink model is capable to

do the similar type of study by changing the workpiece and tool material combination.

Keywords: Simulink, Tool wear, Mathematical modeling, Turning.

References:

[1] Rabinowicz, E., Dunn, L. A., and Russell, P. G., 1961, ‘‘A Study of Abrasive Wear under Three-Body

Conditions,’ Wear, 4, pp. 345–355.

[2] Williams, J. A., 1994, Engineering Tribology, Oxford University Press, NY

[3] Archard, J. F., 1953, ‘‘Contact and Rubbing of Flat Surfaces,’’ J. Appl. Phys., 24, pp. 981–988.Wear of

Carbide Tool,’’ ASME J. Eng. Ind., 100, pp. 236–243.

[4] Kannatey-Asibu, E., Jr., 1985, ‘‘A Transport-diffusion Equation in Metal Cutting and Its Application to

Analysis of the Rate of Flank Wear,’’ASME J. Eng. Ind., 107, pp. 81–89.

[5] Loladze, T. N., 1981, ‘‘Of the Theory of Diffusion Wear,’’ CIRP Ann., 30~1!, pp. 71–76.

[6] Usui, E., Shirakashi, T., and Kitagawa, T., 1978, ‘‘Analytical Prediction of Three Dimensional Cutting

Process, Part 3: Cutting Temperature and Crater

[7] Kramer, B. M., and Judd, P. K., 1985, ‘‘Computational Design of Wear Coating,’’ J. Vac. Sci. Technol. A,

A3~6!, pp. 2439–2444.

[8] Kramer, B. M., 1986, ‘‘Predicted Wear Resistances of Binary Carbide Coatings,’’ J. Vac. Sci. Technol. A,

A4~6!, pp. 2870–2873.

[9] Mamalis, A. G., J. Kundrak and M. Horvath, 2002. “Wear and Tool Life of CBN CuttingTools”.

International Journal Advance Manufacturing Technology 20:475–479.

[10] Rabinowicz, E., 1977. “Abrasive wear resistance as a materials test”, Lubrication Engineering, Vol. 33,

pp.378–381

[11] Kannatey, 1985. “A Transport-diffusion Equation in Metal Cutting and Its Application to Analysis of the

Rate of Flank Wear”, ASME J. Eng. Ind., 107, pp. 81–89.

[12] Huang, Yong, and Steven Y. Liang. "Modeling of CBN tool flank wear progression in finish hard

turning." TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF

MANUFACTURING SCIENCE AND ENGINEERING 126.1 (2004): 98-106.

[13] Mathworks, Matlab User manual

28-31

8.

Authors: Shivasheesh Kaushik, Satyendra Singh

Paper Title: Analysis on Heat Transmission and Fluid Flow Attributes in Solar Air Accumulator Passage with

Diverse Faux Jaggedness Silhouettes on Absorber Panel

Abstract: There is a necessity to investigate the heat transmission and fluid cascade peculiarities of solar air

convectors using varying faux irregular surface and shapes on absorber sheet, so that the solar devices utilize

maximum amount of available solar radiated heat energy during day time. These artificial roughness shapes are

use for the enhancement of thermal performance. This need arises from the fact that the heat circulation and

liquid cascade trait have been investigated by the previous investigators only for the cases that differ

considerably from those relevant to solar air brazier having different screen matrix placed in the planes parallel

to the flow direction and that the radiant energy being absorbed in depth. In our present research paper we

investigating experimentally the behavior of artificial irregularities located over absorber platter of solar air

heater vessel of varying shapes like trapezoidal, sin wave, rectangular, alternative elliptical shape pattern etc,

with different Reynolds Number range 4000 to 24000, mass flow rate on Nusselt Number and Friction Factor

and also find the suitable optimum shape for heat transmission enhancement.

The results indicated the best heat transfer enhancement results for the alternative elliptical shape pattern among

other artificial roughness with range of 0.0786kg/s – 0.475kg/s mass flow rate with thermal efficiency near about

78%.

32-41

Page 12: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Index Terms: Aluminum sheet, artificial roughness, heat transfer characteristics.

References:

[1] Rahimi M, Shabanian S.R. and Alsairafi A.A., 2009. Experimental and CFD studies on heat transfer and

friction factor characteristics of a tube equipped with modified twisted tape inserts. Chemical Engineering

and Processing 48, 762–770.

[2] Eiamsa-ard S, Wongcharee K, and Sripattanapipat S, 3-D, 2009. Numerical simulation of swirling flow and

convective heat transfer in a circular tube induced by means of loose-fit twisted tapes. International

Communications in Heat and Mass Transfer 36, 947–955.

[3] Zhang Z, Ma D, Fang X, and Gao X,. 2008. Experimental and numerical heat transfer in a helically baffled

heat exchanger combined with one three-dimensional finned tube. Chem. Eng. Process 47, 1738–1743.

[4] Munoz-Esparza D, and Sanmiguel-Rojas E., 2011. Numerical simulations of the laminar flow in pipes with

wire coil inserts. Computers & Fluids 44, 169–177.

[5] Kumar A., Chamoli S. and Kumar M., 2016. Experimental investigation on thermal performance and fluid

flow characteristics in heat exchanger tube with solid hollow circular disk inserts. Applied Thermal

Engineering 100, 227–236.

[6] Bhuiya M.M.K., Sayem A.S.M., Islam M., Chowdhury M.S.U., Shahabuddin M., 2014. Performance

assessment in a heat exchanger tube fitted with double counter twisted tape inserts. International

Communications in Heat and Mass Transfer 50, 25–33.

[7] Bhuiya M.M.K., Chowdhury M.S.U., Shahabuddin M., Saha M., Memone L.A., 2013. Thermal

characteristics in a heat exchanger tube fitted with triple twisted tape inserts. International Communications

in Heat and Mass Transfer 48, 124–132.

[8] Bas H. and Ozceyhan V., 2012. Heat transfer enhancement in a tube with twisted tape inserts placed

separately from the tube wall. Experimental Thermal and Fluid Science 41, 51–58.

[9] Eiamsa-ard S. and Promvonge P., 2011. Influence of Double-sided Delta-wing Tape Insert with Alternate-

axes on Flow and Heat Transfer Characteristics in a Heat Exchanger Tube. Chinese Journal of Chemical

Engineering, 19(3), 410-423.

[10] Eiamsa-ard S., Chinaruk T., Eiamsa-ard P. and Promvonge P., 2010. Thermal characteristics in a heat

exchanger tube fitted with dual twisted tape elements in tandem. International Communications in Heat and

Mass Transfer 37, 39–46.

[11] Promvonge P., Eiamsa-ard S., 2007. Heat transfer and turbulent flow friction in a circular tube fitted with

conical-nozzle turbulators. International Communications in Heat and Mass Transfer 34, 72–82.

[12] Chang S. W., Yang T. L. Liou J. S., 2007. Heat transfer and pressure drop in tube with broken twisted tape

insert. Experimental Thermal and Fluid Science 32,489–501.

[13] L. Varshney and J. S. Saini, 1998. Heat transfer and friction factor correlations for rectangular solar air

heater duct packed with wire mesh screen matrices. Solar energy 62, 255-262.

[14] V.S. Hans, R.P. Saini, J.S. Saini, 2010. Heat transfer and friction factor correlations for a solar air heater

duct roughened artificially with multiple v-ribs. Solar Energy 84, 898–911.

[15] Brij Bhushan, Ranjit Singh, 2012. Thermal and thermohydraulic performance of roughened solar air heater

having protruded absorber plate, Solar Energy 86, 3388–3396.

[16] Prashant Dhiman, N.S. Thakur, Anoop Kumar, Satyender Singh,2011. An analytical model to predict the

thermal performance of a novel parallel flow packed bed solar air heater. Applied Energy 88, 2157–2167.

[17] A.A. El-Sebaii, S. Aboul-Enein, M.R.I. Ramadan, S.M. Shalaby, B.M. Moharram, 2011. Thermal

performance investigation of double pass-finned plate solar air heater. Applied Energy 88, 727–1739.

[18] Mohitkumar G. Gabhane, Amarsingh, Kanase-Patil, 2017. Experimental analysis of double flow solar air

heater with multiple C shape roughness, Solar Energy 155, 1411–1416.

[19] S.S. Krishnananth, K. Kalidasa Murugavel, 2013. Experimental study on double pass solar air heater with

thermal energy storage. Journal of King Saud University – Engineering Sciences 25, 135–140.

[20] Khushmeet Kumar, D.R. Prajapati, Sushant Samir, 2016. Heat Transfer and Friction Factor Correlations

Development for Solar Air Heater Duct Artificially Roughened with ‘S’ Shape Ribs. Experimental Thermal

and Fluid Science, http://dx.doi.org/10.1016/j.expthermflusci.2016.11.012

[21] Fouad Menasria, Merouane Zedairia, Abdelhafid Moummi, 2017. Numerical study of thermohydraulic

performance of solar air heater duct equipped with novel continuous rectangular baffles with high aspect

ratio. Energy, 10.1016/j.energy.2017.05.002

[22] L. Varshney, A.D. Gupta, 2017. Performance prediction for solar air heater having rectangular sectioned

tapered rib roughness using CFD. Thermal Science and Engineering Progress,

http://dx.doi.org/10.1016/j.tsep.2017.09.005

[23] Smith Eiamsa-ard , Pongjet Promvonge(2009)."Thermal characteristics in round tube fitted with serrated

twisted tape".Applied Thermal Engineering 30, 1673e1682

[24] Abhishek Gautam, Lokesh Pandey, Satyendra Singh, 2017. Influence of perforated triple wing vortex

generator on a turbulent flow through a circular tube, https://doi.org/10.1007/s00231-018-2296-4

[25] N.T. Ravi Kumar, P. Bhramara, A. Kirubeil, L. Syam Sundar, Manoj K. Singh, Antonio C.M.

Sousa(2018).Effect of twisted tape inserts on heat transfer, friction factor of Fe3O4 nanofluids flow in a

double pipe U-bend heat exchanger."International Communications in Heat and Mass Transfer 81, 155–163

[26] Alok Kumar, Sunil Chamoli, Manoj Kumar, 2016. Experimental investigation on thermal performance and

fluid flow characteristics in heat exchanger tube with solid hollow circular disk inserts. Applied Thermal

Engineering 100, 227–236.

Page 13: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[27] Seyfi Şevika, Mesut Abuşkab, 2019. Thermal performance of flexible air duct using a new absorber

construction in a solar air collector. Applied Thermal Enginering 146, 123-134.

[28] Alok Kumar, Sunil Chamoli, Manoj Kumar, Satyendra Singh, 2016. Experimental investigation on thermal

performance and fluid flow characteristics in circular cylindrical tube with circular perforated ring inserts.

Experimental Thermal and Fluid Science 79, 168–174.

9.

Authors: Kartik Arora, Sanjay Kumar Singh

Paper Title: IOT Based Portable Medical Kit

Abstract: Medication requirements and health issues have been on the rise in the last decade and to cater to

this numerous technologies have been introduced to the health sector. Internet of Medical Things (IoMT) has

been on the rise and providing medical care to the much needed through services, smart medical devices that not

only provides an enhanced platform to the doctor but also to the patients to maintain better healthcare levels.

This paper addresses the implementation of a multilayered architecture for a health monitoring kit incorporated

with sensors and alert mechanism to activate a pill dispenser. The sensor data is relayed to a personalized

android application and care has been taken to make sure that the patient receives the medicine on time and in

the required dosage.

Index Terms: Android application, Dispenser, Health sensors Medicine, Monitor

References:

[1] Prosanta Gope and Tzonelih Hwang, “BSN-Care: A Secure IoT-Based Modern HealthcareSystem Using

Body Sensor Network” 1368IEEE SENSORS JOURNAL, VOL. 16, NO. 5, MARCH 1, 2016

[2] Kaleem Ullah,Munam Ali Shah,Sijing Zhang,”Effective Ways to Use Internet of Things in the Field of

Medical and Smart Health Care” 978-1-4673-8753-8/16/$31.00 ©2016 IEEE

[3] Punit Gupta, Deepika Ahrawal“IoT Based Smart Health Care Kit”. 2016 ICCTICT

[4] Abdelrahman Rashed, Ahmed Ibrahim, Ahmed Adel, Bishoy Mourad, Ayman Hatem, Mostafa Magdy,Nada

Elgaml, Ahmed Khattab “Integrated IoT Medical Platform for RemoteHealthcare and Assisted Living”.

978-1-5386-1359-7$31.00c©2017 IEEE

[5] Gulraiz J. Joyia, Rao M. Liaqat, Aftab Farooq, and Saad Rehman"Internet of Medical Things (IOMT):

Applications, Benefits and Future Challenges in Healthcare Domain”

[6] M.Shamim Hossaina,Ghulam Muhammad“Cloud assisted Industrial Internet of Things (IIoT) – Enabled

framework for health monitoring”

[7] “Combination of Cloud Computing and Internet of Things (IOT) in Medical Monitoring Systems”

[8] D. Wan, “Magic medicaine cabinet: A situated portal for consumer healthcare,” in Proc. First Int. Symp.

Handheld and Ubiquitous Com-puting (HUC ’99), Sep. 1999.

[9] Kuperman GJ, Bobb A, Payne TH, et al. “Medication Related Clinical Decision Support in Computerized

Provider Order Entry Systems: A Review” Journal of American Medical Informatics Association, 2007.

[10] S. Mukund1 and N.K.Srinath “Design of Automatic Medication Dispenser”

[11] “Automatic Pill Dispenser”, Mrityunjaya D H1, Kartik J Uttarkar2, Teja B3, KotreshHiremathInternational

Journal of Advanced Research in Computer and Communication Engineering CertifiedVol. 5, Issue 7,

July2016

42-46

10.

Authors: C.Kishore Kumar, V.Venkatesh

Paper Title: Design and Development of IOT Based Intelligent Agriculture Management System in Greenhouse

Environment

Abstract: The introduction of Internet of Things (IoT) has a significant impact on shaping the communication

and internetworking landscapes. The upcoming IoT researches are linked with design of standards and open

architectures still requiring a global attention before deployment. The main objective is to design and develop a

framework on Internet of Things (IoT) for precision agriculture using Machine learning techniques, where it

surges the efficiency in farming by minimizing the loss of water and studying the fertility of the field. Libelium

Smart Agriculture is used to connect to the IoT which uses Waspmote module. Waspmote is the plug and sense

platform which is programmed using Waspmote IDE configured to connect with the available Local Area

Network (LAN). With the help of Machine learning techniques like Classification And Regression Technique

(CART) and Linear Support Vector Machine (SVM), the amount of water required by the crops can be

estimated. In this paper, various regression such as stochastic gradient decent and boosted tree regression

techniques are compared and results were obtained. Although each model applied in this paper performed well

in predicting whether the crop needs to be irrigated, the optimal prediction accuracies were acquired by Boosted

Tree Regression (BTC). It is compared by the fold numbers, Root Mean Squared Error (RMSE) and coefficient

of Determination (CoD). The accuracy of the boosted tree regression came out to be 91.93% and the stochastic

gradient descent prediction model delivered 62.95% accuracy. The amount of water required for the irrigation is

then sent to appropriate actuator like solenoid valve and motor can be turned on for that particular period of

time. Calibration test results and Measurements are represented to enhance the accuracy and success rates of

Precision Agriculture (PA).

47-52

Page 14: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Index Terms: Decision Support System (DSS), Libelium, Machine learning, Smart Agriculture.

References:

[1]. Tomo Popovic, Nedeljko Latinovic, Ana Pešic´,Zarko Zecˇevic´, Bozˇo Krstajic´, Slobodan Djukanovic.,

“Architecting an IoT-enabled platform for precision agriculture and ecological monitoring: A case study”,

Computers and Electronics in Agriculture, vol.no: 140, 2017, pp. 255-265.

[2]. Evans, R., & Bergman, J., “Relationships between cropping sequences and irrigation frequency under self-

propelled irrigation systems in the Northern Great Plains (NGP)”, USDA Annual Report, 2007, pp. 466-

479.

[3]. Anat Goldstein et.al, “Applying machine learning on sensor data for irrigation recommendations: revealing

the agronomist’s tacit knowledge”, Precision Agriculture, vol.no: 19, 2018, pp.421-444.

[4]. Kim, William M.Iverson, Robert G.Evans, “Remote Sensing control of an irrigation system using a

distributed wireless sensor Network”, vol.no:57, , 2008, pp.1379-1387.

[5]. Junyan Ma, Xingshe Zhou, Shining Li , Zhigang Li, “Connecting Agriculture to the Internet of Things

through Sensor Networks”, 2011, pp.19-29.

[6]. Allen, R. G., “Crop evapotranspiration: Guidelines for computing crop water requirements”, (FAO)

irrigation and drainage paper. Rome: FAO, 1998, pp.344-356.

[7]. Vellidis, G., Tucker, M., Perry, C., Reckford, D., Butts, C., Henry, H., et al.,”A soil moisture sensor-based

variable rate irrigation scheduling system”, Precision agriculture ‘13. The Netherlands: Wageningen

Academic Publishers, 2013, pp. 487-609.

[8]. Thysen, I., & Detlefsen, N. K.,“Online decision support for irrigation for farmers”, Agricultural Water

Management, vol.no: 86, 2006, pp.269–276.

[9]. Mateos, L., Lopez-Cortijo, I., & Sagardoy, J. A., “SIMIS: The FAO decision support system for irrigation

scheme management”, Agricultural Water Management, vol.no: 56, 2002 , pp.193–206.

[10]. Y. Liu, Z-H. Ren, D. M. Li, X. K. Tian, Z. N. Lu, "The research of precision irrigation decision support

system based on genetic algorithms," in Proc. 5 Int. Conf. on Machine Learning and Cybernetics, Dalian,

2006, pp.56-67.

[11]. Hedley, C. B., Roudier, P., Yule, I. J., Ekanayake, J., & Bradbury, S., “Soil water status and water table

depth modeling using electromagnetic surveys for precision irrigation scheduling”, Geoderma, vol. no:199,

2013, pp.22–29.

[12]. Breiman,L., “Random Forests and Machine Learning”, vol. 45, 2001, pp. 5–32.

[13]. Hill, T., Lewicki, P.,"STATISTICS: Methods and Applications", Statsoft, 2007, pp.678-690.

[14]. Andriyas, S., & McKee, M., “Recursive partitioning techniques for modeling irrigation behavior”,

Environmental Modeling & Software, vol.no:47, 2013, pp.207–217.

11.

Authors: Jaihind G, Ezhilarasie R, Umamakeswari A

Paper Title: Water Quality Monitoring and Prediction of Water Quality at College Premises Using Internet of

Things

Abstract: IoT is becoming more popular and effective tool for any real time application. It has been involved

for various water quality monitoring system to maintain the water hygiene level. The main objective is to build a

system that regularly monitors the water quality and manages the sustainability. This system deals with specific

standards like low cost background and system efficiency when compared to other studies. In this paper, IoT

based real time monitoring of water quality system is implemented along with Machine learning techniques such

as J48, Multilayer Perceptron (MLP), and Random Forest. These machine learning techniques are compared

based on the hyper-parameters and the results were obtained. The attributes such as pH, Dissolved Oxygen

(DO), turbidity, conductivity obtained from the corresponding sensors are used to create a prediction model

which classifies the quality of water. Measurement of water quality and reporting system is implemented by

using Arduino controller, GSM/GPRS module for gathering data in real time. The collected data are then

analyzed using WEKA interface which is a visualization tool used for the analysis of data and prediction

modeling.The Random forest technique outperforms J48 and Multilayer perceptron by giving 98.89% of

correctly classified instances.

Index Terms: Internet of Things (IoT), Machine learning techniques, Random Forest, water quality, WEKA.

References:

[1] Yiheng Chen. etal.,, “Water quality monitoring in smart city: A pilot project”, Automation in Construction,

Vol.no: 89 (307–316), 2018.

[2] Mompoloki Pule. etal.,, “Wireless sensor networks: A survey on monitoring water quality”, Journal of

Applied Research and Technology, Vol.no:15 (562–570), 2017.

[3] Dung Nguyen. etal.,, “A Reliable and Efficient Wireless Sensor Network System for Water Quality

Monitoring”,13th International Conference on Intelligent Environments, 2017.

[4] ArchanaSolanki. etal.,, “Predictive Analysis of Water Quality Parameters using Deep Learning”,

International Journal of Computer Applications (0975 – 8887) Volume 125 – No.9, 2015.

[5] Md. Omar Faruq. etal.,, “Design and Implementation of Cost Effective Water Quality Evaluation System”,

53-57

Page 15: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

IEEE Region 10 Humanitarian Technology Conference (R10-HTC) 21 - 23 Dec 2017.

[6] Paul B. Bokingkito Jr. etal.,, “Design and Implementation of Real-Time Mobile-based Water Temperature

Monitoring System”, Procedia Computer Science, Vol.no: 124, (698–705), 2017.

[7] Yang Fu. etal.,, “Behavioural informatics for improving water hygiene practice based on IoT environment,

Journal of Biomedical Informatics”, Vol.no: 78,(156–166), 2018.

[8] Cristina Polonschiia, Eugen Gheorghiua, “A multitiered approach for monitoring water quality”, Energy

Procedia,Vol.no: 112, (510–518), 2017.

[9] M. Parameswari, M. Balasingh Moses, “Online measurement of water quality and reporting system using

prominent rule controller based on aquacare-IOT”, Des Autom Embed Syst, DOI 10.1007/s10617-017-

9187-7.

[10] Vesna Rankovic. Etal.,,, “Neural network modeling of dissolved oxygen in the Gruža reservoir, Serbia”,

Ecological Modelling, Volume No: 221, (Pages 1239-1244) April 2010.

[11] G. Indrajith and K.Vijayakumar, “Automatic Mathematical and Chronological Prediction in Smartphone

Keyboard” International Journal of Engineering and Computer Science ISSN: 2319-7242Volume 5 Issue 5

May 2016, Page No. 16714-16718.

[12] K. Vijayakumar and C. Arun, “A Survey on Assessment of Risks in Cloud Migration”, International Journal

of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.66 May 2015.

[13] K. Vijayakumar and C. Arun, “Continuous Security Assessment of Applications in Cloud Environment”,

International Journal of Control Theory and Applications, ISSN: 0974-5645 volume No. 9(36), Sep 2016,

Page No. 533-541.

12.

Authors: S. Shakthi Priyadharshini, A.Umamakeswari

Paper Title: Human Identification In Smart Home Environment

Abstract: People moved their life as automatic systems, like smart home. But here major issues is security, the

sensitive personal information have been raised the privacy concerns such as (modifying the data, unauthorized

access of data) among peoples would like to share their personal information are only utilized for their benefits,

rather than being utilized for malignant purpose. Person Identification in smart home with real time is the major

challenging in monitoring system. Capturing the still and live images with high efficiency is the complex task.

This system provides the efficiency in higher rate with quick response. Data are lively gathered and lively

compared with the data, so the process is undergoing the HAAR and the Convolutional Neural Network (CNN).

Capturing and labeling the images is done with the live processing then the live video processing is taken the

frames of images. So, the data are not stored for long time, and compared the still and live frames in the known

frame databases it matches the features and notify the system with two categories as known and unknown.

Index Terms: Human Classification, Face Recognition, HAAR Cascade, CNN, Person Re-Identification

References:

[1] Shih-Chung Hsu and Yu-Wen Wang, Chung-Lin Huang” Human Object Identification for Human-Robot

Interaction by using Fast R-CNN 2018 Second IEEE International Conference on Robotic Computing-2018.

[2] Javed Iqbal, Mihai TeodorLazarescu, Osama Bin Tariq, “Capacitive Sensor for Tag less Remote Human

Identification Using Body Frequency Absorption Signatures,” IEEE Transactions On Instrumentation And

Measurement, Volume: 67, Issue: 4, April 2018.

[3] RaduProdan, IoanNascu, “Identifying Patterns for Human Activities of Daily Living in Smart Homes,”

IEEE International Conference on Automation, Quality and Testing, Robotics, 2014.

[4] S. Pisa, E. Pittella, E. Piuzzi, M. Cavagnaro, and P. Bernardi., “Design of a UWB Radar System for

Remote Breath Activity Monitoring” IEEE/MTT-S International Microwave Symposium Digest,2012.

[5] M. Umair Bin Altaf∗, TarasButko, and Biing-Hwang (Fred) Juang, “Acoustic Gaits: Gait Analysis with

Footstep Sounds,” IEEE Transactions on Biomedical Engineering, Vol. 62, NO. 8, AUGUST 2015.

[6] G. Mokhtari,Q. Zhang,S. Ball, M. Karunanithi “BLUESOUND: A New Resident Identification Sensor –

Using Ultrasound Array and BLE Technology for Smart Home Platform,” DOI

10.1109/JSEN.2017.2647960, IEEE Sensors Journal.

[7] Xiangbo He, Ting Jiang, “Target identification in foliage environment using UWB radar with hybrid

wavelet-ICA and SVM method,” Journal Physical Communication, Feb 2014.

[8] Adnan Farooq, Ahmad Jalal, and Shaharyar Kamal, “Dense RGB-D Map-Based Human Tracking and

Activity Recognition using Skin Joints Features and Self-Organizing Map,” KSII TRANSACTIONS ON

INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 5, May 2015.

[9] Marco Teran, Juan Aranda and Henry Carrillo, Diego Mendez and Carlos Parra “IoT-based System for

Indoor Location using Bluetooth Low Energy, count, location, track, and identity,” IEEE Colombian

Conference on Communications and Computing (COLCOM),2017.

[10] S. Pisa, E. Pittella, E. Piuzzi, M. Cavagnaro, and P. Bernardi., “Design of a UWB Radar System for

Remote Breath Activity Monitoring” IEEE/MTT-S International Microwave Symposium Digest,2012.

[11] Dai Sasakawa, Naoki Honma, Takeshi Nakayama, “Human Identification Using MIMO Array”, IEEE

Sensors Journal, Volume: 18, Issue: 8, April15, 15 2018

[12] victoria moreno ; miguel a. zamora ; antonio f. skarmeta, a low-cost indoor localization system for

energy sustainability in smart buildings ieee sensors journal, 2016.

[13] ibrahim al-naimi ; chi biu wong ; philip moore ; xi chen, “indoor identification and tracking using

58-62

Page 16: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

advanced multimodal approach”, 10th international symposium on mechatronics and its applications

(isma), 2015.

[14] pirehpirzada ; neil white, adriana wilde, “sensors in smart homes for independent living of the

elderly” 5th international multi-topic ict conference (imtic), 2018

[15] Alina Roitberg, Alexander Perzylo, Nikhil Somani, Manuel Giuliani, “Human Activity Recognition in the

Context of Industrial Human-Robot Interaction,” Signal and Information Processing Association Annual

Summit and Conference (APSIPA), 2014.

[16] Long Xiao ; Bo Cheng ; Bo Yang ; Rong Du ; Wenbin Yu ; Xinping Guan, “A context-aware entrance

guard in smart home: An event-driven application based on the human motion and face recognition” 5th

International Conference on Automation, Robotics and Applications, 2011.

[17] Javed Iqbal, Mihai TeodorLazarescu, ArslanArif and Luciano Lavagno, “High sensitivity, low noise front-

end for long range capacitive sensors for tag less indoor human localization,” IEEE 3rd International Forum

on Research and Technologies for Society and Industry (RTSI), 2017.

[18] Ching-Hu Lu, Student Member, IEEE, Chao-Lin Wu, Member, IEEE, and Li-Chen Fu, Fellow, IEEE, “A

Reciprocal and Extensible Architecture for Multiple-Target Tracking in a Smart Home” IEEE transactions

on systems, man, and cybernetics—part c: applications and reviews, Vol. 41, no. 1, January 2011.

[19] Frederic Bergeron ; Kevin Bouchard ; Sylvain Giroux ; Sebastien Gaboury ; Bruno Bouchard “Simple

objects tracking system for smart homes,” IEEE International Conference on Bioinformatics and

Biomedicine (BIBM), 2015.

[20] Juan A. Fraile, Javier Bajo, Juan M. Corchado, and Ajith Abraham, Senior Member, IEEE, “Applying

Wearable Solutions inDependent Environments”, IEEE transactions on information technology in

biomedicine, vol. 14, no. 6, november 2010.

[21] QinyiXu,YanChen,BeiBei Wang: “Radio-Shot Through-The-Wall Human Recognition”.Intelligent

Environment, IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2016.

[22] ShijunZhai∗,Ting Jiang, “Target detection and classification by measuring and processing bistatic UWB

radarsignal”https://doi.org/10.1016/j.measurement.2013.08.031, Volume 47, 2014.

[23] Li Cuimei, Qi Zhiliang , Jia Nan , Wu Jianhua “Human face detection algorithm via Haar cascade

classifier combined with threeadditional classifiers” IEEE 13th International Conference on Electronic

Measurement & Instruments 2007.

13.

Authors:

P Vinod Kumar, Snivash, Mohammed Fahimullah A, K Vinay Gokul

Paper Title: Single Layer Coating Photonic Crystal Fiber Biosensor Based On Surface Plasmon Resonance

Abstract: This paper is a demonstration for the design of photonic crystal fiber biosensor which is based on

the phenomenon of surface plasmon resonance. The plasmonic coating covers the outer layer of the Photonic

Crystal fiber to ease the fabrication process, we choose Gold. To quantitatively measure the represented design,

we utilize a technique called as the Finite element method (FEM). To accomplish the sensitivities of

4300nm/RIU and 408.468 RIU-1 we apply the methodologies of wavelength and amplitude interrogation models.

This design yielded a resolution of 2.33×10-5 respectively. A fluctuation from 1.33 to 1.39 in the analyte

refractive index can be identified and measured by this design. The sensing range of the design is wide and may

also be used in biological detection.

Keywords: Biosensor, Resolution, PCF, SPR

References:

[1] Shaimaa I Azzam, Mohamed Farhat O Hameed, Rania Eid Shehata, AM Heikal, and Salah SA Obayya.

Multichannel photonic crystal fiber surface plasmon resonance based sensor. Optical and Quantum

Electronics, 48(2):142, 2016.

[2] MS Aruna Gandhi, S Sivabalan, P Ramesh Babu, and K Senthilnathan. Designing a biosensor using a

photonic quasi-crystal fiber. IEEE Sensors Journal, 16(8):2425–2430, 2016.

[3] Md Hasan, SanjidaAkter, Ahmmed Rifat, Sohel Rana, and Sharafat Ali. A highly sensitive gold-coated

photonic crystal fiber biosensor Multidisciplinary Digital Publishing Institute, 2017. based on surface

plasmon resonance. In Photonics, volume 4, page 18.

[4] Itaru Ishida, Tsuyoshi Akamatsu, Zhaoyang Wang, Yusuke Sasaki,Katsuhiro Takenaga, and Shoichiro

Matsuo. Possibility of stack and draw process as fabrication technology for multi-core fiber. In 2013 Optical

Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference

(OFC/NFOEC), pages 1–3.IEEE, 2013.

[5] Duanming Li, Wei Zhang, Huan Liu, Jiangfei Hu, and GuiyaoZhou.High sensitivity refractive index sensor

based on multicoating photonic crystal fiber with surface plasmon resonance at near-infrared wavelength.

IEEE Photonics Journal, 9(2):1–8, 2017.

[6] Chao Liu, WeiquanSu, Qiang Liu, Xili Lu, Famei Wang, Tao Sun,and

[7] Paul K Chu. Symmetrical dual d-shape photonic crystal fibers for surface

[8] plasmon resonance sensing. Optics express, 26(7):9039–9049,2018.

[9] Min Liu, Xu Yang, Ping Shum, and Hongtao Yuan. High-sensitivity birefringent and single-layer coating

photonic crystal fiber biosensor based on surface plasmon resonance. Applied optics, 57(8):1883–1886.

[10] Min Liu, Xu Yang, Bingyue Zhao, Jingyun Hou, and Ping Shum. Square array photonic crystal fiber-based

63-66

Page 17: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

surface plasmon resonance refractive index sensor. Modern Physics Letters B, 31(36):1750352, 2017.

[11] AA Rifat, GhafourAmouzadMahdiraji, YM Sua, YG Shee, Rajib Ahmed, Desmond M Chow, and FR

MahamdAdikan. Surface plasmon resonance photonic crystal fiber biosensor: a practical

sensing.approach.IEEE Photonics Technology Letters, 27(15):1628–1631, 2015.

AhmmadRifat,GMahdirajiChow,YuShee,Rajib Ahmed and Faisal Adikan.Photonic Crystal Fiber based

surface plasmon resonance sensor with selective analyte channels and graphene silver deposited

core,Sensors,15(5):11499-11510,2015.

14.

Authors:

Pooja Arora, Dr. Anurag Dixit

Paper Title: The Hybrid Optimization Algorithm for Load Balancing In Cloud

Abstract:The advancements in the cloud computing has gained the attention of several researchers to provide

on-demand network access to users with shared resources. Cloud computing is important a research direction

that can provide platforms and softwares to clients using internet. But, handling huge number of tasks in cloud

infrastructure is a complicated task. Thus, it needs a load balancing method for allocating tasks to Virtual

Machines (VMs) without influencing system performance. This paper proposes a load balancing technique,

named Elephant Herd Grey Wolf Optimization (EHGWO) for balancing the loads. The proposed EHGWO is

designed by integrating Elephant Herding Optimization (EHO) in Grey Wolf Optimizer (GWO) for selecting the

optimal VMs for reallocation based on newly devised fitness function. The proposed load balancing technique

considers different parameters of VMs and PMs for selecting the tasks to initiate the reallocation for load

balancing. Here, two pick factors, named Task Pick Factor (TPF) and VM Pick Factor (VPF), are considered for

allocating the tasks to balance the loads.

Keywords: Cloud computing, load balancing, Elephant Herding Optimization, Grey Wolf Optimizer,

reallocation, pitch factors.

References:

[1] Shang-Liang Chen, Yun-Yao Chen , Suang-Hong Kuo,” CLB: A novel load balancing architecture and

algorithm for cloud services”, Computers & Electrical Engineering,Vol:58, pp:154-160, February 2017.

[2] Qi Liu, Weidong Cai, Jian Shen, Xiaodong Liu, Nigel Linge, "An Adaptive Approach to Better Load

Balancing in a Consumer-centric Cloud Environment," IEEE Transactions on Consumer Electronics, Vol:

62, no: 3, pp: 243 - 250, August 2016.

[3] Jia Zhao, Kun Yang, Xiaohui Wei, Yan Ding, Liang Hu, and Gaochao Xu, "A Heuristic Clustering-based

Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment", IEEE

Transactions on Parallel and Distributed Systems, Vol: 27, no: 2, pp: 305 -316, February 2016.

[4] Shiva Razzaghzadeh, Ahmad Habibizad Navin, Amir Masoud Rahmani, and Mehdi Hosseinzadeh,

"Probabilistic Modeling to Achieve Load balancing in Expert Clouds", Ad Hoc Networks, January 2017.

[5] Ranesh Kumar Naha and Mohamed Othman, "Cost aware service brokering and performance sentient load

balancing algorithms in the cloud", Journal of Network and Computer Applications, Vol: 75, pp: 47–57,

November 2016.

[6] Weihua Huang, Zhong Ma, Xinfa Dai, Mingdi Xu and Yi Gao, "Fuzzy Clustering with Feature Weight

Preferences for Load Balancing in Cloud", International Journal of Software Engineering and Knowledge

Engineering,Vol: 28, no:5,pp:593–617,2018.

[7] Narander Kumar and Diksha Shukla,” Load Balancing Mechanism Using Fuzzy Row Penalty Method in

Cloud Computing Environment”, Information and Communication Technology for Sustainable

Development, pp: 365-373,2017.

[8] Santanu Dam, Gopa Mandal, Kousik Dasgupta and Parmartha Dutta,” An Ant-Colony-Based Meta-Heuristic

Approach for Load Balancing in Cloud Computing”, Applied Computational Intelligence and Soft

Computing in Engineering, pp: 29,2018.

[9] Shalini Joshi and Uma Kumari, "Load Balancing in Cloud Computing:Challenges & Issues," In proceedings

of 2nd International Conference on Contemporary Computing and Informatics (IC3I), December 2016.

[10] Mahfooz Alam and Zaki Ahmad Khan," Issues and Challenges of Load Balancing Algorithm in Cloud

Computing Environment", Indian Journal of Science and Technology, Vol: 10, no:25, July 2017.

[11] Wayne Jansen and Timothy Grance, ”Guidelines on security and privacy in public cloud computing”,pp:

800-144, 2011.

[12] Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma and Lifei Wei," Auditable -Time

Outsourced Attribute-Based Encryption for Access Control in Cloud Computing",IEEE Transactions on

Information Forensics And Security, 2017.

[13] Zenon Chaczko, Venkatesh Mahadevan, Shahrzad Aslanzadeh and Christopher Mcdermid," Availability

and Load Balancing in Cloud Computing", In proceedings of International Conference in Computer and

Software Modeling, IPCSIT, Vol:14 , 2011.

[14] Daraghmi, E.Y. and Yuan, S.M.,”A small world based overlay network for improving dynamic load-

balancing”, Journal of Systems and Software, Vol: 107, pp:187-203,2015.

[15] A. S. Milani and N. J. Navimipour,” Load balancing mechanisms and techniques in the cloud environments:

Systematic literature review and future trends”, J. Netw. Comput. Appl. Vol:71, no:1, pp: 86–98,2016.

[16] Y. C. Jiang, “A survey of task allocation and load balancing in distributed systems”, IEEE Trans. Parallel

67-71

Page 18: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Distrib. Syst.,Vol: 27no:2,pp: 585–599,2016.

[17] G. Mateusz, G. Alicja and B. Pascal,” Cloud brokering: Current practices and upcoming challenges”, IEEE

Cloud Comput.,Vol: 2,no:2,pp: 40–47,2015.

[18] I. D. Falco, E. Laskowski, R. Olejnik, U. Scafuri, E. Tarantino and M. Tudruj, “Extremal optimization

applied to load balancing in execution of distributed programs”, Appl. Soft Comput.,Vol: 30,no:3,pp: 501–

513,2015.

[19] Y. Jiang, “Concurrent collective strategy diffusion of multi agents: The spatial model and case study”, J.

Netw. Comput. Appl.,Vol: 39,no:4,pp: 448–458,2009.

[20] Mirjalili, S., Mirjalili, S.M. and Lewis, A.,”Grey wolf optimizer” Advances in engineering software,Vol:

69, pp.46-61,2014.

[21] G. Wang, S. Deb and L. d. S. Coelho, "Elephant Herding Optimization, "In proceedings of 3rd

International Symposium on Computational and Business Intelligence (ISCBI),pp:1-5,2015.

18.

Authors: Garima Sharma, Vikas Tripathi

Paper Title: Recent Trends In Big Data Ingestion Tools

Abstract: In big data era, data is flooding in at unparalleled, inflexible rate making collection and processing of

data a bit hard and unmanageable without using appropriate data handling tools. Selecting the correct tool to

meet the current as well as future requirement is a heavy task, and it became more strenuous with lack of

awareness of all the available tools of this area. With right tools, one can rapidly fetch, import, process, clean,

filter, store, export data from variety of sources with different frequency as well as capacity of data generation.

A comprehensive survey and comparative study of performance, merits, demerits, usage of various ingestion

tools in existence for frequent data ingestion activities (keeping volume, variety, velocity, and veracity in mind)

have been presented in this paper.

Index Terms: Data Ingestion Tools, Apache NIFI, Apache Kafka, Apache Flink, Apache Kinesis, Apache

Gobblin

References:

[1] Rajiv Ranjan, “Streaming Big Data Processing in Datacenter Clouds”, 2014 IEEE.

[2] KHIN ME ME THEIN, "Apache Kafka: Next Generation Distributed Messaging System" in

International Journal of Scientific Engineering and Technology Research ,Vol 3, Issue 47,2014, pp 9478- 9483,

[3] Roger Young, Sheila Fallon, Paul Jacob,” Dynamic Collaboration of Centralized & Edge Processing for

Coordinated Data Management in an IoT Paradigm” in 32nd International Conference on Advanced

Information Networking and Applications, 2018

[4] Jianlei Liu, Eric Braun, Clemens D ̈upmeier,Patrick Kuckertz, D. Severin Ryberg, Martin Robinius,

Detlef Stolten ̃,Veit Hagenmeyer, A Generic and Highly Scalable Framework for the Automation and

Execution ofScientific Data Processing and Simulation Workflows” in IEEE International Conference on

Software Architecture, 2018.

[5] Andreea MĂTĂCUȚĂ, Cătălina POPA, " Big Data Analytics: Analysis of Features and Performance of

Big Data Ingestion Tools",in Informatica Economică, vol. 22, 2018.

[6] Rustem Dautov, Salvatore Distefano, Dario Bruneo, Francesco Longo, Giovani Merlino, Antonio

Puliafito, “Data Processing in Cyber-Physical-Social Systemsthrough Edge Computing”, 2018

[7] M. Sarnovsky, P. Bednar and M. Smatana,” Data integration in scalable data analytics platform for

process industries”,in 21st International Conference on Intelligent Engineering Systems,2017

[8] J.Amudhavel et.al, "Perspectives, Motivations, and Implications of Big Data Analytics", in Proc.

International Conference on Advanced Research in ComputerScience Engineering & Technology, Newyork,

USA, Mar. 06-07, 2015,vol. 9, pp. 344-352.

[9] Dung Nguyen, Edward B. Duffy, Andre Luckow, Ken Kennedy, Amy Apon," Evaluation of Highly

Available Cloud StreamingSystems for Performance and Price,” in 18th IEEE/ACM International Symposium

on Cluster, Cloud and Grid Computing, 2018,

[10] Ehab Qadah, Michael Mock “A Distributed Online Learning Approach for PatternPrediction over

Movement Event Streams with Apache Flink", in Vienna,Austria,2018.

[11] M. Ficco,“ Aging-related performance anomalies in the apache storm stream processing system, Future

Generation”,2017.

[12] Siwoon Son, Sanghun Lee, Myeong-Seon Gil, Mi-Jung Choi, and Yang-Sae Moon," Locality Aware

Traffic Distribution in Apache Storm for Energy Analytics Platform"in IEEE International Conference on Big

Data and Smart Computing, 2018.

[13] Cornelius C. Agbo, Qusay H. Mahmoud, J. Mikael Eklund, “A Scalable Patient Monitoring System

Using Apache Storm”, in IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), 2018

[14] Avantika Dixit,JaytrilokChoudhary,DP Singh,”Survey of Apache Storm Scheduler”, in 3rd

International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018.

[15] Thomas Lindemann, Jonas Kauke, Jens Teubner, “Efficient Stream Processing of Scientific Data” in

IEEE 34th International Conference on Data Engineering Workshops, 2018

[15]. Gautam Pal, Ganagmin Li, Katie Atkinson,” Big Data Real Time Ingestion and Machine Learning ", in

IEEE Second International Conference on Data Stream Mining & Processing, 2018.

87-91

Page 19: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

19.

Authors:

S.Jayakumar,M.Srivathsan,S.Samundar Ahmed,Dhanish Kumar S M,M.Karthikeyan

Paper Title: Ticket Collectionwith Destination Prediction In Bus Services In Urban Areas Using Time Based

Predictive Algorithm

Abstract—- In the new age of automation and machine assisted function of the human way of life people still

tend to notice verification and checking of tickets in local land transport such as trains and buses to still be

operated by man. This project is a proposal of a new platform and method to book these tickets of buses on a

local level. This can lead to decrease in the overcrowding of buses, easy time management of commuters, and

smooth functioning of the bus business. Initially the bank details of the passenger must be linked to the

app.Machine learning predictive parsing algorithm in combination with data mining features enable the

prediction of the passengers to and fro details on a daily and timely basis. Then a SMS alert for ticket payment

proof is sent to the user. In admin side, they calculate amount details using this application. Per day amount

details of specific route or bus can be calculated by accessing the database. There is also a provision where the

IMEI numbers of the consumers is collected. Through GPS system the IMEI numbers of the mobiles inside the

bus is checked with the IMEI numbers of those in the database. Ticket defaulters are identified if the IMEI

numbers are not present in the database. The entire trail of the transit is on a non-paper sever.

Keywords—GPS,IMEI,Ticket.

References:

[1] S. Kazi, M. Bagasrawala, F. Shaikh And A. Sayyed, "Smart E-Ticketing System For Public Transport

Bus," 2018international Conference On Smart City And Emerging Technology (Icscet), Mumbai, 2018

[2] A. Shingare, A. Pendole, N. Chaudhari, P. Deshpande And S.Sonavane, "Gps Supported City Bus Tracking

& Smart Ticketing System," 2015 International Conference On Green Computing And

Internet Of Things (Icgciot), Noida, 2015

[3] N. Lathia, J. Froehlich And L. Capra, "Mining Public Transport Usage For Personalised Intelligent

Transport Systems," 2010 Ieee International Conference On Data Mining, Sydney, Nsw, 2010 S.

Sankarananrayanan And P. Hamilton, "Mobile Enabled Bus Tracking And Ticketing System," 2014 2nd

International Conference On Information And Communication Technology (Icoict), Bandung, 2014

[4] D. K. Sharma And S. R. Ahuja, "A First- Come-First-Serve Bus-Allocation Scheme Using Ticket

Assignments," In The Bell System Technical Journal

[5] G. Indrajith and K.Vijayakumar, “Automatic Mathematical and Chronological Prediction in Smartphone

Keyboard” International Journal of Engineering and Computer Science ISSN: 2319-7242Volume 5 Issue 5

May 2016, Page No. 16714-16718.

[6] K. Vijayakumar and C. Arun, “A Survey on Assessment of Risks in Cloud Migration”, International Journal

of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.66 May 2015.

[7] K. Vijayakumar and C. Arun, “Continuous Security Assessment of Applications in Cloud Environment”,

International Journal of Control Theory and Applications, ISSN: 0974-5645 volume No. 9(36), Sep 2016,

Page No. 533-541.

92-96

20.

Authors:

Priyanka Honale, Prof. Arunkumar G

Paper Title: Opinion Mining and Sentiment Analysis of Social Networking Data

Abstract -- The important element of the information period had to try to find the opinion & view of another

entity. In the invention when there wasn’t an internet possession, it was regular for an character to ask his/her

friends and relatives for their opinion before making a final decision. institute conduct viewpoint of poll, surveys

to understand the sentiment & opinion of general public towards it product/services Sentiment analysis is a type

of data taking out that procedures the inclination of people's opinions through linguistic communication process ,

linguistics & texts scrutiny, that are familiar mine & explore subjective data from the net - largely social media

like twitter & related sources. The analyzed knowledge quantifies the overall public sentiments/reactions toward

sure merchandise, people/ideas & reveals the contextual polarity of the information. There has been a large

figure of research study & developed applications in the region of open reaction tracking & modeling opinion.

Opinion study is the method of determining whether or not a section of writing is helpful, unhelpful/ impartial.

Its is conjointly referred to as view Mining, derivation the opinion perspective of a speaker. In case of Twitter

exact skin texture such as hash tags, specific to the topic analyze can be old to get better the accurateness of

sentiment predictions Feature like neutralization, negation handling, & capitalization internationalization as they

need recently become an enormous a part of the web.

Future opinion-mining systems would like broader & deeper common & sensible databases.

Index Terms— FEATURE based sentiment analysis , supervise Machine Learning Approach.

References:

[1] Tan, Shulong, et al. "Interpreting the public sentiment variations on twitter." IEEE transactions on

97-103

Page 20: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

knowledge and data engineering 26.5 (2014): 1158-1170.

[2] Gautam, Geetika, and Divakar Yadav. "Sentiment analysis of twitter data using machine

learning approaches and

[3] semantic analysis." Contemporary Computing (IC3), 2014 Seventh International Conference on.

IEEE, 2014.

[4] Jha, Vandana, et al. "HOMS: Hindi opinion mining system." Recent Trends in Information Systems

(ReTIS), 2015 IEEE 2nd International Conference on. IEEE, 2015.

[5] Larsen, Mark E., et al. "We Feel: mapping emotion on Twitter." IEEE journal of biomedical and health

informatics 19.4 (2015): 1246-1252.

[6] Luo, Yan, and Wei Huang. "Product Review Information Extraction Based on Adjective Opinion

Words." Computational Sciences and Optimization (CSO), 2011 Fourth International Joint Conference on.

IEEE, 2011.

[7] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development

environments,J Ambient Intell Human Computing,DOI 10.1007/s12652-017-0503-7,Springer May 2017.

[8] K. Vijayakumar, Arun C, “Integrated cloud-based risk assessment model for continuous integration”,

International Journal Reasoning-based Intelligent Systems, Vol. 10, Nos. 3/4, 2018.

[9] K. Vijayakumar, S. Suchitra and P. Swathi Shri, "A secured cloud storageauditing with

empiricaloutsourcing of key updates", International Journal Reasoning-based Intelligent Systems, Vol. 11,

No. 2, 2019.

15.

Authors:

Rehan Ahmad Khan, Agastya Gogoi, Rahul Srivastava, Shubham Kumar Tripathy,

S.Manikandaswamy

Paper Title: Automobile Collision Warning and Identification System Using Visible Light and Wi-Fi

Communication

Abstract: This paper introduces a vehicle-to-vehicle (V2V) communication system based on visible light

communication technology. A vehicle will transmit the data continuously to another vehicle in front of it using

head light and the data is stored in the Secure Digital (SD) Card in comma separated value for future reference in

case of emergency at the same time the data is stored in the cloud server for government reference for locate the

most accident areas. Nowadays, people readily use internet in their day-to-day activities to accomplish their task

by means of wireless or wired network. As users are increasing manifold, data transmission rate consequently

decreasing. However, Wi-Fi imparts data rate of 150Mbps as per IEEE 802.11n, this speed is still not enough to

suffice the needs of a user. Considering this, Visible light communication concept has been introduced. In this

project, a comparative and analytic study about the speed of visible light and Wi-Fi communication is being

done and also reduction of network jamming problem due to increasing users demand is also being done.

Index Terms: vehicle-to-vehicle (V2V), LED, Wi-Fi, SD card, Visible light communication

References:

[1] Noof Al Abdulsalam, Raya Al Hajri, Zahra Al Abri, Zainab Al Lawati, and Mohammed M. Bait-

Suwailam, "Design and Implementation of a Vehicle to Vehicle Communication System Using Li-Fi

Technology", International Conference on Information and Communication Technology Research (ICTRC),

2015.

[2] Pooja Bhateley, Ratul Mohindra, S.Balaji, "Smart Vehicular Communication System Using LI-FI

Technology", International Conference on Computation of Power, Energy Information and Communication

(lCCPEIC), 2016.

[3] Harald Haas ; Liang Yin ; YunluWang ; Cheng Chen, "What is Li-Fi", Journal of Lightwave Technology

(Volume: 34 , Issue: 6 , March 15, 2016 ).

[4] N. G. Ghatwai, V. K. Harpale and M. Kale, "Vehicle to vehicle communication for crash avoidance

system," 2016 International Conference on Computing Communication Control and automation

(ICCUBEA), Pune, 2016, pp. 1-3. doi: 10.1109/ICCUBEA.2016.

[5] J. Lianghai, M. Liu, A. Weinand and H. D. Schotten, "Direct vehicle-to-vehicle communication with

infrastructure assistance in 5G network," 2017 16th Annual Mediterranean Ad Hoc Networking Workshop

(Med-Hoc-Net), Budva, 2017, pp. 1-5.

doi: 10.1109/MedHocNet.2017

[6] Isamu Takai, Member, IEEE, Tomohisa Harada, Michinori Andoh, Keita Yasutomi, Member, IEEE,

Keiichiro Kagawa, Member, IEEE, Shoji Kawahito, Fellow, IEEE "Optical Vehicle to Vehicle

Communication System Using LED Transmitter and Camera Receiver", IEEE Photonics Journal, DOI

10.1109/JPHOT.2014.2352620, 2014.

[7] K. Vijayakumar and C. Arun, “Continuous Security Assessment of Applications in Cloud Environment”,

International Journal of Control Theory and Applications, ISSN: 0974-5645 volume No. 9(36), Sep 2016,

Page No. 533-541.

[8] R.Joseph Manoj, M.D.Anto Praveena, K.Vijayakumar, “An ACO–ANN based feature selection algorithm

for big data”, Cluster Computing The Journal of Networks, Software Tools and Applications, ISSN: 1386-

7857 (Print), 1573-7543 (Online) DOI: 10.1007/s10586-018-2550-z, 2018.

[9] K. Vijayakumar and V. Govindaraj, “An Efficient Communication Technique for Extrication and Cloning

of packets on cloud”, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10

No.66 May 2015

72-77

Page 21: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

16.

Authors: Vinay Sati, Shivasheesh Kaushik, Dr. Satyendra Singh, Dr. Rahul Kshetri, Rahul Pandey

Paper Title: Reduction of Losses in 90 Degree Pipe Bends By Varying Design Parameters Using CFD Software

Abstract: Fluid plays a vital role in various fields of application like industries or domestic use. The efficient

transportation of fluid from one location to another has been a major concern persistently. There are certain

energy losses occurring in the flow of fluid whenever there is a change in the path of its flow. In this paper an

analysis has been performed across the various general methods employed to generate bent sections, on a 2-D

geometric model of a pipe designed using Autodesk Auto CADD 2017. Every alteration of path of fluid flows

leads to the loss of momentum of the fluid particles present on the outer layer. This loss of momentum by the

particles in turn lead to variation among the fluid parameter like velocity and pressure. These parameters been

analyzed in this paper. All the calculations and simulations have been performed on the 2-D axis-symmetric

sketches of pipe models, i.e. mesh models under the section of advanced numerical methods using ANSYS

R16.0. The fluid being considered in this research activity has been water.

Index Terms: K-Epsilon, Naiver-Stokes equation, Advanced Numerical Methods, FLUENT Flow, fillet.

References:

[1] S K Som, Suman Chakraborty- “Introduction to fluid mechanics and fluid machines” 3e, McGraw Hill

International- ISBN 978-0-07-132919-4

[2] Yunus A. Cengel, John M. Cimbala- “Fluid Mechanics Fundamentals and Applications” 3e, McGraw Hill

International-ISBN 978-93-392-0465-5

[3] Fox R. W., A. T. McDonald, and P. J. Pritchard, “Introduction to Fluid Mechanics”, 5e, John Wiley & Sons,

Inc., 2004.

[4] Laufer, J., “The structure of turbulence in fully developed pipe flow”, NACA Report, NACA-TN-2954

(1953).

[5] Vinay Sati et al, “Hydrodynamic and Thermal Analysis in Pipe Flow using ANSYS Software”, International

Journal of Research and Technology, ISSN: 2278-0181, March 2015.

[6] John D. Anderson Jr, Computational Fluid Dynamics, McGraw Hill Book Company .

[7] Literature Review of accelerated CFD Simulation Methods towards Online Application, Md Lokman

Hosain and Rebei Bel Fdhila.

[8] McKee, S., Review the MAC Method, Computer & Fluids 37 (2008) p.907-930.

[9] Valizadeh, A., et. al. Modeling Two-Phase Flows Using SPH Method, J. of Applied Sciences 8(21): p.3817-

3826, (2008).

[10] Greengard, L., Kropinski, M. C., An Integral Equation Approach to the Incompressible Navier-Stokes

Equations in Two Dimensions, SIAM J. Sci. Comput. Vol. 20, No. 1, p. 318-336 (1998).

[11] Kuhnert, J., Tiwari, S., Finite pointset method based on the projection method for simulations of the

incompressible Navier Stokes equations, Fraunhofer Institute for Industrial Mathematics, Kaiserslautern,

Germany.

[12] Succi, S, The Lattice Boltzmann Equation for Fluid Dynamics and Beyond, ISBN-13: 978-0198503989,

Oxford University Press, Oxford, New York, 2001

[13] Tokura, S., Comparison of Particle Methods: SPH and MPS, 13th International LS-DYNA User Conference

[14] Rahul Pandey, Vinay Sati, Shivasheesh Kaushik, Dr. Anirudh Gupta, Hydrodynamic flow analysis across

bent sections of pipe using CFD software, Vol 4 Issue 10 IJERT ISSN No- 2278-0181

[15] Vinay Sati, Shivasheesh Kaushik, Dr. Anirudh Gupta, Hydrodynamic and Thermal Analysis in Pipe Flow

using ANSYS Software, Vol 4 Issue 03 IJERT ISSN No- 2278-0181

78-87

17.

Authors:

Elakya R, Himanshu Sinha, Prince Kumar, Singh Anubhav Gajendra, Shubham Gupta

Paper Title: Compositional Nature of Language to Represent Bimodal Visual- Audial Percepts

Abstract: We describe the perceptual domain which have a composition domain and also which is rarely ever

captured in the existed system. This has happened because they started to learn the composition structure

directly. Compositional structures can be divided into separate domains. Keeping that in mind, we propose

another way to deal with demonstrating bimodal perceptual areas that expressly relates unmistakable projections

over every methodology and after that mutually learns a bimodal meager portrayal. Presently this model will

empower compositionality crosswise over particular projections and sum up to percept's traversed by this

compositional premise. For instance, our model can be prepared on red triangles and blue squares; yet, certainly

will likewise have learned red squares and blue triangles. To test our model, we have procured another bimodal

dataset including pictures and spoken articulations of hued shapes (hinders) in the table top setting.

Index Terms: Compositionality, Bimodal, Sparsity, Modality

References:

1. Learning to Interpret Natural Language Navigation Instructions from Observations : David L. Chen and

88-91

Page 22: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Raymond J. Mooney ;Journal of Artificial Intelligence Research :2011.

2. A Joint Model of Language and Perception for Grounded Attribute Learning :Cynthia Matuszek, Nicholas

FitzGerald, Luke Zettlemoyer, Liefeng Bo, Dieter Fox ;The Journal of Machine Learning Research:2012

18.

Authors: Karen Vanessa Pennefather, Rajesh Masilamani A, S. Vasanth.

Paper Title: Machine Vision System for Evaluating Performance Measure of Laser Beam on Leather

Abstract: The manual inspection of leather is sluggish and labor-intensive tasks, they can become precarious

in the entire production process. In the present study an attempt has been made to investigate the Heat Affected

Zone (HAZ) of leather during the laser cutting process due to the thermal effect caused by a laser at the cut

contour edges. To inspect this, a machine vision system is used to capture images of the laser cut edges and then

process it using MATLAB to acquire the required information for assessing the quality of leather. The leather

can be categorized as good, average or poor quality based on the acquired information for the respective

application. As a result, the degree of burn of the leather was determined.

Index Terms: HAZ (Heat Affected Zone), Laser, Leather, Machine Vision, MATLAB, Quality.

References:

[1] Alexander Stepanov, Matti Manninen, Inni Pärnänen, Marika Hirvimäki, Antti Salminen “ Laser cutting of

leather: tool for industry or designers?”15th Nordic Laser Materials Processing Conference, Nolamp 15,

25-27 August

[2] K.Hoang, A.Nachimuthu, “Image processing techniques for leather hide ranking in the footwear industry”,

The University of New South Wales Sydney,2052, Australia.

[3] L. Duval1,3, M. Moreaud1, C. Couprie1, D. Jeulin2, H. Talbot3, J. Angulo2, “Image Processing for

Materials Characterization, issues,Challenges and opportunities”, IEEE International Conference on Image

Processing (ICIP) 2014.

[4] Mohamed Rafiuddin and Dr.G.Satyanarayana, “Challenges in Exports: A Study of India’s Leather Industry”,

International Conference on Science Engineering and Management Research 2014.

[5] Murali Krishna Kasi,Member,J Bhaskara Rao ,Vijay Kumar Sahu, “Identification of Leather Defects Using

an Auto adaptive Edge Detection Image Processing Algorithm”, 2014 International Conference on High

Performance Computing and Applications (ICHPCA).

[6] Parag Kohli and Ms. Shalvi Garg ,” Leather QualityEstimation Using an Automated Machine Vision

System ”,Sangrur, Punjab INDIA Volume 6, Issue 3,May. - June. 2013, PP 44-47.

[7] S.Vasanth and T.Muthuramalingam, “A study of Machinability of leather using CO2-Based Laser beam

Machining process”, Advances in Manufacturing Processes pp 239-244,11 September 2018

[8] Umar Farooq, Muhammad Usman Asad, Faiqa Rafiq, Ghulam Abbas, Athar Hanif,”Application of

Machine Vision for Performance Enhancement of Footing Machine Used in Leather Industry of Pakistan”

,Islamabad, Pakistan 10-12 September 2013.

[9] U Venkateswarlu1*, M Muthukrishnan1, R Ramesh2 and NK Chandrababu2,“Effect of CO2 Laser on

morphological properties of Leather”,International Research Journal of Engineering and Technology

(IRJET) , Volume: 02 Issue: 06,Sep-2015.

[10] Nasim, H., Jamil, Y.: Diode lasers: From laboratory to industry. Opt. Laser Technol. 56, 211– 222 (2014)

92-96

19.

Authors: Anjali Patil, Prof. Arunkumar G.

Paper Title: Real Time Pedestrian Detection And Tracking For Driver Assistance Systems

Abstract- In Autonomous driving technology detecting pedestrians and vehicles should be fast and efficient in

order to avoid accidents. Pedestrian detection and tracking is challenging for complex real world scenes. In

proposed system Kalman filter has been used to detect and track the pedestrians. From three frames initially

eigen object is computed in video sequences for detection of moving objects, then shape information is used to

classify humans and other objects. Moreover with the help of continues multiple frames occlusion between

objects get calculated.

In the proposed system an application is developed which gives automatic warning in case of doubtful activities

performed by pedestrian of zone monitoring which can be used in various domains like defence and traffic

monitoring. Proposed algorithm gives accurate moving object detection and advanced sensors are used to detect

human movements ahead and alert the driver by using buzzer, result does not affect by body pose of individual.

Indexed Terms- Pedestrian detection, Tracking, ACF

References:

[1] Dalal, Navneet, and Bill Triggs. "Histograms of oriented gradients for human detection." Computer Vision

and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on. Vol. 1. IEEE, 2005.

[2] Hong-Son Vu, Jia-Xian Guo et.al.,”A Real time Moving objects Detection and Classification Approach for

Static cameras, 2016. International Conference on Consumer Electronics-Taiwan

[3] Wren, Christopher Richard, et al. "Pfinder: Real-time tracking of the human body." IEEE

97-101

Page 23: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Transactions on pattern analysis and machine intelligence 19.7, pp. 780-785 1997

[4] Chien, Shao-Yi, et al. "Video object segmentation and tracking framework with improved threshold

decision and diffusion distance." IEEE Transactions on Circuits and Systems for Video Technology

23.6, pp. 921-934, 2013.

[5] S. Azmat, Linda Wills, Scott Wills, ”Parallelizing Multimodel Background Modelling on Low Power

Integrated”‖, Journal of Signal Processing System, pp. 1-11, February 2016.

[6] y.w. Xu , X.B. Cao and T. Li “Extended Kalman Filter Based Pedestrian Localization for Collision

Avoidance”, Proceedings of the 2009 IEEE International Conference on Mechatronics and Automation

August 9 - 12, Changchun, China.

[7] Anjana Das K M and O V Ramana Murthy “Optical Flow Based Anomaly Detection in Traffic Scenes”,

2017 IEEE International Conference on Computational Intelligence and Computing Research.

[8] Gurunathan, A., & Viswanatham, V. M. (2017) “Autonomic Performance Enhancement Environment for

Websphere Application Server. International Journal of Pure and Applied Mathematics, 116(23), 719-731”.

[10] Arunkumar, G. and Madhu Viswanatham, V. (2017). “Autonomic Performance Management Approach

for Business Product: Action Planner for Internal Change Management”, Journal of Advanced Research in

Dynamical and Control Systems, 113(13), 482—493

20.

Authors: A. Shiny, Mrinmoy Kumar Das, Divyam Kumar Mishra, Manish Kumar Singh, Suman Maitra

Paper Title: Deep Learning Based Remote Sensing Using Convolutional Neural Networks

Abstract: We describe our achievements in collecting alternating convergence points with a thickness of 7

μm and focal lengths of 200 and 350 mm, combined with shadow correction, deconvolution and significant

neural frame training for transmission close to photography. Visual quality image. Although images taken using

diffractive optics have been shown in previous papers, important neural structures have been used in the

recovery phase. We use the imagery component of our imaging structure to activate the rise of ultralight cameras

with remote identification for Nano and pico satellites, as well as small drones and solar-guided aircraft for

aeronautical remote identification systems. . We extend the customizability of the liquid center focus on non-

circular surfaces, forcing movement at the liquid convergence point of the surface. We study their trends and

whether we can use them in optical structures.

Index Terms: deconvolution, neural framework, picosatellites, ultra-lightweight remote.

Keywords: vehicle-to-vehicle (V2V), LED, Wi-Fi, SD card, Visible light communication.

References:

[1] A. Nikonorov, R. Skidanov, V. Fursov, M. Petrov, S. Bibikov, and Y. Yuzifovich, “Fresnel lens imaging

with post-capture image processing,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog. Workshops, Boston,

MA, USA, 2015, pp. 33–41.

[2] Y. Peng, Q. Fu, F. Heide, and W. Heidrich, “The diffractive achromat full spectrum computational imaging

with diffractive optics,” in Proc. SIGGRAPH ASIA: Virtual Reality Meets Physical Reality: Model.

Simulating Virtual Hum. Environ., 2016, Art. no. 4.

[3] Y. Peng, Q. Fu, H. Amata, S. Su, F. Heide, and W. Heidrich, “Computational imaging using lightweight

diffractive-refractive optics,” Opt. Express, vol. 23, no. 24, pp. 31393–31407, 2015.

A. Chambolle and T. Pock, “A first-order primal-dual algorithm for convex problems with applications to

imaging,” J. Math. Imaging Vis., vol. 40, pp. 120–145, 2011.

[4] A. Nikonorov et al., “Comparative evaluation of deblurring techniques for fresnel lens computational

imaging,” in Proc. Int. Conf. Pattern Recog., Cancun, Mexico, 2016, pp. 775–780.

[5] P. Atcheson, J. Domber, K. Whiteaker, J. A. Britten, S. N. Dixit, and B. Farmer, “MOIRE – Ground

demonstration of a large aperture diffractive transmissive telescope,” Proc. SPIE, vol. 9143, 2014, Art. no.

91431W.

[6] C. Guo et al., “High-performance etching of multilevel phase-type Fresnel zone plates with large apertures,”

Opt. Commun., vol. 407, pp. 227–233, 2018.

[7] C. J. Schuler, M. Hirsch, S. Harmeling, and B. Scholkopf, “Non-stationary ¨ correction of optical

aberrations,” in Proc. Int. Conf. Comput. Vis., 2011, pp. 659–666.

[8] F. Heide, M. Rouf, M. B. Hullin, B. Labitzke, W. Heidrich, and A. Kolb, “High-quality computational

imaging through simple lenses,” ACM Trans. Graph., vol. 32, no. 5, 2013, Art. no. 149.

102-106

21.

Authors:

Junaid Ahmad, Bhanu Bhaskar, Haresh Seetharaman, Ajay Kumar, J. Arunnehru

Paper Title: 3DMSNET: 3D CNN Based Brain MRI Segmentation

Abstract—Segmentation of the brain images has become an important task to analyze the abnormality in

infants. Automatic methods are important as the infant brain growth has to be tracked and it is almost impossible

for an individual to manually segment the MRI data on particular intervals. The manual segmentation tasks are

107-110

Page 24: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

time-consuming and require highly skilled professionals to segment images. Automatic segmentation methods

have gained huge support for segmenting MRI images. Several segmentation methods lack accuracies due to

nearest neighbor or self-similarity problems. The CNNs have outperformed the traditional methods and are

proving to be more reliable day by day. The proposed method is a patch-based method which uses 3DMSnet (3D

Multi-Scale Network) for segmentation. The model is evaluated on BrainWeb and other publicly available

datasets.

Index Terms- segmentation, nearest-neighbor, self-similarity, patch-based, BrainWeb, CNN, MRI, 3DMSnet

References:

[1] D.L. Pham, C. Xu, and J.L. Prince, Current methods in medical image segmentation, Annual Review of

Biomedical Engineering, vol.2, no.2000, pp.315337,2000

[2] N. Passat, C. Ronse, J. Baruthio, J.-P. Armspach, C. Maillot, and C. Jahn, Region-growing segmentation of

brain vessels: an atlas based automatic approach, Journal of Magnetic Resonance Imaging, vol.21, no.6,

pp.715725,2005

[3] T. H. Lee, M. F. A. Fauzi and R. Komiya, “Segmentation of CT Brain Images Using K-Means and EM

Clustering,” 2008 Fifth International Conference on Computer Graphics, Imaging and Visualization,

Penang, 2008, pp. 339-344.

[4] C. Wan, M. Ye, C. Yao and C. Wu, “Brain MR image segmentation based on Gaussian filtering and

improved FCM clustering algorithm,” 2017 10th International Congress on Image and Signal Processing,

BioMedical Engineering and Informatics (CISP-BMEI), Shanghai, 2017, pp. 1-5.

[5] A. Gholipour, N. Kehtarnavaz, R. Briggs, M. Devous and K. Gopinath, “Brain Functional Localization: A

Survey of Image Registration Techniques,” in IEEE Transactions on Medical Imaging, vol. 26, no.

[6] 4, pp. 427-451, April 2007.

[7] N. Torbati and A. Ayatollahi, “A new method for non-rigid registration of MRI images,” 2017 Iranian

Conference on Electrical Engineering (ICEE), Tehran, 2017, pp. 91-94.

[8] N. H. Rajini and R. Bhavani, “Classification of MRI brain images using k-nearest neighbor and artificial

neural network,” 2011 International Conference on Recent Trends in Information Technology (ICRTIT),

Chennai, Tamil Nadu, 2011, pp. 563-568.

[9] P. Moeskops, M. A. Viergever, A. M. Mendrik, L. S. de Vries, M. J.

[10] N. L. Benders and I. Igum, “Automatic Segmentation of MR Brain Images With a Convolutional Neural

Network,” in IEEE Transactions on Medical Imaging, vol. 35, no. 5, pp. 1252-1261, May 2016.

[11] McConnell brain imaging center, BrainWeb: simulated brain database,

http://www.bic.mni.mcgill.ca/brainweb/.

[12] N4ITK: improved N3 bias correction IEEE transactions on medical imaging vol. 29,6 (2010): 1310-20.

[13] K. Kamnitsas, C. Ledig, V. F. Newcombe, J. P. Simpson, A. D. Kane, D. K. Menon, D. Rueckert, B.

Glocker, Ecient multi-scale 3D CNN with fully connected crf for accurate brain lesion segmentation, arXiv

preprint arXiv:1603.05959.

[14] K. He, X. Zhang, S. Ren and J. Sun, “Delving Deep into Rectifiers: Surpassing Human-Level Performance

on ImageNet Classification,”

[15] 2015 IEEE International Conference on Computer Vision (ICCV), Santiago, 2015, pp. 1026-1034. doi:

10.1109/ICCV.2015.123

[16] L. R. Dice, Measures of the amount of ecologic association between species, Ecology, vol.26, no.3,

pp.297302, 1945

22.

Authors: N. Narayanan, Ch.Surya Pradeep, Piyush Gulati, G. Raj Bharath, S.Nivash

Paper Title: Design of Highly Secured Biometric Voting System

Abstract— Voting is the most basic right of every citizen and is one of the most important responsibilities of

every citizen. The votes which we cast decide the future of our country, and we must vote honestly and not

succumb to any sort of pressure as the phrase goes "With great power comes great responsibility". Now once our

votes are cast, we should ensure they are not manipulated in any way. The current voting system (EVM) is easy

to manipulate i.e., there is a lot of human intervention which in turn could compromise the results of the

elections, hence in this project we will try to solve this vulnerability by introducing a two-step verification which

will help avoid the middle man attack i.e. only when the voter is physically present the fingerprint of the voter

can be registered and only then the OTP will be sent to user’s mobile number this in turn prevents fake voters.

Keywords: EVM, Arduino, Fingerprint Scanning, OTP, Biometrics, GSM, Aadhaar

References:

[1] Secured Online Voting System with Aadhaar Linking International Journal for Research in Engineering

Application & Management (IJREAM) ISSN: 2454-9150 Special Issue - iCreate April – 2018.

[2] Biometrically Secured Electronic Voting Machine 2017 IEEE Region 10 Humanitarian Technology

Conference (R10-HTC) 21 - 23 Dec 2017, Dhaka, Bangladesh.

111-114

Page 25: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[3] J. Deepika, S. Kalaiselvi, S. Mahalakshmi, S. Agnes Shifani, "Smart electronic voting system based on

biometrie identification-survey", Science Technology Engineering & Management (ICONSTEM) 2017

Third International Conference on, pp. 939-942

[4] Development of a Credible and Integrated Electronic Voting Machine Based on Contactless IC Cards,

Biometric Fingerprint Credentials and POS Printer 2016 IEEE Canadian Conference on Electrical and

Computer Engineering (CCECE).

[5] N. S Aranganadhan M. DhineshKumar Praveen kumar A DSanthosh "Embedded System based Voting

Machine System using Wireless Technology" International journal of innovative research in electrical

instrumentation and control engineering vol. 4 no. 2 2016 pp. 127-130.

[6] S. Sridhar CH. Manjulathal "Electronic Voting Machine Using Finger Print" International Journal of

Professional Engineering Studies vol. 7 no. 4 pp. 274-277 2016.

[7] Mobile Based Facial Recognition Using OTP Verification for Voting System 978-1-4799-8047-

5/15/$31.00c 2015 IEEE.

[8] E-Voting System with Physical Verification Using OTP Algorithm, 2015 International Journal of Hybrid

Information Technology Vol.8, No.8 (2015), pp.161-166.

[9] R. Karpagavani, M. Mangai, D. Meena, E. Poonguzhali, Chitravalavan ., "Aadhaar Identity Based

Electronic Voting Machine With Instant Result Announcement", i-manager's Journal on Embedded

Systems, vol. 4, pp. 26, 2015.

[10] B. Divya Soundarya Sai M. Sudhakar "Biometric System Based Electronic Voting Machine Using Arm9

Microcontroller" IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) vol. 10 no. 1

pp. 57-65 2015.

[11] D. Krishna "Aadhar Based Electronic Voting System and Providing Authentication" International journal of

engineering and advanced technology vol. 4 no. 2 pp. 27-240 2013.

[12] R. Alaguvel G. Gnanavel "Offline and Online E-Voting System with Embedded Security for Real Time"

International Journal of Engineering Research (ISSN: 2319-6890) vol. 2 no. 2 pp. 76-82 April 2013

[13] B. Gomathi S. Veena priyadarshini "Modernized Voting Machine using Finger Print Recognition"

International Journal of Scientific & Engineering Research vol. 4 no. 5 May 2013.

[14] D. Ashok Kumar T. Ummal Sariba Begum "A Novel design of Electronic Voting System Using

Fingerprint" International Journal of innovative technology & creative engineering (issn:2045-8711)

vol. 1 no. 1 pp. 12-19 January 2011.

[15] M Khasawneh M Malkawi O Al-Jarrah "A Biometric-Secure e-Voting System for Election Process"

Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08). 2008.

23.

Authors: Pooja Manisha Rahate, M. B. Chandak

Paper Title: Text Normalization and Its Role In Speech Synthesis

Abstract: As the technology is developing day-by-day and most of the human work is done by the machine

or systems, it is the need of the today’s world to develop systems that can read informal text or words in a proper

and standard way even though the format of writing these words or text does not match the standard English

words. The informal texts types that exists are the dates, currencies, abbreviations and acronyms of standard

words, measurements, URLs, phone numbers etc. This paper focuses on the normalization of such text that

converts the informal text into their equivalent standard form which is called text normalization. To produce the

equivalent speech form of these non-standard words is the necessity of the today’s system. Text normalization is

pre-processing step of the natural language processing system. The paper discusses various techniques and

methods for the conversion of the non-standard words into standard words. The methods used for classification

of the token are regular expressions, used for simple patter match of the token. Naïve Bayes classification for

number sense disambiguity and Stochastic Gradient Descent for resolving acronym and class ambiguity .The

result and analysis are also mentioned in the form of error-rate of the system, which shows the area for the scope

of more improvement in the system.

Index Terms: Naive Bayes, stochastic gradient descent, text normalization, translation memory

References:

[1] Emma Flin et al, "A Text Normalization System for Non-Standard EnglishWords",Proceedings of the

3rd Workshop on Noisy User-generated Text, pages 107–115, Copenhagen, Denmark, September 7, 2017.

[2] Meenakshi Sharma,"Text Normalization Using Hybrid Approach", International Journal of Computer

Science and Mobile Computing, Vol.4 Issue.1, January- 2015, pg. 544-554.

[3] Hay Mar Htun, Theingi Zin, Hla Myo Tun, "Text To Speech Conversion Using Different Speech

Synthesis", NTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME

4, ISSUE 07, JULY 2015.

[4] Anand Arokia Raj et al, "Text Processing for Text-to-Speech Systems in Indian Languages", 6th ISCA

Workshop on Speech Synthesis, Bonn, Germany, August 22-24, 2007.

[5] Richard Sproat, Navdeep Jaitly, "RNN Approaches to Text Normalization: A Challange", arXiv

preprint arXiv:1611.00068, Jan 2017.

[6] Shaurya Rohatgi, Maryam Zare, "DeepNorm - A Deep Learning approach to Text Normalization",

arXiv preprint arXiv:1712.06994, Dec 2017.

115-122

Page 26: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[7] Chen Li, Yang Liu, "Improving Text Normalization via Unsupervised Model and Discriminative

Reranking", Proceedings of the ACL 2014 Student Research Workshop, pages 86–93, 2014.

[8] Dileep Kini, Sumit Gulwani, "FlashNormalize: Programming by Examples for Text Normalization",

Proceeding IJCAI'15 Proceedings of the 24th International Conference on Artificial Intelligence, Pages 776-

783, 2015.

[9] Suhas R. Mache et al, "Review on Text-To-Speech Synthesizer", International Journal of Advanced

Research in Computer and Communication Engineering, Vol. 4, Issue 8, pg. 54-59, August 2015.

[10] Lopez Ludeña, V., San Segundo, R., Montero, J. M., Barra Chicote, R., & Lorenzo, J. (2012).

"Architecture for text normalization using statistical machine translation techniques." In

IberSPEECH 2012 (pp. 112 – 122). Madrid, Spain, 2012.

[11] Conghui Zhu et al, "A Unified Tagging Approach to Text Normalization", Proceedings of the 45th Annual

Meeting of the Association of Computational Linguistics, pg. 688–695, Prague, Czech Republic, 2007.

[12] Chris Lin, Qian (Sarah) Mu, Yi Shao, "iTalk A 3-Component System for Text-to-Speech Synthesis",

unpublished.

[13] Slobodan Beliga, Miran Pobar and Sanda Martincic-Ipšic, "Normalization of Non-Standard Words in

Croatian Texts", arXiv preprint arXiv:1503.08167v2, 30 Mar 2015.

[14] Gokul P., Neethu Thomas, Crisil Thomas and Dr. Deepa P. Gopinath, "Text Normalization and Unit

Selection for a Memory Based Non Uniform Unit Selection TTS in Malayalam", Proceedings of the 12th

International Conference on Natural Language Processing, pg. 172-177, Trivandrum, India, 2015.

[15] Richard Sproat et al, "Normalization of non-standard words", Computer Speech and Language (2001) 15,

pg. 287–333.

[16] Subhojeet Pramanika, Aman Hussaina, “Text Normalization using Memory Augmented Neural Networks”,

arXiv preprint arXiv: 1806.00044v2, July 2018.

[17] Daniel Jurafsky, James Martin, Speech and Language Processing, Pearson India, 2nd Edition.

24.

Authors: B.Surya Sai, P.Vamsi Mohan,Pijush Meher,M.Azhagiri

Paper Title: A Culling System For A Recipe Using Sentiment Analysis Techniques

Abstract :This System helps the user for providing the recipes in which they are particularly interested in a

mentioned criteria of ingredients on which the user wants to prepare a recipe. The input given by the user like

the ingredient on which he/she wants to prepare a recipe can be of text, speech or visual. The process of

providing a list of gathered recipes from different trusted and verified sources is performed with the help of

Sentiment Analysis(SA), Watson Text-to-Speech and Watson Visual Recognition(WVR). The recipe extraction

from different sources which are required for the user is retrieved with the help of a standard Web Crawler. The

tools and technologies used for the proposed system are from Artificial Intelligence(AI), Natural Language

Processing(NLP). The system proposed assists the user in providing a list of recipes in a prioritized order based

on the optimization process performed by the Naïve Bayes Algorithm(NBA) of Sentiment Analysis. In addition,

the displayed results of recipes have been reviewed and rated by different users from different sources.

Keywords : Naïve Bayes Algorithm(NBA) ,Natural Language Processing(NLP) , Recipe extraction , Sentiment

Analysis (SA) , Web Crawler.

References:

[1] KeijiYanai, Takuma Maruyama and Yoshiyuki Kawano “ A Cooking Recipe Recommendation System

with Visual Recognition of Food Ingredients” International Journal of Interactive Mobile Technologies, Vol

8,No 2, 2014.

[2] M.B. Vivek, N. Manju and M.B. Vijay “Machine Learning Based Food Recipe Recommendation System”

D.S. Guru et al. (eds.), Proceedings of International Conference on Cognition and Recognition, Lecture

Notes in Networks and Systems 14, Springer Nature Singapore Pte Ltd. 2018.

[3] PakawanPugsee and MonsineeNiyomvanich “Sentiment Analysis of Food Recipe Comments”ECTI

Transactions on Computer And Information Technology Vol.9, No.2 November 2015.

[4] Rui Xia, Feng Xu, ChengqingZong, Qianmu Li, Yong Qi, and Tao Li “Dual Sentiment Analysis:

Considering Two Sides of One Review” IEEE Transactions on Knowledge And Data Engineering, Vol. 27,

No. 8, August 2015.

[5] Kim Schouten and Flavius Frasincar “Survey on Aspect-Level Sentiment Analysis” IEEE Transactions on

Knowledge AndData Engineering, Vol. 28, No. 3, March 2016.

[6] Lakshmish Kaushik, Abhijeet Sangwan and John H. L. Hansen “Automatic Sentiment Detection in

Naturalistic Audio” IEEE/ACM Transactions on Audio,Speech, And Language Processing, Vol. 25, No. 8,

August 2017.

[7] Sujata Rani and Parteek Kumar “A Sentiment Analysis System to Improve Teaching and Learning” IEEE

Computer Society, Vol 50,No.5 May 2017.

[8] Farkhund Iqbal , Jahanzeb Maqbool Hashmi, Benjamin C. M. Fung , Rabia Batool, Asad Masood Khattak,

Saiqa Aleem , And Patrick C. K. Hung “A HybridFramework for Sentiment Analysis Using Genetic

Algorithm Based Feature Reduction” IEEE Access , Vol 7,2019.

123-127

25. Authors: A.Revathi, Dr.S.G.Santhi,

Page 27: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Paper Title: Energy Consumption Based Low Energy Aware Gateway (LEAG) Protocol In Wireless Sensor

Networks

Abstract: Wireless Sensor Networks (WSN) consists of a large amount of nodes connected in a self-directed

manner. The most important problems in WSN are Energy, Routing, Security, etc., price of the sensor nodes and

renovation of these networks is reasonable. The sensor node tools included a radio transceiver with an antenna

and an energy source, usually a battery. WSN compute the environmental conditions such as temperature, sound,

pollution levels, etc., WSN built the network with the help of nodes. A sensor community consists of many

detection stations known as sensor nodes, every of which is small, light-weight and portable. Nodes are linked

separately. Each node is linked into the sensors. In recent years WSN has grow to be an essential function in real

world. The data’s are sent from end to end multiple nodes and gateways, the data’s are connected to other

networks such as wireless Ethernet. MGEAR is the existing mechanism. It works with the routing and energy

consumption. The principal problem of this work is choosing cluster head, and the selection is based on base

station, so the manner is consumes energy. In this paper, develop the novel based hybrid protocol Low Energy

Aware Gateway (LEAG). We used Zigbee techniques to reduce energy consumption and routing. Gateway is

used to minimize the energy consumption and data is send to the base station. Nodes are used to transmit the

data into the cluster head, it transmit the data into gateway and gateway compress and aggregate the data then

sent to the base station. Simulation result shows our proposed mechanism consumes less energy, increased

throughput, packet delivery ration and secure routing when compared to existing mechanism (MGEAR).

Index Terms: WSN, LEAG, Nodes, Energy, MGEAR.

References:

[1] Dhaigude Tanaji Anand Rao, Dr. Latha Parthiban “A survey on Energy Efficient Routing Protocols”

International Journal of Pure and Applied Mathematics, vol. 118, pp. 3109–3113, 2018.

[2] Zhao Han, Jie Wu, Member, IEEE, Jie Zhang, Liefeng Liu, and Kaiyun Tian, A General Self-Organized

Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network, IEEE Transactions on Nuclear

Science,., vol. 61. April 2014, pp.732–740.

[3] Amandeep Kaur, Er. Swaranjeet Singh, Navjot Kaur, “Review of LEACH Protocol and Its Types,” in

International Journal of Emerging Engineering Research and Technology, vol. 3, May 2015, pp. 20–25.

[4] Monika, Sneha Chauhan, Nishi Yadav, “LEACH-I Algorithm for WSN" in International Journal of

Innovative Research in Computer and Communication Engineering, vol.4, Issue..3, March 2016, pp. 3459 –

3466.

[5] Amrit Singh, “A Novel Routing Protocol (M-Gear) Using Gateway Based Energy-Efficient Scheme For

Wireless Sensor Networks (Wsns)”, International Journal of Advanced Research in Computer Science,

vol.7, issue.6, November 2016, pp. 361-363.

[6] Hassan Oudani, Salahddine Krit, Mustapha Kabrane, Kaoutar Bandaoud, Mohamed Elaskri, Khaoula

Karimi, Hicham Elbousty, Lahoucine Elmaimouni, “Energy Efficient in Wireless Sensor Networks Using

Cluster-Based Approach Routing” International Journal of Sensors and Sensor Networks”, International

Journal of Sensors and Sensor Networks, vol.5, Issue.1, May 2017, pp.6-12.

[7] Gurpreet Kaur, Sukhpreet Kaur, “Enhanced M-Gear Protocol for Lifetime Enhancement in Wireless

Clustering System”, International Journal of Computer Applications, vol.147, issue.14, August 2016, pp.30-

34.

[8] Kusum Lata, Kusum Dalal, “Performance Analysis of LEACH and M-GEAR Routing Protocols for WSN”,

International Journal of Electronics, Electrical and Computational System, vol.6, Issue.6, June 2017,pp.

164-169.

[9] Neeraj Dewli, Mrs. Rashmi Saini, “A Comparative Analysis of M-GEAR and MODLEACH Energy

Efficient WSN Protocols”, International Journal of Computer Science and Information Technologies, vol.6,

Issue.3, 2015,pp. 2641-2644.

[10] Rahul Priyadarshi, Surender Kumar, SoniPrashant Sharma, “An Enhanced GEAR Protocol for Wireless

Sensor Networks”, Springer Nanoelectronics, Circuits and Communication Systems, vol.511,pp. 287-297.

[11] Velanati Mohana Gandhi, M.V.H.Bhaskara Murthy, M.Lakshmu Naidu, “Performance Analysis of

Multihop-Gateway Energy Aware Routing (M-Gear) Protocol for Wireless Sensor Networks”, IOSR

Journal Of Humanities And Social Science, vol.21,Issue.11,November 2016, pp.1-7.

[12] Walid Abushiba, Princy Johnson, Saad Alharthi, Colin Wright, “An Energy Efficient and Adaptive

Clustering for Wireless Sensor Network (CH-leach) using Leach Protocol” IEEE 13th International

Computer Engineering Conference, December 2017, pp.50-54.

[13] Mohammed Abo Zahhad, Sabah M. Ahmed, N. Sabor, and Shigenobu Sasaki, “Mobile Sink-Based

Adaptive Immune Energy Efficient Clustering Protocol for Improving the Lifetime and Stability Period”

IEEE Sensors Journal,Vol. 15, No. 8, pp 4576-4586, Aug 2015.

[14] Gaurav Srivastav(2013), “Effective Sensory Communication using GEAR Protocol “ International Journal

of Science and Research (IJSR) vol 9, issue 4 , Pp 1809-1815.

[15] Gaurav Srivastav(2013), “Effective Sensory Communication using GEAR Protocol “ International Journal

of Science and Research (IJSR) vol 9, issue 4 , Pp 1809-1815.

[16] C. Divya (2015), “Analysis of GFEAR Protocol “International Journal of Emerging Research in

Management &Technology, Volume-4, Issue-5, Pp 38-42.

128-132

Page 28: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

32.

Authors: S. Rajarajeswari, Dhamini Poorna Chandra

Paper Title: Role Of Stop Word Removal In Sentiment Analysis

Abstract: The advent of the internet has led to the explosion of interaction and expressing one’s opinion on

social platforms. This poses a fertile ground for sentiment analysis, to understand the users’ opinion about the

subject of interest. Content present online contain lot of noise. Stop words are present at multiple locations and

usually add less semantic significance to the document itself which need to be removed before they can be

analyzed. One such pre-processing technique for sentiment analysis is stop word removal. Stop word removal

enhances the result of sentiment analysis. In the past decade, a considerable amount of research has been done to

extract sentiments. There are also numerous commercial companies that provide sentiment analysis services.

Stop word removal can enhance the performance of these tools in providing better results. In this paper, we

demonstrate how stop word removal enhances sentiment analysis.

Index Terms: Pre-processing, Sentiment Analysis, Stop word.

References:

[1] W. Medhat et al., Sentiment analysis algorithms and applications: a survey, Ain Shams Eng. J. (2014).

[2] M.R. Saleh, M.T. Martín-Valdivia, A. Montejo-Ráez, L.A. Ureña-López, Experiments with SVM to classify

opinions in different domains, Expert Syst. Appl. 38 (2011) 14799–14804.

[3] Manning, Christopher D., Prabhakar Raghavan, and Hinrich Schütze. Introduction to information retrieval.

Vol. 1. No. 1. Cambridge: Cambridge university press, 2008.

[4] P. Tetlock, M. Saar- rnal of Finance 63 (3) (2008) 1437 1467.

[5] T. Wilson, J. Wiebe, P. Hoffmann, Recognizing contextual polarity in phrase-level sentiment analysis, in:

Proceedings of the Human Language Technology Conference and the Conference on Empirical Methods in

Natural Language Processing (HLT/EMNLP), 2005, pp. 347 354.

[6] H. Yu, V. Hatzivassiloglou, Towards answering opinion questions: separating facts from opinions and

identifying the polarity of opinion sentences, in: Proceedings of the conference on Empirical methods in

natural language processing, EMNLP-2003, 2003, pp. 129 136.

[7] L. Tan, J. Na, Y. Theng, K. Chang, Sentence-level sentiment polarity classification using a linguistic

approach, Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation (2011)

77 87.

[8] S. R. Das, News Analytics: Framework, Techniques and Metrics, Wiley Finance, 2010, Ch. 2, the Handbook

of News Analytics in Finance.

[9] B. Pang, L. Lee, S. Vaithyanathan, Thumbs up? sentiment classification using machine learning, Association

for Computational Linguistics, 2002, pp. 97 86, conference on Empirical Methods in Natural Language

processing EMNLP.

[10] C.J. Hutto, Eric Gilbert. VADER: A Parsimonious Rule-based Model for Sentiment Analysis of Social

Media Text.

167-172

26.

Authors: Dr. Punith Kumar M B, Dr.T Shreekanth,Anupama M1,Sarsawath S2

Paper Title: An Ann Based Real Time System For Classification Of Normal And Abnormal Cries Of Pre-Term

And Neonates

Abstract: Infants communicate with the external world through cry. Most of the problems in the infants can

be explored through their cry within first year. Variations in cry can sometimes indicate the neurological

disorders, genetic problems and many more. Classification of the infant cry as normal and abnormal at the early

stages can reduce the course of action or any casualty. Hence this work proposes a computational approach for

the early diagnosis of pre-term and neonates' infant cry. The previous works include various algorithms for

classification, however the novelty in this work can be attributed to processing only voiced part of the cry signal.

The cry signal is first preprocessed by decomposing it into three levels using db13 wavelet in order to remove

any noise that has been inherited during signal acquisition. This signal is further processed to extract only voiced

part of the speech by identifying the endpoints through Zero Crossing Rate and Energy. Then the MFCC features

are extracted, as this kind of signal envelop is best estimated eventually using these kind of features and are used

to train feed forward neural networks based on back propagation algorithm. In order to train the network 100

normal and 100 abnormal samples were used. The database has been obtained from the neonatal ward of JSS

Hospital, Mysuru. The algorithm has been tested on the test dataset consisting of 50 samples. The performance

of the proposed method has been evaluated on only voiced part of the cry signal using the diagnostic test

measures and the efficiency is found to be 98%as compared to 90% efficiency if the same procedure is applied

on the entire cry signal.

Index Terms: Back Propagation, DCT, FFT, MFCC, STFT, Neural Network, Pre-term, Neonates, Hamming

Window, Wavelet.

References:

[1] Hofer M. A., “Unexplained infant crying: An evolutionary perspective”, ActaPaediatrica, 91, 491-496,

2002.

133-138

Page 29: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[2] Chittora, Anshu and Patil, Hemant, “Newborn infant’s cry analysis”, International Journal of Speech

Technology. 19. 10.1007/s10772-016-9379-8, 2016

[3] Ryuichi Kusaka,, Shohei Ohgi, Kenta Shigemori,and Tetsuya Fujimoto, “Crying and Behavioral

Characteristics in Premature Infants”, J Jpn Phys TherAssoc ,v.11(1); 2008

[4] Orlandi, Silvia and Reyes-Garcia, Carlos Alberto & Bandini, Andrea & Donzelli, Gianpaolo & Manfredi

Claudia, “Application of Pattern Recognition Techniques to the Classification of Full-Term and Preterm

Infant Cry”. Journal of voice: official journal of the Voice , 2015

[5] [Hesam Farsaie Alaie, Lina Abou-Abbas, Chakib Tadj, “Cry-based infant pathology classification using

GMMs” , Speech Communication, Volume 77, March 2016, Pages 28-52

[6] C.Manfredi, L.Bocchi, S.Orlandia, L.Spaccaterrab, G.P.Donzellib, “High-resolution cry analysis in preterm

newborn infants”,Medical Engineering and Physics ,Volume 31, Issue 5, June 2009, Pages 528-532

[7] Dhanashri U.S. Talauliker, NayanaShenvi, “Analysis of Cry in New Born Infants”, International Journal of

Advanced Research in Computer and Communication Engineering Vol. 4, Issue 3, March 2015

[8] Neema Verma, “Performance Analysis Of Wavelet Thresholding Methods In Denoising Of Audio Signals

Of Some Indian Musical Instruments”, International Journal of Engineering Science and Technology

(IJEST), Vol. 4 No.05 May 2012.

[9] Parwinder Pal Singh, Pushpa Rani, “An Approach to Extract Feature using MFCC”, IOSR Journal of

Engineering (IOSRJEN), Vol. 04, Issue 08, August. 2014

[10] Hassan Ramchoun, Mohammed Amine 11 JanatiIdrissi, Youssef Ghanou, Mohamed Ettaouil, “ Multilayer

Perceptron: Architecture Optimization and Training”, International Journal of Interactive Multimedia and

Artificial Intelligence, Vol. 4, No1,2016

[11] Prashant Arora1, Kulwinder Singh, “Denoising of Speech Signals Using Wavelets”, International Journal

for Research in Applied

Science & Engineering Technology (IJRASET), Volume 5 Issue I, January 2017.

[12] Goberman AM, Robb MP, “Acoustic examination of preterm and full-term infant cries: the long-time

average spectrum”, Journal of Speech Language and Hearing Research. 1999 Aug; 42(4):850-61.

[13] Johnston, C., Stevens, B., Craig, K., & Grunau, R., “Developmental changes in pain expression in

premature, full-term, two- and four-month-old infants”, Pain, 52, 1993, 201-208.

[14] Li-mei Chen, Yu-Hsuan Yang, Chyi-Her Lin, Yuh-Jyh Lin, Yung-Chieh Lin, “Spectrum Analysis of Cry

Sounds in Preterm and Full-Term Infants”, Conference on Computational Linguistics and Speech

Processing ROCLING 2014, pp. 193-203

[15] Jashanpreet Kaur, Seema, Sunil Kumar, “Audio Noise Reduction Using Discrete Wavelet Transform and

Filters”,International Journal of Advanced Research in Computer Science & Technology,Vol. 4, Issue 2,

Apr. - Jun. 2016.

[16] [Bachu R.G., Kopparthi S., Adapa B., Barkana B.D. “Separation of Voiced and Unvoiced using Zero

crossing rate and Energy of the Speech Signal”, Advanced Techniques in Computing Sciences and Software

Engineering , by Elleithy, Khaled, ISBN 978-90-481-3659-9.

[17] T. Shreekanth and S Saraswathi, " Acoustic analysis and classification of Infant Cry: A new approach",

Journal on Digital Signal Processing, Vol.5, No.2, 2017, pp.1-7.

27.

Authors: Dr.R.Geetha Ramani , S Suresh Kumar

Paper Title: Non-Volatile Kernel Root kit Detection And Prevention In Cloud Computing

Abstract: The field of web has turned into a basic part in everyday life. Security in the web has dependably

been a significant issue. Malware is utilized to rupture into the objective framework. There are various kinds of

malwares, for example, infection, worms, rootkits, trojan pony, ransomware, etc. Each malware has its own way

to deal with influence the objective framework in various ways, in this manner making hurt the framework. The

rootkit may be in some arbitrary records, which when opened can change or erase the substance or information

in the objective framework. Likewise, by opening the rootkit contaminated record may debase the framework

execution. Hence, in this paper, a Kernel Rootkit Detection and Prevention (KRDP) framework is proposed an

avert the records. The avoidance system in this paper utilizes a calculation to forestall the opening of the rootkit

influenced record as portrayed. By and large, the framework comprises of a free antivirus programming which is

restricted to certain functionalities. The proposed model beats the functionalities by utilizing a calculation, in

this way identifying the rootkits first and afterward cautioning the client to react to the rootkit tainted record. In

this way, keeping the client from opening the rootkit contaminated record. Inevitably, in the wake of expelling

the tainted document from the framework will give an improvement in the general framework execution.

Index Terms: Cloud; file; malware; port; rootkits; process; prevention;

References:

[1] R.Geetharamani, S.Sureshkumar, ShomonaGracia Jacob, “Rootkit (Malicious Code affecting Kernel)

Prediction through Data Mining Methods and Techniques” , IEEE-ICCIC-2013.

[2] LeianLin , Zuanxing Yin, Yuli Shen Haitao Lin, “Research and Design of Rootkit Detection Method” ,

Elsevier, ICMPBE, 2012.

[3] Safaa Salam Hatem, Dr.Maged H, wafy, Dr.Mahamoud M. El-Khouly. “Malware Detection in Cloud

Computing”, .IJACSA, Vol.5, No. 4, 2014.

139-144

Page 30: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[4] Gerard wagener,Radu State, Alexandre Dulauno, “Malware Behaviour analysis”, Springer.

[5] Sebastian Eresheim. “The Evolution of process Hiding Techniques in Malware-Current Thread and Possible

Countermeasures”, Information Processing Society of Japan Sep 2017.

[6] Diana Toma, Dominique Borrione, “SHA Formalization”, TIMA Laboratory, Grenoble, France.

[7] http://www.offensivecomputing.net/

[8] https://www.virustotal.com/#/home/upload

[9] K. Vijayakumar and C. Arun, “Continuous Security Assessment of Applications in Cloud Environment”,

International Journal of Control Theory and Applications, ISSN: 0974-5645 volume No. 9(36), Sep 2016,

Page No. 533-541.

[10] R.Joseph Manoj, M.D.Anto Praveena, K.Vijayakumar, “An ACO–ANN based feature selection

algorithm for big data”, Cluster Computing The Journal of Networks, Software Tools and Applications,

ISSN: 1386-7857 (Print), 1573-7543 (Online) DOI: 10.1007/s10586-018-2550-z, 2018.

[11] K. Vijayakumar and V. Govindaraj, “An Efficient Communication Technique for Extrication and

Cloning of packets on cloud”, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.

10 No.66 May 2015

28.

Authors: N.Tamilarasi, S.G.Santhi

Paper Title: Secure Routing with Improved Medium Access Control (SRI-MAC) Protocol for Wireless Sensor

Network using Particle Swarm Optimization

Abstract:A set of wireless sensor nodes comprises to form a sensor field called Wireless Sensor Networks

(WSN).The main purpose of using the sensor node is to collect information from the ambience process it and

send to a common gateway interface called Base Station(BS). The major problems that we face while using

WSN are limited battery power, bandwidth, security issues and transmission delay etc. Many algorithms and

protocols were developed in order to solve the above issues. Therefore, better solutions are required to face the

improvements and challenges in the current technologies. In WSN, the sensor node highly loses its energy

during communication period. One of the major issues of Medium Access Control (MAC) layer is collision.

Collision increases the energy consumption and delay of the sensor node. So we have to conserve the energy of

the sensor node in order to extend the lifetime of the network. At the same time it is also important to transmit

the data through secure path and identify the malicious node. In this paper, we propose a novelty approach called

Secure Routing with Improved Medium Access control (SRI –MAC) Protocol to solve the issues. SRI-MAC

identifies packet precedence sets using Fuzzy Implication System (FIS) to avoid packet collision in MAC layer

and also it detects wormhole attacks and selects secure path among k-paths using Particle Swarm Optimization

(PSO) algorithm. By simulation results, we show that the proposed approach is efficient in terms of energy

consumption and secure routing.

Keywords: WSN, Fuzzy Implication System(FIS), Particle Swarm Optimization(PSO), MAC and Secure

Routing with Improved –Medium Access Control (SRI-MAC).

References:

[1] C. Y. Wan, S. B. Eisenman, and A. T. Campbell, ”CODA: congestion detection and avoidance in sensor

networks,” in Proceedings of the first International Conference on Embedded Networked Sensor Systems,

pp.266–279, CA, USA, Nov 2003.

[2] [M. A. Kafia, D. Djenourib, J. B. Othmanc, A. Ouadjaouta, and N.Badachea, ”Congestion detection

strategies in wireless sensor networks: a comparative study with testbed experiments,” Procedia Computer

Science, vol. 37, pp. 168–175, 2014.

[3] A. Mohajerani and D. Gharavian, "An ant colony optimization based routing algorithm for extending

network lifetime in wireless sensor networks", Wireless Networks, vol. 22, no. 8, pp. 2637-2647, 2015..

[4] Prabha VR, Latha P. Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor

networks. Sadhana. 2017 Feb 1; 42(2):143-51.

[5] M. Hatamian, H. Barati, and A. Movaghar, ”A new greedy geographical routing in wireless sensor

networks,” Journal of Advances in Computer Research, vol. 6, no. 1, pp. 9–18, 2015.

[6] A. Bhatia and R. Hansdah, "TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with

flexibility to trade-off between latency and reliability", Computer Networks, vol. 104, pp. 79-93, 2016.

[7] N.Thangamani, S.John Grasias, Dr.G.Dalin “Ucon-Ipso: Usage Control with Improved Particle Swarm

Optimization (Ipso) Based Hierarchical Security Framework for Attack Detection in Wireless Sensor

Networks” IJETST- Vol.||04||Issue||08||Pages 5681-5691||August||ISSN 2348-9480

[8] Sunita Rani and Jaya “Wireless Sensor Network: Black Hole Attack Detection Using BFO-FUZZY”

International Journal of Computer Science and Mobile Applications, Vol.3 Issue. 9, September- 2015, pg.

42-52

[9] E. Vaidhegi, C. Padmavathy, T. Priyanka and A. Priyadharshini , ” Delay Sensitive Packet Scheduling

Algorithm for MANETs by Cross Layer”, IJIRAE – International Journal of Innovative Research in

Advanced Engineering, vol .1,Issue 1,2014

[10] Ahmed, K. Bakar, M. Channa and A. Khan, "A Secure Routing Protocol with Trust and Energy Awareness

for Wireless Sensor Network", Mobile Networks and Applications, vol. 21, no. 2, pp. 272-285, 2016.

[11] J. Wei, B. Fan, and Y. Sun, ”A congestion control scheme based on fuzzy logic for wireless sensor

networks,” in Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery

(FSKD 2012), pp. 501–504, Sichuan, China, May 2012.

145-150

Page 31: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[12] O. B. Akan, and I. F. Akyildiz, ”Event-to-sink reliable transport in wireless sensor networks,” IEEE/ACM

Transactions on Networking, vol.13, no. 5, pp. 1003–1016, 2005.

[13] Ewa Niewiadomska-Szynkiewicz and Filip Nabrdalik, “Secure Low Energy AODV Protocol for Wireless

Sensor Networks”, ITNAC – International Telecommunication Networks and Applications Conference ,

2017.

[14] S. Sarang, M. Drieberg, A. Awang and R. Ahmad, "A QoS MAC protocol for prioritized data in energy

harvesting wireless sensor networks", Computer Networks, vol. 144, pp. 141-153, 2018.

[15] Binitha S, “A Survey of Bio inspired Optimization Algorithms” International Journal of SoftComputing

and Engineering ISSN: 2231-2307, Volume-2, Issue-2, May 2012.

[16] Kiran Narang, “Black Hole Attack Detection using Fuzzy Logic” International Journal of Science and

Research, Volume 2 Issue 8, August 2013.

[1] Yash Pal Singh, “A Survey on Detection and Prevention of Black Hole Attack in AODV- based MANETs”

journal of information, knowledge and research in computer engineering, nov 12 to oct 13 ,volume – 02,

issue – 02

29.

Authors: S.Vishnukkumar, Sibi N.R, R.Balamurugan, S.Vasanth, T. Muthuramalingam

Paper Title: Machine ability On Leather Using Co2 Laser And Power Diode Laser

Abstract: Leather is a versatile, robust and trendy material and therefore its applications are nearly endless.

The conventional method of leather cutting takes a lot of man power. Power diode-based Laser technology has

grown significantly during recent years due to numerous advantages over conventional cutting methods. The

conventional Lasers also have some drawbacks in cutting such as Geometrical inaccuracies, Carbonization,

Overcut etc. This can be reduced by the use of Laser diodes. The main purpose of using Laser diode is to reduce

power consumption. In the present study, an attempt has been made to develop laser diode-based Laser beam

machining (LBM) and CO2 based LBM, to compare the performance measures of Carbonization and

Geometrical inaccuracy. The main objective of this work is to enhance the machining process using Laser diode,

to make it eco-friendly through the different duty cycles of Pulse Width Modulation (PWM) which can be used

to control the intensity of the Laser beam.

Keywords —Laser Beam Machining (LBM), Pulse Width Modulation (PWM), Geometrical Inaccuracies,

Carbonization.

References:

[1] Renann G. Baldovino, Jayson P. Rogelio, M.S., “A Pulse Width Modulation (PWM) LASER Power

Controller for the 3-Axis Computer Numerically Controlled (CNC) LASER Machine”,7th IEEE

International Conference Humanoid,Nanotechnolgy,Information Technology, Communication and

Control,Environment and Management (HNICEM),12-16 November, 2013.

[2] P. Jamaleswara kumar, A Siva Sai Tarun, M.Gowtham, P. Thamma Rao, G. Yaswanth, “Design and

fabrication of portable Laser cutting and engraving machine”, in International Journal of Engineering and

Technology, 2018.

[3] Nayanthara Bhatta, M.D., R. Rox Anderson, M.D., Keith Isaacson, M.D., Isaac Schiff, M.D., Krishna M

Bhatta, M.D. in “Comparative study of different Laser systems”, vol61, no.4, April 1994.

[4] Anizah khalid, Irraivan Elamvazuthi, Susana, Kamaruddin, Mohd Shahrul Azmi and Mohd Nidzam,

“Productivity Improvement Through Automation of Leather Cutting Process”, Asia SENSE 2003.

[5] Nasim, H., Jamil, Y.: Diode Lasers: From laboratory to industry. Opt. Laser. Technol. 56, 211-222 (2014).

[6] Vasanth, S., Muthuramalingam, T., “A Study on Machinability of Leather Using CO2 Based Laser Beam

Machining Process”. Advances in Manufacturing Processes, Lecture Notes in Mechanical Engineering,

239-244 (2019).

151-154

30.

Authors: T.R.Kowshika, K.Geetha

Paper Title: Dual Protectıon for Data usıng Steganographıc Technıques with Embedded Framework

Abstract: As the world is getting digitalized, the rush for need of secured data communication is overtop.

Provoked by the vulnerability of human visual system to understand the progressive changes in the scenes, a

new steganography method is proposed. The paper represents a double protection methodology for secured

transmission of data. The original data is hidden inside a cover image using LSB substitution algorithm. The

image obtained is inserted inside a frame of the video producing a stego-video. Stego-video attained is less

vulnerable to attacks. After decryption phase, the original text is obtained which is error-free and the output

image obtained is similar as the cover image. The quality of stego-video is high and there is no need for

additional bandwidth for transmission. The hardware implement is required in order to calculate the

corresponding analytical results. The proposed algorithm is examined and realized for various encryption

standards using Raspberry Pi3 embedded hardware. The results obtained focuses on the attributes of the

proposed model. On comparing with other conventional algorithms, the proposed scheme exhibits high

performance in both encryption and decryption process with increase in efficiency of secured data

communication.

Index Terms: Data Hiding, Data Security, Steganography.

155-159

Page 32: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

References:

[1] MrithaRamalingam, Nor Ahidi Mat Isa, "A data hiding technique using scene-change detection for video

steganography", Computers and Electrical Engineering,pp1-12,2015.

[2] Mahdi Hashemzadeh, "Hiding information in videos using motion clues of feature points", Computers and

Electrical Engineering, Vol 68 pp 14-25, 2018.

[3] Xinpeng Zhang, "Separable Reversible Data Hiding in Encrypted Image", IEEE Transaction on Information

Forensics and Security, Vol 7 No.2, pp 826-833.

[4] Yunxia Liu, Shuyang Liu, Yonghao Wang and Hongguo Zhao, Si Liu (2019) Video Steganography",

Neurocomputing, 335, 238-250.

[5] Rupali Bhradwaj, Vaishali Sharama, "Image Steganography Based on Complemented Message and

Inverted bit LSB Substitution ", Procedia Computer Science 93, 832-838., 2016.

[6] Poonam, Shafali M. Arora, (2018) A DWT-SVD based robust Digital Watermarking for Digital Images,

Procedia Computer Science, 251, 1441-1448.

[7] Dawen Xu, Rangding Wang (2016) Separable and error-free reversible data hiding in encrypted image,

Signal Processing, 123, 9-21.

[8] Rakesh Mehta, Jaume Amores (2018) Improving detection speed in video by exploiting frame correlation,

Pattern Recognition Letters, 112, 303-309.

[9] Ayhan Yilmaz, A. Aydin Alatan, (2008) Error detection and concealment for video transmission using

information hiding, 23, 298-312.

[10] Wien Hong, Tung-Shou Chen and Han-Yan Wu (2012) An improved Reversible Data Hiding in

Encrypted Images Using Side Match, Signal processing,,19, 199-202,

[11] Soumitra Roy, Arup Kumar Pal, (2012) A blind DCT based color watermarking algorithm for

embedding multiple watermarks, Signal processing, 19, 199-202.

[12] GuruPrasad .K.Basavaraju, "Introduction to Raspberry Pi with Raspbian OS" in

[13] https://www.codeproject.com/Articles/839230/Introduction-to-Raspberry-Pi-with-Raspbian-OS.

[14] Image fusion using approximation and detail,

http://shodhganga.inflibnet.ac.in/bitstream/10603/20682/13/13_chapter%204.pdf

31.

Authors: M.Praveen Kumar, P.Maheeth, M.Sai Krishna Reddy, S.Ravi Teja

Paper Title: A Renewable Energy Fed Non-Isolated Inverse Output Voltage DC-DC Converter With Broad

Range Of Conversion

Abstract: Renewable Energy fed non-isolated negative output Converter with dc-dc conversion is proposed

which employed for various applications. In industrial purposes only few converters are available for wide

conversion ratio, the proposed design has come up with wide range negative voltage load applications. The

proposed converter is analyzed and design for continuous condition mode. For verification of theoretical

analysis, the proposed converter is simulated using PSIM 9.0.

Index Terms: Negative output, Wide Gain, Buck-Boost, Non-isolated.

References:

[1] F.l. luo, “inverse output luo converter; for voltage lift technique,” iee pioc. Electr.power appl., vol.146, no:

-2, pp.208-224, mar-1999.

[2] M. Zhu and f.l. luo, “enhanced self-lift cuk converter for inverse output voltage conversion,” ieee trans. On

power electron., vol.25, no:9, pp,2227-2233, sep,2010.

[3] K.i. hwu, y.t. yau and j.j. shieh, “inverse output resonant voltage divi der”in proc.ieee power electronics

and driver systems

[4] a. Cocor, a. Baeseu, and a. Florescu,” elementary and self-lift inverse output luo dc-dc converters used in

hybrid cars,” u.p.b. sci.bull., series c, vol,77, iss,4, pp,179-190,2015.

[5] B.axelrod,y,berkovich,anda,ioinovici“switched-capacitor/switched-inductor structures for getting

transformer less dc-dc pwm converters,” ieee trans, circuits syst i, fundam. Theory appl., vol.55, n0.2,

pp.687-696, mar.2008

[6] O. Abutbul, a gherlitz, y. Berkovich, and a. Ioniovici,” step-up switching-mode converter with high voltage

gain using a switched capacitor circuit,” ieee trans. Circuits syst. I, fundamental theory appl., vol. No.8,

pp.1098-1102, aug.2003.

[7] Y. Tang, t. Wang, and y. He, “soft switching inverse output ky buck boost converter,” in proc. Ieee trans.

Power electron.vol.29, no.6, pp.1053-1060.

[8] k. I hwu and y. T yau, “a swithed capacitor based active network converter with high voltage gain,” iee

trans.power electron., vol.29 n0.6, pp.2959-2968, jun.2014

[9] K. I hwu, y.t yau and z.f. lin, “inverse output buck boost converter,” in proc. Ieee industrial electronics and

applications conf., may 2009, pp.3347-3350

[10] K. I hwu, w.c tu and y.h. chen, “a novel inverse output ky buck-boost converter”, in proc. Ieee power

electronics and drive sys2009, pp....v.2009, pp.1155-1157

[11] m. Sai krishna reddy and elangovan. “analysis and simulation of zcs current fed full bridge converter with

synchronous rectification” ieee pccctsg-2015, 183-185

[12] .senthil kumar k, m. Sai krishna reddy, d elangovan and dr. R. Saravan kumar “ interleave isolated boost

160-163

Page 33: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

converter as front end converter for fuel cell application” ieee, icees-2014, 202-205

32.

Authors: Aashita Tiwari, Ahitagnee Paul, P. Suganya, A.P(O.G)

Paper Title: A Smart Bot as an Interactive Medical Assistant with Voice-based System using Natural Language

Processing

Abstract-In this fast-moving world, people are ignorant about their health issues and avoid routine check-ups. It

is very difficult for users to spend longer time on-line and explore health information. To solve the problem,

voice-based application is provided to the user where user can interact with system and get inference of diseases

and their remedies by giving the symptoms as input.For processing the given input, the data is normalized by

using noun phrase extraction and medical term identifier. For getting more precise result, the system generates

relevant questions to the user and accordingly provide remedy for problem. Question is generated by mapping

the user input array with question generation matrix. The project is based on a digital medical aid through a

smart bot using machine learning and optical character recognition techniques. The user can just talk to the bot

and get to know what the possible causes and effects of the particular symptoms are, determine the illness and

take appropriate actions. Basically, the purpose of this bot is to act as a friendly healthcare assistant that helps in

all the work that people need to take care of their health.

Keywords— Friendly Healthcare Assistant, Machine Learning, Medical term identifier, Natural language

processing, Normalization, Optical Character Recognition, Question-Answer System, Smart Bot, Voice based.

References:

[1] LiqiangNie, Yi-Liang Zhao, Mohammad Akbari, Kialie Shen and Tat-Seng Chua, “Bridging the Vocabulary

Gap between Health Seekers and Healthcare Knowledge”, IEEE Transactions on Knowledge and Data

Engineering, Vol. 27, No. 2, February 2015.

[2] LiqiangNie, Meng Wang, Luming Zhang and Shuicheng Yan, “Disease Inference from Health-Related

Questions via Sparse Deep Learning”, IEEE Transactions on knowledge and Data Engineering, Vol.27, No.

8, August 2015.

[3] Mi-Young Kim and Randy Goebel,” Detection and Normalization of Medical Terms Using Domain-specific

Term Frequency and Adaptive Ranking”, IEEE,978-1-4244-6561-3 2010.

[4] Yuya Yokoyama, Teruhisa Hochin and Hiroki Nomiya,” Estimation of Factor Scores from Feature Values

of English Question and Answer Statements”, ICIS Japan, June 2016.

[5] Zhou Zhao, Lijun Zhang, Xiaofei He and Wilfred Ng,” Expert Finding for Question Answering Via Graph

Regularized MatrixCompletion”, IEEETransactions on Knowledge and Data Engineering, Vol. 27, No.4,

April 2015.

[6] Paya J Biswas, Aditi Sharan and Nidhi Malik,” A Framework for Restricted Domain Question Answering

System”, IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques

(ICICT), September 2014.

[7] Varsha Bhoir and M. A. Potey,” Question Answering System: A Heuristic Approach”, 978-1-4799-225

September 2014.

[8] Ming Liu, Vasile Rus and Li Liu,” Automatic Chinese Factual Question Generation”, IEEE Transactions on

Journal Name

[9] WebMD (URL): http://www.webMD.com,2016.

[10] MedLinePlus (URL):http://www.nlm.nih.gov/medlineplus, 2016.

164-166

33.

Authors: K.Senthil Kumar, M. Palanivelan, M. Sivaram, P. Shanmugapriyaand V. Bakyalakshmi

Paper Title: A Cyclotomic Lattice Based Closed Loop QOSTBC for Four Transmit Antennas

Abstract: Drawback of the Space Time Block Code (STBC) is, for complex constellations, full rate and full

diversity design exist only for two transmit antennas. In this paper, we propose a novel closed loop Quasi

Orthogonal Space Time Block Code (QOSTBC) system based on cyclotomic lattices for four transmit antennas.

It is a full rate and full diversity design where the information bits are mapped into four dimensional (4-D)

lattice points. The bit error and symbol error performance of the system are evaluated by simulation.

Index Terms: MIMO, QOSTBC, cyclotomic, lattice, diversity product.

References:

[1] Sundberg, C.,E.W. and Seshadri, “ Digital Cellular Systems for North America” , IEEE Globecom,

pp.533-7,Dec. 1990.

DOI:10.1109/GLOCOM.1990.116568

[2] Balaban, N and Salz, J. “Dual Diversity combining and equalization in digital cellular mobile radio ”,

IEEE Transactions on vehicular Technology, pp.342- 54, May 1994.

DOI: 10.1109/25.289415

[3] Winters,J., Salz, J and Gitlin, R.D., “ The impact of antenna diversity on the capacity of wireles

communication systems”, IEEE Transactions oncommunications, pp. 1740-51, April 1994.

167-171

Page 34: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

DOI: 10.1109/TCOMM.1994.582882

[4] Witteneben, A. “A new bandwidth efficient transmit antenna modulation diversity scheme for linear

digital modulation”, IEEE International Conference on communications (ICC) pp.1630-4, May

1993,.DOI: 10.1109/ICC.1993.397560

[5] Seshadri,N. and Winters.J.H. “Two signaling schemes for improvingthe error performance of

frequency division duplex (FDD) transmission systems using transmitter antenna diversity” IEEE

Vehicular Technology conference, pp.508- 11,May 1993.DOI: 10.1109/VETEC.1993.507522

[6] Tarokh, V., Seshdri, N. and calderbank, “ Space time codes for high datarate wireless communication:

Performance analysis and code construction”, IEEE Trans. Inform. Theory, pp.744- 65, Mar.

1998.DOI: 10.1109/18.661517

[7] S. M. Alamouti, “A simple transmit diversityTechnique for wireless communications,” IEEE J.

Select . Areas Commun. vol. 16, pp. 1451- 1458, Oct. 1998.

[8] W.Su and X.G. Xia, “Signal constellations for quasi-orthogonal space time block codes with full

diversity,” IEEE Trans. inform. Theory, vol.50, pp. 2331-2347, Oct. 2004.DOI:

10.1109/TIT.2004.834740

[9] Zhu Chen and Moon Ho Lee, “One bit feedback for Quasi- Orthogonal Space Time Block Codes Based

on Circulant Matrices”, IEEE Transactions onWireless Communications,Vol.8, No.7, July 2009. DOI:

10.1109/TWC.2009.080667Wei Liu, Mathini Sellathurai and Jibo Wei, “ A Cyclotomic Lattice Based

Quasi - Orthogonal STBC for Eight Transmit Antennas

[10] ”, IEEE Signal Processing Letter, Vol.17, No.4, April 2010. DOI: 10.1109/LSP.2009.2039951

[11] Asher Shaji, Anchana C K. Senthil Kumar, R. Amutha, M. Palanivelan, D. Gururaj, S. Richard Jebasingh,

M. Anitha Mary, S. Anitha, V. Savitha, R. Priyanka, Amruth Balachandran, H. Adithya, “Receive diversity

based rate optimization for improved network lifetime and delay efficiency of wireless body area networks”,

PLoS One, vol. , no. , pp. 1-20, October 2018. DOI: 10.1371/journal.pone.0206027

[12] M. Kanthibathi, R. Amutha, K. Senthil Kumar, “Energy efficient differential cooperative MIMO algorithm

for wireless sensor network” Wireless Personal Communications (Springer), vol. 103, no. 4, pp. 2715-2728,

December 2018.DOI: 10.1007/s11277-018-5957-1

[13] K. Senthil Kumar, R. Amutha, “Energy efficient wireless body area network using receive diversity”

Journal of Engineering Science and Technology, vol.13, no. 8, August 2018.

[14] K. Senthil Kumar, R. Amutha, “An algorithm for energy efficient cooperative communication in wireless

sensor networks”, KSII Transactions on Internet and Information Systems, vol. 10, no. 7, pp. 3080-3099,

August 2016.DOI: 10.3837/tiis.2016.07.012,ISSN: 1976-7277

[15] T.L.K. Sneha Piriya, K. Senthil Kumar, R. Amutha, “Energy Efficient V-MIMO using Turbo Codes in

Wireless Sensor Networks” in the Second IEEE International Conference on Computing and

Communication Technologies (ICCCT’17), on 24th Feb 2017. DOI: 10.1109/ICCCT2.2017.7972288

[16] H.Jafarkhani, “A quasi orthogonal space – Time block code,” IEEE Trans. Commun. vol. 49, pp. 1-4,

Jan. 2001.

[17] K. Senthil Kumar, R. Amutha, “Energy efficient cooperative communication using QOSTBC in wireless

sensor networks”,International Journal of Advanced Engineering Technology,vol. 7, no. 1, pp. 244-251,

March 2016. EISSN: 0976-3945

[18] J.H.Conway and N.J.A.Sloane, “ Sphere packing, lattices and groups”, 3rd edition, NewYork: Springer -

verlag 1998.

[19] Genyuan Wang, Huiyong Liao, Haiquan Wang and Xiang- Gen Xia, “Systematic and optimal

cyclotomic lattices and diagonal space time block code designs ”, IEEE Trans. Information

Theory, Vol 50, pp. 3348 - 3360, Dec.2004.DOI: 10.1109/TIT.2004.838096

[20] G.Wang and X.G.Xia, “ On optimal cyclotomicLattices and diagonal / single layer space time block

codes”, Proc. ISIT 2004, June 27 - July 2, Chicago, USA, 2004.

[21] G.Wang and X.G.Xia, “On optimal multi - layer cyclotomic Space –time code designs ” IEEE Trans.

Inform. Theory, vol. 51, no. 3, pp. 1102-1135, Mar. 2005.

34.

Authors: Kiran Kumar Patro, M.Jayamanmadha Rao, P.Rajesh Kumar

Paper Title: Swarm based Intelligent Feature Optimization technique for ECG based Biometric Human

Recognition

Abstract: Recently, rapid growth in network technology and communication leads to widening human

activities, so that a strong identification system is necessary. This work aims to build an accurate identification

technology based on unique physiological characteristics of ECG. The Biometric recognition of ECG primarily

depends on the quality of its features. Feature extraction is performed on parameters of a cardiac cycle based on

the fiducial approach and large data sets of features have been extracted. The extracted dataset contains

irrelevant, correlated and over-fitted features, which misleads the biometric system performance so that an

effective feature optimization is needed to sort out those features to avoid redundancy in the data. In this paper, a

novel swarm based intelligent feature optimization method; Particle Swarm Optimization (PSO) is used to

generate feature subset based on a fitness function with joint entropy. The dataset from optimization phase are

fed to classifiers such as ANN, K-NN and SVM for recognition. The proposed approach is tested with available

open source MIT-BIH ECG ID database. Finally, a comparison is made with and without feature optimization in

which PSO with KNN shows recognition accuracy of 97.8931%.

172-178

Page 35: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Index Terms: Biometric, Electrocardiogram (ECG), Entropy,SVM, Swarm.

References:

[1] A.Ross, A.K Jain, “Human recognition using biometrics”, Annals of Telecommunications, vol.62, pp.11-35,

2007..

[2] Irvine M, Israel A and Cheng A, “ECG to Identify Individuals”, Pattern recognition, vl.38, pp.133-142,

2005.

[3] L Khalil, F.Sufi and J.Hu, “ ECG based authentication”, Handbook of Information and Communication

security Springer , pp.309-331, 2010.

[4] C. Ye, M. Coimbra and B. Kumar, “ Investigation of human identification using two lead ECG signals”

Proceedings of 4th IEEE Int. Conference on Biometrics Theory and Applications (IEEE BTAS), pp.01-08,

2010.

[5] B. Nasri, M Guennoun and K. El-Khatib, “ Using ECG as a measure in Biometric Identification systems”,

Proceedings IEEE Toronto Int. Conf. Science and Technology for humanity, pp.28-33, 2009.

[6] Tilendra Choudhary, M. Sabarimalai Manikandan “A Novel Unified Framework for Noise-Robust ECG-

Based Biometric Authentication” IEEE 2nd International Conference on Signal Processing and Integrated

Networks (SPIN), pp.186-191, 2015.

[7] Sairul Safie, M I Yusof, Kushsairy Kadir, Haidawati Nasir “Bipolar Pulse Active Features for ECG

Biometric Application” International Conference on BioSignal Analysis, Processing and Systems

(ICBAPS), pp. 01-05, 2015.

[8] Md. Khayrul Bashar, Yuji Ohta, and Hiroaki Yoshida “ECG-based Biometric Authentication Using

Mulscale Descriptors” Signal Processing, Computer Networks and Telecommunications, pp.01-04, 2015.

[9] Abhijit Sarkar, A. Lynn Abbott, Zachary Doerzaph “ECG Biometric Authentication Using a Dynamical

Model”, 7th IEEE Int. Conf. on Biometrics Theory, Applications and Systems, pp.01-06, 2015.

[10] Yue Zhang, Youqun Shi, “A New Method for ECG Biometric Recognition using a Hierarchical Scheme

Classifier”,6th IEEE International Conference on Software Engineering and Service Sciences,pp.457-460,

2015.

[11] Fatema-tuz-Zohra Iqbal, Khairul Azami Sidek, “Cardioid Graph Based ECG Biometric Recognition

Incorporating Physiological Variability” Proc. of the IEEE Int. Conf. on Smart Instrumentation,

Measurement and Applications , pp.01-05, 2014.

[12] Hatzinakos D, Agrafioti F, Gao J, “Heart Biometrics: Theory, methods and applications” Biometrics B ,

vl.3, pp.199-216, 2011.

[13] Wan Y, Yao J, “ A Neural network to identify human subjects with Electrocardiogram signals”, World

congress on Engineering and Computer Science; 2008, USA.

[14] Belgcem N, Ali A, Fouenier, “ ECG based human authentication using wavelets and random forests”,

International Journal of Cryptography Information Security , vol.2, pp.01-11, 2012.

[15] Kiran Kumar Patro, P. Rajesh Kumar, “ A Novel Frequency-Time Based Approach for the Detection of

Characteristic Waves in Electrocardiogram Signal”, Springer India , vol.372, no.1, pp.57-67, 2015.

[16] LugovayaT.S.,“Biometric human identification based on electrocardiogram”, [Master's thesis] Faculty of

Computing Technologies and Informatics, Electrotechnical University "LETI", Saint-Petersburg, Russian

Federation; June 2005.

[17] Kiran Kumar Patro, P. Rajesh Kumar, “ Effective Feature Extraction of ECG for Biometric Application”,

Journal of Procedia, Elsevier, vol.115, pp.296-306, 2017.

[18] Khan M, Quadri. “Effects of using filter based feature selection on the performance of Machine learners

using different datasets”, BVICAM’S International Journal of Information Technology, vol.5, no.2, pp.597-

603, 2013.

[19] Adejoke B, Omotoyo M. Review of Feature selection Methods in Medical Image Processing, vol.4, no.1,

pp.01-05, 2014.

[20] Kennedy J. Particle Swarm Optimization, Encyclopedia of Machine Learning, Springer USA: 760-766.

[21] I. Defalco, A D Cioppa, E. Tarantino, “ Facing Classification Problems with Particle Swarm Optimization”,

Applied soft Computing, vol.7, pp.652-658, 2007.

[22] Xu Y, Jones G, Wang B. A Study on Mutual Information based Feature selection for text Categorization,

International Journal of Computational Information Systems, vol.3, no.3, pp.1007-1012, 2007.

[23] http://www.physionet.org/cgi-bin/atm/ATM – “MIT-BIH ECG ID Database.

[24] T.S Lugovaya, AP Nemriko, “ Biometric human identification based on Electrocardiogram”, Proc. XII-th

Russian Conference on Mathematical Methods of Pattern recognition, Moscow 2005:387-390.

[25] Adrina, D.C Chan, M Hamdy, “Wavelet distance measure for person identification using

electrocardiograms”, IEEE transactions on Instrumentation and measurement, vol.57, no.2, pp.248-253,

2008.

[26] O. Boumbarov, Y.Velchev, S.Sokolov, “ ECG Personal identification in subspaces using Radial Basis

Nueral Networks”, IEEE Int. workshop on Intelligent data acquisition and Advanced Computing systems,

pp.446-451, 2009.

[27] W D Shen, W J Tompkins, and Y H Hu, “ Implementation of a one-lead ECG human identification system

on a normal population”, Journal of Engg. Comput. Innovations, vol.2, no.1, pp.12-21 ,2011.

[28] K.Azmi, I Khalil, M Smole, “ ECG Biometric Recognition in different physiological conditions using

robust normalized QRS” Complexes.cinc.org Computing in Cardiology, vol.39, pp.97-100, 2012.

Page 36: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[29] S Gutta, Qi Cheng, “ Joint Feature Extraction and Classifier design for ECG based Biometric Recognition”,

IEEE Journal of Biomedical and Health Informatics, vol.20, no.2, pp.460-468, 2016.

42.

Authors: Ms.V.Preethi, Hani Saravanan, Vijay Balaji

Paper Title: Real Time Drowse Alert System

Abstract -- In this project we have contrived a real time drowse alert system. This system focusses on observing

the eyelid movements of an automobile driver and affirms that the driver is drowsy if the eyelids are closed or

are stationery for more than a stipulated time. So apparently our system involves affixing cameras in cars and

discerning the eyelid movements. The system uses a shape predictor for marking the face landmarks and

predicting the eyes of the user and quantifies the eye aspect ratio using OpenCV. This ratio is computed for both

the left eye and the right eye and the average value is ascertained as the net eye aspect ratio. This ratio plays a

crucial role in pinpointing the closed eyes from open eyes. If the eyes are closed for more than the threshold time

of the system an alert and a high-pitched alarm is set to blare to wake the driver up the alarm continues to blare

until the driver’s open eyes are detected.

Keywords: OpenCV, eyes predictor, eye aspect ratio

References:

[1] P. R. Tabrizi and R. A. Zoroofi, “Drowsiness detection based on brightness and numeral features of eye

image,” in Proceedings of the 5th International Conference on Intelligent Information Hiding and

Multimedia Signal

[2] Processing, pp. 1310–1313, Kyoto, Japan, September 2009.ViewatPublisher· ViewatGoogleScholar·

ViewatScopus de la Escalera, M. J. Flores, and J. M. Armingol, “Driver drowsiness warning system using

visual information for both diurnal and nocturnal illumination conditions,” EURASIP Journal on Advances

in Signal Processing, vol. 2010, Article ID 438205, 2010.Viewat

[3] GoogleScholar· ViewatScopus

[4] D. Wenhui, Q. Peishu, and H. Jing, “Driver fatigue detection based on fuzzy fusion,” in Proceedings of the

Chinese Control and Decision Conference (CCDC '08), pp. 2640–2643, Shandong, China, July 2008.Viewat

[5] Publisher· ViewatGoogleScholar· ViewatScopus

[6] Rau P. Drowsy Driver Detection and Warning System for Commercial Vehicle Drivers: Field Operational

Test Design, Analysis, and Progress. National Highway Traffic Safety Administration; Washington, DC,

USA: 2005.

[7] Zhang Z., Zhang J. A new real-time eye tracking based on nonlinear unscented Kalman filter for monitoring

driver fatigue. J. Contr. Theor. Appl. 2010;8:181–188.

[8] Portouli E., Bekiaris E., Papakostopoulos V., Maglaveras N. On-road experiment for collecting driving

behavioural data of sleepy drivers. Somnology. 2007;11:259–267.

[9] Qiang Ji, Zhiwei Zhu and Peilin Lan ―IEEE transactions on Vehicular Technology Real Time Nonintrusive

Monitoring and Prediction of Driver Fatigue, vol. 53, no. 4, July 2004.

[10] Weirwille, W.W. (1994). ―Overview of Research on

[11] Driver Drowsiness Definition and Driver Drowsiness Detection,‖ 14th International Technical Conference

on Enhanced Safety of Vehicles, pp 23-26.

[12] Perez, Claudio A. et al. ―Face and Eye Tracking

[13] Algorithm Based on Digital Image Processing‖,IEEE System, Man and Cybernetics 2001 Conference, vol. 2

(2001), pp 1178-1188.

[14] Gonzalez, Rafel C. and Woods, Richard E. ―Digital Image Processing‖, Prentice Hall: Upper Saddle River,

N.J., 2002.

[15] An Analysis of Viola Jones algorithm for face detection by Yi-Quin Wang, University of Malaysia Phang,

2014, pp: 15-20.

[16] K. C. Yowand, R. Cipolla, “Feature-based human face detection, “Image Vision Comput., vol.15, no.9,

1997, pp.713–735.

222-224

43.

Authors: V Brindha Devi , R Skanda Gurunathan , N Keerthi vasan

Paper Title: De-Centralized Certificate Creation And Verification Using Blockchain (DCCVUB)

Abstract: The rapid growth in the population has lead to generation of large amount of data from each

individual. Each and every individual holds several physically signed documents. Currently, the documents,

certificates, and contracts are all printed in papers and manually signed. It is difficult for other party say a

recruiter, or a government official or any other custom officer to verify the validity of the certificates and other

documents of the individual. It consumes a tremendous amount of time for validating and verifying such

documents manually. Thus we propose a system to develop a Decentralized application (DApp) for

implementing a Blockchain[1] to store and verify the documents. By the nature of blockchain, the documents are

securely stored with high integrity, and no further modifications can be done to the blocks in the chain which in

turn reduces the creation of forged documents. Also using Distributed Ledger technology(DLT)[5] and IPFS the

data is decentralised so that it is readily available with integrity. Also, using MultiSig[3] concepts, the system is

more secured by two step authentication. Thus, blockchain creates trust and DLT provides integrity ease of

225-229

Page 37: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

access. And with use of IPFS the DApp is decentralized4]

Index Terms: Document Verification, Blockchain, Certificates, Smart Contracts, MultiSig

References:

[1] S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, pp. 9, 2008.

[2] L. Luu, D.-H. Chu, H. Olickel, P. Saxena, A. Hobor, "Making smart contracts smarter", Proceedings of the

2016 ACM SIGSAC Conference on Computerand Communications Security, pp. 254-269, 2016.

[3] Okamoto, T., “A digital multisignature scheme using bijective public-key cryptosystems”, ACM Trans.

Computer Systems, 1988, 6, (8), pp.432–441

[4] Juan Benet, “IPFS - Content Addressed, Versioned, P2P File System”, ArXiv,2014

[5] Klaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi, Jameela Al-Jaroodi, “A Survey of Load

Balancing in Cloud Computing: Challenges and Algorithms”, Second Symposium on Network Cloud

Computing and Applications, 2012

[6] "Blockchain", Wikidia, [online] Available: https://en.wikipedia.org/wiki/Blockchain#cite_note-te20151031-

1.

[7] "AboutHypededger", Hyperledger, [online] Available: https://www.hypededger.org/about.

[8] C. Christian, A. Elli, Angelo De Caro, K. Andreas, O. Mike, S. Simon, S. Alessandro, V,. Marko et al.,

"Blockchain cryptography and consensus", IBM Research Zurich, June 2017.

[9] Vitalik Buterin, "Ethereum and The Decentralized Future", Future Thinkers Podcast. 2015-04-21, 05 2016.

[10] Zheng, Y. Li, P. Chen and X. Dong, "An Innovative IPFS-Based Storage Model for Blockchain," 2018

IEEE/WIC/ACM International Conference on Web Intelligence (WI), Santiago, 2018, pp. 704-708J. Jones.

(1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com

35.

Authors: Kalpana Shinde, Vini Kale, Dr, C.N.Kayte, Dr.Shobha Bawiskar

Paper Title: Determining the Probability of Recovering Data from Damaged USB Flash Drive

Abstract: Habit of storing digital data is becoming a common practice. To cope this need lots off secondary

memory devices are commercially available in cheap prices. Important factor is significance of data, its

dependability in human daily life. Hence looking at this scenario the cyber crime rates are at hike. Mostly after

committing the crime intentionally or unintentionally criminals try to destroy the digital evidence by doing

damage to e- device. Basic aim is to check whether damaged secondary can recover the data or not. For this

purpose various damaged setup are done and by using software’s results are analyzed.

Keywords: Pen Drive(PD), Pen Drive Models, Data Recovery , Damaged PD

.

References:

[1] Recuva software https://recuva.en.softonic.com/downloadStellar Phoneix

[2] 7 Data Recovery Software https://7datarecovery.com/#forwardPhotrec data recovery

[3] Photorec 7.0 Data Recovery -https://downloads.tomsguide.com/PhotoRec,0301-32874.html

[4] Stellar Phoneix : https://www.stellarinfo.com/

[5] https://www.google.com/search?rlz=1C1CHBD_enIN764IN764&biw=1200&bih=733&tbm=isch&sa=1&ei

=s9yIXMGYD9q7rQHTtrnABw&q=images+of+smart+toy+pen+drive+&oq=images+of+smart+toy+pen+d

rive+&gs_l=img.3...9508.9508..10000...0.0..0.148.148.0j1......0....1..gws-wiz-img.IOMhl-

e9HT8#imgrc=4e9pT38M_LYKGM:[

[6] https://www.google.com/search?rlz=1C1CHBD_enIN764IN764&biw=1200&bih=733&tbm=isch&sa=1&ei

=Z9eIXKuIGZa9rQHiw7eABA&q=images+of+smart+toy+pen+drive++bracelets&oq=images+of+smart+t

oy+pen+drive++bracelets&gs_l=img.3...11277.16608..16992...0.0..0.1263.2965.0j9j0j1j7-1......0....1..gws-

wiz-img.RNbWXgRt-eI#imgrc=vW9w3N0V6az4CM:

[7] https://www.google.com/search?rlz=1C1CHBD_enIN764IN764&biw=1200&bih=733&tbm=isch&sa=1&ei

=Z9eIXKuIGZa9rQHiw7eABA&q=images+of+smart+toy+pen+drive+&oq=images+of+smart+toy+pen+dr

ive+&gs_l=img.3...4164.4164..4496...0.0..0.0.0.......0....1..gws-wiz-

img.GpD7xMICc2E#imgrc=uGg_4WVwMi_R1M:

[8] https://www.google.com/search?rlz=1C1CHBD_enIN764IN764&biw=1200&bih=733&tbm=isch&sa=1&ei

=Z9eIXKuIGZa9rQHiw7eABA&q=images+of+smart+toy+pen+drive++bracelets&oq=images+of+smart+t

oy+pen+drive++bracelets&gs_l=img.3...11277.16608..16992...0.0..0.1263.2965.0j9j0j1j7-1......0....1..gws-

wiz-img.RNbWXgRt-eI#imgrc=vW9w3N0V6az4CM:

[9] https://www.google.com/search?rlz=1C1CHBD_enIN764IN764&biw=1200&bih=733&tbm=isch&sa=1&ei

=Z9eIXKuIGZa9rQHiw7eABA&q=images+of+smart+toy+pen+drive+&oq=images+of+smart+toy+pen+dr

ive+&gs_l=img.3...4164.4164..4496...0.0..0.0.0.......0....1..gws-wiz-

img.GpD7xMICc2E#imgrc=_2MGQbESmY_QvM:

[10] https://www.wantitall.co.za/pchardware/8gb-usb2-0-memory-stick-creative-metal-wrench-usb-flash-drive-

kepmem-funny-gift-pen-drive__b06xv88cj7

[11] Sneha Pandhare , Dr.Shobha Bawiskar,” Recovery Of Data From Damaged Disks”.(Online-Oral

Presentation), International Conference on “Innovations in Engineering, Technology and Sciences”-

(ICIETS2018) with catlog “CFP18Q63-PRJ:978-1-5386-7321-8” held on September 21-22 ,2018, NIE

179-191

Page 38: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Institute of Technology, Mysore, Karnataka, (Bangalore)India, will be published in IEEE Xplore Digital

Library

[12] Alpna, Dr. Sona Malhotra ,” Cyber Crime-Its Types, Analysis and Prevention Techniques” International

Journal of Advanced Research in Computer Science and Software Engineering Research Volume 6, Issue

5, May 2016 ISSN: 2277 128X ,page no 145. Paper Available online at: www.ijarcsse.com

[13] Madison, Alex (2016-07-09). "Keychain Not Included: The Five Highest-Capacity USB Flash Drives for

Your Digital Life". Digital Trends. Retrieved 17 October 2016.

[14] Jump up to:a b Athow, Desire (2016-07-04). "The best USB flash drives 2016". Tech Radar. Retrieved 17

October 2016.

[15] "The Largest Flash Drives | Digital Trends". Digital Trends. 2018-07-23. Retrieved 2018-10-09.

[16] G. I. A. Incorporated, "USB Flash Drive Market Trends," Global Industry Analyst Inc., 20 March

2017.[Online].Available:http://www.strategyr.com/MarketRe

search/USB_Flash_Drives_Market_Trends.asp. [Accessed 20 March 2017

[17] Parthasarathy, M., & Parthasarathy, S. (2017). Performance Analysis of USB Flash Memory Devices on

Linux vs. Windows XP.

[18] JUANCHO D. ESPINELI, 2 JASMIN NIQUIDULA, “INFORMATION THEORY IN USB FLASH

MEMORY DEVICE ANALYSIS” Proceedings of Academics World 63 rd International Conference,

Manila, Philippines, 28th -29th April 2017, http://www.worldresearchlibrary.org/up_proc/pdf/834-

14997520531-6.pdf

[19] International Journal of Engineering Research and Development. ISSN: 2278-067X. 2012; 1(6): 25-34.

[20] 20 B Naresh Kumar Reddy, N Venktram, Sireesha, “An Efficient Data Transmission by using Modern USB

Flash Drive” International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 5, October

2014, pp. 730~740 ISSN: 2088-8708

[21] Oka Mahendra,Djohar Syamsi,Ade Ramdan,Marcella Astrid,"Design and implementation of data storage

system using USB flash drive in a microcontroller based data logger" , DOI

10.1109/ICACOMIT.2015.7440175,Electronic ISBN: 978-1-4673-7408-8 CD-ROM ISBN: 978-1-4673-

7407-1,https://ieeexplore.ieee.org/abstract/document/7440175.

[22] PNY USB Flash Drive – CES 2006 – LetsGoDigital. Ces-show.com. Retrieved on 2011-05-18.

[23] BlueTrek Bizz – an expandable USB and a Bluetooth headset in one Archived 2014-08-29 at the Wayback

Machine. TechChee.com (2008-05-20). Retrieved on 2011-05-18.

36.

Authors: Madhwaraj Kango Gopal, Amirthavalli M.

Paper Title: Applying Machine Learning Techniques to predict the maintainability of Open Source Software

Abstract – Software maintainability is a vital quality aspect as per ISO standards. This has been a concern since

decades and even today, it is of top priority. At present, majority of the software applications, particularly open

source software are being developed using Object-Oriented methodologies. Researchers in the earlier past have

used statistical techniques on metric data extracted from software to evaluate maintainability. Recently, machine

learning models and algorithms are also being used in a majority of research works to predict maintainability. In

this research, we performed an empirical case study on an open source software jfreechart by applying machine

learning algorithms. The objective was to study the relationships between certain metrics and maintainability.

Index Terms— Machine Learning, Maintainability, Open Source Software, Object-Oriented, Design Metrics

References:

[1] K.D. Welker, The software maintainability index revisited, Journal

of Defense Software Engineering, pp. 18-21, 2001.

[2] P. Oman and J. Hagemeister, Metrics for assessing a software

system’s maintainability, Proceedings of the IEEE International Conference on Software Maintenance, pp. 337-

344, 1992.

[3] P. Oman and J. Hagemeister, Constructing and testing of

Polynomials predicting software maintainability, Journal of Systems and Software, Vol. 24, No 3, pp. 251-

266, 1994.

[4] M.M.T. Thwin and T.S. Quah, Application of neural networks for software quality prediction using object-

oriented metrics,Journal of Systems and Software, Vol 76, No 2, pp. 147-156, 2005.

[5] Y. Zhou and X.U. Baowen, Predicting the maintainability of open source software using design metrics,

Wuhan University Journal of Natural Sciences, Vol 13, No 1, pp. 14-20, 2008.

[6] Y.Zhou and H.Lueng, Predicting object-oriented software

Maintainability using multivariate adaptive regression splines,

192-195

Page 39: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Journal of Systems and Software, Vol 80, No 8, pp. 1349-1361, 2007.

[7] K.K. Aggarwal, Y. Singh, A. Kaur and R. Malhotra, Application of artificial neural network for predicting

maintainability using object-oriented metrics, World Academy of Science, Engineering and Technology, No

22, 2006.

[8] P. Niemeyer and J. Knudsen , Learning Java, O’Reilly & Associates : 2005.

[9] S.C. Misra, Modeling design/coding factors that drive maintainability of software systems, Software Quality

Journal, Vol 13, pp. 297-320, 2005.

[10] R. Martin, Agile Software Development Principles : Principles, Patterns and Practices, Prentice Hall, 2003.

[11] Robert C Martin,“UML 0.9 Lexicon”, B Class, Citeseer.

[12] http://clarkware.com/software/JDepend.html.

[13] H.M. Halstead, Elements of Software Science, N. Holland : Elsevier, 1997.

[14] S. Muthanna, K. Kontogiannis, K. Ponnambalam and B. Stacey, A maintainability model for industrial

software systems using design level metrics, Proceedings of the Seventh Working Conference on Reverse

Engineering, pp. 248-256, 2000.

[15] S.S. Yau and J.S. Collofello, Some stability measures for software Maintenance, IEEE Transactions on

Software Engineering, Vol 6, No 6, pp. 545-552, 1980.

[16] F. Zhuo, B. Lowther, P. Oman and J. Hagemeister, Constructing and testing software maintainability

assessment models, Proceedings of the First International Software Metrics Symposium, IEEE CS Press,

pp. 61-70, 1993.

[17] M.O. Elish, A.H.A. Yafei and M.A. Mulhem, Empirical

comparison of three metrics suites for fault prediction inpackages of object-oriented systems : a case study of

eclipse, Advances in Engineering Software, Vol 42, No 10, pp. 852-859, 2011.

[18] IEEE, IEEE Standard Glossary of Software Engineering Terminology, Report IEEE Std 610.12-1990,

IEEE, 1990.

[19] Madhwaraj K.G., Empirical comparison of two metrics suites for maintainability prediction in packages of

object-oriented systems : A case study of open source software, Journal of Computer Science, Vol 10, No.

11, pp. 2330-2338, 2014.

[20] Madhwaraj K.G., Predicting the maintainability of object oriented software using design metrics – An

evolutionary case study of open source software, International Review on Computers and Software, Vol 9,

No. 6, 2014.

[21] Malhotra, R., & Bansal, A.J. (2012). Fault Prediction Using Statistical and Machine Learning Methods for

Improving Software Quality JIPS, 8, 241-262.

[22] Arunima Jaiswal, Ruchika Malhotra, Software reliability prediction using machine learning techniques,

International Journal of System Assurance Engineering and Management, 2018, Volume 9, Number 1,

Pages 230-244.

[23] Padhy, N., Panigrahi, R., & Neeraja, K. (2019). Threshold estimation from software metrics by using

evolutionary techniques and its proposed algorithms, models. Evolutionary Intelligence, 1-15.

37.

Authors: Mrs. S Meena, Dr.K.Chitra, Mr. T Ramkumar, Mr. G Richie Roberts

Paper Title: Implementation of Controller structures in FPGA Platform

Abstract: Field Programmable Gate Arrays are recently replacing general purpose microcontrollers in

implementation of digital control systems. This paper includes the proposal of implementing complex controller

structures in a Field Programmable Gate Array (FPGA). Till recent, PID controllers are implemented in FPGA

Platform. PID controllers are simple, reliable, versatile feedback mechanisms used in most control systems. To

reduce various undesirable effects on the output such as overshoot, some variants in the conventional PID

controllers, such as the I-PD and IMC are also used. Here all these control controller structures are implemented

in MATLAB, compared for best performance and run in the FPGA.

Index Terms: PID controller, I-PD controller, IMC controller, FPGA, Xilinx ISE 14.7 Design tools.

References:

[1] V.Rajinikanth and K.LathaI-PD Controller Tuning For Unstable System Using Bacterial Foraging

Algorithm:A Study Based On Various Error Criterion, Hindawi Publishing Corporation Applied

Computational Intelligence And Soft Computing Volume 2012, Article Id 329389, 10 Pages

Doi:10.1155/2012/329389.

[2] P.A. BalakrishnanOptimization Of I-PD Controller For A FOLIPID Model Using Particle Swarm

Intelligence, International Journal Of Computer Applications (0975 – 8887) Volume 43– No.9, April

2012.J.

[3] Morimasa Ogawa And Tohru Katayama A Robust Tuning Method For I-PD Controller Incorporating A

Constraint On Manipulated Variable, Trans. Of The Society Of Instrument And Control Engineers Vol.E-1,

No.1, 265/273 (2001).

[4] S J Suji Prasad Optimization Of I-PD Controller Parameters With Multi Objective Particle Swarm

Optimization, Journal Of Theoretical And Applied Information Technology 20th August 2014. Vol. 66

No.2.

[5] Gao, Ruiyao And O'dwyer, Aidan And Coyle, Eugene: A Non-Linear PID Controller For CSTR Using

196-200

Page 40: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Local Model Networks. Proceedings Of The IEEE 4th World Congress On Intelligent Control And

Automation (Wcica 2002), Shanghai, China, 10-14 June.

[6] A Nassirharand, N Hoq,H S TzouDesign Of Nonlinear PID Controllers Using System Step Response.

[7] Poonam M BaikarDesign Of PID Controller Based Information Collecting Robot In Agricultural Field

,International Journal Of Advanced Research In Electrical, Electronics And Instrumentation Engineering,

Vol. 3, Issue 8, August 2014.

[8] Meena S, Chitra K. A New approach of PID tuning for Nonlinear SISO system based on Particle Swarm

Optimization Techniques.International Journal of Applied engineering Research 2014;9(23):-21701-11.

[9] S.Meena ,K.Chitra, R.VijayAnand. Development of I-PD controller on Embedded platform. International

Conference on Signal Processing , Communication, Power and Embedded Sysytems. (Scopes- 2016).

[10] K.J. Astrom and B. Wittenmark, Computer Controlled Systems, Prentice Hall, New Jersery, USA, 1997.

[11] F. Krach, B. Frackelton, J. Carletta and R. Veillette,“FPGA-Based Implementation of Digital Control for a

Magnetic Bearing,” American Control Conference, Vol.2, pp. 10801085, June 2003.

[12] S.L. Jung, M.Y. Chang, J.Y. Jyang, L.C. Yeh, Y.Y. Tzou, “Design and Implementation of an FPGA-Based

Control IC for AC-Voltage Regulation,” IEEE Trans. on Power Electronics, Vol. 14, pp. 522-532, May

1999.

[13] S. Ferreira, F. Hafner, L.F Pereira, F. Moraes, “Design and Prototyping of Direct Torque Control of

Induction Motors in FPGAs,” IEEE Symposium on Integrated Circuits and Systems Design, pp. 105-110,

Sept. 2003.

[14] F. Ricci, H. Le-Huy, “An FPGA-Based Rapid Prototyping Platform For Variable-Speed Drives”, IEEE

Industrial Electronics Society Annual Conference, vol.2, pp. 1156-1161, Nov. 2002.

38.

Authors: D.Karthikeyan

Paper Title: Research on Metal Doped Zeolite As Catalyst To Reduce NOX Emission From Lean Burn Gasoline

Engines

Abstract— Lean burn gasoline direct injection (GDI) engines are the most preferred gasoline engines

because of their low fuel consumption and high thermal efficiency. However, these engines produce exhaust

gases that are particularly rich in oxygen and therefore the present three-way catalytic converter (TWC) is

not suitable for converting the generated NOX emission into Nitrogen gases. In this present work, a new

method of reducing Nitrogen Oxides emission in a gasoline engine is attempted by using an ordinary

oxidation catalyst together with a deNOX(zeolite-based) catalyst. In this work, Na-form of ZSM-5 zeolite was

used as a catalyst and cupric chloride (CuCl2) and ferric chloride (FeCl3) where used as transition metals.

Cu-ZSM5 and Fe-ZSM5 catalyst were prepared separately in our laboratory. Na+ ion exchange method is

used to prepare the catalyst. After that Cu-ZSM% and Fe- ZSM5 catalyst were washcoated separately onto

the blank monoliths. Oxidation monoliths ( for oxidation of CO and HC into CO2 and H2O) were purchased

directly from market. One oxidation monolith and one zeolite coated monolith were placed in a stainless steel

container and canned with inlet and outlet cones ( forming catalytic convertor ). Experiments were conducted

on a 2 cylinder Multi Point Port Fuel Injection engine along with a dynamometer. Exhaust emissions such as

NOX, CO, HC, O2, CO2 were measured with AVL Di-gas-444 Analyzer. Exhaust gas temperature is measured

with the use of a thermocouple. Firstly load tests (4, 7, 10, 13, and 16KW) were conducted on the engine

without catalytic convertor was fixed close to the outlet pipe and the test were conducted again with same

loading condition as mentioned above. Then by the same above procedure is followed to conduct test with Cu-

ZSM5 and Fe-ZSM5 catalytic convertors. From the results it is observed that both Cu and Fe zeolite catalyst

minimize emissions than the commercial catalytic converter.

Index Terms: catalytic converter, NOX reduction, oxidation catalyst, ZSM5 zeolite.

References:

[1] Venso Tomasic , “Application of the monoliths in DeNOX catalysis”, Catalysis Today 119, 2007, 106-113 .

[2] Venso Tomasic and Franjo Jovic. “State-of-the-art in the monolith catalyst/rectors.” Elsevier, Applied

Catalysis A: General 311, (2006): 112-121.

[3] Rajakrishnamoorthy.P, Elavarasan.G, Karthikeyan.D, Saravanan.C.G, (2019), “Emission reduction in SI

engine by using metal doped Cu-ZSM5 and Ce.Cu-ZSM5 zeolite as Catalyst”, International Journal of

Innovative Technology and Exploring Engineering, vol.(8), Issue(9), 1423-1427.

[4] Pratyush nag, B.B.Ghosh, Randip K.Das and Maya Dutta Gupta- NOx Reduction in SI Engine Exhaust

Using Selective Catalytic Reduction technique- SAE Paper980935.

[5] Randip K. Das, Souvik Bhattacharyya, B.B. Ghosh and Maya Dutta Gupta- “Development and

Performances Studies for SI Engine Emission Control”- SAE Paper 971652, 1997.

[6] Elavarasan, G., Rajakrishnamoorthy, P., Karthikeyan, D. and Saravanan, C.G. (2019).Utilization of Coal

Fly Ash as a Raw Material for the Synthesis of Zeolite like Substance. International Journal on Emerging

Technologies, 10(1): 176-182.

[7] Elavarasan, G., Kannan.M, Karthikeyan, D. (2019). “History of emisison standards in India – A critical

review”. International Journal of Research and Analytical Reviews, 6(2): 28-35.

[8] D.Karthikeyan, C.G.Saravanan-Experimental analysis of flyash based, ion-exchanged zeolite as catalyst for

S.I engine emission Control:Journal of KONES Powertrain and Transport, vol-20,no.3 2013.229-235.E

[9] D. Karthikeyan, C.G. Saravanan1 T.Jeyakumar2- Catalytic Reduction of S.I. Engine Emissions Using

201-206

Page 41: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Zeolite as Catalyst Synthesized From Coal Fly Ash- International Journal of Engineering and Technology

Volume 6 No.2, February, 2016.

[10] Bankim B Ghosh, Prokash chandra Roy, Mita Ghosh, Paritosh Bhattacharya, Rajasekhar Panua, Prasanta K

Santra- Control of SI Engine Exhaust emissions using non-precious catalyst (ZSM-5) supported bimetals

and noble metals as catalyst – ICE20051025.

[11] BB ghosh, PC Roy, PP Ghosh, MN Gupta, PK Santra, Control of SI Engine Exhaust emission using ZSM-5

supported Cu-Pt bimetals as catalyst,2002 – 01-2147.

[12] Ghosh B.B., Santra P.K., Ghosh P.P., Banerjee T., Ghosh A and Ramanujam.S – “ Catalytic Reduction of SI

Engine emissions using Cu- ION Exchange ZSM-5” – SAE PaperNo.2001-26-0013.

[13] Joseph R. Theis – “Selective Catalytic Reduction for Treating the NOx Emissions from Lean-Burn Gasoline

Engines: Performance Assessment” – SAE Paper No.2008- 01-0810.

[14] Joseph R. Theis – “Selective Catalytic Reduction for Treating the NOx Emissions from Lean-Burn Gasoline

Engines: Durability Assessment” – SAE Paper No.2008-01- 0811.

[15] Elavarasan. G, Thiagarajan. L, Kannan. M, Karthikeyan. D, “Finding the Lubrication oil properties of an

Internal Combustion Engine using a capacitive sensor”, International Journal of Engineering and Advanced

Technology (2019) vol.8(5).2368-2374.

[16] Juan M. Zumaro, Maria A.Ulla, Eduardo E. Miro – “Zeolite washcoating onto Cordierite honeycomb

reactors for environmental applications” – Chemical Engineering Journal 106(2005)25-33.

[17] Meille V (2006) Review on methods to deposit catalysts on structured surfaces Appl Catal A-Gen 315:1-17.

[18] Lisi L, R. Pirone, G. Russo, and V. Stanzione. “Cu-ZSM5 Based Monolith Reactors for NO

Decomposition.” Elsevier, Chemical Engineering Journal 154 (2009): 341-347.

[19] Qi Gongshin, Yuhe Wang, and Ralph T. Yang. “Selective Catalytic Reduction of Nitric Oxide with

Ammonia over ZSM-5 Based Catalyst for Diesel Engine Applications.” Springer 121 (2008):111-117.

[20] Metkar P.S, Nelson Salazar, Rachel Muncrief, Vemuri Balakotaiah, Michael P. Harold. “Selective Catalytic

Reduction of NO with NH3 on Iron Zeolite Monolithic Catalysts: Steady-state and Transient Kinetics.”

Elsevier, Applied in Catalysis.

[21] Ulla M.A, R. Mallada, J. Coronas, L. Gutierrez, E. Miro, J. Santamaria (2003), Synthesis and

characterization of ZSM-5 coatings on to cordierite honey comb supports, International Journal of Applied

Catalysis A: General, Vol.253, pp.257-269.

[22] Liu Zhiming, HAO Jiming, FU Lixin, LI Junhua and CUI Xiangyu (2004), Advances in catalytic removal of

NOx under lean-burn conditions, Chinese Science Bulletin, Vol.49(21), pp.2231-2241.

39.

Authors: R.Sangeetha, Dr.S.Sathappan

Paper Title: An Enhanced Classification Based Outlier Detection using Decision Tree for Multi class in Data

Stream

Abstract :Data Stream has continual, unbound, large and unstable records. The processing in data streams

involves extracting significantidea in primary data of the kind static and dynamic with one sweep. In streaming,

records are generated by thousands of data sources continuously and simultaneously. These data normally won’t

have common range. Some data will be deviated from the rest in terms of variant factors. These are considered

as outliers and it is tough to find those in data stream as they have multi dimensionality. Outliers, being the most

abnormal observations, may include the sample maximum or sample minimum. E-commerce is an application or

category of data stream that is generated from millions of sources at a time. It includes multiple products and

transactions. Some products are cancelled during transactions and some are infrequent and these are termed as

outliers. This paper focus on the challenge in E-Commerce and the objective is to aid the agencies in taking fine

decisions in right time by finding the outliers using supervised learning scheme. This work is carried out in two

phases. In first phase the outliers are detected and classified as cancelled and delivered products. In the second

phase the least transaction is found as an outlier by the enhanced methodology for multi-class classification. The

work is implemented in WEKA 3.9.6 and is compared with the existing works with evaluation metrics.

Index terms: DataStream, Outlier, Decision Tree, Random Correction Code, Log loss.

References:

[1] Anurag Bejju, “ Sales Analysis of E-CommerceWebsites using Data Mining Techniques”, International

Journal of Computer Applications (0975 – 8887) Volume 133, No.5, January 2016.

[2] Cao Lijun 1 , Liu Xiyin 2 , Zhou Tiejun 1 , Zhang Zhongping 3, Liu Aiyong, “A Data Stream Outlier

Delection Algorithm Based On Reverse K Nearest Neighbors”, 2010 International Symposium on

Computational Intelligence and Design IEEE.

[3] DASH, M., & LIU, H (1997) Feature selection for classification. Intelligent Data Analysis, 131- 156.

[4] Ding Xiang-wu and Wang Bin, "An Improved Pre-pruning Algorithm Based on ID3,"

JisuanjiYuxiandaihua,Vol.9, pp. 47,2008.

[5] Han, Jiawei, Micheline Kamber, and Jian Pei. “Data mining: concepts and techniques”, Morgankaufmann,

2006.

[6] Kurian M.J and Gladston Raj S,(2015) ” Outlier Detection in Multidimensional Cancer Data Using

Classification Based approach “ International Journal of Applied Engineering Research ,Vol.10, No.79,pp.

342-348 , 2015.

[7] Kurian M.J., Gladston Raj S., PhD, “ An Analysis on the Performance of a Classification based Outlier

207-213

Page 42: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Detection System using Feature Selection”, International Journal of Computer Applications”, Volume 132 –

No.8, December2015 .

[8] Mani Mehrotra1, Nakul Joshi, “Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0”,

The International Journal of Engineering and Science (IJES) Volume 6, Issue 5, PP 77-81, 2017.

[9] Quinlan J. R. (1986). “Induction of decision trees. Machine Learning,” Vol.1-1, pp. 81-106.

[10] Rutkowski, L. Pietruczuk, P. Duda, and M. Jaworski,z“Decision Trees for Mining Data Streams Based on

the McDiarmid’s Bound,” IEEE Trans. Knowledge and Data Eng., vol. 25, no. 6, pp. 1272- 1279, 2013.

[11] Sanizahahmed, Norazon Mohamed Ramli, Habshah midi, , “Outlier detection in logistic regression and its

application in medical data analysis”, in: 2012 IEEE colloquium on humanities, science and engineering.

[12] Somkidamornsamankul, jairajpromrak, pawalaikraipeerapun, “solving multiclass classification problems

using combining complementary neural networks and error-correcting output codes”, international journal

of mathematics and computers in simulation, issue 3, volume 5, 2011.

[13] Victoria J. Hodge and Jim Austin, “An Evaluation of Classification and Outlier Detection Algorithms”,

archive.org, 2018.

[14] https://towardsdatascience.com/understanding-binary-cross-entropy-log-loss-a-visual-explanation.

[15] https://en.wikipedia.org/wiki/Hamming_distance.

40.

Authors: Shakkeera L , Saranya A,Sharmasth Vali Y

Paper Title: Secure Collaborative Key Management System for Mobile Cloud Data Storage

Abstract: Mobile Cloud Computing (MCC) is the combination of mobile computing, cloud computing and

wireless networks to make mobile thin client devices resource-rich in terms of storage, memory computational

power and battery power by remotely executing the wide range of mobile application’s data in a pay-per-use

cloud computing environment. In MCC, one of the primary concern is the security and privacy of data stored in

cloud. The existing techniques are not efficient to manage secret keys during key generation and key distribution

processes. The objective of this project work is to develop a secure collaborative key management system

(SCKMS) for mobile cloud data storage by implementing by the cryptographic techniques for file encryption

and file decryption, key generation, key encryption, key distribution and key decryption processes. In our

proposed methodology, DriverHQ public cloud infrastructure is used for accessing the secure file as Storage as a

Service (SaaS) mechanism. For generating the secret key, the proposed work implemented with Pseudo Random

Number Generator (PRNG) algorithm, it produces the sequence of random numbers for every time. The keys are

distributed using general Secret key Sharing Scheme (SSS). The key pattern matching process is implemented to

spilt the secret key into three partitions and sent it to client (mobile devices), cloud server and decryption server.

The decryption server key and cloud sever key are mapped with client key. The key shares are grouped together

using key-lock pair mechanism and it achieves key integrity during untrusted medium communication. The

proposed work also eliminates key escrow and key exposure problems. The files are encrypted and decrypted

using Rivest-Shamir-Adleman (RSA) algorithm. The RSA algorithm is more vulnerable against the brute force

attack, because of using larger key size. Thus, the proposed SCKMS achieves data confidentiality and data

integrity in mobile cloud storage data when compared to existing Key Management System (KMS). The work

also reduces encryption & decryption computation and storage overhead in client mobile devices, and minimizes

the energy consumption of the mobile devices efficiently.

Index Terms: Mobile Cloud Computing; Key Management; Secret Sharing Scheme; Pattern Matching.

References:

[1] Hlatshwayo M, and Tranos Zuva, “Mobile Public Cloud Computing, Merits and Open Issues”, International

Conference on Advances in Computing and Communication Engineering (ICACCE), 2016.

[2] Santosh Kumar, and Gouda R H, “Cloud Computing – Research Issues, Challenges, Architecture, Platforms

and Applications: A Survey “, International Journal of Future Computer and Communication, Vol. 1, No. 4,

December 2012.

[3] Masoud Nosrati, Ronak Karimi H, “Mobile Computing: Principles, Devices and Operating Systems”, World

Applied Programming, Vol .2, No. 7, 2014.

[4] Jia, and Cong Wang, “Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates”, IEEE

Transactions on Information Forensics and Security, Vol. 11, No. 6, 2016.

[5] Pratima Popat Gutai, Rutuja S Kothe, and Jahveri S B, “Efficient Hierarchical Cloud Storage Data Access

Structure with KDC”, IEEE International Conference in Electronics, Communication and Computer

Technology (ICAECCT), 2016.

[6] Sikhar Patranabis, Yash Shrivastava, “Provably Secure Key-Aggregate Cryptosystems with Broadcast

Aggregate Keys for Online Data Sharing on the Cloud”, Vol. 66, No. 5, 2017.

[7] Yuqi Wang, and Kun She, “A Practical Quantum Public-key Encryption Model”, Third International

Conference on Information Management (ICIM), 2017.

[8] TalariBhanu Teja, Vootla Hemalatha, and Priyanka K, “Encryption And Decryption – Data Security For

Cloud Computing – Using AES Algorithm”, SSRG International Journal of Computer Trends and

Technology (IJCTT) - Special Issue, April 2017.

[9] Mahesh Kumar K M, and Sunitha N R, “Hybrid Cryptographically Secure Pseudo-Random Bit Generator”,

Second International Conference on Contemporary Computing and Informatics (IC3I), 2016.

[10] Nasrollah Pakniat, Mahnaz Noroozi, and Ziba Eslami, “Distributed Key Generation Protocol with

214-225

Page 43: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Hierarchical Threshold Access Structure”, IET Information Security, Vol. 9, No. 4, 2015

[11] Preeti Garg, and Vineet Sharma, “An Efficient and Secure Data Storage in Mobile Cloud Computing through

RSA and Hash Function”, International Conference on Issues and Challenges in Intelligent Computing

Techniques (ICICT), 2014

[12] Prasoon Raghav, Rahul Kumar, and Rajat Parashar, “Securing Data in Cloud Using AES Algorithm”,

International Journal of Engineering Science and Computing, Vol. 6, No. 4, 2016

[13] Zheng Yan, Xueyun Li, Mingjun Wang, and Athanasios V Vasilakos, Senior Member, Vasilakos, “Flexible

Data Access Control Based on Trust and Reputation in Cloud Computing”, IEEE Transactions on Cloud

Computing, Vol. 5, No. 3, 2017

[14] Giwon Lee, Haneul Ko, and Sangheon Pack, “An Efficient Delta Synchronization Algorithm for Mobile

Cloud Storage Applications”, IEEE Transactions on Services Computing, Vol. 10, No 3, 2017.

[15] Guanlin Wu, Junjie Chen, Weidong Bao, Xiaomin Zhu, Wenhua Xiao, Ji Wang, and Ling Liu,

“Collaborative Storage Algorithm Based on Alternating Direction Method of Multipliers on Mobile Edge

Cloud”, IEEE International Conference on Edge Computing (EDGE), 2017

[16] Debiao He, Neeraj Kumar, Mohammad Khurram Khan, Lina Wang, and Jian Shen, “Efficient Privacy-Aware

Authentication Scheme for Mobile Cloud Computing Services”, IEEE System Journal, Vol. 12, No. 2, 2018.

[7] K. Vijayakumar and V. Govindaraj, “An Efficient Communication Technique for Extrication and Cloning of

packets on cloud”, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.66

May 2015

41.

Authors: A.Chinnasamy., P.Selvakumari, V.Pandimurugan

Paper Title: Vehicular Adhoc Network Based Location Routing Protocol For Secured Energy

Abstract: ALERT chiefly uses irregular message routing copy to supply namelessness protection.

The projected protocol provides the ALERT routing high namelessness protection,

EALERT additionally dynamically partitions a network field into zones and haphazardly chooses nodes in

zones as intermediate relay nodes, that Anon-traceable anonymous route. It then haphazardly chooses a

node inside the choice zone as a result of subsequent relay node and uses the EGPSR formula as a variant

of GPSR in awake to send the information to the relay node. Within the last step, the information is

broadcasted to k nodes at intervals the destination zone, providing k-anonymity to the destination. In addition,

the protocol contains a method to hide the information instigator among sort of initiators to strengthen the k-

anonymity protection of the provision. The projected Energy aware ALERT detects the Sybil attack within

the network, Routing protocol, geographical routing.

Index Terms:: Vehicular ad hoc networks, anonymity, routing protocol, geographical routing.

References:

[1] B. Karp and H. Kung,. “GPSR: Greedy Perimeter Stateless routingfor Wireless Networks” in: Proceedings

of ACM MobiCom, 2000,pp. 243–254

[2] yih-Chun Hu David B. Johnson, “Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc

Networks,” in Proc.IEEE Workshop on Mobile Computing Systems and Application, 2002.

[3] Xiaoxin Wu and Bharat Bhargava “Ad HocOn-Demand Position-BasedPrivate Routing Protocol” in Proc.

IEEE Transactionson Mobile Computing, 2005.

[4] Zhou Zhi and Yow Kin Choong “Anonymizing Geographic Ad Hoc Routing for Preserving Location

Privacy” in Proc IEEE Transactions.2005.

[5] VivekPathak and Danfeng Yao “Securing Location Aware Services Over VANET UsingGeographical

Secure Path Routing” IEEE Trans. Veh. Technol., 2008.

[6] [6]LanjunDang andjixeu ,“Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad

Hoc Networks” in Proc.IEEE Transactions.2010.

[7] ElaheSheklabadi, and Mehdi Berenjkou“An Anonymous Secure Routing Protocol for MobileAd Hoc

Networks” in Proc. IEEEInternational Symposium on Computer Networks and Distributed Systems .2011

[8] Tong Zhou, Romit Roy Choudhur “Sybil Attacks Detection in VehicularAd Hoc Networks” in Proc. IEEE

Journal on Selected Areas In Communications, VOL. 29, NO. 3, 2011

[9] Karim El Defrawy “ALARM: Anonymous Location-Aided

[10] Routing in Suspicious MANETs” in proc IEEE Transactions On Mobile Computing, VOL. 10, NO. 9, 2011

[11] Rui Jiang and Yuan Xing “Anonymous On-demand Routing and Secure Checking of Traffic Forwarding for

Mobile Ad Hoc Networks”31st International Symposium on Reliable Distributed Systems 2012.

[12] Haiying Shen and Lianyu Zhao“ALERT: An Anonymous Location-BasedEfficient Routing Protocol in

MANETs” in Proc.

[13] IEEE transactions on mobile computing, vol. 12, no. 6, 2013

SohailAbbas,MadjidMerabti“Lightweight Sybil Attack Detection in MANETs” in Proc. IEEE systems

journal, vol. 7, no. 2, 2013.

Kuen-Han Li Jenq-ShiouLeu “Ant-based On-demand Clustering Routing Protocolfor Mobile Ad-hoc

226-231

Page 44: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Networks,”Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous

Computing 2013.

[14] Kim KyuSeok and NavratiSaxena “Analysis of a Novel Advanced Greedy Perimeter Stateless Routing

Algorithm” in proc IEEE transaction 2013

[15] Seryvuth Tan and Keecheon Kim “Secure Route Discovery for Preventing Black Hole Attacks on AODV-

based MANETs “ In procIEEE International Conference on Embedded and Ubiquitous Computing 2013

[16] BehnamHassanabadi and ShahrokhValaee “Reliable Periodic Safety Message Broadcasting in VANETs

Using Network Coding” In proc IEEE transactions on wireless communications, vol. 13, no. 3, 2014

[17] Wei Liu and Ming Yu “AASR: Authenticated Anonymous Secure Routingfor MANETs in Adversarial

Environments,”IEEE transactions on vehicular technology, vol. 63, no. 9, November 2014.

[18] K.Vijayakumar·C,Arun,Continuous security assessment of cloud based applications using distributed

hashing algorithm in SDLC,Cluster Computing DOI 10.1007/s10586-017-1176-x,Sept 2017

[19] K.Vijayakumar·C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise

applications”, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017

[20] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development

environments,J Ambient Intell Human Computing,DOI 10.1007/s12652-017-0503-7,Springer May 2017.

Authors: M.Kiruthiga Devi, R.Kaviya

Paper Title: Vital Symptoms Monitoring And Classification Of Bipolar Disorder

Abstract: Bipolar disorder is a mental illness that puts patients into extreme states of mind known as mania and

depression. These mental states are very harmful to the lives of the patients as their day to day actions are

disrupted. This project aims at identifying the symptoms of the patients who have extreme moods to determine if

they are bipolar using sensors and smart phones. Patients with mental illness tend to exhibit symptoms like

reduced physical activity, changes in mood, drastic changes in sleep pattern, inability to cope with stress and

withdrawn from socializing. These changes can be monitored using sensors and the data collected is compared

with the data collected from healthy individuals. A classification algorithm is applied to the data collected to

classify the symptoms and detect if the person has bipolar disorder or is just showing subtle signs of mood

swings.

Key Words: Bipolar disorder, Random forest classification, Neural network, DDMLP, Machine learning.

References:

[1] Enrique Garcia Ceja, Michael Alexander Riegler,PetterJackobsen, T.Nordgreen “Motor activity based

classification of depression in unipolar and bipolar patients” IEEExplore International Conference,July

2018 .doi:10.1109/CBMS.2018.00062

[2] Wouter B. Teeuw, Johan Koolwaaij, Arjan Peddemors “Monitoring human behaviour through mobile

technology”,October 2018,MDPI journel,doi:10.3390/proceedings2191243

[3] Sara Mariani, Matteo Migliorini, Giulia Tacchino, Claudio Gentili “Clinical state assessment in bipolar

patients by means of HRV features obtained with a sensorized T-shirt ”, August 2018,doi:

10.1109/EMBC.2012.6346408

[4] Maria Faurholt-jepsen,maj Vinberg,mads Frost,sune Debel,ellen Margrethe Christensen,jakob E Bardram

“Behavioral activities collected through smartphones and the association with illness activity in bipolar

disorder”,April 2016. doi: 10.1002/mpr.1502.

[5] A. Maxhuni, A. Munoz-Mel endez, V. Osmani, H. Perez, O. Mayora, and E. F. Morales “Classification of

bipolar disorder episodes based on analysis of voice and motor activity of patients”,Volume 31 Issue C,

September 2016.doi:10.1016/j.pmcj.2016.01.008.

[6] A Liaw, M Weiner “Classification and regression by random forest”,R news, Vol. 2/3, December 2002.

[7] C. Burton, B. McKinstry, A.S.T̆atar, A. Serrano-Blanco, C. Pagliari, and M. Wolters, “Activity monitoring

in patients with depression: a systematic review,” Journal of affective disorders, vol. 145, no. 1, 2013.

[8] “Development and Validation of a Screening Instrument for Bipolar Spectrum Disorder: The Mood

Disorder Questionnaire” Robert M.A. Hirschfeld , M.D., Janet B.W. Williams, The American Journal of

Psychiatry, Nov 2000.

[9] “Random Forest:  A Classification and Regression Tool for Compound Classification and QSAR Modeling”

Vladimir Svetnik, Andy Liaw, Journal of chemical information and modelling, Nov 2003.

[10] “Automate the Internet With If This Then That (IFTTT)”, Steven Ovadia, Behavioural and Social Sciences

Librarian, 2014. K. Vijayakumar and C. Arun, “A Survey on Assessment of Risks in Cloud Migration”,

International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.66 May 2015.

[11] K. Vijayakumar and C. Arun, “Continuous Security Assessment of Applications in Cloud Environment”,

Page 45: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

International Journal of Control Theory and Applications, ISSN: 0974-5645 volume No. 9(36), Sep 2016,

Page No. 533-541.

[12] R.Joseph Manoj, M.D.Anto Praveena, K.Vijayakumar, “An ACO–ANN based feature selection algorithm

for big data”, Cluster Computing The Journal of Networks, Software Tools and Applications, ISSN: 1386-

7857 (Print), 1573-7543 (Online) DOI: 10.1007/s10586-018-2550-z, 2018.

42.

Authors: S.Hemavathi, K.Jayasakthi Velmurugan

Paper Title: Segmentation Of Affected Crops Using Deep Learning

Abstract - Deep Learning technology can accurately predict the presence of diseases and pests in the

agricultural farms. Upon this Machine learning algorithm, we can even predict accurately the chance of any

disease and pest attacks in future For spraying the correct amount of fertilizer/pesticide to elimate host, the

normal human monitoring system unable to predict accurately the total amount and ardent of pest and disease

attack in farm. At the specified target area the artificial percepton tells the value accurately and give corrective

measure and amount of fertilizers/ pesticides to be sprayed.

Index Terms – deep learning, perception, host

References:

[1] E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas

Propagat., to be published.

[2] M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.

[3] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media

and plastic substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2,

[4] B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

[5] M. Suresh Anand, N.Mohankumar,A.Kumaresan,"Developing Indian Sign Language Recognition System for

Recognizing English Alphabets with Hybrid Classification Approach",Indian Journal of Public Health

Research & Development, Volume 9, Issue no. 2, Feb 2018

[6] J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays” IEEE J. Quantum Electron., submitted for

publication.

[7] G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in

Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.

[8] C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

[9] H. Poor, An Introduction to Signal Detection and EstimationW.-K. Chen, Linear Networks and Systems

(Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.

232-234

43.

Authors: A. Sangeerani Devi, Sonia Prakash, K. Laavanya, A.Shali, D.Sathish Kumar

Paper Title: Violence Detection and Target Finding Using Computer Vision

Abstract: Recognizing savagery in recordings through CCTV is basic for requirement and investigation of

reconnaissance cameras with the plan of keeping up open wellbeing. Moreover, it will be an incredible device

for securing kids and help guardians settles on a superior educated choice about their children. However, this can

be a difficult drawback since detecting certain nuances with no human administration isn't entirely technical

however also a conceptual problem.So, our idea is to use computer vision to develop an automated technique in

detecting the violent behavior/street crime criminals through surveillance cameras installed in cities and towns.

When the surveillance cameras detect the abnormal behavior, it captures the scene and generates an alert by

sending the captured image to the nearby police station. Further, the CCTV cameras using Cloud trigger the

near-by cameras to track the particular target and its location.

Keywords: ViolenceDetection, Surveillance Cameras, Capture, Trigger,Google Cloud.

References:

[1] Febin I P, Jayasree K ,“A Survey of Computer Vision Based Methods for Violent Action Representation and

Recognition”.

[2] Mike Haldas ,“Send Security Camera Photos From Raspberry Pi Via Mms Text Message”.

[3] Malavika Nair, Mathew Gillroy, Neethu Jose, Jasmy Davies, “I-Surveillance Crime Monitoring and

Prevention Using Neural Networks”.

[4] Peipei Zhou ,Qinghai Ding, Haibo Luo,Xinglin Hou,“Violence Detection in Surveillance Video Using Low-

235-238

Page 46: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Level Features”.

[5] E. Bermejo , O. Deniz , G. Bueno and R. Sukthankar,“Violence Detection in Video Using Computer Vision

Techniques”.

[6] Q. Dai, J. Tu, Z. Shi, Y.-G. Jiang, and X. Xue., “Violent Scenes Detection Using Motion Features and Part-

Level Attributes”.

[7] Daniel Moreira, Sandra Avila, Mauricio Perez, Daniel Moraes, ” Temporal Robust Features for Violence

Detection”.

[8] A. Datta, M. Shah, and N. da Vitoria Lobo, ” Person-on-person violence detection in video data.”.

[9] F. D. M. de Souza, G. C. Chavez, E. do Valle, D. A. Araujo, “Violence detection in video using spatio-

temporal features“.

[10] M. Suresh Anand, M. Balamurugan,"Sugar Level Detection Using Thermal Images",International Journal of

Engineering & Technology, Volume 7, Issue no. 4.39, Dec 2018

[11] T. Hassner, Y. Itcher, and O. Kliper-Gross, “Violent flows: Real-time detection of violent crowd behaviour.“

[12] R. Mehran, A. Oyama, and M. Shah, “Abnormal crowd behaviour detection using social force model. “.

[13] H. Mousavi, S. Mohammadi, A. Perina, R. Chellali, and V. Murino, “Analysing tracklets for the detection of

abnormal crowd behaviour”.

[14] K. Vijayakumar and C. Arun, “Continuous Security Assessment of Applications in Cloud Environment”,

International Journal of Control Theory and Applications, ISSN: 0974-5645 volume No. 9(36), Sep 2016,

Page No. 533-541.

[15] R.Joseph Manoj, M.D.Anto Praveena, K.Vijayakumar, “An ACO–ANN based feature selection algorithm

for big data”, Cluster Computing The Journal of Networks, Software Tools and Applications, ISSN: 1386-

7857 (Print), 1573-7543 (Online) DOI: 10.1007/s10586-018-2550-z, 2018.

[16] K. Vijayakumar and V. Govindaraj, “An Efficient Communication Technique for Extrication and Cloning

of packets on cloud”, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10

No.66 May 2015

44.

Authors: Haripriya P, Porkodi R

Paper Title: An Enhanced Framework for Content Based Medical Image Retrieval Using Deep Neural Network

Abstract: As the technology growth fuelled by low cost tech in the areas of compute, storage the need for

faster retrieval and processing of data is becoming paramount for organizations. The medical domain

predominantly for medical image processing with large size is critical for making life critical decisions.

Healthcare community relies upon technologies for faster and accurate retrieval of images. Traditional, existing

problem of efficient and similar medical image retrieval from huge image repository are reduced by Content

Based Image Retrieval (CBIR) . The major challenging is an semantic gap in CBIR system among low and high

level image features. This paper proposed, enhanced framework for content based medical image retrieval using

DNN to overcome the semantic gap problem. It is outlines the steps which can be leveraged to search the

historic medical image repository with the help of image features to retrieve closely relevant historic image for

faster decision making from huge volume of database. The proposed system is assessed by inquisitive amount of

images and the performance efficiency is calculated by precision and recall evaluation metrics. Experimental

results obtained the retrieval accuracy is 79% based on precision and recall and this approach is preformed very

effectively for image retrieval performance.

Keywords: CBIR, DICOM, DNN, Semantic gap

References:

[1] Amol Bhagat, M. A. (2013). DICOM Image Retrieval Using Novel Geometric Moments and Image

Segmentation Algorithm . International Journal of Advanced Computer Research, 37-46.

[2] S.Malar Selvi1 and Mrs.C.Kavitha,, Content Based Medical Image Retrieval System (CBMIRS) Using

Patch Based Representation, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-

ISSN: 2278-8727 PP 24-36

[3] Arvind Nagathan, M. I. (July 2013). Content-Based Image Retrieval System using Feed-Forward

Backpropagation Neural Network. International Journal of Computer Science Engineering (IJCSE), 2, 143-

151.

[4] Ceyhun Burak Akgül, D. L. (2010). Content-Based Image Retrieval in Radiology: Current Status and Future

Directions. Journal of Digital Imaging, 208-222.

[5] M. Flickner, H. S. (1995). Query by image and video content: the QBIC system. Computer, 28(9), 23-32.

[6] W. Dean Bidgood, J. M. (1997). Understanding and Using DICOM, the Data Interchange Standard for

Biomedical Imaging. Journal of American Medical Informatics Association, 199–212.

[7] Ziegler, S. E. (2012). Development of a Next-Generation Automated DICOM Processing System in a

PACS-Less Research Environment. Journal of Digital Imaging, 25(5), 670-677. Retrieved 12 25, 2018,

from https://link.springer.com/article/10.1007/s10278-012-9482-6

[8] Gunjanbhai Patel, DICOM Medical Image Management the challenges and solutions: Cloud as a Service

(CaaS), IEEE Third International Conference on Computing, Communication and Networking

Technologies (ICCCNT'12), Coimbatore, 2012, pp. 1-5.2012, DOI: 10.1109/ICCCNT.2012.6396083

[9] B. K. Sahu and R. Verma, "DICOM search in medical image archive solution e-Sushrut Chhavi," IEEE

239-244

Page 47: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

2011 3rd International Conference on Electronics Computer Technology, Kanyakumari,2011, pp. 256-

260.doi: 10.1109/ICECTECH.2011.5942093

[10] Alexandra La Cruz, Alexander Baranya, Maria-Esther Vidal, Medical Image Rendering and Description

Driven by Semantic Annotations, Springer Berlin Heidelberg, Resource Discovery, 2013, pp.123-149

[11] Adnan Qayyum, 2a*Syed Muhammad Anwar, 3bMuhammad Awais, 1aMuhammad Majid, “Medical Image

Retrieval using Deep Convolutional Neural Network”, Elsiver, 2017

[12] Alexander Selvikvåg Lundervold, Arvid Lundervold , An overview of deep learning in medical imaging

focusing on MRI, Computer Vision and Pattern Recognition, 2018

[13] Kim, P. (2017). MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial

Intelligence(1st ed.). Berkely, CA, USA: Apress.

[14] Zaharchuk, G., Gong, E., Wintermark, M., Rubin, D., & Langlotz, C. P. (2018). Deep Learning in

Neuroradiology. American Journal of Neuroradiology. https://doi.org/10.3174/ajnr.A5543

[15] S. . Khan and S. . Khan, "An Efficient Content based Image Retrieval: CBIR," International Journal of

Computer Applications, vol. 152, no. 6, pp. 33-37, 2016

[16] R. Joseph Manoj1 • M. D. Anto Praveena2 • K. Vijayakumar, An ACO–ANN based feature selection

algorithm for big data, Cluster Computing , Springer, https://doi.org/10.1007/s10586-018-2550

[17] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development

environments,J Ambient Intell Human Computing,DOI 10.1007/s12652-017-0503-7,Springer May 2017.

[18] K. Vijayakumar, Arun C, “Integrated cloud-based risk assessment model for continuous integration”,

International Journal Reasoning-based Intelligent Systems, Vol. 10, Nos. 3/4, 2018.

[19] K. Vijayakumar, S. Suchitra and P. Swathi Shri, "A secured cloud storage auditing with empirical

outsourcing of key updates", International Journal Reasoning-based Intelligent Systems, Vol. 11, No. 2,

2019

45.

Authors: G. Suganya, R. Porkodi

Paper Title: Design of A Rule Based Bio Medical Entity Extractor

Abstract: The field of Biomedical Entity Extraction / Identification plays a vital role in Bioinformatics and

rapidly growing to meet the needs of different text mining tasks. Many biomedical entity extraction tools have

been developed so far. This research work has focused to develop a Rule based Biomedical Entity Extraction

and tested with PubMed Medline abstracts of Colon cancer and Alzheimer disease categories. The proposed

Biomedical Entity Extractor gives promising result when compared with existing tools. The proposed method is

incorporating of two phases such as preprocessing the input text document using NLP techniques and create the

rules to find out the biomedical entities using regular expression. The results of Rule based Biomedical Entity

Extractor are validated with the well-known Biomedical Genia tagger and Genecards Database. The method

proposed in this paper almost good as genia tagger. The evaluation results on Colon cancer and Alzheimer

disease abstracts corpus of Biomedical Entity Extraction achieve an accuracy of 92% and 88% respectively

which identifies more number of entities compared to other existing tools.

Index Term: Medline Abstracts, Genia tagger, Pubtator, BCC-NER, Biomedical text mining

References:

[1] Sakthi Murugan R, P. Shanthi Bala, G. Aghila, “Ontology based information retrieval- an analysis”,

International journal of advanced research in computer science and software engineering, Vol 3, Issue 10,

pp 486-493, 2013.

[2] Saurav Sahay, Baoli Li, ernesst V.Garcia, Eugene Agichtein, Ashwin ram, “ Domain ontology construction

from biomedical text”, International Conference on Artificial Intelligence (ICAI’07), Las Vegas, Nevada,

USA, 2007.

[3] Aarti Singh, Poonam Anand, “Automatic domain ontology construction mechanism”, IEEE Recent

Advances in Intelligent Computational Systems (RAICS) pp 304-309, 2013.

[4] Annalakshmi V, Bhuvaneswari V, Aruna L, “Dictionary Based Approaches in Protein Name Recognition”,

International Research Journal of Engineering and Technology (IRJET), Vol 04, Issue 02, Feb -2017, pp 94-

98, 2014.

[5] [5]. Burr Settles, “ABNER: an open source tool for automatically tagging genes, proteins and other entity

names in text”, Bioinformatics, Vol 21, Issue 14, pp 3191–3192, 2005.

[6] Gurusamy Murugesan, Sabenabanu Abdulkadhar , Balu Bhasuran and Jeyakumar Natarajan, “BCC-NER:

bidirectional, contextual clues named entity tagger for gene/protein mention recognition”, EURASIP

Journal on Bioinformatics and systems biology, Vol 7, pp 1-8, 2017.

[7] Raja K, Subramani S, Natarajan J. “A hybrid named entity tagger for tagging human proteins/genes”,

International Journal of Data Mining Bioinformatics, Vol 10, Issue 3, 2014.

[8] Robert Leaman , Graciela Gonzalez , “Banner: An Executable Survey of Advances in Biomedical Named

Entity Recognition “, Pacific Symposium on Biocomputing, Vol 13, pp 652-663, 2008.

245-249

Page 48: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[9] D Campos, s Matos, JL Oliveira, “Gimli:open source and high-performance biomedical name recognition”,

BMC Bioinformatics, 14, 2013.

[10] Chih-Hsuan Wei, Hung-Yu Kao, and Zhiyong Lu “GNormPlus: An Integrative Approach for Tagging

Genes, Gene Families, and Protein Domains”, BioMed Research International

Vol 1, 2015.

[11] C-H Wei, R Leaman, Z Lu, “SimConcept: A Hybrid Approach for Simplifying Composite Named Entities

in Biomedicine”, Proceedings of the ACM Conference on Bioinformatics Computational Biology and

Health Informatics, Newport Beach, CA, p138-146, 2014.

[12] Sohn S., Comeau D.C., Kim W., “Abbreviation definition identification based on automatic precision

estimates”, BMC Bioinformatics, 9, 402, 2008.

[13] R Porkodi and B L Shivakumar, “Design and Development of Integrated Biomedical ontology for

information extraction from Medline abstract”, International Journal of Engineering Research and

Development, Vol 1, Issue 11, pp 01-10, July 2012.

[14] Xu Wang, Chen Yang, Renchu Guan, “A Comparative study for biomedical named entity recognition”,

International Journal of Machine Learning and Cybersecurity, Sep 2015.

[15] Tsuruoka Y, “GENIA tagger: Part-of-speech tagging, shallow parsing, and named entity recognition for

biomedical text”, 2006.

[16] J D Kim, T Ohta, Y Tateisi and Tsujii, “GENIA corpus- a semantically annotated corpus for bio-

textmining”, Bioinformatics, Vol 19, Suppl 1,2003.

[17] Chih-Husan Wei, Hung-Yu Kao and Zhiyong Lu, “Pubtator: a web-based text mining tool for assisting

biocuration”, Nucleic Acids Research, Vol 41, 2013.

46.

Authors: Nandhini K, Porkodi R

Paper Title: The Novel Gravitational Mass Weighted PCA Technique for Feature Extraction in Hyperspectral

Data Classification

Abstract: Recent advancements in the imaging spectrometer collect both spatial and spectral information which

creates a huge dimensionality. The heavy spectral information creates to build a classifier for discerning between

the materials in the scene. The minimum number of training labels always in an exchange between the spectral

information and the performance is called the Hughes effect. Also the redundant of spectral information and

noisy data presents in the hyperspectral scene. The above issues are overcome using feature extraction and

feature selection methods which play a major role in the reduction of dimensionality. This paper proposes the

novel fusion Gravitational Mass Weighted Principal Component Analysis (GMWPCA) techniques for

hyperspectral data dimensionality. Also, this paper presents the deep insight about the feature extraction

techniques in hyperspectral data of both supervised and unsupervised learning methods and experimental

analysis in AVIRIS Indian Pines hyperspectral dataset by employing PCA, Probability PCA, LDA, and proposed

techniques. The 93.63 % high accuracy achieved by using a novel proposed method.

Index Terms: Feature Extraction, Gravitational search algorithm, Gravitational weighted Mass PCA,

Hyperspectral data, PCA

References:

[1] Imani, Maryam, and Hassan Ghassemian. "Binary coding based feature extraction in remote sensing high

dimensional data." Information Sciences 342 (2016): 191-208.

[2] Alakkari, Salaheddin, and John Dingliana. "Principal Component Analysis Techniques for Visualization of

Volumetric Data." Advances in Principal Component Analysis. Springer, Singapore, 2018. 99-120.

[3] “Principal Component Analysis”,

http://kiwi.bridgeport.edu/cpeg540/PrincipalComponentAnalysis_Tutorial.pdf.

[4] Rodarmel, Craig, and Jie Shan. "Principal component analysis for hyperspectral image

classification." Surveying and Land Information Science 62.2 (2002): 115-122.

[5] Kasai, Mai. "In Vivo Tumor Spatial Classification using PCA and K-Means with NIR-Hyperspectral

Data." Journal of Biomedical Engineering and Medical Imaging 3.1 (2016): 45.

[6] Farrell, Michael D., and Russell M. Mersereau. "On the impact of PCA dimension reduction for

hyperspectral detection of difficult targets." IEEE Geoscience and Remote Sensing Letters 2.2 (2005): 192-

195.

[7] Licciardi, Giorgio, et al. "Linear versus nonlinear PCA for the classification of hyperspectral data based on

the extended morphological profiles." IEEE Geoscience and Remote Sensing Letters 9.3 (2012): 447-451.

[8] Ghamisi, Pedram, et al. "Hyperspectral data classification using extended extinction profiles." IEEE

Geoscience and Remote Sensing Letters 13.11 (2016): 1641-1645.

[9] Kang, Xudong, et al. "PCA-based edge-preserving features for hyperspectral image classification." IEEE

Transactions on Geoscience and Remote Sensing 55.12 (2017): 7140-7151.

[10] Lazcano, Raquel, et al. "Porting a PCA-based hyperspectral image dimensionality reduction algorithm for

brain cancer detection on a many-core architecture."Journal of Systems Architecture 77 (2017): 101-111.

[11] Báscones, Daniel, Carlos González, and Daniel Mozos. "Hyperspectral Image Compression Using Vector

Quantization, PCA and JPEG2000." Remote Sensing 10.6 (2018): 907.

[12] Pozo, Francesc, and Yolanda Vidal. "Damage and fault detection of structures using principal component

250-255

Page 49: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

analysis and hypothesis testing." Advances in Principal Component Analysis. Springer, Singapore, 2018.

137-191.

[13] Deville, Yannick, et al. "Application and Extension of PCA Concepts to Blind Unmixing of Hyperspectral

Data with Intra-class Variability." Advances in Principal Component Analysis. Springer, Singapore, 2018.

225-252.

[14] Nascimento, José MP, and Jose MB Dias. "Does independent component analysis play a role in unmixing

hyperspectral data?." IEEE Transactions on Geoscience and Remote Sensing 43.1 (2005): 175-187.

[15] Bayliss, Jessica D., J. Anthony Gualtieri, and Robert F. Cromp. "Analyzing hyperspectral data with

independent component analysis." 26th AIPR Workshop: Exploiting New Image Sources and Sensors. Vol.

3240. International Society for Optics and Photonics, 1998.

[16] Villa, Alberto, et al. "On the use of ICA for hyperspectral image analysis." Geoscience and Remote Sensing

Symposium, 2009 IEEE International, IGARSS 2009. Vol. 4. IEEE, 2009.

[17] Kosaka, Naoko, Kuniaki Uto, and Yukio Kosugi. "ICA-aided mixed-pixel analysis of hyperspectral data in

agricultural land." IEEE Geoscience and Remote Sensing Letters 2.2 (2005): 220-224.

[18] Moussaoui, Saïd, et al. "On the decomposition of Mars hyperspectral data by ICA and Bayesian positive

source separation." Neurocomputing 71.10-12 (2008): 2194-2208.

[19] Shah, Chintan A., Manoj K. Arora, and Pramod K. Varshney. "Unsupervised classification of hyperspectral

data: an ICA mixture model based approach." International Journal of Remote Sensing 25.2 (2004): 481-

487.

[20] Du, Qian, and Chein-I. Chang. "A linear constrained distance-based discriminant analysis for hyperspectral

image classification." Pattern Recognition 34.2 (2001): 361-373.

[21] Ly, Nam Hoai, Qian Du, and James E. Fowler. "Sparse graph-based discriminant analysis for hyperspectral

imagery." IEEE Transactions on Geoscience and Remote Sensing 52.7 (2014): 3872-3884.

[22] Li, Wei, Jiabin Liu, and Qian Du. "Sparse and low-rank graph for discriminant analysis of hyperspectral

imagery." IEEE Transactions on Geoscience and Remote Sensing 54.7 (2016): 4094-4105.

[23] Baudat, Gaston, and Fatiha Anouar. "Generalized discriminant analysis using a kernel approach." Neural

computation 12.10 (2000): 2385-2404.

[24] Yu, Bin, et al. "Penalized discriminant analysis of in situ hyperspectral data for conifer species

recognition." Ieee transactions on Geoscience and remote sensing 37.5 (1999): 2569-2577.

[25] Imani, Maryam, and Hassan Ghassemian. "Feature space discriminant analysis for hyperspectral data

feature reduction." ISPRS Journal of Photogrammetry and Remote Sensing 102 (2015): 1-13.

[26] Shahdoosti, Hamid Reza, and Fardin Mirzapour. "Spectral–spatial feature extraction using orthogonal linear

discriminant analysis for classification of hyperspectral data." European Journal of Remote Sensing 50.1

(2017): 111-124.

[27] Li, Fan, et al. "Feature extraction for hyperspectral imagery via ensemble localized manifold

learning." IEEE Geoscience and Remote Sensing Letters 12.12 (2015): 2486-2490.

[28] Rashedi, Esmat, Hossein Nezamabadi-Pour, and Saeid Saryazdi. "GSA: a gravitational search

algorithm." Information sciences 179.13 (2009): 2232-2248.

47.

Authors: Vinaya Singh P, P. A. Vijaya, Ravikumar

Paper Title: Automatic Vehicle Identification for Multiple Purposes at Toll Collection System

Abstract:: With the major growth in roadways, there is a raise in the number of toll booths. These toll booths

have lengthy queues, the time consumed in paying cash and returning change causes additional delay. In this

paper, a system uses Radio Frequency Identification (RFID) technology, ARM LPC2148, GSM, relay and

computer host. RFID is used to obtain the vehicle number. RFID card with unique id is mounted on every

vehicle, data contain on the card is examined by the RFID scanner placed at the toll gate. If the vehicle belongs

to authorized person or registered, fixed money is automatically deducted from the owners account, message

will be send to registered mobile number and automatically toll gate is opened. In this project Rs.50 is deducted

for car and Rs.100 is deducted for bus. If the account balance becomes insufficient then buzzer is alarmed,

message will be sent to the owner that she/he has insufficient balance and should use manual toll payment. If

the vehicle belongs to higher officials such as VIP, police, army, ministers or ambulance the toll gate is opened

automatically and the amount is not deducted. For upcoming situation all vehicle information that passes the toll

will be stored. Stolen vehicle directory is also present, if the card number of the vehicle matches then buzzer is

alarmed, message will be sent to the registered police station, amount is deducted from owner’s account and gate

is opened. The advantage is that message is sent both to the owner and police station. Coding is done in

Embedded C. This system eliminate the manual cash handling, reduces traffic congestion and help in lesser fuel

utilization. This makes automatic toll collection more convenient for the public use.

256-260

Page 50: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Keywords: Automatic vehicle identification, Embedded C, RFID, GSM, authorized user, VIP vehicle, stolen

vehicle.

References:

[1] Amol A. Chapate, D.D. Nawgaje, “Electronic Toll Collection System Based on ARM”, International

Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 1, January 2015.

[2] Sangeeta Pandey, Yamuna Rai and Shipra Mishra, “Fully Automated Toll Tax Collection Using RF

Technology”, VSRD-IJEECE, Vol 2, Issue 6, 2012, 417-420.

[3] K. Kamarulazizi, dr.W. Ismail, “Electronic Toll Collection System Using Passive RFID Technology”,

Journal of Theoretical and Applied Information Technology.

[4] Aniruddha Kumawat1, Kshitija Chhandramore, “Automatic Toll Collection system Using Rfid”,

International Journal of Electrical and Electronics Research, Vol 2, Issue 2, 2014, 64-72.

[5] Preeti Giri, Priyanka Jain, “Automated Toll Collection Using RFID Technology”, IJARSE, Vol 2, Issue 9,

2013.

[6] Zhengang. R and Yingbo. G. (2009). “Design of electronic toll collection system in expressway based on

RFID”, ESIAT 2009, International Conference on, 2 (4-5July 2009), 779-782.

48.

Authors: Mr.Bennilo Fernandes.J, Mr. Kasi Prasad Mannepalli, Mr. Agilesh Saravanan, Mr. KTPS Kumar

Paper Title: Fuzzy Utilization in Speech Recognition and its Different Application

Abstract—Talk affirmation is one among the basic zones in cutting edge talk process. The examination of

talk affirmation may be a bit of an examination for "artificial intelligence" machines that may "hear" and

"appreciate" the verbally communicated data. The customary ways for talk affirmation like HMM and DTW, are

outrageously inconvenient and time excellent. As such formal Fuzzy justification may be an endeavor in cutting

edge talk process for the convincing portrayal of talk affirmation in a couple of utilization. The approach

masterminded in the midst of this paper streamlines the utilization of fuzzy in talk affirmation and make the data

dealing with time shorter. The case considered in the midst of this paper is that the least mind boggling, i.e., the

example of speaker dependence, little vocabulary and disconnected words. There are various spectral and

common choices isolated from human talk. The present ways for tendency acknowledgment from voice use

basically MFCC and Energy feature. This paper briefs an overview concerning the present work on talk feeling

ID strong for completing more examination by feathery approach.

Keywords—Emotional Speech Recognition, Fuzzy, HMM, NN, , Applications.

References:

[1] Mohammad Savargiv , Mohammad Reza Keyvanpour, Soheila MehrMolaei. “A structural method based on

fuzzy approach at producing emotional data”. 6th Iranian Joint Congress on Fuzzy and Intelligent Systems

(CFIS), IEEE,12 April 2018.

[2] Akhmedova, Shakhnaz & Stanovov, Vladimir & Semenkin, Eugene. “Cooperation of Bio-inspired and

Evolutionary Algorithms for Neural Network Design”. Journal of Siberian Federal University -

Mathematics and Physics. May 2018.

[3] Asemi, Adeleh & Salim, Siti Salwah & Shahamiri, Seyed Reza & Asemi, Asefeh & Houshangi, Narjes.

“Adaptive Neuro-fuzzy Inference System for Evaluating Dysarthric Automatic Speech Recognition (ASR)

Systems: A case study on MVML based ASR. Soft Computing”. 2018. 10.1007/s00500-018-3013-4.

[4] Nancy Bansal, Amit Verm, Iqbaldeep Kaur, Dolly Sharma. “Multimodal biometrics by fusion for security

using genetic algorithm”. 4th International Conference on Signal Processing, Computing and Control

(ISPCC), IEEE, 25 January 2018.

[5] Win Chit, Yin & Khaing, Soe. “Myanmar Continuous Speech Recognition System Using Fuzzy Logic

Classification in Speech Segmentation”, Association for Computing Machinery, 2018.

[6] Semiye Demircan, Humar Kahramanli. “Application of fuzzy C-means clustering algorithm to spectral

features for emotion classification from speech”. Neural Computing and Applications, Volume 29, Number

8, Page 59, 2018.

[7] Fan, M., Hu, J., Cao, R., Ruan, W., Wei, X., A review on experimental design for pollutants removal in

water treatment with the aid of artificial intelligence, Chemosphere (2018), doi:

10.1016/j.chemosphere.2018.02.111.

[8] Ghoniem, Ranya & Shaalan, Khaled. “FCSR - Fuzzy Continuous Speech Recognition Approach for

Identifying Laryngeal Pathologies Using New Weighted Spectrum Features”. Springer International

Publishing AG , 384-395. 10.1007/978-3-319-64861-3_36, 2018.

[9] Khanum, Seema & Abdul, Firos. “A novel speaker identification system using feed forward neural

networks”, IEEE, 2017 3045-3047. 10.1109/ICECDS.2017.8390014.

[10] Lazli, Lilia & Laskri, Mohamed Tayeb & Boudour, Rachid. “Discriminant learning for hybrid HMM/MLP

speech recognition system using a fuzzy genetic clustering”. Intelligent Systems Conference, IEEE, 2017,

76-81. 10.1109/IntelliSys.2017.8324351.

[11] Yenjerappa, Vani & A. Anusuya, M. “Noisy Speech Recognition Using Kernel Fuzzy C Means”. Springer

Nature Singapore Pte Ltd. 2018, 10.1007/978-981-10-9059-2_29.

[12] Abdelkefi, Mouna & Kallel, Ilhem. “Towards a fuzzy multiagent tutoring system for M-learners' emotion

regulation”. 2017 IEEE, 1-6. 10.1109/ITHET.2017.8067821.

261-266

Page 51: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[13] Akil, Muhammad & Nurtanio, Ingrid & Samsoe'oed Sadjad, Rhiza. “A DC motor speed control using the

LPC-ANFIS speech recognition system”. 2017 IEEE. 215-220. 10.1109/QIR.2017.8168484.

[14] Y. Dai, X. Wang, P. Zhang, W. Zhang. “Wearable Biosensor Network Enabled Multimodal Daily-life

Emotion Recognition Employing Reputation-driven Imbalanced Fuzzy Classification, Measurement (2017),

doi: http://dx.doi.org/10.1016/j.measurement.2017.06.006

[15] Faiyaz & Karyotis, Charalampos & Iqbal, Rahat & James, Anne. “An intelligent framework for emotion

aware e-healthcare support systems”. 2016 IEEE. 1-8. 10.1109/SSCI.2016.7850044.

[16] Ben Fredj, Ines & Ouni, Kais. (2017). “Fuzzy k-Nearest Neighbors applied to phoneme recognition”. 2016

IEEE.422-426. 10.1109/DT.2017.8012141.

[17] Ghoniem, Ranya & Shaalan, Khaled. “A Novel Arabic Text-independent Speaker Verification System

based

[18] emotion recognition from face”. International Conference on Computer and Knowledge Engineering

(ICCKE), IEEE 2017, 10.1109/ICCKE.2017.8167879.

[19] Lazli, Lilia & Boukadoum, Mounir & Ait Mohamed, Otmane. (2017). “Fuzzy clustering optimized with

[20] genetic algorithms: Application for hybrid speech recognition system”. 0567-0572.

10.1109/CoDIT.2017.8102654.

[21] Yanti Liliana, Dewi & Widyanto, Rahmat & Basaruddin, T. “Human emotion recognition based on active

appearance model and semi-supervised fuzzy C-means”. 2016 439-445. 10.1109/ICACSIS.2016.7872744.

[22] Motamed, Sara & Setayeshi, Saeed & Rabiee, Azam. “Speech emotion recognition based on a modified

brain emotional learning model”. Biologically Inspired Cognitive Architectures. 2017. 19.

10.1016/j.bica.2016.12.002.

[23] Shing-Tai, PanCheng-Yuan, ChangYi-Heng Tsai. “FPGA-Based Robust Wireless Speech Motion Control

for Home Service Robot Subject to Environmental Noises”. International Journal of Fuzzy Systems 2016.

DOI: 10.1007/s40815-016-0222-9.

[24] Gautam, Sumanlata & Singh, Latika. (2015). Developmental pattern analysis and age prediction by

extracting speech features and applying various classification techniques. International Conference on

Computing, Communication and Automation, ICCCA 2015. 83-87. 10.1109/CCAA.2015.7148348.

[25] Paul Choudhury, Suman & Misra, Songhita & Hussain, Rabul & Shome, Nirupam & Kanti Das, Tushar.

(2015). Effects of fuzzy parameter on text dependent speaker verification under uncontrolled noisy

environment. 10.1109/GCCT.2015.7342703.

[26] Mirlab Audio Signal Processing tutorials, “Speech feature MFCC Calculation guide”,

<http://mirlab.org/jang/books/audiosignalprocessing/speechFeatureMfcc.asp> (Browsing Date: 26th

February 2016).

[27] Elizabeth D. Casserly and David B. Pisoni, 'Speech perception and production'. Wiley Interdiscip Rev Cogn

Sci. Author manuscript; available in PMC 2013 Aug 12.

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3740754/, (Browsing Date: 25th October 2015).

[28] Anila, R., Revathy, A.: Emotion recognition using continuous density HMM. Communications and Signal

Processing (ICCSP), 2015 International Conference on. IEEE (2015)

[29] Yogesh, C.K., et al.: Hybrid BBO_PSO and higher order spectral features for emotion and stress recognition

from natural speech. Appl. Soft Comput. 56, 217–232 (2017)

[30] Al-Naser, Mustafa, Elshafei, Moustafa, Al-Sarkhi, Abdelsalam: Artificial neural network application for

multiphase flow patterns detection: a new approach. J. Petrol. Sci. Eng. 145, 548–564 (2016)

[31] M. Savargiv and A. Bastanfard, “Persian speech emotion recognition”,Proceedings of Information and

Knowledge Technology (IKT), 2015 7th Conference on, (2015), 1-5.

49.

Authors: Dhanasekaran Sundararaj, Padmanabhan K, Ananthi Sabapathy

Paper Title: Microstrip Antenna Design by Entrenching the Ground Plane Around the Patch

Abstract—A new approach to enhance the Front-To-Back Ratio (FTBR) of aninset fed microstrip patch

antennabyentrenching the ground plane encircling the patch is described in this paper.By entrenching the

groundplane around patch,backlobe of the antenna getssuppressed.The FTBRhas been improvedto a value of

48.25 dBi, which is very much higher compared to the FTBR of reference microstrip antenna 13.29 dBi.

Index terms—Microstrip Antenna,Backlobe Suppression, Front-To-Back Ratio.

References:

[1] Randy Bancroft, “Microstrip and Printed Antenna Design”, Scitech Publishing ,Inc,Raleigh

,NC.2009,pp.10-75.

[2] C.A.Balanis, “Antenna Theory : Analysis and Design”, Wiley India P Ltd, 2005.pp 811-882.

[3] Qinjiang Rao, T.A.Denidhi,R.H.Johnston, “A new aperture coupled microstrip slot antenna”, IEEE

Transactions on Antennas and Propagation,Vol 53,No.9,Sep 2005.

[4] Zhi Ning Chen,Qing Xianming,Jin Shi, “Compact Substrate Integrated Waveguide Slot Antenna Array With

Low Back Lobe”,IEEE Antennas and Wireless Propagation letters ,Vol 12,2013

[5] Jie Wei,Shaoweri Liao,Jianhua Xu ,Zhi Ning Chen,Xianming Qing,Jin Shi, “SIW slot antenna array with

low back lobe”,IEE Asia-Pacific Conference on Antennas and Propagation,Aug 2013.

[6] T.J.Cho,H.M. Lee, “Front-to-Back ratio improvement of a microstrip antenna by ground plane edge

shaping” ,IEEE 2010

267-269

Page 52: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[7] Hong-Min Lee , “Front-to-Back ratio improvement of a Microstrip Patch Antenna Loaded with Surface

Structure in a Partial Removed Grond Plane”, Journal of Electromagnetic Engineering and Science ,Vol.12

,No.4,247-253,Dec 2012.

[8] Rafael A.Rodriguez Solis, Ana Medina,Nestor Lopez, “Microstrip Patch Encircled by Trench”,IEEE 2000.

[9] Siew Bee Yeap,Zhi Ning Chen, “Microstrip Patch Antennas with Enhanced gain by Partial substrate

removal”,IEEE Transactions on Antennas and Propagation,Vol 58,No.9, Sep 2010.

[10] Won-Gyu Lim , “New method for backlobe suppression of microstip patch antenna for GPS”.Proceedings

of 40th European Microwave Conference,28-30September2010,Paris,France

50.

Authors: Sudhamathi. K,Deepa, S.Sabapathy, Ananthi, Krishnasamy ,Padmanabhanand, J.Rama

Paper Title: Bit Error Performance of Variations along the Spectrum for the Several Sub Carrier

Abstract—Present scenario of mobile communication is to meet the demands of Error free and high data rate

communication. This can be achieved with multi carrier modulation technique. In Multi carrier modulation, the

transmitting data is split into several components which is modulated and transmitted with different carriers

which leads to less Inter Symbol Interference, multipath fading and impulse noise. A novel method of multi

carrier modulation and demodulation was done by multiplying user symbols with several sub carriers then

combining the several modulated signals and transmitted over a noisy channel. Analysis was carried out after

demodulation by comparing received symbols with transmitted symbols. Simulation was carried out to analyze

the Bit error rate (BER) performance of multi carrier modulation system as a function of Number of sub carriers

and spacing between them. It is found that BER performance is not consistent for all sub carriers. BER

performance degrades as sub carriers increases from 1 to n, where n=fs/2. It is also observed that the BER

performance is approximately stable throughout the specified spectrum for a given sub carrier.

Keywords—Bit Error Rate, Filter Bank Technique, Multi Carrier Modulation Technique

References:

[1] S. Hassan, “Multicarrier Communication Systems with examples in Matlab -A New perspective”, Auerbach

Publications, Taylor and Francis Group, USA,2016.

[2] A.C.Bingham, “Multicarrier modulation for data transmission. An idea whose time has come”, IEEE

Communication Magazine,1990.

[3] S. Hara and R. Prasad, “Overview of Multi carrier CDMA”, IEEE Commn. Mag.,Vol. 35, No. 12, pp126-

133,1997.

[4] W.C.Jake, “Microwave Mobile communications”, New York: Wiley, 1974.

[5] R.Saltzbery,”Performanceofanefficientparalleldatatransmission”,IEEE Transaction on Communication

Technology, Vol. 15, No. 6, 1967.

[6] N.Yee, J.P. Linnartz and G.Fettweeis, “Multi-carrier CDMA in indoor wireless radio networks”, IEICE

Trans. Commn, Vol. 77, No. 7, pp. 109-113,1994.

[7] S. Rappaport, “Wireless Communications: Principle and Practice”, Prentice Hall,1995.

[8] K.Sudhamathi, S.Ananthi and K.Padmanabhan, “Performance Analysis of MC-CDMA System with Trellis

based Modulation in a Radio Channel”, JI of Instrumentation Society of India, Vol. 46, No. 1, pp. 52-

56,2016.

[9] http://wcsp.eng.usf.edu/OFDM_links.html

[10] Q.Shi and M. Ltvaaho, “Performance analysis of MC-CDMA in Rayleigh fading channels with correlated

envelopes and phases”, In:IEE Proceedings – Communications,Vol. 50, No. 3, pp. 214 -220,2003.

[11] T.LajosHanzo, B. Muzster, J. Choi, and Thomas Keller, “OFDM and MC-CDMA for Broadband Multi-

User Communications WLANs and Broadcasting”, Wiley-IEEE Press, Sep.2003.

[12] http://www.nutaq.com/blog/filter-bank-multicarrier-fbmc-%E2%80%93-potential-concept-5g-

[13] B.F. Boroujeny, “OFDM VersusFilterBank Multicarrier”, Signal Processing Magazine, IEEE, Vol. 28,

No. 3,pp. 92-112,2011.of 40th European Microwave Conference,28-30September2010,Paris,France

270-277

51.

Authors: Ananthi S, K.Padmanabhan, , Bhagvan Shree Ram, Arun Ananthanarayanan

Paper Title: Research on Speech Codec with Compression using Legendre Polynomials

Abstract- Speech Codecs have been developed in several forms over the past 30 years and are used in Cellular

digital telephony. Based on the throat excitation pulses and mouth cavity filter model, all the methods aim to

encode the speech samples without much loss of clarity. The complexity of the methods using codebook

searching, filtering and matrix inversion, all need heavy computations, leading to timing constraints. After

describing a tutorial elucidating the essentials of the present methods, a different direct method of encoding,

suggested by the spherical harmonic oscillator functions of Legendre, is introduced. Its performance and

simplicity are such that the same may find its applications soon.

Keywords: Speech Processing, Legendre Polynomial, Audio codecs, CELP, LPC, Speech Compression

References:

[1] Jacob Benesty, M. Mohan Sondhi, Yiteng Huang (Eds.), Handbook Springer of Speech Processing Springer-Verlag Berlin Heidelberg,

2008.

278-284

Page 53: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

[2] Rabiner .R. and Schafer,.R.W., Digital Processing of Speech Signals, Prentice Hall Inc., Englewood Cliffs, N.J., 1978.

[3] Atal and Schroeder B.S.: Predictive coding of speech signals and subjective error criteria, IEEE Trans. Acoust. Speech Signal Process.

3, 247–254 (1979).

[4] C. Laflamme, J.-P. Adoul, H.Y. Su, S. Morisette: On reducing computational complexity of codebook search in CELP coder through

the use of algebraic codes, Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (1990) pp. 177–180.

[5] J.H. Chen, M.S. Rauchwerk: An 8 kb/s low-delay CELP speech coder, Proc. IEEE Global Communication. Conf. (1991) pp. 1894–

1898.

[6] B.S. Atal: The history of linear prediction, IEEE Signal Proc. Mag. 23(2), 154–161, (2006).

[7] K.Padmanabhan ,S.Ananthi, R.Vijayarajeswaran, A practical Approach to Digital Signal Processing, New Age International

Publishers, New Delhi, revised edition 2002.

[8] www.datacompression.com.

[9] Voice and Audio Compression for Wireless Communication, Book, Lagos, Hanco, Clare Sommerville and Jasan Woodland. Wiley

IEEE Press, 2007.

[10] Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables.-Chapter 8: Applied Mathematics Series 55,

Dover Publications. p. 332. ISBN 0-486-61272-4.

[11] Speigel, Math. Handbook of Formulas and Tables, Schaum Series Publications, 1990.

[12] Attewell. P.B. and Sandford M.R, On the Creiterion of failure for Geological Rock Crack Distribution, Symposium on Anisotropic

Rocks, 1974.

[13] Techniques for Noise Robustness in Automatic Speech Recognition, edited by Tuomas Virtanen, Rita Singh, Bhiksha Raj, Wiley

Inc.,2007.

[14] http:/opus-codec.org.

[15] Mouser.com, DS70146A – Code for DSPIC 30 Family for CELP.

52.

Authors: Tulasi Radhika Patnala, Sankararao Majji, Gopala Krishna Pasumarthi.

Paper Title: Optimization of CSA for Low power and High speed using MTCMOS and GDI techniques

Abstract: The basic operation involved in any analog, digital, control system, DSP’s is addition. Performance

and reliability of almost every digital system is depends on performance of adder. Over the decade, many adder

architectures are proposed and still research work is going on adder to obtain the best results in power, delay and

power delay product (PDP). In this paper we proposed one of the fastest adder architecture called Carry Select

adder (CSA) and optimization is done for performance parameters like delay and power using GDI (Gate

Diffused Input) and MTCMOS techniques. Implementation has been done in standard gpdk 90nm technology

using Cadence tool.

Index Terms: carry select adder, Gate Diffused input, power delay product and MTCMOS.

References:

[1] A.Mitra; A.Bakshi; B.Sharma; N.Didwania” Design of a High Speed Adder” International journal of Scientific & Engineering

Research, 2015.

[2] Abba, Akhila; K.Amarendar” Improved Power Gating Technique for Leakage Power Reduction”, IJES, 2014.

[3] B.Ramkumar; Kittur; M, Harish” Low Power and Area-Efficient carry select adder, IEEE Transactions on Very Large Scale

Integration Systems,2012.

[4] Kumre, Laxmi; Ajay.S, Ganga agnihotry” Analysis of GDI technique for Digital circuit Design, International journal of Computer

Applications, 2013.

[5] Liu, Feng; Song, Xiaoyu; Tan, Qingping; Chen, Gang” Formal Analysis of Hybrid Prefix/Carry -Select Arthimetic Systems. The

Computer Journal, 2011.

[6] Morgenshtein, Arkadiy; Isreal, and Alexander Fish” Gate-Diffusion Input (GDI)-A Technique for Low Power Design of Digital

Circuits: Analysis and Characterization”, IEEE, 2000.

[7] Sangeetha Parshionikar, Dr Deepak V.Bhior” Leakage Power Reduction Using Multi Threshold CMOS Technique”, IJSER, 2013.

[8] Verma, Pooja; Machandana, Rachna” Review Of Various GDI for Low Power Digital Circuits”, IJAETAE, 2014.

[9] Y.Wang; C.Pai; X.Song” The Design of Hybrid Carry Select Adder”, IEEE Transactions on Circuits and Systems: Analog and Digital

Signal Processing, 2012.

[10] Saxena, Pallavi; Purohit, Urvashi; Joshi, Priyanka” Analysis of Low Power, Area Efficient and High speed Fast Adder”, International

Journal of Advanced Research on Computer and Communication Engineering, 2013.

[11] Kiat-Seng Yeo, Kaushik Roy, “Low-Voltage, Low-Power VLSI Subsystems”, Indian edition.

[12] A. P. Chandrakasan, R. W. Brodersen, “Minimizing Power

Consumption in Digital CMOS Circuits”, Proceedings of the IEEE, vol. 83, no. 4, pp. 498-523, April 1995.

285-288

53. Authors: Nikhil S Damle, Gauri Damle, Rushikesh Deshmukh

Page 54: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

Paper Title: Predicting Reliability of Open Source Hardware Platform

Abstract: Embedded system today are influencing every sphere of life and all application domains. These

systems were initially designed according to the application requirement as special hardware. This approach of

embedded system design was influenced by particular family of processor. The new approach of embedded

system design envisages the use of general purpose on the shelf hardware modules to be incorporated. These on

the shelf hardware modules are also referred open source hardware platforms as their entire hardware module

design in available in public domain. Thus populating such hardware platforms by different individuals becomes

easy. At instances these open source modules are not as good as the original ones. This is because calculating

and predicting the successes achieved or failure caused by the copy is not tested. This can be verified by the

performance of the module designed in terms of reliability.

Keywords: Open source, firmware Software Reliability; Reliability Testing; module

References: 1. P. J. Gil, G. Benete, J.J. Serrano “Design of an Intelligent Stepper Motor Controller Module into a Distributed Process Control

Architecture” MELECON '94. Mediterranean Electro technical Conference 12-14 April 1994

2. Erich Sulzer, Michael Bertsch, “Design & Engineering of Modern Process Control System” 1997 IEEE/PCA Cement Industry

Technical Conference. XXXIX Conference Record (Cat. No.97CH36076), 20-24 April 1997

3. Fabiano Hessel, Vitor M. da Rosa, Igor M. Reis, “Abstract RTOS Modeling for Embedded Systems” 15th IEEE International

Workshop on Rapid System Prototyping (RSP’04) PP 210-216

4. Semiconductor Device Reliability Failure Models Technology Transfer # 00053955A-XFR International SEMATECH May 31,2000

5. Dr. Peter Tröger, Krishna B. Misra: Reliability Prediction -Handbook of Performability Engineering. Springer. 2008 (p. 265ff)

6. Andreas Gerstlauer Haobo Yu Daniel D. Gajski “RTOS Modeling for System Level Design” Design, Automation and Test in Europe

Conference and Exhibition (DATE’03)

7. Zhengting He “Timed RTOS Modeling for Embedded System Design” 11th IEEE Real Time and Embedded Technology and

Applications Symposium (RTAS’05)

8. Cyprian F. Ngolah, Yingxu Wang, and Xinming Tan “Implementing Task Scheduling and Event Handling In RTOS+”CCECE 2004-

CCGEI 2004, Niagara Falls, May 2004

9. Nikhil Shirish Damle, Avinash G Keskar “Co-simulation of Networked Embedded System: Verification Approach” SCIS & ISIS

SCIS & ISIS 2008, pp 2086-2090

10. Chen, Hui & Qin, Zhidong. (2010). Reliability demonstration testing method for embedded operating systems. 2nd International

Conference on Software Engineering and Data Mining, SEDM 2010.

11. Farah Lakhani, Michael J. Pont Farah Lakhani, Michael J. Pont Applying design patterns to improve the reliability of embedded

systems through a process of architecture migration, IEEE 14th International Conference on High Performance Computing and

Communications 978-0-7695-4749-7/12 $26.00 © 2012 IEEE DOI 10.1109/HPCC.2012.228

12. MIL-HDBK-217 (Electronics Reliability Prediction) Handbook. 2007

1-5

54.

Authors: Damandeep Kaur,. Surender Singh

Paper Title: An Analysis of Detection of Brain Tumor using Image Processing Techniques

Abstract: Image processing in biomedical field is being increasingly used for the detection and diagnosis of

various abnormalities in the body parts. The detection of brain tumours using image processing on MRI images

is one such field where better results are obtained as comparative to CT-scan and x-ray. Prior detection of the

brain tumour is desirable and possible with the help of machine learning and image processing techniques. These

techniques detect even a small abnormality in the human brain following a four-stage process which includes

pre-processing, segmentation, feature extraction and optimization. Different parameters such as accuracy, PSNR,

MSE are calculated to find out the efficiency of process and to compare it with other methods. This paper

reviews about various different approaches which are used to detect the brain tumor using image processing

techniques.

Keywords: Types of tumors, feature extraction, classification, optimisation, image processing

References: 1. G Riddhi.S.Kapsa, S.S. Salankar, Madhuri.Babar “Literature Survey on Detection of Brain Tumor from MRI Images”IOSR Journal

of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 22782834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. II (Jan

- Feb. 2015), PP 80-86

2. A.Sindhu1, S.Meera2 “A Survey on Detecting Brain Tumor in mri Images Using Image Processing Techniques ”International

Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2015

3. Umit Ilhan et al. “ Brain tumor segmentation based on a new threshold approach” / Procedia Computer Science 120 (2017) 580–587.

4. Quratul Aina, M. Arfan Jaffar and Tae-Sun Choic, “Fuzzy anisotropic diffusion based segmentation and texture based ensemble

classification of brain tumor”, ELSEVIER Applied Soft Computing, 21, 330– 340, 2014.

5. B. Devkota et al. ‘ Image Segmentation for Early Stage Brain Tumor Detection using Mathematical Morphological Reconstruction’ /

Procedia Computer Science 125 (2018) 115–123

6. Nilesh.L.Shimpi, G Ahmed Zeeshan, Dr. R Sundaraguru “BRAIN TUMOR DETECTION AND EXTRACTION” in International

Journal of Advance Research in Engineering, Science & Technology (IJAREST) Volume 4, Issue 10, October 2017, e-ISSN: 2393-

9877, print-ISSN: 2394-2444

7. AMRUTA PRAMOD HEBLI et al. “BRAIN TUMOR DETECTION USING IMAGE PROCESSING: A SURVEY” Proceedings of

65 th IRF International Conference, 20th November, 2016, Pune, India, ISBN: 978-93-86291-38-7

8. 5. Tian Xia et al. “Patch-level Tumor Classification in Digital Histopathology Images with Domain Adapted Deep Learning” 978-1-

5386-3646-6/18/ ©2018 IEEE

9. Reema Mathew A et al. “TUMOR DETECTION AND CLASSIFICATIONOF MRI BRAIN IMAGE USING WAVELET

TRANSFORM AND SVM” International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017.

10. Aby Elsa Babu et al. “A Survey on Methods for Brain Tumor Detection” Proc. IEEE Conference on Emerging Devices and

Smart Systems (ICEDSS 2018) 2-3 March 2018, Mahendra Engineering College, Tamilnadu, India.

6-9

Page 55: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

11. Luxit Kapoor et al. “A Survey on Brain Tumor Detection Using Image Processing Techniques “ 978-1-5090-3519-9/17/ 2017 IEEE.

12. Miss. Shrutika Santosh et al. “Implementation of Image Processing for Detection of Brain Tumors” Proceedings of the IEEE 2017

International Conference on Computing Methodologies and Communication (ICCMC) 978-1-5090-4890-8/17/2017 IEEE

13. Geert Litjens et al. “A survey on deep learning in medical image analysis”. / Medical Image Analysis 42 (2017) 60–88, 1361-8415/©

2017 Elsevier

14. Olfa Limam, Fouad Ben Abdelaziz “Multicriteria Fuzzy Clustering for Brain Image Segmentation”, Institut Sup´erieur de Gestion,

University of Tunis.

15. Nilesh Bhaskarrao Bahadure et al.” Image Analysis for MRI Based Brain Tumor Detection and Feature Extraction Using Biologically

Inspired BWT and SVM” International Journal of Biomedical Imaging Volume 2017, Article ID 9749108.

16. G Rajesh Chandra et al. “TUMOR DETECTION IN BRAIN USING GENETIC ALGORITHM” / Procedia Computer Science 79 (

2016 ) 449 – 457 .

17. J. Amin, M. Sharif, M. Yasmin, S.L. Fernandes, Big data analysis for brain tumor detection: Deep convolutional neural networks,

Future Generation Computer Systems (2018), https://doi.org/10.1016/j.future.2018.04.065

18. P. Shanthakumar, P. Ganeshkumar/Computers and Electrical Engineering (2015) “performance analysis of classifier for brain tumor

detection and diagnosis “0045-7906/ 2015 Elsevier Ltd

19. O. N. Pandey et al. “Review on Brain Tumor Detection Using Digital Image Processing” International Journal of Scientific &

Engineering Research, Volume 5, Issue 5, May-2014 1352 ISSN 2229-

5518

20. Munmun Saha et al. “A Review on Various Image Segmentation Techniques for Brain Tumor Detection “International Journal of

Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 3 | Issue 1 | ISSN :

2456-3307

21. Alexander Zotin et al. “Edge detection in MRI brain tumor images based on fuzzy C-means clustering” / Procedia Computer Science

126 (2018) 1261–1270.

22. Iván Cabria et al. “MRI segmentation fusion for brain tumor detection” In information fusion , 36,1-9 (2017)

23. R. Pradeep Kumar Reddy et al. “Brain Tumor MRI Using Gradient Profile Sharpness” Int. J. Advanced Networking and Applications

Volume: 09 Issue: 05 Pages: 3557-3562 (2018) ISSN: 0975-0290

24. Lei Guo, Youxi Wu, Xuena Liu and Xuena Liu, Research on the Segmentation of MRI Image Based on Multi-Classification Support

Vector Machine, in the website http://www.paper.edu.cn.

25. VaradaS.Kolge and.Kulhalli K.V, PCA and PNN assisted automated brain tumor classification, IOSR Journal of Electronics and

Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735, PP: 19-23.

26. Takate V. S. and Vikhe P. S, Classification of MRI Brain Images using K-NN and k-means, Department of Instrumentation &

Control, Pravara Rural Engineering College, Loni Ahmednagar, Maharashtra.

27. Ahmad Mubashir, Mahmood ul-Hassan, Imran Shafi, and Abdelrahman Osman, Classification of Tumors in Human Brain MRI using

Wavelet and Support Vector Machine, IOSR Journal of Computer Engineering (IOSRJCE), 2012, ISBN: 2278-8727, Volume 8, Issue 2, PP 25-31.

28. Pankaj Sapra, Rupinderpal Singh, and ShivaniKhurana, Brain Tumor Detection Using Neural Network, International Journal of

Science and Modern Engineering (IJISME) ISSN: 2319-6386, 2013, Volume-1, Issue-9.

29. Vipin Y. Borole, Sunil S. Nimbhore, Dr. Seema S. Kawthekar, “Image Processing Techniques for Brain Tumor Detection: A Review”,

in International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN 2278-6856, 2015.

55.

Authors: Nikhil Sharma

Paper Title: Techniques of Enhancing Usage Management of A Local Area Network of A Higher Educational

Institution Abstract: Managing the usage of Local Area Network is an important task as it helps in maintaining the

productivity of the LAN There exists tools for this purpose and most of them are web interface based, they can

control and monitor the usage only when connected to internet. Moreover proper usage logging and usage

control based on the already set schedule is also absent. Practically, this management do not suffice the need of

higher educational institutions because the areas like accountability, usage logging and control is not addressed

in this approach. Both are important factor of enhancing management of LAN. This research paper proposes a

tool-LABGUARD to incorporate these features. Further the tool has been implemented using .Net Technology.

As a result, the usage of systems was accountable, only the authorized user could access the assigned sites with

granted privileges at the retrospective time. Thus the system became more accountable and secured. It also

enhanced the control of administrator on entire lab setup. It also facilitates the administrator to retrieve log

details.

Keywords: Open source, firmware Software Reliability; Reliability Testing; module

References: 1. Yang Chenghui,”A Design of Laboratory Information Management System” IEEE Xplore 2010

2. Chang Sheng, “Security of office management information system analysis” IEEE Xplore 2011.

3. Wu, Ziyan & Wu, Jinlang & Sun, Dan & Wu, Xiaoya. (2006). “Remote measurement platform based on DataSocket and .NET

framework”. 63581W-63581W. 10.1117/12.717947.

4. Davis, Keir & W. Turner, John & Yocom, Nathan. (2004). “Securing Network Communication” 10.1007/978-1-4302-0748-1_10.

5. Buis, P. (2002). Socket-level server programming & .NET. Doctor Dobbs Journal. 27. 25-32.

10-15

56.

Authors: Atul Rawat, Sumeet Gupta, T. Joji Rao, Sushil Kumar Rai

Paper Title: Natural Gas Demand Estimation for India: Error Correction Modelling

Abstract: Share of fossil fuel in India’s primary energy mix is around 92% with natural gas contributing 6% in

it. The power, fertilizer and city gas distribution (CGD) sector are the major gas-consuming sector in India.

Despite the government efforts to increase the share of natural gas in the primary energy mix, the country still

has low per capita gas consumption. In order to enhance natural gas consumption in the country, the Indian

government has set up a target to increase natural gas share in the energy mix to 15% by 2022. Therefore, the

issue of estimation of the natural gas demand is addressed in the present paper to understand the dynamics of the

natural gas market. The error correction model (ECM) is applied at a national and sectoral level to examine the

16-24

Page 56: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

domestic gas demand in India. The study reveals the following findings: (a) At the national and sectoral level,

the last year gas consumption is an only statistically significant factor; (b) Price, population and income are not

statistically significant at national and sectoral level and (c) Demand for natural gas is price inelastic at the

national level.

Keywords: Demand Estimation, Error Correction, India, Natural Gas

References: 1. J. a. P. BODGER, "Further Issues in Forecasting Primary Energy Consumption," TECHNOLOGICAL FORECASTING AND

SOCIAL CHANGE, pp. 267-280, 1984.

2. G. R. Subhes C.Bhattacharyyaa, "Modelling energy demand of developing countries: Are the specific features adequately captured?,"

Energy Policy, pp. 1979-1990, April 2010.

3. S. I. S. Jebaraja, "A review of energy models," Renewable and Sustainable Energy Reviews, pp. 281-311, 2006.

4. R. B. H. M. F. Urban, "Modelling energy systems for developing countries," Energy Policy, p. 3473–3482, 2007.

5. "Shell World Energy Model," Shell International, Amsterdam, 2017.

6. E. Erdogdu, "Natural gas demand in Turkey," Applied Energy, pp. 211-219, 2010.

7. X. D. J. S. M. H. Junchen Li, "Forecasting the growth of China’s natural gas consumption," Energy, pp. 1380-85, 2011.

8. A. Wright, "8 things you need to know about India’s economy," 1 October 2017. [Online]. Available:

https://www.weforum.org/agenda/2017/10/eight-key-facts-about-indias-economy-in-2017/.

9. W. Bank, "Data Bank," World Bank, 12 26 2018. [Online]. Available: https://databank.worldbank.org/data/home.aspx. [Accessed 25 2

2019].

10. A. Wright, "8 things you need to know about India’s economy," 1 October 2017. [Online]. Available:

https://www.weforum.org/agenda/2017/10/eight-key-facts-about-indias-economy-in-2017/. [Accessed 2 1 2019].

11. BP, "Statistical Review of World Energy," BP, London, 2018.

12. PPAC, "Petroleum Planning & Analysis Cell," 31 12 2018. [Online]. Available:

https://www.ppac.gov.in/content/153_1_ImportNAturalgas.aspx. [Accessed 8 01 2019].

13. S. Cornot-Gandolphe, "India’s vision to a gas-based economy Drivers and Challenges," CEDIGAZ, 10 October 2017. [Online].

Available: https://www.cedigaz.org/indias-vision-gas-based-economy-drivers-challenges/. [Accessed 08 01 2019].

14. P. Bodger and J. T. Baines, "Further Issues in Forecasting Primary Energy Consumption," TECHNOLOGICAL FORECASTING

AND SOCIAL CHANGE, vol. 26, no. 3, pp. 267-280, 1984.

15. S. C. Bhattacharyya and G. R. Timilsina, "Modelling energy demand of developing countries: Are the specific features adequately

captured?," Energy Policy, vol. 38, no. 4, pp. 1979-1990, April 2010.

16. S. Jebaraj and S. Iniyan, "A review of energy models," vol. 10, no. 4, pp. 281-311, August 2006.

17. F. Urban, H. C. Mall and R. M. Benders, "Modelling energy systems for developing countries," Energy policy, vol. 35, no. 6, pp.

3473-3482, June 2007.

18. Thomas, Wim; Haigh, Martin, "World Energy Model A View To 2010," Shell International BV, The Hague, 2017.

19. E. Erdogdu, "Natural Gas Demand In Turkey," Applied Energy, vol. 87, no. 1, pp. 211-219, 2010.

20. L. Junchen, D. Xiucheng, S. Jianxin and M. Hook, "Forecasting the growth of China’s natural gas consumption," Energy, vol. 36, no.

3, pp. 1380-1385, March 2011.

21. S. K. Mukherjee, "Energy policy and planning in India," Energy, vol. 6, no. 8, pp. 823-851, 1981.

22. R. D. Rao and J. K. Parikh, "Forecast and analysis of demand for petroleum products in India," Energy Policy, vol. 24, no. 6, pp. 583-

592, June 1996.

23. B. S. Reddy and P. Balachandra, "Integrated energy-environment-policy analysis — a case study of India," Utilities Policy, vol. 11,

no. 2, pp. 59-73, 2003.

24. J. Parikh, P. Purohit and P. Maitra, "Demand projections of petroleum products and natural gas in India," Energy, vol. 32, no. 10, pp.

1825-1837, 2007.

25. S. Jebaraj, S. Iniyan and H. Kota, "Forecasting of commercial energy consumption in India using Artificial Neural Network,"

International Journal of Global Energy Issues, vol. 27, no. 3, pp. 276-301, 2007.

26. C. K. R. S. D. Cleveland, "Aggregation and the role of energy in the economy," Ecological Economics, vol. 32, no. 2, pp. 301-317,

2000.

27. R. W. B. Ayres, "Accounting for growth: the role of physical work," Structural Change and Economic Dynamics, vol. 16, no. 2, pp.

181-209, 2005.

28. Chien-ChiangLee, "Energy consumption and GDP in developing countries: A cointegrated panel analysis," Energy Economics, vol.

27, no. 3, pp. 415-427, 2005.

29. I. M. W. Huson Joher Ali Ahmed, "Role of oil price shocks on macroeconomic activities: An SVAR approach to the Malaysian

economy and monetary responses," Energy policy, vol. 39, no. 12, pp. 8062-8069, 2011.

30. J. B. Alam, Z. Wadud and J. W. Polak, "Energy demand and economic consequences of transport policy," International Journal of

Environment Science and Technology, vol. 10, no. 5, pp. 1075-1082, 2013.

31. G. J. Daniel and S. Glaister, "The Demand for Automobile Fuel: A Survey of Elasticities," Journal of Transport Economics and Policy,

vol. 36, no. 1, pp. 1-25, 2002.

32. D. Gately and H. Huntington, "The Asymmetric Effects of Changes in Price and Income on Energy and Oil Demand," The Energy

Journal, vol. 23, no. 1, pp. 19-55, 2002.

33. P. I. Bureau, "Revision of Domestic Gas Prices," Government of India, New Delhi, 2014.

34. M. o. S. a. P. Implementation, "Energy Statistics," Government of India, New Delhi, 2018.

35. RBI, "Handbook of Statistics on Indian States," Reserve Bank of India, 15 3 2018. [Online]. Available:

https://rbi.org.in/Scripts/AnnualPublications.aspx?head=Handbook%20of%20Statistics%20on%20Indian%20States. [Accessed 15 1

2019].

36. R. F. Engle and C. W. Granger, "Co-Integration and Error Correction: Representation, Estimation, and Testing," Econometrica, vol.

55, no. 2, pp. 251-276, 1987.

57.

Authors: Pooja Dudhal, H.B.Chaudhari, Vipin Mishra, Bhanwar Lal Bishnoi

Paper Title: Numerical Differential Protection of Power Transformer using innovative algorithm

Abstract: This paper presents a new innovative algorithm for Numerical Differential Relay design of

transformer. Fault information is critical for operating and maintaining power networks. This algorithm provides

accurate performance for transformer by which is independent of system conditions such as: External fault,

Inrush current, CT saturation. Locating transformer faults quickly and accurately is very important for economy,

25-34

Page 57: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

safety and reliability point of view. Both fault-detection and protection indices are derived by using Numerical

Differential Relay algorithm design of transformer. The embedded based differential and operating current

measurement device is called numerical differential relay is among the most important development in the field

of instantaneous fault operation.

Numerical relay provides measurement of differential current and operating current at power transformer above

5MVA in substation. Simulation studies are carried out using MATLAB Software show that the proposed

scheme provides a high accuracy and fast relay response in internal fault conditions.

Current transformers form an important part of protective systems. Ideal Current Transformers (CTs) are

expected to reflect the primary current faithfully on the secondary side. Under conditions the CT saturates, and

hence it cannot reproduce the primary current faithfully. This paper deals with simulation methods for

determining CT performance under different factor. A Simulink model has been developed to observe CT

response under steady state w.r.t Burden, Turns ratio, Asymmetrical current, Hysteresis conditions. Thus, it is

now possible to evaluate the CT performance under these factors.

Keywords: DC offset, FFT, Hysteresis, Burden

References: 1. Dr. Juergen Holbach, Siemens PT&D “Modern Solutions to Stabilize Numerical Differential Relays for Current Transformer

Saturation during External Fault”

2. “Guide For The Application Of Current Transformers Used For Protection Relaying Purposes, 1996.”IEEE Std. C37.110

3. Piotr Sawko Wroclaw University of Technology, Faculty of Electrical Engineering “Impact of Secondary Burden and X/R Ratio on

CT Saturation”

4. Omar.G.Mrehel Khaled Esmail. SH.Ghambirlou Mahmud .M. Alforjani, EEE Dept., University of Tripoli “Investigating Factors

Affecting CT Saturation Using MATLAB” 1st Conference of Industrial Technology ( CIT2017)

5. Badri Ram ,D N Vishwakarma, “Power system protection and switchgear”

6. Fallahi, N. Ramezani, I. Ahmadi ”Current Transformers’ Saturation Detection and Compensation Based on Instantaneous Flux

Density Calculations”, Online ISSN 1848-3380

7. R. P. Pandey, Dr. R. N. Patel PG Student [PSE], Professor Department of EEE, SSTC Bhilai Chhattisgarh, India”A CT Saturation

Detection Algorithm Using Secondary Current Third Difference Function” © 2014 IJEDR | Volume 2, Issue 2 | ISSN: 2321-9939

58.

Authors: Anubha Agrawal, Sakshi Saraswat, Hira Javed

Paper Title: A Pointer Generator Network Model to Automatic Text Summarization and Headline Generation

Abstract: In a world where information is growing rapidly every single day, we need tools to generate summary

and headlines from text which is accurate as well as short and precise. In this paper, we have described a method

for generating headlines from article. This is done by using hybrid pointer-generator network with attention

distribution and coverage mechanism on article which generates abstractive summarization followed by the

application of encoder-decoder recurrent neural network with LSTM unit to generate headlines from the

summary. Hybrid pointer generator model helps in removing inaccuracy as well as repetitions. We have used

CNN / Daily Mail as our dataset.

Keywords: LSTM Encoder Decoder Model, Natural Language Processing, Pointer generator network and

Coverage Mechanism, Text Summarization

References: 1. Lopyrev, K. (2015). Generating news headlines with recurrent neural networks. arXiv preprint arXiv:1512.01712.

2. Alexander M. Rush, Sumit Chopra, and Jason Weston. A neural attention model for abstractive sentence summarization. CoRR,

abs/1509.00685, 2015.

3. See, A., Liu, P. J., & Manning, C. D. (2017). Get to the point: Summarization with pointer-generator networks. arXiv preprint

arXiv:1704.04368.

4. DeepMind Q&A Dataset: https://cs.nyu.edu/~kcho/DMQA/ cited on:

5. Chin-Yew Lin. 2004b. Rouge: A package for automatic evaluation of summaries. In Text summarization branches out: ACL

workshop.

6. How to Configure the Learning Rate Hyperparameter When Training Deep Learning Neural Networks:

https://machinelearningmastery.com/learning-rate-for-deep-learning-neural-networks/ (cited on: 22-May-2019)

7. Introduction toWord Vector: https://medium.com/@jayeshbahire/introduction-to-word-vectors-ea1d4e4b84bf (cited on: 22-May-

2019)

8. Recurrent neural networks and LSTM https://towardsdatascience.com/recurrent-neural-networks-and-

lstm-4b601dd822a5 (cited on: 22-May-2019)

9. Understanding Encoder-Decoder Sequence to Sequence Model https://towardsdatascience.com/understanding-encoder-decoder-

sequence-to-sequence-model-679e04af4346 cited on:

10. Python Language: https://www.geeksforgeeks.org/python-programming-language(cited on: 22-May-2019)

11. Machine learning course: https://www.coursera.org/learn/machine-learning

12. Oriol Vinyals, Meire Fortunato, and Navdeep Jaitly. 2015. Pointer networks. In Neural Information Processing Systems.

13. Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2015. Neural machine translation by jointly learning to align and translate.

In International Conference on Learning Representations.

14. Stephen Merity, Caiming Xiong, James Bradbury, and Richard Socher. 2016. Pointer sentinel mixture models. In NIPS 2016

Workshop on Multi-class and Multi-label Learning in Extremely Large Label Spaces.

15. Caglar Gulcehre, Sungjin Ahn, Ramesh Nallapati, Bowen Zhou, and Yoshua Bengio. 2016. Pointing the unknown words. In

Association for Computational Linguistics.

16. Wenyuan Zeng, Wenjie Luo, Sanja Fidler, and Raquel Urtasun. 2016. Efficient summarization with read-again and copy mechanism.

arXiv preprint arXiv:1611.03382 .

17. Yishu Miao and Phil Blunsom. 2016. Language as a latent variable: Discrete generative models for sentence compression. In

Empirical Methods in Natural Language Processing.

35-39

Page 58: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

18. Ramesh Nallapati, Feifei Zhai, and Bowen Zhou. 2017. SummaRuNNer: A recurrent neural network based sequence model for

extractive summarization of documents. In Association for the Advancement of Artificial Intelligence.

19. Ramesh Nallapati, Feifei Zhai, and Bowen Zhou. 2017. SummaRuNNer: A recurrent neural network based sequence model for

extractive summarization of documents. In Association for the Advancement of Artificial Intelligence.

20. Ramesh Nallapati, Bowen Zhou, Cicero dos Santos, Çaglar Gulçehre, and Bing Xiang. 2016. Abstractive text summarization using

sequence-to-sequence RNNs and beyond. In Computational Natural Language Learning.

21. Philipp Koehn. 2009. Statistical machine translation. Cambridge University Press.

22. Haitao Mi, Baskaran Sankaran, Zhiguo Wang, and Abe Ittycheriah. 2016. Coverage embedding models for neural machine translation.

In Empirical Methods in Natural Language Processing.

23. Zhaopeng Tu, Zhengdong Lu, Yang Liu, Xiaohua Liu, and Hang Li. 2016. Modeling coverage for neural machine translation. In

Association for Computational Linguistics.

24. Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron C Courville, Ruslan Salakhutdinov, Richard S Zemel, and Yoshua

Bengio. 2015. Show, attend and tell: Neural image caption generation with visual attention. In International Conference on Machine

Learning.

25. Qian Chen, Xiaodan Zhu, Zhenhua Ling, Si Wei, and Hui Jiang. 2016. Distraction-based neural networks for modeling documents. In

International Joint Conference on Artificial Intelligence.

59.

Authors: Harleen Kaur, Gourav Bathla

Paper Title: Group Recommendation for Cold Start Users Using Hybrid Recommendation Technique

Abstract: Recommender system is an data retrieval system that gives customers the recommendations for the

items that a customer may be willing to have. It helps in making the search easy by sorting the huge amount of

data. We have progressed from the era of paucity to the new era of plethora due to which there is lot of

development in the recommender system. In today’s scenario the interaction between the groups of friends,

family or colleagues has increased due to the advancement in mobile devices and the social media. So, group

recommendation has become a necessity in all kinds of domains. In this paper a system has been proposed using

the group recommendation system based on hybrid based filtering method to overcome the cold start user issue

which arises when a new user signs in and he/she doesn’t have any past records. So, the recommender system

does not have enough information related to the user to recommend an item which will be of his/her interest. The

dataset has been taken from the MovieLens is used in the experiment.

Keywords: Cold start problem, Group recommendation system, Hybrid filtering approach

References: 1. Ghodsad, P. R., & Chatur, P. N. (2018, August). Handling User Cold-Start Problem for Group Recommender System Using Social

Behaviour Wise Group Detection Method. In 2018 International Conference on Research in Intelligent and Computing in Engineering

(RICE) (pp. 1-5). IEEE.

2. Katarya, R., & Verma, N. (2017, December). Automatically detection and recommendation in collaborative groups. In 2017

International Conference on Intelligent Sustainable Systems (ICISS) (pp. 218-222). IEEE.

3. Dara, S., Chowdary, C. R., & Kumar, C. (2019). A survey on group recommender systems. Journal of Intelligent Information Systems,

1-25.

4. Patel, A., Thakkar, A., Bhatt, N., & Prajapati, P. (2019). Survey and Evolution Study Focusing Comparative Analysis and Future

Research Direction in the Field of Recommendation System Specific to Collaborative Filtering Approach. In Information and

Communication Technology for Intelligent Systems (pp. 155-163). Springer, Singapore.

5. Boratto, L., & Carta, S. (2015). ART: group recommendation approaches for automatically detected groups. International Journal of

Machine Learning and Cybernetics, 6(6), 953-980.

6. Yanxiang, L., Deke, G., Fei, C., & Honghui, C. (2013, January). User-based clustering with top-n recommendation on cold-start

problem. In 2013 Third International Conference on Intelligent System Design and Engineering Applications(pp. 1585-1589). IEEE.

7. Fletcher, K. K. (2017, June). A Method for Dealing with Data Sparsity and Cold-Start Limitations in Service Recommendation Using

Personalized Preferences. In 2017 IEEE International Conference on Cognitive Computing (ICCC) (pp. 72-79). IEEE.

8. Schein, A. I., Popescul, A., Ungar, L. H., & Pennock, D. M. (2002, August). Methods and metrics for cold-start recommendations. In

Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval (pp. 253-

260). ACM.

9. Ortega, F., Hurtado, R., Bobadilla, J., & Bojorque, R. (2018). Recommendation to groups of users using the singularities concept.

IEEE Access, 6, 39745-39761.

10. Hawashin, B., Mansour, A., Kanan, T., & Fotouhi, F. (2018, October). An efficient cold start solution based on group interests for

recommender systems. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems (p.

26). ACM.

11. Revathy, V. R., & Anitha, S. P. (2019). Cold Start Problem in Social Recommender Systems: State-of-the-Art Review. In Advances in

Computer Communication and Computational Sciences (pp. 105-115). Springer, Singapore.

12. Delic, A., & Masthoff, J. (2018, July). Group Recommender Systems. In Proceedings of the 26th Conference on User Modeling,

Adaptation and Personalization (pp. 377-378). ACM.

13. Amatriain, X., Jaimes, A., Oliver, N., & Pujol, J. M. (2011). Data mining methods for recommender systems. In Recommender

systems handbook (pp. 39-71). Springer, Boston, MA.

14. Yang, W., Fan, S., & Wang, H. (2018, October). An item-diversity-based collaborative filtering algorithm to improve the accuracy of

recommender system. In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable

Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (pp. 106-110). IEEE.

15. Yang, X., Guo, Y., Liu, Y., & Steck, H. (2014). A survey of collaborative filtering based social recommender systems. Computer

Communications, 41, 1-10.

16. Nehete, S. P., & Devane, S. R. (2018, August). Recommendation Systems: past, present and future. In 2018 Eleventh International

Conference on Contemporary Computing (IC3) (pp. 1-7). IEEE.

17. Schafer, J. B., Frankowski, D., Herlocker, J., & Sen, S. (2007). Collaborative filtering recommender systems. In The adaptive web (pp.

291-324). Springer, Berlin, Heidelberg.

18. Ambulgekar, H. P., Pathak, M. K., & Kokare, M. B. (2019). A Survey on Collaborative Filtering: Tasks, Approaches and

Applications. In Proceedings of International Ethical Hacking Conference 2018 (pp. 289-300). Springer, Singapore.

19. Guo, L., Liang, J., Zhu, Y., Luo, Y., Sun, L., & Zheng, X. (2018). Collaborative filtering recommendation based on trust and emotion.

Journal of Intelligent Information Systems, 1-23.

20. Thorat, P. B., Goudar, R. M., & Barve, S. (2015). Survey on collaborative filtering, content-based filtering and hybrid

40-44

Page 59: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

recommendation system. International Journal of Computer Applications, 110(4), 31-36.

21. Mustafa, N., Ibrahim, A. O., Ahmed, A., & Abdullah, A. (2017, January). Collaborative filtering: Techniques and applications. In

2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE) (pp. 1-6). IEEE.

22. Han, D., Li, J., Li, W., Liu, R., & Chen, H. (2019). An app usage recommender system: improving prediction accuracy for both warm

and cold start users. Multimedia Systems, 1-14.

23. Zhu, Y., Lin, J., He, S., Wang, B., Guan, Z., Liu, H., & Cai, D. (2019). Addressing the Item Cold-start Problem by Attribute-driven

Active Learning. IEEE Transactions on Knowledge and Data Engineering.

24. Belém, F. M., Heringer, A. G., Almeida, J. M., & Gonçalves, M. A. (2019). Exploiting syntactic and neighbourhood attributes to

address cold start in tag recommendation. Information Processing & Management, 56(3), 771-790.

25. Silva, N., Carvalho, D., Pereira, A. C., Mourão, F., & Rocha, L. (2019). The Pure Cold-Start Problem: A deep study about how to

conquer first-time users in recommendations domains. Information Systems, 80, 1-12.

26. Li, J., Zhang, K., Yang, X., Wei, P., Wang, J., Mitra, K., & Ranjan, R. (2019). Category Preferred Canopy–K-means based

Collaborative Filtering algorithm. Future Generation Computer Systems, 93, 1046-1054.

60.

Authors: Nupur Kalra, Deepak Yadav, Gourav Bathla

Paper Title: SynRec: A Prediction Technique Using Collaborative Filtering and Synergy Score

Abstract: Recommender systems are techniques designed to produce personalized recommendations. Data

sparsity, scalability cold start and quality of prediction are some of the problems faced by a recommender

system. Traditional recommender systems consider that all the users are independent and identical, its an

assumption which leads to a total ignorance of social interactions and trust among user. Trust relation among

users ease the work of recommender systems to produce better quality of recommendations. In this paper, an

effective technique is proposed using trust factor extracted with help of ratings given so that quality can be

improved and better predictions can be done. A novel-technique has been proposed for recommender system

using film-trust dataset and its effectiveness has been justified with the help of experiments.

Keywords: Collaborative Filtering, Recommender System, Social Trust, Synergy Score

References: 1. G. Bathla,” A graph-based model to improve social trust and influence for social recommendation,” The Journal of Supercomputing,

2017,1-19.

2. D.Li., “ Item-based top-N recommendation resilient to aggregated information revelation,” Knowledge-Based Systems, 67,2014, 290-

304.

3. G. Bello-Orgaz “Social big data: Recent achievements and new challenges”. Information Fusion, 28, 2016,45-59

4. X.Yang, “A product recommendation approach based on the latent social trust network model for collaborative filtering,” In 2016

IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) ,2016,pp. 178-185. IEEE.

5. P.Moradi, ” A reliability-based recommendation method to improve trust-aware recommender systems,” Expert Systems with

Applications, 42(21), 2015,7386-7398.

6. P.Moradi,” An effective trust-based recommendation method using a novel graph clustering algorithm,” Physica A: Statistical

Mechanics and its Applications, 436, 2015,462-481.

7. M.G.Ozsoy, “Trust based recommendation systems,” In 2013 IEEE/ACM International Conference on Advances in Social Networks

Analysis and Mining (ASONAM 2013) ,pp. 1267-1274, IEEE.

8. N.Sodera, “ Open problems in recommender systems diversity,” In 2017 International Conference on Computing, Communication and

Automation (ICCCA),2017 pp. 82-87, IEEE.

9. H.Ma, “ Sorec: social recommendation using probabilistic matrix factorization,” In Proceedings of the 17th ACM conference on

Information and knowledge management ,2008,pp. 931-940, ACM.

10. G.Guo, “ A novel recommendation model regularized with user trust and item ratings” IEEE Transactions on Knowledge and Data

Engineering, 28(7), 2016,1607-1620.

11. B.Yang,”Social collaborative filtering by trust,” IEEE transactions on pattern analysis and machine intelligence, 39(8), 2017,1633-

1647.

12. M,Deshpande,” Item-based top-n recommendation algorithms,” ACM Transactions on Information Systems (TOIS), 22(1),2004, 143-

177.

13. P.Sun, (2018, May)” Research of Personalized Recommendation Algorithm Based on Trust and User's Interest,” In 2018 International

Conference on Robots & Intelligent System (ICRIS) 2018,pp. 153-156, IEEE.

14. W.Wenjuan, (2015, July)”A personalized recommendation strategy based on trusted social community,” In 2015 10th International

Conference on Computer Science & Education (ICCSE), 2015,pp. 496-499, IEEE.

15. H.Zhao, ”A New Collaborative Filtering Algorithm with Combination of Explicit Trust and Implicit Trust,” In 2018 13th International

Conference on Computer Science & Education (ICCSE),2018, pp. 1-5,IEEE.

16. F,Isinkaye,” Recommendation systems: Principles, methods and evaluation,” Egyptian Informatics Journal, 16(3), 2015,261-273.

17. M. Vlachos,” Addressing Interpretability and Cold-Start in Matrix Factorization for Recommender Systems,” IEEE Transactions on

Knowledge and Data Engineering,2018.

18. A.Davoudi, (2016, January)” Product rating prediction using trust relationships in social networks,” In 2016 13th IEEE Annual

Consumer Communications & Networking Conference (CCNC),2016, pp. 115-118, IEEE.

19. C.Park,” Improving top-K recommendation with truster and trustee relationship in user trust network”. Information Sciences,

374,2017, 100-114.

20. Y.Wang,” A trust-based probabilistic recommendation model for social networks,” Journal of Network and Computer Applications,

55, 2015,59-67.

21. J.Golbeck, “Filmtrust: Movie recommendations using trust in web-based social networks,” In Proceedings of the IEEE Consumer

communications and networking conference ,Vol. 96, No. 1,2016, pp. 282-286.

22. F.Walter,” A model of a trust-based recommendation system on a social network,” Autonomous Agents and Multi-Agent Systems,

16(1),2008, 57-74.

23. J.Herlocker ,” Evaluating collaborative filtering recommender systems,” ACM Transactions on Information Systems (TOIS),

22(1),2004, 5-53.

24. R.Katarya, “ An effective collaborative movie recommender system with cuckoo search,” Egyptian Informatics Journal, 18(2),2017,

105-112.

25. N.de Mello, ” Insights on social recommender system,” In Proceedings of the Workshop on Recommendation Utility Evaluation:

Beyond RMSE, at ACM RecSyS12 ,2012, pp. 33-38.

26. X.Wu,” Data mining with big data,” IEEE transactions on knowledge and data engineering, 26(1),2014 97-107.

45-51

Page 60: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

27. R. Mukkamala, ” Fuzzy-set based sentiment analysis of big social data,” In 2014 IEEE 18th International Enterprise Distributed

Object Computing Conference ,2014, pp. 71-80, IEEE.

28. L.Xiong,” An Approach for Top-k Recommendation Based on Trust Information,” In 2017 IEEE 10th Conference on Service-

Oriented Computing and Applications (SOCA), 2017,pp. 198-205, IEEE.

29. L. Sheugh,” A novel 2D-Graph clustering method based on trust and similarity measures to enhance accuracy and coverage in

recommender systems,” Information Sciences, 432,2018, 210-230.

61.

Authors: Basant Kumar

Paper Title: The (in) security of smart cities: vulnerabilities, risks, mitigation and prevention

Abstract: Smart cities represent the overall development in an urban model utilizing human, and technological

enhancement leading to an increase in economic and social opportunities. However, the significant challenges

were observed with the rise of smart cities. A comprehensive review is conducted on the study of different

approaches used for mitigation of the crime scenarios in smart cities in perspective of hacker’s view on hashing

and thereby protecting the integrity of the data in heterogeneous devices on a network of smart city. This paper

also proposes the ICT architecture of a smart city which is encompassed with numerous security layers in onion

model to integrate secure framework for future smart city, for better city living and governance, based on cloud

computing IoT and distributed computing in accordance with salted hash value added as a prefix and postfix in a

generated password.

Keywords: Encryption, Hashing, Privacy, Smart City, Security

References: 1. Mohanty, S. P., Choppali, U., & Kougianos, E. (2016). Everything you wanted to know about smart cities: The internet of things is the

backbone. IEEE Consumer Electronics Magazine, 5(3), 60-70.

2. Ijaz, S., Shah, M. A., Khan, A., & Ahmed, M. (2016). Smart cities: A survey on security concerns. Int. J. Adv. Comput. Sci. Appl,

7(2), pp. 612-625.

3. Thomas, S. R., Veitch, C. K. K. and Woodard, L. , "Categorizing Threat: Building and Using a Generic Threat Matrix.," Sandia Report

SAND2007-5791, Sandia National Laboratories, Albuquerque, New Mexico(2007)

4. Mark Mateski, Cassandra M. Trevino, Cynthia K. Veitch, John Michalski, J. Mark Harris, Scott Maruoka, Jason Frye, "Cyber Threat

Metrics," SANDIA REPORT, Sandia National Laboratories(2012)

5. Achieving Network Security - An AT&T survey and white paper in cooperation with the Economist Intelligence Unit. 2003

6. OWASP (2017a). White paper: OWASP Top 10 2017. OWASP (USA). Available at:

https://www.owasp.org/images/b/b0/OWASP_Top_10_2017_RC2_Final.pdf. Visited on 22nd October 2017.

7. Johnson, Jerry. (2008). Network Defense Requires Layers of Strategic Thinking. Information Week (USA). Feb 25. Iss. 1174, pp. 43 -

49.

8. Fadia, A. (2006). The Unofficial Guide to Ethical Hacking. 2ndedition. Thomson Course Technology (Canada).

9. Shen, J., Liu, D., Shen, J., Liu, Q., & Sun, X. (2017). A secure cloud-assisted urban data sharing framework for ubiquitous-cities.

Pervasive and mobile Computing, pp. 219-230.

10. Modi, C., Patel, D., Boris Aniya, B., Patel, H., Patel, A., & Maharajan, M. (2013). A survey of intrusion detection techniques in cloud.

Journal of Network and Computer Applications, 36(1), pp. 42-57.

11. Zhou, Q., & Luo, J. (2017). The study on evaluation method of urban network security in the big data era. Intelligent Automation &

Soft Computing, pp. 1-6.

12. Tang, B., Chen, Z., Hefferman, G., Wei, T., He, H., & Yang, Q. (2015, October). A hierarchical distributed fog computing architecture

for big data analysis in smart cities. In Proceedings of the ASE Bigdata & Social Informatics 2015 (p. 28). ACM.

13. Chen, Y., Nyemba S., and Malin, B. (2012). Detecting Anomalous Insiders in Collaborative Information Systems. IEEE Transactions

on Dependable and Secure Computing. IEEE (USA). May/June. Vol. 9, pp. 332-340.

14. Kelley, P., Komanduri, S., Mazurek, M., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L. and López, J. (2012). Guess Again

(and Again and Again). Measuring Password Strength by Simulating Password-Cracking Algorithms. 33rd IEEE Symposium on

security and privacy (S&P 2012). IEEE computer society (USA).

15. Bonneau, Joseph (2012). The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. 33rd IEEE

Symposium on security and privacy (S&P 2012). IEEE computer society (USA).

16. Panko, R. J. (2011). Corporate Computer and Network Security. 2ndedition. PEARSON (USA).

17. Gellman, D. (2011). Computer Security. rd edition. Wiley (USA).

18. Kanneganti, R. and Chodavarapu, P. (2008). SOA Security. st edition. Manning Publications CO (USA).

19. Norman, S. (2010). Metrics for Mitigating Cyber security Threats to Networks. IEEE Internet Computing. IEEE (USA).

January/February. Vol. 14, Iss. no. 1, pp. 64-68.

20. Norman, S. (2010). Metrics for Mitigating Cyber security Threats to Networks. IEEE Internet Computing. IEEE (USA).

January/February. Vol. 14, Iss. no. 1, pp.64-68.

21. Skulmoski, Gregory J., Hartman, Francis T. and Krahn, J. (2007). The Delphi Method for Graduate Research. Journal of Information

Technology Education. Volume 6, 2007.

22. Jangbok, K., Kihyun, C. and Kyunghee, C. (2007). Spam Filtering With Dynamically Updated URL Statistics. IEEE Security and

Privacy. July/August. Vol. 5, no. 4, pp. 33- 39.

23. Jangbok, K., Kihyun, C. and Kyunghee, C. (2007). Spam Filtering With Dynamically Updated URL Statistics. IEEE Security and

Privacy. July/August. Vol. 5, no. 4, pp. 33-49.

24. Gai, K., Qiu, M., Zhao, H., & Xiong, J. (2016 June). Privacy-aware adaptive data encryption strategy of big data in cloud computing.

In Cyber Security and Cloud Computing (CSCloud), 2016 IEEE 3rd International Conference, pp. 273-278.

25. Hedieh, S. and Mansour, J. (2011). HYSA: Hybrid steganographic approach using multiple steganography methods. Security and

Communication Networks. John Wiley & Son Ltd (USA). October. Volume 4. Issue 10, pp. 1173– 1178

26. Gai, K., Qiu, M., Zhao, H., & Xiong, J. (2016 June). Privacy-aware adaptive data encryption strategy of big data in cloud computing.

In Cyber Security and Cloud Computing (CSCloud), 2016 IEEE 3rd International Conference on (pp. 273-278). IEEE.Damiani, M. L.,

Bertino, E. and Perlasca, P. (2007). Data security in location-aware applications. an approach based on RBAC. International Journal of Information and Computer Security (Italy). Vol. 1, No.1/2, pp. 5– 8.

27. Tutton, J. (2010). Incident response and compliance. A case study of the recent attacks. Information Security Technical Report

Elsevier Ltd. November. Volume 15, Issue 4, pp. 145- 149

28. ITIL (2011). ITIL standard: ITiL. ITIL (USA). Available at: http://www.itil-officialsite.com/. Visited on: 26th May 2 . Jacobs, David

(2012). How to perform a network security audit for customers. TechTarget Inc (USA). Available at: http://searchsecuritychannel. techtarget.com/. Visited on: 27th April 2017.

52-58

Page 61: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

29. Jung-Shian, L., Che-Jen, H., Chih-Ying, C. and Naveen, C. (2011). Improved IPsec performance utilizing transport-layer-aware

compression architecture. Security and Communication Networks. John Wiley & Son Ltd (USA). September. Volume 4. Issue 9, pp.

1063-1065.

30. Haining, W., Danlu, Z. and Kang, G. S. (2004). Change-Point Monitoring for the Detection of DOS Attacks. IEEE Transactions on

Dependable and Secure Computing. (USA). October-December. Vol. 1, no. 4, pp. 193-198.

31. McClure, S., Scambray, J. and Kurtz, G. (2012). Hacking Exposed Network Security Secrets and Solutions. th edition. McGraw-Hill/

Osborne (USA).

32. Tsai, J. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers

and Security. Trustwave (2015). White paper: Web-Application-Firewall. Trustwave Incorporation (USA). May. Volume 27, Issue 3-

4, pp. 115-119/.

33. Nitesh, S. and Jonathan, V. (2011). Data remanence effects on memory-based entropy collection for RFID systems. International

Journal of Information Security. Volume 10, Number 4, pp. 213-222.

34. Mouza Ahmad, B. S., Chan Yeob, Y. and Mohamed, Jamal Z. (2010). Lightweight mutual authentication protocol for securing RFID

applications. International Journal of Internet Technology and Secured Transactions. Vol. 2, No.3/4, pp. 205–222 .

35. Rutvij, H. J., Ashish, D. P., Jatin, D. P. and Bhavin, I. S. (2010). MANET Routing Protocols and Wormhole Attack against AODV.

International Journal of Computer Science and Network Security. April. Vol. 10, No. 4, pp. 12- 18.

36. Weinberg, Z., Chen, E., Jayaraman, P. and Jackson, C. (2011). I Still Know What You Visited Last Summer. 32nd IEEE Symposium

on security and privacy (S&P 2011). IEEE computer society (USA). pp. 147-151 .

37. Allan, T., Po-WahYau, and MacDonald, John A. (2010). Privacy threats in a mobile enterprise social network. Information Security

Technical Report (UK). May. Volume 15, Issue 2, pp. 57 -70. .

38. Baron, L. David. (2010). Preventing attacks on a user’s history through CSS. Mozilla (USA).

39. Chunsheng, Liu and Huang, Yu. (2007). Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack

Resistance. IEEE VLSI Test Symposium (VTS'07). pp. 461- 478.

40. Robert, W. (2011a). Attackers zero in on Web application vulnerabilities. TechTarget Inc (USA).

41. Sham, R., Omar, N., & Amat, D. W. 2012. Hot Spot Urban Crime Area for Woman Travellers. Procedia - Social and Behavioral

Sciences. 68: pp. 417-426.

42. Leden, L., Gårder, P., Schirokoff, A., Monterde-i-Bort, H., Johansson, C., & Basbas, S. 2014. A Sustainable City Environment

Through Child Safety and Mobility-A Challenge Based on ITS? Accident; Analysis and Prevention.

62.

Authors: Waseem Ahmad, Rashid Ali

Paper Title: Understanding users Display-Name Consistency across Social Networks

Abstract: Online users create their profiles on numerous social platforms to get benefits of various types of

social media content. During online profile creation, the user selects a username and feeds his/her personal

details like name, location, email, etc. As different social networking services acquire common personal

attributes of the same user and present them in a variety of formats. To understand the availability and similarity

of personal attributes across various social networking services, we propose a method that uses the different

distance measuring algorithms to determine the display-name similarity across social networks. From the

experimental results, it is found that at least twenty percent GooglePlus-Facebook and Facebook-Twitter users

select the same display name, while forty five percent Google and Twitter user select identical name across both

the social networks.

Keywords: Cross link posts, Personal Information, Social Account, User Identity

References: 1. https://www.smartinsights.com/sarocial-media-marketing/social-media-strategy/new-global-social-media-resech/ (last accessed

05/18/2019).

2. https://www.pewinternet.org/2018/03/01/social-media-use-in-2018/.(last accessed 05/18/2019).

3. L. Humphreys, P. Gill, B. Krishnamurthy “Privacy on Twitter: how much is too much? Privacy issues on Twitter,”The annual meeting

of the international communication Association, Singapore, pp. 1-29, 2010.

4. J. Vosecky, D. Hong, and V. Y. Shen, User identification across multiple social networks. In First International Conference on

Networked Digital Technologies, pages. 360-365. 2009.

5. A. Esfandyari, M. Zignani, S. Gaito, G. P. Rossi, “User identification across online social networks in practice:Pitfalls and solution,”

Journal of Information Science, Vol. 44, no. 3, pages, 377-391,2018.

6. K. Shu, S. Wang, J. Tang, R. Zafarani, and H. Liu, User Identity Linkage across Online Social Networks: A Review. ACM SIGKDD

Explorations Newsletter vol. 18, no. 2: pages 5-17, 2017.

7. A. Malhotra, L. Totti, W. J. Meira, P. Kumaraguru, and V. Almeida, Studying user footprints in different online social networks. In

International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 1065-1070, 2012

8. M. Marti, and G. Varghese, "I seek you: searching and matching individuals in social networks," Proceedings of the eleventh

international workshop on Web information and data management, ACM.67-75, 2009.

9. E. Raad, R. Chbeir, & 2010.

10. Z. Cheng ,J. Caverlee and K. Lee “You are Where you Tweet: a Content-Based Approach to Geo-locating Twitter Users’,” In

Proceedings, of the 19th ACM International Conference on Information and Knowledge Management, Toronto, Canada, pp. 759–768, 2010.

11. O. Goga, H. Lei, S.H.K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira, "Exploiting innocuous activity for correlating users

across sites," In Proceedings of the 22nd international conference on World Wide Web, 447-458, 2013.

12. Li, G. A. Wang, and H. Chen, "Identity matching using personal and social identity features," Information Systems Frontiers, vol. 13,

no. 1, pages 101-113, 2011.

13. O. Goga, , D. Perito, H. Lei, R. Teixeira, and R. Sommer, "Large-scale correlation of accounts across social networks," University of

California at Berkeley, Berkeley, California, Tech. Rep. TR-13-002, 2013.

14. O. Peled, M. Fire, L. Rokach, and Y.Elovici, "Entity matching in online social networks," In International Conference on Social

Computing (SocialCom), pages 339-344, 2013P.

15. O. Goga, H. Lei, S.H.K. Parthasarathi, G. Friedland, R. Sommer, and R.Teixeira, Exploiting innocuous activity for correlating users

across sites.In Proceedings of the 22nd international conference on World Wide Web, pages 447-458, 2013

16. A. Narayanan and V. Shmatikov, De-anonymizing social networks. In Proceedings Of the 30th IEEE Symposium on Security and

Privacy, pages 173-187, 2009

17. S. Bartunov, A. Korshunov , S. Park, W, Ryu., and H. Lee, Joint link-attribute user identity resolution in online social networks. The

6th SNA-KDD Workshop, 2012

59-64

Page 62: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

18. N. Korula, and S. Lattanzi, An efficient reconciliation algorithm for social networks.In proceedings of the VLDB Endowment, vol. 7,

no. 5, pages377-388, 2014

19. K. Shu, S. Wang, J. Tang, R. Zafarani, and H. Liu, User Identity Linkage across Online Social Networks: A Review. ACM SIGKDD

Explorations Newsletter vol. 18, no. 2: pages 5-17, 2017

20. S. Tan, Z. Guan, D. Cai, X. Qin, J. Bu, and C. Chen, Mapping users across networks by manifold alignment on hypergraph, In AAAI,

vol. 14, pages 159-165. 2014

21. X. Zhou, X. Liang, H. Zhang, and Y. Ma, "Cross-platform identification of anonymous identical users in multiple social media

networks," IEEE transactions on knowledge and data engineering, vol. 28, no. 2, pages.411-424, 2016.

22. X. Zhou, X. Liang, X. Du, and J. Zhao, "Structure based user identification across social networks," IEEE Transactions on Knowledge

and Data Engineering, 30(6),1178-1191,2018.

23. Yongjun L.I., and Su, Z. A Comment on “Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media

Networks,” IEEE Transactions on Knowledge and Data Engineering, 30(7),1409-1410,2018.

24. P. Jain, P. Kumaraguru and A. Joshi, @ i seek'fb.Me': "Identifying users across multiple online social networks," In Proceedings of

the 22nd international conference on World Wide Web ,pages 1259-1268, 2013.

25. W. Cohen, P. Ravikumar, and S.Fienberg, A comparison of string metrics for matching names and records. In Kdd workshop on data

cleaning and object consolidation Vol. 3, pages. 73-78, 2003.

26. http://nptlab.di.unimi.it/?page_id=360. (last accessed 02/29/2019).

63.

Authors: Smriti Bhatnagar, Shubham Sharma

Paper Title: Brain Tumor Extraction and Classification from MRI Images

Abstract: This paper proposes a methodology in which detection, extraction and classification of brain tumour

is done with the help of a patient’s MRI image. Processing of medical images is currently a huge emerging issue

and it has attracted lots of research all over the globe. Several techniques have been developed so far to process

the images efficiently and extract out their important features. The paper describes certain strategies including

some noise removal filters, grayscaling, segmentation along with morphological operations which are needed to

extract out the features from the input image and SVM classifier for classification purpose.

Keywords: Grayscaling, MRI, Morphological operations, MATLAB, Segmentation, SVM Classifier

References: 1. Ehab F. Badran, Esraa Galal Mahmoud, and Nadder Hamdy, ‘‘An Algorithm for Detecting Brain Tumours in MRI Images”

Department of Electronics and Communications Engineering Arab Academy for Science and Technology & Maritime Transport Alexandria, November 2010.

2. Chang Wen Chen, Jiebo Luo and Parker, K.J, “Image segmentation via adaptive K-mean clustering and knowledge-based

morphological operations with biomedical applications”, IEEE Transactions on Image Processing, Vol. 7, Issue 12, 1998.

3. W. Gonzalez, “Digital Image Processing”, 2nd ed. Prentice Hall, Year of Publication 2008, Page no 378.

4. Y. Zhang, L. Wu, “An MRI Brain Image Classifier via Principal Component Analysis and Kernel Support Vector Machine”, Progress

In Electromagnetic Research, Vol. 130, 369-388, 2012.

5. Vijay Kumar and Priyanka Gupta, “Importance of Statistical Measures in Digital Image Processing”, International Journal of

Emerging Technology and Advanced Engineering, Volume 2, Issue 8, August 2012.

65-69

64.

Authors: Manish Sharma, Prakash Bahrani

Paper Title: Issues and handy Solutions addressed at every stage in real time data warehousing, i.e. ETL

(Extraction, Transformation & Loading) Abstract: In the standard ETL (Extract Processing Load), the data warehouse refreshment must be performed

outside of peak hours. iIt implies ithat the ifunctioning and ianalysis has stopped in their iall actions. iIt causes

the iamount of icleanness of idata from the idata Warehouse which iisn't suggesting ithe latest ioperational

transections. This iissue is iknown as idata ilatency. The data warehousing is iemployed to ibe a iremedy for ithis

iissue. It updates the idata warehouse iat a inear real-time iFashion, instantly after data found from the data

source. Therefore, data ilatency could ibe reduced. Hence the near real time data warehousing was having issues

which was not identified in traditional ETL. This paper claims to communicate the issues and accessible options

at every point iin the inear real-time idata warehousing, i.e. iThe iissues and Available alternatives iare based ion

ia literature ireview by additional iStudy that ifocus ion near real-time data iwarehousing issue.

Keywords: Business Intelligence, Data Latency, Data Warehouse, Data Warehousing, ETL, Near Real Time

Data Warehousin

References: 1. E. Low, L. No, B. Windows, and L. Costs, “Efficient and Real Time Data Integration With Change Data Capture,” Integr. Vlsi J., no.

Cdc, pp. 1–20, 2009.

2. R. J. Davenport, “ETL vs ELT,” no. June, 2008.

3. G. Swetha, D. Karunanithi, and K. A. Lakshmi, “Data Integration Models for Operational Data Warehousing,” vol. 3, no. 2, pp. 508–

516, 2014.

4. R. S, S. Balaji. B, and N. K. Karthikeyan, “From Data Warehouses to Streaming Warehouses: A Survey on the Challenges for Real-

Time Data Warehousing and Available Solutions,” Int. J. Comput. Appl., vol. 81, no. 2, pp. 15–18, 2013.

5. A. A. Wani and B. L. Raina, “Data in Data Warehouse and its Qualities Issues,” no. 9, pp. 1753–1756, 2019.

6. K. Kakish and T. A. Kraft, “ETL Evolution for Real-Time Data Warehousing,” Proc. Conf. Inf. Syst. Appl. Res., p. 12, 2012.

7. N. Rahman, “Refreshing Data Warehouses with Near Real-Time Updates,” J. Comput. Inf. Syst., vol. 4417, no. Spring, p. 70, 2007.

8. A. A. Wani, U. Chandra, P. Bansi, and L. Raina, “Security Challenge in Big Data for Behaviour Analytics,” vol. 5, no. 7, pp. 578–581,

2018.

9. R. J. Santos and J. Bernardino, “Real-time data warehouse loading methodology,” p. 49, 2008.

10. A. A. Wani, A. Khan, A. Jamal, and P. K. Gupta, “Cost Efficient Media Cloud Storage and Systematic Risks Involved in the Cloud

Computing,” no. 9, pp. 2466–2469, 2019.

70-74

Page 63: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

11. A. A. Wani, “Discovery of knowledge by using Data warehousing as well as ETL processing.”

12. M. A. Naeem, G. Dobbie, and G. Weber, “An event-based near real-time data integration architecture,” Proc. - IEEE Int. Enterp.

Distrib. Object Comput. Work. EDOC, no. April, pp. 401–404, 2008.

13. D. Agrawal, “The reality of real-time business intelligence,” Lect. Notes Bus. Inf. Process., vol. 27 LNBIP, pp. 75–88, 2009.

14. J. Zuters, “Near real-time data warehousing with multi-stage trickle and flip,” Lect. Notes Bus. Inf. Process., vol. 90 LNBIP, pp. 73–

82, 2011.

65.

Authors: Sukhmeet Singh, Paras Chawla, Ishbir Singh

Paper Title: A Robotic Automated Vegetable Making Machine

Abstract: The process of cooking by robot has been drawing the attention of professionals and researchers. But

not many researches have been done on this topic all over the world. The main purpose of this paper is to find

the gaps from the systematic review on cooking robot. This systematic review was conducted according to

PRISMA guidelines. For evidence acquisition we searched IEEE, Science Direct and Web of Science libraries.

The last search was performed on March 29, 2019 by us. We identified 3416 publications from initial search, out

of which 19 publications were retrieved. Out of these 19 publications 10 publications were excluded due to

duplicate publication. But only 6 publications are of our interest.

Keywords: Robot, cook, dish

References: 1. Y. Nakauchi, T. Fukuda, K. Noguchi, and T. Matsubara, “Intelligent kitchen: Cooking support by LCD and mobile robot with IC-

labeled objects,” in 2005 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS, VOLS 1-

4, 2005, pp. 2464–2469.

2. H. Rong, X. Dai, and X. Liu, “Trajectory Planning Method of the Pot in Cooking Robot,” in 2010 2ND INTERNATIONAL ASIA

CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 1, 2010, pp. 129–132.

3. Y. Chen, Z. Deng, and B. Li, “Numerical simulations of motion behaviors of pan mechanism in a cooking robot with granular

cuisine,” J. Mech. Sci. Technol., vol. 25, no. 3, pp. 803–808, Mar. 2011.

4. S. Taki, K. Fujimoto, H. Osaki, Y. Munesawa, and Y. Kajihara, “Generating method of procedure for cutting ingredient by cooking

robot,” in ICIM’ 2004: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON INDUSTRIAL

MANAGEMENT, 2004, pp. 32–37.

5. D. Sakamoto, Y. Sugiura, M. Inami, and T. Igarashi, “Graphical Instruction for Home Robots,” 2016.

6. W. X. Yan et al., “A novel automatic cooking robot for Chinese dishes,” Robotica, vol. 25, no. 4, pp. 445–450, 2007.

7. K. Yamazaki, Y. Watanabe, K. Nagahama, K. Okada, and M. Inaba, “Recognition and Manipulation Integration for a Daily Assistive

Robot Working on Kitchen Environments,” pp. 196–201, 2010.

8. J. Wei and A. D. Cheok, “Foodie : Play with Your Food Promote Interaction and Fun with Edible Interface,” vol. 58, no. 2, pp. 178–

183, 2012.

9. Y. Matsushima, N. Funabiki, T. Okada, T. Nakanishi, and K. Watanabe, “A Cooking Guidance Function on Android Tablet for

Homemade Cooking Assistance System,” pp. 249–254, 2013.

10. N. Yoshida, T. Yoshimi, M. Mizukawa, and Y. Ando, “A study of egg breaking motion by single robot arm,” in 2013 32ND

CHINESE CONTROL CONFERENCE (CCC), 2013, pp. 6057–6062.

11. M. Sutiono, H. Nugroho, and K. Karyono, “Appliance Hub : A Wireless Communication System for Smart Devices ( Case Study :

Smart Rice Cooker ),” no. 978, pp. 125–130, 2016.

75-76

66.

Authors: Prashant Kamidi, Vamshi Krishna Sabbi, Ramakrishna Sanniti

Paper Title: IoT Based Smart Water Quality Monitoring and Prediction System

Abstract: As indicated by Human Rights Watch, twenty million individuals in our nation are as yet drinking

water defiled with arsenic. The World wellbeing Organization (WHO) has likewise expressed this emergency as

"the biggest mass harming of a populace ever". To diminish the water related ailments and avoid water

populace, we need to quantify water parameters, for example, ph, turbidity, conductivity, temperature and so on.

Conventional approach of water observing requires gathering information from different sources physically. A

while later examples will send lab for testing and breaking down. So as to spare time utilization and diminishing

manual exertion my testing supplies will be put in any water source. Thus, this model can distinguish

contamination remotely and take essential activities. The primary objective of this paper to assemble a Sensor-

based Water Quality Monitoring System. Arduino Mega 2560 go about as a base station and information from

sensor hubs will be send to it. For the scholastic reason, this paper exhibits a little model of sensor systems

comprising of temperature, water level, stream and ph. At that point ph and temperature sensor esteems were

sent cloud stage (ARTIK cloud) and showed as a graphical portrayal on a neighborhood PC. In addition, GSM

shield (SIM808) is associated with Arduino Mega which thinks about sensor esteems to edge esteems and sends

a text-based notification to the operator if the got esteem is above or underneath the edge esteem. The

aftereffects of this undertaking are talked about in the outcome area of the paper. We tried three water tests from

three diverse water sources, (for example, modern water, faucet water and pool water). Three water tests

gathered from three distinctive swimming pools.(Except one example) Ph esteem found in rest of the examples

were in typical range (temperature esteem between 26-27'C). Result segment (in page 20) clarifies our venture

discoveries in subtleties.

Keywords: Artefacts; Framework; Feature Extraction; Ontology; Query Processing

References: 1. Emmanuel ani, “Water Quality Monitoring and Notification System,” May 4, 2016.[Online].Available:

https://www.hackster.io/eani/water‐quality‐monitoring‐and‐notification‐ system‐f85d23

2. Hao Jei chan, “Water Quality Monitoring System,” March 9, 2017. [Online]. Available:

77-82

Page 64: InternationalJournalofEngineering International Journal of … · 2019-09-19 · Exploring Innovation w ... (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department

https://www.hackster.io/chanhj/water‐quality‐monitoring‐system‐ddcb43

3. M N Barabde, S R Danve, “A Review on Water Quality Monitoring System”, In Proceedings of International Journal of VLSI and

Embedded Systems‐IJVES, Vol 06, Article 03543; March 2015, pp. 1475‐1479.

4. S.Silva, N. Hoang Nghia, V. Tiporlini, and k.Alameh, “Web based water quality monitoring with sensor network: Employing zigbee

and wimax technologies,” in High Capacity Optical Networks and Enabling technologies (HONET). IEEE, 2011, pp. 138 -142.

5. A.S. Rao, D.Izadi, R.F Tellis, S.W Ekanayake, and P.N. Pathairana “ Data monitoring sensor network for biggest research testbed,” in

2009 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP). New York, USA:

IEEE, 2009. pp. 169- 173.

6. Wang X, Ma L and Yang H,”Online Water Monitoring System Based on ZigBee and GPRS,” In Proceedings of Procedia Engineering.

ScienceDirect, 2011, 2680‐2684.

7. Nasser, N., Ali, A., Karim, L., & Belhaouari, S. (2013). An efficient Wireless Sensor Network‐ based water quality monitoring system.

In 2013 ACS inter‐national conference on computer systems and applications (AICCSA) (pp.1–4).

8.

9. Rao, A.S., Marshall, S., Gubbi, J., Palaniswami, M., Sinnott, R.O., & Pettigrovet, V. (2013). Design of low‐cost autonomous water

quality monitoring system. 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI),

14‐19.

10. Das, Brinda and P. C. Jain. “Real‐time water quality monitoring system using Internet of Things.” 2017 International Conference on

Computer, Communications and Electronics (Comptelix) (2017): 78‐82.

11. S.Wadekar, V.Vakare, R.Prajapati, Shivam Yadav and V.Yadav,” Smart Water Management using IOT,”In Proceedings of 5th

International conference on Wireless Networks and embedded System (WECON),2016.

12. M. Zennaro, A. Floros, G. Dogan , S.Tao, C.Zhichao, H. Chen, M. Bahader, H. Ntareme, and A.Bagula, “ On the design of a water

quality wireless sensor network (wqwsn) : An application to water quality monitoring in Malawi,” in International Conference on Parallel Processing Workshops (ICPPW ’09). IEEE.

13. Cloete N.A, Malekain R and Nair L “Design of Smart Sensors for Real-Time Water Quality Monitoring” In Proceedings of IEEE

Access. IEEE, 16 July 2016, page. 3 3975 - 3990.

14. ARTIK Cloud Developer,” ARTIK Cloud – via Arduino”

[online]available:https://developer.artik.io/documentation/advanced‐concepts/mqtt/color‐mqtt‐ arduino.html.

15. Keshtgari, M. (2012). A wireless sensor network solution for precision agriculture based on zigbee technology. Wireless Sensor

Network, 4(1), 25-30.

16. N. Chaamwe, “Wireless sensor networks for water quality monitoring: A case of Zambia ,” in 2010 4th International Conference on

Bioinformatics and Biomedical Engineering (icBBE). EEE, 2010, pp 1‐6.