International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor,...

100

Transcript of International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor,...

Page 1: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence
Page 2: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Editor-In-Chief Chair Dr. Shiv Kumar

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE

Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal

(M.P.), India

Associated Editor-In-Chief Chair Dr. Dinesh Varshney

Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota

Ph.D. (CSE), MCA, MSc (Mathematics)

Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

Ph.D(CSE), MS(CSE), BSc(EE)

Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime

Transport, Egypt

Dr. Mayank Singh

PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT

Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-

Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker

Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)

Stamford, USA.

Dr. Shanmugha Priya. Pon

Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East

Africa, Tanzania

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,

China.

Dr. Fadiya Samson Oluwaseun

Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

Cyprus, Turkey.

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra

Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair Dr. Deepak Garg

Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue

Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Page 3: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura, Egypt.

Dr. Hugo A.F.A. Santos

ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia

Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg

Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng

Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas

Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov

Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr. Ch.V. Raghavendran

Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang

Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,

Hochiminh, Vietnam.

Dr. Wilson Udo Udofia

Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Manager Chair Mr. Jitendra Kumar Sen

Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair Dr. Sameh Ghanem Salem Zaghloul

Department of Radar, Military Technical College, Cairo Governorate, Egypt.

Editorial Members Dr. Uma Shanker

Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India

Dr. Rama Shanker

Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumar

Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India

Dr. Brijesh Singh

Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,

Ahmedabad (Gujarat), India.

Page 4: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

S.

No

Volume-8 Issue-9S3, June 2019, ISSN: 2278-3075 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Page

No.

1.

Authors: A.G. Arzamascev, A.I. Sharapov, A.V. Peshkova

Paper Title: Analysis of the Efficiency of Circuits Using Natural Gas Additional Energy Potentials on Cogenerating

Boiler Houses with Internal Combustion Engines

Abstract: The article studies the energy efficiency of various circuits using the energy of natural gas excessive

pressure in expander-generator units installed before gas reciprocating engines in cogeneration boiler houses. The

circuits with and without gas heating before the expander are considered. As an energy effect from the expander

use at the cogeneration boiler house fuel economy is taken as compared with the circuits with gas throttling with

constant production schedules of electrical and thermal power. The dependence on specific fuel economy

determination is obtained. For the circuits being compared, the areas of the energy effect magnitude dependence

on the outside temperature are allocated. It is shown that the circuit with heated gas before the expander will have

the greatest energy effect at the outside air temperature up to the value corresponding to the equal values of

specific fuel economy for the considered circuits and with disconnection of gas heating at higher air temperatures.

The method proposed in the paper can be used to calculate the energy effect from various circuits of the expander

application in cogeneration boiler houses with internal combustion engine both in exisiting ones and the ones

which are under design.

Keywords: expander-generator set, cogeneration boiler house, energy efficiency.

References: 1. A.D.Hawkes and M. A. Leach, «Cost-effective operating strategy for residential micro-combined heat and power», Energy, 2007, vol. 32,

no. 5, pp. 711-723.

2. M.Liu, Y.Shi, and F.Fang, «Combined cooling heating and power systems: A survey. Renewable Sustain», Energy, 2014, vol. 35, pp. 1-

22.

3. A.Cleveland, «Power Generation with Turbo-expander», The American Society of Mechanical Engineers», 1990, vol.90, no 2, pp. 26-31.

4. H.P.Bloch and S.Claire, Turboexpander and Process Applications, Boston, Gulf Professional Publishing, 2001.

5. D.Krähenbühl, C.Zwyssig, H.Weser, and J. W. Kolar, «Theoretical and experimental results of a mesoscale electric power generation

system from pressurized gas flow», IOP Publishing, Journal of Micromechanics and Microengineering, 2009, no 19, pp. 1-7.

6. H.Daneshi, Z. Khorashadi, and A. Lotfjou, «Turboexpander as a distributed generator», Power and Energy Society General Meeting -

Conversion and Delivery of Electrical Energy in the 21st Century. New York, 2008, pp. 1–7.

7. J. M.Taleshian, H.Rastegar, and M.Pichan, «Voltage improvement using a new control strategy for turbo-expander driving systems»,

Electrical Power and Energy Systems, 2015, vol. 64, pp. 1176–1184.

8. J.Peirs, D.Reynaerts, and F.Verplaetsen, «A microturbine for electric power generation. Sensors and Actuators», 2004, vol.113, pp. 86–

93, 2004.

9. S.Quoilin, V.Lemort, and J.Lebrun, «Experimental study and modeling of an Organic Rankine Cycle using scroll expander», Applied

Energy, 2010, vol.87, pp. 1260–1268.

10. V.Lemort, S.Quoilin, C.Cuevas, and J.Lebrun, «Testing and modeling a scroll expander integrated into an Organic Rankine Cycle»,

Applied Thermal Engineering, 2009, vol.29, pp. 3094–3102.

11. A. Truston, «Recovering energy in gas pressure reduction», Contr. And Instrum, 1991,vol.23, no 5, pp.115–118.

12. A.Yu.Kartel, V.Ya.Gubarev, and A.G.Arzamascev, «Study of the features of expander-generator units application at cogeneration boiler-

houses with internal combustion engines», Bulletin of CSTU (Chelyabinsk State Technical University),2018,no 1,pp. 20 - 27.

13. B.T.Mehdi and H.Rastegar, «Modular Modeling of Turbo-Expander Driven Generators for Power System Studies», Transactions on

Electrical and Electronic Engineering, IEEJ Trans., 2009, vol.4, pp. 645–653.

14. B.T.Mehdi and H.Rastegar, «Flicker Assessment of Turbo-Expander Driven Synchronous Generator in Power Distribution», Network,

Journal of Iranian Association of Electrical and Electronics Engineers, 2010, no 7, pp. 53-59.

15. T. J. Mehdi, H.Rastegar, and H.Askarian, «Modeling and Power Quality Improvement of Turbo-Expander Driving an Induction»,

Generator,International Journal of Energy Engineering, 2012, no 2, pp. 131-137.

16. M. A.Norouzi, J.Olamaei, and B. G. Gevork, «Compensation of voltage sag and flicker during thermal power -plant turboexpander

operation by dynamic voltage restorer», International Transactions on Electrical Energy Systems, 2015,vol. 26, no 1, pp. 16-31 .

17. T. J.Mehdi, H.Rastegar, and M.Pichan, «Induction generator voltage improvement using a new control strategy for turbo-expander

driving systems», International Journal of Electrical Power & Energy Systems, 2015, vol.64, pp. 68-76.

18. J. D. Maddaloni, and A. M. Rowe, «Natural gas exergy recovery powering distributed hydrogen production», International Journal of

Hydrogen Energy, 2007, vol.32, pp 557–566.

19. Mehdi T. J., Hasan R., A. A. Hossein, «Modeling turbo-expander systems», Simulation, 2013, vol.89, no 2, pp. 234-248.

20. I.Wichterle, and R.Kobayashi, «Vapor-liquid equilibrium of methane-ethanepropane system at low temperatures and high pressures»,

Journal of Chemical and Engineering Data, 1972, vol.17, no 1, pp.13-18.

21. H.C.Weise, J.Jacobs, and B.H. Sage, «Phase equilibria in the hydrocarbon systems», Phase behavior in the methane-propane-n-butane

system, Journal of Chemical and Engineering Data, 1970, vol.15, no 1, pp.82-91.

22. R. Aungier, Turbine aerodynamics: axial-flow and radial-flow turbine design and analysys, NewYork, The American Society of

Mechanical Engineers, 2006.

23. G.V.Nimich, V.A. Mikhailov, and E.S. Bondar, Modern systems of ventilation and air conditioning , Pub.: Ivik, 2003.

1-6

2.

Authors: Viktor Telegin, Igor Telegin

Paper Title: Solid Modeling in Professional Training of Specialists for Machine-building Enterprises

Abstract: The article considers the structure of the discipline “Engineering Graphics” which is based on the

modern solid modeling technologies in the environment of software products made by Autodesk, and on

traditional methods of Descriptive geometry, Mechanical drawing and Design planning. The characteristic of

modern PDM-technologies is given. Special attention is paid to the issues of traditional and modern design

methods compatibility. The objectives of the course “Engineering Graphics” are outlined. Some examples of

graphic work, training and control methods are given. The place of the discipline “Engineering Graphics” in the

7-9

Page 5: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

General structure of educational process of training of highly qualified specialists for machine-building enterprises

is defined.

Keywords: Solid Modeling, Professional Training, Machine Building

References: 1. S.A.Smyslov,T N.V.Nosov,T V.N.Mihelkevich,T A.B.Puzankova,T TheT competence-basedT approachT toT theT design-technologyT

preparationT ofT bachelorsT forT theT enterprisesT ofT theT machine-buildingT cluster,T NewsT ofT theT SamaraT ScientificT CenterT ofT theT RussianT AcademyT ofT Sciences,T v.T 15(2-4),T pp.T 930-934T (2013)

2. V.V.T Telegin,T A.M.T Kozlov,T V.I.T Sakalo,T SolidT ModelingT andT DynamicT AnalysisT ofT MechanismsT ofT Press-forgingT

Machines,T ProcediaT Engineering,T v.T 206,T pp.T 1258-1263T (2017) 3. V.V.T Теlegin,T A.M.T Kozlov,T A.V.T Кirichek,T SolidT ModelingT inT AutodeskT InventorT atT InitialT StageT ofT TrainingT ofT

SpecialistsT inT FieldT MechanicalT Engineering,T ICIET 2018:T ProceedingsT ofT theT 4thT InternationalT ConferenceT onT

IndustrialT Engineering,T pp.T 1241-1247T (2018) 4. V.T Telegin,T A.T Kozlov,T T.T Shumilova,T DevelopmentT andT researchT ofT theT rotatingT leverT objectT asT aT dynamicT

modelT ofT aT cycleT mechanism,T MATECT WebT Conf.T InternationalT ConferenceT onT ModernT TrendsT inT ManufacturingT

TechnologiesT andT EquipmentT (ICMTMTET 2018),T v.T 224,T pp.T 02078T (2018) 5. I.V.T Revina,T G.N.T Boyarkin,T SimulationT ofT productionT processT manufacturingT parts,T OmskT scientificT bulletin,T v.T

6(162),T pp.T 230-234T (2018)

6. I.V.T Telegin,T V.V.T Telegin,T MathematicalT modelT ofT theT partT shapeT andT automationT onT itsT basisT ofT theT processT

ofT developingT theT drawingT parametersT ofT theT axisymmetricT forging,T TheT TurkishT OnlineT JournalT ofT Design,T ArtT

andT CommunicationT –T TOJDACT ISSN:T 2146-5193,T v.T 8(MarchT 2018T SpecialT Edition),T pp.T 458-464T (2018)

7. I.T Telegin,T T.T Shumilova,T ComparingT theT efficiencyT ofT flowsheetsT forT hotT dieT forgingT onT crankT presses,T MATECT WebT Conf.T InternationalT ConferenceT onT ModernT TrendsT inT ManufacturingT TechnologiesT andT EquipmentT (ICMTMTET

2018),T v.T 224,T pp.T 01092T (2018)

8. I.V.T Telegin,T I.M.T Volodin,T P.I.T Zolotukhin,T TheT mathematicalT modelingT forT assessingT theT effectivenessT ofT hotT forgingT extrudedT roundT inT planT forgingsT onT crankT presses,T InternationalT JournalT ofT EngineeringT andT

Technology(UAE),T v.T 7(2),T pp.T 30-34T (2018)

9. ProductT LifecycleT ManagementT (TAdviserT –T RussianT InternetT portalT andT analyticalT agency,T 2010) 10. ImprovingT theT efficiencyT ofT designT usingT BIM-technologiesT (StinsT Coman,T 2016)

11. V.I.T Seregin,T L.S.T Senchenkova,T N.G.T Surkova,T T.L.T Beloborodova,T ElectronicT geometricT modelsT inT theT structureT ofT

“EngineeringT Graphics”T course,T InternationalT scientificT researchT journal,T v.T 8(62),T pp.T 88-93T (2017) 12. Yu.A.T Korolev,T S.Yu.T Ustyuzhanin,T EngineeringT Graphics:T TextbookT forT universities.T TheT standardT ofT theT thirdT

generationT (SPb.:T Peter,T 2011)

13. L.G.T Polubinskaya,T A.P.T Fedorenkov,T T.R.T Khusnetdinov,T ComputerT graphicsT inT theT courseT “EngineeringT Graphics”,T VIIT InternationalT ScientificT andT PracticalT InternetT ConferenceT “ProblemsT ofT theT qualityT ofT graphicT trainingT ofT

studentsT inT aT technicalT college:T traditionsT andT innovations”T (KGP-2017)

14. D.A.T Yakhnovets,T LitemanagerT (CertificateT ofT State.T reg.T computerT programsT №2011618072T RussianT Federation,T 2011) 15. I.V.T Demyanovich,T Computer-basedT testingT asT aT meansT ofT assessmentT ofT higherT educationT studentsT competences,T

ModernT educationalT process:T questionsT ofT theoryT andT practice.T CollectionT ofT worksT ofT theT interregionalT scientificT

andT methodologicalT conference:T inT 2T volumes,T pp.T 47-51T (2018)

3.

Authors: Nikolay Ligkiy*

Paper Title: Occupational Safety Control is a Way to Reduce workplace Injuries at Manufacturing Plants

Abstract: This article analysis causes of injury at the manufacturing plants that have a high level of risk and

explains a need to control the occupational safety and comply with work procedures. An author provides

quantitative and qualitative performance indicators at all levels. The article also explains a mathematical model of

observations and evaluates its accuracy and adequacy in the context of the decision-making conditions. Finally,

there are findings on correlation between the number of detected safety violations and experience of an observer.

Keywords: occupational injuries, occupational safety, control, observer, observer experience

References: 1. N.M. Legkiy, I.V. Unchenko, “Formation Of The Direction Diagram In Phased Antenna Array” Rossiyskiy tekhnologicheskiy zhurnal

(Russian Technological Journal). 2019; 7(2): 29-38. (in Russ.). DOI: 10.32362/2500-316X-2019-7-2-29-38.

2. URL https://rtj.mirea.ru/upload/medialibrary/763/RTZH_2_2019_29_38.pdf

3. A.A. Pastushkov, V.K. Batovrin, “Selection Of Solutions For Designing Open Systems Based On Analysis Of Variants With Random

Weights” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal). 2018; 6(4): 78-88. (in Russ.).

4. URL https://rtj.mirea.ru/upload/medialibrary/bf5/RTZH_4_2018_78_88.pdf

5. M.L. Chipman, “Injury Control: A Guide To Research And Program Evaluation” American Journal of Epidemiology. 2001. V. 154. № 3.

P. 285-a.

6. C. Peek-Asa , C. Zwerling, “Role Of Environmental Interventions In Injury Control And Prevention” Epidemiologic Reviews. 2003. V.

25. № 1. P. 77.

7. T. Virén, S. Saarakkala, J.S. Jurvelin, J. Töyräs, V. Tiitu, J. Puhakka, I. Kiviranta, “Ultrasound Evaluation Of Mechanical Injury Of

Bovine Knee Articular Cartilage Under Arthroscopic Control” IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control.

2011. V. 58. № 1. P. 148-155.

8. V.B. Artemyev, A.B. Kilin, G.N. Shapovalenko, A.V. Osharov, S.N. Radionov, I.L. Kravchuk, “The Concept Of Advanced Control As A

Means Of Significantly Reducing Injuries” Magazine “COAL”, May, 2013, P. 82 -85.(in Russ.).

10-12

4.

Authors: Irina Gukova, Dmitry Nechaev, Ludmila Polovneva, Alla Krivets and Ekaterina Berdnik

Paper Title: Youth Political Participation in Russia: Influence of Voluntary Associations

Abstract: Studying the reasons for youth political participation, and how young people get involved in political

activities is an important issue for both developed and developing countries. Research in this area started from

general tendencies and then moved to specific country factors. The purpose of this research is to determine the

relationship, in Russia, between participation in voluntary associations during education and political participation

during adulthood. Previously, there was no research in this field for Russia. In the research non-parametric tests for

13-22

Page 6: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

K independent samples, descriptive statistics, logistical regression, and factor analysis were applied. The main data

source is the Russia Longitudinal Monitoring Survey. The key result is that involvement in voluntary associations

during education, especially in political ones, positively affects future youth political participation. Education and

income also have positive effects. Russia is generally similar to other countries, including developed, developing,

and post-soviet ones. In post-soviet countries, the key interdependencies are similar to Russia, but not so clearly

expressed. In Russia, employed young people vote with less probability than unemployed ones, whereas in Belarus

we see the opposite.

Keywords: political participation; voluntary association; extracurricular activities; political involvement; youth;

voting; political opinion expressing; logistics regression; factor analysis.

References: 1. Acharya, Rajib, et al. 2010. "Participation in civil society and political life among young people in Maharashtra: Findings from the Youth

in India-Situation and Needs study." Journal of adolescence 33.4: 553-561.https://doi.org/10.1016/j.adolescence.2009.05.012 2. Andolina, Molly W., et al. 2002. "Searching for the meaning of youth civic engagement: Notes from the field." Applied Developmental

Science 6.4: 189-195.https://doi.org/10.1207/S1532480XADS0604_5.

3. Campbell, David E. 2006"What is education’s impact on civic and social engagement." Measuring the effects of education on health and civic engagement: Proceedings of the Copenhagen symposium,Copenhagen, September 2006.

4. Deth Jan W. van. 2016. "What is Political Participation?" .Subject: Political Behavior, Political Sociology

Onlinehttps://doi.org/10.1093/acrefore/9780190228637.013.68. 5. Ekström, Mats, and Johan Östman. 2015. "Information, interaction, and creative production: The effects of three forms of internet use on

youth democratic engagement." Communication Research 42.6: 796-818.https://doi.org/10.1177/0093650213476295.

6. Eysenck, Hans J.2006.The psychology of politics. Abingdon: Routledge, 2018. ISBN 978-0765804303. 7. Fieulaine, Nicolas, and Frederic Martinez. 2010. "Time under control: Time perspective and desire for control in substance use."

Addictive behaviors 35.8: 799-802.https://doi.org/10.1016/j.addbeh.2010.03.022.

8. Glanville, Jennifer L. 1999. "Political socialization or selection? Adolescent extracurricular participation and political activity in early adulthood." Social science quarterly: 279-290.

9. Hanks, Michael. 1981. "Youth, voluntary associations and political socialization." Social Forces 60.1: 211-

223.https://doi.org/10.1093/sf/60.1.211. 10. Hart, Daniel, et al. 2007. "High school community service as a predictor of adult voting and volunteering." American Educational

Research Journal 44.1: 197-219.https://doi.org/10.3102/0002831206298173.

11. Herrera, Linda. 2012. "Youth and citizenship in the digital age: A view from Egypt." Harvard Educational Review 82.3: 333-352.https://doi.org/10.17763/haer.82.3.88267r117u710300.

12. Holland, Alyce, and Thomas Andre. 1987. "Participation in extracurricular activities in secondary school: What is known, what needs to

be known?" Review of Educational Research 57.4: 437-466.https://doi.org/10.3102/00346543057004437. 13. Kahne, Joseph, and Ellen Middaugh. 2012. "Digital media shapes youth participation in politics." Phi Delta Kappan 94.3 (2012): 52-

56.https://doi.org/10.1177/003172171209400312.

14. Kahne, Joseph, David Crow, and Nam‐Jin Lee. 2013. "Different pedagogy, different politics: High school learning opportunities and

youth political engagement." Political Psychology 34.3: 419-441.https://doi.org/10.1111/j.1467-9221.2012.00936.x. 15. Kahne, Joseph, Ellen Middaugh, and Danielle Allen. 2015. "Youth, new media, and the rise of participatory politics." InFrom voice to

influence: Understanding citizenship in a digital age. Edited by Allen, Danielle, and Jennifer S. Light. Chicago: University of Chicago

Press, pp. 35-56. ISBN 978-0226262260. 16. Marta, Elena, Chiara Guglielmetti, and Maura Pozzi. 2006. "Volunteerism during young adulthood: An Italian investigation into

motivational patterns." Voluntas: International Journal of Voluntary and Nonprofit Organizations 17.3:

221.https://doi.org/10.1007/s11266-006-9015-3. 17. McAllister, Ian, and Stephen White. 1994. "Political participation in Postcommunist Russia: voting, activism, and the potential for mass

protest." Political Studies 42.4: 593-615.https://doi.org/10.1111/j.1467-9248.1994.tb00300.x.

18. McFarland, Daniel A., and Reuben J. Thomas. 2006. "Bowling young: How youth voluntary associations influence adult political participation." American sociological review 71.3: 401-425.https://doi.org/10.1177/000312240607100303.

19. McNeal Jr, Ralph B. 1999. "Participation in high school extracurricular activities: Investigating school effects." Social Science Quarterly:

291-309. 20. Ødegård, Guro, and Frode Berglund. 2008. "Political participation in late modernity among Norwegian youth: an individual choice or a

statement of social class?" Journal of Youth Studies 11.6: 593-610.https://doi.org/10.1080/13676260802247573

21. Pasek, Josh, et al. 2006. "America's youth and community engagement: How use of mass media is related to civic activity and political awareness in 14-to 22-year-olds." Communication Research 33.3: 115-135.https://doi.org/10.1177/0093650206287073.

22. Quintelier, Ellen. 2008. "Who is politically active: The athlete, the scout member or the environmental activist? Young people, voluntary

engagement and political participation." Actasociologica 51.4: 355-370.https://doi.org/10.1177/0001699308097378. 23. Rogers, John, KavithaMediratta, and Seema Shah. 2012. "Building power, learning democracy: Youth organizing as a site of civic

development." Review of Research in Education 36.1: 43-66.https://doi.org/10.3102/0091732X11422328.

24. Settle, Jaime E., Robert Bond, and Justin Levitt. 2011. "The social origins of adult political behavior." American Politics Research 39.2: 239-263.https://doi.org/10.1177/1532673X10382195.

25. Smith, Elizabeth S. 1999. "The effects of investments in thesocial capital of youth on political and civic behavior in young adulthood: A

longitudinal analysis." Political psychology 20.3: 553-580.https://doi.org/10.1111/0162-895X.00156. 26. StarosotskayaEkaterinaV. 2017."Dynamics of political culture of youth: from nihilism by the maturity

[Dinamicapoliticheskoykulturymolodezhi: otnigilizma k zrelosti]." XX International conference in memory of Professor L. N. Kogan

“Culture, personality, society in the modern world: Methodology, experience of empirical research” [XX Mezhdunarodnayakonferenciyapamyatiprofessora L. N. Kogana «Kul'tura, lichnost', obshchestvo v sovremennom mire: Metodologiya,

opytehmpiricheskogoissledovaniya»], Ekaterinburg, 16-18 March 2017.

27. Stolle, Dietlind, and Cesi Cruz. 2005. "Youth Civic Engagement in Canada: implications for public policy." Social Capital in Action 82: 82-144.

28. Wicks, Robert H., et al. 2014. "Correlates of political and civic engagement among youth during the 2012 presidential campaign."

American Behavioral Scientist 58.5 (2014): 622-644.https://doi.org/10.1177/0002764213515226. 29. Wringe, Colin. 2012.Democracy, Schooling and Political Education(RLE Edu K).Abingdon: Routledge. ISBN 978-0415751346.

5.

Authors: D. Shree Jyothi, D. Srinivasa Rao

Paper Title: An Analysis on Perspectives of Investors on Commodity Trading and Risk Management in India

Abstract: Indian commodity market has seen tremendous growth over the past few decades. Investment in

capital market attracts higher risk as the return is higher. It becomes very important to understand the perspectives

of theinvestors in market in order to minimize the risk faced. This will help them accomplish their goal of

22-26

Page 7: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

achieving higher return by minimizing the risk. The aim of the paper is to provide the risk management

perspectives of commodity investors in India. The study concentrates on the aspects like the market and exchange

selected for trading, types of risks faced, method of analysis, technique used for managing risk, percentage of the

investment, advantages and disadvantages of trading in commodity trading etc. The results can be used by the

commodity investors in taking wiser decisions in commodity derivatives investment.Also, hedge their risk

accordingly.

Keywords: Commodities, risk, market, exchange, source.

References: 1. Brajesh Kumar, Ajay Pandey, “International Linkages of the Indian commodity Futures Markets, Modern Economy, Vol 2,2011, pp 213-

227

2. X.E.Xu.H.G.Fund, “Cross-Market Linkages between US and Japanese precious Metals Futures Trading”, International Financial Markets,

Institution and Money, Vol 15,No.2, 2005,pp107-124.

3. Eduardoborensztein and Carmen. Reinhar, “The macroeconomic determinants of commodity prices”, IMF Staff papers, Vol.41,No.2,June

1994

4. RogerJ. B.Wets Ignacio Rios, “Modeling and estimating commodity prices: copper prices”,Math FinanEcon ,Vol 9,2015, pp247-270.

5. 5.Isita Mukherjee and Bhaskar Goswami, “The volatility of returns from commodity futures:eveidence from India, Financial Innovation,

Vol 3,No. 15, 2017,pp 1-23.

6. Bojana Vukovic,Kristina Mijic, “Risk Management in the Investment process”, International symposium Engineering Management and

competitiveness, June,2011

7. Dr. Periasamy, “Perception of Investors toward Indian Commodity Derivative Market with Inferential Analysis in Chennai City”,

International Journal of Management Studies, Vol V,No. 3(3), 2018, pp 73-82

8. Lokara, S.M, “Commodity derivatives and price risk management: and empirical anecdote from India”, Reserve Bank of India

Occasional Papers, 28(2), 2017, pp 27-77

9. J.C. Hull, “Options, Futures and other derivatives”, Ninth Edition, 2015, Pearson

6.

Authors: ZyuzinaN.N., KrovopuskovP.A.

Paper Title: Analysis and Assessment of Enterprise “Vtorchermet” Financial Sustainability

Abstract: The success or survival of an organization depends on the information quality provided, at the

modern world. Properly prepared statements will help determine the impact of internal and external factors

affecting the enterprise development. The purpose of the company financial condition analysis is to save financial

resources and increase its financial significance, aimed at improving the use impact, identifying opportunities for

improving the enterprise activities. Any financial statements allow any economic entity to use the adopted system

of financial indicators to attract potential customers, as well as to confirm its reliability as a potential partner.

Making sound management decisions requires the ability to “read” financial statements, which, accordingly,

makes it possible to develop a correct prediction of a future partnership success, since it allows a timely a property

assessment and a partner financial situation. The sustainability assessment of the commercial relationships future

development is necessary both for the companies themselves and for their potential partners who wish to receive

reliable information about the stable financial condition and reliability of their counterparty (client or customer).

For this reason, an increasing potential counterparties circle is involved in conducting research and assessing the

particular company financial sustainability.

Keywords: financial stability, analysis, assessment, financial sustainability indicators.

References: 1. Financial statements analysis: the textbook / Ed. M.A. Vahrushinoy. Moscow: INFRA-M, 2015. 367 pp.

2. Bakanov M.I., Sheremet A.D. Economic analysis theory: the textbook. Moscow: Finance and Statistics, 2014. 416 pp.

3. Barnoglts S.B. Economic analysis of enterprises and associations economic activities. Moscow: Finance and Statistics, 2016. 427 pp.

4. Butynets F.F., SokolovYa.V., Pankov D.D., Goretskaya L.L. Accounting in foreign countries.Zhytomyr: Ruta, 2013. 660 pp.

5. Accounting financial statements: the textbook / Ed. Yu.I. Sigidova and A.I. Trubilin. Moscow: INFRA-M, 2014. 366 pp.

6. Vakulenko T.G., Fomina L.F. Financial statements analysis for management decisions: the textbook. SPb.:Gerda Publishing House, 2015.

457 pp.

7. Vakhrushin M.A. Management accounting. Moscow: Higher Sc., 2014. 528 pp.

8. Vinogradskaya N.A. Diagnostics and optimization of the enterprise financial and economic condition: financial analysis. Moscow:

Publishing House MIS&A, 2014. 217 pp.

9. Voytolovskiy N.V. Economic analysis. Theory Fundamentals.Comprehensive analysis of the organization economic activities. Moscow:

Yurayt, 2014. 576 pp.

10. Wroblewski N.D. Management accounting of production costs and economy production costs in sectors. Moscow: Accounting publishing

house, 2013. 154 pp.

11. Dr. Zyuzina Natalya Nikolaevnais an Assistant Professor at Lipetsk State Technical University, Lipetsk, Russia. Zyuzina Natalya

Nikolaevnais a Candidate of Economic Sciences. E-mail: [email protected]

12. KrovopuskovPavelAnatolyevich is a Head of Science Department at Lipetsk State Technical University, Lipetsk, Russia. E-

mail:[email protected]

27-31

7.

Authors: Telegin Valery Viktorovich

Paper Title: Calculation of Parameters of Energy Flows in a Closed System of Electricity Generation based on

Renewable Sources

Abstract: the article is devoted to the calculation of the generated power in Autonomous power systems based

on wind power plants, photovoltaic panels, small hydroelectric power plants. The model of the designed system is

considered to be closed and contains energy storage modules for accumulating part of the power. The idea of

optimizing the system is based on the determination of the composition of the combined power generation

32-37

Page 8: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

complex, in which the efficiency criteria reach an extremum.

Keywords: wind power plants; photovoltaic panels; small hydroelectric power plants.

References: 1. ZatsepinaT V.I.,T ZatsepinT E.P.,T TeleginT V.V.,T "ElectricityT supplyT ofT consumersT usingT renewableT energyT sources",T

NewsT ofT HigherT EducationalT InstitutionsT ofT theT ChernozemT Region,T 2013,T NoT 2,T pp.T 33-35.T

2. ShkradyukT I.E,T TrendsT inT theT developmentT ofT renewableT energyT sourcesT inT RussiaT andT theT world.T Moscow:T

WWFT Russia,T 2010.

3. LarinT V.T TheT stateT andT prospectsT ofT renewableT energyT sourcesT inT Russia.T M.,T 2006.

4. CetoshnikovaT L.M,T Non-traditionalT renewableT energyT sources.T Chelyabinsk:T SUSU,T 2010.

5. RenewableT EnergyT PolicyT NetworkT forT theT 21stT Century:T renewablesT 2012T globalT statusT report,T 2012.T

6. ShpiganovichT A.N,T TeleginT V.V,T "EnergyT savingT usingT autonomousT sourcesT onT theT basisT ofT alternativeT energyT

technologies",T NewsT ofT higherT educationalT institutionsT ofT theT ChernozemT region,T 2011,T NoT 4,T p.T 15-20.

7. TeleginT V.V,T "ModelingT ofT powerT supplyT systemsT inT theT jointT operationT ofT alternativeT andT traditionalT energyT

sources",T CurrentT trendsT inT science,T technology,T education,T 2016,T pp.T 113-114.

8. TeleginT V.V,T ShpiganovichT A.N,T "SystemsT ofT autonomousT powerT supplyT basedT onT alternativeT energyT technologies",T

Elektrika,T 2012,T No.T 2,T pp.T 17-20.

9. KharitonovT V.P.,T AutonomousT wind-electricT installations.T M:T GNUT VIESKH,T 2006.

10. TeleginT V.V,T "ResearchT ofT theT efficiencyT ofT theT autonomousT powerT supplyT complex",T Energy,T electromechanicsT

andT energy-efficientT technologiesT throughT theT eyesT ofT youth,T TomskT PolytechnicalT University,T Vol.2,T 2016,T ppT 202-

206T

11. VissarionovT V.I,T SolarT powerT engineering.T MT .:T PublishingT houseT MEI,T 2008.

12. AlferovT Zh.I.,T AndreevT V.M,T RumyantsevT V.D,T "TrendsT andT prospectsT ofT solarT photovoltaicsT development",T 2004,T

VolumeT 38,T No.T 8,T pp.T 937-948.T

13. KazhinskyT B.B,T Free-flowT hydroelectricT powerT stationsT ofT lowT power.T Moscow:T Gosplanizdat,T 1950..T

14. KartanbaevT B.A,T ZhumadilovT K.A,T ZazulskyT A.A,T GuidelinesT forT constructionT andT operationT ofT microT hydroelectricT

powerT stationsT (microT HPPs).T B:T "DEMI",T 2011.T

15. ShpiganovichT A.N,T TeleginT V.V,T "EnergyT flowsT inT aT closedT powerT supplyT systemT withT deepT dischargeT batteries",T

NewsT ofT TulaT StateT University.T EngineeringT Sciences,T 2016,T No.T 12-3,T pp.T 40-46.

16. TeleginT V.V.,T "PowerT BalanceT inT theT ElectricityT SupplyT SystemT ofT ConsumersT UsingT RenewableT EnergyT SourcesT

(RES)",T ActualT DirectionsT ofT ResearchT inT theT 21stT Century:T TheoryT andT Practice,T 2013,T No.T 1,T pp.T 141-144.

17. TeleginT V.V,T "DesigningT ofT autonomousT consumerT powerT systems",T TheoreticalT andT AppliedT ProblemsT ofT ScienceT

andT Education,T 2015,T p.T 124-125.

18. ShpiganovichT A.N,T TeleginT V.V,T "ParametersT ofT OptimalT PowerT SupplyT SystemsT withT AlternativeT EnergyT Sources",T

NewsT ofT highT educationalT establishmentsT ofT Chernozemie,T 2016,T NoT 3T (45)T стр.T 39-43.

19. TeleginT V.V,T "OnT theT assessmentT ofT theT electricT potentialT ofT renewableT energyT sourcesT inT aT givenT locality",T

Society,T ModernT ScienceT andT Education:T ProblemsT andT Prospects,T 2012,T 115-117.

20. TeleginT V.V,T "ComputerT modelingT ofT theT efficiencyT ofT usingT alternativeT energyT systems",T NaturalT andT TechnicalT

Sciences,T 2012,T No.T 5T (61),T pp.T 309-312.

21. KrivchenkoT G.I.T HydraulicT machines:T TurbinesT andT pumps.T MT .:T Energia,T 1978.

8.

Authors: Natalia P. Nikonova, Larisa N. Gorina, Linar G. Akhmetov

Paper Title: The Use Of Cloud Technologies In The Modern Educational Process

Abstract: The article describes the features of the use of blog technologies in the educational field. The

relevance of the article is to study the influence of computer technologies on the process of computerization of

education, which is accompanied by the introduction of corrections to the content of learning technologies due to

significant changes in the pedagogical theory and practice of the educational process. The purpose of the article is

to study the process of forming the professional competence of students through the use of such Internet

technologies as a blog. Attention is focused on the problem of determining this Internet technology and its essence

in the educational process. The article also highlighted a number of stable characteristics of blogs and described

the functions performed by blogs.

Keywords: cloud technologies, blog, professional competence, blog, informatization, communication

References: 1. Albekova Z.M. Electronic education systems and cloud technologies in education // Historical and socio-educational thought. 2016. No.

S1. Pp. 6-8.

2. Alzhanova D.I. Advantages of using cloud technologies in education // Problems of modern science and education. 2016. № 3 (45). Pp.

75-77.

3. Anokhina E.V., Godina E.Z., Matukhin P.G., Provotorova E.A., Titova E.P. Online tools for information and methodological support of

distant study of the course "human anatomy" for foreign medical students of the pre-university stage of education based on cloud byod-

technologies microsoft onedrive / word-online // Bulletin of the Center for International Education of Moscow State University. Philology. Culturology. Pedagogy. The technique. 2015. No. 4. P. 33-39.

4. Berstneva S.V., Klyueva M.S., Oskin D.N. The use of cloud technologies in additional vocational education // Collected papers on the

problems of additional vocational education. 2018. No. 35. P. 70-76.

5. Bobrova I.I. Study of the problem of intellectual socialization of subjects of vocational education using cloud computing technologies //

Actual problems of modern science, technology and education. 2016. T. 1. S. 195-198.

6. Kanev M.A. The use of cloud technologies to improve the quality of education in higher education // Psychological, economic and

managerial aspects of educational activities Materials of the correspondence scientific-practical conference. 2014. S. 98-100.

7. Kapustina DD, Potanina M.V. Features of the use of cloud technologies in education // World of Computer Technologies. Collection of

articles of the All-Russian Student Scientific and Technical Conference. Scientific editor E.N. Mashchenko. 2018. pp. 93-95.

8. Karaskova N.S., Soldatenkov R.M. Application of cloud technologies in education on the example of microsoft office 365 // Bulletin of

the Moscow State Regional University. Series: Physics and Mathematics. 2016. No. 1. P. 108-116.

9. Krupoderova K.R. Formation of competencies of bachelors of vocational education in the information environment based on cloud

technologies // Problems of modern pedagogical education. 2016. № 51-6. Pp. 181-188.

38-43

Page 9: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

10. Kurgan G.S. Self-organization of online education in cloud technologies // Bulletin of Buryat State University. 2014. № 9-3. Pp. 27-31.

11. Lozitsky V.L. Information and communication technologies in high school social and humanities education: didactic aspects of the use of

cloud services // Higher School: Navukov-Metadichny and Public Chastopis. 2014. № 5 (103). Pp. 39-44.

12. Sirotkin A.Yu. Pedagogical potential of cloud technologies in higher education // Psychological and pedagogical journal Gaudeamus.

2014. № 2 (24). Pp. 35-42.

13. Shangina E.I., Shangin G.A. Mobile-cloud technologies in modern education // International Research Journal. 2016. № 12-4 (54). Pp.

117-119.

14. Shekerbekova Sh.T., Nesipkaliev U. Opportunities for the introduction and use of cloud technologies in education // International Journal

of Applied and Fundamental Research. 2015. № 6-1. Pp. 51-55.

15. Yaganova A.A. Cloud technologies in education as an element of the development of the information society // Bulletin of the RSUH.

Series: Documentation and archival studies. Computer science. Information security and information security. 2016. № 1 (3). Pp. 9-13.

16. Akhmetshin, E. M., Ilyina, I. A., Kulibanova, V. V., & Teor, T. R. (2019). 'Employee engagement' management facilitates the recovery

from crisis situations. Paper presented at the Proceedings of the 2019 IEEE Communication Strategies in Digital Society Seminar, ComSDS 2019, 50-55. doi:10.1109/COMSDS.2019.8709645

17. Ibatova, A. Z., & Ippolitova, N. V. (2018). Structuring the content of disciplines in higher school using a block-modular rating system for

future oil and gas engineers. International Journal of Civil Engineering and Technology, 9(3), 394-399.

18. Akhmetshin, E. M., Mueller, J. E., Chikunov, S. O., Fedchenko, E. A., & Pronskaya, O. N. (2019). Innovative technologies in

entrepreneurship education: The case of european and asian countries. Journal of Entrepreneurship Education, 22(1)

19. Bochkareva, T. N., Akhmetshin, E. M., Korotkova, A. L., Lyitkina, N. L., Nasipov, I. S., & Khaliullina, A. G. (2017). Research of

students' cognitive activity. Espacios, 38(60)

20. Ibatova, A. Z., & Ivanova, N. L. (2018). A professionally oriented approach to teaching engineering students: From theory to practice.

International Journal of Mechanical Engineering and Technology, 9(4), 977-982.

9.

Authors: R. Obulakonda Reddy, Dr. K.Reddy Madhavi, V. Nagalakshmi

Paper Title: Moving Objects Detection & Recognition using Hybrid Canny Edge Detection Algorithm in Digital

Image Processing

Abstract: Recognition and detection of an object in the watched scenes is a characteristic organic capacity.

Animals and human being play out this easily in day by day life to move without crashes, to discover sustenance,

dodge dangers, etc. Be that as it may, comparable PC techniques and calculations for scene examination are not all

that direct, in spite of their exceptional advancement. Object detection is the process in which finding or

recognizing cases of articles (for instance faces, mutts or structures) in computerized pictures or recordings. This is

the fundamental task in computer. For detecting the instance of an object and to pictures having a place with an

article classification object detection method usually used learning algorithm and extracted features. This paper

proposed a method for moving object detection and vehicle detection.

Keywords: detection, digital image, object, recognition.

References: 1. Bowlby, J. (1969). Attachment and Loss: Volume I Attachment (2nd ed., Vol. 1). New York: Basic Books.

2. Broch, C., Lurati, F., Zamparini, A., & Mariconda, S. (2017). The Role of Social Capital for Organizational Identification: Implications

for Strategic Communication. International Journal of Strategic Communication, 12(1), 46–66.

3. Brock, D. (2009). Aftersales Management: Creating a Successful Aftersales Strategy to Reduce Costs, Improve Customer Service and

Increase Sales. London, United Kingdom: Kogan Page Publishers.

4. Bryman, A. (2012). Social Research Methods (4th ed.). New York: Oxford University Press Inc. Bryman, A., & Bell, E. (2011). Business

Research Methods 3e. Oxford, UK: OUP Oxford.

5. Bukalapak. (2018). Tentang Bukalapak. Retrieved November 2, 2018, from https://www.bukalapak.com/about

6. Caers, R., De Feyter, T., De Couck, M., Stough, T., Vigna, C., & Du Bois, C. (2013). Facebook: A literature review. New Media and

Society.

7. Chellappa, R. K., & Sin, R. G. (2005). Personalization versus Privacy : An EmpiricalExamination of the Online Consumer ’ s Dilemma.

Information Technology and Management, 6(2–3), 181–202.

8. Church, K., & de Oliveira, R. (2013). What’s up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS.

15th International Conference on Human- Computer Interaction with Mobile Devices and Services (MobileHCI’13), 352–361.

9. Couldry, N. (2012). Media, Society, World: Social Theory and Digital Media Practice.

10. Cambridge: Polity.

11. Creswell, J. W. (2014). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). California: SAGE

Publications, Inc.

12. Daymon, C., & Holloway, I. (2010). Qualitative Research Methods in Public Relations and Marketing Communications (2nd ed.).

Routledge.

13. Denzin, N. K., & Lincoln, Y. S. (2003). Strategis of Qualitative Inquiry (2nd ed.). California: SAGE Publications, Inc.

14. Edwards, D., Ho, L., & Choi, S. (2017). Media , Mobilities and Identity in East and Southeast Asia : Introduction. Cultutral Studies

Review, 23(1), 60–68.

15. Fill, C. (2009). Marketing Communications: Interactivity, Communities and Content. Harlow, Edinburgh: Pearson Education Limited.

16. Fogli, L., & Ukei, J. (2005). Customer Service Delivery: Research and Best Practices. Hoboken, New Jersey: John Wiley & Sons.

17. Galloway, L., Rowbotham, F., & Azhashemi, M. (2012). Operations Management in Context.

18. Abingdon, United Kingdom: Routledge.

19. Jordan, Z. (2016). The effect of promotion mix elements on Consumers Buying Decisions of Mobile Service : The case of Umniah

Telecommunication Company at Zarqa city- Jordan. European Journal of Business and Management, 8(5), 94–100.

20. Kaniewska-Sċba, A., & Pilarczyk, B. (2014). Negative Effects of Personalization in Direct

21. Marketing. International Journal of Arts & Sciences, 7(2), 89–98.

22. Karjaluoto, H., & Mustonen, N. (2015). The Role of Digital Channels in Industrial Marketing Communications. Journal of Business &

Industrial Marketing, 30(6), 703–710.

23. Kemp, S. (2018). Digital In 2018 In Southeast Asia.

24. Kern, F. G. (2018). The Trials and Tribulations of Applied Triangulation: Weighing Different Data Sources. Journal of Mixed Methods

Research, 12(2), 166–181.

25. Kothari, C. R. (2004). Research Methodology: Methods & Techniques. New Age International

26. (2nd ed.). New Delhi: New Age International Publisher.

27. Lee, E., Lee, J.-A., Moon, J. H., & Sung, Y. (2015). Pictures Speak Louder than Words: Motivations for Using Instagram.

44-48

Page 10: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Cyberpsychology, Behavior, and Social Networking 18(9), 552–556.

28. Lister, M., Dovey, J., Giddings, S., Grant, I., & Kelly, K. (2009). New Media: A Critical Introduction. (M. Lister, Ed.). New York: Taylor

& Francis.

29. Liu, Y., & Shrum, L. J. (2002). What is Interactivity and is It Always Such a Good Thing? Implications of Definition, Person, and

Situation for the Influence of Interactivity on Adveritising Effectiveness. Journal of Advertising, 31(4), 53–64.

30. Montag, C., Błaszkiewicz, K., Sariyska, R., Lachmann, B., Andone, I., Trendafilov, B., … Markowetz, A. (2015). Smartphone usage in

the 21st century: Who is active on WhatsApp? BMC Research Notes, 8(1), 4–9.

31. Mulhern, F. (2009). Integrated marketing communications : From media channels to digital

32. connectivity. Journal of Marketing Communications, 15(2009), 85–101.

33. Ng, D. (2017). Evolution of Digital Payments: Early learnings from Singapore’s cashless payment drive. Journal of Payments Strategy &

Systems, 11(4), 306–312.

34. OLX. (2018). Tentang OLX. Retrieved December 2, 2018, from https://help.olx.co.id/hc/id/articles/213746523-Tentang-OLX

35. Osterwalder, A., & Pigneur, Y. (2010). Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers. (Y.

Pigneur, Ed.). Hoboken, New Jersey: John Wiley & Sons.

36. Ouwersloot, H., & Duncan, T. (2008). Integrated Marketing Communication (European).

37. Berkshire: McGraw-Hill Education.

38. Palmatier, R. W. (2000). Relationship Marketing. Emerging Perspectives of Services Marketing.

39. Cambridge, Massachusetts: Marketing Science Institute.

40. Rangaswamy, A., & Bruggen, G. H. Van. (2005). Opportunities and Challenges in Multichannel Marketing : An Introduction to the

Special Issue. Journal of Interactive Marketing, 19(2), 5–11.

41. Sahu, S. (2014). An Analysis of WhatsApp Forensics in Android Smartphones. International Journal of Engineering Research, 5013(3),

349–350.

42. Saunder, M. N. K., Lewis, P., & Thornhill, A. (2015). Research Methods for Business Students

43. (7th ed.). London, England: Pearson Education Limited.

44. Silverman, D. (2010). Doing Qualitative Research. California: SAGE Publications, Inc.

45. Sullivan, Y. W., & Kim, D. J. (2018). Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-

commerce environments. International Journal of Information Management, 39(December 2017), 199–219.

46. Sundqvist, E., Backlund, F., & Chronéer, D. (2014). What is Project Efficiency and Effectiveness? Procedia - Social and Behavioral

Sciences, 119, 278–287.

10.

Authors: Kusumah Arif Prihatna, Rosalin Ayal, Meutia Sistarani,Yunitasari Christanti

Paper Title: What Whatsapp Status Enables Reseller to Do as Channel

Abstract:

This research aims to understand the phenomena that arise from WhatsApp users who utilize WhatsApp Status to

market their products. This research focuses on the background capabilities of WhatsApp Status that allow

resellers to market their products based on capabilities of WhatsApp Status as part of social media, as a channel to

deliver the value proposition to the customer, and as a means of supporting engagement between sellers and

buyers. The qualitative approach was carried out by involving selected active users of WhatsApp Status based on

Snowball Sampling. This research identifies the significant capability of WhatsApp Status as the main digital

marketing channel for resellers in marketing their products where WhatsApp Status allows attachment between

resellers and customers while WhatsApp itself is the most used chat application. However, WhatsApp Status has

limited functionality only as a marketing channel with all the capabilities of social media in general.

Index Terms: WhatsApp, WhatsApp Status, Attachement Theory, Digital Media, Channel, Marketing,

Reseller

References:

1. Bowlby, J. (1969). Attachment and Loss: Volume I Attachment (2nd ed., Vol. 1). New York: Basic Books.

2. Broch, C., Lurati, F., Zamparini, A., & Mariconda, S. (2017). The Role of Social Capital for Organizational Identification: Implications for

Strategic Communication. International Journal of Strategic Communication, 12(1), 46–66.

3. Brock, D. (2009). Aftersales Management: Creating a Successful Aftersales Strategy to Reduce Costs, Improve Customer Service and

Increase Sales. London, United Kingdom: Kogan Page Publishers. 4. Bryman, A. (2012). Social Research Methods (4th ed.). New York: Oxford University Press Inc. Bryman, A., & Bell, E. (2011). Business

Research Methods 3e. Oxford, UK: OUP Oxford.

5. Bukalapak. (2018). Tentang Bukalapak. Retrieved November 2, 2018, from https://www.bukalapak.com/about 6. Caers, R., De Feyter, T., De Couck, M., Stough, T., Vigna, C., & Du Bois, C. (2013). Facebook: A literature review. New Media and

Society.

7. Chellappa, R. K., & Sin, R. G. (2005). Personalization versus Privacy : An EmpiricalExamination of the Online Consumer ’ s Di lemma. Information Technology and Management, 6(2–3), 181–202.

8. Church, K., & de Oliveira, R. (2013). What’s up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS.

15th International Conference on Human- Computer Interaction with Mobile Devices and Services (MobileHCI’13), 352–361. 9. Couldry, N. (2012). Media, Society, World: Social Theory and Digital Media Practice.

10. Cambridge: Polity.

11. Creswell, J. W. (2014). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). California: SAGE Publications, Inc.

12. Daymon, C., & Holloway, I. (2010). Qualitative Research Methods in Public Relations and Marketing Communications (2nd ed.).

Routledge.

13. Denzin, N. K., & Lincoln, Y. S. (2003). Strategis of Qualitative Inquiry (2nd ed.). California: SAGE Publications, Inc.

14. Edwards, D., Ho, L., & Choi, S. (2017). Media , Mobilities and Identity in East and Southeast Asia : Introduction. Cultutral Studies

Review, 23(1), 60–68. 15. Fill, C. (2009). Marketing Communications: Interactivity, Communities and Content. Harlow, Edinburgh: Pearson Education Limited.

16. Fogli, L., & Ukei, J. (2005). Customer Service Delivery: Research and Best Practices. Hoboken, New Jersey: John Wiley & Sons.

17. Galloway, L., Rowbotham, F., & Azhashemi, M. (2012). Operations Management in Context. 18. Abingdon, United Kingdom: Routledge.

19. Jordan, Z. (2016). The effect of promotion mix elements on Consumers Buying Decisions of Mobile Service : The case of Umniah

Telecommunication Company at Zarqa city- Jordan. European Journal of Business and Management, 8(5), 94–100. 20. Kaniewska-Sċba, A., & Pilarczyk, B. (2014). Negative Effects of Personalization in Direct

21. Marketing. International Journal of Arts & Sciences, 7(2), 89–98.

49-51

Page 11: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

22. Karjaluoto, H., & Mustonen, N. (2015). The Role of Digital Channels in Industrial Marketing Communications. Journal of Business &

Industrial Marketing, 30(6), 703–710. 23. Kemp, S. (2018). Digital In 2018 In Southeast Asia.

24. Kern, F. G. (2018). The Trials and Tribulations of Applied Triangulation: Weighing Different Data Sources. Journal of Mixed Methods

Research, 12(2), 166–181.

25. Kothari, C. R. (2004). Research Methodology: Methods & Techniques. New Age International

26. (2nd ed.). New Delhi: New Age International Publisher.

27. Lee, E., Lee, J.-A., Moon, J. H., & Sung, Y. (2015). Pictures Speak Louder than Words: Motivations for Using Instagram. Cyberpsychology, Behavior, and Social Networking 18(9), 552–556.

28. Lister, M., Dovey, J., Giddings, S., Grant, I., & Kelly, K. (2009). New Media: A Critical Introduction. (M. Lister, Ed.). New York: Taylor

& Francis. 29. Liu, Y., & Shrum, L. J. (2002). What is Interactivity and is It Always Such a Good Thing? Implications of Definition, Person, and Situation

for the Influence of Interactivity on Adveritising Effectiveness. Journal of Advertising, 31(4), 53–64.

30. Montag, C., Błaszkiewicz, K., Sariyska, R., Lachmann, B., Andone, I., Trendafilov, B., … Markowetz, A. (2015). Smartphone usage in the 21st century: Who is active on WhatsApp? BMC Research Notes, 8(1), 4–9.

31. Mulhern, F. (2009). Integrated marketing communications : From media channels to digital

32. connectivity. Journal of Marketing Communications, 15(2009), 85–101. 33. Ng, D. (2017). Evolution of Digital Payments: Early learnings from Singapore’s cashless payment drive. Journal of Payments Strategy &

Systems, 11(4), 306–312.

34. OLX. (2018). Tentang OLX. Retrieved December 2, 2018, from https://help.olx.co.id/hc/id/articles/213746523-Tentang-OLX 35. Osterwalder, A., & Pigneur, Y. (2010). Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers. (Y.

Pigneur, Ed.). Hoboken, New Jersey: John Wiley & Sons.

36. Ouwersloot, H., & Duncan, T. (2008). Integrated Marketing Communication (European). 37. Berkshire: McGraw-Hill Education.

38. Palmatier, R. W. (2000). Relationship Marketing. Emerging Perspectives of Services Marketing.

39. Cambridge, Massachusetts: Marketing Science Institute. 40. Rangaswamy, A., & Bruggen, G. H. Van. (2005). Opportunities and Challenges in Multichannel Marketing : An Introduction to the Special

Issue. Journal of Interactive Marketing, 19(2), 5–11.

41. Sahu, S. (2014). An Analysis of WhatsApp Forensics in Android Smartphones. International Journal of Engineering Research, 5013(3), 349–350.

42. Saunder, M. N. K., Lewis, P., & Thornhill, A. (2015). Research Methods for Business Students

43. (7th ed.). London, England: Pearson Education Limited. 44. Silverman, D. (2010). Doing Qualitative Research. California: SAGE Publications, Inc.

45. Sullivan, Y. W., & Kim, D. J. (2018). Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-

commerce environments. International Journal of Information Management, 39(December 2017), 199–219. 46. Sundqvist, E., Backlund, F., & Chronéer, D. (2014). What is Project Efficiency and Effectiveness? Procedia - Social and Behavioral

Sciences, 119, 278–287

11.

Authors: K. VinayaLaxmi, Dr. P. Vijaya Kumar, Dr. M. S. Narayana

Paper Title:

Identification and Prioritisation of Impact Factors in Quality Service Of ICICI Bank With Special

Reference To Urban Cities Of Telangana State

Abstract: The research mainly deliberates to examine the influencing level of governing client retail service

satisfaction towards ICICI banking. A five point likert scale was used to construct the questionnaire with 21

multivariate questions and collected data from 502 respondents, correlation and regression were the tools of

statistics used to measure the level of impact of the factors on client satisfaction. Inferences were drawn based on

the findings of the study. Questions were framed based on the SERVQUAL dimensions to examine consumer

service quality provided by ICICI bank in Hyderabad, Rangareddy and Medak districts and data was collected

from concerned account holders in the bank branches. Correlation and regression were used as the tools of

analyses. According to the inferences drawn there is a mere influence of the quality service factor dimensions and

the client contentment level which was considered very significant. The banks to make a increased client share in

the dynamic market has to focus in the stunted areas of development and strengthen their client force.

Keywords: Perception, Tangibility, Assurance, Reliability, Responsiveness, Client satisfaction

References: 1. Yavas and Babakus, “measuring service quality of banks: Scale development and validation”, Journal of Retailing and Consumer

Services 12(5): pp. 373-383. September 2005 2. Winstanley,M., “What Drives Customer Satisfaction in Commercial Banking”, Commercial Lending Review, 1996, 12(3): pp. 36-

42.

3. Churchill Jr. and G.A. Suprenant C“An Investigation into the Determinants of Customer Satisfaction. Journal of Marketing Research (JMR), 1982, 19,pp. 491-504.

4. Parsuraman et.al. , Parasuraman, A., Zeithaml, V.A. and Berry, L.L. , “SERVQUAL: A Multiple Item Scale for Measuring

Consumer Perceptions of Service Quality”, Journal of Retailing, 1988, Vol. 64, No. 1, pp.14-40 5. Gronroos, C., “Quo vadis, marketing? Towards a relationship marketing paradigm”, Journal of Marketing Management, 1994, Vol.

10, pp. 347-60

6. Christian Grönroos "A Service Quality Model and its Marketing Implications", European Journal of Marketing, 1984, Vol. 18 No. 4, pp. 36-44

7. Cadott et al., Inc. “Distinguishing Service Quality and Customer Satisfaction: The Voice of the Consumer”,Journal of Consumer

Psychology,Lawrence Erlbaum Associates, 1987, 4(3), 277-303 Copyright 0 1995 8. Fornell, C., “A National Customer Satisfaction Barometer: The Swedish Experience”, Journal of Marketing,1992, 56, pp. 6-21.,

https://doi.org/10.2307/1252129.

9. Zeithmal et al., “service quality, customer satisfaction in technology - based universities”, African Journal of Business Management, 4 August, 2011 “Vol. 5(15), pp. 6541-6553

10. Oliver, R. L., “Satisfaction: A Behavioural Perspective on the Consumer”, New York, McGraw Hill,1997.

11. Storbacka, K., Strandvik, T. & Grönroos, C., “Managing Customer Relationships for Profit: The Dynamics of Relationship Quality”, International Journal of Service Industry Management, Sept 1994, pp. 21- 38.

52-59

12. Authors: Dr. G. S. Jayesh

Page 12: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title: An Analysis on Impact of Exchange Rate on Nifty and S&P Sensex

Abstract: In the last two decades, the developments happened in India have led to an interdependency between

the stock market and exchange rate markets. The present study focuses on understanding the impact of the foreign

exchange rate and the stock market interdependency. The indices NIFTY and SENSEX define major movements

in the stock market hence they gain importance in studying. Also, the technical analysis has been done for the

Indices to study the performance of stock. The results obtained from the study will facilitate the decision making

of the investors.

Keywords: Foreign Exchange, Nifty, Stock Market, Sensex

References: 1. TRAN MONG UYEN NGAN (2016) Relationship between Foreign Exchange Rate and Stock Price of Commercial Joint Stock Banks:

Evidence from Vietnam

2. DEEPTIGULATI,MONIKAKAKHANI,(November2012)RelationshipBetween Stock Market and Foreign Exchange Market in India: An

Empirical Study, Volume5, Issue 5

3. Vandana kotai,(2013),IMPACT OF EXCHANGE RATE FLUCTUATION ON STOCK MARKET VOLATILITY-A STUDY TO

PREDICT THE ECONOMIC SCENARIO IN INDIA , volume118.

4. Sankaran Venkateshwar,(1991) The Relationship of Indian Stock Market to Other Stock Markets. Indian Economic Journal, Vol. 39, No.

2 (Oct-Dec), p.105-109.

5. Manish.R.Pathak(2013)Stock Market Seasonality: A Study Of The Indian Stock Market (NSE) PARIPEX – Indian Journal of Research

Vol 2 Issue 3 March(2013).

60-64

13.

Authors: Vera Rogova*

Paper Title: Marketing Model of Professional Orientation

Abstract: In the article it’s discussed the possibility and feasibility of the marketing approach in the organization

and implementation of professional orientation of students as potential students of universities. The tasks facing

modern higher education organizations in Russia are largely similar in nature to the problems of commercial

organizations, which allows us to consider both the existing practical experience and to use the existing theoretical

Foundation of marketing to solve the problems facing Russian higher education today

Keywords: training of engineering and technical personnel, marketing of non-profit organizations, traditional

and marketing model of career guidance, marketing tools

References: 1. “Global innovation index” URL: https://www.globalinnovationindex.org/

2. G.P. Litvintseva, N.G. Nizovkina, N.A. Gakhova, “ Training of engineering and technical personnel, taking into account the achievements

of modern economic science” Education and Science. Vol. 19, № 2. 2017. P.101–123.

3. V.A. Rogova, “Personnel problems of high technology development in Russia in the mirror of the Global innovation index” Rossiyskiy

tekhnologicheskiy zhurnal (Russian Technological Journal). 2018, 6(4), p. 105-116. (in Russ.)

4. “Education in Russia – 2018. Statistical bulletin” Moscow, MIREA — Russian Technological University. 2018. 422 p.

5. P. Druker, Management in a non-profit organization: principles and practice. Moscow, Wiliams. 2007. 304 p.

6. P. Kotler K. Fox, Strategic Marketing for Educational Institutions. 1995. Prentice Hall, Englewood Cliffs, NJ.

7. P. Kotler, A.R. Andreasen, Strategic marketing of non-profit organizations. Rostov-na-Donu, “Feniks”. 2007. 854 p.

8. P. Naudea, J. Ivy “The marketing strategies of universities in the United Kingdom” The International Journal of Educational

Management, 1999, № 13/3. pp. 126-134.

9. A.P. Pankrukhin, Marketing of educational services. URL: http://www.marketologi.ru.

10. G.N. Prozumetova, “Potential of interaction between universities and schools: empirical models” Vestnik TSU. 2012. № 358. P. 182-188.

11. E. Constantinides, M.C.Z. Stagno, “Higher education marketing: A study on the impact of social media on study selection and university

choice” International Journal of Technology and Education Marketing (IJTEM). 2012. Vol. 2, № 1. P.41-58. .

65-67

14.

Authors: Maria Polismakova *1, Vera Ershova2, Alexander Sandulyak1, Anna Sandulyak 1

Paper Title: Induction of the Field at Different Distances from The Permanent Magnet And Between Opposing

Magnets. Testing Of the Superposition Principle

Abstract: The measurement data of the field induction at different distances from the permanent magnet Nd-Fe-

B and between two equivalent magnets on distance are presented. It is shown that the obtained coordinate

dependences are described by exponential function, but for a system of two magnets –only partially: up to the

central area of the system and make 20-30% of the entire area between opposing magnets. Using the example of

the coordinate dependence of induction for one of two identical magnets, it is shown that the use of the

superposition principle makes it possible to obtain a coordinate dependence of induction between opposing

magnets, which is equivalent to experimental one.

Keywords: permanent magnet, system of two magnets, coordinate dependence of induction, superposition

principle

References: 1. A.V. Sandulyak, A.A. Sandulyak, M.N. Polismakova, D.O. Kiselev, D.A. Sandulyak, “Faraday Magnetometer With Sheric Pole Pieces:

Identification Zone With A Stable Force Factor” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal). 2017; 5(6): 43-

54. (in Russ.)

2. A.V. Sandulyak, A.A. Sandulyak, M.N. Polismakova, D.A. Sandulyak, V.A. Ershova, “The approach to the creation and identification of

the positioning zone of the sample in the Faraday magnetometer” Journal of Magnetism and Magnetic MaterialsV.469 (1) 2019, P. 665-

673.

68-77

Page 13: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

3. V. Zezulka, P. Straka, P. Mucha, “A magnetic filter with permanent magnets on the basis of rare earth” J. Magn. Magn. Mater. 268 (2004)

P.219–226.

4. J.M.D. Coey, “Permanent magnet applications” J. Magn. Magn. Mater. 248 (2002) P. 441–456.

5. F. Mishima, T. Terada, Y. Akiyama, Y. Zumi, H. Okazaki, S. Nishijima, “Research and development of superconducting magnetic

separation system for powdered products” IEEE Transactions on Applied Superconductivity 2008. 18 (2), art. no.4520245, P. 824-827.

6. C.M. Earhart, R.J. Wilson, R.L. White, N. Pourmand, S.X. Wang, “Microfabricated magnetic sifter for high-throughput and high-gradient

magnetic separation” J. Magn. Magn. Mater. 321 (2009) P. 1436–1439.

7. J. Li, Y. Liu, S.J. Gao, M. Li, Y.Q. Wang, M.J. Tu, “Effect of process on the magnetic properties of bonded NdFeB magnet” J. Magn.

Magn. Mater. 299 (2006) P. 195–204.

8. Y. Liu, H. Peng, Hu. Mingzhen, “Removing iron by magnetic separation from a potash feldspar ore” J. Wuhan Univ. Technol. Mater Sci.

Ed. 28 (2) (2013) P. 362–366.

9. J. N. Darton, B. Hallmark, P. Agrawal, T. James, Vincent H.B. Ho, Nigel K.H. Slater. On the magnetic field architecture required to

capture superparamagnetic nanoparticles in a microcapillary flow, J. Nanoparticle Res.12 (1) (2010) P.307–317.

10. Sandulyak A.V., Polismakova M.N., Sandulyak A.A., Sandulyak D.A., Ershova V.A. Convergence check of data from step-by-step

experimental-computational magnetic control of iron impurities in raw materials using different field sources. Glass and Ceramics. (2018)№ 9-10(74). 332-336. 1.

15.

Authors: Alexander Novikov*1, Nikolay Chekalkin1, Nadezhda Sokolaeva2, Dmitry Miskov1, Ekaterina

Dzhevello1, Evgeniy Larionov1, Vyacheslav Muraviev1, Maxim Nazarenko1

Paper Title: Mathematical Education of A Modern Engineer: Problems Of Integration

Abstract: The article discusses the methods of teaching mathematics at a technical University, focuses on the

means of integration of mathematical and engineering training of students, provides recommendations for the

preparation and use of educational and practical tasks that implement the goals of integration in the educational

process of the University.

Keywords: mathematics teaching, engineering education, knowledge integration

References: 1. N.В. Golovanova et al, “Implementation Of The Practically-Oriented Approach In The Specialists Training On Radio Engineering And

Communication Systems” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal). 2018. 6(1): 73-87. (in Russ.)

2. S.V. Kruchinin et al, “Main Self-Educational Platforms in Russia and Skills that Can Be Develop Via Them” Proceedings of the 2018

International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,

2018, 8525032, p. 669-671. DOI: 10.1109/ITMQIS.2018.8525032

3. E.V. Bagrova et al, Additional Education in Russia. Ways of Development” Proceedings of the 2018 International Conference “Quality

Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524999, p. 561-564. DOI:

10.1109/ITMQIS.2018.8524999

4. S.V. Kruchinin et al, “Simultaneous Development of E-Learning in Russia and Information Society” Proceedings of the 2018

International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524994, p. 666-668. DOI: 10.1109/ITMQIS.2018.8524994

5. A.A. Filippov et al, “Algorithm of End-to-End Integrated Quality Management” Proceedings of the 2018 International Conference

“Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8525039, p. 44-46.

DOI: 10.1109/ITMQIS.2018.8525039

6. M.S. Kostin et al, “Counterreengineering of electronic devices” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal).

2019; 7(1): 57-79. (in Russ.). DOI: 10.32362/2500-316X-2019-7-1-57-79

7. V.V. Muraviev et al, “Company Life Cycle and Quality Standardization” Proceedings of the 2018 International Conference “Quality

Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8525064, p. 59-62. DOI:

10.1109/ITMQIS.2018.8525064

8. S.V. Kruchinin et al, “Key Ways of Information Technologies for Self-Education Development. Pros and Cons” Proceedings of the 2018

International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,

2018, 8544901, p. 663-665. DOI: 10.1109/ITMQIS.2018.8524901

9. M.A. Nazarenko et al, “Model end-to-end integrated quality management” International Journal of Engineering and Technology (UAE).

2018. Volume 7, Issue 4.36. P. 60-63.

10. E.V. Bagrova et al, “Usage of Information Technologies in Self-Education in Russia” Proceedings of the 2018 International Conference

“Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524940, p. 565-567.

DOI: 10.1109/ITMQIS.2018.8524940

11. M.A. Nazarenko, “Mobile Operating Systems and Integrated Apps Quality Management System” Proceedings of the 2018 International

Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8525022, p. 63-65. DOI: 10.1109/ITMQIS.2018.8525022

12. E.S. Djevello et al, “Specifics of Management Quality Implementation to Information Systems and Products” Proceedings of the 2018

International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,

2018, 8524995, p. 40-43. DOI: 10.1109/ITMQIS.2018.8524995

13. E.V. Bagrova et al, “Quantity Measures of Quality in Higher Education in Russia. How Information Technologies Can Help?”

Proceedings of the 2018 International Conference “Quality Management, Transport and Information Security, Information Technologies”,

IT and QM and IS, 2018, 8525044, p. 557-560. DOI: 10.1109/ITMQIS.2018.8525044

14. M.A. Nazarenko, T.V. Khronusova “Big Data in Modern Higher Education. Benefits and Criticism” Proceedings of the 2017

International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,

2017, 8084914, p. 676-679. DOI: 10.1109/ITMQIS.2017.8085914

15. A.I. Gorobets et al, “Technical and economical analysis of efficiency of electronic means’ quality management” International Journal of

Engineering and Technology (UAE). 2018. Volume 7, Issue 4.20. P. 629-630. DOI: 10.14419/ijet.v7i2.8.10548

16. M.A. Nazarenko, “Some properties of rational approximations of degree (k,1) in the Hardy space H2(D)” Mathematical Notes. 1998.

64(1-2). P. 213-219.

17. M.A. Nazarenko et al, “Main directions of higher education regionalization process as an integral part of social partnership in society

(The problems of inclusive education)” International Journal of Engineering and Technology (UAE). 2018. Volume 7, Issue 4.36. P.

1135-1138. DOI: 10.14419/ijet.v7i4.36.25052

18. Y.Y. Cheremukhina et al, “The process of working with claims in the quality management system of an enterprise of the radio-electronic

industry” International Journal of Engineering and Technology (UAE). 2018. Volume 7, Issue 4.36. P. 67-68. DOI: 10.14419/ijet.v7i4.36.23313

78-82

Page 14: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

19. M.A. Nazarenko et al, “Antivirus software and industrial cyber security system certification in Russia” Rossiyskiy tekhnologicheskiy

zhurnal (Russian Technological Journal). 2019; 7(1): 48-56. (in Russ.). DOI: 10.32362/2500-316X-2019-7-1-48-56

16.

Authors: A.P. Kalmegh1, Dr. P.M. Khodke2

Paper Title: Multiparametric Optimization of Low Plasticity Burnishing Process for AISI 4340 by Using Utility

Concept

Abstract: Low plasticity burnishing (LPB®) is an innovative method which provides deep and stable

compressive residual stresses. It improves surface characteristic such as low and high cycle fatigue strength,

surface finish, microhardness, wear resistance, corrosion resistance, etc. The objective of the multi parametric

process optimization for LPB is to find out appropriate levels of process variables i.e. ball diameter, pressure,

speed, initial surface roughness and number of passes for achieving optimum values of surface roughness,

hardness and fatigue life simultaneously. Considering multiple output responses in the present study, multi

response optimization is essential. This paper deals with multi objective LPB process optimization problem of

response characteristics with Utility concept for AISI 4340 steel alloy.

LPB® is a registered trademark of Lambda Technologies group.

Keywords: LPB, surface roughness (Ra), surface hardness (Hw), fatigue life (FL), AISI 4340, Utility Concept

References: 1. M.M. EL-Khabeery ,M.H.EL-Axir, ‘Experimental techniques for studying the effects of milling roller-burnishing parameters on surface

integrity’, International Journal of machine tools and manufacture 41,2001, 1705-1719.

2. Paul S.Prevey , Ravi A.Ravindranath, ‘Case studies of fatigue life improvement using low plasticity burnishing in gas turbine engine

application’, Journal of engineering for gas turbines & power, Vol.128/865 October 2006.

3. Paul S.Prevey , N.Jayaraman ,Ravi A.Ravindranath, Michael Shepard, ‘Improved high cycle fatigue damage tolerance of turbine- engine

compressor components by low plasticity burnishing’, Journal of engineering for gas turbines & power, Vol.130/012102-1, January 2008.

4. P.R.Prabhu, S.M.Kulkarni, S.S.Sharma, ‘Influence of deep cold rolling and low plasticity burnishing on surface hardness and surface

roughness of AISI 4140 Steel’, World Academy of Science, Engineering and Technology 72 ,2010.

5. Paul S.Prevey, Lambda Research, Cincinnati, OH, ‘The effect of cold work on the thermal stability of residual compression in surface

Enhanced IN718’, 20th ASM Materials Solution Conferences & Exposition St.Louis , Missouri, october 10-12,2000.

6. Paul S.Prevey, John T. Cammett, ‘The Influence of surface enhancement by low plasticity burnishing on the corrosion fatigue

performance of AA7075-T6’, International Journal of Fatigue 26, 2004, page975-982.

7. C.Y.Seemikeri ,P.K.Brahmankar , S.B.Mahagaonkar, ‘Investigation on surface integrity of AISI 1045 using LPB tool’, Tribology

International 41, 2008, page724-734.

8. PetruDusa& Gabriel Dumitriu, ‘Analytical method of residual stress evolution into superficial layers at low plasticity burnishing (LPB)’,

international Journal of Materials Processing Technology ISSN 2067-3604, Vol.1,No.1/2009.

9. U.D.Gulhane, S.B.Mishra, P.K.Mishra, ‘Enhancement of surface roughness of 316L stainless steel and TI-6AL-4V using low plasticity

burnishing: DOE approach’, Intyernational journal Mechanical Engineering & Technology, Vol.3, Issue 1, January-April2012, PP.150-

160.

10. Paul S.Prevey, N.Jayaraman, Ravi A.Ravindranath, Michael Shepard, ‘Mitigation of fretting fatigue damage in blade and desk pressure

faces with low plasticity burnishing (LPB)’,

11. A. P. Kalmegh, Dr. P. M. Khodke, ‘Single factor experimentation on low plasticity burnishing process for AISI 4340’, International

journal of advance research in science and engineering, Vol.No. 07, Special issue No. (02), February 2018

12. A. P. Kalmegh, Dr. P. M. Khodke, “Design of Experimentation for Composite Desirability of Low Plasticity Burnishing Process for AISI

4340, International Journal of Pure and Applied Mathematics, Volume 120, No. 6 (2018)

13. RinaChakravorty, Susanta Kumar Gauri and Shankar Chakraborty, ‘Optimization of Multiple Responses of Ultrasonic Machining (USM)

Process: A Comparative Study’ International Journal of Industrial Engineering Computations, 4 (2013),285–296

83-86

17.

Authors: Dmitry Miskov*, Sergey Grodzenskiy, Vyacheslav Muraviev, Irina Vlasova, Alexey Korotkikh,

Alexander Novikov, Irina Baranova, Maxim Nazarenko1

Paper Title: Quality Assurance of Mathematical Education Of The Future Specialist In The Field Of Radio

Engineering

Abstract: The modern pace of changes in the life of society and the change of technology is so high that it

becomes difficult for universities to produce engineers fully ready to work in the specialty. The solution to this

problem is seen in the training of such a specialist, who is able to independently adjust to future activities and

adapt to it, have knowledge that does not become obsolete over time, help to navigate in a new environment and

are, in fact, universal. The priorities of the new educational paradigm are: fundamental, which involves the

orientation to identify the deep intrinsic relationships between the various processes of the surrounding world;

integrity - involving the introduction of the formation of single cycles of the fundamental disciplines, United by a

common objective function-oriented interdisciplinary connections; orientation to the development of the

individual.

Keywords: NA

References: 1. Hines, Peter and Lethbridge, Sarah, “New Development: Creating a Lean University”, Public Money & Management, vol.28, (2008), pp.

53-56.

2. Crute V, Ward Y, Brown S and Graves A., “Implementing Lean in aerospace—challenging the assumptions and understanding the

challenges”, Technovation, vol. 23, no. 12, (2003), pp. 917–928.

3. Womack J P and Jones DT, “Lean thinking: banish waste and create wealth in your corporation”, Free Press, Mumbai, (2003).

4. Murman E M, McManus H and Candido J P, “Enhancing Faculty Competency in Lean Thinking Bodies of Knowledge”, Proc. 3rd Int.

CDIO Conf. CDIO, Cambridge, (2007).

5. Selko A, “Strategies to Help Manufacturers Compete Successfully”, Industry Week, 23 February (2012)

https://www.industryweek.com/companies-amp-executives/strategies-help-manufacturers-compete- successfully.

6. Delbridge R., “Life on the line in contemporary manufacturing”, Oxford University Press, Oxford.

87-90

Page 15: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

7. (1998).

8. Cooney R., “Is “lean” a universal production system?” Int. J. Oper. Prod. Manag., vol. 22 no. 10, (2002), pp. 1130–1147.

9. Boyle T A and Scherrer-Rathje M., “An empirical examination of the best practices to ensure manufacturing flexibility” J. Manuf.

Technol. Manag. Vol. 20 no. 3, (2009), pp. 348–366.

10. Wang P, Mohamed Y, Abourizk S, Asce S and Rawa A., “Flow Production of Pipe Spool Fabrication: Simulation to Support

Implementation of Lean Technique”, J. Constr. Eng. Manag., (2009) pp. 1027– 1038.

11. Wall J and Ahmed V., “Use of a simulation game in delivering blended lifelong learning in the construction industry – Opportunities and

Challenges” Comput. Educ., vol. 50 no. 4, (2008), pp. 1383– 1393.

12. Choi B, Park B and Ryu H., “Virtual Factory Simulator Framework for Line Prototyping”, J. Adv. Manuf. Syst., vol. 3, no. 1, (2004), pp.

5–20.

13. Bagchi S and Ritzo C., “A Full-Factory Simulator as a Daily Decision-Support Tool for 300mm Wafer Fabrication Productivity”, Proc.

Wint. Simu. Conf., (2008), pp. 2021–2029.

14. Kadarova J and Demecko M., “New Approaches in Lean Management”, Procedia Econ. Financ., vol.39,

15. (2016), pp. 11–16.

16. Dengiz B and Akbay K S., “Computer simulation of a PCB production line: metamodeling approach” Int. J. Prod. Econ., vol. 63, no. 2,

(2000), pp. 195–205.

17. Moris M, Ng A and Svensson J., “Simplification and Aggregation Strategies Applied For Factory Analysis in Conceptual Phase Using

Simulation” Proc. 2008 Winter Simulation Conference, (2008), pp. 1913–1921.

18. Wan H, Che F and Saygin C., “Simulation and Training for Lean Implementation Using Web-Based Technology”, Int. J. Serv. Oper.

Informatics, vol. 3, no. 1, (2008), pp. 1–14.

19. Andre Fernando Uébe Mansur, Fernando Carvalho Leite and Helvia Pereira Pinto Bastos, “Lean Education for Applied Science

Universities: A Proposal by Federal Institutes of Applied Sciences in Brazil”, Springer International Publishing Switzerland, (2017), pp.

25-39.

20. Gadre A, Cudney E and Corns S., “Model Development of a Virtual Learning Environment to Enhance Lean Education”, Proc. Comp.

Sci. vol. 6, (2011), pp.100–105.

21. Rummler G and Brache A., “Improving Performance: How to Manage the White Space on the Organization Chart”, Wiley, United States,

(1990).

22. Mohamad E, Abdullah R, Hasrulnizzam W and Mahmood W H W., “The level of achievement of Lean Manufacturing Implementation

status before and after the development of KPIs at an Aerospace Manufacturing Company”, Intl. Conf. Rol. Humanit. Soc. Sci. Eng.,

(2008).

23. Fang N, Cook R and Hauser K., “Work in Progress: An Innovative Interdisciplinary Lean Manufacturing Course”, Proc. Front. Edu. 36th

Annual Conference, San Diego, CA., (2006), pp. 13-14.

24. Harris G, Stone K B, Mayeshiba T, Componation P J and Farrington P A., “Transitioning from Teaching Lean Tools To Teaching Lean

Transformation”, J. Enterp. Transform., vol. 4, no. 3, (2014), pp. 191–204.

25. Resta B, Powell D, Gaiardelli P and Dotti S., “Towards a framework for lean operations in product- oriented product service systems”,

CIRP J. Manuf. Sci. Technol., vol. 9, (2015), pp. 12–22.

26. Pearce A, Pons D and Neitzert T., “Implementing lean—Outcomes from SME case studies”, Oper. Res. Perspect, vol. 5, (2018), pp. 94–

104.

27. Alkhoraif A and McLaughlin P. "Lean implementation within manufacturing SMEs in Saudi Arabia: Organizational culture aspects." Jou.

Ki. Sau. Univ. - Eng. Sci. vol. 30, no. 3, (2018), pp. 232–242.

18.

Authors: I.V. Gaidamashko, Y.I. Zhemerikina, O.S. Zhigalov, I.P. Provorova, O.V. Titkova

Paper Title: The Main Aspects of The Formation Of Digital Competence Of Future Civil And Municipal Employees

Abstract: The transmission pricing depends on generator, load levels and transmission line constraints. The

transmission system places an importance on the intensive use interconnected network reliably, which requires

knowledge of the complex capability. Available Transfer Capability (ATC) is a compute of the remaining power

transfer capability of the transmission network for further transactions. Available transfer capability in the

transmission system has become essential quantity to be declared well in advance for its commercial use in a

competitive electricity marketplace. The proposed approach of ATC using AC Power transfer distribution factors

(AC PTDFs) based approach has been used for single and concurrent transactions using power transfer distribution

factor and ATC based Locational Marginal Pricing methodology is used to decide the energy price for transacted

power and to handle the network congestion and marginal losses.

Simulation is carried out on IEEE30 bus system.

Keywords: Locational Marginal Pricing, Optimal Power Flow, transmission pricing, Available Transfer

Capability (ATC), AC Power Transfer Distribution Factor (ACPTDF)

References: 1. Zhemerikina Y.I., Provorova I.P. Positive and negative aspects of information competence // Human capital. 2016. № 6 (90). P. 30-31

2. Malysheva V.V. Formation of professional competence of public servants in the financial sector in the process of continuing education

Text.: author. dis. ...cand. PhD. Volgograd. 2017. 25 p.

3. Decree of the President of the Russian Federation of may 7, 2012 №601 "On the main directions of improving the system of public

administration."

4. Toffler, Alvin. Powershift: Knowledge, Wealth and Violence at the Edge of the 21st Century, 1990.

5. Zhemerikina Y.I., Provorova I.P., Pugacheva E.V. Psychological aspects of the formation of media literacy among students of technical

University// "Modern science: theoretical and practical view: materials of the International scientific and practical conference" (March 28,

2015, Ufa). - Ufa: RIO ICII OMEGA SAINZ, 2015. – P. 202-205

6. Zaytseva O.B. Formation of information competence of future teachers by means of innovative technologies Text.: autoref. dis. ...cand.

PhD. Bryansk. 2002. 19 p.

7. Rogova V.A. Problem of staffing for development of high technologies in russia in the mirror of the global innovation index. // Russian

technological journal. 2018. V 6 № 4, p. 105-116.

8. URL https://rtj.mirea.ru/upload/medialibrary/f3d/RTZH_4_2018_105_116.pdf

91-93

19. Authors: V.N. Krasivskaya

Page 16: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title: Experience Of Interaction Between The Business And Scientific Community In The Formation Of

Scientific And Technical Potential Of Russia In The Second Half Of The XIX Century

Abstract: The article investigates the main directions of interaction between Russian Industrialists and the

scientific community in the process of formation of the scientific and technical complex of the country during the

forced industrialization of the second half of the XIX century. It is defined as a very significant contribution of a

number of entrepreneurs and scientists in the creation of scientific societies, higher technical education, the

development of conceptual foundations of the state socio-economic and scientific-technical policy of the Russian

Empire.

Keywords: Scientific community, entrepreneurs, Russian modernization, scientific and technical potential.

References: 1. Bodrova E.V., Golovanova N.B. Modernization Of The Higher Technical School: Historical Experience And Prospect // Russian

Technological Journal. 2017. V. 5. №.6. P. 73-97

2. URL: https://rtj.mirea.ru/upload/medialibrary/c19/RTZH_6_2017_73_97.pdf

3. Bodrova E.V., Kalinov V.V., Sergeev S.V. etc. State scientific and technical policy in the modernization strategy of Russia: monograph.

M., 2013. 572 p.

4. Bodrova E.V., Krasivskaya V.N. The Role Of The State In The Development Of Technical Education And Scientific And Technical

Institutions In The Russian Empire // Russian Technological Journal. 2016. V. 4. № 5 (14). P.89-101.

5. URL: https://rtj.mirea.ru/upload/medialibrary/6d1/89_100watermark.pdf

6. Bodrova E.V. Role of “External Support” and Significance of Experience of “Catch-Up Modernization” Implementation. The Social

Sciences. Vol. 10. Is.2. P.143-146.

7. Ivanov B.I. 140 years of Russian Technical Society. URL: http://www.emitent-spb.ru/anniversary/03/

8. Russian State Historical Archive (RGIA) F. 90. Op.1, 272, 326, 191, 321, 155, 635 etc.

9. Proskuryakova N.A. Russia in XIX century. / Education. Science. Culture. M., 2010. P. 52.

10. Dmitry Pavlovich Ryabushinskiy – biography

11. URL: http://www.personbio.com/view_post.php?id_info=268

12. Korepanova S.A. Exhibition activities in Russia in the XIX century (industrial, scientific and industrial exhibitions). Yekaterinburg, 2005.

P. 253.

13. Proceedings of the I Congress of oil industry in Baku. Baku. 1885. P.25-26.

14. Russian State Historical Archive (RGIA) F. 37. Op. 73. D. 290. L. 140.

15. Kalinov V.V. The achievements and failures of the state scientific and technical policy of the USSR in the postwar period // Russian

Technological Journal, 2018. Volume 6, Issue 1, P. 73-87. URL: https://rtj.mirea.ru/upload/medialibrary/6c4/RTZH_2018_1_73_87.pdf

94-101

20.

Authors: T.N. Borovik

Paper Title: Improving the Quality of Welded Joints in Laser Welding of Silver Products

Abstract: Currently, there are many products that are of great value for the cultural heritage of our country and

the world as a whole. A certain number of antique items containing silver details and paying tribute to the time

need restoration. Unfortunately, silver is a corrosion-resistant metal, and when interacting, for example, with

hydrogen sulfide, which is often in the form of an impurity contained in the ambient air, forms sulfur compounds,

the so-called "mobile". Some art products, which have been lying for quite a long time, are sometimes thoroughly

imbued with black. During the restoration of these old products are trying to preserve their original appearance and

design, without replacing it with a "new model", so the choice of restoration method is crucial to preserve the

historical and artistic value of the restored things.

Keywords: NA

References: 1. Struchenkov V.I. Computer Technologies In Line Structure Routing // Russian Technological Journal, 2017. Volume 5, Issue 1, P. 29-41.

URL: https://rtj.mirea.ru/upload/medialibrary/9b4/rtzh_2017_1_29_41.pdf

2. Borovik T.N., Yampolskii V.M., Krasheninnikov A.I. Design repaired products from alloys based on silver with the use of laser welding

// Design. Theoryand Practice, 2012, 10, p. 32-44.

3. Borovik T.N., Belousov I.V. Influence of technological factors on the quality of joints in pulsed laser welding // Research: theory,

methods and practice: materials of the International scientific-practical conference», 2017. – p. 271-273. – ISBN 978-5-9500297-4-5

4. Borovik T.N., Belousov I.V. The effect of defocusing on the occurrence of burns in pulsed laser welding of silver // Research: theory,

methods and practice: materials of the International scientific-practical conference, 2017. – p. 220-221. – ISSN 2412-0537.

5. Borovik T.N., Belousov I.V. Practical application in the educational environment of modern technologies in the field of materials //

Educational environment today: theory and practice: materials of the International scientific-practical conference. 2017. – С. 77-78. – ISBN 978-5-9500127-8-5.

6. Askretkov A.D., Koryakov A.G. The Some Economic Aspects Of Production Of Pharmaceutical Substance Hydroxyethyl Starch In Small

Industrial Scale // Russian Technological Journal, 2018. Volume 6, Issue 1, P. 53-62. URL:

7. https://rtj.mirea.ru/upload/medialibrary/587/RTZH_2018_1_53_62.pdf

8. Djevello E.S., etc. Specifics of Management Quality Implementation to Information Systems and Products // Proceedings of the 2018

International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,

2018, 8524995, p. 40-43.

9. Cheremukhina Y.Y., etc. The process of working with claims in the quality management system of an enterprise of the radio-electronic

industry // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 67-68.

10. Nazarenko M.A., etc. Main directions of higher education regionalization process as an integral part of social partnership in society (The

problems of inclusive education) // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 1135-

1138.

11. Sukhorukova S.M., Pogorelyi A.M. How To Ensure Environmental And Industrial Safety In Space Exploration? // Russian Technological

Journal, 2017. Volume 5, Issue 1, P. 57-63. URL: https://rtj.mirea.ru/upload/medialibrary/560/rtzh_2017_1_57_63.pdf

102-106

21. Authors: T.N. Borovik1*, V.V. Zuev2, E.V. Preobrazhenskaya3, I.V. Belousov4, N.S. Baranova5, A.V.

Page 17: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Minin6

Paper Title: Fuzzy C-Means Partition Cluster Analysis and Validation Studies On A Subset Of CiteScore Dataset

Abstract: The article deals with promising areas of application of pulsed laser welding for products made of

silver-based alloys. The results of experimental studies to improve the quality of the welded joint and the

efficiency of the welding process with the use of activated absorption additives are presented.

Keywords: weld quality, pulsed laser welding, absorption, reflection

References: 1. Demenkova Т.А., Tomashevskaya V.S., Shirinkin I.S. Mobile Applications For Tasks Of Distance Learning // Russian Technological

Journal, 2018. Volume 6, Issue 1, P. 6-19. URL: https://rtj.mirea.ru/upload/medialibrary/210/RTZH_2018_1_5_19.pdf

2. Borovik T.N., Yampolskii V.M., Krasheninnikov A.I. Design repaired products from alloys based on silver with the use of laser welding

// Design. Theoryand Practice, 2012, 10, p. 32-44.

3. Borovik T.N., Belousov I.V. Influence of technological factors on the quality of joints in pulsed laser welding // Research: theory,

methods and practice: materials of the International scientific-practical conference», 2017. – p. 271-273. – ISBN 978-5-9500297-4-5

4. Borovik T.N., Belousov I.V. The effect of defocusing on the occurrence of burns in pulsed laser welding of silver // Research: theory,

methods and practice: materials of the International scientific-practical conference, 2017. – p. 220-221. – ISSN 2412-0537.

5. Borovik T.N., Belousov I.V. Practical application in the educational environment of modern technologies in the field of materials //

Educational environment today: theory and practice: materials of the International scientific-practical conference,2017. – С. 77-78. – ISBN 978-5-9500127-8-5.

6. Katayama S. Handbook of laser welding, Technosphere, 2015.

7. Djevello E.S., etc. Specifics of Management Quality Implementation to Information Systems and Products // Proceedings of the 2018

International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524995, p. 40-43.

8. Nazarenko M.A., etc. Main directions of higher education regionalization process as an integral part of social partnership in society (The

problems of inclusive education) // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 1135-1138.

9. Cheremukhina Y.Y., etc. The process of working with claims in the quality management system of an enterprise of the radio-electronic

industry // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 67-68.

10. Nazarenko M.A., etc. Model end-to-end integrated quality management // International Journal of Engineering and Technology(UAE).

2018. Volume 7, Issue 4.36. P. 60-63.

107-111

22.

Authors: Rajiv Kalita

Paper Title: The availability and uses of E-resources in the college libraries of Baksa district of Assam: Current

status and prospects

Abstract: The present education system is moving from the traditional to towards the digital and electronic base

environment. The dominance of the ICT has put an effective impact on the college libraries too. In the

development index, the NE Region of India is always lacking behind, which may be due to its socio-economic,

geographical and demographical conditions. Hence, in the educational sector has always a tremendous pressure to

overcome such barriers.

The educational resources available with the academic institutions play a key role in uplifting the quality and

overall development of the students at a large. Therefore, this study try to portrait an actual picture of the current

E-resources available in the college libraries of Baksa district of Assam and as well as, it will try to figure out the

availability and uses of those resources by the library users through some findings.

Keywords: ICT, E-resources, college library, Baksa district

References: 1. Libraries. 5th International CALIBER-2007.Punjab University Chandighar.

2. Chakravarty,R & Singh,S.(2005). E-resources for Indian Universities: New Initiatives. SRELS journal of Information

Management.42(1),pp57-73

3. http://www.INFLIBNET.ac.in

4. https://www.census2011.co.in

5. http://baksa.gov.in/

112-116

1.

Authors: K. Gayathri, M. Thaiyalnayaki

Paper Title: ATTRITION OF EMPLOYEES OF INFORMATION TECHNOLOGY (IT) COMPANIES IN

BANGALORE CITY

Abstract: To manage their business in the competitive environment, management should focus on the

company’s internal power, this internal power is proven based on their attrition rates. Bangalore is called as

IT capital of India, hundreds and thousands of people from different parts of the country come to

Bangalore for their career growth and development. There are nearly 12000+ companies in Bangalore

hence the possibility of employees switching companies is high and hence the HR professionals are

challenged more. It becomes ineluctable for the IT companies of Bangalore to tackle high attrition rate

issue. This study is to with-stand the challenges faced due to high attrition and how to address them. In this

study, the opinions of 200 respondents were taken for the analysis purpose. In this research, structured

questionnaire has been incorporated for collecting data and chi-square test, percentage analysis and

ANOVA were used for analysis.

363-367

Page 18: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Index Terms: Information Technology, Attrition etc

References:

47. Kothari.C.R, RESEARCH METHODOLOGY, Reprint Edition 2004.

48. Agarwala Tanuja, STRATEGIC HRM, Oxford University Press, Edition 2007.

49. Bhattacharyya Kumar Dipak, HUMAN RESOURCE PLANNING, Anurag Jain for Excel Books, second edition 2002.

2.

Authors: Sujata Alegavi , Raghavendra Sedamkar

Paper Title: Hyper spectral image classification using Multi Labelled, Multi-Scale and Multi-Angle CNN with

MS-MA BT Algorithm

Abstract: For classifying the hyperspectral image (HSI), convolution neural networks are used widely as it

gives high performance and better results. For stronger prediction this paper presents new structure that

benefit from both MS - MA BT (multi-scale multi-angle breaking ties) and CNN algorithm. We build a new

MS - MA BT and CNN architecture. It obtains multiple characteristics from the raw image as an input.

This algorithm generates relevant feature maps which are fed into concatenating layer to form combined

feature map. The obtained mixed feature map is then placed into the subsequent stages to estimate the final

results for each hyperspectral pixel. Not only does the suggested technique benefit from improved extraction

of characteristics from CNNs and MS-MA BT, but it also allows complete combined use of visual and

temporal data. The performance of the suggested technique is evaluated using SAR data sets, and the

results indicate that the MS-MA BT-based multi-functional training algorithm considerably increases

identification precision. Recently, convolution neural networks have proved outstanding efficiency on

multiple visual activities, including the ranking of common two-dimensional pictures. In this paper, the MS-

MA BT multi-scale multi-angle CNN algorithm is used to identify hyperspectral images explicitly in the

visual domain. Experimental outcomes based on several SAR image data sets show that the suggested

technique can attain greater classification efficiency than some traditional techniques, such as support

vector machines and conventional deep learning techniques.

Index Terms: Convolution neural networks (CNNs), MS-MA BT (multi-scale multi-angle breaking ties),

Hyperspectral image (HSI), Classification, Synthetic aperture radar (SAR)

References:

[1] Sifan Wu, Junping Zhang, Chunyu Shi, Weike Li, “multiscale spectral-spatial hyperspectral image classification with

adaptive filtering “, IEEE, PP:2591 – 2594, 2018.

[2] Lin He , Jun Li ,Antonio Plaza ,Yuanqing Li ,“Discriminative Low-Rank Gabor Filtering for Spectral–Spatial

Hyperspectral Image Classification”, IEEE,PP:1381 – 1395, Volume:55, 2017.

[3] ShizhiZhao, WeiLi QianDu “Hyperspectral Classification Based on Siamese Neural Network Using Spectral-Spatial

Feature ”, IEEE,PP : 2567- 2570,2017.

[4] LichaoMou , PedramGhamisi ,XiaoXiangZhu,”Fully convdeconv network for unsupervised spectralspatial feature

extraction of hyperspectral imagery via residual learning” , IEEE,PP: 5181-5184, 2017

[5] ShrishBajpa, Harsh Vikram Singh, Naimur Rahman Kidwai, “Feature Extraction & Classification of Hyperspectral

Images using Singular Spectrum Analysis & Multinomial Logistic Regression Classifiers”, IEEE, PP: 97-100, 2018

[6] Miaomiao Liang , Licheng Jiao , Shuyuan Yang , Fang Liu , Biao Hou ,HuanChen,”Deep Multiscale SpectralSpatial

Feature Fusion for HyperspectralImage Classification”IEEE, PP : 2911 – 2924,Volume: 11,2018

[7] Mercedes E. Paoletti, Ruben Fernandez-Beltran, “Deep Pyramidal Residual Networks for Spectral–Spatial Hyperspectral

Image Classification”, IEEE, PP: 740 – 754, Volume: 57 ,2018

[8] Atif Mughees, Linmi Tao,” hyper-pixel based deep learning for hyperspectral image classification”, IEEE, PP:840-844,

2017

[9] Atif Mughees, Ahmad Ali, Linmi Tao, “Hyperspectral image classification via shape-adaptive deep learning”, IEEE,

PP:375-379,2017

[10] Shakati Sharama, rishan Mohan Bhuddhi, Raju, Gaurav Kumarda Shondhi, “Hyper spectrum image classification using

colony optimization algorithm based on joint spectrum special parameters”, IEEE, PP:3210-3213, 2017

[11] Wei Fu ,Shutao Li , Leyuan Fang ,Jón Atli Benediktsson , ”Spectral-spatial online dictionary learning for hyperspectral

image classification”, IEEE, PP:3724-3727, 2017

[12] SenJia, XiupingJia “Spectral–Spatial Gabor Surface Feature Fusion Approach for Hyperspectral Imagery Classification”,

IEEE, PP: 1142 – 1154,2018

[13] Nanjun He , Mercedes E. Paoletti , Juan Mario Haut , Leyuan Fang ,Shutao Li ,Antonio Plaza , Javier Plaza “Feature

ExtractionWith Multiscale Covariance Maps for Hyperspectral Image Classification”, IEEE, Volume:57, PP: 755 –

769,2018

[14] Lin He, Jun Li, Chenying Liu et al., “Recent Advances on Spectral–Spatial Hyperspectral Image Classification: An

Overview and New Guidelines” IEEE, Volume: 56, PP: 1579 – 1597, 2018

[15] Andreia Valentina Miclea, Romulus Terebes, Ioana Ilea, Monica Borda, “Hyperspectral Image Classification using

Combined Spectral-Spatial Denoising and Deep Learning Techniques”, IEEE,2018

368-374

Page 19: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

[16] Simranjit Singh, Singara Singh Kasana, “Spectral-Spatial Hyperspectral Image Classification using Deep Learning”,

IEEE,PP:411-417,2017

[17] Cheng Deng, Yumeng Xue ; Xianglong Liu ; Chao Li ; Dacheng Tao “Active Transfer Learning Network: A Unified

Deep Joint Spectral–Spatial Feature Learning Model for Hyperspectral Image Classification”, PP: 1741 –

1754,Volume:57, 2018

[18] Yuemei Ren, Liang Liao, Yanning Zhang, “Hyperspectral Image Spectral-Spatial Feature Extraction via Tensor Principal

Component Analysis”, Volume:14, PP:1431 – 1435,2017

[19] WEN SHU et al “Hyperspectral Image Classification Using Spectral-Spatial Features with Informative Samples”, IEEE,

PP. 20869 – 20878, 2019

[20] YipingDuan et al, “Multi-scale Convolutional Neural Network for SAR Image Semantic Segmentation”, IEEE, 2018

[21] Yanhui Guo, Han Cao, Jianjun Bai and Yu Bai, “High Efficient Deep Feature Extraction and Classification of

Spectral-Spatial Hyperspectral Image Using Cross Domain Convolution Neural Networks” IEEE, vol no: 12, PP: 345 –

356,2019

3.

Authors: K. Beemabai, Dr. K. Krishnakumar

Paper Title: Impact of Goods and Service Tax (GST) on MSMEs in India

Abstract: The Micro, Small and Medium Enterprises (MSMEs) sector has been deliberated as the chief

development driver of the Indian economy for the year(Sunil Mitra 2018). India is a predictable to appear

as one of the important economies in the world over the next decade in the light of a positive political and

economic scenario (Mc Kinsey 2017).The Micro, Small and Medium Enterprises (MSMEs) fragment is

expected to play a significant role in the appearance of the Indian Economy. The development of this part is

very decisive to meet the national imperatives of financial inclusion and generation of significant levels of

employment across urban and rural areas of the country (Annual Report 2017-18). Micro, Small and

Medium Enterprises (MSMEs) can be the backbone for obtainable and future of high growth business with

both domestic and foreign companies. The present paper will focus on existing scenario and trends of

MSMEs in India (ShriMadavLal 2015). There is equally important that the Micro, Small and Medium

Enterprises (MSMEs) sector develops in all areas of agriculture, manufacturing and services sectors

because each of these sectors will continue to be very relevant to the GDP growth as well as employment

generation (ShriR.S.Gujral 2017). The Micro, Small and Medium Enterprises (MSMEs) sectors will act as a

mechanism to bring about this socio-economic renovation. An attempt has been made in this study to find

the sector wise contribution to GDP after Implementation of Goods and Services Tax (GST).

Keywords : GST, MSMEs, Economic Growth, Indian Government.

References:

1. Agogo Mauli (2014) Goods and Service tax in India: problems and prospects, Asian Journal of Management Research, Volume 6 Issue

3, Research Article ISSN: 2229–3795.Page No: 504-510.

2. Annual Report (2017-18) Department of Industries and Commerce, New Delhi).

3. Annual Report of MSME (Year wise 2017-2018).

4. Annual Report Economic Survey (2017-18).

5. Business world (2018-19).

6. CA Rohit Pithisaria (2019) Proscenia Economics and Finance Volume 31, 2015, PgT No:T 373-379.

7. CiobanasuT (2012)T “ContributionT ofT taxesT toT theT makingT upT ofT budgetT revenueT inT EconomicT Growth”,T JournalT ofT knowledgeT

ManagementT EconomicsT andT informationT TechnologyT Vol.2T (IssueT 6)T Pg1-12.

8. DeccanT ChronicleT andT TheT EconomicT TimesT (2019).

9. FourthT AllT IndiaT CensusT ReportT ofT MSME.T (AnnualT ReportT 2017-18).

10. KeatingT ST (2011)T “GoodsT andT ServicesT Tax:T willT theT proposedT indirectT taxT ReformT changeT BusinessT andT TaxT DynamicsT inT

India”,T NUJST lawT ReviewT Vol.4T PgT 625T -638.

11. K.BeemabaiT andT Dr.K.KrishnakumarT (2019)T InternationalT JournalT ofT ManagementT TechnologyT andT Engineering,T Vol-IX,T Issue-

IVT AprilT 2019.T ImpactT factorT 6.3.

12. GoodsT andT ServicesT TaxT (GST)T 2017-18T EconomyT andT PolicyT

13. McT KinseyT (2017)T RBIT &T PressT InformationT BureauT 2017-18T (DGCIS).

14. MinistryT ofT StatisticsT andT ProgrammeT ImplementationT (2018-2019)T Govt.T ofT India.

15. NgwiraT (2019)T ResultsT ofT aT NationwideT SurveyT onT Micro,T Small,T andT MediumT EnterpriseT sinT Malaw.1993.

16. SatatyT PoddarT (2014)T EconomicT SurveyT (2017-18)T Volume-2.

17. ShashankaT (2018)EconomicT TimesT (2019)

ShriMadavLalT (2015)T RBIT &T PressT InformationT BureauT 2017-18T

363-367

4.

Authors: Suraj D. Bhosale, Atul K. Desai

Page 20: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title: Simulation of Masonry Wall using Concrete Damage Plasticity Model

Abstract: The objective of this article is to study the use of FE (Finite Element) tool in analyzed the masonry

wall. Masonry is made up of highly nonlinear material and its property varies from place to place. It is difficult to

do an experiment on a full-scale model of a masonry wall. Its effect is also underestimated in construction of low

rise building. As if the wall is confined and properly bonded to the beam and column. It enhances the performance

of low rise building during seismic forces. As in low rise building energy is dissipated by cracking. If masonry

wall is cast monolithically (like confined masonry) with the column, it augments the stiffness of building and helps

to sustain additional load compare to conventional construction practice. In this study numerical nonlinear analysis

of wall panel is done by FE tool (ABAQUS). Using Concrete Damage Plasticity Model (CDP). And results are

compared with the existing work done by other researchers and it is observed that results were satisfactory.

Keywords: Finite Element (FE), Concrete Damage Plasticity (CDP), Masonry wall.

References:

1. M. Teguh, “Experimental Evaluation of Masonry Infill Walls of RC Frame Buildings Subjected to Cyclic Loads,”

Procedia Eng., vol. 171, pp. 191–200, 2017.

2. K. F. Abdulla, L. S. Cunningham, and M. Gillie, “Simulating masonry wall behaviour using a simplified micro-

model approach,” Eng. Struct., vol. 151, pp. 349–365, 2017.

3. M. Resta, A. Fiore, and P. Monaco, “Non-Linear Finite Element Analysis of Masonry Towers by Adopting the

Damage Plasticity Constitutive Model,” Adv. Struct. Eng., vol. 16, no. 5, pp. 791–803, May 2013.

4. H. Jiang, X. Liu, and J. Mao, “Full-scale experimental study on masonry infilled RC moment-resisting frames under

cyclic loads,” Eng. Struct., vol. 91, 2015.

5. R. Oyguc and E. Oyguc, “2011 Van Earthquakes: Lessons from Damaged Masonry Structures,” J. Perform. Constr.

Facil., vol. 31, no. 5, p. 04017062, Apr. 2017.

6. N. N. Thaickavil and J. Thomas, “Behaviour and strength assessment of masonry prisms,” Case Stud. Constr. Mater.,

2018.

7. T. Kanayama, “Taxonomy and phylogeny of the family Agonidae (Pisces: Scorpaeniformes).,” Mem. Fac. Fish.

Hokkaido Univ., vol. 38, no. 12, pp. 1–199, 1991.

8. S. Noor-E-Khuda, M. Dhanasekar, and D. P. Thambiratnam, “Out-of-plane deformation and failure of masonry walls

with various forms of reinforcement,” Compos. Struct., vol. 140, pp. 262–277, 2016.

9. T. Sevil, M. Baran, T. Bilir, and E. Canbay, “Use of steel fiber reinforced mortar for seismic strengthening,” Constr.

Build. Mater., vol. 25, no. 2, pp. 892–899, 2011.

10. Y.-F. Wu and M. P. Dare, “Axial and Shear Behavior of Glass Fiber Reinforced Gypsum Wall Panels: Tests,” J.

Compos. Constr., vol. 8, no. 6, pp. 569–578, 2004.

11. T. Stablon, A. Sellier, N. Domede, B. Plu, and L. Dieleman, “Influence of building process on stiffness: Numerical

analysis of a masonry vault including mortar joint shrinkage and crack re-closure effect,” Mater. Struct. Constr., vol.

45, no. 6, pp. 881–898, 2012.

12. S. Noor-E-Khuda and M. Dhanasekar, “Masonry walls under combined in-plane and out-of-plane loadings,” J. Struct.

Eng., vol. 144, no. 2, pp. 1–10, 2018.

13. S. Nazir and M. Dhanasekar, “Modelling the failure of thin layered mortar joints in masonry,” Eng. Struct., vol. 49,

pp. 615–627, 2013.

14. L. C. Silva, P. B. Lourenço, and G. Milani, “Nonlinear Discrete Homogenized Model for Out-of-Plane Loaded

Masonry Walls,” J. Struct. Eng., vol. 143, no. 9, p. 04017099, 2017.

15. T. Yi, F. L. Moon, R. T. Leon, and L. F. Kahn, “Analyses of a Two-Story Unreinforced Masonry Building,” J. Struct.

Eng., vol. 132, no. 5, pp. 653–662, 2006.

16. C. Wang, J. P. Forth, N. Nikitas, and V. Sarhosis, “Retrofitting of masonry walls by using a mortar joint technique;

experiments and numerical validation,” Eng. Struct., vol. 117, pp. 58–70, 2016.

17. J. Proença, A. S. Gago, J. Cardoso, V. Cóias, and R. Paula, “Development of an innovative seismic strengthening

technique for traditional load-bearing masonry walls,” Bull. Earthq. Eng., vol. 10, no. 1, pp. 113–133, 2012.

18. P. Sartaji, A. S. Moghadam, and M. Ghafory Ashtiany, “Interaction of masonry walls and shear walls in masonry

buildings,” Proc. Inst. Civ. Eng. Struct. Build., vol. 171, no. 3, pp. 226–240, 2018.

19. G. de Felice et al., “Experimental characterization of composite-to-brick masonry shear bond,” Mater. Struct. Constr.,

vol. 49, no. 7, pp. 2581–2596, 2016.

20. M. A. Kyriakides and S. L. Billington, “Behavior of unreinforced masonry prisms and beams retrofitted with

engineered cementitious composites,” Mater. Struct. Constr., vol. 47, no. 9, pp. 1573–1587, 2014.

21. B. H. Pandey and K. Meguro, “Simulation of brick masonry wall behavior under in-plane lateral loading using

applied element method,” 13th World Conf. Earthq. Eng. Vancouver, BC, Canada, August, no. 1664, pp. 1–6, 2004.

22. H. Okail, A. Abdelrahman, A. Abdelkhalik, and M. Metwaly, “Experimental and analytical investigation of the

lateral load response of confined masonry walls,” HBRC J., vol. 12, no. 1, pp. 33–46, 2016.

23. H. B. Kaushik, D. C. Rai, and S. K. Jain, “Code approaches to seismic design of masonry-infilled reinforced concrete

frames: A state-of-the-art review,” Earthq. Spectra, vol. 22, no. 4, pp. 961–983, 2006.

24. K. Shahzada et al., “Experimental seismic performance evaluation of unreinforced brick masonry buildings,” Earthq.

Spectra, 2012.

25. M. B. Ravula and K. V. L. Subramaniam, “Investigation of Compression Failure in Brick,” no. 1, pp. 1–9, 2017.

26. K. S. Jagadish, S. Raghunath, and K. S. Nanjunda Rao, “Behaviour of masonry structures during the Bhuj earthquake

of January 2001,” Proc. Indian Acad. Sci. Earth Planet. Sci., vol. 112, no. 3, pp. 431–440, 2003.

27. S. Y. Wang, S. W. Sloan, A. J. Abbo, M. J. Masia, and C. A. Tang, “Numerical simulation of the failure process of

unreinforced masonry walls due to concentrated static and dynamic loading,” Int. J. Solids Struct., vol. 49, no. 2, pp.

377–394, 2012.

28. V. Sarhosis, S. W. Garrity, and Y. Sheng, “Influence of brick-mortar interface on the mechanical behaviour of low

bond strength masonry brickwork lintels,” Eng. Struct., vol. 88, pp. 1–11, 2015.

363-367

Page 21: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

29. C. V. R. Murty and S. K. Jain, “Beneficial Influence of Masonry Infill Walls on Seismic Performance of Rc Frame

Buildings,” Twelfth World Conf. Earthq. Eng., pp. 1–6, 2000.

5.

Authors: KADIROVA NASIMA SAIDBURHONOVNA, AKHMEDOVA SHOIRA NE’MATOVNA

Paper Title: STYLE AND SKILL: CRITIC’S ARTISTIC ABILITY

Abstract: The problem of the style of literary scholars or critics is one of the few studies in literature. The

method of literary criticism is the individuality, originality in understanding, researching and analyzing

fiction. The style is formed, first of all, by the nature of the scholar's understanding and perception of the

work of art. A critical or literary scholar's method is to determine the language, genre, composition,

realities and secrets of his article or research, use analysis techniques, pathos, links to life, artistic tastes,

and independent observations about life and reality, human and future. It stems from the specificity of the

description.

The literary critic Ibrohim Haqqulov has his own style, and the article analyzes his work in various ways,

including the understanding of the text, the specificity of the methods, the genre's diversity and the role of

literary criticism.

Keywords : literary critic, critic, classical literature, skill, style, scientist's remarks, critic, method, cultural method,

historical-cultural method, genre, article,essay.

References: 50. Sharafiddinov O. Awesome Understanding of Creation. Tashkent. 2006.

51. B.Nazarov, A.Rasulov, Sh.Ahmedova, Q. Kahramonov. "History of Uzbek Literary Criticism", Textbook. Tashkent, "Wing of the Tafakkur". 2012.

52. Haqqulov I. Fate and obedience. Tashkent. "Sharq". 2007.

53. Hakulov I. Spirituality and Perception. T. "Spirituality", 1998. 54. Back to Navoi. Tashkent. "Fan". 2011. Book 2

55. Ш.Ахмедова.Ўзбек адабий танқидчилиги жанрлари. Тошкент.2008

56. И.Ҳаққул. Ҳаёт, адабиёт ва абадият.Тошкент.2019 57. Қўшжонов М. Қалб ва қиёфа. Тошкент. АСН. 1978. 62-бет.

58. Қаюмов Л. Аср ва наср. Тошкент. АСН. 1975. 251-252-бетлар

363-367

6.

Authors: NAVULUR KRISHNA SURARCHITH & Dr. KRISHNAMOHAN VADDADI

Paper Title: Impact of Human Resource Accounting Practices on Decision Making in the Organization – Evidence

from a Private Company in Kurdistan Region of Iraq

Abstract: The current study aimed at understanding the impact of Human Resource Accounting practices on

decision making in an organization. The research was conducted on a private company in Kurdistan. Researchers

constructed a model where predictor variable is Human Resource Accounting Practices and Predicted variable is

Decision making.

The Research has null hypothesis and alternative hypothesis where the null hypothesis was“There is no

significant relationship between Human Resource Accounting Practices and Decision Making”. The alternative

hypothesis was “There is significant relationship between Human Resource Accounting Practices and Decision

Making”.

The sample size for the current research was 107 where researcher distributed 120 questionnaires where 13

questionnaires were not filled properly. Researchers used quantitative method to analyze the results of the current

research. The questionnaire consists of 20 questions which were organized randomly to avoid bias based responses

from the respondents.

Researchers concluded that HRA hasa strong positive effect on decision making where alternative hypothesis was

accepted and null hypothesis got rejected. The sample size was low as the researcher conducted pilot study on this

area and may get different results by increasing the sample size and demographics. The present research helps the

organization to understand the importance of Human Resource Accounting and the effect of HRA on decision

making.

Keywords: Human Resource Accounting practices, Decision making and private companies.

References:

1. Akindehinde, A., Enyi, P., & Olutokunbo, A. (2015). Human asset accounting aid corporate performance. . American

International Journal of Contemporary Research, 45-52.

2. Bullen, M. (2007). Human Resource Accounting: a Useful Tool for Measurement and Management in Organizations.

Leadership and Organizational Management Journal, 85-103.

3. Davidove, E. A., & Schroeder, P. A. (1992). Demonstrating ROI of training. Training and Development, 46-70.

4. Enyi, E., & Akindehinde, A. (2014). Human Resource Accounting and Decision Making in Post-Industrial Economy.

International Journal of Accounting and Taxation, 19-35.

5. Flamholtz, E. G., Bullen, M. L., & Hua, W. (2002). Human resource accounting: a historical perspective and future

363-367

Page 22: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

implications. Management Decision, 947-954.

6. Hossain, A., Akhter, N., & Sadia, N. (2014). An Empirical Analysis on Importance of Human Resource Accounting

(HRA) Practices in the Organizations. International Journal of Ethics in Social Sciences.

7. Sunil, S. P., & Praveen, N. C. (2015). A STUDY OF PERSPECTIVE OF HUMAN RESOURCE EXECUTIVE FOR

APPLICATION OF HUMAN RESOURCE ACCOUNTING IN HOTELS . Indian Journal of Research in

Management, Business and Social Sciences, 1-5.

7.

Authors: Tamminana Kamaraju, Krishna Surarchith Navulur, Yusra Farooq Baqal

Paper Title: Impact of attitude towards Human Resource Accounting on performance of undergraduate students’

education – Evidence from private university students in Kurdistan Region – Iraq

Abstract: The current research was undertaken to find the impact of attitude towards Human Resource

Accounting on performance of undergraduate student’s education. The research was carried out as a pilot study on

accounting department’s students who are pursuing their 3rd year and final year of their under graduation in a

private university which is located in Kurdistan Region – Iraq. The total number of students in accounting

department was 125 where 59 students responded to the questionnaire distributed. Researchers used Delphi

technique where respondents are given chance to choose their responses in the first round randomly. All results of

each item of the survey were shown to the respondents in the second round and requested to re-confirm their

responses and provided freedom to change their responses. Researchers found few differences from first round to

the second round of survey with the same respondents. Researchers constructed a basic model to understand the

impact of predicted variable and predictor variables. The predictor variable for current research is attitude towards

Human Resource Accounting and Predicted variable is performance of undergraduate students’ education. The

null hypothesis got rejected in the study. The research gap was identified by the researchers as literature was

completely focused on reporting, measuring and evaluating the human values but overlooked the attitude part

related to human resource accounting. Current research helps the educational institutions to understand the value

of human resource accounting and implication of it to achieve high level of productivity among student

community.

Keywords: Human Resource Accounting, attitude, performance and students

References:

1. Abeysekera, I., & Guthrie, J. (2004). The British Accounting Review, Vol. 36, No.3. “Human capital reporting in a

developing nation, 251-268.

2. Cordon, B. (1998, January). Gaps In GAAP. Forbes, pp. 26-28.

3. Corrado, C., Hulten, C., & Sichel, D. (2005). Measuring Capital and Technology: An Expanded Framework’. 11-41.

4. Flamholtz, E. G., Maria, L. B., & Wei, H. (2002). Human resource accounting: A historical perspective and future

implications. Management Decisions, 947-954.

5. Mary M. K, .. F. (1977). BEHAVIORAL IMPLICATIONS OF HUMAN RESOURCE ACCOUNTING: A SURVEY

OF POTENTIAL PROBLEMS. Behavioral Implications of HRA, 25-29.

6. Rylander, A. J. (2000). Towards improved information disclosure of intellectual capital. International Journal of

Technology Management, Vol. 20 Nos 5/6/7/8, 715-741.

7. Sen, D., Jain, S., Jat, S., & Saha, R. (2008). Human Resource Accounting Information: Its Impact on Internal

Decision-Making . The Journal of Accounting and Finance, 22(1), 23-46.

8. Toms, J. (2002). Firm resources, quality signals and the determinants of corporate environmental reputation: some

UK evidence. British Accounting Review, Vol. 34 No. 3, 257-282.

9. van der Meer, K. J., & Vosselman, E. (2000). Management control of interfirm transactional relationships: the case of

industrial renovation and maintenance. Accounting organizations and society, 25(1), 51-77.

363-367

8.

Authors: Chaman Verma, Zoltán Illés, Veronika Stoffová

Paper Title: Gender Prediction of Indian and Hungarian Students towards ICT and Mobile Technology for the

Real-Time

Abstract: The present paper focused on the prediction of the university student's gender towards Information

Communication Technology (ICT) and Mobile Technology (MT) in Indian and Hungary.In this paper, four

experiments were performed on dataset using three popular classifiersnamed Support Vector Machine (SVM),

Artificial Neural Network (ANN) and Random Forest (RF) with three numerous testing technique such as K-fold

Cross Validation (KCV), Hold Out (HO) and Leave One Out (LOO).Three different applications named Explorer,

Experimenter and KnowledgeFlow (KF) of Weka 3.9.1 are used for predictive modeling. The class balancing has

been also applied using Synthetic Minority Over-Sampling (SMOTE) to enhance the prediction accuracy of each

algorithm. Further, a significant difference among classifier’s accuracies has also been tested using T-test at the

0.05 confidence level. Also, CPU user time has been calculated to train each model to justify to present real-time

prediction of gender towards ICT and MT.The results of the study inferred that the CPU time is significantly

differed in between RF (0.18 Seconds), SVM (0.06 seconds) and ANN (4.40 seconds).Also, the RF classifier

(89.4%) outperformed others with LOO method in terms of accuracy.The authors recommended these predictive

363-367

Page 23: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

models to be deployed as an online prediction for the gender of the student towards ICT and MT at both

universities to track technological activities.

Keywords: Gender Prediction, Machine Learning, LOO, Prediction Accuracy, HO, KCDV, SMOTE.

References: 1. Chaman Verma and Sanjay Dahiya (2016). Gender difference towards information and communication technology

awareness in Indian universities. SpringerPlus, 5:1–7.

2. Chaman Verma, Sanjay Dahiya and Deepak Mehta (2016). An analytical approach to investigate state diversity

towards ICT: A study of six universities of Punjab and Haryana. Indian Journal of Science and Technology,9 (31): 1–

5.

3. Chaman Verma, VeronikaStoffová and ZoltánIllés (2018). Perception difference of Indian students towards

information and communication technology in context of university affiliation. Asian Journal of Contemporary

Education, 2 (1): 36-42.

4. Chaman Verma (2017). Educational data mining to examine mindset of educators towards ICT knowledge. Int. J.

Data Min. Emerg. Technol.,7 (1): 53-60.

5. Chaman Verma, VeronikaStoffová and ZoltánIllés (2018). Analysis of Situation of Integrating Information and

Communication Technology in Indian Higher Education. International Journal of Information and Communication

Technologies in Education, 7 (1): 24-29.

6. Chaman Verma and ZoltánIllés (2019). Attitude Prediction Towards ICT and Mobile Technology for The Real-Time:

An Experimental Study Using Machine Learning. In: Proceedings of The 15th International Scientific Conference

eLearning and Software for Education, 3, pp. 247–254.

7. Chaman Verma, VeronikaStoffová and ZoltánIllés (2019). Prediction of students’ awareness level towards ICT and

mobile technology in Indian and Hungarian University for the real-time: preliminary results. Heliyon, Elsevier, 5 (6):

1-9.

8. Chaman Verma, VeronikaStoffová and ZoltánIllés (2019). Prediction of Residence Country of Student towards

Information, Communication and Mobile Technology for Real-Time: Preliminary Results. Procedia Computer

Science, Elsevier :1-11.

9. Chaman Verma, Ahmad S. Trananweh, VeronikaStoffová and Zoltán. Illés (2018). Forecasting residence state of

Indian student based on responses towards information and communication technology awareness: A primarily

outcomes using machine learning. In: Proceedings of IEEE International Conference on Innovations in Engineering,

Technology and Sciences, In Press.

10. Chaman Verma, Ahmad S. Trananweh, VeronikaStoffová, Zoltán. Illés and Sanjay Dahiya (2018). Gender prediction

of the European school’s teachers using machine learning: Preliminary results. In: Proceedings of IEEE International

Advance Computing Conference, pp. 213–220.

11. Chaman Verma, VeronikaStoffová, ZoltánIllés (2018). An ensemble approach to identifying the student gender

towards information and communication technology awareness in european schools using machine learning.

International Journal of Engineering and Technology, 7 (4): 3392–3396.

12. Chaman Verma, VeronikaStoffová, ZoltánIllés and Sanjay Dahiya (2018). Binary logistic regression classifying the

gender of student towards Computer Learning in European schools. In: Proceedings of THE 11th Conference of Ph.D

students in computer science, pp. 45. Szeged University, 2018.

13. Chaman Verma, VeronikaStoffová, ZoltánIllés (2019). Age group predictive models for the real time prediction of

the university students using machine learning: Preliminary results. In: Proceedings of IEEE International Conference

on Electrical, Computer and Communication, In Press.

14. Chaman Verma, Ahmad S. Trananweh, VeronikaStoffová, Zoltán. Illés and Mandeep Singh (2019). National identity

predictive models for the real time prediction of European schools students: preliminary results. In: Proceedings of

IEEE International Conference on Automation, Computational and Technology Management, UK. In Press.

15. Chaman Verma, VeronikaStoffová, ZoltánIllés (2019). Prediction of Locality Status of the student based on gender

and country towards ICT and Mobile Technology for the real time. In: Proceedings of XXXII-DIDMATTECH,

Slovakia, In Press.

16. Chaman Verma, ZoltánIllés, VeronikaStoffová (2019). Real-time prediction of development and availability of ICT

and Mobile Technology in Indian and Hungarian University. In: Proceedings of InternationalConference on Recent

Innovations in Computing, Springer, In Press.

17. YatishBathla, Chaman Verma and Neerendra Kumar, “Smart Approach for Real Time Gender Prediction of European

School's Principal Using Machine Learning,” In: Proceedings of International Conference on Recent Innovations in

Computing, Springer, In Press.

18. G.Priya and N.Venkatesan (2015). A study of random forest algorithm with implementation using weka. International

Journal of Innovative Research in Computer Science and Engineering,1(6): 156-162.

19. Sushilkumar Ramesh pant Kalmegh (2015). Comparative analysis of weka data mining algorithm random forest,

random tree and lad tree for classification of indigenous news data. International Journal of Emerging Technology

and Advanced Engineering, 5(1): 507-517.

20. Chih-Wei Hsu, Chih-Chung Chang and Chih-Jen Lin (2003). A practical guide to support vector classification.

21. Ali.S (2005). Automated Support Vector Learning Algorithms. PhD dissertation, Monash University, Australia.

22. Christopher JC Burges (1998). A tutorial on support vector machines for pattern recognition. Data mining and

knowledge discovery, 2 (2): 121-167.

23. Ruey Long Cheu, Dipti Srinivasan, and Eng Tian The (2003). Support vector machine models for freeway incident

detection. In: Proceedings of IEEE Intelligent Transportation Systems, vol. 1, pp. 238-243.

24. Marvin Minsky and Seymour APapert (2017). Perceptrons: An introduction to computational geometry. MIT press,

2017.

25. EthemAlpaydin (2009). Introduction to machine learning. MIT press.

9.

Authors: Dr. Fatih Cura

Page 24: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title: Motivation, Adjustment and Retention of Academic Expatriates: The Case Study of Tishk International

University

Abstract: International organizations represent a dynamic workplace where people from different cultures

and work background are working together to achieve a common goal. Whenever an individual is attracted from

another country in which (expatriation) or giving an opportunity to someone who is living outside his country to

work in his homeland again (repatriation), a set of challenges will rise. Organizations need to guide and control the

process by adopting programs specialized in the expatriation and repatriation in which it will be given after the

arrival of the employee in different or in-home country.

This research paper explores motivations and the expectations that make the academic expatriates join the

international universities in other countries by taking a case study in one of the international private universities in

Kurdistan Region of Iraq. From this point of view, literature review will present benefits of joining teaching in the

host country universities, also identifying the difficulties that they have faced during performing their duties and

their feedbacks and recommendations to the other expats who wants to join such a program. As Tshik International

University (Formerly known as Ishik University) represents one of the top private universities in Kurdistan and has

diverse staff. Data is collected by using method of interview as qualitative approach. The sample of the study

international university staff. The results of the study represented by a set of findings which mainly settled on main

motivation factors to the academic expatriate to join the international assignment like international experience,

research interests, and the interest to discover new cultures.

Keywords: Expatriation, Self-Initiated expatriates, Cross-Cultural Training, OrganizationalExpatriates,

Adjustment, Retention, KRG, TishkInternational University (Formerly known as Ishik University).

References:

1. Beaverstock, J. (. (1996). Lending Jobs to Global Cities: Skilled International Labour Migration Investment Banking

and the City of London. Urban Studies, 33, 8, 1377–1394.

2. Bhaskar-Shrinivas, P., Harrison, D.A., Shaffer, M.A., and Luk, D.M. (2005), ‘Input Based and Time-Based Models

of International Adjustment: Meta-Analytical Evidence and Theoretical Extensions,’ Academy of Management

Journal, 482, 257–281.

3. Bierbrauer, G., & Pedersen, P. (1996). Culture and Migration,’ in Applied Social Psychology, eds. London: Sage,

399–422.

4. Black, J., & Stephens, G.K. (1989). The Influence of the Spouse on American Expatriate Adjustment and Intent to

Stay in Pacific Rim Overseas Assignments .Journal of Management , 15, 529–544. Brett, J., & Stroh, L.K. (1995).

Willingness to Relocate Internationally,.Human ResourceManagement, 34, 405–424.

5. Collings, D., Scullion, H.,,& Morley, M.J. (2007). Changing Patterns of Global Staffing in the Multinational

Enterprise: Challenges to the Conventional Expatriate Assignment and Emerging Alternatives. Journal of World

Business, 42, 198–213.

6. Danisman, S. (2017). Attitudes towards culture in the new home: Self-initiated expatriate academics in Turkey.

British Journal of Middle Eastern Studies, Vol. 44 No. 1, pp. 1-29.

7. Dickmann, M., Doherty, N., Mills, T., & Brewster, C. (2008). Why Do they Go? Individual and Corporate

Perspectives on the Factors Influencing the Decision to Accept an International Assignment. International Journal of

Human Resource Management, 19, 731–751.

8. Froese, F. J. (2012). Motivation and adjustment of self-initiated expatriates: the case of expatriate academics in South

Korea. The International Journal of Human Resource Management,, Vol. 23, No. 6,1095–1112.

9. Froese, F., &Peltokorpi, V. (2009). Cultural Distance and Expatriate Job Satisfaction .InternationalJournal of

Intercultural Relations, 35, 49–60.

10. Gregersen HB, Black JS (1990). A multifaceted approach to expatriate retention in international assignments. Group

and Organization Studies, 15(4), 461-485

11. Hussain, T., &Deery, S. (2018). Why do self-initiated expatriates quit their jobs: The role of job embeddedness and

shocks in explaining turnover intentions.International Business, 27 (1), 281-288. Inkson, K., & Myers, B.A. (2003).

‘“The Big OE”: Self-Directed Travel and Career Development. Career Development International, 8, 170–181.

12. Lee, C. (2005). A Study of Underemployment among Self-Initiated Expatriates. Journal of WorldBusiness, 40, 172–

187.

13. Lent, R., Brown, S.D., & Hackett, G. (1994). Contextual Supports and Barriers to Career Choice: A Social Cognitive

Analysis. Journal of Counseling Psycholog, 47, 36–49.

14. Massey, D., & Espinosa, K. (1997). What’s Driving Mexico-U.S. Migration? A Theoretical, Empirical, and Policy

Analysis .American Journal of Sociology, 102, 939–999.

15. Miller, E., & Cheng, J.L. (1978). A Close Look at the Dispersion to Accept an Overseas Position. Management

International Review, 3, 25–33.

16. Peltokorpi, V., & Froese, F.J. (2009). Organizational Expatriates and Self-Initiated Expatriates Who Adjusts Better to

Work and Life in Japan?’.International Journal of Human Resource Management, 20, 5, 1095–1111.

17. Pringle, J., & Barry, S. (1997). Expatriate assignment versus overseas experience: Contrasting models of international

human resource development. Journal of World Business, 32, 351-368. doi:10.1016/S1090-9516(97)90017-1

18. Ren, H., Shaffer, M.A, Harrison, D.A., Fu, C., &Fodchuk, K.M. (2014). Reactive adjustment or proactive

embedding? Multistudy, multiwave evidence for dual pathways to expatriate retention. Personnel Psychology, 67(1),

203-239.

19. Richardson, C., &wong ,H.W. (2018). Expatirate academics in malaysia :Motivation ,adjusmnet and retention.

Journal of Managmnet development, 3(37), 299-308.

20. Richardson, J., & McKenna. (2003). Leaving and Experiencing: Why Academics Expatriate and How They

363-367

Page 25: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Experience Expatriation. Career Development International, 7, 67–78.

21. Schoepp, K. (2011). The path to development: Expatriate faculty in the UAE. InternationalEducation, Vol. 40 No. 2,

pp. 58-75.

22. Shaffer, M. A., Kraimer, M. L., Chen, Y., &Bolino, M. C. (2012). Choices, challenges, and career consequences of

global work experiences: A review and future agenda. Journal of Management, 38(4), 1282–1327

23. Stahl, G., &Cerdin, J.-L. (2004). Global Careers in French and German Multinational Corporations.

24. Journal of Management Development, 23, 885–902.

25. Suutari, V., & Brewster, C. (2000). Making Their Own Way: International Experience through Self-Initiated Foreign

Assignments .Journal of World Business, 35, 417–436.

26. Takeuchi, Yoshimi (2005a) ‘Asia as Method’. In Richard F. Calichman (ed.) (trans.) What Is Modernity? Writings of

Takeuchi Yoshimi, Columbia University Press, 149–166.

27. Takeuchi, S., Yuki, Y., Ueyama, A., &Kajishima, T. (2010). A conservative momentum-exchange algorithm for

interaction problem between fluid and deformable particles. International Journal for Numerical Methods in Fluids,

64(10-12), 1084-1101.

28. Tharenou, P. (2008). Disruptive Decisions to Leave Home: Gender and Family Differences in Expatriation Choices.

Organizational Behavior and Human Decision Processes, 105, 183–200. Tung, R. (1998). American Expatriates

Abroad: From Neophytes to Cosmopolitans. Journal of WorldBusiness, 33, 125–144.

29. Tungli, Z., and Peiperl, M. (2009), ‘Expatriate Practices in German, Japanese, UK, and US Multinational Companies:

A Comparative Survey of Changes,’ Human Resource Management, 48, 1, 153–171.

10.

Authors: Karwan H. Sherwani

Paper Title: The Effect of Perceived Organizational Support on Employee’s Organizational Commitment and

Employee Behavior. The case of a Construction Company in Erbil City, Kurdistan Region

Abstract: Lately, Perceived Organizational Support, Organizational Commitment and Employee behavior have

given much concentration. The aim of this paper is to analyze the effect of Perceived Organizational Support on

Organizational Commitment, and Employee Behavior. According to the prior research, there are contradicting

findings regarding the relationship and significant effect between the three variables mentioned. The strategy of

this research is quantitative by using an online questionnaire consisted of three validated scales. The online

questionnaire has been sent to employees’ emails of a constructioncompany in Erbil city. There are 64 properly

filled online questionnaires have been received. The author has used Reliability test to determine the Cronbach

Alpha of the scales, the Pearson correlations to measure the relationship and Linear Regression analysis to measure

the effect of independent variable on the dependent variables. The results indicate that Perceived Organizational

Support has a significant effecton Employee Behavior and Organizational Commitment. Moreover, the findings

also indicate a strong relationship exists between Perceived Organizational Support and Organizational

Commitment.

Keywords: Organizational commitment, Perceived Organizational Support, Employee behavior, Erbil

References:

1. Adekola, B. (2012). The Impact of Organizational Commitment on Job Satisfaction: A Study of Employees at

Nigerian Universities. International Journal Of Human Resource Studies, 2(2), 1. doi: 10.5296/ijhrs.v2i2.1740

2. Aguinis, H. (2013). Performance Management. Harlow: Pearson.

3. Ali, N. (2009). Effects of Perceived Organizational Support and Leader-member Exchange on Organizational

Citizenship Behavior, Abasyn University Journal of Social Sciences, 3(2), 53

4. Allen, N., & Meyer, J. (1990). The measurement and antecedents of affective, continuance and normative

commitment to the organization. Journal Of Occupational Psychology, 63(1), 1-18. doi: 10.1111/j.2044-

8325.1990.tb00506.x

5. Allen, N., & Meyer, J. (1996). Affective, Continuance, and Normative Commitment to the Organization: An

Examination of Construct Validity. Journal Of Vocational Behavior, 49(3), 252-276. doi: 10.1006/jvbe.1996.0043

6. Antilla, E. (2014). Components of Organizational Commitment (MSC., Thesis). University of Tampere.

7. Aubé, C., Rousseau, V., & Morin, E. (2007). Perceived organizational support and organizational commitment.

Journal Of Managerial Psychology, 22(5), 479-495. doi: 10.1108/02683940710757209

8. Eisenberger, R., R. Huntington, S. Hutchison, and D. Sowa. 1986. “Perceived Organizational Support.” Journal of

Applied Psychology 71: 500-507.

9. AyimGyekye, S., &Salminen, S. (2007). Workplace Safety Perctions and Perceived Organizational Support: Do

Supportive Perceptions Influence Safety Perceptions?. International Journal Of Occupational Safety And

Ergonomics, 13(2), 189-200. doi: 10.1080/10803548.2007.11076721

10. Lee, C., & Chen, C. (2013). The Relationship between Employee Commitment and Job Attitude and Its Effect on

Service Quality in the Tourism Industry. American Journal Of Industrial And Business Management, 03(02), 196-

208. doi: 10.4236/ajibm.2013.32025

11. Jayasree, K. and Sheela, M.V., (2012). Perceived Organizational Support – An Overview of its Antecedents and

Consequences. International Journal of Multidisciplinary Research. Vol. 2. Issue 4. Pp.1-12

12. Ekowati, D., &Andini, M. (2008). Perceived organizational support (POS) and organizational commitment.

JurnalManajemenTeori Dan Terapan| Journal Of Theory And Applied Management, 1(2), 96-108.

13. Hafiz AZ (2017) Relationship between Organizational Commitment and Employee’s Performance Evidence from

Banking Sector of Lahore. Arabian J Bus Manag Review 7: 304. doi: 10.4172/2223-5833.1000304

14. Kessler, E. H. (2013). The encyclopedia of Management Theory. Los Angeles: Sage Publications.

15. Kont, K., &Jantson, S. (2014). Organizational Commitment in Estonian University Libraries: A Review and Survey.

363-367

Page 26: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

New Review Of Academic Librarianship, 20(3), 296-319. doi: 10.1080/13614533.2014.898671

16. Leite, N., Rodrigues, A., & Albuquerque, L. (2014). Organizational Commitment and Job Satisfaction: What Are the

Potential Relationships?. BAR - Brazilian Administration Review, 11(4), 476-495. doi: 10.1590/1807-

7692bar2014276

17. Md. Sahidur, R., & Karan, R. (2012). Perceived Organizational Support and Organizational Commitment:

Bangladesh Perspective. The Chittagong University Journal Of Business Administration, 27(1), 205-220.

18. Meyer, J.P. (2014). Organizational commitment. In D.E. Guest and D. Needle (Eds.). Human

19. Resource Management, (Vol. 5 of the Wiley Encyclopedia of Management, 3rd Edition, pp.

20. 199-201). Chichester, UK: Wiley.

21. Rhoades, L., &Eisenberger, R. (2002). Perceived organizational support: A review of the literature. Journal Of

Applied Psychology, 87(4), 698-714. doi: 10.1037//0021-9010.87.4.698

22. S. McCutcheon, R. (2018). An Academic Review of Employee Behavior Management. Advances In Economics And

Business, 6(5), 291-298. doi: 10.13189/aeb.2018.060502

23. Slocombe, T.E. & Dougherty, T.W. Journal of Business and Psychology (1998) 12: 469.

https://doi.org/10.1023/A:1025055122988

24. Shore, L., & Wayne, S. (1993). Commitment and employee behavior: Comparison of affective commitment and

continuance commitment with perceived organizational support. Journal Of Applied Psychology, 78(5), 774-780. doi:

10.1037//0021-9010.78.5.774

25. Suffian, A.,&Azlan, N.,&Nasiha A., &Fadhilah, A. (2017). The Organizational Commitment towards Employee’s

Performance: A Case Study at Elektro Serve (M) Sdn Bhd. Journal of Biological and Environmental Sciences, 7(12),

134-145.

26. Tahlil Azim, M. (2016). Corporate Social Responsibility and employee behavior: mediating role of organizational

commitment. Review Of Business Management, 18, 207-225. doi: 10.7819/rbgn.v18i60.2319

27. Tevichapong, P. (2012). Individual spirit at work and its relationship with employee work attitudes and organisational

outcomes (Ph.D., dissertation). Aston University.

28. Williams, L. J., & Anderson, S. E. (1991). Job satisfaction and organizational commitment as predictors of

organizational citizenship and in-role behaviors. Journal of Management(17), 601–617.

29. Worley, J., Fuqua, D., & Hellman, C. (2009). The survey of perceived organisational support: Which measure should

we use?. SA Journal Of Industrial Psychology, 35(1). doi: 10.4102/sajip.v35i1.754

11.

Authors: PRAKASH V. PARANDE, Dr. M. K. BANGA

Paper Title: Web-of-Service Software Reusability Prediction Using Heterogenous Ensemble Classifier

Abstract: WoS computing environment is expected to have numerous parallel computing engines. Presently,

software professionals or developers often want to reuse existing software components to exhibit a task with time-

efficient and cost effective solutions. However, software component reusability in uncontrolled manner leads to

failure, pre-mature shutdown and software smells or aging. This paper develops a novel evolutionary computing

assisted ensemble classification system for WoS software reusability prediction. This applies different base

learners such asNaïve Bayes (NB), Linear Regression (LR), Decision Tress (DT),Logarithmic Regression

(LOGR),and Support Vector Machine (SVM),Multivariate Adaptive Regression Spline (MARS). Once training the

base learners, the outputs of each classifier have been processed with majority vote.The computation in

conjunction with weighted sum enabled final labelling of each software class. The performance results affirmed

that the present work ensemble classifier has better performance with respect to base classifiers.

Keywords: Ensemble classifier; heterogeneous ensemble; web-of-service; software reusability prediction.

References:

1. G. Caldiera, and V.R. Basili, “Identifying and qualifying reusable software components,” IEEE Software, vol. 24,

pp. 61-70, 1991.

2. I. Sommerville, “Software Engineering”. 9th Edition, Addison-Wesley, New York, 2011.

3. G. Singh, “Metrics for measuring the quality of object-oriented software,” ACM SIGSOFT Software Engineering

Notes, vol. 38, pp. 1-5, 2013.

4. M. M. Stapic, “Reusability metrics of software components: Survey”, conference paper • September, 2015.

5. S. Srivastava and R. Kumar, "Indirect method to measure software quality using CK-OO suite," Intelligent Systems

and Signal Processing (ISSP), International Conference on, Gujarat, pp. 47-51, 2013.

6. B. M. Goel, Pradeep Kumar Bhatia “ Analysis of reusability of object-oriented system using CK metrics”,

International Journal of Computer Applications, vol. 60, no.10, 2012.

7. N.S. Bakar “The analysis of object-oriented metrics in C++ programs”, Lecture Notes on Software Engineering, vol.

4, no. 1, 2016

8. A. T. Mohammad “Metric suite to evaluate reusability of software product line”, International Journal of Electrical

and Computer Engineering (IJECE), vol. 4, no. 2, pp. 285-294, 2014.

9. L. Nanni, S. Brahnam, S. Ghidoni, and A. Lumini, “Toward a General-PurposeHeterogeneous Ensemble for Pattern

Classification,” Computational Intelligence and Neuroscience, vol. 2015.

10. M. Barghash, “An effective and novel neural network ensemble for shift pattern detection in control charts,”

Computational Intelligence and Neuroscience, vol. 2015, Article ID939248, 2015.

11. G. Tsoumakas, L. Angelis, I. Vlahavas, Selective fusion of heterogeneous classifiers, Intelligent Data Analysis Vol. 9

(6), pp. 511–525, 2005

12. R. R. Brooks, P. Ramanathan; A. M. Sayeed, “Distributed Target Classification and Tracking in Sensor Networks,

Proceedings of the IEEE Vol. 91, pp. 1163-1171, 2003.

13. C. Dong-Sheng, et al., The boosting: a new idea of building models, Elsevier, Amsterdam, PAYS-BAS, 2010, vol.

363-367

Page 27: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

100, pp.1–11.

14. K. M. Ting, Z.Zheng, A study of Adaboost with Naïve Bayesian classifiers: weakness and improvement,

Computational Intelligence Vol. 19(2), pp. 186–200, 2003.

15. H. Singhani, R. P. Suri “Testability assessment model for object oriented software based on internal and external

quality factors”, Global Journal of Computer Science and Technology: C Software & Data Engineering, vol. 15,

no.5, 2015.

16. M. Mijac, Z. Stapic, “Reusability metrics of software components: Survey”, Central European conference on

Information and Intelligent system conference paper • September, 2015.

17. S. Srivastava and R. Kumar, "Indirect method to measure software quality using CK-OO suite," Intelligent Systems

and Signal Processing (ISSP), International Conference on, Gujarat, pp. 47-51, 2013.

18. B.M. Goel, and P.K. Bhatia, “Analysis of reusability of object-oriented system using CK metrics,” International

Journal of Computer Applications, Vol.60, No.10, pp.0975–8887, 2012.

19. L.H. Rosenberg, and L.E. Hyatt, “Software quality metrics for object-oriented environments,” Crosstalk Journal, vol.

10, pp. 1-16, 1997

20. S.R. Chidamber, and. C. F. Kemerer, “A metrics suite for object oriented design,” IEEE Transactions on Software

Engineering, vol. 20, pp. 476-493, 1994.IEEE PressPiscataway, NJ, USA.

21. R. Shatnawi, W. Li, J. Swain, and T. Newman, “Finding software metrics threshold values using roc curves,” Journal

of Software Maintenance and Evolution: Research and Practice, vol. 22, pp. 1-16, 2010.John Wiley & Sons, Inc.New

York, NY, USA.

22. P. Neelamdhab, S. Satapathy, R. Singh, (2017). Utility of an Object Oriented Reusability Metrics and Estimation

Complexity. Indian Journal Of Science And Technology, 10(3).

23. Normi Sham Awang Abu Bakar “The analysis of object-oriented metrics in C++ programs”, Lecture Notes on

Software Engineering, Springer ,vol. 4, no. 1, 2016.

24. S. I. Zahara, M. Ilyas, and T. Zia, "A study of comparative analysis of regression algorithms for reusability evaluation

of object oriented based software components," Open Source Systems and Technologies (ICOSST), International

Conference on, Lahore, pp. 75-80, 2013.

25. Torkamani M. A. “Metric suite to evaluate reusability of software product line”, International Journal of Electrical

and Computer Engineering (IJECE), vol. 4, no. 2, pp. 285-294, 2014.

26. A. Aloysius, and K. Maheswar, “A review on component based software metrics”, Intern. J. Fuzzy Mathematical

Archive, vol. 7, no. 2, pp. 185-194, 2015.ISSN: 2320 –3242 (P), 2320 –3250 (online)

27. E.S. Cho, M.S. Kim, and S.D. Kim, (2001) “Component metrics to measure component quality,” Proceedings of the

8th Asia Pacific Software Engineering Conference (APSEC), Macau, vol. 4-7, pp. 419-426, 2001.

28. J. Kittler, Multi-Sensor Integration and Decision Level Fusion. Proc. DERA/IEE Workshop Intelligent Sensor

Processing 2001, 1-6.

29. R. Polikar, D. Parikh; Shreekanth; Mandayam. Multiple Classifier Systems for Multisensor Data Fusion. SAS 2006 -

IEEE Sensors Applications Symposium 2006, 180-184.

30. Schapire, R. E. A Brief Introduction to Boosting. Proceedings of the Sixteenth International Joint Conference on

Artificial Intelligence 1999, 1401-1406.

31. T. G. Dietterich, Machine learning research: Four current directions. AI Magazine 1997, 18, 97- 136.

32. M. Barghash, “An effective and novel neural network ensemble for shift pattern detection in control charts,”

Computational Intelligence and Neuroscience, vol. 2015, Article ID939248, 2015.

33. L. Nanni, S. Brahnam, S. Ghidoni, and A. Lumini, “Toward a General-PurposeHeterogeneous Ensemble for Pattern

Classification,” Computational Intelligence and Neuroscience, vol. 2015.

34. J. A Benediktsson, J. Chanussot, and M. Fauvel, Multiple classifier systems in remote sensing: from basics to recent

developments. In: M. Haindl, J. Heidelberg, Germany: Springer, 501–512, 2007.

35. F. Roli, G. Giacinto, G. Vernazza, Methods for designing multiple classifier systems. Proceedings of the second

international workshop on multiple classifier systems. Cambridge, UK, 78–87, 2001.

36. Banfield, R., et al., A comparison of decision tree ensemble creation techniques. IEEE Transactions on Pattern

Analysis and Machine Intelligence, 29, 173–180, 2007.

37. L. Hansen, P. Salamon, Neural network ensembles. IEEE Transactions on Pattern Analysis and Machine Intelligence,

12, 993–1001, 1990.

38. D. Opitz, J. Shavlik, J., Actively searching for an effective neural-network ensemble. Connection Science, 8 (3/4),

337–353, 1996.

39. G. J. Briem, G.J., Benediktsson, J.A., J. R. Sveinsson, Multiple classifiers applied to multisource remote sensing data.

IEEE Transactions on Geoscience and Remote Sensing, 40 (10), 2291–2299, 2002.

40. B. Waske, J.A. Benediktsson, Fusion of support vector machines for classification of multisensor data. IEEE

Transactions in Geoscience and Remote Sensing, 45, 3858–3866, 2007.

41. L.I. Kuncheva, Combining classifiers: soft computing solution, in: S.K.A. Pal (Ed.), Pattern Recognition: From

Classical to Modern Approaches, World Scientific, Singapore, 2001, pp. 427–451.

42. J. Canul-Reich, L. Shoemaker, L.O. Hall, Ensembles of fuzzy classifiers, in: IEEE International Fuzzy Systems

Conference, pp. 1–6, 2007.

43. J.J. Rodriguez, L.I. Kuncheva, Rotation forest: a new classifier ensemble method, IEEE Transactions on Pattern

Analysis and Machine Intelligence 28 (10) (2006) 1619–1630.

44. K. H. Liu, D. S. Huang, Cancer classification using rotation forest, Computers in Biology and Medicine 38, 601–610,

2008.

45. Chun-Xia Zhang, Jiang-She Zhang, RotBoost: a technique for combining rotation forest and AdaBoost, Pattern

Recognition Letters 29, pp. 1524–1536, 2008.

46. K. Tumer, N.C. Oza, Input decimated ensembles, Pattern Analysis Application, vol. 6, pp. 65–77, 2003.

47. L. Nanni, A. Lumini, Ensemble generation and feature selection for the identification of students with learning

disabilities, Expert Systems with Applications 36, pp.3896–3900, 2009.

48. Loris Nanni, Alessandra Lumini, Input decimated ensemble based on neigh- borhood preserving embedding for

spectrogram classification, Expert Systems with Applications 36,pp. 11257–11261, 2009.

49. X. Zhang, S. Wang, T. Shan, L.C. Jiao, Selective SVMs ensemble driven by immune clonal algorithm, in: Rothlauf,

F. (Ed.) Proceedings of the EvoWork- shops, Springer, Berlin, pp. 325–333, 2005.

50. Z.H. Zhou, J. Wu,W. Tang, Ensembling neural networks: many could be better than all, Artificial Intelligence 137

Page 28: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

(1–2), 239–263, 2002.

51. I. Partalas, G. Tsoumakas, I. Vlahavas, Focused ensemble selection: a diversity-based method for greedy ensemble

selection, in: Proceedings of the 18th International Conference on Artificial Intelligence, pp. 117–121, 2008.

52. S. Bothorel, BB. Meunier, S. A. Muller, Fuzzy logic based approach for semilogical analysis of microcalcification in

mammographic images. Int J Intell System, 12:819–848, 1997.

53. AT. Stavros, D. Thickman, CL.Rapp, MA. Dennis, SH Parker, GA Sisney. Solid breast nodules: use of sonography

q1q`to distinguish between benign and malignant lesions. Radiology; 196:123–134, 1995.

54. YS. Dong, KS Han, "A comparison of several ensemble methods for text categorization," Services Computing, (SCC

2004). Proceedings. 2004 IEEE International Conference on, pp. 419-422, 2004.

55. Y. Liu, G. Jaime, Carbonell, and Rong Jin. ECML, volume 2837 of Lecture Notes in Computer Science (Springer),

pp. 277-288, 2003.

56. Y. Bi, D. Bell, H. Wang, G. Guo, J. Guan, Combining Multiple Classifiers Using Dempster's Rule For Text

Categorization. Appl. Artif. Intell. Vol. 21, 211-239, 2007.

12.

Authors: Gita Madhuri, Dr. Mahima Mishra

Paper Title:

An Exploratory Viewpoint on the Perspectives and Practices of Testing Alternative Option Pricing

Models

Abstract: This study examines the perspectives and practices of testing option pricing models, spanning over

four decades of literature across prominent journals. The study reveals that the bulk of research on option pricing

focuses on developing new models, than comparing relative performance of already existing models. The review

has been classified as perspectives and practices in Deterministic and Stochastic Option pricing models to identify

the most frequently compared Option pricing models. The review has been presented in a structured order

consolidating different perspectives of testing pricing performance of Option pricing models with an objective to

gain insights into the existing literature and form a base for developing future research.

Keywords: Option pricing models, empirical performance of option pricing models, deterministic option

pricing models, stochastic option pricing models

References:

1. A.Jarrow, K. I. (1992). Pricing options on risky assets in stochastic ineterest economy. Mathematical Finance.

2. Ait-Sahalia, Y. a. (1996). Nonparametric Estimation of state-price densities implicit in financial asset prices. Working

Paper, University of Chicago and MIT.

3. B Dumas, J. F. (1998). Implied Volatitlity Functions: Empirical tests. Journal of Finance, vol.63, 2059- 2106.

4. Bates, D. (1996a). Jumps and stochastic volatility : Exchange Rate Processess implicit in Deutchemark Options.

Review in financial studies, 69-108.

5. Bates, D. (2003). Empirical Option Pricing : a retrospection. Journal of Econometrics, 387- 404.

6. Black, F. (1975). Fact and Fantasy in the use of Options. Financial Analysts Journal.

7. Bollerslev, T. (1986). Generalized Autoregressive Conditional heteroskedasticity. Journal of Econometrics.

8. Brooks, D. M. (2015). An introduction to Derivatives and Risk Management. Cengage.

9. Courtadon, J. N. (1987). Tests of an American Option Pricing Model on the Foreign currency options market. Journal

of Financial and quantitative Analysis.

10. D Backus, S Foresi & L Wu. (1997). Accounting for biases in Black and Scholes. CRIF working Paper series. New

York University.

11. David.S.Bates. (1998). Post-'87 Crash Fears in the S&P 500 Futures Option Market. Journal of Econometrics.

12. E.Whaley, C. R. (1992). Market volatility prediction and the efficiency of the S&P 100 index option market. Journal

of Financial Economics.

13. E.Whaley, G. B.-A. (1987). Efficient Analytic Approximation of American Option Values. The Journal of Finance.

14. Figlewski, S. (1989). Options arbitrage in Imperfect markets. The Journal of Finance.

15. Fischer Black& Myron Scholes. (1973). The Pricing of Options and Corporate Liabilities. Journal of Political

Economy, vol 81,637-659.

16. Galai, D. (1983). The componenets of Return from Hedging options against stocks. Journal of Business.

17. Gurudip Bakshi, C. C. (1997). Empirical performance of Option pricing models. journal of finance, Vol.52 ,2003-

2049.

18. Heston, S. L. (1993). A Closed form Solution for Options with Stochastic Volatility with applications to Bond and

Currency Options. The Review of Financial studies, Vol 6 No 2, 327-343.

19. Hull, J. C. (2009). Options, Futures and other derivatives. Pearson.

20. J C Cox, S. A. (1979). Option pricing : A Simplified Approach. Journal of Financial economics.

21. Jacobs, P. C. (2004). The Importance of Loss Function in Option Pricing. Journal of Financial Economics, Vol.72,

No 2, 291-318.

22. John C Cox, S. A. (1976). The Valuation of Options for alternative Stochastic Processes. Journal of Financial

Economics.

23. K.C. Chan, G. K. (1992). An Empirical Comparision of Alternative Models of teh Short term Interest rate. The

Journal of Finance.

24. kani, E. d. (1994). The Volatility Smile and Its Implied Tree. Quantitative Strategies .

25. Kani, E. D. (1994b). Riding on Smile. Risk, 7(2) , 32-39.

26. Kim, S. K. (2004). Empirical Comparision ofAlternative Stochastic Models: Evidence from Korean KOSPI 200

Index option market. Pacific Basin Financial Journal, 117-142.

Page 29: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

27. Mark Broodie, J. D. (1996). American Options with Stochastic Dividends and Volatility : A Non parametric

Investigation. CIRANO.

28. McDonald, R. L. (2013). Derivatives Markets. Kellogg School of Management: Pearson.

29. McDonald, R. L. (June, 2012). Derivatives Markets. Pearson.

30. N.Ahmad, V. K. (2011). Forecasting performance of Constant Elasticity of Variance model:Empirical Evidence from

India. The International Journal of applied Economics and Finance.

31. Pachori, V. K. (2013). A Kaleidoscopic Study of Pricing performance of STochastic Volatility Option pricing Models

: Evidence from Recent Indian Economic Turbulence. Vikalpa.

32. Roma, C. A. (1994). Stochastic Volatility Option pricing. Journal of Financial and Quantitative Analysis.

33. S L Heston, S. N. (2000). A closed form GARCH option valuation model . Review of Financial studies, Vol 13, No.3

585-625.

34. Singh, P. P. (2013). Empirical competitiveness of deterministic option pricing models : Evidences from the recent

waves of Financial upheavals in India. Journal of Derivatives & Hedge Funds.

35. Stein, E. S. (1991). Stock price distribution with stochastic volatility :An Analytical Approch. Review of Financial

studies, vol.4 727-752.

36. Su, C. C. (1998). An empirical test of Hull -White option pricing model. Journal of Future Markets, 18(4), 363-378.

37. Vipul Kumar Singh, N. A. (2011). Empirical Analysis of GARCH and Practitioner Black Scholes Model for pricing

S&P CNX Nifty 50 index options of India. Decision.

38. White, J. C. (1987). The Pricing of Options with Stochastic Volatilities. Journal of Finance, Vol 42 , 281-300.

13.

Authors: Lalit Kulkarni, JagdishBakal, Urmila Shrawankar

Paper Title: Distributed Misbehavior Detection Scheme for Delay Tolerant Networks

Abstract: Opportunistic forwarding mechanism in Delay Tolerant Networks (DTN), are prone to get

disconnected from the nodes in the network. These types of networks deal with intermittent connectivity, large

delays.Existing routing protocols of DTNs fights with these issues, but fail to integrate the security available for

delay tolerant networks,it is necessary to design a secure routing protocol to overcome these issues. There are

centralized Trust Authority (TA) based security systems but the disconnection or failure of TA, affects the security

model and network performance. It becomes crucial to have the distributed approach for security system and have

multiple TAs working on security model. This reduces the possibility of poor network performance. The paper

presents a distributed misbehavior detection system, and implements multiple TAs for implementing the security

model for DTN.

Keywords: Delay Tolerant Networks, DTN, Trust based scheme

References:

1. P. Asuquo, H. Cruickshank, C. P. A. Ogah, A. Lei and Z. Sun, "A Distributed Trust Management Scheme for Data

Forwarding in Satellite DTN Emergency Communications," in IEEE Journal on Selected Areas in Communications,

vol. 36, no. 2, pp. 246-256, Feb. 2018.

2. H. Zhu, S. Du, Z. Gao, M. Dong and Z. Cao, A Probabilistic Misbehavior Detection Scheme toward Efficient Trust

Establishment in Delay-Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, pp 22-32, vol.

25, no. 1, January 2014

3. L. Kulkarni, D. Mukhopadhyay and J. Bakal, “Analyzing Security Schemes in Delay Tolerant Networks.” In

Proceedings of the International Conference on Data Engineering and Communication Technology (pp. 613-620).

Springer Singapore, March 2016

4. L. Zhang, J. Song and J. Pan, "A Privacy-Preserving and Secure Framework for Opportunistic Routing in DTNs," in

IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7684-7697, Sept. 2016.

5. H. Chen, W. Lou, Z. Wang and Q. Wang, "A Secure Credit-Based Incentive Mechanism for Message Forwarding in

Noncooperative DTNs," in IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6377-6388, Aug. 2016.

6. M. N. M. Bhutta, H. Cruickshank and Z. Sun, "Public-key infrastructure validation and revocation mechanism

suitable for delay/disruption tolerant networks," in IET Information Security, vol. 11, no. 1, pp. 16-22, Jan 2017.

7. T. N. D. Pham and C. K. Yeo, "Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks,"

in IEEE Transactions on Mobile Computing, vol. 15, no. 5, pp. 1116-1129, May 2016.

8. Y. Cai, Y. Fan and D. Wen, "An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks," in

IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 266-277, Jan. 2016.

9. Z. Li, Y. Liu, H. Zhu and L. Sun, "Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant

Networks," in IEEE Transactions on Vehicular Technology, vol. 64, no. 11, pp. 5257-5268, Nov. 2015.

10. L. Kulkarni, N. Ukey, J. Bakal and N. Chavan, “A Survey on Energy-Efficient Techniques to Reduce Energy

Consumption in Delay Tolerant Networks”. In Computing and Network Sustainability (pp. 83-91). Springer,

Singapore, July 2017

11. X. Lv, Y. Mu and H. Li, "Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs," in IEEE

Transactions on Dependable and Secure Computing, vol. 12, no. 6, pp. 615-625, Nov.-Dec. 2015.

12. S. Eshghi, M. H. R. Khouzani, S. Sarkar, N. B. Shroff and S. S. Venkatesh, "Optimal Energy-Aware Epidemic

Routing in DTNs," in IEEE Transactions on Automatic Control, vol. 60, no. 6, pp. 1554-1569, June 2015.

13. J. Zhou, X. Dong, Z. Cao and A. V. Vasilakos, "Secure and Privacy Preserving Protocol for Cloud-Based Vehicular

DTNs," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1299-1314, June 2015.

363-367

14.

Authors: Madhavi Wairagade, Dr. Preeti Shukla

Page 30: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title:

Measuring Industry Readiness of Engineering Students of Nagpur Region with Reference to Social

Skills

Abstract: Most of the students of Engineering colleges in Vidarbha region select their employment through

campus placements. It is thus the responsibility of the colleges to make the students skilled to enhance the chances

of their employability. The paper divided the skill sets into and Social skills and measured its impact on

Employability Test Scores viz. Aptitude Test Score, Group Discussion Score and Personal Interview Score. It is

found that social skills viz. Industry Institute Interaction and Leadership Quality of the students play an important

role in deciding Employability Test Scores of the students. The results were arrived at by taking the sample 629

students of engineering colleges of Nagpur region. Hence the mapping of various parameters in their past social

skill superimposed with current assessment of their potential on the basis of aptitude test, group discussion and

personal interview can generate certain indicators of success in future placement/ higher education/

entrepreneurship in engineering profession.

Keywords: Employability skills, Social skills, CART Analysis

References:

1. RICHARD M. FELDER , GARY N. FELDER, MEREDITH MAUNEY & E. JACQUELIN DIETZ, “ A

Longitudinal Study of Engineering Student Performance and Retention. Gender Differences in Student Performance

and Attitudes”, In a continuing study under way at North Carolina State University.

2. Journal of Engineering Education, 84(2), 151-163 (1995). AUSTRALASIAN JOURNAL OF ENGINEERING

EDUCATION, Published in Australia by the Australasian Association for Engineering Education Inc AAEE, 2003

ISSN 1324-5821, “ENGINEERING EDUCATION – IS PROBLEMBASED OR PROJECT-BASED LEARNING

THE ANSWER?” Julie E. Mills School of Geoliescience, Minerals & Civil Engineering University of South

Australia, Adelaide, South Australia, Australia, David F. Treagust Science and Mathematics Education Centre Curtin

University, Perth, Western Australia, Australia

3. MacLachlan, Anne J, Center for Studies in Higher Education, UC Berkeley Publication Date: 03-01-2006 Series:

Research and Occasional Papers Series Permalink: http://escholarship.org/uc/item/3892k4rm, “Developing Graduate

Students of Color for the Professoriate in Science, Technology, Engineering, and Mathematics (STEM)”

363-367

15.

Authors: Shivani Tyagi, Dr.Manjula Shastri

Paper Title: Portfolio Management and Investment Strategy of Institutional Investor: An overview in Indian Capital

Market

Abstract: The purpose of current study is to examine the most preferred investment option among institutional

investor in India and analysis the factors which impact their investment strategy in India. The study also attempts

to better understand the impact of certain demographic factors such as age, area of operation, type of operation,

asset under management, experience and qualification on the behaviour of institutional investor in India .A semi

structured questionnaire was used to obtain a total of 30 valid responses was collected from January 2019 to March

2019. Cronbach alpha test and normality test was used to check reliability and consistency in the responses.

Descriptive Analysis was done for various variables. Result was presented in the tabular form.

Keywords: Institutional Investors, Preference, Investment Strategy, India.

References: 1. , B. (2016).FII Inflows into Indian IPOs and its impact on the Indian Stock Market

2. Bland, J .M., & Altman, D.G. (1997) .Statistics notes: Cronbach’s Alpha .B (7080), 572.

3. 3.Bushee, B.J., Carter, M.E. & Gerakos, J., 2014 .Institutional Investor Preferences for Corporate Governance

Mechanisms .Journal of Management Accounting Research ,26 (2) ,pp.123-149.

4. Fachrudin, K.A., & Fachrudin, H.T. (2015) .The Study of Investment Portfolio Management and Sustainability of

Property and Real Estate Companies in Indonesia Stock Exchange .Procedia-Social and Behavioural Sciences,

211,117-183.

5. Hutchinson, M., Seamer, M. & Chapple, L (Ellie) .2015 .Institutional Investors, Risk/Performance and Corporate

Governance .The international Journal of Accounting, 50(1), pp.31-52.

6. Isaksson, M. & Celik, S., 2014 .Institutional investors and Owner Engagement .OECD JOURNAL: Financial Market

Trend, 2013, pp.93-114.

7. Johannes, R.L.(2017) .U.S. Patent Application No .15/369,486.

https://patents.google.com/patent/US20170213284A1/en.

8. Joseph, A., &Varghese, J. (2017). A Study on Factors Affecting Investment Decision Making in the context of

Portfolio Management.

9. Jault, J.B. (2015) .Investment Portfolio Management.

10. Koh,P.-S.,2007.Institutional Investor type ,earnings management and benchmarks beaters .Journal of Accounting and

Public policy ,26(3) ,pp.267-99 .

11. Keloharju (2000).The Investment behaviour and performance of various investor type: A study of Finland‘s unique

data set .Journal of Financial Economics, Vol.55, Issue 1, 43-67.

12. Luo, Y., 2002.Contract, cooperation and performance in international joint ventures. Strategic Management Journal,

Page 31: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

23(10), pp. 903-919.Avaialble at http://doi.wiley.com/10.1002/smj.261

13. Nielsen, K.M., 2008.Instiutional Investors and Private Equity .Review of Finance, 12(1), pp.185-219.

14. Nicole Choi et.al, 2017. Portfolio Concentration and performance of institutional investor worldwide. Journal of

financial economics, Vol.123 (1), pp.189-208.

15. OECD, 2011.The Role of Institutional Investors in Promoting Good Corporate Governance .OECD Reports

25November 2011, 61, p.299.

16. Priyanka Sharma and Payal Agarwal (2015). “Investor Perception and Attitude towards Mutual Fund as an

Investment option” .Journal of Business Management & Social Science Research (JBM&$$R) .Volume 4, No.2, pp:

115-119s

17. RaviVyas, Suresh Chandra Moonat (2012). Perception and Behaviour of Mutual Funds Investors in Indore, Madhya

Pradesh. Indian Journal of Finance .Volume 6, Issue8 .

18. Sarkar, J. & Sarkar, S., 2000.Large Shareholder Activism in Corporate Governance in Developing Countries:

Evidence from India .International Review of Finance, 1(3), pp.161-194.

19. Sudalaimuthu, s.and Senthil Kumar, P., (2008). “A Study on investors perception towards mutual fund investments.”

Journal of Management Trends, Volume 1.5(1), September 2007-March 2008, pp.106-17

20. Gopikumar, Smitha Nair, S Sreevathsava & Raja Sreedharan V, David McMillan (Reviewing editor :) (2019)

Financial Strength Information and Institutional Investor Demand: Evidence from India, Cogent Economics &

Finance.DOI:10.1080/23322039.2019.1623751.

16.

Authors: Shubham Shukla, Himanshu Shukla

Paper Title: Optimization of Process Parameters for Friction Stir Welding Of Dissimilar Aluminium Alloy AA6061

to AA5183 Using TOPSIS Technique

Abstract: Friction stir welding has proven to be the most promising solid state joining process. It can be used to

get high weldability in joining of high strength aerospace aluminium alloys and other metallic alloys which used to

be low with traditional fusion welding process. This paper emphasises on finding the optimum process parameter

for friction stir welding of dissimilar aluminium alloy AA6061 to AA5183 using multi criteria decision making

method (MCDM). Friction stir welding was done at different tool rotational speed and transverse velocity and

mechanical properties such as tensile strength, percentage elongation and hardness were studied for each weld

specimen. Finally optimization was done using TOPSIS (Techniqueof Ordered Preference by Similarity to Ideal

Solution). The result revealed that the tool rotational speed of 1200 rpm and welding speed of 80mm/min are the

optimum welding parameters.

Keywords: Friction stir welding, TOPSIS, Process parameter

References:

1. 5. Prasad M, kumar Namala K. Process Parameters Optimization in Friction Stir Welding by ANOVA. Materials

Today: Proceedings. 2018; 5(2):4824-4831.

2. 2. Koilraj M, Sundareswaran V, Vijayan S, Koteswara Rao S. Friction stir welding of dissimilar aluminium alloys

AA2219 to AA5083 – Optimization of process parameters using Taguchi technique. Materials & Design. 2012; 42:1-

7.

3. 6. Sudhagar S, Sakthivel M, Mathew P, Daniel S. A multi criteria decision making approach for process improvement

in friction stir welding of aluminium alloy. Measurement. 2017;108:1-8..

4. 3. Chien C, Lin W, Chen T. Optimal FSW process parameters for aluminum alloys AA5083. Journal of the Chinese

Institute of Engineers. 2011;34(1):99-105.

5. 7. Çalışkan H, Kurşuncu B, Kurbanoğlu C, Güven Ş. Material selection for the tool holder working under hard

milling conditions using different multi criteria decision making methods. Materials & Design. 2013;45:473-479.

6. 8. Mishra R, Ma Z. Friction stir welding and processing. Materials Science and Engineering: R: Reports. 2005;50(1-

2):1-78.

7. 9. Shojaeefard M, Behnagh R, Akbari M, Givi M, Farhani F. Modelling and Pareto optimization of mechanical

properties of friction stir welded AA7075/AA5083 butt joints using neural network and particle swarm algorithm.

Materials & Design. 2013;44:190-198.

8. 10. Krohling R, Pacheco A. A-TOPSIS – An Approach Based on TOPSIS for Ranking Evolutionary Algorithms.

Procedia Computer Science. 2015;55:308-317.

9. 11. Shukla A, Agarwal P, Rana R, Purohit R. Applications of TOPSIS Algorithm on various Manufacturing

Processes: A Review. Materials Today: Proceedings. 2017;4(4):5320-5329.

10. 12. Graff W, Sargent D. A new grain-boundary etchant for aluminum alloys. Metallography. 1981;14(1):69-72.

17.

Authors: Dr. Rajeshree Rokade, Dr. Ketki Kshirsagar, Ms. Jayashree Sonawane and Ms. Sunita Munde

Paper Title: Analysis of Human-Machine interaction through Facial Expression and Hand-Gesture Recognition

This paper focuses on a review of recent work on facial expression and hand gesture recognitions. Facial

expressions and hand gestures are used to express emotions without oral communication. The human brain

has the ability to identify the emotions of persons using expressions or hand gestures within a fraction of a

second. Research has been conducted on human–machine interactions (HMIs), and the expectation is that

systems based on such HMI algorithms should respond similarly. Furthermore, when a person intends to

Page 32: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

express emotions orally, he or she automatically uses complementary facial expressions and hand gestures.

Extant systems are designed to express these emotions through HMIs without oral communication. Other

systems have added various combinations of hand gestures and facial expressions as videos or images. The

meaning or emotions conveyed by particular hand gestures and expressions are predefined in these cases.

Accordingly, the systems were trained and tested. Further, certain extant systems have separately defined

the meanings of such hand gestures and facial expressions.

Keywords : Facial gesture, Hand gesture, Segmentation, Feature extraction, Classification, Experimentation

[1] Qing Chen; Marius D. Cordea; Emil M. Petriu; Thomas E. Whalen; Imre J. Rudas; Annamaria, Varkonvi-Koczy, “Hand-Gesture and

Facial-Expression Human-Computer Interfaces for Intelligent Space Applications”, 2008 IEEE International Workshop on Medical Measurements and Applications, 2008 PP: 1 - 6.

[2] Thomas James Tiam-Lee; Kaoru Sumi, “Analyzing Facial Expressions and Hand Gestures in Filipino Students' Programming

Sessions”, 2017 IEEE Conference on Culture and Computing (Culture and Computing) , 2017, PP: 75 - 81 [3] Zhipeng Zhao and Ahmed Elgammal, “Spatiotemporal pyramid representation for recognition of facial expressions and hand gestures”,

8th IEEE International Conference on Automatic Face & Gesture Recognition, 2008, PP: 1 - 6

[4] Mihai Gavrilescu, “Recognizing emotions from videos by studying facial expressions, body postures and hand gestures”, 23rd Telecommunications Forum Telfor (TELFOR), 2015, PP: 720 – 723

[5] Kimberly J. Montgomery and James V. Haxby, “Mirror Neuron System Differentially Activated by Facial Expressions and Social Hand

Gestures: A Functional Magnetic Resonance Imaging Study”, Journal of Cognitive Neuroscience, Vol.: 20 (10), PP: 1866 - 1877, 2008 [6] Swapna Agarwal and Saiyed Umer, “MP-FEG: Media Player controlled by Facial Expressions and Gestures”, Fifth National

Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2015, PP: 1- 4

[7] Naresh Kumar, “Motion trajectory based human face and hands tracking for sign language recognition”, 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), 2017, PP: 211 – 216, 2017

[8] Hatice Gunes, Massimo Piccardi and Tony Jan, “Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer”, Pan-

Sydney Area Workshop on Visual Information Processing (VIP2003), Sydney, 2003 [9] Kostas Karpouzis, Amaryllis Raouzaiou, Athanasios Drosopoulos, Spiros Ioannou, Themis Balomenos, Nicolas Tsapatsoulis, and

Stefanos Kolli, “Facial Expression and Gesture Analysis for emotionally-rich Man-Machine interaction”, Chapter V, Emotionally-Rich

Man-Machine Interaction, 2014 [10] Mahesh Krishnananda Prabhu and Dinesh Babu Jayagopi, “Real Time Multimodal Emotion Recognition System using Facial

Landmarks and Hand over Face Gestures”, International Journal of Machine Learning and Computing, Vol. 7, No. 2, 2017

[11] Myung-Ho Ju and Hang-Bong Kang, “Emotional Interaction with a Robot Using Facial Expressions, Face Pose and Hand Gestures”, Int J Adv Robotic Sy , Vol. 9, 2012

[12] Amit Pimpalkar, Chaitali Nagalkar, Sonal Waghmare, Keshari Ingole, “Gesture Recognition of Human Behavior using Multimodal

Approach”, IJCAT – International Journal of Computing and Technology, Vol. 1, No.1, February 2014 [13] Maria Pateraki and Haris Baltzakis and Panos Trahanias, “An integrated approach for visual tracking of hands, faces and facial

features”, Proc. of the Workshop on Measuring and Understanding Human Movements and Emotions, held within the IEEE

International Conference on Robotics and Automation (ICRA), Shanghai, China, 2011 [14] A. Kapoor and R. W. Picard. “Real-time, fully automatic upper facial feature tracking” Proceedings of 5th International Conference

on Automatic Face and Gesture Recognition, May 2002

[15] A. Bobick, “Movement, activity, and action: the role of knowledge in the perception of motion,” Royal Society Workshop on Knowledge based Vision in Man and Machine London, England, February, 1997.

[16] P. Doll´ar, V. Rabaud, G. Cottrell, and S. Belongie, “Behavior recognition via sparse spatio-temporal features”, VS-PETS, October 2005.

[17] Wong, T. Kim, and R. Cipolla “Learning motion categories using both semantic and structural information”, CVPR07, pages 1–6, 2007.

[18] Kanade, T., Cohn, J. F., Tian, Y., “Comprehensive database for facial expression analysis”, 4th IEEE International Conference on Automatic Face and Gesture Recognition, pp. 46-53, Grenoble, 2000.

[19] Pantic, M., Valstar, M. F., Rademaker, R., Maat, L., “Web-based database for facial expression analysis”, IEEE International

Conference on Multimedia and Expo, pp. 317 - 321, July 2005. [20] P. Ekman and W. V. Friesen. “The Facial Action Coding System: A Technique for Measurement of Facial Movement” Consulting

Psychologists Press, San Francisco, CA, 1978.

[21] P. Ekman. “Emotions in the Human Faces”, Studies in Emotion and Social Interaction. Cambridge University Press, second edition, 1982.

[22] J. N. Bassili “Facial motion in the perception of faces and of emotional expression”, Journal of Experimental Psyschology, PP:373–

379,1978. [23] A. Kendon, “How gestures can become like words”, Cross-cultural perspectives in nonverbal communication, New York, 1988.

[24] Affectiva Developer Portal. Available: https://developer.affectiva.com/

[1] [25] Wilson, P. I. ,Fernandez, J., “Facial feature detection using Haar classifiers”, Journal of Computing Sciences in Colleges, 21(4), pp.

127-133, April 2006.

[26] Valstar M. and Pantic M, “Fully Automatic Facial Action Unit Detection and Temporal Phases of Factial Actions”, IEEE Transactions on Systems, Man, and Cybernetics, 42(1), pp. 28-43, February 2012.

[27] James Jenn-Jier Lien, Kanade Takeo, Cohn Jeffrey and Ching-chang Li, “Detection, Tracking, and Classification of Action Units in

Facial Expression”, Journal of Robotics and Autonomous Systems, 31(3), pp. 131-146, 1999 [28] Pantic M., Tomc M., Rothkrantz L and J. M., “A hybrid approach to mouth features detection”, Proceedings of IEEE International

Conference on Systems, Man, Cybernetics, pp. 1188 - 1193, Tucson, Arizona, October 2001.

[29] Wilson P. I. and Fernandez J., “Facial feature detection using Haar classifiers”, Journal of Computing Sciences in Colleges, 21(4), pp.127-133, April 2006

[30] Feijun Jiang, Ekenel H. K. and Shi B. E., “Efficient and robust integration of face detection and head pose estimation”, 21st

International Conference on Pattern Recognition (ICPR), pp.1578- 1581, Tsukuba, 11-15 Nov. 2012.

18.

Authors:

Nor Baizura Hamid, Siti Noraiza Ab Razak, Mardiha Mokhtar, Mohd Erwan Sanik, Masiri Kaamin,

Ahmad Hakimi Mat Nor, Mohd Zakwan Ramli

Page 33: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title: Development of Paving Blocks Using Waste Materials

Abstract

Nowadays, the paving blocks that in the market are heavy and the price are costly. This study will introduce the

lightweight paving blocks and more affordable because the waste materials such as tins, plastic and quarry dust are

use in the development of the concrete paving blocks namely as Eco-Friendly Paving Block. Eco paving blocks

will be compared to control paving blocks due to its durability and compressive strength. Based on the past

research, tin and plastic are used as coarse aggregate while quarry dust will act as fine aggregate. The method and

test for concrete work was conducted which is slump test, density test and compressive strength test. The result

shows that Eco-Friendly Paving Block can be used at non-traffic area based on their compressive strength with the

value of 13.3275N/mm² compared to control paving block with value of 72.3845N/mm². The uses of this waste

material also can reduce the amount of environmental pollutants such as water and soil pollution.

Index Terms: Paving, tins and plastic, quarry dust, eco-friendly

References:

59. Koli Nishikant, Aiwale Nachiket, Inamdar Avadhut, Abhishek Sangar, “Manufacturing of concrete paving block by using waste glass

material”, International Journal of Scientific and Research Publications Volume 6, issue 6, 61, June 2016.

60. Kevin Klarens, Michael Indranata, Luthfi Al Jamali, and Djwantoro Hardjito, “The use of bottom ash for replacing fine aggregate in

concrete paving blocks”, Matec Web of conferences 138, 01005, 2017.

61. Radhikesh P. Nanda, Amiya K. Das, Moharana.n.c, “ Stone crusher dust as a fine aggregate in concrete for paving blocks”, International

Journal of Civil and Structural Engineering , Volume 1, No 3, 2010.

62. Muhammad Fauzi Mohd. Zain, Sudharshan Naidu Raman, Azimin Samsul Tazilan, Abdul Halim Ismail, Mazlan Tahir dan Zulhairuse Md Darus, “Penggantian sebahagian pasir dengan debu kuari ke atas ciri konkrit prestasi tinggi baru”, Jurnal Kejuruteraan 17 page 3-12,

2005.

63. Ashish Patanwadia, Hardik Solanki , “Effect of replacement of natural sand by quarry dust on mechanical Properties”, Volume5, issue 4, International Journal of engineering technology science and research, April 2018.

64. Anzar Hamid Mir, March, “Improved concrete properties using quarry dust as replacement for natural Sand”, International Journal of

engineering research and development, Volume 11, issue 03, pp.46-52, 2015. 65. B. Shanmugavalli, “Reuse of plastic waste in paver blocks”, International Research Journal of Engineering and Technology (irjet), Vol. 6

issue 02, February 2017.

66. Uroosa Iqbal, Muhammad Akram, Abdullah Saand, “Soft drink tins as fibre reinforcement in concrete”, Proceedings of Ampe, 14-15, 2015.

67. M. Achitra, R. Ambika Rajasree, R. Vijayalakshmi Pandit, V.Saranya, “Recycled Plastic and Coconut fibre used in concrete paver block”,

Volume 8 issue no.4 Research Article, 2018. 68. Naushad Khan, Ruchi Chandrakar, “An experimental study on uses of quarry dust to replace sand in concrete”, International research

journal of engineering and technology Volume: 04 issue: 11, Nov 2017.

363-367

19.

Authors: Airul Azizan Zainudin, Hazwani Mohd Mohadis, Norfadzilah Ahmad

Paper Title: Mobile-based Interventions in Nursing Education among Undergraduate Nursing Students: An

Analysis

Abstract: There is an enormous pressure for nursing education institution to become more dynamic to engage in

fast-growing educational technology into the curriculum. This study discussed the literature on the implementation

of mobile learning intervention in undergraduate nursing education mainly targeting learning outcomes and

understanding the features and elements of mobile technology that lead to the success and failure of the

interventions. Four main online databases searched; there were Ovid, Scopus, CINAHL and ProQuest. Citation

tracking and scrutiny of reference lists were also undertaken in the search for additional papers. We included

twelve papers reporting on mobile-based intervention with nursing learning activities. Seven out of twelve reported

the employment of quasi-experimental pre-posttest, meanwhile four used randomized-controlled trial, and one

experimental pre-posttest. Eight studies were from South Korea, two were from Taiwan, and one was from

Finland and Brazil. Four implemented video-based, while the other three were virtual learning object, auditory-

based content and communication-based intervention. Among the advantages of mobile technology addressed

were easy access and promote learning feedback, which has subsequently resulted in improved retention of

knowledge, skill performance, satisfaction and self-efficacy. Meanwhile, the disadvantages were lack of user

satisfaction among video-based intervention studies and low skill practice score in auditory- and social network-

based intervention studies. In summary, there were no single study claimed that their study as effective for clinical

skill learning since the outcomes were unclear, but there is still room for improvement with better intervention

design.

Index Terms: Education, Mobile Applications, Nursing, Review, Smartphone

References: 69. Bentrcia, Mohamed, Mohammed Alshitawi, and Hanafy Omar. "Development of alternative systems for automotive air

conditioning-A review." Journal of Mechanical Science and Technology 32.4 (2018): 1857-1867.

70. Lethwala, Y., and P. Garg. "Development of auxiliary automobile air conditioning system by solar energy." International

Research Journal of Engineering and Technology (IRJET) 4.7 (2017).

71. Ladke, Parikshit A., and C. S. Choudhari. "Design Optimization and Performance Analysis of Condenser for HVAC

Automobile System for R-290." International Journal of Current Engineering and Technology. Available at

http://inpressco. com/category/ijcet (2016).

368-374

Page 34: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

72. Shete, Kaustubh. "Influence of automotive air conditioning load on fuel economy of ic engine vehicles." International

Journal of Scientific & Engineering Research 6.8 (2015): 1367-1372.

73. Cao, Y. H., and X. M. Cui. "Investigation on the Effect of Fin Width on the Heat Transfer Performance of the Condenser

Used in the Automotive Air Conditioning System." Chemical Engineering Transactions 46 (2015): 1003-1008.

74. Kilic, M., and S. M. Akyol. "Experimental investigation of thermal comfort and air quality in an automobile cabin during

the cooling period." Heat and Mass Transfer 48.8 (2012): 1375-1384.

75. Khayyam, Hamid, Abbas Z. Kouzani, and Eric J. Hu. "Reducing energy consumption of vehicle air conditioning system by

an energy management system." 2009 IEEE intelligent vehicles symposium. IEEE, 2009.

76. Rugh, J. P., Chaney, L., Lustbader, J., & Meyer, J. “Reduction in vehicle temperatures and fuel use from cabin ventilation,

solar-reflective paint, and a new solar-reflective glazing.” (No. 2007-01-1194). SAE Technical Paper, 2007.

77. Yoo, Seong Yeon, and Dae Woong Lee. "An Experimental Study on Performance of Automotive Condenser and

Evaporator.",International Refrigeration and Air Conditioning Conference (2004).

78. Kampf, Hans, and Dieter Schmadl. "Parking Cooling Systems for Truck Cabins." SAE Transactions (2002): 80-89.

79. Pritchard, Philip J., John W. Mitchell, and John C. Leylegian, “Fox and McDonald's Introduction to Fluid Mechanics,

Binder Ready Version." John Wiley & Sons, 2016.

80. Duffie, John A., and William A. Beckman “Solar engineering of thermal processes.” John Wiley & Sons, 2013.

81. Kakaç, Sadik, Hongtan Liu, and Anchasa Pramuanjaroenkij, “Heat exchangers: selection, rating, and thermal design.” CRC

press, 2012.

82. American Society of Heating, et al., “Thermal environmental conditions for human occupancy.” Vol. 55. No. 2004.

American Society of Heating, Refrigerating and Air-Conditioning Engineers, 2004.

83. Handbook, A. S. H. R. A. E. "HVAC systems and equipment." American Society of Heating, Refrigerating, and Air

Conditioning Engineers, Atlanta, GA (1996): 1-10.

20.

Authors:

Nur Raihan Esa, Firdaus Yusof @ Alias, Mohd Zulfaezal Che Azemin, Norsham Ahmad,

Nor Azwani Mohd Shukri

Paper Title: RETINAL IMAGE QUALITY ASSESSMENT: PORTABLE EYE EXAMINATION KIT RETINA

(PEEK RETINA)TM VERSUS 3D-PRINTED OPHTHALMOSCOPE (3DPO)

Abstract: Portable Eye Examination Kit retina (Peek Retina™, Peek Vision Ltd, UK) and 3D Printed

Ophthalmoscope (3DPO) were identified to have acceptable image for retinal evaluation, however the

retinal images quality in term of blood vessels visibility between both devices was uncertain. This study was

conducted to compare the quality of image based on blood vessels visibility between Peek Retina and 3DPO

for fractal dimension (Df) analysis. In this study, a total of 40 retinal images (nPEEK=20, n3DPO=20) of 20

participants were captured on random eyes. The best retinal images with good focus and significant retinal

blood vessels visibility of Peek Retina and 3DPO were selected for image quality analysis. The retinal images

were cropped approximately following the size of the cornea and resized to 900 by 900 pixels of resolution

using GNU Image Manipulation Program Version 2.8.18 (GIMP). The images were randomly sorted as

Retinal Image Quality Assessment (RIQA) generated by Google form. Likert scale was implemented to

assess the preferences scale of retinal image quality in determining the visibility of retinal vasculature to be

traced with four choices of response options (1; very difficult, 2; difficult, 3; easy and 4; very easy). Prior to

the retinal image assessment, ten optometrists were asked to experience retinal blood vessels tracing and

consequently evaluate the 40 images by choosing the scale options (1 to 4) based on visibility retinal blood

vessels. Mann-Whitney test indicated that the blood vessel tracing was easier for Peek Retina (median = 3)

than for 3DPO (median = 2), p < 0.0001. Retinal image captured by Peek Retina was rated as very easy

(43.5%) for blood vessels tracing as compared to the image from 3DPO (17.0%). Only 1.5% of the image

captured by PEEK was considered as a very difficult for blood vessel tracing. Difficult and easy preference

scales of blood vessel tracing for PEEK were 16.5% and 38.5% respectively. 34% of 3DPO retinal image

was graded as difficult for blood vessel tracing followed by 28.5% (easy), 20.5% (very difficult) and 17.0%

(very easy). The results indicate that a retinal image photographed by Peek Retina was more preferable in

tracing retinal vascular network for Df analysis as compared to 3DPO.

Keywords: Peek Retina, 3DPO, retinal vessels, image quality

References:

1. Strehle EM, Shabde N. One hundred years of telemedicine: Does this new technology have a place in paediatrics? Arch Dis Child.

2006;91(12):956–9.

2. Shirzadfar H. The Evolution and Transformation of Telemedicine. Int J Biosens Bioelectron. 2017;3(4):303–6.

3. Mosa ASM, Yoo I, Sheets L. A systematic review of healthcare applications for smartphones. BMC Med Inform Decis Mak.

2012;12(67):1–31.

4. Haddock LJ, Kim DY, Mukai S. Simple, inexpensive technique for high-quality smartphone fundus photography in human and

animal eyes. J Ophthalmol. 2013;2013(518479):1–6.

5. Lord RK, Shah VA, San Filippo AN, Krishna R. Novel Uses of Smartphones in Ophthalmology. Ophthalmology. 2010;117(6):1274.

6. Maamari RN, Keenan JD, Fletcher DA, Margolis TP. A mobile phone-based retinal camera for portable wide fi eld imaging. Br J

363-367

Page 35: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Ophtalmol. 2013;(0):2–5.

7. Shanmugam MP, Kailash D, Mishra C, Rajesh R, Madhukumar R. Symposium ‑ Retinochoroidal Imaging Unconventional

techniques of fundus imaging : A review Indirect Ophthalmoscopy with a Hand ‑ held Slit ‑ lamp Based Retinal Imaging

Smartphone as an Ophthalmoscope. 2015;582–5.

8. Barikian A, Haddock LJ. Smartphone Assisted Fundus Fundoscopy/Photography. Curr Ophthalmol Rep. 2018;6(1):46–52.

9. Russo A, Morescalchi F, Costagliola C, Delcassi L, Semeraro F. A Novel Device to Exploit the Smartphone Camera for Fundus

Photography. J Ophthalmol. 2015;2015(823139):1–6.

10. Russo A, Morescalchi F, Delcassi L, Costagliola C, Semeraro F. Comparison of smartphone ophthalmoscopy with slit-lamp

biomicroscopy for undilated glaucoma screening. Investig Ophthalmol Vis Sci. 2015;56(7):4105.

11. Bastawrous A, Giardini ME, Bolster NM, Peto T, Shah N, Livingstone IAT, et al. Clinical Validation of Smartphone Based Adapter:

Peek Retina for Optic Disc Imaging in Kenya. J AMA Ophthalmol. 2016;134(2):151–8.

12. Navitsky C. The portable eye examination kit [Internet]. Retina Today. 2013. Available from: http://retinatoday.com/2013/12/the-

portable-eye-examination-kit

13. Bastawrous A. Smartphone fundoscopy. Ophthalmology. 2012;119(2):433.

14. Myung D, Jais A, He L, Blumenkranz MS, Chang RT. 3D Printed Smartphone Indirect Lens Adapter for Rapid, High Quality Retinal

Imaging. J Mob Technol Med. 2014;3(1):9–15.

15. Hong SC. 3D printable retinal imaging adapter for smartphones could go global. Graefe’s Arch Clin Exp Ophthalmol.

2015;253(10):1831–3.

16. Russell SR, Abramoff V MD, Radosevich MD, Heffron E, Stone EM, Barriga ES, et al. Quantitative Assessment of Retinal Image

Quality Compared to Subjective Determination. Invest Ophthalmol Vis Sci. 2007;48(13):2607.

17. Shanmugam M, Mishra D, Madhukumar R, Ramanjulu R, Reddy S, Rodrigues G. Fundus imaging with a mobile phone: A review of

techniques. Indian J Ophthalmol. 2014;62(9):960.

18. Timberlake GT, Kennedy M. The Direct Ophthalmoscope How it Works and How to Use It. In: Introduction to the Direct

Ophthalmoscope. 2005. p. 9–11.

19. Singh D, Saxena R, Sharma P, Menon V. Understanding your Direct Ophthalmoscope. Delhi J Ophthalmol. 2011;21(3):40–4.

20. Panwar N, Huang P, Lee J, Keane PA, Chuan TS, Richhariya A. Fundus Photography in the 21st Century—A Review of Recent

Technological Advances and Their Implications for Worldwide Healthcare. Telemed e-HEALTH 1. 2016;22(3):1–11.

21. PEEK VISION Ltd. How to use PEEK Retina [Internet]. Dorset Digital. 2018. p. Available from: www.peekvision.org

22. Bethke W. Retinal Imaging On the Cheap [Internet]. Review Ophthalmology. 2015. Available from:

https://www.reviewofophthalmology.com/article/retinal-imaging-on-the-cheap

23. Ab Hamid F, Che Azemin MZ, Salam A, Aminuddin A, Mohd Daud N, Zahari I. Retinal Vasculature Fractal Dimension Measures

Vessel Density. Curr Eye Res. 2016;41(6):823–31.

24. Siegenthaler E, Bochud Y, Bergamin P, Wurtz P. Reading on LCD vs e-Ink displays : effects on fatigue and visual strain.

2012;32:367–74.

25. Wang S, Jin K, Lu H, Cheng C, Ye J, Qian D. Human Visual System-Based Fundus Image Quality Assessment of Portable Fundus

Camera Photographs. IEEE Trans Med Imaging. 2016;35(4):1046–55.

26. Bastawrous A, Mathenge W, Peto T, Weiss HA, Rono H, Foster A, et al. The Nakuru eye disease cohort study: Methodology &

rationale. BMC Ophthalmol. 2014;14(1):1–10.

27. Nazari Khanamiri H, Nakatsuka A, El-Annan J. Smartphone Fundus Photography. J Vis Exp. 2017;(125):1–5.

28. Abdel Hamid L, El-Rafei A, El-Ramly S, Michelson G, Hornegger J. No-reference wavelet based retinal image quality assessment.

In: Proceedings of 5th Eccomas Thematic Conference on Computational Vision and Medical Image Processing. 2015. p. 123–30.

29. Ludwig CA, Shan MX, Nguyen NPH, Choi DY, Ku V, Lam CK. The Future of Automated Mobile Eye Diagnosis. J Mob Technol

Med. 2016;5(2):44–50.

21.

Authors: Nur Raihan Esa, Siti Noor Hakimah Saidi, Mohd Zulfaezal Che Azemin, Nor Azwani Mohd Shukri,

Page 36: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Norsham Ahmad, Firdaus Yusof @ Alias

Paper Title: RELIABILITY OF MANUAL VASCULAR SEGMENTATION FOR RETINAL FRACTAL

DIMENSION USING PEEK RETINATM

Abstract: Fractal dimension (Df) has been identified as indirect measure in quantifying the complexity of

retinal vessel network which is useful for early detection of vascular changes. Reliability studies of Df

measurement on retinal vasculature, has been conducted on retinal images processed by using semi-

automated software which only permits image with 45ᵒ field of view (FOV). Smartphone-assisted fundus

camera retinal image has a maximum 30ᵒ FOV which warrant manual processing in measuring the Df.

Retinal blood vessels need to be manually segmented to produce binary images for retinal vasculatures Df

measurement. Therefore, this study was conducted to determine the intragrader and intergrader reliability

of manual segmentation of the retinal vasculature Df measurement from retinal images taken using a

smartphone-assisted fundus camera Forty-five retinal images were captured using the Portable Eye

Examination Kit Retina (Peek Retina™, Peek Vision Ltd, UK). Suitable image for Df analysis were selected

based on gradable retinal image criteria which included; i) good image focus, ii) centered position of optic

nerve head (ONH) and iii) significant blood vessel visibility. The images were cropped 0.5 disc diameters

away from disc margin and resized to 500x500 pixels using GNU Image Manipulation Program Version

2.8.18 (GIMP, The GIMP Team, United States). Retinal vessels were manually traced by using layering

capabilities for blood vessel segmentation. Df values of segmented blood vessels were measured by using

Image J (National Institutes of Health, USA) and its plugin software, FracLac Version 2.5. Intragrader and

intergrader reliability was determined by comparing the Df values between; two readings measured one

week apart by a grader and readings from two different graders, respectively, using intraclass correlation

coefficient (ICC) and Bland-Altman graphical plots. Intragrader agreement for retinal Df showed good

reliability with ICC of 0.899 (95% CI: 0.814–0.945). Bland Altman analysis indicated good agreement

between Df values at different grading time (mean difference 0.0050; 95% CI:-0.0001–0.0101). Intergrader

reliability for retinal Df was high with ICC of 0.814 (95% CI: 0.459–0.919). Bland Altman plot revealed

good intergrader agreement for retinal Df between two graders with a bias value of 0.0158 (95% CI:

0.0092–0.0223). In conclusion, manual segmentation of retinal image captured by smartphone-assisted

fundus camera has good reliability (0.75 < ICC < 0.9) for Df analysis to study the morphology of retinal

vasculatures.

Keywords: fractal dimension, retinal vascular, smartphone-assisted fundus camera, Peek retina, reliability

References:

1. Avakian A, Kalina R, Sage E, Rambhia A, Elliott K, Chuang E, et al. Fractal analysis of region-based vascular change in the normal

and non-proliferative diabetic retina. Curr Eye Res. 2002;24(4):274–80.

2. Talu S. Fractal analysis of normal retinal vascular network. Oftalmologia. 2011;55(4):11–6.

3. Liew G, Wang JJ, Mitchell P, Wong TY. Retinal vascular imaging: a new tool in microvascular disease research. Circ Cardiovasc

Imaging. 2008;1(2):156–61.

4. Huang F, Dashtbozorg B, Zhang J, Bekkers E, Abbasi-Sureshjani S, Berendschot TTJM, et al. Reliability of Using Retinal Vascular

Fractal Dimension as a Biomarker in the Diabetic Retinopathy Detection. J Ophthalmol. 2016;2016.

5. Cheng SC, Huang YM. A Novel Approach to Diagnose Diabetes Based on the Fractal Characteristics of Retinal Images. IEEE Trans

Inf Technol Biomed. 2003;7(3):163–70.

6. Jelinek H, Mendonça M De, Oréfice F, Garcia C, Nogueira R, Soares J, et al. Fractal Analysis Of The Normal Human Retinal

Vasculature. Internet J Ophthalmol Vis Sci. 2009;8(2):1–5.

7. Bartlett JW, Frost C. Reliability , repeatability and reproducibility : analysis of measurement errors in continuous variables.

Ultrasound Obs Gynecol. 2008;31:466–75.

8. MacGillivray TJ, Patton N. A reliability study of fractal analysis of the skeletonised vascular network using the “box-counting”

technique. In: Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings. IEEE; 2006. p.

4445–8.

9. Popovic N, Radunovic M, Badnjar J, Popovic T. Fractal dimension and lacunarity analysis of retinal microvascular morphology in

hypertension and diabetes. Microvasc Res. 2018;118:36–43.

10. Liew G, Wang JJ, Cheung N, Zhang YP, Hsu W, Lee ML, et al. The Retinal Vasculature as a Fractal: Methodology, Reliability, and

Relationship to Blood Pressure. Ophthalmology. 2008;115(11):1951–7.

363-367

Page 37: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

11. Ab Hamid F, Che Azemin MZ, Salam A, Aminuddin A, Mohd Daud N, Zahari I. Retinal Vasculature Fractal Dimension Measures

Vessel Density. Curr Eye Res. 2016;41(6):823–31.

12. Macgillivray TJ, Trucco E, Cameron JR, Dhillon B, Houston JG, Van Beek EJR. Retinal imaging as a source of biomarkers for

diagnosis , characterization and prognosis of chronic illness or long-term conditions. Br J Radiol. 2014;87(20130832):1–16.

13. Bonaldi L, Menti E, Ballerini L, Ruggeri A, Trucco E. Automatic Generation of Synthetic Retinal Fundus Images : Vascular Network

Automatic Generation of Synthetic Retinal Fundus Images : Vascular Network. Procedia Comput Sci. 2016;90:54–60.

14. Huang F, Dashtbozorg B, Bart M, Romeny H. Artery / vein classification using reflection features in retina fundus images. Mach Vis

Appl. 2017;1–12.

15. Kipli K, Hoque ME, Lim LT, Mahmood MH, Sahari SK, Sapawi R, et al. A Review on the Extraction of Quantitative Retinal

Microvascular Image Feature. Comput Math Methods Med. 2018;2018(4019538):1–21.

16. Li X, Wong WL, Cheung CY, Cheng C, Ikram MK, Li J, et al. Racial Differences in Retinal Vessel Geometric Characteristics : A

Multiethnic Study in Healthy Asians. Clin Epidemiol Res. 2013;54(5):3650–6.

17. Azemin MZ ulfaezal C, Daud NM ohamad, Ab Hamid F, Zahari I, Sapuan AH alim. Influence of refractive condition on retinal

vasculature complexity in younger subjects. ScientificWorldJournal. 2014;2014:783525.

18. Lim LS, Cheung CY, Lin X, Mitchell P. Influence of Refractive Error and Axial Length on Retinal Vessel Geometric Characteristics.

Invest Ophthalmol Vis Sci. 2011;52(2):669–978.

19. Acharya AS, Prakash A, Nigam A. Sampling : Why and How of it ? INDIAN J Med Spec. 2013;4(2):330–3.

20. Abràmoff MD, Magalhães PJ, Ram SJ. Image Processing with ImageJ. Biophotonics Int. 2004;11(7):36–41.

21. Mainster MA. The fractal properties of retinal vessels: Embryological and clinical implications. Eye. 1990;4(1):235–41.

22. Losa GA. Fractals in Biology and Medicine. Second. Meyers RA, editor. Switzerland: Wiley-VCH Verlag GmbH & Co. KGaA;

2011. 6-9 p.

23. Family F, Masters BR, Platt DE. Fractal pattern formation in human retinal vessels. Phys D Nonlinear Phenom. 1989;38(1–3):98–

103.

24. Fraz MM, Remagnino P, Hoppe A, Uyyanonvara B, Rudnicka AR, Owen CG, et al. Blood vessel segmentation methodologies in

retinal images - A survey. Comput Methods Programs Biomed. 2012;108(1):407–33.

25. Huang F, Zhang J, Bekkers EJ, Bart M, Romeny H, Dashtbozorg B, et al. Stability Analysis of Fractal Dimension in Retinal

Vasculature. In: Proceedings of the Ophthalmic Medical Image Analysis Second International Workshop. 2015. p. 1–8.

26. Koo TK, Li MY. A Guideline of Selecting and Reporting Intraclass Correlation Coefficients for Reliability Research. J Chiropr Med

[Internet]. 2016;15(2):155–63. Available from: http://dx.doi.org/10.1016/j.jcm.2016.02.012

27. Giavarina D. Understanding Bland Altman analysis Lessons in biostatistics. Biochem Medica [Internet]. 2015;25(2):141–51.

Available from: http://dx.doi.org/10.11613/BM.2015.015

22.

Authors:

Iffah Syafiqah Meor Badi’auzzaman, Moey Soo Foon, Mohd. Zulfaezal Che Azemin , Mohd. Izzuddin

Mohd. Tamrin

Paper Title: The use of decision tree in breast cancer-related research: A scoping analysis based on Scopus-indexed

articles

Abstract: Breast cancer is the leading cancer that occurs in women globally. The use of machine learning

has been introduced to supplement the work in breast cancer studies. There are undisputed pieces of

evidence of the existence of publications pertaining to the use of decision tree in breast cancer-related

research. However, little is known regarding the types and frequencies of the searched articles. The main

objective of this paper is to unearth the broad variety of articles related to breast cancer research that

utilized decision trees. The Scopus database was chosen to examine the trend, frequencies and themes of the

related publications from the year 2013 until 2018. The study was also intended to disclose the categories of

articles based on the areas of breast cancer that have employed the decision trees method. A total of 259

articles from Scopus database were found to meet the inclusion criteria. The analysis of the frequency of

published articles generally shows an upward trend. The majority of articles targeted diagnosis of breast

cancer (37.8%) in comparisons with other categories. Even though the number of articles found is adequate,

several categories of breast cancer are lacking in publications specifically the survivability, incidence, and

recurrence of breast cancer among patients. There is a need to redirect the focus of breast cancer research

on these categories for future efforts.

363-367

Page 38: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Index Terms: Breast Cancer, Mammography, Machine Learning, Decision Tree

References:

84. International Agency for Research on Cancer, Latest global cancer data: Cancer burden rises to 18.1 million new cases and 9.6 million

cancer deaths in 2018, 2018.

85. American Institute for Cancer Research, New Global Cancer Data: GLOBOCAN 2018 | UICC, Uicc.Org. (2018).

86. National Cancer Institute, Financial Burden of Cancer Care Cancer Trends Progress Report, Progressreport.Cancer.Gov. (2018). 87. National Breast Cancer Foundation, How research is making a difference to breast cancer risk, (n.d.).

88. Machine Learning: What it is and why it matters, Sas.Com. (2019).

89. Hackartist, What is the difference between data mining, statistics, machine learning and AI? [Msg 2]. Message posted at

https://stats.stackexchange.com/questions/5026/what-is-the-difference-between-data-mining-statistics-machine-learning-and-ai. (2017).

90. S. K. Sajan, M. Germanus Alex, A Comparative Study to Evaluate the Performance of Classification Algorithms in Mammogram Analysis,

International Journal Of Engineering & Technology. 7 (2018) 154.

91. H. Shin, Y. Nam, A coupling approach of a predictor and a descriptor for breast cancer prognosis, BMC Medical Genomics. 7 (2014) S4.

92. D. Rew, An Introduction to the Scopus Content Selection and Advisory Board. (2015).

93. H. Arksey, L. O'Malley, Scoping studies: towards a methodological framework, International Journal of Social Research Methodology. 8

(2005) 19-32.

94. N. Mays, E. Roberts, J. Popay, Synthesizing research evidence. In: Fulop N, Allen P, Clarke A, Black N, editors. Studying the

Organisation and Delivery of Health Services: Research methods. London: Routledge; pp. 188–219. (2001).

95. A. Gupta, I. Banerjee, D. Rubin, Automatic information extraction from unstructured mammography reports using distributed semantics,

Journal of Biomedical Informatics. 78 (2018) 78-86.

96. L. Sun, J. He, X. Yin, Y. Zhang, J. Chen, T. Kron et al., An image segmentation framework for extracting tumors from breast magnetic

resonance images, Journal of Innovative Optical Health Sciences. 11 (2018) 1850014.

97. A. Rodríguez-Cristerna, W. Gómez-Flores, W. de Albuquerque Pereira, A computer-aided diagnosis system for breast ultrasound based on

weighted BI-RADS classes, Computer Methods and Programs in Biomedicine. 153 (2018) 33-40.

98. J. Shan, S. Alam, B. Garra, Y. Zhang, T. Ahmed, Computer-Aided Diagnosis for Breast Ultrasound Using Computerized BI-RADS

Features and Machine Learning Methods, Ultrasound In Medicine & Biology. 42 (2016) 980-988.

99. L. Silva, A. Santos, R. Bravo, A. Silva, D. Muchaluat-Saade, A. Conci, Hybrid analysis for indicating patients with breast cancer using

temperature time series. Computer Methods and Programs in Biomedicine, 130, (2016).142-153.

100. M. Santana, J. Pereira, F. Silva, N. Lima, F. Sousa, G. Arruda et al., Breast cancer diagnosis based on mammary thermography and

extreme learning machines, Research On Biomedical Engineering. 34 (2018) 45-53.

101. Q. Liu, M. Gan, R. Jiang, A sequence-based method to predict the impact of regulatory variants using random forest, BMC Systems

Biology. 11 (2017).

102. S. Wang, Y. Cai, Identification of the functional alteration signatures across different cancer types with support vector machine and feature

analysis, Biochimica Et Biophysica Acta (BBA) - Molecular Basis Of Disease. 1864 (2018) 2218-2227.

103. A.G.Floares, G.A.Calin, F.B. Manolache, Bigger Data Is Better for Molecular Diagnosis Tests Based on Decision Trees. In: Tan Y., Shi Y.

(eds) Data Mining and Big Data. DMBD 2016. Lecture Notes in Computer Science, vol 9714. Springer, Cham. (2016).

104. D. Castillo, J. Gálvez, L. Herrera, B. Román, F. Rojas, I. Rojas, Integration of RNA-Seq data with heterogeneous microarray data for

breast cancer profiling, BMC Bioinformatics. 18 (2017).

105. S. Kim, H. Lee, M. Kon, Comparisons of cancer classifiers based on RNA_seq and miRNA_seq, International Journal of Data Mining and

Bioinformatics. 17 (2017) 359.

106. S. Ali, A. Majid, Can–Evo–Ens: Classifier stacking based evolutionary ensemble system for prediction of human breast cancer using

amino acid sequences, Journal Of Biomedical Informatics. 54 (2015) 256-269.

107. S. Ali, A. Majid, S. Javed, M. Sattar, Can-CSC-GBE: Developing Cost-sensitive Classifier with Gentleboost Ensemble for breast cancer

classification using protein amino acids and imbalanced data, Computers in Biology and Medicine. 73 (2016) 38-46.

108. A. Mohanty, M. Senapati, S. Beberta, S. Lenka, Texture-based features for classification of mammograms using decision tree, Neural

Computing And Applications. 23 (2012) 1011-1017.

109. A. Midya, R. Rabidas, A. Sadhu, J. Chakraborty, Edge Weighted Local Texture Features for the Categorization of Mammographic Masses,

Journal Of Medical And Biological Engineering. 38 (2017) 457-468.

110. A. Vadivel, B. Surendiran, A fuzzy rule-based approach for characterization of mammogram masses into BI-RADS shape categories,

Computers in Biology and Medicine. 43 (2013) 259-267.

111. N. Uniyal, H. Eskandari, P. Abolmaesumi, S. Sojoudi, P. Gordon, L. Warren et al., Ultrasound RF Time Series for Classification of Breast

Lesions, IEEE Transactions On Medical Imaging. 34 (2015) 652-661.

112. P. Kapetas, R. Woitek, P. Clauser, M. Bernathova, K. Pinker, T. Helbich et al., A Simple Ultrasound Based Classification Algorithm

Allows Differentiation of Benign from Malignant Breast Lesions by Using Only Quantitative Parameters, Molecular Imaging And

Biology. 20 (2019) 1053-1060.

113. M. Hammer, E. Mortani Barbosa, Predictive factors for malignancy in incidental pulmonary nodules detected in breast cancer patients at

baseline CT, European Radiology. 27 (2016) 2802-2809.

114. Y. Li, X. Tang, Z. Bai, X. Dai, Exploring the intrinsic differences among breast tumor subtypes defined using immunohistochemistry

markers based on the decision tree, Scientific Reports. 6 (2016).

115. Z. Gandomkar, P. Brennan, C. Mello-Thoms, MuDeRN: Multi-category classification of breast histopathological image using deep

residual networks, Artificial Intelligence in Medicine. 88 (2018) 14-24.

116. L. Dalton, Invasive breast cancer: stratification of histological grade by gene-based assays: a still relevant example from an older data set,

Histopathology. 65 (2014) 429-433.

117. C. Chang, S. Kuo, H. Wu, Y. Huang, D. Chen, Stellate Masses and Histologic Grades in Breast Cancer, Ultrasound In Medicine &

Biology. 40 (2014) 904-916.

118. A. Paul, D. Mukherjee, Mitosis Detection for Invasive Breast Cancer Grading in Histopathological Images, IEEE Transactions on Image

Processing. 24 (2015) 4041-4054.

23.

Authors:

Mohd Zulfaezal Che Azemin, Mohd Afiq Ariffin Azman, Muhammad Hafizuddin Bahrain,

Mohd Izzuddin Mohd Tamrin

Paper Title: 3D-Printed Model Enhances Learning Experience in Optometric Education

Abstract: Three-dimensional (3D) printed model becomes more popular as the flexibility to print 3D 363-367

Page 39: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

model has become cheaper to produce. This research sought to assess the effect of using 3D printed model as

a tool in teaching on optometry students. Another primary focus of this research was to assess the

confidence level and enjoyment level among the second-year optometry students on traditional lecture

method and compared it with the use of 3D printed model as a teaching aid. Confidence is important as an

optometrist, especially when making the right clinical judgement. Enjoyment is also important as it may

help learning process become effective and fast. A total of 36 second-year optometry students were selected

to participate in this research. The 3D printed model was based on ophthalmoscope that had been printed

using PRUSA 3000 3D printer. The students were divided into two groups – one group was exposed to the

lecture only and another group was exposed to 3D model in addition to the traditional lecture. Two sets of

questionnaires were given to assess their confidence and enjoyment level before and after each learning

session. The confidence level assessment and the enjoyment level comprise of three statements on each topic

answered by the students using 5-point Likert scale. The results showed that there are significance

differences between lecture only group and lecture with 3D-printed model group especially as a

visualization tool (P = 0.001) and it is considered to be enjoyable and stimulating (P = 0.008). This study

demonstrates that the usage of 3D printed model as teaching aid does affect the confidence level and

enjoyment level of students.

Index Terms: 3D-Printed Model, Biomedical Engineering.

References:

119. M. N. Lee. (2002). Teacher education in Malaysia: Current issues and future prospects. Teacher education: dilemmas and

prospects. 8(57).

120. M. N. Van den Berg, and W. H. A. Hofman, (2005). Student success in university education: A multi-measurement study of the impact of student and faculty factors on study progress. Higher education.50(3), 413-446.

121. J. C. Bernhard, S. Isotani, T. Matsugasumi, V. Duddalwar, A. J. Hung, E. Suer, and B. Hu. (2016). Personalized 3D printed model

of kidney and tumor anatomy: a useful tool for patient education. World journal of urology. 34(3), 337-345. 122. L. Kiraly, M. Tofeig, N. K. Jha, and H. Talo. (2015). Three-dimensional printed prototypes refine the anatomy of post-modified

Norwood-1 complex aortic arch obstruction and allow presurgical simulation of the repair. Interactive cardiovascular and thoracic

surgery. 22(2), 238-240. 123. V. Waran, V. Narayanan, R. Karuppiah, D. Pancharatnam, H. Chandran, R. Raman, T. Z. Aziz. (2014). Injecting Realism in

Surgical Training—Initial Simulation Experience With Custom 3D Models. Journal of Surgical Education. 71(2), 193-197.

124. K. H. A. Lim, Z. Y. Loo, S. J. Goldie, , J. W. Adams, and P. G. McMenamin. (2016). Use of 3D printed models in medical education: A randomized control trial comparing 3D prints versus cadaveric materials for learning external cardiac anatomy. Anatomical

sciences education. 9(3), 213-221.

125. M. K. Oreilly, S. Reese, T. Herlihy, T. Geoghegan, C. P. Cantwell, R. N. Feeney, and J. F. Jones. (2015). Fabrication and assessment of 3D printed anatomical models of the lower limb for anatomical teaching and femoral vessel access training in

medicine. Anatomical Sciences Education. 9(1), 71-79.

126. D. Preece, S. B. Williams, R. Lam, and R. Weller (2013). Lets Get Physical: Advantages of a physical model over 3D computer models and textbooks in learning imaging anatomy. Anatomical Sciences Education. 6(4), 216-224.

127. J. Al-Ramahi, H. Luo, R. Fang, A. Chou, J. Jiang, and T. Kille. (2016). Development of an innovative 3D printed rigid

bronchoscopy training model. Annals of Otology, Rhinology & Laryngology. 125(12), 965-969. 128. C. Bengtsson, M. Persson, and P. Willenhag. (2005). Gender and overconfidence. Economics letter. 86(2), 199-203.

129. I. Al-Shara. (2015). Learning and teaching between enjoyment and boredom as realized by the students: A survey from the

educational field. European Scientific Journal, ESJ. 11(19).

24.

Authors: Mohd Erwan Sanik, Ahmad Hakimi Mat Nor, Nor Baizura Hamid

Paper Title: Effectiveness Analysis of Transverse Rumble Strip Using the Image Processing Technique

Abstract: Transverse rumble strip is a traffic calming device which usually installed at the vicinity of schools and

accident prone spots. The Malaysia Public Work Department has introduced the latest high performance

thermoplastic rumble strips as an intervention along blackspot stretches in Malaysia. This study was carried out to

investigate the effectiveness of the new rumble strips installed at SMK Sri Lalang in Kluang, Johor, with respect to

the operational speed variation immediately upstream and downstream of the rumble strips area. Operational speed

data acquisition was carried out by using the unmanned aerial vehicle or drone and image processing technique.

Drone can be used as an alternative to other image recording devices such as telescopic mast. The presence of a

drone is often unnoticed by drivers thus giving the advantage of obtaining naturalistic data. The footages from

drone were analysed using the image processing technique to ensure every vehicles were taken into account,

compare to handheld device such as speed laser gun that can only detect speed of selected vehicles. The

operational speeds were analyzed to obtain parameters namely pace, median, and 85th percentiles speed. The

results proved that the new rumble strips succeed to reduce speed of vehicles from 7 to 13 kilometer per hour,

which are 7 to 18 percent from the initial speed, respectively.

Index Terms: High Performance Thermoplastic, Image Processing, transverse rumble strips, Unmanned Aerial

Vehicle

References:

1. Malaysian Institute of Road Safety Research (MIROS), MRR 05/2012: MIROS Crash Investigation and Reconstruction Annual

363-367

Page 40: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Statistical Report 2007–2010. (2012).

2. Jabatan Keselamatan Jalan Raya (JKJR), Statistik Keselamatan Jalan Raya Edisi 2016. (2017) pp. 9.

3. Ministry of Transport Malaysia (MOT), Road Safety Plan 2014-2020. (2004).

4. The International Road Assessment Programme (iRAP), Treatment – Rumble Strips. (2010), Accessed on 29 October 2017. url:

http://toolkit.irap.org/default.asp?page=treatment&id=30

5. Barmpounakis, E.N., Vlahogianni, E.I., Golias, J.C., Unmanned Aerial Aircraft Systems for Transportation Engineering: Current

practice and future challenges, International Journal of Transportation Science and Technology (2016), Vol. 5, pp. 111–122.

6. Mirchandani, P., Hickman, M., Angel, A., Chandnani, D., Hickman, M., Application of aerial video for traffic flow monitoring and

management. ASCE 7th Int. Conf. Appl. Adv. Technol. Transp. (2002).

7. Salvo, G., Caruso, L., Scordo, A., Urban traffic analysis through an UAV. Proc. – Soc. Behav. Sci. 111, (2014). pp 1083–1091.

8. Salvo, G., Caruso, L., Scordo, A., Guido, G., Comparison between vehicle speed profiles acquired by differential GPS and UAV,

17th Meet. EURO Work. Gr. Transp. EWGT (2014).

9. Xin, Z., Yun-tao, C., Li, L., Jia-ning, G. Algorithm of Vehicle Speed Detection in Unmanned Aerial Vehicle Videos. In:

Transportation Research Board 93rd Annual Meeting Compendium of Papers. Washington, D.C. (2014).

10. Braut, V., Culjak, M., Vukotic, V., Segvic, S., Sevrovic, M., Gold, H. Estimating OD matrices at intersections in airborne video – a

pilot study. MIPRO, (2012). Proc. 35th Int. Conv., pp. 977–982.

11. Coifman, B., McCord, M., Mishalani, R.G.R. Traffic flow data extracted from imagery collected using a micro unmanned aerial

vehicle. Appl. Adv. Technol. Transp. Ninth Int. Conf., pp. 298–303. doi:10.1061/40799(213)47. (2006).

12. Gao, H., Kong, S.L., Zhou, S., Lv, F., Chen, Q. Automatic Extraction of Multi-Vehicle Trajectory Based on Traffic Videotaping

from Quadcopter Model. Appl. Mech. Mater. 552, 232–239. http://dx.doi.org/10.4028/www.scientific.net/AMM.552.232. (2014).

13. Li, Y. Fuzzy Image Segmentation from High Resolution UAV Aerial, ISPRS08. p. B3b 529. (2008).

14. Puri, A., Valavanis, K., Kontitsis, M. Statistical profile generation for traffic monitoring using real-time UAV based video data.

Mediterr. Conf. Control Autom. 1–6. http://dx.doi.org/10.1109/MED.2007.4433658. (2007).

15. Reinartz, P., Lachaise, M., Schmeer, E., Krauss, T., Runge, H. Traffic Monitoring with Serial Images from Airborne Cameras.

ISPRS J. Photogramm. Remote Sens. 61, 149–158. http://dx.doi.org/10.1016/j.isprsjprs.2006.09.009. (2006).

16. Salvo, G., Caruso, L., Scordo, A. Gap acceptance analysis in an urban intersection through a video acquired by an UAV 199–205.

(2013).

17. Wang, H., Duan, S., Zheng, Y., Liu, S., Dong, C., Li, Y.. Using model aircraft to collect vehicle trajectory data. Transp. Res. Board

93rd Annu. Meet. Compend. Pap. (2014).

18. Zhang, L., Peng, Z., Sun, D.D.J., Liu, X. A UAV-based automatic traffic incident detection system for low volume roads. Transp.

Res. Board 92nd Annu. Meet. pp. 1–19. (2013).

19. Filippo, G.P. & Marinella, G., Modeling Operating Speed of Two Lane Rural Roads. Procedia - Social and Behavioral Sciences 53

(2012) pp. 664 – 671.

20. Center for Transportation Research and Education, Handbook of Simplified Practice for Traffic Studies: Spot Speed Study. (2009).

21. Manual on Uniform Traffic Control Devices for Streets and Highways (Millennium Edition), Federal Highway Administration, U.S.

Department of Transportation, Washington, DC (2000).

22. American Association of State Highway and Transportation Officials. A Policy on Geometric Design of Highways and Streets

(2001).

23. Transportation Research Board (TRB), NCHRP Report 504: Design Speed, Operating Speed, and Posted Speed Practices. (2003).

24. Tyrell D.T., Mark W.B., and Paul J.C., Speed Changes Due to Transverse Rumble Strips on Approaches to High-Speed Stop-

Controlled Intersections. Transportation Research Record: Journal of the Transportation Research Board, No. 1973, Transportation Research

Board of the National Academies, Washington, D.C., 2006, pp. 1–9.

25. Dudek, C. L., R. D. Huchingson, F. T. Creasey, and O. J. Pendleton. Field Studies of Temporary Pavement Markings at Overlay

Project Work Zones on Two-Lane, Two-Way Rural Highways. In Transportation Research Record 1160, TRB, National Research Council,

Washington, D.C., 1988, pp. 22–34.

26. Paul, J.C, Jeff, D.M., Effectiveness of Rumble Strips on Texas Highways: First Year Report. Texas Transportation Institute. (2003).

25.

Authors:

Siti Nooraiin Mohd Razali, Masiri Kaamin, Siti Noraiza Ab Razak, Nor Baizura Hamid, Nor Farah

Atiqah Ahmad, Mardiha Mokhtar, Norhayati Ngadiman, Suhaila Sahat

Paper Title: APPLICATION OF UAV AND CSP1 MATRIX FOR BUILDING INSPECTION AT MUZIUM

NEGERI, SEREMBAN

Abstract: Building inspection is really essential to determine the condition of a building and one of the key

components of building maintenance. To determine the defect, visual inspection will be conducted as early

phase of building inspection. Usually, binocular and camera will be used as main devices in visual

inspection. This research aims to study Museum Negeri defects at exterior structure especially the roof

structure by using the Unmanned Aerial Vehicles (UAV) or as known as Drone. The data collected will be

analyzed using Condition Survey Protocol 1 Matrix to obtain an overall rating of the building’s condition.

The process involved in this study are site visit, planning and preparation before the flight, data collection

using UAV, image processing and analyzing data from image. The results of analysis, a total numbers of 53

363-367

Page 41: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

locations have been identified and documented suffer from defects or faults such as cracking, corrosion and

wall perforated. All defects information obtained using UAV visual inspection can help the museum

maintenance to do maintenance work. The overall condition of this building structure is 5, where the overall

performance of the building is fair.

Index Terms: Building inspection, drone, CSP1.

References:

1. A. A (2009). Mapping using small format digital imagery and unmanned aerial vehicle platform.

2. A. G. Ahmad (2004). Understanding common building defects: the dilapidation survey report.

3. Z. Sharuddin (2016) Understanding common building defects: the dilapidation survey report.

4. L. M. N. Sembilan, Sejarah Penubuhan Muzium Negeri.

5. A. G. Ahmad (2006). Rangka Kerja Pemuliharaan Bangunan Warisan di Malaysia.

6. A. K. Parida (2006). Maintenance Performance Measurement (MPM): Issues and Challenges. J. Qual. Maint. Eng.

12(3): 239-251.

7. A. &. A. A. A. R. Olanweraju (2015). Building maintenance processes, principles, procedures, practices and

strategies. In Building Maintenance Processes and Practices(pp. 79-129).

8. Yacob (2005). Maintenance Management System through Strategic Planning for Public School in Malaysia, in

Construction Management.

9. J. R. M. &. H. C. Unger(2014). UAV-based photogrammetry: monitoring of a building zone. International Archives

of the Photogrammetry, Remote Sensing and Spatial Information Sciences-ISPRS Archives 40 (2014), 40(5), 601-606.

10. N. A. A. &. Z. O. Darwin(2014). The potential of unmanned aerial vehicle for large scale mapping of coastal area. In

IOP Conference Series: Earth and Environmental Science (Vol. 18, No. 1, p. 012031). IOP Publishing.

11. Masiri Kaamin, Nurunnazifah Abd. Aziz, Saifullizan Mohd Bukari, Zaurin Ali, Norhafiza Samion, Aslila Abd Kadir,

Norhayati Ngadiman. (2016). KAEDAH PEMERIKSAAN BANGUNAN TINGGI MENGGUNAKAN PESAWAT TANPA

PEMANDU (UAV). Jurnal Teknologi. 78: 5–10; 83–89

12. A. T. A. K. K. Che Ani (2011). The Development of a Condition Survey Protocol Matrix. Structural Survey, 29(1),

35-45.

13. M. Mokhtar, M. Kaamin, N. Ngadiman, & N. B. Hamd (2018). The application of UAV and CSP1 matrix for

building inspection at mosques in area of Pagoh – Muar, Johor. AIP Conference Proceedings, Vol. 2016.

26.

Authors: Rakesh Kumar Sharma, Anupam Sharma

Paper Title: Forecasting Monthly Gold Prices Using ARIMA Model: Evidence from Indian Gold Market

Abstract: In this paper an attempt has been made to give an overview of the Indian gold market so as to

develop a model enabling the forecast of gold prices in India. One troy ounce is equal to 31.103 grams. The

monthly sample data of gold price (in INR per troy ounce) is taken from December 1997 to December

2017.The entire data has been divided into two segments for estimation and validation sample and to find

out the efficiency and accuracy of forecasting models. Since the gold price data series have shown much

deviation after March 2006 the first segment of the data is taken from the time period of December 1997 to

March 2006 and second segment from April 2006 to December 2017.Due to a larger value and a huge time

span of the sample data, the natural logarithm of gold price has been taken to conduct the study and build

an effective model to forecast future gold prices. The unit root tests of Augmented Dickey Fuller‖ and

Philips Perron have been used to test the gold price series as stationary or non-stationary. It is observed that

series are stationary at first difference in both the methods. At first difference the ACFs and PACFs were

pattern less and statistically not significant. Box-Jenkins’s Autoregressive Integrated Moving Average of

Box-Jenkins methodology has been used for developing a forecasting model of gold price in India. Different

models of ARIMA have been used to obtain best suitable model for forecasting using Eviews software 10 for

both time periods i.e., December 1997 to March 2006 & April 2006 to December 2017

Keywords : AIC- Akaike Information Criteria, SIC- Schwarz Information criteria, Correglram

References

1. Agnon, Y., Golan, A., and Shearer, M., Nonparametric, Nonlinear, Short-Term Forecasting: Theory and

Evidence for Nonlinearities in the Commodity Markets, Econ. Lett. 65 ((1999), pp. 293-299.

2. Baker, S.A. and Van Tassel, R.C., Forecasting the Price of Gold: A Fundamentalist Approach, Atla Econ

Jour. 13 (1985), pp. 43-51.

3. Bankbazaar.com (2011,October25). Investing in gold? Retrieved from the website:

http://www.rediff.com/business/slide-show/slide-show-1-perfin-investing-in-gold-must-read-

this/20111025.htm

4. Bankbazaar.com (2013, May 13). Investing in gold? 7 facts you should know. Retrieved from the NDTV

Profit website: http://profit.ndtv.com/news/your-money/article-investing-in-gold-7-facts-you-should-

know-317318

5. Batchelor, R., Gulley, D., (1995). Jewellery demand and the price of gold. Resources Policy, Vol. 21 No.

1, pp. 37–42.

6. Baur, D. G. and Glover, K. J. (2014). Heterogeneous expectations in the gold market: Specification and

363-367

Page 42: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

estimation. Journal of Economic Dynamics and Control, Vol. 40, pp. 116-133.

7. Bera, A. & Jarque, C. (1982).Model specification tests: A simultaneous approach. Journal of

Econometrics, Vol. 20, pp.59–82.

8. Blose, L.E., (1996). Gold price risk and the returns on gold mutual funds. Journal of Economics and

Business, Vol. 48 No. 5, pp. 499–513.

9. Blose, L.E., Shieh, J.C.P., (1995). The impact of gold price on the value of gold mining stock. Review of

Financial Economics, Vol. 4 No.2, pp 125–39.

10. Bowman, K. & Shenton, L.R. (1975). Omnibus contours for departures from normality based on 1b and 2

b. Biometrika, Vol. 62, pp. 243–50.

11. Kennedy Peter, (2008). A Guide to Econometrics' 6th Edition, Blackwell Publishing USA.

12. Levin, E.J. and Wright, R.E. (2006). Short-run and Long-run Determinants of the Price of Gold. World

Gold Council Report, Research Study No. 32, Cass Business School, London.

13. Malhotra, K. Neresh and Dash, Satyabhushab (2009). Marketing Research: An Applied Orientation,

PEARSON Education.

14. Nathan Narendra (2013). Gold in 2014: No longer a safe investment. Retrieved from the Economic Times

website:http://articles.economictimes.indiatimes.com/2013-12-30/news/45711297_1_gold-imports-paper-

gold-gold-prices, ET Bureau Dec 30, 2013, 10.45AM IST.

15. Ntungo C. and Boyd M. (1998). Commodity Futures Trading Performance Using Neural Network Models

versus ARMA Models. The Journal of Futures Markets, Vol.18, 965-83.

16. Parisi, F.; Parisi, A. and Guerrero J.L. (2003). Rolling and Recursive Neural Network Models: The Gold

Price. Working Paper, Universidad de Chile.

17. Peter C. B. Phillips and Pierre Perron (1988). Testing for a Unit Root in Time Series Regression.

Biometrika, Vol. 75, No. 2, pp. 335-46

18. Ranson, D.; (2005). Inflation Protection: Why Gold Works Better Than Linkers. World Gold Council

Report, Wainwright H.C., World Gold Council Publications, London.

19. Rockerbie, D.W., (1999). Gold prices and gold production: evidence for South Africa. Resources Policy,

Vol. 25 No. 2, 69–76.

20. Selvanathan, S., Selvanathan, E.A., (1999). The effect of the price of gold on its production: a time-series

analysis. Resources Policy, Vol. 25 No.4, pp. 265–275.

21. Shafiee Shahriar & Topal Erkan (2010). An overview of global gold market and gold price forecasting.

Resources Policy, Vol. 35, 178–89

27.

Authors: Zaynalov N.R, Narzullaev U.Kh, Muhamadiev A.N, Bekmurodov U.B

Paper Title: FEATURES OF USING INVISIBLE SIGNS IN THE WORD ENVIRONMENT FOR HIDING DATA

Abstract. Considered digital steganography is the direction of classical steganography based on concealing or

introducing additional information into digital objects, while causing some distortions of these objects. At the same

time, images, audio, video, network packets, etc. can be used as objects or containers. Recently, there has been a

lot of publication in the field of information hiding in a text container. To embed a secret, steganographic methods

rely on redundant information about the used covering media or properties that the human perception system

cannot distinguish. Since text documents are widely used in organizations, using a text document as a storage

medium may be the preferred choice in such an environment. On the other hand, the choice of using a text

document as a storage medium is the most difficult, since it contains less redundant information. In this article, we

present textual steganography using invisible characters in a word processor.

Keywords: Cryptography, Information hiding, Steganography, Text steganography

[1] Changder S, Ghosh D, Debnath N.C. (2010). Linguistic approach for text steganography through Indian text.

In: 2010 2nd international conference on computer technology and development, pp. 318-322

[2] Ross J.Anderson, Fabien A.P. Petitcolas. (1998). On the limits of steganography. IEEE J Sel Areas Commun

16(4):474-481

[3] Fabien A.P. Petitcolas, Ross J.Anderson, Markus G.Kuhn. (1999). Information hiding—a survey. In: Proc

IEEE 87(7):1062-1078

[4] Por LY, Ang TF, Delina B (2008) WhiteSteg-a new scheme in information hiding using text steganography.

WSEAS Trans Comput 7(6):735-745

[5] Wikipedia, The Free Encyclopedia / http://wikipedia.org/

[6] M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2006) A new approach to persian/arabic text

steganography. In: 5th IEEE/ACIS international conference on computer and information science and 1st

IEEE/ACIS international workshop on component-based software engineering, software architecture and reuse, pp

310-315

[7] R. Bala Krishnan, Prasanth Kumar Thandra, M. Sai Baba. An overview of text steganography. 4th International

Conference on Signal Processing, Communications and Networking (ICSCN -2017), March 16 - 18, 2017,

Chennai, INDIA

363-367

Page 43: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

[8] Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 3(3&4):313-336

[9] M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2008) A new dynonym text steganography. In:

International conference on intelligent information hiding and multimedia signal processing, pp 1524-1526

[10]. Brassil JT, Low SH, Maxemchuk NF, O’Gorman L (1995) Document marking and identifi-cation using

both line and word shifting. In: Proceedings of INFOCOM ’95 proceedings of the fourteenth annual joint

conference of the IEEE computer and communication societies, pp 853-860

[11] Cummins J, Diskin P, Lau S, Parlett R (2004) Steganography and digital watermarking. School of

Computer Science, pp 1-24

[12] E. A. Blinova. Steganographic method based on the line-shift coding method on non-displayed symbols of the

electronic text document. Belarusian State Technological University. BGTU. № 6 2016, p.166-169

[13] Kabetta H, Dwiandiyanta BY (2011) Suyoto: information hiding in CSS: a secure scheme text steganography

using public key cryptosystem. Int J Cryptogr Inf Secur 1(1):13-22

[14] Simmons G.J. The prisoner`s problem and the subliminal channel, Proc. Workshop on Communications

Security (Crypto`83), 1984, 51-67.

28.

Authors: Norinov M.U.*, Abdukadirov B.A.**, Gofurov M.R.***

Paper Title: APPLICATION OF FOURIER METHODS AND DISCRETE-COSINUS TRANSFORMATION IN

THE PROCESS OF PROCESSING OF TV IMAGES

Abstract

This article describes the Fourier and discrete-cosine transform methods in the processing of TV images. The

methods used in the processing of color and TV images, based on different physical effects, information

processing technologies and hardware. The images obtained using these methods will have their own specifics.

This, in turn, causes a wide variety of approaches both to the assessment of the quality of TV images and to the

processing of such images.

Keywords: Fourier series, Fourier transform, Fourier domain, wavelet transform, fast Fourier transform, discrete

cosine transform.

References:

57. Berezkin E.F. Fundamentals of information theory and coding: Tutorial. - M .: NIIUU MEPhI, 2010. - 312 page.

58. Gaiduk A.R. Continuous and discrete dynamical systems. –2nd ed. Pererab.-M .: Educational-methodical and

publishing center "Educational literature". 2004.- 252 page.

59. Egorov, V.A. Synthesis of an arrhythmic continuous-discrete controller for a linear object [Text] // Samar Bulletin.

state tech. un-that. - Ser. Technical science. - № 3 (31). - Samara State Technical University: 2011. - pp.44-51 .;

60. Zigler K. Methods of designing software systems. –M .: Mir, 1995

61. Kirillov S.N., Pospelov A.V. Discrete signals in radio systems. Tutorial. Ryazan. RGRTA, 2003. 60page.

62. Kirillov, S.N., Vinogradov, OL, Lotsmanov, A.A. Algorithms for the adaptation of digital filters in radio devices.

Tutorial. Ryazan. RGRTA, 2004. 80s.

63. Kobern A. Modern methods of describing the functional requirements for systems: Per. from English-M .: LORI,

2002

64. Lande D.V. Basics of information flow integration / D.V. Lande - K: Engineering, 2006. - 240 seconds.

65. Fatrell, R., et al. Software Project Management: Achieving Optimal Quality with Minimal Cost / R. Fatrell, D.

Schafer, L. Schafer: Translation from English. - M .: Williams, 2003.

66. Maltsev A.I. Algorithms and recursive functions. M. "Science", 1985.

363-367

29.

Authors: 1L. Chandana, 2P. Radhika

Paper Title: A Proficient Technique For Extraction The High Average-Utility Itemsets With Enhanced Bounds

From Transactional Database

Abstract: HUIM has turned into a well known knowledge extraction, as it can uncover designs that have

a highutility, conversely to continuous example extraction, which spotlights on finding incessant examples.

High average-utility itemset extraction (HAUIM) is different with HUIM gives an elective quantify, called

the average utility, to choose designs by considering their utilities and lengths. In the most recent decades, a

few calculations have been created to mine HAUIs. However majorly it takes lot of memory and time, since

they for the most part use the average-utility upper-bound model to miscalculate the average utilities of

itemsets. To enhance HAUIM here proposes four average utility upper bounds, in view of structure

database portrayal, and three proficient prune techniques. Furthermore, a novel conventional system for

looking at average-utility upper-bounds is displayed. In view of these theoretical outcomes, a proficient

calculation named dHAUIM is presented for extraction the total arrangement of HAUIs. dHAUIM speaks

to the inquiry space and rapidly process upper-bounds utilizing a novel IDUL structure. Broad

investigations demonstrate that dHAUIM beats three algorithms for extraction HAUIs as far as runtime on

both reality and artificial databases.

Page 44: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Keywords : Pattern extraction, utility extraction, high average-utility

References: [1] Unil Yun, John J, Leggett, “WFIM: Weighted Frequent Itemset Extraction with a weight range and a minimum

weight” in SIAM International Conference on Data Extraction, 2005

[2] Unil Yun, “Efficient extraction of weighted interesting patterns with a strong weight and/or support affinity,” in

information science, volume 177, issue 17, 1 September 2007

[3] Chowdhury Farhan Ahmed , Syed Khairuzzaman Tanbeer , Byeong-Soo Jeong , Young-Koo Lee, “Efficient Tree

Structures for Highutility Pattern Extraction in Incremental

Databases,” in IEEE Transactions on Knowledge and Data Engineering ,volume 21, No (12) , January 2010

[4] Tzung-PeiHong , Cho-HanLee , Shyue-LiangWang, “Effective utility extraction with the measure of average utility ”

in Expert Systems with Applications Volume 38, Issue 7, July 2011.

[5] Mengchi Liu, Junfeng Qu, “Extraction Highutility Itemsets without Candidate Generation”, in ACM international

conference on Information and knowledge management, October 2012

[6] Guo-Cheng Lan, Tzung-Pei Hong, Hong Yu Lee, Shyue-Liang Wang, Chun-Wei Tsai, “Enhancing the Efficiency in

Extraction Weighted Frequent Itemsets”, in Systems Man and Cybernetics (SMC) IEEE International Conference, 2013.

[7] R. Agrawal, T. Imielinksi and A. Swami, "Extraction Association Rules between Sets of Items in Large Database," in

The ACM SIGMOD International Conference on Management of Data, 1993.

[8] V. Torres, K. Chiu and M. Vasudeva, "WFIM: weighted frequent itemset extraction with a weight range and a

minimum weight," in The 2005 SIAM International Conference on Data Extraction, 2005.

[9] U. Yun, "Efficient extraction of weighted interesting patterns

30.

Authors: S.Neelima*, R.Brindha**

Paper Title: A Low Power, Area efficient implementation of AES algorithm

Abstract: Encryption is a procedure of convert readable information into encoded appearance so that it

can’t be interpreted by the intruder. Paper presents the FPGA implementation of a low power,

neighborhood efficient AES algorithm for encrypting data. From the results it has been experimental that

the enhanced technique has reduced the power consumption and area compared to the existing methods.

The implementation is done in 90 nm and 65 nm CMOS technology using Quartus for Cyclone II and

Cyclone III.

Keywords : Advanced Encryption Standard, Security, FPGA implementation, Low power, and area efficiency.

References: [2] Raaed K. Ibraheem, Roula AJ. Kadhim and Ali SH. Alkhalid, ‘Anti-Collision Enhancement of a SHA-1 Digest Using AES

Encryption By LABVIEW’, World Congress on Information Technology and Computer Application, 2015. [3] Benjamin Buhrow, Karl Fritz, Barry Gilbert and Erik Daniel, ‘A Highly Parallel AES-GCM Core for Authenticated Encryption of

400 Gb/s Network Protocols’, International Conference on ReConFigurable Computing and FPGAs, Pp. 1 – 7, 2015.

[4] Neha Dalakoti , Nidhi Gaury and Anu Mehra z, ‘Hardware Efficient AES for Image Processing with High Throughput’, 1st International Conference on Next Generation Computing Technologies (NGCT), Pp. 932 – 935, 2015.

[5] Pournima U. Deshpande and Smita A. Bhosale, ‘AES Encryption Engines of Many Core Processor Arrays on FPGA by Using Parallel, Pipeline andSequential Technique’, International Conference on Energy Systems and Applications (ICESA), Pp. 75-80,

2015.

[6] Qiang Liu, Zhenyu Xu and Ye Yuan, ‘High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion’, IET Computers & Digital Techniques, Vol. 9, No. 3, Pp. 175–184, 2015.

[7] Anane Nadjia and Anane Mohamed, ‘AES IP for Hybrid Cryptosystem RSA-AES’, 12th International Multi-Conference on Systems,

Signals & Devices, Pp. 1-6, 2015.

[8] Ankit Dhananjay Khedlekar, Tejas Mahadev Shelke, Shraddha Walhekar and Nikhita Nerkar, ‘Smart Secure System Using Parallel

AES’, International Journal of Advance Research And Innovative Ideas In Education, Vol. 3, No. 3, 2017, Pp. 1517-1522.

[9] Ashwini R. Tonde and Akshay P. Dhande, ‘Implementation of Advanced Encryption Standard (AES) Algorithm Based on FPGA’, International Journal of Current Engineering and Technology, Vol.4, No.2, Pp. 1048-1050, April 2014.

[10] Yang.J, Ding.J, Li.N and Guo.Y,’FPGA-based design and implementation of reduced AES algorithm’, IEEE Inter.Conf. Chal Envir

Sci Com Engin(CESCE).,Vol.02, No.5-6, Pp.67 70, June 2010. [11]

[12] Mateur.K, Alareqi.M, and Elgouri.R, ‘Design and hardware implementation of AES algorithm on FPGA ‘, WITS, The international

conference on Wireless Technologies embedded and intelligent systems ENSA of kenitra, April 2016. [13] Prachi bhalero v et el, ‘Hardware implementation of cryptosystem by AES algorithm using FPGA’ journal of Computer Science and

information Technology IJCSMC, vol 6, issue 5, may 2017.

[14] Pravin Ghewari B, Jayamaka Patil K and Amit Chougule B ‘Efficient hardware design and implementation of AES cryptosystem’, International Journal of Engineering Science and Technology, Vol. 2(3), 2010.

[15] Shihai zhu ‘Hardware implementation of AES encryption and decryption system based on FPGA’ The open cybernetics & Systemic

journal, 2015.

363-367

31.

Authors: Dharmaveer P. Choudhari 1 Dr. S. S. Dorle 2

Paper Title: Hybridizing network attack detection and prevention via integrated DADCQ Protocol

Abstract: Distribution adaptive distance with channel quality or DADCQ is a protocol used for checking

the fitness of a node for communication by utilizing node specific parameters in a distributed environment.

The major purpose of the protocol is to check if the node should be given preference in re-broadcasting

when a lot of nodes are trying the communicate in the network, DADCQ does this by accessing the node

363-367

Page 45: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

distribution, channel quality and distance from the target nodes. In this paper, we modify the DADCQ

protocol in order to detect and remove abnormalities like distributed denial of service (DDOS) and eves-

dropping attacks in a distributed network. The attacked network is evaluated for pre and post application

of the modified protocol and the Quality of Service (QoS) parameters are evaluated. It is observed that the

proposed protocol improves the QoS and is successful in removal of the aforementioned attacks from the

network.

Keywords : DADCQ, nodes, network attack, DDOS, eves-dropping, QoS

References:

1. Changder S, Ghosh D, Debnath N.C. (2010). Linguistic approach for text steganography through Indian text. In: 2010 2nd

international conference on computer technology and development, pp. 318-322

2. Ross J.Anderson, Fabien A.P. Petitcolas. (1998). On the limits of steganography. IEEE J Sel Areas Commun 16(4):474-481

3. Fabien A.P. Petitcolas, Ross J.Anderson, Markus G.Kuhn. (1999). Information hiding—a survey. In: Proc IEEE 87(7):1062-1078

4. Por LY, Ang TF, Delina B (2008) WhiteSteg-a new scheme in information hiding using text steganography. WSEAS Trans Comput

7(6):735-745

5. Wikipedia, The Free Encyclopedia / http://wikipedia.org/

6. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2006) A new approach to persian/arabic text steganography. In: 5th

IEEE/ACIS international conference on computer and information science and 1st IEEE/ACIS international workshop on component-based

software engineering, software architecture and reuse, pp 310-315

7. R. Bala Krishnan, Prasanth Kumar Thandra, M. Sai Baba. An overview of text steganography. 4th International Conference on

Signal Processing, Communications and Networking (ICSCN -2017), March 16 - 18, 2017, Chennai, INDIA

8. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 3(3&4):313-336

9. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2008) A new dynonym text steganography. In: International conference

on intelligent information hiding and multimedia signal processing, pp 1524-1526

10. 10.. Brassil JT, Low SH, Maxemchuk NF, O’Gorman L (1995) Document marking and identifi-cation using both line and

word shifting. In: Proceedings of INFOCOM ’95 proceedings of the fourteenth annual joint conference of the IEEE computer and

communication societies, pp 853-860

11. Cummins J, Diskin P, Lau S, Parlett R (2004) Steganography and digital watermarking. School of Computer Science, pp 1-24

12. E. A. Blinova. Steganographic method based on the line-shift coding method on non-displayed symbols of the electronic text

document. Belarusian State Technological University. BGTU. № 6 2016, p.166-169

13. Kabetta H, Dwiandiyanta BY (2011) Suyoto: information hiding in CSS: a secure scheme text steganography using public key

cryptosystem. Int J Cryptogr Inf Secur 1(1):13-22

14. Simmons G.J. The prisoner`s problem and the subliminal channel, Proc. Workshop on Communications Security (Crypto`83), 1984,

51-67.

32.

Authors: Muhamediyeva D.T., Urokov Sh.

Paper Title: APPLICATION OF A MULTI-AGENT SYSTEM FOR RISK ASSESSMENT WITH FUZZY

BACKGROUND INFORMATION

Abstract: The article offers the results of a study of various multi-agent systems on the example of a number of

models and multi-agent implementations for risk assessment with fuzzy initial information. General construction

methods and issues are related to their behavior, criteria for the quality of system performance that highlighted.

The regularities, interrelations between the properties and parameters used when specifying a multi-agent

intelligent system are defined. Developed approaches for processing complexly structured information. Algorithms

for constructing a multi-agent intelligent risk assessment system have been developed.

Keywords. Artificial intelligence, hybrid intellectual systems, neuro-fuzzy models, evolutionary algorithms, multi-

agent intelligent system

References:

1. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT

ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.

2. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT

decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.

3. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.

4. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT

methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -

№2.TT -WITH.TT 121-138.

363-367

Page 46: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

5. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.

6. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT

InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.

7. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT

H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.

8. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT

LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.

9. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT

JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.

10. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT

University,TT 2015.41TT (4):TT pp.67-74.

11. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT

Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.

12. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT

ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.

13. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT

decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.

14. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.

15. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT

methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -

№2.TT -WITH.TT 121-138.

16. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.

17. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT

InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.

18. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT

H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.

19. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT

LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.

20. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT

JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.

21. intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.

22. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT

decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.

23. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.

24. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT

methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -

№2.TT -WITH.TT 121-138.

25. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.

26. intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.

27. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT

decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.

28. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.

Page 47: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

29. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT

methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -

№2.TT -WITH.TT 121-138.

30. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.

31. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT

InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.

32. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT

H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.

33. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT

LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.

34. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT

JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.

35. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT

University,TT 2015.41TT (4):TT pp.67-74.

36. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT

Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.

37. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT

ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.

38. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT

decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.

39. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.

40. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT

methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -

№2.TT -WITH.TT 121-138.

41. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.

42. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT

InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.

43. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT

H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.

44. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT

LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.

45. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT

JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.

46. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT

University,TT 2015.41TT (4):TT pp.67-74.

47. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT

Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.

48. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT

2008.TT -TT 437TT p.

49. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT

ComputerTT ScienceTT Issues,TT November,TT 2012.

50. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT

University,TT 2012.33TT (1):TT pp.117-123

51. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT

2008.TT -TT 437TT p.

Page 48: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

52. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT

ComputerTT ScienceTT Issues,TT November,TT 2012.

53. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT

University,TT 2012.33TT (1):TT pp.117-123

54.

55. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT

InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.

56. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT

H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.

57. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT

LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.

58. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT

JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.

59. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT

University,TT 2015.41TT (4):TT pp.67-74.

60. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT

Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.

61. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT

ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.

62. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT

decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.

63. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.

64. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT

methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -

№2.TT -WITH.TT 121-138.

65. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.

66. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT

InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.

67. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT

H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.

68. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT

LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.

69. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT

JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.

70. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT

University,TT 2015.41TT (4):TT pp.67-74.

71. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT

Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.

72. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT

2008.TT -TT 437TT p.

73. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT

ComputerTT ScienceTT Issues,TT November,TT 2012.

74. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT

University,TT 2012.33TT (1):TT pp.117-123

Page 49: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

75. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT

2008.TT -TT 437TT p.

76. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT

ComputerTT ScienceTT Issues,TT November,TT 2012.

77. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT

University,TT 2012.33TT (1):TT pp.117-123

78. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT

University,TT 2015.41TT (4):TT pp.67-74.

79. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT

Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.

80. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT

2008.TT -TT 437TT p.

81. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT

ComputerTT ScienceTT Issues,TT November,TT 2012.

82. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT

University,TT 2012.33TT (1):TT pp.117-123

83. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT

2008.TT -TT 437TT p.

84. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT

ComputerTT ScienceTT Issues,TT November,TT 2012.

33.

Authors: Pundlik N. Patil1, Dheeraj S. Dehmukh2, Vilas S. Patil3

Paper Title: Analysis of the effect of LPG on the Performance and Frictional Power Loss for SI Engine

Abstract:Due to the depletion of conventional fossil fuels and the energy crises with emission problems

today, research and development have been concentrated on reducing fuel consumption by using different

alternative fuel and reducing a toxic component in combustion products. Liquefied petroleum gas is a

suitable fuel for internal combustion engine since the octane number is also high nearly 109 and therefore

cars, medium and heavy duty vehicles have been using propane or propane/butane mixture successfully.

The engine parameter like engine speed, load, viscosity of oil, cylinder size, brake power, frictional power,

indicated power, are considered for comparative analysis for bi-fuel engine fueled by petrol and liquefied

petroleum gas for the performance of the test engine and frictional losses. The experiment was carried out

with morse procedure to compare the frictional power losses which are always more for liquefied petroleum

gas than the petrol.

Keyword-Frictional power loss, liquefied petroleum gas, morse test, mechanical efficiency,fuel consumption

130. John.T B.T Heywood,T “InternalT CombustionT EngineT Fundamentals”,T TataT McGrawT Hill,T ISBNT -T 13:978T –T 1T -25-900207-6,PPT

725-T 741,T 2011.

131. V.T Ganeshan,T “InternalT combustionT engine”T TataT McGrawT Hill,T 2006.

132. C.T S.T Mistry,T “ComparativeT assessmentT onT performanceT ofT multiT cylinderT engineT usingT CNG,LPGT andT PetrolT asT aT fuel”T SAET

TechnicalT PaperT ,T 2005-01-1056,2005

133. HakanT Bayraktar,T OrhanT DurgunT “T InvestigatingT theT effectT ofT LPGT onT sparkT ignitionT engineT combustionT andT performance,T "T

EnergyT ConversionT andT managementT Vol.T 46,T PP.T 2317-2333,T 2005 134. AliT M.T PourkhesalianT ,T AmirT H.T Shamekhi,T FarhadT Salimi,T "PerformanceT andT emissionT comparisonT andT investigationT ofT

alternativeT fuelsT inT SIT engines,"T SAET International,T ISSN:T 0148-719.1,T 2009.

135. R.T R.T Saraf,T S.T S.T ThipseT ,T P.T K.T Saxsena,T “ComparativeT emissionT analysisT ofT Gasolene/T LPGT automotiveT bi-fuelT engine.”,T

WordT academyT ofT Science,T EngineeringT andT Technology,T Vol.T 3,,T 2009.

136. PundlikT NivruttiT Patil,T DheerajT SheshraoT Deshmukh,T “EffectT ofT LiquefiedT PetroleumT GasT asT aT FuelT onT SparkT IgnitionT EngineT

Performance:T AT CriticalT Review”T PRATIBHA:T INTERNATIONALT JOURNALT OFT SCIENCE,T SPIRITUALITY,T BUSINESST

ANDT TECHNOLOGYT (IJSSBT),T Vol.T 4,T No.T 1.T Nov.T 2015T ISSNT 2277-7261T PP.T 50-55

137. PundliT kT NivruttiT Patil,T DheerajSheshraoT Deshmukh,T JitendraT GulabraoT Patil,T “AT ReviewT onT LiquidT PetroleumT GasT asT aT FuelT

inT SparkT IgnitionT EngineT Application”T InternationalT ConferenceT onT GlobalT TrendsT inT Engineering,T TechnologyT andT

ManagementT (IJETT),T 2016,T ISSN:T 2231-5381T ppT 124-128.2016

138. DhirajT S.Deshmukh,T PundlikT N.T Patil,T Vilas,T S.T Patil,T “DesignT ofT ExperimentalT planT forT effectT ofT liquefiedT petroleumT gasT

analysisT onT frictionT powerT lossT inT sparkT ignitionT engine.”,T InternationalT ConferenceT onT GlobalT TrendsT inT Engineering,T

TechnologyT andT ManagementT (ICGTETM),T 2017,T ISSN:T 2320-2882T ppT 199-205.,2017

139. MassimoT Massi,T “ExperimentalT analysisT onT aT sparkT ignitionT petrolT engineT fuelledT withT LPG(liquefiedT petroleumT gas)”,T EnergyT

41ElsevierT Limited,T ppT 252-260.T 2012 140. VenkataT RameshT Mamilla,T V.T Gopinath,T C.T V.T Subbarao,T “PerformanceandEmissioncharacteristicsof4strokepetrolengineT fueledT

368-374

Page 50: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

withT Biogas/L.P.G.T BLENDS”,T IJAET/T /Vol.T II/IssueT -IT PPT 209-213.T MarchT 2011

141. FarazT AT Khan,T SameerT Usmani,OmarT AT Siddiqui,T SalmanT MT Khan,T “PerformanceT evaluationT ofT ambassadorT carT SparkT

IgnitionT engineT UsingT aniline-petrolT blends”,T IJERT,T Vol.T IT issueT 8,ISSNT 2278-0181,pp1-9T OctoberT 2012

142. M.T Gumus,T "EffectsT ofT volumetricT efficiencyT onT theT performanceT andT emissionsT characteristicsT ofT aT dualT fueledT -gasolineT andT

LPGT sparkT ignitionT engine,"T FuelT ProcessingT Technology,Vol.T 92,T PP.T 1862-1867,T MayT 2011.

143. SanjayT DT Bisen,.T YogeshT R.T SupleT ,T "PerformanceT evaluationT ofT fourT strokeT SIT engineT byT directT injectionT ofT LPG,"T Vol.T

1,ISSN:T 2321-8134,10T octoberT 2013

34.

Authors: Avijeet Kumar Biswas, Dr. B. Krishnamurthy

Paper Title: Democratization of the United Nations: What is expected of India and the European Union?

Abstract:The United Nations Security Council reflects a setup of the past rather than the reality of the

present world order. There has been a clamour for the induction of new countries as permanent members

into the council to render it truly universal. But would the expansion of the permanent members naturally

lead to the democratization of the most important international organization?India has been one of the

claimants for permanent membership. Even though India’s demand is legitimate, it must first seek and

secure its place at the global high table and should play a role in helping shape the global order.The

European Union tries to lead and influence the international politics by its example and intends to replicate

its success at the global level. Just like India, the EU is a votary of ‘multilateralism’ and it stands for the UN,

and insists on the need for international laws, agreements, rules and institutions. India is part of EU’s global

security strategy and is considered as one among the ‘key’ strategic partners. EU can thus be the perfect

and reliable partner for India to achieve its foreign and strategic policy goals. India should join hands with

the EU to formulate new global democratic laws and norms, thereby becoming a norm setter on its own

right.

Keywords: Democratization, European Union, India, United Nation

References: 1. Shashi Tharoor, PaxIndica. India and the World of the 21st Century, Penguin Books India, New Delhi, 2012, pp. 366-7.

2. B.Krishnamurthy, “India and the European Union: Common Quest for Multilateralism and a Multipolar World Order”, in Rajendra Jain

(ed.), India and the European Union in a Changing World, Aakar Books, Delhi, 2014, pp. 18-39. 3. Jean-Luc Racine, “Pakistan and the ‘India Syndrome’: Between Kashmir and the Nuclear Predicament”, in Christophe Jaffrelot (ed.),

Pakistan. Nationalism without a Nation?,Zed Books Ltd., New Delhi, 2004, pp. 195-227, at p. 217.

4. Jan Wouters, The EU as a Multilateral Security Actor After Lisbon: Constitutional And Institutional Aspects, Louven Centre, Working Paper 80, 2012, p. 5.

5. ShairiMathur, “Voting for the Veto:India in a Reformed UN”, September 2005, The Foreign Policy Centre, London, 2005, p. 22, available

at www.fpc.org.uk/publications. 6. Sunil Khilnani, “India as a Bridging Power”, Prasenjit K. Basu et al, India as a New Global Leader, The Foreign Policy Centre, London,

2005, p. 8.

7. David M. Malone, Does the Elephant Dance? Contemporary Indian Foreign Policy, Oxford University Press, Oxford, 2011, p. 252. 8. Angela Stephens, Public Opinion in India and America, March 1, 2006. Avaialbe:

http://www.worldpublicopinion.org/pipa/articles/brasiapacificra/176.php?lb=bras&pnt=176&nid=&id=

9. ChinmayaR.Gharekhan, “India and the United Nations”, in Atish Sinha and MadhupMohta (eds.), Indian Foreign Policy: Challenges and Opportunities, Foreign Service Institute/Academic Foundation, New Delhi, 2007, p. 200.

10. Tharoor, n. 1, pp. 419, 427.

11. Sunil Khilnani et al.,Nonalignment 2.0. A Foreign and Strategic Policy for India in the TwentyFirst Century, Centre for Policy Research, New Delhi, 2012, pp. 7-8, 69-70.

12. B.Krishnamurthy and S.Jeeva,“European Union as a Global Actor: In Perception and Action”, in Jayaraj Amin (ed.), European Union in

Changing International Order, Kaveri Books, New Delhi, 2013, pp.3-32.

13. Álvaro de Vasconcelos, ‘Multilateralising’ multipolarity, in Giovanni and Alvaro de Vasconcelos (eds.), Partnerships for Effective

Multilateralism – EU Relations with Brazil, China, India and Russia, Chaillot Paper, No. 109, May 2008.

14. Charlotte Bretherton and John Vogler, The European Union as a Global Actor, Routledge, London, 2006, Second Edition,p.218. 15. Secure Europe in a Better World”, European Security Strategy (Brussels, December 12, 2003). Available:

www.consilium.europa.eu/uedocs/cmsUpload/78367.pdf

16. Desmond Dinan, Ever Closer Union—An Introduction to European Integration, Palgrave Macmillan, 2005, p. 604. 17. Vasconcelos, n. 8, p. 30.

18. Ibid., pp. 25-6.

19. “Developing Europe’s External Policy in the Age of Globalization” (Speech by Chris Patten, the then European Commissioner for External Relations on April 4, 2002). Available: http://europe.eu.int/comm/external_relationss/nfewss/patten/sp02_134.htm (14-06-02)

20. Stephan Keukeleire and Jennifer MacNaughtan,The Foreign Policy of the European Union, Palgrave, Macmillan, London and New York,

2008, p. 59.

363-367

35.

Authors:

Maxim A. Velichko, Lyudmila V. Krasovskaya, Ivan S. Starovoytov, Irina А. Starovoytova, Nataliya A.

Korenkova, Irina N. Galtseva

Paper Title: The Development of Radio and 3G Based Telemetry System for the Remote Gas Accounting and

Control Nodes

Abstract: In this article we have described the use of vortex and recently developed ultrasonic flowmeters

with high dynamic range of 1 to 1500 for industrial applications. Its software and the software of

corresponding computing device is able to avoid gas leakage, to minimize energy consumption and to save

human resources while maintaining metrological data. Described is the low power consumption that makes

it possible to use this ultrasonic flowmeter in hard remote environment without direct management for a

period of several months. Shown is the new telemetry system that was developed to unite flowmeters in the

363-367

Page 51: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

severe conditions of the desert with power supply problems and low GPRS signal quality. Experiments held

in Turkmenistan have shown that device indications didn’t drift and remained stable during the year, that

is a great advantage in comparison to rotary and turbine flowmeters. Also described is the mobile ultrasonic

calibration stand that uses the same physical principles and similar software. Outlined is the usage of

modern wireless technologies to collect and transmit metrological data.

Index Terms: telemetry, ultrasonic flowmeter, signal transmission, calibration stand, Wi-Fi, HTTP.

References: 144. G. O. Young, “Synthetic structure of industrial plastics (Book style with Velichko, M., Satler, O., Krasovskaya, L., Bronnikova, M.,

Belyaeva, I., Kostina, I., Gladkikh, Yu., 2018. Calibration of Ultrasonic Flow Meter on Wi-Fi Network Using a Web Browser. J. Advanced

Research in Dynamical and Control Systems, 08 (SI), Issue: 08-Special Issue: 1593-1596. 145. Velichko, M., Satler, O., Krasovskaya, L., Erina, T., Belyaeva, I., Gladkikh, Yu., 2017. Using Drone as WiFi Access Point During

Infrared Thermography for Subsidiary Data Acquisition. J. Fundam. Appl. Sci., 9(1S): 1279-128.

146. Velichko, M., Satler, O., 2018. The use of the HX711 ADC Module to Reduce the Error in the Verification of Gas Meters. Digest of scientific articles of the II International scientific-practical conference, Belgorod.

147. Hamidullin, V., Malakhanov, R., Khamidoullina, E., 2001. Statics and Dynamics of Ultrasonic Flowmeters as Sensing Elements for

Power Control Systems. Digest: IEEE Conference on Control Applications, IEEE International Conference on Control Applications CCA '01. sponsors: IEEE Control Systems Society (CSS): 680-685.

148. Fraņa, D.R., Ono, Y., Jen, C.-K., 2011. Contrapropagating Ultrasonic Flowmeter Using Clad Buffer Rods for High Temperature

Measurements. Journal of Dynamic Systems, Measurement and Control, Transactions of the ASME, Т. 133, # 1.: 011007. 149. Hu, L., Qin, L., Mao, K., Chen, W., Fu, X., 2016. Optimization of Neural Network by Genetic Algorithm for Flowrate

Determination in Multipath Ultrasonic Gas Flowmeter. IEEE Sensors Journal, Т. 16, # 5: 1158-1167.

150. Luca, A., Marchiano, R., Chassaing, J.-C., 2016. Numerical Simulation of Transit-time Ultrasonic Flowmeters by a Direct Approach. IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, Т.63, #6: 886-897.

151. Gryshanova, I., 2007. The Effect of Duct Cross-sectional Shapes on Metrological Performance of Ultrasonic Flowmeters. Digest:

Proceedings of the 5th Joint ASME/JSME Fluids Engineering Summer Conference, FEDSM: 27-31. 152. Hamidullin, V., 1995. Dynamics of Ultrasonic Flowmeters. Digest: Proceedings of the IEEE Ultrasonics Symposium: 1109-1113.

153. Gerasimov, S., Glushnev, V., Serov, N., 2018. Analysis of Calibration and Verification Indirect Methods of Ultrasonic Flowmeters.

Digest: 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications, TELSIKS - Proceeding 13: 451-454.

154. Bates, R., et al., 2013. Development of a Custom On-line Ultrasonic Vapour Analyzer/Flowmeter for the Atlas Inner Detector, with

Application to Gaseous Tracking and Cherenkov Detectors. Journal of Instrumentation, Т.8, #1: C01002. 155. Gershman, E. M., Kruglo D. S., Fafurin V. A., Borisov A. M., Sabirzyanov A. N. Flow measurement of two-phase flow by

ultrasonic flow meters. Transactions Of Academenergo. 2017. 1. 30-41.

156. Mansfeld, D. A., Sanin, A. G., Volkov, G. P., Belyaev, R. V., Morozkin, D. V., 2017. Ultrasonic flow of gas from overhead sensors, Scientific notes of the physics faculty of Moscow University, 5: 1751201.

157. Kuranov, K. N., Sergeev, S. S., 1996. Automated calculation of parameters of ultrasonic flowmeters. The Creation of resource-

saving machines and technologies, Abstracts of the Republican scientific and technical conference, Ministry of education and science of the Republic of Belarus, Mogilev machine-building Institute: 99.

158. Strelnikov, E. A., Eremin, I. Yu.,2016. The issue of improving the accuracy of ultrasonic flowmeters, Legislative and applied

Metrology, 1 (140): 41-44. 159. Abzalilova, E. R., Galimullina, E., 2017. Reducing the influence of vibration on the measurement accuracy of ultrasonic flowmeters.

Bulletin of science and education, 1 (25): 33-35.

160. Tyryshkin, R. A., Sabirzyanov, A. N., Fafurin, V. A., 2016. Numerical simulation of the correction coefficient of ultrasonic flowmeters. Mathematical methods in technics and technologies, 9 (91): 17-23.

161. Biryukov, E. A., 2018. The transducers of ultrasonic flowmeters. Traditional and innovative science: history, modern condition and

prospects collection of papers of International scientific-practical conference: 10-12. 162. Borisov, V. A., Gershman, E. M., Pruglo, D. S., Fafurin, V., Yavkin., 2017. Experimental study of the influence of heterogeneity of

the temperature field on metrological characteristics of the ultrasonic flowmeter. Transactions Of Academenergo, 2: 7-18. 163. Vasilyev, T. R., Kokuev, A. G., 2018. Control of oil consumption based on artificial neural network. Bulletin of Astrakhan state

technical University, Series: Management, computer engineering and Informatics, 2: 43-52.

164. Abzalilova, Y. R., Vydrin, D. F., Galimullina, E. E., Vdovin, A. K., 2017. Methods of flow measurement. Scientific research, 2 (13): 20-21.

165. Terekhin, A., Pashnina, N., 2016. Evaluation of the effect of the number of beams of ultrasonic flow transducers on the quality

characteristics of measurement. Digest: Prom-Engineering proceedings of the II international scientific and technical conference: 404-407. 166. Polovneva, S. I., Yelshin, V. V., Tolstoy, M. Y., 2009. Flow measurement of gases and liquids. Teaching aid / national research

Irkutsk state technical University: 235-238.

167. Kositsyn, N. I., Petrov, V. V., Petrov, A. V., 2016. The calculation of the distribution of the field amplitude of the ultrasonic wave beam in a moving medium. News of Saratov University, New series, Series: Physics, Vol. 16, 1: 27-33.

168. Sheshukov, I. Y., 2015. Metering devices, errors of measurement and calculation algorithms. Legislative and applied Metrology, 3

(136): 24-40.

36.

Authors: Nur Ain Hamiruddin and Siti Amira Othman

Paper Title: The Feasibility of Irradiated Bioplastics As Future Packaging Material

Abstract: For bioplastic materials, the role of radiation in shaping their performance has received growing

scholarly interest. Notably, bioplastic materials refer to substances manufactured using organic biomass

components. To prepare these substances, different processes are implemented. For high-technology firms,

specialty plastics are required, especially those with specific responses upon being exposed to radiation. In the

recent years, the majority of food packaging materials have received approval relative to the aspect of

irradiation. However, the extent to which these substances could be safe has proved challenging to unearth;

with the industry charged with food and regulation guidelines on focus. of importance to note is that the

bioplastic materials come with several benefits. Some of these merits include the affirmation that they do not

generate toxic fumes and that they also reduce the emission of carbon dioxide, which would be the case if other

unrelated materials were used. The central aim of this review paper is to examine the degree to which irradiated

bioplastic materials could prove feasible relative to their use as packaging materials in the future.

363-367

Page 52: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Index Terms: Irradiated, Bioplastics, Packaging, Food.

References:

• Urbain, W.M. 1986. Food irradiation. Orlando, FL., Academic Press, Inc

• Komolprasert, V. 2007. Packaging for food treated with ionizing radiation. In: Packaging for non-thermal processing of food, (Ed.) J.H.

Han, Blackwell Publishing. Ames, IA, pp. 1-16.

• O’Donnell, American Chemical Society. Washington, D.C., pp. 1-13. O’Donnell, J.H., Sangster, D.F. 1970. Principles of radiation

chemistry, Edward Arnold, London.

• Raghu, R, Archana, K., Sharanappa,C., Ganesh., S, Devendrappa., H (2016). Electron beam and gamma ray irradiated polymer electrolyte

films: Dielectric properties. Journal of Radiation Research and Applied Sciences. Volume 9, Issue 2, April 2016, Pages 117-12

• Park, H., Li, X., Jin, C., Park, C.-Y., & Cho, W.-J. (2002). Preparation and properties of biodegradable thermoplastic starch/clay hybrids.

Macromolecular Materials and Engineering, 287, 553–558. http://dx.doi.org/10.1002/1439- 2054(20020801)287:83.0.CO;2-3

• Mensitieri, G., Di Maio, E., Buonocore, G. G., Nedi, I., Oliviero, M., Sansone, L., & Iannace, S. (2011). Processing and shelf life issues

of selected food packaging materials and structures from renewable resources. Trends in Food Science & Technology, 22, 72–80.

• Jamshidian, M., Tehrany, E. A., Imran, M., Jacquot, M., & Desobry, S. (2010). Poly-lactic acid: Production, applications,

nanocomposites, and release studies.

• Rhim, J. W., Hong, S. I., & Ha, C. S. (2009). Tensile, water vapour barrier and antimicrobial properties of PLA/nanoclay composite films.

Food Science and Technology, 42, 612–617.

• Rasal, R. M., Janorkar, A. V., & Hirt, D. E. (2010). Poly(lactic acid) modifications. Progress in Polymer Science, 35, 338–356.

http://dx.doi.org/10.1016/j.progpolymsci.2009.12.003.

1. Clough, R., Shalaby, S. W., eds., (1990) "Radiation Effects on Polymers, (1991) " ACS Symposium Series 475, ACS Washington, D.C.,

2. Potter, N. N., & Hotchkiss, J. H. (1995). Food science. New York: Chapman & Hall.

3. McKown K.M. Laura D. Carbone, Juan Bustillo, Jerome M. Seyer, Andrew H. Kang, Arnold E. Postlethwaite (2001). Induction of

immune tolerance to human type I collagen in patients with systemic sclerosis by oral administration of bovine type I collagen.

4. Van- willige R. W. G., Linssen J. P. H., Meinders M. B .J., Vander S. H. J., and Voragen A. G. J. (2002). Influence of flavor absorption

on oxygen permeation through LDPE, PP, PC and PET plastics food packaging. Food Additives and Contaminants. 19:303–13.

5. Tharanathan, R. N. (2003). Review e biodegradable films and composite coatings: Past, present and future. Trends in Food Science &

Technology, 14, 71–78.

6. Patel, V.R. and Amiji, M.M. (1996). Preparation and characterization of freeze dried chitosan poly(ethylene oxide) hydrogels for site-

specific antibiotic delivery in the stomach. Pharmaceut. Res. 13: 588–593.

7. Potter, N.N. and Hotchkiss, J.H. (1995). Food Science, Fifth Edition. Chapman & Hall, New.

8. Guilbert, S. (1986). Technology and application of edible protective films. In Mathlouthi, M. (Ed.), Food Packaging and Preservation,

London, UK: Elsevier Applied Science.371–394.

9. Kester, J. J. and Fennema, O. R. (1986). Edible films and coatings: A review. Food Technology 40(12): 47-59.

10. Bourtoom, T. (2008). Edible film and coatings: Characterstics and properties. Int. Food Res. J. 15(3). 1-12.

11. Food and Drug Administration (FDA). (2002) Guidance for industry: Preparation of premarket submission for food contact substances:

Chemistry recommendations, Center for food safety and applied nutrition, Office of food additive safety: College Park, MD. U.S. Food and

Drug Administration..

12. Bailey, Allan B., Chanderbhan, Ronald, Collazo-Braier, Nancy, Cheeseman, Mitchell A., Twaroski, Michelle L. 2005. The use of

structure-activity relationship analysis in the food contact notification program. Regulatory Toxicology and Pharmacology 42(2):225-235.

37.

Authors:

Masiri Kaamin, Nur Fadzly Md Zaid, Mohd Effendi Daud, Rosdi Ab Rahman, Hairul Mubarak

Hassim, Nor Baizura Hamid, Mardiha Mokhtar

Paper Title: Analysis on Absorption Sound Acoustic Panels from Egg Tray with Corn Husk and Sugar Cane

Abstract: In the contemporary world, one of the areas that have gained growing attention entails sound control. The

motivation has been to respond to the increasing demand to improve sound waves in various contexts. One of the sound

absorbing agents entails natural fiber, a platform that has led to the growing development of sound absorbers. Hence, this

study’s central purpose is to examine the potentiality of sound absorber panels developed from materials such as egg trays

with corn husks, egg trays with sugar cane, and egg trays combined. For the selected materials, two tests that are

implemented include reverberation room test towards achieving noise reduction coefficients (NRCs) and the impedance tube

test – towards achieving the sound absorption coefficients (SACs). For the impedance experiment, findings indicate that the

frequency of the absorption values ranges from 0 Hz to 1000 Hz. For the respective forms of the acoustic panels, the SAC

values are seen to be 0.9600, 0.9700, and 0.8900; findings that are achieved under low-frequency conditions. In relation to

the case of NRC, the values obtained for the selected panels include 0.5500, 0.5900, and 0.5000. Indeed, the absorption

aspect is seen to be pronounced when the experimental platform entails a combination of egg trays with sugar cane stacks.

Regarding the results gained from the case of the reverberation room test, the echo time is likely to be shortened by the

acoustic panel. Whereas the maximum time for the egg tray panel is observed to be 4.800 seconds, the case of an empty

room depicts a maximum of 6.280 seconds. For the egg tray panels with corn skins and sugar cane, the results point to the

maximum times of 3.990 seconds and 4.210 seconds respectively. Hence, it is concluded that the egg tray panel with corn

husks depicts lower NRC values. Overall, it is evident that the three materials exhibit a promising state of eco-friendliness,

complemented by the affirmation that in the market, they are easily available.

Keywords : Sound, Corn husk, Sugar cane, Egg tray.

References:

1. Cox, T., & Antonio, J. (2004). Acoustics Absorbers and Diffusors.

363-367

Page 53: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

2. Fagbemigun, & Taiwo, K. (2014). Pulp and Paper-Making Potential of Cornhusk. Lagos-Nigeria International Journal of Agri Science Vol

4(4), 209-213. 3. Hosseini, Ayub, Jailani, F, M.N, & M. (2011). Analysis of coir fiber acoustical characteristics. Applied Acoustics 72(1), 35-42.

4. Koizumi, T., Tsujiuchi, N., & Adachi, A. (2002). WTT Press, Southampton, UK. High Performance Structures and Composite Book, 127-

166.

5. Lee, & Chen W. (2003). Sound Absorption Properties Of Recycled Polyester Fibrous Assembly Absorbers. AUTEX Research Journal 3(2).

6. Nick, B., & Thomas,W. (2002). Improved acoustic behavior of interior part of renewable resources in the automotive industry. journal of

polymers and the environment, 115-118. 7. Nunez, D. G. (1998). causes and effect of noise pollution. Retrieved from student paper: UK.ask.com/.../causes-and-effect-of-noise-

pollution-United-Kingdom

8. SadatniaM, Ebrahimi, G., & Tajvidi , M. (2008). Proceedings of the 17th World Conference on Nondestructive Testing. Comparing sound absorption characteristic of acoustic board made of Aspen particles and different percentage of wheat and barley straws., 1-6.

9. Slamet. (2002). Tebu. Available: http://warintek.progresio.or.id/tebu/perkebun/warintek/merintisbisnis/progresio.html

10. Tipler, P. A. (1998). Physics for Scientists and Engineer Vol 1. Mechanics, Oscillations and Waves and Thermodynamics, London. 11. Wambua, P., J. Ivens, & I. Verpoest. (2003). Composite Science and Technology. Natural Fibres: Can They Replace Glass In Fibre

Reinforced Plastics?, 1259-12646.

12. Wang C. N, & J. H. Torng. (2001). Experimental study of the absorption characteristic of some porous fibrous materials. applied acoustic, 447-459.

13. Wassilieff, C. (2003). Applied Acoustics 48. 339-356.

14. Yang, H., Kim, D., & Kim, H. (2003). Bioresource Technology. Rice straw-wood particle composite for sound absorbing wooden construction material, 117-121.

Zulkarnain, Z. R., & J, M. M. (2010). American Journal of Applied Science. 260-264.

38.

Authors: Challa Chaitanya Chowdary, Udaya Kiran

Paper Title: LICENSE PLATE CHARACTER RECOGNITION USING RIESZ FRACTIONAL AND

CONVOLUTIONAL NEURAL NETWORK

Abstract: Automatic license plate recognition system is mostly used for identification of vehicles. This

system is used in traffic monitoring, parking management and identification of theft vehicles. As in India

the license plate regulations are not strictly followed, it is often difficult to identify the plate with different

font type and character size. One more major problem in license plate recognition is low quality of images

which affected via severe illumination condition. In this paper, a Riesz fractional mathematical model is

proposed for enhancing the edges, which results in improving the performance of text recognition. The text

in the license plate is recognized using the convolution neural network and the results showed better

accuracy.

Keywords: Character recognition, convolutional neural network, license plate recognition

References:

1. Abolghasemi, V. and Ahmadyfard, A., 2009. An edge-based color-aided method for license plate detection. Image and Vision Computing,

27(8), pp.1134-1142. 2. Baohua, Z., Dahua, Y., Hongmei, H. and Lanying, G., 2010, June. License plate location algorithm based on histogram equalization. In

2010 International Conference On Computer Design and Applications (Vol. 1, pp. V1-517). IEEE.

3. Al-Ghaili, A.M., Mashohor, S., Ramli, A.R. and Ismail, A., 2012. Vertical-edge-based car-license-plate detection method. IEEE transactions on vehicular technology, 62(1), pp.26-38.

4. Azam, S. and Islam, M.M., 2016. Automatic license plate detection in hazardous condition. Journal of Visual Communication and Image

Representation, 36, pp.172-186. 5. Vicente, A.N. and Pedrini, H., 2016, October. A learning-based single-image super-resolution method for very low quality license plate

images. In 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (pp. 000515-000520). IEEE.

6. Yu, S., Li, B., Zhang, Q., Liu, C. and Meng, M.Q.H., 2015. A novel license plate location method based on wavelet transform and EMD analysis. Pattern Recognition, 48(1), pp.114-125.

7. Saha, S., Basu, S. and Nasipuri, M., 2015. iLPR: an Indian license plate recognition system. Multimedia Tools and Applications, 74(23),

pp.10621-10656. 8. Gou, C., Wang, K., Yao, Y. and Li, Z., 2015. Vehicle license plate recognition based on extremal regions and restricted Boltzmann

machines. IEEE Transactions on Intelligent Transportation Systems, 17(4), pp.1096-1107.

9. Tian, J., Wang, R., Wang, G., Liu, J. and Xia, Y., 2015. A two-stage character segmentation method for Chinese license plate. Computers & Electrical Engineering, 46, pp.539-553.

10. Raghunandan, K.S., Shivakumara, P., Jalab, H.A., Ibrahim, R.W., Kumar, G.H., Pal, U. and Lu, T., 2017. Riesz fractional based model for

enhancing license plate detection and recognition. IEEE Transactions on Circuits and Systems for Video Technology, 28(9), pp.2276-2288.

11. Jain, V., Sasindran, Z., Rajagopal, A., Biswas, S., Bharadwaj, H.S. and Ramakrishnan, K.R., 2016. Deep Automatic Licence Plate

Recognition system.

363-367

39.

Authors: Dr. Kriti Bhaswar Singh, Dr. Abhishek Singh

Paper Title: University Autonomy and Sustainable Finance: A Case of Royal University of Bhutan

Abstract: Royal University of Bhutan was established in 2003 through Royal Charter. RUB is a

decentralized university with eight colleges distributed across the country. In the year 2011, RUB became

fully autonomous university. After two years of successful autonomy, the RUB was beginning to sense the

gradual decline in government funding. This has put to test the future sustainability of the university.

Colleges under RUB have saved the funds that was granted by the royal government of Bhutan (RGoB) to

sustain in the future as there began gradual decline in grants during the coming years (Rigyal, 2013). This

363-367

Page 54: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

study is aimed to find the present investment policy of the colleges under RUB and recommend investment

products for them to generate future sustainable income for the colleges & university. In order to assess the

knowledge of the investment, expected return & risk and the preference of the colleges under RUB a set of

questionnaire was administered. A total of 20 respondents, including President, finance personal and

administrative officer, from 5 colleges (representing more than 60% of colleges) under RUB were taken for

the study. Responses reveal the general investment policy of the colleges, present investment avenues

adopted and return on them. All these facts were analyzed to propose portfolio for the colleges, which can

help them to generate sustainable incomes.

Keywords : University autonomy, governance, Royal University of Bhutan, Sustainability

.

References: 1. Awalakki, M. S. (2015). A Study on Investment Patterns and Awareness of Salaried Class Investors. International Journal of Scientific

Research (IJSR), 4(8), 348-350. 2. Bahl, S. (2012). The Role of Green Banking in Sustainable Growth. International Journal of Marketing, Financial Services & Management

Research, 2(2), 27-35.

3. Black, F. (1976). The Investment Policy Spectrum: Individuals, Endowment Funds and Pension Funds. Charlottesville: CFA Institute.

4. BNBL. (2017). Bhutan National Bank Ltd. Retrieved October 2017, from http://www.bnb.bt

5. Boyer, E. (1990). Scholarship reconsidered. Princeton, NJ: Carnegie Foundation.

6. BusinessBhutan. (2017, February). Business Bhutan. Retrieved from businessbhutan website: http://businessbhutan.bt/bhutans-liquidity-hang-up/

7. David Engberg, M. F. (2002). Promising Practices: Spotlighting Excellence in Comprehensive Internationalization. Washington, DC.:

American Council on Education. 8. David S. P. Hopkins, W. F. (January, 1981). Planning Models for Colleges and Universities. California: Stanford University Press.

9. Dimmock, S. G. (August 2012). Background Risk and University Endowment Funds. The Review of Economics and Stastistics, 94(3),

789-799. Retrieved from http://hdl.handle.net/10220/12203 10. DoI, MoEA. (2006). Investment Opportunity Study. Thimphu: Author.

11. Dresner, S. (2003). PIPE: A Guide to Private Investments in Public Equity. Bloomberg Press.

12. Fabozzi, F. J. (1999). Investment Management. New Jersey: Prentince Hall, Inc. 13. Fishman, J. (2014). What Went Wrong: Prudent Management of Endowment Funds and Imprudent Endowment Investing Policies. Journal

of College and University Law, 40(2), 49.

14. Frank Reilly, K. B. (2002). Investment Analysis & Portfolio Management. Mason, OH: South-Western Cengage Learning. 15. Hansmann, H. (1990). Why Do Universities Have Endowments? The Journal of Legal Studies, 3-42.

16. Iyiola Omisore, M. Y. (March 2012). The modern portfolio theory as an investment decision tool. Journal of Accounting and Taxation,

4(2), 19-28. 17. Jones, C. P. (2007). Investment Analysis and Management. New Delhi: Wiley India Pvt. Ltd.

18. Jr., J. P. (2009). Business incubation as strategy. Business Strategy Series, 10(3), 156-166.

19. Jr., W. O. (1999). Sources of Funds and Quality Effects in Higher Education. ECONSTOR Make Your Publication Visible, 35. 20. Keith C. Brown, L. G. (2010). Asset allocation and portfolio performance: Evidence from University endowments funds. Journal of

Financial Markets, 268-294.

21. Lawrence J. Gitman, M. D. (2007). Planning Your Personal Finances. Massachusetts, US: Cengage Learning. 22. Mark A. Youndt, M. S. (March 2004). Intellectual Capital Profiles: An Examination of Investments and Returns*. Journal of Management

Studies, 335-361.

23. Maxwell, T. W. (2012). Academic Work in an Autonomous Royal University of Bhutan: Challenges and Responsibilities Regarding Research. Bhutan Journal of Research & Development, 37-49.

24. Merton, R. C. (1993). Optimal Investment Strategies for University Endowments Funds. In M. R. Charles T. Clotfelter, Studies of Supply

and Demand in Higher Education (pp. 211-242). Chicago: University of Chicago Press. 25. N. Walia, R. K. (2009). An Analysis of Investor's Risk Perception towards Mutual Funds Services. International Journal of business

Management, 4(5), 106-120.

26. PCAL. (2017). Penden Cement Authority Ltd. Retrieved February 25, 2017, from http://www.pcal.bt 27. Rigyal, D. S. (2013). University autonomy and sustainability: Faculty perceptions on the sustained growth of the Royal niversity of Bhutan.

Bhutan Journal of Research & Development, 17-29.

28. RMA. (2014-2015). Annual Report. Thimphu: Author. 29. RMA. (2015-16). Annual Report. Thimphu

30. RMA. (2016). Monetary Policy Statement. Thimphu

31. RMA. (2017, February). Royal Monetary Authority of Bhutan. Retrieved from https://www.rma.org.bt/db_noticetp.jsp 32. RSEBL. (2009). Introducing the Stock Market. Thimphu

33. RSEBL. (August 2009). Introducing the Stock Market. Thimphu

34. RUB. (2011). Research Guidelines. Retrieved 2017, from Royal University of Bhutan: http://www.rub.edu.bt/index.php/research-guidelines

35. RUB. (2014). Annual Report. Thimphu 36. Soderbaum, J. (2017). Research and development - government, business and universities. Retrieved February 20, 2017, from ACIL

ALLEN Consulting: http://www.acilallen.com.au/sector/3/research-and-development-government-business-and-universities

37. Thomas Gilbert, S. K. (2012). Investor inattention and the market impact of summary statistics. Management Science, Special Issue on Behavioral Economucs and Finance, 58, 336-350.

38. Thomas, J. C. (2001). Equity premium as low as 3 percent? Evidence from analysts earnings forecasts for domestic and international stock

markets. Journal of Finance, 1629-1666. 39. Todor Stoilov, V. I. (2003). Portfolio Optimization of Investment Decisions on the Securities Market in Bulgaria. Bulgaria: CompSystech.

40. Wilcox, J. W. (1999). Investing By The Numbers. USA: Frank J. Fabozzi Associates.

41. Zvi Bodie, A. K. (1999). The Investment Environment. In A. K. Zvi Bodie, Investments (p. 3). US: Irwin/McGraw-Hill.

40.

Authors: Dr Trishu Sharma

Paper Title: Women and Media: An Analysis of Role of Women Journalist in Indian Media

363-367

Page 55: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Abstract: This research is conducted on five different Hindi news channels and five different Newspapers.

The purpose of this research was to know the representation of women journalist in print and television

media in the form of byline, anchor, reporter, voice-over artist and Piece to Camera. News being covered by

women journalist is also being analyzed on source based also. Content analysis method is used to conduct

this study. Journalists were also categorized on the basis of covering hard news and soft news also.

Keywords : Women Journalist, Representation of Women Journalist.

References

1. Kumar, K.J, (2002), Mass Communication in India, Jaico Publication.

2. Steiner, Linda, ”Gender in the Newsroom”, in Handbook of Journalism Studies, ed. Thomas Hanitzsch and Karin Wahl-Jorgensen (e-book, New York and London, 2009), p. 123, 126

3. Vaishali H.B 2015,” Changing Face of Women Journalists in Leading Kannada Television Channels: A Study”, International

Journal of Scientific Research, Volume : 4, Issue : 8, Aug 2015, pp 663-665, ISSN No 2277 – 8179 4. Jha Rama (1992). Women and The Indian Print Media: Portrayal & performance. Chanakya Publication.

5. Sharma K., Dr.Sanjeev, (2005), “Depiction of women in Indian media-A case of introspection for media planners” Samaj bigyan

shodh Patrica, Amroha, Vol.1, no.1 April-Sept. pp.32-36.

6. Tomar, Ranu in her seminar paper (2011). “Gender and Media: Status of women journalist in Hindi Print Media in India” presented

at University of Work, 19- ‘22 sept

41.

Authors: Sumeet Gill and Renu Saroha

Paper Title: Recognition of Text CAPTCHA by using Back Propagation Algorithm of Artificial Neural network

Abstract: Text-based CAPTCHA is a very simple type of CAPTCHA which are most widely used. It uses

only a group of characters. In this paper, we focus on how Text based CAPTCHA is recognized by machine

learning techniques. This paper proposed a method based on Back Propagation algorithm to identify the

Text based CAPTCHA. The proposed technique improves the security level of Text-based CAPTCHA

storage system by using the Back-propagation method of Artificial Neural Network. We used NNToolbox to

train the network in MATLAB software.

Keywords: Text-based CAPTCHA, Back-propagation Algorithm, Artificial Neural Networks.

References

1. Tomoka Azakami, Chihiro Shibata, Ryuya Uda, “Challenge of Deep Learning against CAPTCHA with

Amodal Completion and After-effects by Colors” 2016, 2157-0426.

2. Shailaja Tingre, Debajyoti Mukhopadhyay, “An Approach for Segmentation of Characters in

CAPTCHA”, ICCCA 2015,978-1-4799-8890.

3. Yu Hu1,2, Li Chen1,2*, Jun Cheng3 , “ A CAPTCHA recognition technology based on deep learning” IEEE

2018,978-1-5386.

4. Xiao Ling-Zi, ZHANG Yi-Chun , “ A Case Study of Text –Based CAPTCHA Attacks” ,IEEE 2012, 978-

0-7695.

5. Mengyuan Wang1, Yuliang Yang1, Mengyu Zhu2, Jiaming Liu3, “CAPTCHA Identification Based on

Convolution Neural Network”, IMCES 2018, 978-1-5386-1803.

6. Brian Cheung, “Convolutional Neural Networks Applied to Human Face Classification” International

Conference on Machine Learning and Application, 2012, 978-0-7695 .

7. Yanping Lv1,2, Feipeng Cai1,2, Dazhen Lin1,2*, Donglin Cao 1,2*, “Chinese Character CAPTCHA

Recognition Based on Convolution Neural Network”,IEEE 2016, 978-1-5090-0623.

8. Ye Wang, Yuanjiang Huang, Wu Zheng, Zhi Zhou, Debin Liu, Mi Lu “Combining convolutional neural

network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA” IEEE 2017,

978-1-5090-5320.

9. Mengyun Tang, Haichang Gao, Yang Zhang , Yi Liu, Ping Zhang, Ping Wang “ Research on Deep

Learning Techniques in Breaking Text –Based CAPTCHAs and Designing Image –Based CAPTCHA”,

IEEE Transaction on Information Forensics and Security, October-2018 Vol. 13 , No.-10.

10. Rafaqat Hussain , Hui Gao, Raiz Ahmed Shaikh, Shazia Parveen Soomro, “ Recognition Based

Segmentation of Connected Characters in Text Based CAPTCHAs” IEEE International Conference on

Communication Software and Networks, 2016, 978-1-5090-1781.

11. Tao Zhang1, Honglei Zheng2, Lele Zhang3, “ Verification CAPTCHA Based on Deep Learning”,

Proceeding of the 37th Chinese Control Conference “,July 25-27, 2018.

363-367

42.

Authors: Syahpawia,*, Amiur Nuruddinb, and Sri Sudiartic

Paper Title: Syirkah Amlak’s Implications in Building Community Economic Independence (Case Study in Meranti

Islands Regency, Riau Province)

Page 56: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Abstract. This research discusses Syirkah Amlak’s Implications in Building Community Economic

Independence in Meranti Islands Regency. Islam as the religion of rahmatan lil-‘alamin regulates all aspects

of the lives of its people. Syirkah Amlak is a maqasid syariah translation of property maintenance and an

alternative in solving problems that have occurred in society, where poverty is caused by various factors,

one of which is not having the capital to do business. The case that occurred in the Meranti Islands Regency

was that inheritance was used as capital in building a business of economic independence, so far the

community assumed that inheritance had to be divided based on the understanding of the meaning of the

verses in the Qur'an and the hadith of the Prophet. In addition, researchers want to see the implications of

syirkah amlak in building community economic independence from aspects of its Islamic principles. The

research method used is a qualitative approach (in-depth interviews), sources are carried out by

observation, interviews, documentation, history, and questionnaires. While analyzing the data the

researcher used descriptive analytic (analytic descriptive research). The results of this study found that the

implications of syirkah amlak in building the economic independence of the community have an impact on

increasing income, labor, education, religion and blessings / salvation (al-falah), where there are most

people who do syirkah amlak already able to develop industry and some again in the form of additional

gardens in the Meranti Islands Regency.

Keywords: Implications, syirkah amlak, economic independence..

1. Departemen Agama RI, Al-Quran Dan Terjemahannya, (Bandung: PT Diponogoro, 2014).

2. Acho-chi, C. 1998. “Sustainable self-development efforts in Cameroon grass fields.” Development in

Practice, 8(3).

3. Ahmad, Khurshid. Studies in Islamic Economics. (Leicester, U.K: The International Centre for Research

in Islamic Foundation, 1980).

4. Algaoud, Mervyn K. Lewis dan Lativa M. Islamic Banking. (Massachusetts: Edward Elgar, 2001).

5. al’Alim, Yusuf Hamid. al-Maqashid al-‘Ammah Li al-Syari’ah al-Islamiyah, (Horndon: al-Ma’had al-

‘Alami Li al-Fikiri al-Islamy, 1991).

6. Avilliani. Kemandirian Ekonomi. (UIN: Institute for Development of Economics and Finance. 2012).

7. Chapra, M. Umer (1985), Towards a Just Monetary Sistem. Terj. Ismail bin Omar. Kearah Sistem

Kewangan yang Adil. (Kuala Lumpur: Dewan Bahasa dan Pustaka, 1990).

8. Collins, W. A., Gleason, T., & Sesma, A. Jr., 1997, Internalization, Autonomy, and Relationships:

Development during Adolescence. dalam J. E. Grusec & L. Kuczynski (Eds.), Handbook of Parenting and

the Transmission of Values (New York: Wiley, 1997).

9. Fonchingong, C.C., dan Fonjong, Lotsmart. N. (2003). “The Concept of Self-Reliance in Community

Development Initiatives in The Cameroon Grassfields”. Nordic Journal of African Studies, Vol. 12(2).

10. Galtung, J. et al. (eds.). Self-Reliance: a Strategy for Development. (London: Bogle L’Ouverture

publications. 1980)

11. Gooneratne, W. and Mbilinyi, M. (eds.) 1992. “People’s Responses to the Economic Crisis in Eastern and

Southern Africa.” Reviving Local Self-Reliance. UNCRD, Japan.

12. Haroen, Nasrun. Figh Muamlah. (Jakarta: Gaya Media Pratama, 2000).

13. Hubeis, H.V.S. (2002). Tantangan dan Prospek Teknologi Informasi dan Komunikasi dalam Otonomi

Daerah. Dalam Pambudy, R., dan Adhi, A.K. (ed). Pemberdayaan Sumber Daya Manusia Menuju

Terwujudnya Masyarakat Madani, (Bogor: Pustaka Wirausaha Muda,tt).

14. Hyden, G. No Shortcuts to Progress: African Development Management in Perspective. (London:

Heinemann, 1983)

15. Idoma Kim, Muhammad Isma’il, “Self-Reliance: Key to Sustainable Rural Development in Nigeria”,

ARPN Journal of Science and Technology, VOL. 3, NO. 6, June 2013.

16. Ismail, Muhammad Syah. Falsafah Hukum Islam, (Jakarta: Bina Aksara, 1992).

17. al-Iwadhi, Rif’at Sayyid. Kitab al-Ummah fi al-Istishad al-Islamy al-Murtakaza al-Tauzi’ al-Istimar.

18. Kahf, Monzer. “Islamic Economic System – A Review” dalam Aidit Ghazali dan Syed Omar (ed),

Reading in The concept and Methodology of Islamic Economics. (Pataling Jaya: Pelanduk Publications,

1989).

19. Khalaf, Abdul Wahab. Mashadir al-Tasyri’ fi Ma la Nashsha Fiki, (Ttp: Ma’had al-Dirazah al-

A’rabiyah).

20. Khaldun, Abdur Rahman Ibn. Mugaddimah, (Ttp: Matbaah al-Azhariyah, 1348 H).

21. Mannan, M. A. Islamic Economics; Theory and Practice, (Cambridge: Houder and Stoughton Ltd, tt).

22. Mustaqim, Rizal. “Kemandirian Dan Pemberdayaan Ekonomi Berbasis Pesantren (Studi Atas Peran

Pondok Pesantren Al-Ittifaq Kecamatan Rancabali Kabupaten Bandung Terhadap Kemandirian Eknomi

Santri Dan Pemberdayaan Ekonomi Masyarakat Sekitarnya)”, dalam Jurnal Ekonomi Syari’ah Indonesia.

Volume I, No.2 Desember 2011.

23. Mu’tadin, Zainun (2002), Kemandirian Sebagai Kebutuhan Psikologis pada Remaja, http://www.e-

psikologi.com/epsi/search.asp, diakses tanggal 27 April 2017.

24. An-Nabahan, Faruq. Sistim Ekonomi Islam: Pilihan Setelah Kegagalan Sistim Kapitalis dan Sosialis,

363-367

Page 57: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

(Yogyakarta: UII Press, 2000). Cetakan Kedua.

25. Njoh, A. 2002. “Barriers to Community Participation in Development Planning: Lessons from the

Mutengene (Cameroon) Self-help Water Project.” Community Development Journal, 37(3).

26. Ojameruaye, E. “Strategies for Self-reliant Economic Development of Urhobo land: A Paper Presented at

the 5th Annual Conference of Urhobo Historical Society at PTI Conference Centre”. Effurun, Delta:

2004.

27. Pradja, Juhaya S. Ekonomi Syariah, (Bandung: Pustaka Setia, 2012).

28. Pronk, Jan. “Globalization: A Developmental Approach”, dalam Jan Nederveen Pieterse (ed), Global

Future, Shaping Globalization, (London: Zed Books, 2001).

29. al-Risuni, Ahmad. Nadhariyah al-Maqasid ‘Inda al-Imam al-Syatibi, (Virginia: The International Institute

of Islamic Thought, 1995).

30. Rofiq, Romdin A., A. Icep Fadlil Yani dan R.B. Widodo, Pemberdayaan Pesantren Menuju Kemandirian

dan Profesionalisme Santri dengan Metode Daurah Kebudayaan, (Yogyakarta: Pustaka Pesantren, 2005).

31. Sabiq, Sayyid. Figih Sunnah, Terj. Kamaluddin A. Marzuki, (Bandung: Al Ma’arif, 1988).

32. Saddiqi, Muhammad Nejatullah. Muslim Economic Thinking: A Survey of Contemporary Literature.

(Leicerter, United Kingdom: The Islamic Foundation, 1989).

33. ash Shawi, Abdullah al Mushlih dan Shalah. Fikih Ekonomi Keuangan Islam, terj. Abu Umar Basyir.

Judul asli: Ma ia Yasa’ut Tajiru Jahluhu, (Jakarta: Darul Haq, 2004).

34. Shomedran, (2016), “Pemberdayaan Partisipatif Dalam Membangun Kemandirian Ekonomi dan Perilaku

Warga Masyarakat (Studi Pada Bank Sampah Wargi Manglayang RT 01 RW 06 Kelurahan Palasari

Kecamatan Cibiru Bandung)”, http://ejournal.upi.edu/index.php/pls/article/view/3086, diakses: tanggal 5

Mei 2017.

35. Sumodiningrat, Gunawan. Pemberdayaan Masyarakat dan Jaring Pengamanan Sosial, (Yogyakarta:

Ghalia Indonesia, 1999).

43.

Authors: Aditya Tandon

Paper Title: Mélange of IoT and Ransomware

Abstract: The use of IoT devices are increasing rapidly. Since it integrates lots of devices, it provides lots

of benefits to the users. Large companies also have started using it for coordination between the people and

machines. However, Security is a major issue faced by IoT network. Trust is something that is necessary

between the devices, which means that the data is transmitted without any tests to the trusted devices. IoT

devices have very less security features since upgrades and patches are virtually non-existent. This makes it

vulnerable to various attacks like Ransomware. Hackers will simply be able to take control of an IoT device

and demand ransom for letting it go. This may get problematic especially in household devices. It is

necessary to identify a solution for this this since IoT is still in the budding stage. Hence this work will

analyse various available attacks in IoT and provide solutions to combat the ransomware.

Keywords: Internet of Things, Ransomware, Security, Network, Malware, Threats

References: 1. Tobias RJ. Wireless communication of real-time ultrasound data and control. In: In SPIE Medical Imaging

International Society for Optics and Photonics [Internet]. SPIE; 2015. Available from: http://sci-

hub.tw/10.1016/j.comnet.2017.09.003

2. Ahmed E, Yaqoob I, Gani A, Imran M, Guizani M. Internet-of-things-based smart environments: state of the art,

taxonomy, and open research challenges. IEEE Wirel Commun. 2016 Oct;23(5):10–6.

3. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of Things: A Survey on Enabling

Technologies, Protocols, and Applications. IEEE Commun Surv Tutorials. 2015;17(4):2347–76.

4. Lin D, Tang Y, Labeau F, Yao Y, Imran M, Vasilakos A V. Internet of Vehicles for E-Health Applications: A

Potential Game for Optimal Network Capacity. IEEE Syst J [Internet]. 2017 Sep;11(3):1888–96. Available from:

http://ieeexplore.ieee.org/document/7174983/

5. Ghosh AM, Halder D, Hossain SKA. Remote health monitoring system through IoT. In: 2016 5th International

Conference on Informatics, Electronics and Vision (ICIEV) [Internet]. IEEE; 2016. p. 921–6. Available from:

http://ieeexplore.ieee.org/document/7760135/

6. Khoi NM, Saguna S, Mitra K, Ahlund C. IReHMo: An efficient IoT-based remote health monitoring system for smart

regions. In: 2015 17th International Conference on E-health Networking, Application & Services (HealthCom) [Internet].

IEEE; 2015. p. 563–8. Available from: http://ieeexplore.ieee.org/document/7454565/

7. Perera C, Zaslavsky A, Christen P, Georgakopoulos D. Context Aware Computing for The Internet of Things: A

Survey. IEEE Commun Surv Tutorials [Internet]. 2014;16(1):414–54. Available from:

http://ieeexplore.ieee.org/document/6512846/

8. Sanduleac M, Chimirel CL, Eremia M, Toma L, Cristian C, Stanescu D. Unleashing Smart Cities efficient and

sustainable energy policies with IoT based Unbundled Smart Meters. In: 2016 IEEE International Conference on

Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech) [Internet].

IEEE; 2016. p. 112–7. Available from: http://ieeexplore.ieee.org/document/7737321/

9. Yaqoob I, Ahmed E, Rehman MH ur, Ahmed AIA, Al-garadi MA, Imran M, et al. The rise of ransomware and

emerging security challenges in the Internet of Things. Comput Networks [Internet]. 2017 Dec 24 [cited 2019 May

1];129:444–58. Available from: https://www.sciencedirect.com/science/article/abs/pii/S1389128617303468

Page 58: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

10. Wamala F. The ITU National Cybersecurity Strategy Guide [Internet]. ITU. 2011 [cited 2018 May 3]. Available

from: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf

11. Jain K. These Top 7 Brutal Cyber Attacks Prove “No One is Immune to Hacking” [Internet]. The Hacker News. 2015

[cited 2018 May 3]. Available from: https://thehackernews.com/2015/09/top-cyber-attacks-1.html

12. Lohrmann D. 2015: The Year Data Breaches Became Intimate [Internet]. Govtech. 2015 [cited 2019 May 3].

Available from: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/2015-the-year-data-breaches-became-

intimate.html

13. ENISA. ENISA Threat Landscape 2015 [Internet]. 2016 [cited 2019 May 3]. Available from:

https://www.enisa.europa.eu/publications/etl2015

14. Jing Q, Vasilakos A V., Wan J, Lu J, Qiu D. Security of the Internet of Things: perspectives and challenges. Wirel

Networks [Internet]. 2014 Nov 17;20(8):2481–501. Available from: http://link.springer.com/10.1007/s11276-014-0761-7

15. Pacheco J, Satam S, Hariri S, Grijalva C, Berkenbrock H. IoT Security Development Framework for building

trustworthy Smart car services. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI) [Internet]. IEEE;

2016. p. 237–42. Available from: http://ieeexplore.ieee.org/document/7745481/

16. Wen Q, Dong X, Zhang R. Application of dynamic variable cipher security certificate in Internet of Things. In: 2012

IEEE 2nd International Conference on Cloud Computing and Intelligence Systems [Internet]. IEEE; 2012. p. 1062–6.

Available from: http://ieeexplore.ieee.org/document/6664544/

17. Ketema G, Hoebeke J, Moerman I, Demeester P, Tao LS, Jara AJ. Efficiently Observing Internet of Things

Resources. In: 2012 IEEE International Conference on Green Computing and Communications [Internet]. IEEE; 2012. p.

446–9. Available from: http://ieeexplore.ieee.org/document/6468349/

18. Granjal J, Monteiro E, Sa Silva J. Security for the Internet of Things: A Survey of Existing Protocols and Open

Research Issues. IEEE Commun Surv Tutorials [Internet]. 2015;17(3):1294–312. Available from:

http://ieeexplore.ieee.org/document/7005393/

19. Zhao K, Ge L. A Survey on the Internet of Things Security. In: 2013 Ninth International Conference on

Computational Intelligence and Security [Internet]. IEEE; 2013. p. 663–7. Available from:

http://ieeexplore.ieee.org/document/6746513/

20. Yan Z, Zhang P, Vasilakos A V. A survey on trust management for Internet of Things. J Netw Comput Appl

[Internet]. 2014 Jun;42:120–34. Available from: https://linkinghub.elsevier.com/retrieve/pii/S1084804514000575

21. Alaba FA, Othman M, Hashem IAT, Alotaibi F. Internet of Things security: A survey. J Netw Comput Appl

[Internet]. 2017 Jun;88:10–28. Available from: https://linkinghub.elsevier.com/retrieve/pii/S1084804517301455

22. Weber RH. Internet of Things – New security and privacy challenges. Comput Law Secur Rev [Internet]. 2010

Jan;26(1):23–30. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0267364909001939

23. Suo H, Wan J, Zou C, Liu J. Security in the Internet of Things: A Review. In: 2012 International Conference on

Computer Science and Electronics Engineering [Internet]. IEEE; 2012. p. 648–51. Available from:

http://ieeexplore.ieee.org/document/6188257/

24. Roman R, Zhou J, Lopez J. On the features and challenges of security and privacy in distributed internet of things.

Comput Networks. 2013 Jul;57(10):2266–79.

25. Kumar JS, Patel DR. A Survey on Internet of Things: Security and Privacy Issues. Int J Comput Appl [Internet]. 2014

Mar 26;90(11):20–6. Available from: http://research.ijcaonline.org/volume90/number11/pxc3894454.pdf

26. Bertino E, Islam N. Botnets and Internet of Things Security. Computer (Long Beach Calif) [Internet]. 2017

Feb;50(2):76–9. Available from: http://ieeexplore.ieee.org/document/7842850/

27. Chen L, Thombre S, Jarvinen K, Lohan ES, Alen-Savikko A, Leppakoski H, et al. Robustness, Security and Privacy

in Location-Based Services for Future IoT: A Survey. IEEE Access [Internet]. 2017;5:8956–77. Available from:

http://ieeexplore.ieee.org/document/7903611/

28. Bradshaw S. Combatting Cyber Threats: CSIRTs and Fostering International Cooperation on Cybersecurity

[Internet]. GCIG. 2015 [cited 2019 May 3]. Available from: https://www.cigionline.org/publications/combatting-cyber-

threats-csirts-and-fostering-international-cooperation-cybersecurity

29. Donston-Miller D. The Internet Of Things Poses New Security Challenges [Internet]. Forbes. 2014 [cited 2019 May

3]. Available from: https://www.forbes.com/sites/sungardas/2014/02/25/the-internet-of-things-poses-new-security-

challenges/#276cf9062c6f

30. Davis G. Brace Yourselves: The ‘Perfect Security Storm’ is Coming [Internet]. 2015 [cited 2019 May 3]. Available

from: https://sci-hub.tw/10.1016/j.clsr.2016.07.002

31. Rezendes CJ, Stephenson WD. Cyber Security in the Internet of Things. 2013.

32. Lee J-H, Kim H. Security and privacy challenges in the internet of things [security and privacy matters]. IEEE

Consum Electron Mag [Internet]. 2017;6(3):134– 136. Available from: https://sci-hub.tw/10.1016/j.comnet.2017.09.003

33. Liu C, Yang C, Zhang X, Chen J. External integrity verification for outsourced big data in cloud and IoT: A big

picture. Futur Gener Comput Syst. 2015 Aug;49:58–67.

34. Gao M, Wang Q, Arafin MT, Lyu Y, Qu G. Approximate computing for low power and security in the internet of

things. Computer (Long Beach Calif) [Internet]. 2017;50(6):27–34. Available from:

https://ieeexplore.ieee.org/document/7945174

35. Salami S Al, Baek J, Salah K, Damiani E. Lightweight encryption for smart home,” in Availability, Reliability and

Security (ARES). In: 2016 11th International Conference on [Internet]. IEEE; 2016. p. 382–388. Available from:

https://ieeexplore.ieee.org/document/7784596

36. Raza S, Shafagh H, Hewage K, Hummen R, Voigt T. Lithe: Lightweight Secure CoAP for the Internet of Things.

IEEE Sens J [Internet]. 2013 Oct;13(10):3711–20. Available from: http://ieeexplore.ieee.org/document/6576185/

37. Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, et al. Secure signature-based authenticated key

establishment scheme for future iot applications. IEEE Access [Internet]. 2017;5:3028–3043. Available from: https://sci-

hub.tw/10.1016/j.comnet.2017.09.003

38. Ko H, Jin J, Keoh SL. Secure service virtualization in iot by dynamic service dependency verification. IEEE Internet

Things J [Internet]. 2016;3(6):1006–1014. Available from: https://ieeexplore.ieee.org/document/7439733

39. Cheng C, Lu R, Petzoldt A, Takagi T. Securing the internet of things in a quantum world. IEEE Commun Mag

[Internet]. 2017;55(2):116–120. Available from: https://sci-hub.tw/10.1016/j.comnet.2017.09.003

40. Alkeem E Al, Yeun CY, Zemerly MJ. Security and privacy framework for ubiquitous healthcare IoT devices. In:

2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) [Internet]. London, UK:

IEEE; 2016. Available from: https://ieeexplore.ieee.org/document/7412059

Page 59: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

41. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in internet of things: The road ahead.

Comput Networks [Internet]. 2015;76:146–164. Available from:

https://www.sciencedirect.com/science/article/abs/pii/S1389128614003971

42. Tian C, Chen X, Guo D, Sun J, Liu L, Hong J. Analysis and design of security in internet of things. In: In 2015 8th

International Conference on Biomedical Engineering and Informatics (BMEI) [Internet]. Shenyang, China: IEEE; 2015. p.

678–684. Available from: https://ieeexplore.ieee.org/document/7401589

43. Premnath SN, Haas ZJ. Security and privacy in the internet-of-things under time-and-budget-limited adversary

model. IEEE Wirel Commun Lett [Internet]. 2015;4(3):277–280. Available from:

https://ieeexplore.ieee.org/document/7054433

44. Chen R, Bao F, Guo J. Trust-based service management for social internet of things systems. IEEE Trans Dependable

Secur Comput [Internet]. 2016;13(6):684–696. Available from: https://ieeexplore.ieee.org/document/7097037

45. Gu L, Jingpei W, Bin S. Trust management mechanism for internet of things. China Commun [Internet].

2014;11(2):148–156. Available from: https://ieeexplore.ieee.org/document/6821746

46. Nassi B, Shamir A, Elovici Y. Oops!... i think i scanned a malware [Internet]. 2017 [cited 2018 May 3]. Available

from: https://www.semanticscholar.org/paper/Oops!...I-think-I-scanned-a-malware-Nassi-

Shamir/ee538c0da7709c8d376749e74fc2451c70fb8d90

47. Bertino E, Islam N. Botnets and Internet of Things Security. Computer (Long Beach Calif). 2017 Feb;50(2):76–9.

48. Richardson R, North M. Ransomware: Evolution, mitigation and prevention. Int Manag Rev [Internet].

2017;13(1):10–21. Available from: http://scholarspress.us/journals/IMR/pdf/IMR-1-2017. pdf/IMR-v13n1art2.pdf

49. Bugeja J, Jacobsson A, Davidsson P. An analysis of malicious threat agents for the smart connected home. In: 2017

IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)

[Internet]. IEEE; 2017. p. 557–62. Available from: https://ieeexplore.ieee.org/document/7917623/

50. Kavya D. Ransomware of things (rot). Fuzzy Syst [Internet]. 2017;9(2):29–32. Available from: http://sci-

hub.tw/10.1016/j.comnet.2017.09.003

51. Adat V, Gupta BB. Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun Syst

[Internet]. 2018 Mar 13;67(3):423–41. Available from: http://link.springer.com/10.1007/s11235-017-0345-9

52. D’Orazio CJ, Choo K-KR, Yang LT. Data Exfiltration From Internet of Things Devices: iOS Devices as Case

Studies. IEEE Internet Things J [Internet]. 2017 Apr;4(2):524–35. Available from:

http://ieeexplore.ieee.org/document/7470257/

53. Ring T. Connected cars–the next target for hackers. Netw Secur [Internet]. 2015;(11):11–16. Available from:

http://sci-hub.tw/10.1016/j.comnet.2017.09.003

54. Gostev A, Unuchek R, Garnaeva M, Makrushin D, Ivanov A. IT Threat Evolution in Q1 2016 [Internet]. Kaspersky

Lab. 2016 [cited 2019 May 23]. Available from: https://securelist.com/it-threat-evolution-in-q1-2016/74640/

55. Gonzalez D, Hayajneh T. Detection and prevention of crypto-ransomware. In: 2017 IEEE 8th Annual Ubiquitous

Computing, Electronics and Mobile Communication Conference (UEMCON) [Internet]. IEEE; 2017. p. 472–8. Available

from: http://ieeexplore.ieee.org/document/8249052/

56. Kong JH, Ang L-M, Seng KP. A comprehensive survey of modern symmetric cryptographic solutions for resource

constrained environments. J Netw Comput Appl [Internet]. 2015;49:15–50. Available from:

https://www.sciencedirect.com/science/article/pii/S1084804514002136?via%3Dihub

57. Shim KA. A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks. IEEE Commun Surv

Tutorials [Internet]. 2016;18(1):577–601. Available from: https://sci-

hub.se/https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS016740481830004X

58. Ahmadian MM, Shahriari HR, Ghaffarian SM. Connection-monitor and connection-breaker: A novel approach for

prevention and detection of high survivable ransomwares. In: Paper presented at the 12th International ISC Conference on

Information Security and Cryptology, ISCISC 2015 [Internet]. 2015. p. 79–84. Available from: https://sci-

hub.se/https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS016740481830004X

59. Al-rimy BAS, Maarof MA, Shaid SZM. Ransomware threat success factors, taxonomy, and countermeasures: A

survey and research directions. Comput Secur [Internet]. 2018 May;74:144–66. Available from:

https://linkinghub.elsevier.com/retrieve/pii/S016740481830004X

60. Savage K, Coogan P, Lau H. The evolution of ransomware [Internet]. 2015 [cited 2019 May 18]. Available from:

https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-

ransomware.pdf

61. Cheng S-M, Chen P-Y, Lin C-C, Hsiao H-C. Traffic-Aware Patching for Cyber Security in Mobile IoT. IEEE

Commun Mag [Internet]. 2017;55(7):29–35. Available from: http://ieeexplore.ieee.org/document/7981520/

62. Cabaj K, Gregorczyk M, Mazurczyk W. Software-defined networking-based crypto ransomware detection using

HTTP traffic characteristics. Comput Electr Eng [Internet]. 2018 Feb;66:353–68. Available from:

https://linkinghub.elsevier.com/retrieve/pii/S0045790617333542

63. Castilho SD, Godoy EP, Castilho TWL, Salmen AF. Proposed model to implement high-level Information Security in

Internet of Things. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) [Internet].

IEEE; 2017. p. 165–70. Available from: http://ieeexplore.ieee.org/document/7946425/

64. Stewart CE, Vasu AM, Keller E. Communityguard: A crowdsourced home cyber-security system. In: Proceedings of

the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization - SDN-

NFVSec ’17 [Internet]. New York, New York, USA: ACM Press; 2017. p. 1–6. Available from:

http://dl.acm.org/citation.cfm?doid=3040992.3040997

65. Solangi ZA, Solangi YA, Chandio S, bt. S. Abd. Aziz M, bin Hamzah MS, Shah A. The future of data privacy and

security concerns in Internet of Things. In: 2018 IEEE International Conference on Innovative Research and Development

(ICIRD) [Internet]. IEEE; 2018. p. 1–4. Available from: https://ieeexplore.ieee.org/document/8376320/

66. Hayajneh T, Mohd B, Imran M, Almashaqbeh G, Vasilakos A. Secure Authentication for Remote Patient Monitoring

with Wireless Medical Sensor Networks. Sensors [Internet]. 2016 Mar 24;16(4):424. Available from:

http://www.mdpi.com/1424-8220/16/4/424

67. Shu Z, Wan J, Li D, Lin J, Vasilakos A V., Imran M. Security in Software-Defined Networking: Threats and

Countermeasures. Mob Networks Appl [Internet]. 2016 Oct 12;21(5):764–76. Available from:

http://link.springer.com/10.1007/s11036-016-0676-x

68. Rizzardi A, Sicari S, Miorandi D, Coen-Porisini A. AUPS: An Open Source AUthenticated Publish/Subscribe system

for the Internet of Things. Inf Syst [Internet]. 2016 Dec;62:29–41. Available from:

Page 60: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

http://linkinghub.elsevier.com/retrieve/pii/S030643791630237X

69. Tao M, Zuo J, Liu Z, Castiglione A, Palmieri F. Multi-layer cloud architectural model and ontology-based security

service framework for IoT-based smart homes. Futur Gener Comput Syst [Internet]. 2018 Jan;78:1040–51. Available

from: https://linkinghub.elsevier.com/retrieve/pii/S0167739X16305775

70. Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, et al. End-to-end security scheme for

mobility enabled healthcare Internet of Things. Futur Gener Comput Syst [Internet]. 2016 Nov;64:108–24. Available

from: https://linkinghub.elsevier.com/retrieve/pii/S0167739X16300334

71. Sicari S, Rizzardi A, Miorandi D, Cappiello C, Coen-Porisini A. A secure and quality-aware prototypical architecture

for the Internet of Things. Inf Syst [Internet]. 2016 Jun;58:43–55. Available from:

https://linkinghub.elsevier.com/retrieve/pii/S0306437916300072

72. Perumal S, Norwawi NM, Raman V. Internet of Things(IoT) digital forensic investigation model: Top-down forensic

approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications

(ICDIPC) [Internet]. IEEE; 2015. p. 19–23. Available from: http://ieeexplore.ieee.org/document/7323000/

73. Arias O, Wurm J, Hoang K, Jin Y. Privacy and Security in Internet of Things and Wearable Devices. IEEE Trans

Multi-Scale Comput Syst [Internet]. 2015 Apr 1;1(2):99–109. Available from:

http://ieeexplore.ieee.org/document/7321811/

74. Ali Z, Imran M, Alsulaiman M. An Automatic Digital Audio Authentication/Forensics System. IEEE Access

[Internet]. 2017;5:2994–3007. Available from: http://ieeexplore.ieee.org/document/7864411/

75. Imran M, Ali Z, Bakhsh ST, Akram S. Blind Detection of Copy-Move Forgery in Digital Audio Forensics. IEEE

Access [Internet]. 2017;5:12843–55. Available from: http://ieeexplore.ieee.org/document/7954589/

76. Sundaram BV, Ramnath M, Prasanth M, Sundaram VJ. Encryption and hash based security in Internet of Things. In:

2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN) [Internet]. IEEE;

2015. p. 1–6. Available from: http://ieeexplore.ieee.org/document/7219926/

77. Santos GL dos, Guimaraes VT, da Cunha Rodrigues G, Granville LZ, Tarouco LMR. A DTLS-based security

architecture for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC) [Internet].

IEEE; 2015. p. 809–15. Available from: http://ieeexplore.ieee.org/document/7405613/

78. Alcon J-AS, Lopez L, Martinez J-F, Castillejo P. Automated determination of security services to ensure personal

data protection in the Internet of Things applications. In: Third International Conference on Innovative Computing

Technology (INTECH 2013) [Internet]. IEEE; 2013. p. 71–6. Available from:

http://ieeexplore.ieee.org/document/6653704/

79. Raza S, Seitz L, Sitenkov D, Selander G. S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment

for the Internet of Things. IEEE Trans Autom Sci Eng [Internet]. 2016 Jul;13(3):1270–80. Available from:

http://ieeexplore.ieee.org/document/7373695/

80. Hernandez-Ramos JL, Bernabe JB, Skarmeta A. ARMY: architecture for a secure and privacy-aware lifecycle of

smart objects in the internet of my things. IEEE Commun Mag [Internet]. 2016 Sep;54(9):28–35. Available from:

http://ieeexplore.ieee.org/document/7565269/

81. Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R. Learning internet-of-things security hands-on. IEEE Secur Priv

[Internet]. 2016;14(1):37–46. Available from: https://ieeexplore.ieee.org/document/7397713

82. Xiaohui X. Study on security problems and key technologies of the internet of things. In: In Computational and

Information Sciences (ICCIS), 2013 Fifth International Conference on [Internet]. Shiyang, China: IEEE; 2013. p. 407–

410. Available from: https://ieeexplore.ieee.org/document/6643029

83. Kozlov D, Veijalainen J, Ali Y. Security and privacy threats in iot architectures. In: In Proceedings of the 7th

International Conference on Body Area Networks [Internet]. Oslo: ICST; 2012. p. 256–262. Available from:

https://dl.acm.org/citation.cfm?id=2442750

84. Ning H, Liu H, Yang LT. Cyberentity security in the internet of things. Computer (Long Beach Calif) [Internet].

2013;46(4):46–53. Available from: https://ieeexplore.ieee.org/document/6475947

85. Kim D-Y. Cyber security issues imposed on nuclear power plants. Ann Nucl Energy [Internet]. 2014;65:141– 143.

Available from: https://www.sciencedirect.com/science/article/pii/S0306454913005781

86. Li S, Xu L Da, Zhao S. The internet of things: a survey. Inf Syst Front [Internet]. 2015;17(2):243. Available from:

https://link.springer.com/article/10.1007/s10796-014-9492-7

87. Bostani H, Sheikhan M. Hybrid of anomaly-based and specification-based IDS for Internet of Things using

unsupervised OPF based on MapReduce approach. Comput Commun [Internet]. 2017 Jan;98:52–71. Available from:

https://linkinghub.elsevier.com/retrieve/pii/S0140366416306387

88. Savola RM, Abie H, Sihvonen M. Towards metrics-driven adaptive security management in e-health iot applications.

In: In Proceedings of the 7th International Conference on Body Area Networks ICST (Institute for Computer Sciences,

Social-Informatics and Telecommunications Engineering), 2012 [Internet]. ICST; 2012. p. 276–281. Available from:

https://dl.acm.org/citation.cfm?id=2442753

89. Kanuparthi A, Karri R, Addepalli S. Hardware and embedded security in the context of internet of things. In: In

Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles [Internet]. M New York:

ACM; 2013. p. 61–64. Available from: https://dl.acm.org/citation.cfm?id=2517976

44.

Authors: Aditya Tandon

Paper Title: An Empirical Analysis of Using Blockchain Technology with Internet of Things and its Ap-plication

Abstract. Blockchain technology uses the crypto-graphic technique to create expanding list of data

records called blocks. Along with transaction and timestamp data, each block holds a hash value ob-tained

using cryptographic technique. Blockchain gains importance for its decentralized data transaction and

authorization without the need for third-party intervention. Although, it is mostly used in Finance sector

these days, due to its inherent ability to protect data it can be applied to every field of computation

especially in fields where data transaction is volumi-nous. Internet of Things (IoT) is one such area where it

involves collection, transfer and processing of real time data from objects, humans and sensors to auto-mate

363-367

Page 61: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

various tasks. Hence, this paper reviews the blockchain technology, and how it can be coupled with IoT to

overcome the privacy and security issues. This paper first systematically introduces the concept of

blockchain technology, its applications along with the need for IoT devices and its implementation. Fi-nally,

it discusses the blockchain based IoT (BIoT) its architecture, advantages, challenges in implementa-tion.

Keywords: Blockchain, IoT, Review, BIoT, Applica-tions

References: 1. T. M. Fernández-Caramés, P. Fraga-Lamas.: A Review on the Use of Blockchain for the Internet of Things. IEEE Access (6),

32979-33001 (2018). https://doi.org/10.1109/ACCESS.2018.2842685

2. Ioannis Andrea, Chrysostomos Chrysostomou, George Hadjichristofi. Internet of Things: Security vulnerabilities and challenges. In: IEEE Symposium on Computers and Communication (ISCC), pp. 180-187. IEEE, Larnaca, Cyprus (2015).

https://doi.org/10.1109/iscc.2015.7405513

3. Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, Dechao Qiu.: Security of the Internet of Things: Perspec-tives and Challenges. Wireless Networks 20(8), 2481–2501 (2014). https://doi.org/10.1007/s11276-014-0761-7

4. Heng Hou.: The Application of Blockchain Technology in E-Government in China. In: 26th International Con-ference on Computer

Communication and Networks (ICCCN), pp. 1-4. IEEE, Vancouver, BC, Canada (2017). https://doi.org/10.1109/ICCCN.2017.8038519 5. Abid Sultan, Muhammad Sheraz Arshad Malik, Azhar Mushtaq.: Internet of Things Security Issues and Their Solutions with

Blockchain Technology Characteristics: A Systematic Literature Review. Am J Compt Sci Inform Technol 6(3), 1-5 (2018).

https://doi.org/10.21767/2349-3917.100027 6. Arshdeep Bahga, Vijay Madisetti.: Blockchain Applica-tions: A Hands-On Approach. 1st edn. VPT, Delhi (2017).

7. Daniel Drescher.: Blockchain Basics: A Non-Technical Introduction in 25 Steps. 1st edn. Apress, Germany (2017).

8. Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, Huaimin Wang.: An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In: IEEE International Congress on Big Data (BigData Congress), pp. 557-564. IEEE, Honolulu, HI, USA

(2017). https://doi.org/10.1109/BigDataCongress.2017.85

9. Svein Ølnes.: Beyond Bitcoin Enabling Smart Govern-ment Using Blockchain Technology. In: H.J. Scholl et al. (eds.) EGOV 2016, LNCS 9820, pp. 253–264. Springer, Switzerland (2016).

10. Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, Xiwei Xu.: Comparing Block-chain and Cloud

Services for Business Process Execution. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 257-260. IEEE, Gothenburg, Sweden (2017). https://doi.org/10.1109/ICSA.2017.44

11. Lakshmi Siva Sankar, M. Sindhu, M. Sethumadhavan.: Survey of consensus protocols on blockchain applica-tions. In: 4th

International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 250-255. IEEE, Coimbatore, India (2017). https://doi.org/10.1109/ICACCS.2017.8014672

12. Quoc Khanh Nguye.: Blockchain - A Financial Technol-ogy for Future Sustainable Development. In: 3rd Inter-national

Conference on Green Technology and Sustain-able Development (GTSD), pp. 51-54. IEEE, Kaohsiung, Taiwan (2016). https://doi.org/10.1109/GTSD.2016.22

13. Ashiq Anjum, Manu Sporny, Alan Sill.: Blockchain Standards for Compliance and Trust. IEEE Cloud Com-puting 4(4), 84-90

(2017). https://doi.org/10.1109/MCC.2017.3791019

14. Coin Sutra Homepage, https://coinsutra.com/different-types-blockchains/, last accessed 2019/03/26.

15. Xin Wang, Libo Feng, Hui Zhang , Chan Lyu, Li Wang, Yue You.: Human Resource Information Management Model based on

Blockchain Technology. In: IEEE Sym-posium on Service-Oriented System Engineering (SOSE), pp. 168-173. IEEE, San Francisco, CA, USA (2017). https://doi.org/10.1109/SOSE.2017.34

16. Qun Lin, Hongyang Yan, Zhengan Huang, Wenbin Chen, Jian Shen, Yi Tang .: An ID-Based Linearly Homomor-phic Signature

Scheme and Its Application in Block-chain. IEEE Access (6), 20632 - 20640 (2018). https://doi.org/10.1109/ACCESS.2018.2809426 17. Seyoung Huh, Sangrae Cho, Soohyung Kim.: Managing IoT devices using blockchain platform. In: 19th Interna-tional Conference

on Advanced Communication Tech-nology (ICACT), pp. 464-467. IEEE, Bongpyeong, South Korea (2017).

https://doi.org/10.23919/ICACT.2017.7890132 18. Block Chain Homepage, https://blockchain.wtf/what-the-faq/blockchain-cryptocurrency-difference/, last ac-cessed 2019/03/26.

19. The Motley Fool. https://www.fool.com/investing/general/2015/02/06/17-internet-of-things-statistics-you-dont-know.aspx, last ac-

cessed 2019/03/26. 20. New Gen Apps. https://www.newgenapps.com/blog/iot-statistics-internet-of-things-future-research-data, last ac-cessed 2019/03/26.

21. Forbes. https://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers-market-estimates-and-

forecasts/#1050cf63b919, last accessed 2019/03/26. 22. Intel. https://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html, last accessed 2019/03/26.

23. Arshdeep Bahga, Vijay Madisetti.: Internet of Things: A Hands-On Approach. 1st edn. Universities Press, Delhi (2014).

24. Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash.: Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys & Tu-torials 17(4), 2347 - 2376 (2015).

https://doi.org/10.1109/COMST.2015.2444095 25. Zheng, S., Apthorpe, N., Chetty, M. and Feamster, N.: User Perceptions of Smart Home IoT Privacy. In: Pro-ceedings of the ACM

on Human-Computer Interaction. ACM, 2(CSCW), pp. 1-20. IEEE, New York, NY, USA (2018). https://doi.org/10.1145/3274469

26. Siboni, S., Shabtai, A., Tippenhauer, N. O., Lee, J., Elovici, Y.: Advanced Security Testbed Framework for Wearable IoT Devices. In: CM Transactions on Internet Technolo-gy, pp. 1-25. ACM, New York, NY, USA (2018). https://doi.org/10.1145/2981546

27. Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese.: Future scenarios and challenges for securi-ty and privacy. In:

IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), pp. 28-36. IEEE, Bologna, Italy (2016). https://doi.org/10.1109/RTSI.2016.7740625

28. Meredydd Williams, Jason R. C. Nurse, Sadie Creese.: Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-

Things. In: 15th Annual Conference on Privacy, Security and Trust (PST), pp. 181-190. Calgary, AB, Canada (2017). https://doi.org/10.1109/PST.2017.00029

29. Ching K. W., Singh M. M.: Wearable Technology Devic-es Security and Privacy Vulnerability Analysis. Interna-tional Journal of

Network Security & Its Applications (IJNSA) 8(3), 25-32 (2018). https://doi.org/10.5121/ijnsa.2016.8302 30. Wencheng Sun, Zhiping Cai, Fang Liu, Shengqun Fang, Guoyan Wang.: A survey of data mining technology on electronic medical

records. In: 19th International Con-ference on e-Health Networking, Applications and Ser-vices (Healthcom), pp. 205-220. Dalian, China

(2017). https://doi.org/10.1109/ HealthCom.2017.8210774 31. The Federal Trade Commission. https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-

november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf, last accessed 2019/03/26.

32. Seyoung Huh, Sangrae Cho, Soohyung Kim.: Managing IoT devices using blockchain platform. In: 19th Interna-tional Conference on Advanced Communication Tech-nology (ICACT), pp. 464-467. IEEE, Bongpyeong, South Korea (2017).

https://doi.org/10.23919/ICACT.2017.7890132

33. Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gaurav-aram.: Blockchain for IoT security and privacy: The case study of a smart home. In: International Confer-ence on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 235-240. IEEE,

Kona, HI, USA (2017). https://doi.org/10.1109/PERCOMW.2017.7917634

34. Mayra Samaniego, Ralph Deters.: Blockchain as a Ser-vice for IoT. In: International Conference on Internet of Things (iThings) and IEEE Green Computing and Com-munications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart

Page 62: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Data (SmartData), pp. 433-436. IEEE, Chengdu, China (2017). https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102

35. Oscar Novo.: Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet of Things Journal 5(2), 1184 - 1195 (2018). https://doi.org/10.1109/JIOT.2018.2812239

36. Ali Dorri, Salil S. Kanhere, Raja Jurdak.: Towards an Op-timized BlockChain for IoT. In: Second International Conference on

Internet-of-Things Design and Implemen-tation (IoTDI), pp. 173-178. IEEE, Pittsburgh, PA, USA (2017).

https://doi.org/10.1145/3054977.3055003

37. Chun-Feng Liao, Sheng-Wen Bao, Ching-Ju Cheng, Kung Chen.: On design issues and architectural styles for blockchain-driven

IoT services. In: International Con-ference on Consumer Electronics - Taiwan (ICCE-TW), pp. 351-353. IEEE, Taipei, Taiwan (2017). https://doi.org/10.1109/ICCE-China.2017.7991140

38. Cheng Li, Liang-Jie Zhang.: A Blockchain Based New Secure Multi-Layer Network Model for Internet of Things. In: International

Congress on Internet of Things (ICIOT), pp. 33-41. IEEE, Taipei, Taiwan (2017). https://doi.org/10.1109/IEEE.ICIOT.2017.34 39. Alexandru Stanciu.: Blockchain Based Distributed Con-trol System for Edge Computing. In: 21st International Conference on

Control Systems and Computer Science (CSCS), pp. 667-671. IEEE, Bucharest, Romania (2017). https://doi.org/10.1109/CSCS.2017.102

40. Elena Karafiloski, Anastas Mishev.: Blockchain solutions for big data challenges: A literature review. In: 17th In-ternational Conference on Smart Technologies (EUROCON), pp. 763-768. IEEE, Ohrid, Macedoniaa (2017).

https://doi.org/10.1109/EUROCON.2017.8011213

41. Ana Reyna, Cristian & Martín, Jaime Chen, Enrique Sol-er, Manuel Díaz.: BOn blockchain and its integration with IoT- Challenges and opportunities. Future Genera-tion Computer Systems 88(1), 173-190 (2018). https://doi.org/10.1016/j.future.2018.05.046

42. Chain of Things. https://www.chainofthings.com/, last accessed 2019/03/26.

43. Trusted IoT Alliance. https://www.trusted-iot.org/, last accessed 2019/03/26. 44. Postcapes. https://www.postscapes.com/blockchains-and-the-internet-of-things/, last accessed 2019/03/26.

45.

Authors: Aditya Tandon

Paper Title: Challenges of Integrating Blockchain with Internet of Things

Abstract— There is no doubt that Internet of Things (IoT) and blockchain technology will a major

impact in the automated futuristic world. Even though the usage of IoT is increasing rapidly, it is riddled

with scalability, security, privacy and integrity issues. Even though blockchain was initially created for

managing cryptocurrencies, its decentralised nature, higher security, integrity and privacy has led to being

integrated with IoT in order to improve it. There are multiple challenges arising from this integration which

increases the complexities. It is necessary to study these challenges involved in this integration before

carrying it out. Hence, this paper has carried out a systematic study of the various challenges involved in

IoT individually and also the advantages and challenges of integrating it with the blockchain system.

Keywords— Blockchain, IoT, challenges, security, integration

References:

[1] N. Kshetri, “Can Blockchain Strengthen the Internet of Things?,” IT Prof., vol. 19, no. 4, pp. 68–72, 2017.

[2] H. Orman, “Blockchain: the Emperors New PKI?,” IEEE Internet Comput., vol. 22, no. 2, pp. 23–28, Mar. 2018.

[3] Satoshi Nakamoto, “Bitcoin Whitepaper,” Satoshi Nakamoto, 2019. .

[4] R. Henry, A. Herzberg, and A. Kate, “Blockchain Access Privacy: Challenges and Directions,” IEEE Secur. Priv., vol. 16, no. 4, pp.

38–45, Jul. 2018.

[5] V. Buterin, “A Next Generation Smart Contract and Decentralized Application Platform,” Ethereum, 2014. .

[6] G. Wood, “Ethereum: A Secure Decentralised Generalised Transaction Ledger,” gavwood, 2017. .

[7] Cardano, “What Is Cardano?,” cardano, 2019. .

[8] F. Casino, T. K. Dasaklis, and C. Patsakis, “A systematic literature review of blockchain-based applications: Current status,

classification and open issues,” Telemat. Informatics, vol. 36, pp. 55–81, Mar. 2019.

[9] X. Wang et al., “Survey on blockchain for Internet of Things,” Comput. Commun., vol. 136, pp. 10–29, Feb. 2019.

[10] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito, “Blockchain and IoT Integration: A Systematic Survey,” Sensors, vol.

18, no. 8, p. 2575, Aug. 2018.

[11] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. .

[12] Coindesk, “How do Bitcoin Transactions Work?,” Coindesk, 2018. .

[13] O. Wyman, “Blockchain in capital markets,” 2016. .

[14] M. Swan, “Blockchain,” O’Reilly Media, 2015. .

[15] F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies,” IEEE Commun.

Surv. Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.

[16] Bitcoin, “Bitcoin Developer Guide,” Bitcoin, 2017. .

[17] R. C. Merkle, “Protocols for Public Key Cryptosystems,” in 1980 IEEE Symposium on Security and Privacy, 1980, pp. 122–122.

363-367

Page 63: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

[18] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies: A Comprehensive

Introduction. Princeton: Princeton University Press, 2016.

[19] M. Apostolaki, A. Zohar, and L. Vanbever, “Hijacking Bitcoin: Routing Attacks on Cryptocurrencies,” in 2017 IEEE Symposium on

Security and Privacy (SP), 2017, pp. 375–392.

[20] W. Mougayar, The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. New Jersey: John

Wiley and Sons, 2016.

[21] M. Iansiti and K. R. Lakhani, “The truth about blockchain,” Harv. Bus. Rev., vol. 95, no. 1, pp. 118–127, 2017.

[22] Y. Lu, “The blockchain: State-of-the-art and research challenges,” J. Ind. Inf. Integr., Apr. 2019.

[23] D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, “Internet of things security: A top-down survey,” Comput. Networks, vol. 141, pp.

199–221, Aug. 2018.

[24] N. M. Kumar and P. K. Mallick, “Blockchain technology for security issues and challenges in IoT,” Procedia Comput. Sci., vol. 132,

pp. 1815–1823, 2018.

[25] Fabric, “Join GitHub today,” GitHub, Inc, 2019. .

[26] Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kondoz, “Privacy-preserving blockchain based IoT ecosystem

using attribute-based encryption,” in 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems

(ANTS), 2017, pp. 1–6.

[27] A. Dorri, S. Kanhere, and R. Jurdak, “Towards an Optimized BlockChain for IoT,” in 2017 IEEE/ACM Second International

Conference on Internet-of-Things Design and Implementation (IoTDI), 2017.

[28] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,”

in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2017, pp.

618–623.

[29] G. Yang and C. Li, “A Design of Blockchain-Based Architecture for the Security of Electronic Health Record (EHR) Systems,” in

2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2018, pp. 261–265.

[30] L. Mertz, “(Block) Chain Reaction: A Blockchain Revolution Sweeps into Health Care, Offering the Possibility for a Much-Needed

Data Solution,” IEEE Pulse, vol. 9, no. 3, pp. 4–7, May 2018.

[31] D. Cohen, S. Keller, G. Hayes, D. Dorr, J. Ash, and D. Sittig, “Integrating patient-generated health data into clinical care settings or

clinical decision-making: Lessons learned from project HealthDesign,” JMIR Hum Factors, 2016.

[32] A. E. Chung et al., “Harnessing person-generated health data to accelerate patient-centered outcomes research: the Crohn’s and

Colitis Foundation of America PCORnet Patient Powered Research Network (CCFA Partners),” J. Am. Med. Informatics Assoc., vol.

23, no. 3, pp. 485–490, May 2016.

[33] E. Joffe et al., “Optimized dual threshold entity resolution for electronic health record databases--training set size and active

learning,” AMIA ... Annu. Symp. proceedings. AMIA Symp., vol. 2013, pp. 721–30, 2013.

[34] W. J. Gordon and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,”

Comput. Struct. Biotechnol. J., vol. 16, pp. 224–230, 2018.

[35] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A Survey on Enabling Technologies,

Protocols, and Applications,” IEEE Commun. Surv. Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.

[36] D. Evans, “The internet of things: How the next evolution of the internet is changing everything,” Cisco, 2011. .

[37] S. Sicari, A. Rizzardi, D. Miorandi, and A. Coen-Porisini, “Internet of Things: Security in the Keys,” in Proceedings of the 12th ACM

Symposium on QoS and Security for Wireless and Mobile Networks - Q2SWinet ’16, 2016, pp. 129–133.

[38] Internet Society, “The Internet of Things: An Overview: Understanding the Issues and Challenges of a More Connected World,”

Internet Society, 2015. .

[39] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain and its integration with IoT. Challenges and opportunities,”

Futur. Gener. Comput. Syst., vol. 88, pp. 173–190, Nov. 2018.

[40] M. Díaz, C. Martín, and B. Rubio, “State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud

computing,” J. Netw. Comput. Appl., vol. 67, pp. 99–117, May 2016.

Page 64: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

[41] J. C. Buzby and T. Roberts, “The Economics of Enteric Infections: Human Foodborne Disease Costs,” Gastroenterology, vol. 136,

no. 6, pp. 1851–1862, May 2009.

[42] H. Malviya, “How Blockchain will Defend IOT,” SSRN, 2016. .

[43] P. Veena, S. Panikkar, S. Nair, and P. Brody, “Empowering the edge-practical insights on a decentralized internet of things,” 2015.

[44] S. Gan, “An IoT simulator in NS3 and a key-based authentication architecture for IoT devices using blockchain,” Kanpur, 2017.

[45] Blockchain of Things, “The Ultimate Blockchain Technology,” 2017. .

[46] Filament, “Filaments’ blockchain technology creates new value for today’s businesses,” Filament, 2019. .

[47] Modum, “Next Generation Supply Chain Automation and Intelligence: Trusted digital ecosystems powered by IoT Sensing and

blockchain,” 2017. .

[48] G. Prisco, “Slock, it to Introduce Smart Locks Linked to Smart Ethereum Contracts, Decentralize the Sharing Economy,” BTC, 2019.

.

[49] M. Samaniego and R. Deters, “Hosting Virtual IoT Resources on Edge-Hosts with Blockchain,” in 2016 IEEE International

Conference on Computer and Information Technology (CIT), 2016, pp. 116–119.

[50] LO3Energy, “Reshaping The Energy Future,” 2018. .

[51] Aigang, “Android device dataset,” 2017. .

[52] Mybit, “Leaders in Distributing Wealth,” 2017. .

[53] M. Aazam and E.-N. Huh, “Fog Computing and Smart Gateway Based Communication for Cloud of Things,” in 2014 International

Conference on Future Internet of Things and Cloud, 2014, pp. 464–470.

[54] Ethembedded, “Ethereum Computer Built On Embedded Devices,” Ethembedded, 2017. .

[55] Raspnode, “DIY Raspberry Pi Cryptocurrency Node,” Raspnode, 2017. .

[56] K. Wüst and A. Gervais, “Do you need a blockchain?,” IACR Cryptol. EPrint Arch., 2017.

[57] Trusted IoT Alliance, “Securing IoT Products With Blockchain,” 2017. .

[58] Bitmain, “Ant Router R1-LTC The WiFi router that mines Litecoin,” Bitmain, 2017. .

[59] Ethraspbian, “Ethraspbian custom Image for NANOPC-T4,” 2017. .

[60] I. Eyal, A. E. Gencer, E. G. Sirer, and R. van Renesse, “Bitcoin-NG: A Scalable Blockchain Protocol,” in 13th USENIX Symposium

on Networked Systems Design and Implementation (NSDI ’16) is sponsored by USENIX, 2016, pp. 1–16.

[61] R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges,”

Futur. Gener. Comput. Syst., vol. 78, pp. 680–698, Jan. 2018.

[62] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput.

Networks, vol. 57, no. 10, pp. 2266–2279, Jul. 2013.

[63] J. Lopez, R. Rios, F. Bao, and G. Wang, “Evolving privacy: From sensors to the Internet of Things,” Futur. Gener. Comput. Syst.,

vol. 75, pp. 46–57, Oct. 2017.

[64] M. Banerjee, J. Lee, and K.-K. R. Choo, “A blockchain future for internet of things security: a position paper,” Digit. Commun.

Networks, vol. 4, no. 3, pp. 149–160, Aug. 2018.

[65] I. Makhdoom, M. Abolhasan, H. Abbas, and W. Ni, “Blockchain’s adoption in IoT: The challenges, and a way forward,” J. Netw.

Comput. Appl., vol. 125, pp. 251–279, Jan. 2019.

[66] L. Touati, Y. Challal, and A. Bouabdallah, “C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of

Things,” in 2014 International Conference on Advanced Networking Distributed Systems and Applications, 2014, pp. 64–69.

[67] N. Oualha and K. T. Nguyen, “Lightweight Attribute-Based Encryption for the Internet of Things,” in 2016 25th International

Conference on Computer Communication and Networks (ICCCN), 2016, pp. 1–6.

[68] F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CP-ABE With Constant-Size Keys for Lightweight Devices,” IEEE

Trans. Inf. Forensics Secur., vol. 9, no. 5, pp. 763–771, May 2014.

[69] X. Yao, Z. Chen, and Y. Tian, “A lightweight attribute-based encryption scheme for the Internet of Things,” Futur. Gener. Comput.

Syst., vol. 49, pp. 104–112, Aug. 2015.

[70] J. Su, D. Cao, B. Zhao, X. Wang, and I. You, “ePASS: An expressive attribute-based signature scheme with privacy and an

Page 65: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

unforgeability guarantee for the Internet of Things,” Futur. Gener. Comput. Syst., vol. 33, pp. 11–18, Apr. 2014.

[71] D. Thatmann, S. Zickau, A. Forster, and A. Kupper, “Applying Attribute-Based Encryption on Publish Subscribe Messaging Patterns

for the Internet of Things,” in 2015 IEEE International Conference on Data Science and Data Intensive Systems, 2015, pp. 556–563.

[72] W. Chen, “An IBE-based security scheme on Internet of Things,” in 2012 IEEE 2nd International Conference on Cloud Computing

and Intelligence Systems, 2012, pp. 1046–1049.

[73] Y. Mao, J. Li, M.-R. Chen, J. Liu, C. Xie, and Y. Zhan, “Fully secure fuzzy identity-based encryption for secure IoT

communications,” Comput. Stand. Interfaces, vol. 44, pp. 117–121, Feb. 2016.

[74] D. Evans and D. M. Eyers, “Efficient Data Tagging for Managing Privacy in the Internet of Things,” in 2012 IEEE International

Conference on Green Computing and Communications, 2012, pp. 244–248.

[75] R. Zhang, Y. Zhang, and K. Ren, “Distributed Privacy-Preserving Access Control in Sensor Networks,” IEEE Trans. Parallel

Distrib. Syst., vol. 23, no. 8, pp. 1427–1438, Aug. 2012.

[76] A. Alcaide, E. Palomar, J. Montero-Castillo, and A. Ribagorda, “Anonymous authentication for privacy-preserving IoT target-driven

applications,” Comput. Secur., vol. 37, pp. 111–123, Sep. 2013.

[77] X. Huang, R. Fu, B. Chen, and T. Zhang, “User interactive internet of things privacy preserved access control,” in in: 2012

International Conference for Internet Technology And Secured Transactions, 2012, pp. 597–602.

[78] A. F. Skarmeta, J. L. Hernandez-Ramos, and M. V. Moreno, “A decentralized approach for security and privacy challenges in the

Internet of Things,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014, pp. 67–72.

[79] S. Tonyali, O. Cakmak, K. Akkaya, M. M. E. A. Mahmoud, and I. Guvenc, “Secure Data Obfuscation Scheme to Enable Privacy-

Preserving State Estimation in Smart Grid AMI Networks,” IEEE Internet Things J., vol. 3, no. 5, pp. 709–719, Oct. 2016.

[80] Y. Maleh, A. Ezzati, and M. Belaissaoui, “DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things,” in

Proceedings of the International Conference on Big Data and Advanced Wireless Technologies - BDAW ’16, 2016, pp. 1–7.

[81] P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, “Denial-of-Service detection in 6LoWPAN based Internet of Things,” in

2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, pp.

600–607.

[82] F. M. de Almeida, A. de R. Ribeir, E. . Moreno, and C. A. Montesco, “Performance evaluation of an artificial neural network

multilayer perceptron with limited weights for detecting denial of service attack on internet of things,” in AICT 2016 : The Twelfth

Advanced International Conference on Telecommunications, 2016.

[83] P. Machaka, A. McDonald, F. Nelwamondo, and A. Bagula, “Using the Cumulative Sum Algorithm Against Distributed Denial of

Service Attacks in Internet of Things,” in ICCASA 2015: Context-Aware Systems and Applications, Springer, 2016, pp. 62–72.

[84] D. Shreenivas, S. Raza, and T. Voigt, “Intrusion Detection in the RPL-connected 6LoWPAN Networks,” in Proceedings of the 3rd

ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS ’17, 2017, pp. 31–38.

[85] T. Hardjono and N. Smith, “Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains,” in Proceedings

of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS ’16, 2016, pp. 29–36.

[86] K. Gaurav, P. Goyal, V. Agrawal, and S. Rao, “Iot transaction security,” in 8th International Conference on the Internet of Things,

2015.

[87] S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, “World of Empowered IoT Users,” in 2016 IEEE First International

Conference on Internet-of-Things Design and Implementation (IoTDI), 2016, pp. 13–24.

[88] E. Kokoris-Kogias, L. Gasser, I. Khoffi, P. Jovanovic, N. Gailly, and B. Ford, “Managing Identities Using Blockchains and CoSi,”

2016. .

[89] K. Biswas and V. Muthukkumarasamy, “Securing Smart Cities Using Blockchain Technology,” in 2016 IEEE 18th International

Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd

International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016, pp. 1392–1393.

[90] O. Flauzac, C. Gonzalez, A. Hachani, and F. Nolot, “SDN Based Architecture for IoT and Improvement of the Security,” in 2015

IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, 2015, pp. 688–693.

[91] P. Bull, R. Austin, E. Popov, M. Sharma, and R. Watson, “Flow Based Security for IoT Devices Using an SDN Gateway,” in 2016

Page 66: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 2016, pp. 157–163.

[92] C. Vandana, “Security improvement in iot based on software defined networking,” Int. J. Sci. Eng. Technol ogy Res., vol. 5, no. 1, pp.

291–295, 2016.

[93] C. Gonzalez, S. M. Charfadine, O. Flauzac, and F. Nolot, “SDN-based security framework for the IoT in distributed grid,” in 2016

International Multidisciplinary Conference on Computer and Energy Science (SpliTech), 2016, pp. 1–5.

[94] P. Ruckebusch, E. De Poorter, C. Fortuna, and I. Moerman, “GITAR: Generic extension for Internet-of-Things ARchitectures

enabling dynamic updates of network and application modules,” Ad Hoc Networks, vol. 36, pp. 127–151, Jan. 2016.

[95] A. Taherkordi, F. Loiret, R. Rouvoy, and F. Eliassen, “Optimizing Sensor Network Reprogramming via In-situ Reconfigurable

Components,” ACM Trans. Sens. Networks, vol. 9, no. 2, pp. 1–38, 2013.

[96] M. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener. Comput. Syst., 2018.

[97] C. Fernandez-Gago, F. Moyano, and J. Lopez, “Modelling trust dynamics in the Internet of Things,” Inf. Sci. (Ny)., vol. 396, pp. 72–

82, Aug. 2017.

[98] C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, and J. Chen, “MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree

Based Secure Public Auditing for Dynamic Big Data Storage on Cloud,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2609–2622, Sep.

2015.

[99] C. Liu, C. Yang, X. Zhang, and J. Chen, “External integrity verification for outsourced big data in cloud and IoT: A big picture,”

Futur. Gener. Comput. Syst., vol. 49, pp. 58–67, Aug. 2015.

[100] C. Wang, Q. Wang, and K. Ren, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM,

2010 Proceedings IEEE, 2010.

[101] V. Sapovadia, “Legal Issues in Cryptocurrency,” in Handbook of Digital Currency, Elsevier, 2015, pp. 253–266.

[102] R. Böhme, N. Christin, B. Edelman, and T. Moore, “Bitcoin: Economics, Technology, and Governance,” J. Econ. Perspect., vol. 29,

no. 2, pp. 213–238, May 2015.

[103] R. Anderson, “Making Bitcoin Legal (Transcript of Discussion),” in Cambridge International Workshop on Security Protocols,

Springer, 2018, pp. 254–265.

[104] A. Khanna, “Information Technology Act, 2000: International Perspective with special reference to Bitcoin,” Natl. J. Cyber Secur.

Law, vol. 1, no. 1, 2018.

[105] R. Dorbala, O. Gautam, S. Pullabhatla, and G. N. P. V Babu, “The Orphaned Status of Cryptocurrencies in India,” ZENITH Int. J.

Multidiscip. Res., vol. 8, no. 10, pp. 364–374, 2018.

46.

Authors: Anika Zafiah M. Rus, Nur Munirah Abdullah, M. F. L. Abdullah

Paper Title: Segmented Phase of Ultraviolet (UV) Curable Thermoset Polyurethanes-Graphite (TPU-G) Composites

Abstract: Segmented thermoset polymeric materials properties mainly classified through its carbonyl

hydrogen bonding. The addition of graphite particle loading in polymeric materials tailored the functional

characteristic of the composites. Therefore, the carbonyl hydrogen bonding in the hard segments of the

synthesized segmented ultraviolet (UV) curable thermoset polyurethanes-graphite (TPU-G) composites was

identified. This composites based green polymer incorporated with varying graphite particles loading were

prepared through slip casting method which cure upon UV light. These result in an enhancement of the

carbonyl hydrogen bonding which tribute to degree of phase separation (DPS %) in the TPU-G composites

ranged from 10-20%, as compared to that in the pure TPU. In addition, the spectroscopy detects the

formation of carbonyl hydrogen groups within the TPU-G composites although they are prone to chain

scission and undergo photo oxidation subjected to ultraviolet (UV) curing. Upon UV curing, higher graphite

weight loading (TPU-G20, TPU-G25 and TPU-G30 composites), shows higher and stable DPS% value,

attribute to soft segment- soft segment and hard segment- hard segment establishment. Therefore, the

graphite particles dominantly absorb the incident radiation instead of thermoset polyurethane without

changing its based.

Index Terms: Thermoset polyurethane, graphite, segmented phase, ultraviolet curing, carbonyl hydrogen index.

References:

363-367

Page 67: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

[1] S. Li, C. Xu, W. Yang, Q. Tang, Thermoplastic Polyurethanes Stemming From Castor Oil : Green Synthesis And Their Application In

Wood Bonding, Coatings. 7 (2017) 10.

[2] M. Kurańska, U. Cabulis, M. Auguścik, A. Prociak, J. Ryszkowska, M. Kirpluks, Bio-Based Polyurethane-Polyisocyanurate Composites

With An Intumescent Flame Retardant, Polym. Degrad. Stab. 127 (2015).

[3] H. Kim, Y. Miura, C.W. Macosko, Graphene/Polyurethane Nanocomposites For Improved Gas Barrier And Electrical Conductivity, Chem.

Mater. 22 (2010) 3441–3450.

[4] E. Sancaktar, L. Bai, Electrically Conductive Epoxy Adhesives, Polymers (Basel). 3 (2011) 427–466.

[5] T.F. Garrison, M.R. Kessler, R.C. Larock, Effects Of Unsaturation And Different Ring-Opening Methods On The Properties Of Vegetable

Oil-Based Polyurethane Coatings, Polymer (Guildf). 55 (2014) 1004–1011. Doi:10.1016/J.Polymer.2014.01.014.

[6] C. Zhang, T.F. Garrison, S.A. Madbouly, M.R. Kessler, Progress In Polymer Science Recent Advances In Vegetable Oil-Based Polymers

And Their Composites, Prog. Polym. Sci. 71 (2017) 91–143.

[7] Y. Zhang, W. Li, W. Wang, Rsc Advances Pu / Pmma Composites Synthesized By Reaction- Induced Phase Separation : A General

Approach To Achieve A Shape Memory E Ff Ect †, Rsc Adv. 7 (2017) 33701–33707.

[8] A.Z.M. Rus, N.M. Abdullah, M.F.L. Abdullah, M.I.F. Idris, Graphite/Bio-Based Epoxy Composites: Structural, Optical And Electrical

Properties, Appl. Mech. Mater. 799–800 (2015) 153–157.

[9] A.Z.M. Rus, N.M. Abdullah, M.F.L. Abdullah, Interconnected Interface Enhanced Electrical Properties Of Graphite In Bio-Based Epoxy

From Insulating To Conductor Composites, Indian J. Sci. Technol. 8 (2015) 8–12.

[10] A.Z.M. Rus, N.M. Abdullah, M.F.L. Abdullah, M.I.F. Idris, Graphite/ Bio-Based Epoxy Composites: The Mechanical Properties Interface,

Appl. Mech. Mater. 799–800 (2015) 115–119.

[11] N.M. Abdullah, M.F.L. Abdullah, Mechanical Reinforcement Of Conductive Graphite / Biopolymer Thin Film Composite, Arpn J. Eng.

Appl. Sci. 10 (2015) 9772–9775.

[12] N.M. Abdullah, A.Z.M. Rus, M.F.L. Abdullah, Enhancement Of Graphite Functionality In Renewable Polymer Composite Properties, Int.

J. Eng. Technol. 7 (2018) 215–220.

[13] N. Munirah, A. Zafiah, M. Rus, M.F.L. Abdullah, Synergistic Influence Of Graphite On Biopolymer Composites Properties, J. Teknol. 77

(2015) 11–19.

[14] N.M. Abdullah, M.S. Kamarudin, A.Z.M. Rus, M.F.L. Abdullah, Preparation Of Conductive Polymer Graphite ( Pg ) Composites, Iop

Conf. Ser. Mater. Sci. Eng. 226 (2017).

[15] A.Z.M. Rus, N. Munirah Abdullah, M.F.L. Abdullah, Mechanical Behavior Of Ultra Violet (Uv) Curable Renewable Polymer/Graphite

(Pg), Indian J. Sci. Technol. 9 (2016) 1–4.

[16] A. Syafiq, A. Hazmi, Understanding Intrinsic Plasticizer In Vegetable Oil-Based Polyurethane Elastomer As Enhanced Biomaterial, J.

Therm. Anal. Calorim. (2017).

[17] K. Liu, B. He, L. Qian, J. Li, Conducting Graphite / Cellulose Composite Film As A Candidate For Chemical Vapor-Sensing Material,

Bioresources. 9 (2014) 5279–5289.

[18] D. Cai, K. Yusoh, M. Song, The Mechanical Properties And Morphology Of A Graphite Oxide Nanoplatelet/Polyurethane Composite,

Nanotechnology. 20 (2009) 85712.

[19] J. Vega-Baudrit, S.M. Carballo, L. De Adhesión, U. De Alicante, C. Rica, Thermoplastic Polyurethanes-Fumed Silica Composites :

Influence Of Nco / Oh In The Study Of Thermal And Rheological Properties And Morphological Characteristics, Thermoplast. - Compos.

Mater. (2012) 12–24.

[20] T. Xu, Uv-Curable Hybrid Polyurethanes, Master Of Science, 2014.

[21] S.I. Khan, A Study On Graphene Based Nanocomposite Coatings Subjected To Uv Degradation, Master Of Engineering, 2007.

[22] N. Rajagopalan, A.S. Khanna, Effect Of Methyltrimethoxy Silane Modification On Yellowing Of Epoxy Coating On Uv ( B ) Exposure, J.

Coatings. 2014 (2014) 7.

47.

Authors: Hanani Abdul Wahab, Anika Zafiah M. Rus, M. F. L. Abdullah, Nur Munirah Abdullah

Paper Title: Sound Absorption Coefficient and Water Content Responses in Acoustic Analysis Based on

Renewable Polyurethane Foam Composites

Abstract: In physiological health, negative effects are felt when unwanted noise is present. Given the

negative effects of the unwanted noise, it become important to examine how environmentally-friendly and

efficient sound absorbing materials could be developed. Some of the materials associated with acoustic

absorption properties entail polymer foams. Particularly, the foams aid in controlling noise. The central

purpose of this study was to examine renewable polymer (PU) foam composites’ aspects of moisture content

and acoustical properties. Four major parameters that were evaluated included the thickness of the sample,

the type of filler, the ratio of the fillers, and the nature of the monomer. A design of experiment (DoE)

technique was employed. To prepare the PUs foams, 28 mm and 100 mm were selected as diameters for the

cylindrical shapes on focus. Plotting the main effects was achieved through ANOVA, upon which variations

in the role and performance of the selected input factors were discerned. From the findings, it was

established that when bio-epoxy (B) was used in conjunction with renewable PU foams, the moisture content

was greater than the case involving petroleum based PU foam synthesis. Hence, renewable PU foam

composite is seen to be realized at 0.9, especially if the filler ratios and size are increased; with the

experimental conditions set at 3 kHz. Overall, the study established that the renewable Pus’ state of sound

absorption exhibits good agreement with the case of synthetic PU foam.

368-374

Page 68: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Index Terms: Acoustic; ANOVA; DoE; PU foams; Renewable

References: [1] L. Peng, B. Song, J. Wang, and D. Wang, “Mechanic and acoustic properties of the sound-absorbing material made from natural fiber and

polyester,” Adv. Mater. Sci. Eng., 2015.

[2] E. M. Samsudin, L. H. Ismail, and A. A. Kadir, “A review on physical factors influencing absorption performance of fibrous sound absorption material from natural fibers,” ARPN Journal of Engineering and Applied Sciences. 2016.

[3] S. Liu, W. Chen, and Y. Zhang, “Design optimization of porous fibrous material for maximizing absorption of sounds under set frequency bands,” Appl. Acoust., 2014.

[4] L. Egab, X. Wang, and M. Fard, “Acoustical characterisation of porous sound absorbing materials: a review,” Int. J. Veh. Noise Vib., 2014.

[5] S. Chen, X. Lu, T. Wang, and Z. Zhang, “Preparation and characterization of urea-formaldehyde resin/reactive kaolinite composites,” Particuology, 2016.

[6] S. Amares, E. Sujatmika, T. W. Hong, R. Durairaj, and H. S. H. B. Hamid, “A Review: Characteristics of Noise Absorption Material,” in Journal of Physics: Conference Series, 2017.

[7] R. Gayathri and R. Vasanthakumari, “Nanomaterials in PU Foam for Enhanced Sound Absorption at Low Frequency Region,” Adv. Mater. Res., 2014.

[8] J. G. Gwon, S. K. Kim, and J. H. Kim, “Sound absorption behavior of flexible polyurethane foams with distinct cellular structures,” Quat. Int., 2015.

[9] S. Adnan et al., “Development of Flexible Polyurethane Nanostructured Biocomposite Foams Derived from Palm Olein-Based Polyol,” Adv. Mater. Sci. Eng., 2016.

[10] S. Kormin, A. Z. M. Rus, and M. S. M. Azahari, “Preparation of polyurethane foams using liquefied oil palm mesocarp fibre (OPMF) and renewable monomer from waste cooking oil,” in AIP Conference Proceedings, 2017.

[11] A. Z. M. Rus, M. S. M. Azahari, S. Kormin, L. B. Soon, M. T. Zaliran, and M. L. F. Ahraz Sadrina, “Hybrid waste filler filled bio-polymer foam composites for sound absorbent materials,” in AIP Conference Proceedings, 2017.

[12] E. Papa et al., “Porosity and insulating properties of silica-fume based foams,” Energy Build., 2016.

[13] M. N. A. A. Nordin, L. M. Wan, M. H. Zainulabidin, A. S. M. Kassim, and A. M. Aripin, “Research finding in natural fibers sound absorbing material,” ARPN J. Eng. Appl. Sci., 2016.

[14] Y. Jiang, S. Chen, D. Wang, and J. Chen, “Multi-Objective Optimization of Acoustical Properties of PU-Bamboo-Chips Foam Composites,” Arch. Acoust., 2017.

[15] M. Barad, “Design of Experiments (DOE)—A Valuable Multi-Purpose Methodology,” Appl. Math., 2014.

[16] P. M. Murray, F. Bellany, L. Benhamou, D. K. Bučar, A. B. Tabor, and T. D. Sheppard, “The application of design of experiments (DoE) reaction optimisation and solvent selection in the development of new synthetic chemistry,” Organic and Biomolecular Chemistry. 2016.

[17] J. Y. Lau, M. H. T. Nguyen, W. Liang, and K. K. Tan, “Application of design of experiments to feature selection in ventilation tube applicator,” in IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society, 2015.

[18] Abd Wahab, Hanani, Anika Zafiah Mohd Rus, & M. Taufiq Zaliran. "Design of Experiment for In-Situ Synthesis of Waste Vegetable Oils and Synthetic Based Polyurethane (PU) Foam Composites." International Journal of Engineering & Technology [Online], 7.4.34 (2018): 413-416. Web. 7 Mar. 2019

[19] N. N. M. Hassan and A. Z. M. Rus, “Acoustic performance of green polymer foam from renewable resources after UV exposure,” Int. J. Automot. Mech. Eng., 2014.

[20] S. Bell, N. Boese, R. Bosma, M. Buzoianu, P. Carroll, V. Fernicola, E. Georgin, M. Heinonen, A. Kentved, C. Melvad and J. Nielsen, METefnet: developments in metrology for moisture in materials. 2015.

[21] N. Q. A. Adnan and A. Z. M. Rus, “Sound Absorption of Laminated BiopolymerFoam and Epoxy Foam,” Key Eng. Mater., vol. 594–595, pp. 291–295, 2014.

48.

Authors: Nesreen Ibrahim Awada, Fadillah Ismail

Paper Title: Happiness in the Workplace

Abstract: Recently, the United Arab Emirates (UAE) government has worked towards establishing a

national program for happiness and wellbeing. Workplace-related happiness has become a topic of interest

in today’s employment world. Administrators need to look at the ingredients within the recipe to address

happiness and happiness in an organization. However, in the Middle East Region, there is still the absence

of an empirical Islamic happiness scale which also encapsulates the spiritual and emotional wellness

element, employee happiness and performance in one scale. Also, empirical studies on employee spiritual

and emotional happiness at work are still lacking. Thus, the researcher will explore these ideas in greater

detail This paper reviews what is known about the definition, causes and consequences of happiness at

work, The interest in happiness has also extended to workplace experiences. drawing also on insights from

the expanding positive psychology literature on happiness in general. Happiness at work includes, but is far

more than, job satisfaction. A comprehensive measure of individual-level happiness might include work

engagement, job satisfaction, and effective organizational commitment. We will be focusing on happiness

Importance and Impact of Happiness at Work by highlighting the Advantages & Disadvantages.

Index Terms: Employee, Happiness, Management, Workplace

References:

169. Al Maktoum, M. B. R. (2017). Reflections on happiness & positivity. Dubai, UAE: Explorer Publishing.

170. Bader, H. A., Hashim, I. H., & Zaharim, N. M. (2013). Workplace friendships among bank employees in

Eastern Libya. Digest of Middle East Studies, 22(1), 94-116.

363-367

Page 69: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

171. Dimitrov, D. (2012). Sources of meaningfulness in the workplace: A study in the US hospitality sector.

European Journal of Training and Development, 36(2/3), 351-371.

172. Hosie, P. J., & Sevastos, P. (2009). Does the “happy-productive worker” thesis apply to managers?

International Journal of Workplace Health Management, 2(2), 131-160.

173. Joo, B. K., & Lee, I. (2017). Workplace happiness: Work engagement, career satisfaction, and subjective

well-being. Evidence-based HRM: A Global Forum for Empirical Scholarship, 5(2), 206-221.

174. Liu, C. H., & Robertson, P. J. (2011). Spirituality in the workplace: Theory and measurement. Journal of

Management Inquiry, 20(1), 35-50.

175. Pawar, S. B. (2008). Two approaches to workplace spirituality facilitation: A comparison and

implications. Leadership & Organization Development Journal, 29(6), 544-567.

176. Petchsawang, P., & Duchon, D. (2009). Measuring workplace spirituality in an Asian context. Human

Resource Development International, 12(4), 459-468.

177. Samnani, A. K., & Singh, P. (2014). Performance-enhancing compensation practices and employee

productivity: The role of workplace bullying. Human Resource Management Review, 24(1), 5-16.

178. Thompson, G. M., & Goodale, J. C. (2006). Variable employee productivity in workforce scheduling.

European Journal of Operational Research, 170(2), 376-390.

49.

Authors:

Fedoseyeva Natalya Anatolyevna *, Sanova Zoya Sergeevna , Myshkina Maya Sergeevna, Kiselev

Leonid Yuryevich, Kiselyov Vladimir Leonidovich

Paper Title: Animals Breeding Efficiency According to the Phenotype of their Offspring

Abstract: The paper aims to identify the best animals with the optimal variant of selection traits in dairy

cattle breeding by studying the breeding and genetic parameters (M, m, σ, Cv, r) of the basic dairy and

reproductive traits of individuals and genetic groups, which make it possible to comprehensively assess the

breeding efficiency of animals according to the phenotype of their offspring. The paper justifies

characteristics of the seed bulls fixed for the breeding stock, and proposes basic principles of selection. The

range of evaluated traits was expanded – from milk productivity and reproductive qualities to health

indicators (longevity, somatic cell content in milk) and estimate of the animal body type (exterior). The

correlation coefficient (g) between fat and protein was not standard: when selecting animals with a high

content of protein in milk, only in 20% of cases the selected cows have a high level of fat.

Keywords: Breed; Genetic groups; Genetic potential; Genetic progress through selection; Productivity

References: 1. Amerkhanov Kh A (2017). Status and development of dairy cattle breeding in the Russian Federation [Состояние и развитие

молочного скотоводства в Российской Федерации]. Dairy and Beef Cattle Breeding 1: 2-5. (in Russian)

2. Beever D E (2006). The impact of controlled nutrition during the dry period on dairy cow health, fertility and performance. Animal

Reproduction Science 96: 212-226.

3. Gaworski M & Rocha A G F (2016). Effect of management practices on time spent by cows in waiting area before milking. In

Engineering for Rural Development: 15th International Scientific Conference Proceedings: Vol. 15. Jelgavas Tipogrāfija, Jelgava, Latvia, pp.

1300-1304.

4. Hayes B (2013). 1000 Bull genomes Consortium. The 1000 Bull Genomes project-toward genomic selection from whole

genomesequence data in dairy and beef cattle. In: B Hayes, H D Daetwyler. R Fries & B Guldbrandtsen (Eds), Proceedings of Plant and Animal Genome XXI Conference. Wageningen, San Diego, USA, W150.

5. Igna V, Moje A, Mircu C, Roman M, Ghiurca C, Casalean D, & Cernescu H (2010). The influence of some environmental factors and age on semen production of fleckvieh bulls. Lucrari Stiinlifice Medicina Veterinara XLIII (2): 57-63

6. Lawlor T (2012, January 21). Haplotypes impacting fertility. In: Holstein USA 2012. All Breeds Convention, Syracuse, NY, USA, pp. 1-41.

7. Phillips C J C (1993). Cattle Behaviour. Farming Press Books, Ipswich, England.

8. Rodriguez S M, Florins A, Gillet N, de Brogniez A, Sanchez-Alcara M-T., Boxus M, Boulanger F, Gutierrez G, Trono K, Alvarez I,

Vagnoni L, & Willems L (2011). Preventive and therapeutic strategies for bovine leukemia virus: Lessons for HTLV. Viruses 3: 1210-1248.

9. Saksa, E. I. (2018). The effectiveness of the use of bulls, evaluated by different methods, in the improvement of highly productive

herds. Dairy and Beef Cattle Breeding 1: 5-9.

10. Saragusty J (2011). Current progress in oocyte and embryo cryopreservation by slow freezing and vitrification. Reproduction 141:

1-19.

11. Selex Program, Database of the Dairy Cattle (2018). In: Regional Center for Information Support of Livestock Breeding in the

Leningrad Region "PLINOR", Informational and Analytical System "SELEX". Retrieved from http://plinor.spb.ru/index.php?l=0&p=3

12. Sørensen L P, Bjerring M & Løvensdahl P (2016). Monitoring individual cow udder health in automated milking systems using online somatic cell counts. Journal of Dairy Science 99 (1): 608-620.

13. Statistical indicators (2012). Breeding value estimation of milk production traits with test-day model. Manual CRV, Chapter E7.

363-367

Page 70: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Retrieved on February, 2019 from https://www.crv4all-international.com/wp-content/uploads/2016/03/E-7-milk-production.pdf

14. Stelvagen K (2001). Effect of milking frequency on mammary functioning and shape of the lactation curve. Journal of Dairy

Science 84: 204-211.

15. Vajta G (2012). Vitrification in human and domestic animal embryology: work in progress. Reproduction, Fertility and

Development 25: 719-727.

50.

Authors: Dr. Alka Maurya

Paper Title: 'Solve for India, Solve for the World’: Strategies of India to lead with new age disruptive technologies

Abstract: New age technologies like Blockchain, Artificial Intelligence, Data Analytics, Internet of Things,

Cloud Computing, Data Analytics, also known as Industry 4.0 has become integral part of business

organizations in developed countries. India along with other developing countries is also in the race to adopt

these new disruptive technologies to bring in more efficiencies in the business processes. Though India was

late to get into the 4IR wagon but it is trying hard to catch up with the major players globally.

Establishment of Center for the Fourth Industrial Revolution, by World Economic Forum is a major

achievement of the Government of India to catch up with the other countries globally, but there are several

challenges which needs to addressed simultaneously, This paper focus on the level of adoption of these

technologies in India, future prospects and the challenges being faced in successful adoption of these

technologies.

Keywords: Industry 4.0, Blockchain, Artificial Intelligence, Data Analytics, Internet of Things, World Economic

Forum

References:

1. What is the fourth industrial revolution?, (2016), Available at,

https://www.weforum.org/agenda/2016/01/what-is-the-fourth-industrial-revolution/

2. Venkatesan Ravi, Is India ready for the fourth industrial revolution? Live Mint, (September 2016), Available

at, https://www.livemint.com/Opinion/nWG88na6rgg72p07vV5tLN/Is-India-ready-for-the-fourth-industrial-

revolution.html

3. Shah Vijay, Industry 4.0: How India can build for the future, (2019), Available at,

http://www.forbesindia.com/blog/technology/industry-4-0-how-india-can-build-for-the-future/

4. Blockchain Market Shares, Market Strategies, and Market Forecasts, 2018 to 2024, WinterGreen Research,

Inc., (2018), Available at, https://www.ibm.com/downloads/cas/PPRR983X

5. Stewart Duncan, 3D printing growth accelerates again, (December 2018), Available at,

https://www2.deloitte.com/insights/us/en/industry/technology/technology-media-and-telecom-predictions/3d-

printing-market.html

6. Joshi Mansi, 3D printing in manufacturing: Where does India stand?, (April 2018), Available at,

https://www.computerworld.in/feature/3d-printing-manufacturing-where-does-india-stand

7. Prasad Rachita, 3D printing makes slow but steady inroads into industry, (June 2018), Available at,

economictimes.indiatimes.com/articleshow/64706881.cms?utm_source=contentofinterest&utm_medium=text

&utm_campaign=cppst

8. Executive Summary World Robotics 2018 Industrial Robots, Available at,

https://ifr.org/downloads/press2018/Executive_Summary_WR_2018_Industrial_Robots.pdf

9. How India is harnessing technology to lead the Fourth Industrial Revolution, (October 2018), World

Economic Forum, Available at

a. https://www.weforum.org/agenda/2018/10/how-india-is-harnessing-technology-to-lead-the-fourth-industrial-

revolution/

10. WEF launches Center for the Fourth Industrial Revolution in India, (October 2018), Times of India, Available

at, https://timesofindia.indiatimes.com/business/india-business/wef-launches-centre-for-fourth-industrial-

revolution-in-india/articleshow/66166216.cms

11. Incentives for green tech, AI likely in new industrial policy - The Hindu Business Line, 2018), Available at,

https://www.thehindubusinessline.com/economy/incentives-for-green-tech-ai-likely-in-new-industrial-

policy/article22789065.ece

12. Ministry of Electronics and Information Technology, Available at, https://meity.gov.in/content/internet-things

13. Gaur Seema, Shaping the future of manufacturing in India, (July 2017), Available at,

https://www.livemint.com/Opinion/mQqYAAL52lvVUqdIkeLTON/Shaping-the-future-of-manufacturing-in-

India.html

14. Smart Cities Mission, Available at, http://smartcities.gov.in/content/, https://www.pwc.com/us/en/library/4ir-

ready.html

15. Atal Innovation Mission, NITI Ayog, Available at, https://niti.gov.in/content/atal-innovation-mission-aim

16. Indian Tech start-up Ecosystem approaching escape velocity, (2018), NASSCON-Zinnov, Available at,

https://www.nasscom.in/system/files/secure-pdf/Indian_Start-up_Ecosystem_2018-Final_Report.pdf

17. India can play pivotal role in global fourth Industrial revolution, Economic Times, (April 2018), Available at,

//economictimes.indiatimes.com/articleshow/63700143.cms?utm_source=contentofinterest&utm_medium=tex

t&utm_campaign=cppst

363-367

Page 71: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

18. India can Lead the World into the Fourth Industrial Revolution: World Economic Forum, (February 2019),

Available at, https://www.dqindia.com/india-can-lead-world-fourth-industrial-revolution-world-economic-

forum/

19. IoT in India : Next Big Wave, (July 2016), NASSCOM, Available at,

https://www.nasscom.in/system/files/secure-pdf/IoT_in_India_report_05072016.pdf

20. Big data analytics to become $16 billion industry by 2025, (July 2017), Available at,

economictimes.indiatimes.com/articleshow/59410695.cms?utm_source=contentofinterest&utm_medium=text

&utm_campaign=cppst

21. What is Industry 4.0, why it offers huge opportunity for India? (2019), Available at,

https://www.financialexpress.com/industry/what-is-industry-4-0-why-it-offers-huge-opportunity-for-

india/1452171/

22. Columbus Louis, 2018, Roundup Of Internet Of Things Forecasts And Market Estimates, (December 2018),

Available at, Forbes https://www.forbes.com/sites/louiscolumbus/2018/12/13/2018-roundup-of-internet-of-

things-forecasts-and-market-estimates/#32b3c4927d83

51.

Authors: Anandika Sharma, Dr. Anupam Sharma

Paper Title: HANDWRITING RECOGNITION BY MACHINE LEARNING

Abstract— Handwriting is one of the most natural ways of communication among people. The

handwriting recognition task is the main concern of scientific community because handwriting can be varies

with the same person or from one person to another hence the prediction of human behavior through

handwriting is a complex task. Earlier the handwriting analysis has been done by graphologists but due to

the modernization and the arrival of digital world the handwriting analysis can be done with the help of

computer aided machines. Different software and algorithms has been defined to do the analysis. In the new

world of machine learning handwriting recognition and the prediction of human behavior can be done by

using different techniques of machine learning which increase the speed of analysis This paper studies the

recent advances and the trends in the field of handwriting recognition by machine learning.

Keywords— handwriting, graphologist, machine learning

References:

1. Hemlata, Manoj Sachan, Shailendra Kumar Singh, “Personality Detection using Handwriting Analysis: Review

”,The Seventh International Conference on Advances in Computing, Electronics and Communication - ACEC 2018.

2. Prachi desai, aayush agarwal, ajinkya dhavale, “Handwriting Analysis for Detection of Personality Traits using

Machine Learning Approach”, International Journal of Computer Applications (0975 – 8887), Volume 130 – No.15,

November2015.

3. Champa HN and Dr KR anandakumar, “Artificial Neural Network for Human Behaviour Prediction through

Handwriting Analysis, International Journal of Computer Applications (0975 – 8887)”, Volume 2 – No.2, May 2010.

4. Manimala, meghashree, poornima gokhale and sindhu chandrashekhar, “AUTOMATED HANDWRITING

ANALYSIS FOR HUMAN BEHAVIOR PREDICTION”, International Journal of Computer Science and Engineering (IJCSE)

, Vol. 5, Issue 5, Aug - Sep 2016 .

5. Umang gupta, niladri chatterjee, “Personality Traits Identification using Rough sets based Machine Learning”,

International Symposium on Computational and Business Intelligence, 2013.

6. Cleber Zanchettin, Byron Leite Dantas Bezerra and Washington W. Azevedo, “A KNN-SVM Hybrid Model for

Cursive Handwriting Recognition”, WCCI 2012 IEEE World Congress on Computational Intelligence, June 10-15, 2012 -

Brisbane, Australia.

7. Sargur N srihari, sung-hyunk cha, hina arora and sangjik lee, “Individuality of Handwriting: A Validation Study”,

2001 IEEE.

8. Prof. Akshita Chanchlani1, Pratima Kharade, Rutuja Kapase, Sonal Janvalka, Aakanksha Jaitly, “International

Journal for Research in Applied Science & Engineering Technology (IJRASET)”, Volume 5 Issue X, October 2017.

363-367

52.

Authors: Dr Anupam Sharma

Paper Title: Technological Upgradation on Educational Reforms in India

Abstract: The moment journey of life starts education starts from that day. The moment baby born tries to adapt

to outside world from that moment itself learning starts, along with activities liking crying, expressing, smiling,

recognizing mothers touch etc. and the process goes on through lifetime. John Dewey said: “Education is not

preparation for life, education is life itself.” Over the years India has emerged as one of the largest education

systems. However, witnessing the changes and developments in and around the world are forcing and demanding

the further changes in the existing educational practices and delivery system if education. In the 21st century the

government of India has recognized the true importance of imparting education to the children of country and

brought some legislative changes.

Index Terms—education, learning, developments, government

References:

1. VERNAL, Louis: Drive reforms in education system. In: The Times of India, August 7, 2014

363-367

Page 72: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

http://timesofindia.indiatimes.com/home/education/news/Drive-reforms-in-education-system/articleshow/39779780.cms (2016.04.25).

2. KUMAR, Sasi V.: The Education System in India. GNU Operating System http://www.gnu.org/education/edu-system-india.html

(2016.04.19)

3. RAMAN, S. A.: Woman’s Education. in: Stanley, Wolpert (edit): Encyclopedia of India, Vol 4. Thomson Gale, 2006. 236.

4. National Council of Educational Research and Training: Leading the Change. New Delhi, 2011.

http://www.ncert.nic.in/oth_anoun/leading_the_change.pdf (2016.04.25)

5. Sarva Shiksha Abhiyan. Ministry of Human Resource Development. http://ssa.nic.in/ (2016.04.25).

6. Annual Reports, 2010-11, (2011) Department of School Education & Literacy and Department of Higher

53.

Authors: EKTA NARWAL SUMEET GILL

Paper Title: MODELING ELLIPTICAL CURVE CRYPTOGRAPHY KEYS USING BACK PROPAGATION

ALGORITHM

ABSTRACT: Vehicular Ad Hoc Networks (VANETs) are the newest for of Ad Hoc Networks in which

moving vehicles act as routers and nodes to form a network. VANETs use many cryptographic approaches

like symmetric key approaches, public key approaches, certificate revocation, pseudonym based

approaches, identity-based cryptography, identity-based signature, Elliptical Curve Cryptography (ECC)

etc. for secure communication. These techniques use public and private keys for enhancing the security of

messages and all these keys are stored on hardware devices like TPDs (Temper Proof Devices) in VANETs.

TPDs are protected by the cryptographic algorithms. In this present era of technology these algorithms and

their online simulators are freely available on internet and can be easily intruded. There is a potential need

to enhance the security of these keys. In this paper we worked on enhancing the security of ECC keys stored

in TPDs of VANETs using a specific network of Artificial Neural Networks.

KEYWORDS: VANETs (Vehicular Ad Hoc Networks), TPD (Temper Proof Devices), ECC (Elliptical Curve

Cryptography), ANN (Artificial Neural Networks)

References:

[1] H. Handschuh, P. Paillier, and J. Stern, “Probing Attacks on Tamper-Resistant Devices,” Igarss 2014, vol.

1717, no. 1(2014) pp. 1–5.

[2] E. Narwal and S. Gill, “Secure and Faster Key Management of Elliptical Curve Cryptography in Vanets,”

Int. J. Comput. Sci. Eng. Inf. Technol. Res., vol. 7, no. 4,( 2017) pp. 25–30.

[3] M. Aarts, “Hardware Attacks Tamper Resistance , Tamper Response and Tamper Evidence.”

[4] J. Domingo-Ferrer and Q. Wu, “Safety and privacy in vehicular communications,” CEUR Workshop Proc.,

vol. 397(2008) pp. 6–11.

[5] A. Naveena and K. R. Reddy, “A Review : Elliptical Curve Cryptography in Wireless Ad-hoc Networks,”

(2016) pp. 1786–1789.

[6] J. Singh and G. Singh, “Clustering Based Routing Protocols in WSNs : A Review,” vol. 8491, no. 2 (2014)

pp. 191–194.

[7] S. Gandhi and Shalini, “Routing Protocols for Vehicular Adhoc Networks (VANETs ): A Review,” Int. J.

of Computer Science and Mobile Computing, vol. 5, no. 1 (2014) p. 948-953.

[8] Y. Liu, L. Wang, and H.-H. Chen, “Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc

Networks,” IEEE Trans. Veh. Technol., vol. 64, no. 8 (2015) pp. 3697–3710.

[9] H. A. Selma, “Elliptic Curve Cryptographic Processor Design using FPGAs,” pp. 1–6.

[10] S. S. Manvi, M. S. Kakkasageri, and D. G. Adiga, “Message Authentication in Vehicular Ad Hoc

Networks: ECDSA Based Approach,” 2009 Int. Conf. Futur. Comput. Commun., 2009.

[11] R.Singh and S. Miglani, “Efficient and Secure Message Transfer in VANET,” no. June, 2016.

[12] Daniel R. L. Brown, “Standards for Efficient Cryptography 2 (SEC 2) : Recommended Elliptic Curve

Domain Parameters,” Stand. Effic. Cryptogr., vol. 2, no. Sec 2 (2010) p. 37.

[13] G. Mart, “Encryption Scheme,” vol. 2, no. 2 (2010) pp. 7–13.

[14] E. Engineers, H. Networks, C. Networks, B. Propagation, and M. Tasks, “3 . The Back Propagation

Algorithm,” Neural Networks, pp. 16–27.

[15] R.C. Chakraborty, “Back Propagation Network Soft Computing Back Propagation Network,”

www.myreaders.info,(2010).

[16] I. C. Lin, H. H. Ou, and M. S. Hwang, “A user authentication system using back-propagation network,”

Neural Comput. Appl., vol. 14, no. 3(2005) pp. 243–249.

[17] R. R. Al-nima, L. Muhanad, and S. Q. Hassan, “Data encryption Using Backpropagation Neural Network,”

(2009).

[18] E. Narwal and S. Gill, “Perceptrons Helping to Secure VANETs,” Int. J. Adv. Res. Comput. Sci., vol. 8, no.

3(2017) pp. 3–6.

363-367

Page 73: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

54.

Authors: Zarnigor Sohibova, Dilrabo Quvvatova

Paper Title: SYMBOLIC DESCRIPTION OF THE YEAR SEASONS IN UZBEK POETRY

Abstract: Eastern selected poetry took its long roots in literary description of year seasons. In X-XII

century there were Uzbek literature examples, after that period in the works of our poets each season was

compared to the human’s life and had peculiar meaning with the description of the mental position of lyric

hero. This article deals with defining symbolic meaning of spring and autumn in the poems of Alisher

Navoiy and Abdulhamid Chulpon.

Keywords : symbolic meaning, selected poetry, modern poetry, tradition, lyric hero, imitation, metaphorical

meaning

References:

1. Alisher Navoiy. Gurbatda g`arib shodmon bo`lmas emish. – Toshkent: Yangi asr avlodi, 2018. – 1… b.

2. Алишер Навоий.МАТ. 6-том. Фавойид ул-кибар. – Тошкент, Фан, 1990. – 566 б.

3. Алишер Навоий. Қаро кўзум. – Тошкент: Ғ.Ғулом номидаги Адабиёт ва санъат нашриёти, 1988. – 768 б. 4. Навоий асарлари луғати. – Тошкент: Ғ.Ғулом номидаги Адабиёт ва санъат нашриёти, 1972.– 782 б.

5. Чўлпон ижоди ва замонавий адабий жараён. Конференция материаллари. –Тошкент: Mashhur-press, 2018, - 326 б.

6. Чўлпон. Асарлар. I жилд. –Тошкент: Akademnashr, 2013. -372 б. 7. Улуғбек Ҳамдам. Янги ўзбек шеърияти. – Тошкент: Адиб, 2012, -304 б.

8. А.ОриповТанланганасарлар. 4 жилдлик. 1 жилд. Шеърлар ва достонлар. – Т.: Ғафур Ғулом номидаги адабиёт ва санъат

нашриёти, 2000 (www.ziyonetkutubxonasi). – 432 б. 9. А.Орипов. Танланган асарлар. 4 жилдлик. 2 жилд. Шеърлар ва достонлар. Т.:Ғафур Ғулом номидаги адабиёт ва санъат

нашриёти, 2001 (www.ziyonetkutubxonasi) . – 496 б. 10. Ҳаққулов И. Тақдир ва тафаккур. – Т.: “Шарқ” 2007 – 336 б.

11. Раҳимжонов Н. Истиқлол ва бугунги адабиёт. –Тошкент: Ўқитувчи, 2012. –328 б.

12. Сулаймон Т. Гул бир ён, чаман бир ён (қўшиқлар). –Тошкент: Чўлпон, 1996. –18 б. 13. www.ziyouz.com

363-367

55.

Authors: Akhmedova Mehrinigor Bahodirovna, Baqoyeva Muhabbat Kayumovna

Paper Title: Analysis of “Spirituality” category and its structure in the English language

Abstract: Lexico-semantic category of “spirituality” is usually analyzed by the ways of defining concepts

of the term. On the one hand, it seems to us that using these concepts simultaneously makes opposed ideas

towards the meaning, however, the term “ spirituality” is defined in different ways by different authors and

it makes the concept complicated. The main point of the article is to analyze and categorize the term

“spirituality” and give full answer to the readers about the English concept “spirituality”.

Keywords : spirituality, religious level, faith, hope, peace, empowerment, lexica- semantic category, moral values,

concept, human mind, definition

References:

1. Brown L. Oxford English Dictionary; Clarendon Press: Oxford, UK, 1993. – P. 2. Chapman, L. Developing a useful perspective on spiritual health: Wellbeing, spiritual potential and the search for meaning. Am. J. Health

Prom. 1987 – P.39 – P.1.

3. Fisher, J.W. Spiritual health: Its nature and place in the school curriculum. PhD thesis, University of Melbourne, 1998, Melbourne, Australia, 2010 Available from http://eprints.unimelb.edu.au/archive/00002994/ & Melbourne University Custom Book Centre:

Melbourne, Australia, 2010 – P.107

4. Hay D.; Reich, K.H.; Utsch, M. Spiritual development: Intersections and divergence with religious development. In The Handbook of Spiritual Development in Childhood and Adolescence Roehlkepartain, E.C., King, P.E., Wagener, L.M., Benson, P.L., Eds.; Sage

Publications: Thousand Oaks, CA, USA, 2006 – P.59. – P.44.

5. Hill V. Spiritual development in the Education Reform Act: A source of acrimony, apathy or accord. Brit. J. Educ. Stud.1989, – P. 182. – P. 37.

6. Jose, N.; Taylor, E. Spiritual health: A look at barriers to its inclusion in the health education curriculum. Eta Sigma Gamman 1986, – P.18, 16-19

7. Muldoon M.; King, N. Spirituality, health care, and bioethics. – J. Relig. Health, 1995, – P 34.

8. Priestley, J.G. Towards finding the hidden curriculum: A consideration of the spiritual dimension of experience in curriculum planning. Brit. J. Relig. Educ. 1985, – P. 119 – P. 7.

9. Tanyi R. Nursing theory and concept development or analysis. Towards clarification of the meaning of spirituality. – Blackwell Science

Ltd, Journal of Advanced Nursing, EBSCO Publishing, 2002. – P 509. – P. 506

363-367

56.

Authors:

Miftachul Huda, Azmil Hashim, Kamarul Shukri Mat Teh, K. Shankar, B. Ayshwarya, Phong Thanh

Nguyen, Wahidah Hashim, Andino Maseleno

Page 74: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title: Learning Quality Innovation through Integration of Pedagogical Skill and Adaptive Technology

Abstract: This paper aims to explore the modern learning environment (MLE) which may emerge from the

secondary education into the tertiary education. This integration usually derives from enhancing the

pedagogical skill and adaptive technology to strengthen the teaching and learning process. Literature

review from referred books and journals was conducted with thematic analysis. The investigation was

employed in depth analysis from referred books, journals and conferences using the keywords of

pedagogical skill and adaptive technology and modern learning environment. The multiple finding from

met-synthesis was conducted by searching for the information which is organised using substantive

keywords. The findings reveal that the role of MLE can be divided into attempting to perform learning

quality, integrating the learning with continuous process, making easy in getting the sources, creating

flexibility in learning. This study is expected to contribute the way of maintaining inside factor within the

human being which is significantly necessary to make effort in assisting spirit performance in teaching

process. To assist students across learning environment by pedagogical skills with encouraging higher

teaching and learning, making convince into the pedagogy might be necessary a way to promote a range of

pedagogical skills continuing integration with technological tools. In addition, using experience to boost the

abstract ideas acquired in certain subjects as the source of knowledge itself can become a particular

principle for the enhancement of learning in higher education.

Index Terms: learning quality, innovation, pedagogical skill, adaptive technology, 21 century learning,

modern learning environment, openness in education, access to resources, flexibility in learning

References:

1. Keppell, M., Souter, K., & Riddle, M. (2012). Physical and virtual learning spaces in higher education: concepts for the modern learning

environment [Preface] (pp. xvi-xx). PIGI Publishing (IGI Global). 2. Anderson, T. (2008). The theory and practice of online learning. Edmonton, Canada: Athabasca University Press.

3. Beetham, H., & Sharpe, R. (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. New York and London:

Routledge. 4. Sankey, M., Birch, D., & Gardiner, M. (2010). Engaging students through multimodal learning environments: The journey continues.

In Proceedings ASCILITE 2010: 27th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education:

Curriculum, Technology and Transformation for an Unknown Future (pp. 852-863). University of Queensland. 5. Anshari, M., Almunawar, M. N., Shahrill, M., Wicaksono, D. K., & Huda, M. (2017). Smartphones usage in the classrooms: Learning aid

or interference?. Education and Information Technologies, 1-17.

6. Anshari, Alas, Y., & Guan, L. S. (2015). Developing online learning resources: Big data, social networks, and cloud computing to support pervasive knowledge. Education and Information Technologies, 1-15.

7. Anshari, M., Alas, Y., Sabtu, N. I. P. H., & Hamid, M. H. S. A. (2016a). Online Learning: trends, issues and challenges in the Big Data

Era. Journal of e-Learning and Knowledge Society, 12(1). 8. Anshari, M., Alas, Y., Hamid, M. H. S. A., & Smith, M. (2016b). Learning Management System 2.0: Higher Education. Handbook of

Research on Engaging Digital Natives in Higher Education Settings, 265.

9. Brown, M. R. (2007). Educating all students: Creating culturally responsive teachers, classrooms, and schools. Intervention in school and clinic, 43(1), 57.

10. Duhaney, D. C. (2001). Teacher education: Preparing teachers to integrate technology. International Journal of Instructional Media, 28(1),

23. 11. Garrison, D. R. (2011). E-learning in the 21st century: A framework for research and practice. London, UK: Taylor & Francis.

12. Gültekin, M. (2005). The Effect of Project Based Learning on Learning Outcomes in the 5th Grade Social Studies Course in Primary

Education.Educational Sciences: Theory & Practice, 5(2). 13. Huda, M., Anshari, M., Almunawar, M. N., Shahrill, M., Tan, A., Jaidin, J. H. & Masri, M. (2016). Innovative Teaching in Higher

Education: The Big Data Approach. The Turkish Online Journal of Educational Technology, 15(Special issue), 1210-1216.

14. Huda, M., Sabani, N., Shahrill, M., Jasmi, K. A., Basiron, B., & Mustari, M. I. (2017a). Empowering Learning Culture as Student Identity Construction in Higher Education. In Student Culture and Identity in Higher Education (pp. 160-179). IGI Global.

15. Huda, M., Jasmi, K. A., Hehsan, A., Shahrill, M., Mustari, M. I., Basiron, B., & Gassama, S. K. (2017b). Empowering Children with

Adaptive Technology Skills: Careful Engagement in the Digital Information Age. International Electronic Journal of Elementary Education, 9(3), 693-708.

16. Huda, M., Shahrill, M., Maseleno, A., Jasmi, K. A., Mustari, I., & and Basiron, B. (2017c). Exploring Adaptive Teaching Competencies in

Big Data Era. International Journal of Emerging Technologies in Learning, 12(3), 68-83. 17. Huda, M., Jasmi, K. A., Mustari, M. I., Basiron, B., Mohamed, A. K., Embong, W., ... & Safar, J. (2017d). Innovative E-Therapy Service

in Higher Education: Mobile Application Design. International Journal of Interactive Mobile Technologies, 11(4), 83-94.

18. Huda, M., Jasmi, K. A., Basiran, B., Mustari, M. I. B., & Sabani, A. N. (2017d). Traditional Wisdom on Sustainable Learning: An Insightful View From Al-Zarnuji's Ta 'lim al-Muta 'allim. SAGE Open, 7(1), 1-8.

19. Kayes, D. C. (2002). Experiential learning and its critics: Preserving the role of experience in management learning and

education. Academy of Management Learning & Education, 1(2), 137-149. 20. Koehler, M. J., & Mishra, P. (2009). What is technological pedagogical content knowledge. Contemporary issues in technology and

teacher education, 9(1), 60-70.

21. Lejeune, A., Ney, M., Weinberger, A., Pedaste, M., Bollen, L., Hovardas, T. & De Jong, T. (2009, July). Learning Activity Spaces: Towards flexibility in learning design?. In 2009 Ninth IEEE International Conference on Advanced Learning Technologies (pp. 433-437).

IEEE.

22. McPhail, G., & Rata, E. (2016). Comparing curriculum types:‘Powerful knowledge’and ‘21st century learning’. New Zealand Journal of Educational Studies, 51(1), 53-68.

23. McPhail, G. J. (2015). Conceptual Progression in Innovative Learning Spaces. New Zealand Journal of Teachers' Work, 12(1), 6-8.

24. Mishra, P., & Koehler, M. J. (2007). Technological pedagogical content knowledge (TPCK): Confronting the wicked problems of teaching with technology. Technology and Teacher Education Annual, 18(4), 2214.

25. Othman, R., Shahrill, M., Mundia, L., Tan, A., & Huda, M. (2016). Investigating the Relationship Between the Student’s Ability and

Learning Preferences: Evidence from Year 7 Mathematics Students. The New Educational Review, 44(2), 125-138. 26. Ramsden, P. (2003). Learning to teach in higher education. London and New York: Routledge.

27. Rata, E. (2016). A pedagogy of conceptual progression and the case for academic knowledge. British Educational Research Journal, 42(1), 168-184.

363-367

Page 75: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

28. Sharma, G., & Kolb, D. A. (2010). The learning flexibility index: Assessing contextual flexibility in learning style. Style differences in

cognition, learning and management: Theory, research and practice, 60-77. 29. Shernoff, D. J., & Csikszentmihalyi, M. (2009). Cultivating engaged learners and optimal learning environments. Handbook of positive

psychology in schools, 131-145.

30. Elena V. Smirnova, B. Ayshwarya, Phong Thanh Nguyen, Wahidah Hashim, Andino Maseleno, Using Shell Programs in Educational and

Methodological Support for Learning Foreign Language, International Journal of Applied Exercise Physiology, Vol. 8 (2.1), 2019. pp.

1027-1032.

31. Inga E. Rakhimbaeva, Aleksandr A. Korostelev, Indira A. Shakirova, B. Ayshwarya, Phong Thanh Nguyen, Wahidah Hashim, Andino Maseleno, Integration of the Educational and Didactic Systems in the Training of Future Teachers, International Journal of Applied

Exercise Physiology, Vol. 8 (2.1), 2019. pp. 1033-1038.

32. Alla L. Busygina, Elena M. Chertakova, Darya B. Shtrikova, B. Ayshwarya, Phong Thanh Nguyen, Wahidah Hashim, Andino Maseleno, Professional forms of Employment in the Russian Federation: Problems and Challenges, International Journal of Applied Exercise

Physiology, Vol. 8 (2.1), 2019. pp. 1039-1045.

33. Olga I. Pugach, Andrei V. Оchepovsky, Wahidah Hashim, Andino Maseleno, B.Ayshwarya, Phong Thanh Nguyen, To the use of English Words When Learning Programming, Information Systems and Technologies, International Journal of Applied Exercise Physiology, Vol.

8 (2.1), 2019. pp. 1046-1051.

34. Trilling, B., & Fadel, C. (2009). 21st century skills: Learning for life in our times. San Fransisco, Canada: John Wiley & Sons. 35. Zakirillah, Noorminshah, A. I., Huda, M., Fathoni, & and Heroza, R. I. (2016). Design of a Mobile based Academic Cyber Counselling

Application in Higher Education. Journal of Information Systems Research and Innovation, 10(3), 1-9.

36. Grigory Olegovich Yarygin, Aleksandr Aleeksevich Korostelev, Rafis H. Mukhutdinov, Andino Maseleno, Elections and Russian Citizens Residing Overseas: Prospects for Internet Voting, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5,

pp. 52-57, 2019.

37. Larisa Akhunzhanovna Apanasyuk, Elena Vladimirovna Smirnova, Rafis H. Mukhutdinov, Andino Maseleno, The Problem of the Organization of Socio-Cultural Environment for Adaptation and Development of a Student-Migrant’s Bilingual Identity in the Conditions

of the Russian Higher Education, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 63-70, 2019.

38. Alla L. Busygina, Liliya A. Meteleva, Darya B. Shtrikova, Rafis H. Mukhutdinov, Andino Maseleno, Bases of Formation of Women's Professional Mentality in Russia, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 71-77, 2019.

39. Oleg N. Yarygin, Aleksandr A. Korostelev, Linar G. Akhmetov, Andino Maseleno, Modeling of Competence as a Tool of Goal Setting for

Education in Modern Society, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 78-86, 2019. 40. Raven John, Aleksandr A. Korostelev, Oleg N. Yarygin, Rafis H. Mukhutdinov, Andino Maseleno, The Genesys and Base Concepts of

Competentology, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 87-95, 2019.

41. Bogdanova Anna Vladimirovna, Aleksandr Alekseevich Korostelev, Rafis H. Mukhutdinov, Indira A. Shakirova, Andino Maseleno, Formulation of the Problem of Mathematical Modeling of Accommodation of Basic Stations of Cellular Communication in Residential

Territories for Students of It-Directions of Preparation, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue

6S5, pp. 96-100, 2019. 42. Bogdanova A. Vladimirovna, Aleksandr A. Korostelev, Olga L. Shepelyuk, Anna E. Rodionova, Irina N. Fardeeva, Andino Maseleno,

Reengineering of Business Processes of the Higher School: Its Prerequisites, International Journal of Recent Technology and Engineering

(IJRTE), Vol. 7, Issue 6S5, pp. 101-104, 2019. 43. Rustem R. Vakhitov, Anna E. Rodionova, Elena V. Smirnova, Rafis H. Mukhutdinov, Mariya I. Arzhakova, Andino Maseleno, Crisis of

Higher Education in Russia, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 105-109, 2019.

57.

Authors: Kadirova Nargiza Arivovna

Paper Title:

Similarities in Addressing the Complex Nature of Love and Devotion in Methamorphosis by Kafka and

in ghazals of Mir Alisher Navoiy

Abstract: The great European novelist and short-story writer, Franz Kafka, and one of the most famous

eastern poets of Middle ages, Alisher Navoiy, at first blush seem to have absolutely nothing in common. But

a detailed analysis of two distinguished works of the writers, reveals their surprisingly similar views in

regard to interpretation of love and devotion concepts. Step-by-step comparison of one of the Mir Alisher

Navoiy’s ghazals with The Metamorphosis of Kafka allows to correlate the messages of each masterpiece,

and thus define the similarities in personal traits of each author.

Keywords : Love, devotion, The Metamorphosis, Ghazal, Kafka, Alisher Navoiy, comparative analysis, world

literature

References: 179. Merriam-Webster Dictionary at https://www.merriam-webster.com /dictionary/love. Consulted online on June, 26 2019

180. Richards, John F., The Mughal Empire. Cambridge University Press, Cambridge, UK, 1995. - p. 6,

181. Subtelny, Maria E., “ʿAli Shir Navai”, in: Encyclopaedia of Islam, THREE, Edited by: Kate Fleet, Gudrun Krämer, Denis Matringe, John Nawas, Everett Rowson. Consulted online on June, 26 2019

182. McHenry, Robert, ed., "Navoiy, (Mir) Alisher". Encyclopedia Britannica 8 (15th ed.) Encyclopedia Britannica, Inc. Chicago, USA, 1993. - pp. 90-93

183. Wikipedia The Free encyclopedia at https://en.wikipedia.org/wiki/Ali-Shir_Nava%27i. Consulted online on June, 26 2019

184. Lovell-Hoare Sophie, Lovell-Hoare Max, Uzbekistan. Bradt Travel Guides. Chalfont St Peter, UK, 2013. - p.26

185. Gilman, Sander, Franz Kafka, the Jewish Patient. Psychology Press, East Sussex, UK, 1995. - p.88

186. Nervi, Mauro, Kafka's Life (1883-1924). 2011. at http://www.kafka.org/index.php?biography. Consulted online on June, 26 2019

187. John P. Anderson, Kafka's the Metamorphosis: Unwelcome at Home. Universal-Publishers, CA, USA, 2016. - p.66 188. Spindler, William, Magic Realism: A Typology, Forum for Modern Language Studies. Vol. XXIX, iss. 1. Oxford University Press,

Oxford, UK, 1993 - pp. 75-80

189. Luebering, Juan Gelman, Franz Kafka, Biography & Works. Encyclopedia Britannica at https://www.britannica.com/biography/Franz-Kafka. Consulted online on June 26, 2019

190. Kayumov Aziz, Alisher Navoiy, History of the World Literature in 9 volumes. v.3. Nauka, Moscow, USSR, 1985 - pp. 576-582

191. Neider, Charles, The Frozen Sea: A Study of Franz Kafka. Russell & Russell, NY, USA, 1962 - p.29 192. Nabokov, Vladimir, Die Kunst des Lesens: Meisterwerke der europäischen Literatur. Fischer S. Verlag GmbH, Berlin, Germany, 1984. -

pp. 313–352.

193. Pelikan Straus, Nina, Transforming Franz Kafka's Metamorphosis, Signs Journal of Women in Culture and Society, 14(3). The

Page 76: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

University of Chicago Press, Chicago, USA, 1989. - pp. 651-667.

194. Sudau, Ralf, Franz Kafka: Kurze Prosa, Erzählungen. Klett, Stuttgart, Germany, 2007. - pp. 158-162. 195. Arutyunov, L., Taneev, V., Poetry of the USSR nations of 5-18th Centuries. Library of World literature. v.55 Khudozhestvennaya

Literatura, Moscow, USSR, 1972. - p.330-331

196. David, Claude, Franz Kafka. Molodaya Gvardiya, Moscow, Russia, 2008. - p.60

197. Camus, Albert, The Myth of Sisyphus, Appendix, Hope and the Absurd in the Work of Franz Kafka, Penguin, London, UK, 2013. -

pp.195-205

198. Franz Kafka, The Metamorphosis. GlobalGrey. London, UK, 2018. - p.12 199. Lecture on "The Metamorphosis" by Vladimir Nabokov at http://www.kafka.org/index.php?id=191,209,0,0,1,0. Consulted online on

June, 26 2019

200. Richard T Kelly. Kafka’s Metamorphosis: 100 thoughts for 100 years. The Guardian. International edition. July 18, 2015. Consu lted online on June, 26 2019.

58.

Authors: Kholikova Nozima Nematilloyevna, Saidov Khayrulla Shavkatovich

Paper Title:

Comparative observation of the peculiarities of English and Uzbek detective genre (in the examples of

J.H.Chase’s works)

Abstract: Observation of English modern detective genre and peculiarities of Uzbek detective genre is the

main topic of this article. Comparative analysis of the Uzbek and English detective genres have been

studied in the novels of James Hedley Chase and Uzbek translations of his works. Some similarities and

differences between Uzbek and English detective genres have been shown in this paper.

Keywords: detective story, evidence, unexpected denouement, puzzle, superficially convincing, crime, private,

defeat, opponents, murder, adventure.

References:

1. Alpomish. Sharq. – T.: 1998. 231-bet

2. I. Qalandarov. Shohidamas, bargida… O‘Zadabiynashr – T.: 1962.

3. O‘. Umarbekov. Tanlangan asarlar. 1–jild. Sharq. – T.: 2002. 11-bet

4. T. Malik. Shaytanat. Sharq. – T.: 2006.

5. T. Malik. Qiyomat qarz. Sharq. – T.: 2007.

6. “O‘zbekiston adabiyoti va san’ati” gazetasi. 2007 yil, 2-son.

7. Chase J.H. The vulture is a patient bird. Royallib.ru. p-3

8. Чейз Ж.Х. Кузгун сабрли куш. Тошкент-“O’zbekiston”, 2012. b-8

363-367

59.

Authors: Jeyren Mizrabova

Paper Title:

TRANSLATIONS OF WILLIAM SHAKESPHEARE'S TRAGEDY "HAMLET" IN UZBEK

LITERATURE STUDIES

Abstract: Shakespeare's works are classics in literature and have many translations. The aim of the work

is to study the peculiarities of the translations of William Shakespeare's tragedy "Hamlet" in Uzbek

literary criticism. In particular, the history of the creation of translations of this work into the Uzbek

language, their quality and personality of the authors, the distinctive features of each of them and the

circumstances of their origin have been studied. Particular attention is paid to the personality of Jamal

Kamal, the author of the first translation of William Shakespeare directly from the original language. Also,

the history of Uzbek indirect and direct transfers is briefly outlined, and a study is made about their

extremely important influence in the development of culture. An important source of information here are

various scientific works that cover and analyze the works of Uzbek translators with the works of William

Shakespeare. A comparative-analysis of the peculiarities of translation of verbal images in the speech of the

main characters into Russian and Uzbek languages is carried out, their correspondence to the original and

the used interpreting techniques are analyzed. The conclusion about quality and prospects of development

of the Uzbek direct translation are outlined.

Keywords : tragedy, Hamlet, translation, character, direct translation, literary movement, stage, Shakespeare,

features of translation, independence

References: 1. Чўлпон. Асарлар: Уч жилдлик / О.Шарафиддинов таҳрири остида. Ж.I. Шеърлар. Драмалар. Таржима. – T.: Ғафур Ғулом

номидаги Адабиёт ва санъат нашриёти, 1994. – 448 б.

2. Вильям Шекспир. Ҳамлет, Дания Шаҳзодаси. Тошкент, 1948 – 148 б. 3. Вильям Шекспир. Сайланма. Уч жилдлик. Учиничи жилд. (Инглиз тилидан

4. Ғ. Саломов. Тил ва таржима.Ўзбекистон ССР “Фан” нашриёти. Тошкент -1966.

363-367

Page 77: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

5. Иброҳим Ҳаққул. Ижод иқлими. Тошкент.Ўзбекистон Республикаси. Фанлар академияси.”Фан” нашриёти 2009 Б.-388. б. 71.

6. Шекспир В. Гамлет. Дания шаxзодаси. Жамол Камол таржимаси ( в рукописи). - Тошкент, 1977, -156 б. 7. http//Shakespeare/mit/edu/hamlet/ful/html/

8. http://thelib.ru/books/shekspir_uilyam/gamlet_princ_datskiy_permlozinskiy-read.html

9. http://www.theatre-library.ru/files/sh/shakespeare/shakespeare_20.html Вильям Шекспир. Гамлет, принц датский (пер.Б.Пастернак)

60.

Authors: Kayumova Nigora Muxtorovna, Shukurova Nigora Shavkatovna, Safoeva Sadokat Nasilloevna

Paper Title:

THE ROLE OF THE ETHNOGRAPHIC VOCABULARY IN THE ENGLISH AND UZBEK

LANGUAGES

Abstract: Various aspects of language and culture are currently the focus of attention of linguists,

ethnolinguists, sociolinguists, psycholinguists, and cultural studies. It is the reflection in the language of

ethnic and personal self-knowledge, ways of perceiving and conceptualizing the world, the formation of

symbols and stereotypes inherent in certain people. Culture of a people is reflected in the values of linguistic

units i.e. that stably fixed in them is invariant in content, knowledge of the language, and in terms of their

ability to convey information over time, ranging in size and connotations, knowledge of which may not be

necessary for the knowledge of the language. Cultural studies of vocabulary and in whole the language is the

main point of our paper.

Keywords: Ethnolinguistics, cultural studies, language units, vocabulary, lacune, variants, ethnology, culture,

linguistics, descriptive, statistical method.

References: 1. Abazov R. Culture and Customs of the Central Asian Republics. – London. Greenwood Press, 2007 – 325 p 2. Raul George Geiss. Mahallah and kinship relation. Central Asian Survey (2001) , 20 (1), p.97.

3. Central Asian Survey magazine (2002).21 (1) p.60.

4. Underhill, J.Ethnolinguistics and Cultural Concepts: Truth, Love, Hate and War (pp. 17-40). Cambridge: Cambridge University Press. 2012 doi:10.1017/CBO9780511862540.003

5. Ferraro, Gary. Cultural Anthropology: An Applied Perspective. Cengage Learning. 2006

6. Лучинина Е.Н. Лингвокультурология в системе гуманитарного знания. ТГУ. Критика и семиотика. Вып. 7, 2004.http://www.nsu.ru/education/virtual/cs7luchinina.htm

7. Маслова В.А. Лингвокультурология. - М.: Академия, 2001. http://www.englspace.com/dl/files/maslova.zip

8. Oxford Learner –Oxford Advanced Learner’s Dictionary of Current English:In 2v. V1. Oxford UP, 1980

1.

Authors:

Vasanth Mundargi, Dr. Siva Yellampalli

Paper Title:

Accounting for PVT Variations in Design Timing Closure

Abstract: The On Chip Variation (OCV) refers to changes in the behavior of parameters like process,

voltage and temperatures on a chip. In this paper, we go through different approaches followed to compensate

for PVT variations on chip during design timing closure. We review the dominant approaches used for

accounting such variations. We also review the advantages and disadvantages of these approaches used based on

the ease of use, implementation, power, area, and the overheads involved in adopting them.

Keywords: Delays, PVT variation, Static Timing Analysis, On-Chip Variation, Derating, AOCV, LOCV,

GBA, PBA, IR Drop, Voltage Aware STA .

References: 1. J. Bhasker and Rakesh Chadha, Static Timing Analysis for Nanometer Designs: A Practical Approach, New York: Springer, 2009.

2. Ang Boon Chang, “ASIC design margin methodology,” TENCON Spring Conference, April 2013, doi:

10.1109/TENCONSpring.2013.6584434

3. http://www.idc-

online.com/technical_references/pdfs/electrical_engineering/Process_Voltage_Temperature_PVT_Variations_and_Static_Timing_Analysis.pdf

4. Franco Stellari at al, “Mapping systematic and random process variations using light emission from Off-Stage Leakage”, Reliability

Physics Symposium, April 2009, doi: 10.1109/IRPS.2009.5173323 5. Vinod Kumar Singh, “Improvement in Static Timing Analysis for Early TA-Signoff Closure in SOC flow at Very Deep Submicron

Nodes”, M.Tech thesis, Dept of Elec. & Comm., IIIT, New Delhi, 2014

https://repository.iiitd.edu.in/jspui/bitstream/123456789/174/1/MT12110.pdf 6. Susumu Kobayashi and Kenichi Horiuchi, “An LOCV-based static timing analysis considering spatial correlations of power supply

variations”, Design, Automation & Test in Europe Conference & Exhibition, March 2011, doi : 10.1109/DATE.2011.5763283

7. Pua Siaw Fuang and Nor Muzlifah Mahyuddin, “Implementation study of path-based AOCV model on pessimism reduction for 20nm technology”, ICCSCE 2014, Nov 2015, doi : 10.1109/ICCSCE.2014.7072693

8. Naman Gupta, “Timing Analysis: Graph Based v’s Path Based”, July 2014, http://vlsi-soc.blogspot.in/2014/07/timing-analysis-graph-

based-vs-path.html 9. IR Drop Analysis, Cadence Design Systems, Inc., San Jose, USA

1-5

2.

Authors:

P. Naveen Sundar Kumar, V. V. Nagendra Kumar, K. E. Naresh Kumar

Paper Title: An Analysis on Ensemble Classifiers in Ensemble Classification Problems

Abstract: Day to Day the amount of data was increasing rapidly. Due to analyzing the huge amount of data

various technologies are also introduced. Traditional data mining approaches can be used to perform data

analysis through classification algorithms. In data mining a single classifier can be used to perform data analysis.

Sometimes, multiple or combined classifier can also be used to perform data analysis. But, the performance of

ensemble classifier is better than single classifier. Based on improved accuracy the various number of ensemble

classifiers are introduced. Now, this paper can reviews various ensemble classifiers based on their accuracy.

Keywords: Classification, Classifier Ensemble, Ensemble Classification.

References: 1. Baesens, B., Van Gestel, T., Viaene, S., Stepanova, M., Suykens, J., & Vanthienen, J. (2003). Benchmarking state-of-the-art

classification algorithms for credit scoring. Journal of the Operational Research Society, 54, 627-635.

2. Breiman, L. (1996). Bagging predictors. Machine Learning, 24, 123-140

3. Breiman, L. (2001). Random forests. Machine Learning, 45, 5-32. 4. Freund, Y., & Schapire, R. E. (1996). Experiments with a New Boosting Algorithm. In L. Saitta (Ed.), Proc. of the 13th Intern. Conf.

on Machine Learning (pp. 148-156). Bari, Italy: Morgan Kaufmann.

5. Friedman, J. H. (2002). Stochastic gradient boosting. Computational Statistics & Data Analysis, 38, 367-378. 6. Finlay, S. (2011). Multiple classifier architectures and their application to credit risk assessment. European Journal of Operational

Research, 210, 368-378.

7. Lessmann, S.,Baesens, B.,Seow, HV and Thomas, LC., (2015). Benchmarking state-of-the-art classification algorithms for credit scoring: An update of research. European Journal of Operational Research, 247 (1), 124-136

8. Myoung-Jong, K., Sung-Hwan, M. and Ingoo, H.(2006). An evolutionary approach to the combination of multiple classifiers to predict

a stock price index. Expert Systems with Applications 31(2):241-247 9. Paleologo, G., Elisseeff, A., & Antonini, G. (2010). Subagging for credit scoring models. European Journal of Operational Research,

201, 490-499.

10. Rodriguez, J. J., Kuncheva, L. I., & Alonso, C. J. (2006). Rotation forest: A new classifier ensemble method. IEEE Transactions on

Pattern Analysis and Machine Intelligence, 28, 1619-1630. 11. Tsai, C.-F. , & Hsiao, Y.-C. (2011). Combining multiple feature selection methods for stock prediction: Union, intersection, and multi-

intersection approaches. Decision Support Systems, 50 ,258–269

12. Zhang,G., Patuwo, B.E., and Hu, M.Y.,(1998). Forecasting with artificial neural networks: The state of the art. International Journal of Forecasting 14 (1998) 35–62.

6-8

Authors: Reshma, G. Shivaprasad

Paper Title: Research and Development of User Authentication using Graphical Passwords: A Prospective

Methodology

Abstract: Nowadays in information security user authentication is a very important task. In most of the

computer, user authentication depends on the alphanumeric username and password. It means text-based

password. But, this is not highly secure because of hackers can easily break the password. Brute force attack,

dictionary attack, guessing attack etc. these all are some possible attacks on the password. If the user chooses a

Page 78: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

3.

difficult password to prevent the system from the attackers which is very much harder for the user to remember

such a difficult password. So, to resolve this problem introduced a new technique called graphical password

authentication. This paper presents a detailed survey of user authentication techniques using a graphical

password. It contains basically two type approaches. They are recognition-based and recall-based approaches.

This survey discusses the different techniques about Graphical password authentication and their advantages and

limitations. The survey provides a roadmap for the development of new graphical authentication scheme.

Keywords: Authentication, CaRP, Cryptography, Cued click, Graphical passwords, Security

References: 16. S. Tabrez and D. J. Sai, Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical

password authentication system, In: Intelligent Computing and Control Systems (ICICCS), 2017 International Conference on,

IEEE, 2017, 776-781. 17. M. S. Umar and M. Q. Rafiq, Select-to-Spawn: A Novel Recognition-based Graphical User Authentication Scheme, In: Signal

Processing, Computing and Control, 2012 IEEE International Conference on, IEEE, 2012, 1-5.

18. A.Almulhem, A graphical password authentication system, In: Internet Security (WorldCIS-2011), London, 2011 World Congress on, IEEE, 2011, 223-225.

19. S. Kaja and D. Gupta, Graphical password scheme using persuasive cued click points, In: Smart Technologies For Smart Nation

(SmartTechCon), Bangalore, 2017 International Conference On, IEEE, 2017, 639-643.

20. M. S. Umar, M. Q. Rafiq and J. A. Ansari, Graphical user authentication: A time interval based approach, In: Signal Processing,

Computing and Control, Waknaghat Solan, 2012 IEEE International Conference on, IEEE, 2012, 1-6.

21. P. Chellaiah, B. Nair, K. Achuthan, S. Diwakar, Using Theme-based Narrative Construct of Images as Passwords: Implementation and Assessment of Remembered Sequences, International Journal of Online Engineering 13(11) (2017) 77-93.

22. Bhand, V. Desale, S. Shirke and S. P. Shirke, Enhancement of password authentication system using graphical images, In: Information Processing (ICIP), Pune, 2015 International Conference on, IEEE, 2015, 217-219.

23. S. S. S. Ahmed and N. M. Shekokar, Cued click authentication, In: Wireless and Optical Communications Networks (WOCN),

Mumbai, 2017 Fourteenth International Conference on, IEEE, 2017,1-5. 24. Gowraj N., Avireddy S., Prabhu S., GAS: A Novel Grid Based Authentication System, In: Quality, Reliability, Security and

Robustness in Heterogeneous Networks, QShine, (Singh K., Awasthi A.K.), Lecture Notes of the Institute for Computer

Sciences, Social Informatics and Telecommunications Engineering, Springer, Berlin, Heidelberg, 115, 2013, 578-590. 25. K. Irfan, A. Anas, S. Malik and S. Amir, Text based graphical password system to obscure shoulder surfing, In: Applied Sciences

and Technology (IBCAST), 2018 15th International Bhurban Conference on, IEEE, 2018, 422-426.

26. M. Mihajlov, B. Jerman-Blazič and M. Ilievski, ImagePass - Designing graphical authentication for security, In: Next Generation Web Services Practices, 2011 7th International Conference on, IEEE, 2011, 262-267.

27. L. Chee Yeung, B. Lee Weng Wai, C. H. Fung, F. Mughal and V. Iranmanesh, Graphical password: Shoulder-surfing resistant

using falsification, In: 9th Malaysian Software Engineering Conference (MySEC), IEEE, 2015, 145-148.

28. G. Yang, PassPositions: A secure and user-friendly graphical password scheme, In: Computer Applications and Information

Processing Technology (CAIPT), 2017 4th International Conference on, IEEE, 2017, 1-5.

29. S. Biswas and S. Biswas, Password security system with 2-way authentication, In: Research in Computational Intelligence and Communication Networks (ICRCICN), 2017 Third International Conference on, IEEE, 2017, 349-353.

30. K. Kolekar and M. B. Vaidya, Click and session based — Captcha as graphical password authentication schemes for smart phone

and web, In: Information Processing (ICIP), 2015 International Conference on, IEEE, 2015, 669-674. 31. B. K. Alese, A. Akindele, F. M. Dahunsi, A. F. Thompson and T. Adesuyi, A graphic-based cryptographic model for

authentication, In: Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017 International Conference On,

IEEE, 2017, 1-10. 32. M. R. Albayati and A. H. Lashkari, A New Graphical Password Based on Decoy Image Portions (GP-DIP), In: Mathematics and

Computers in Sciences and in Industry, 2014 International Conference on, IEEE, 2014, 295-298.

33. M. Mathapati, T. S. Kumaran, A. K. Kumar and S. V. Kumar, Secure online examination by using graphical own image password scheme, In: Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM),

2017 IEEE International Conference on, IEEE, 2017, 160-164.

34. R. Sudha and M. Shanmuganathan, An Improved Graphical Authentication System to Resist the Shoulder Surfing Attack, In: Technical Advancements in Computers and Communications (ICTACC), 2017 International Conference on, IEEE, 2017, 53-55.

35. G. Agarwal, S. Singh and A. Indian, Analysis of knowledge based graphical password authentication, In: Computer Science &

Education (ICCSE), 2011 6th International Conference on, IEEE, 2011, 588-591. 36. P. S. S. Princes and J. Andrews, Analysis of various authentication schemes for passwords using images to enhance network

security through online services, In: Information Communication and Embedded Systems (ICICES), 2017 International

Conference on, IEEE, 2017, 1-8. 37. J. S. Vorster, R. P. van Heerden and B. Irwin, The pattern-richness of Graphical passwords, In: Information Security for South

Africa (ISSA), 2016 Conference on, IEEE, 2016, 69-76.

38. Chiasson S., van Oorschot P.C., Biddle R. Graphical Password Authentication Using Cued Click Points, In: Computer Security – ESORICS, (Biskup J., López J.), Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 4734, 2007, 359-374.

39. Almulhem, A graphical password authentication system, In: Internet Security (WorldCIS-2011), 2011 World Congress on, IEEE,

2011, 223-225. 40. H. Lashkari, A. A. Manaf and M. Masrom, A Secure Recognition Based Graphical Password by Watermarking, In: Computer and

Information Technology, 2011 IEEE 11th International Conference on, IEEE, 2011, 164-170.

9-14

4.

Authors:

M. Sravan Kumar Reddy, K.E. Naresh Kumar, Dr. Dharmendra Singh Rajput

Paper Title: Improving Ada-boost as a popular Ensemble in Classification Problems

Abstract: In Data Mining, several classification algorithms are used to perform classification based on

single learner but classification accuracy is not in an effective manner. To increase the accuracy of the

classification then multiple learners are combined to get better results. The multiple learners are trained and

combined into an ensemble. The ensemble can increase generalization ability and robustness [3]. Based on the

advantage of ensemble, the ensemble classification is a major concern in research directions of machine

learning. Another importance of ensemble is that it is much stronger than single base learner to produce accurate

hypothesis. The ensembles are divided into homogeneous or heterogeneous, dependent or independent

ensembles. The dependent ensemble methods like boosting and AdaBoost algorithms are promisingly provide an

accurate hypothesis. Finally, AdaBoost can be a better classifier ensemble to generate accurate results.

15-17

Page 79: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Keywords: AdaBoost, ensemble classification, classifier ensemble, accuracy, bagging.

References:

1. Epicurus' Scientific Method. Cornell University Press, 1984. Asmis, Shadi Bartsch, and Martha Nussbaum, Seneca’s Complete

Works, 2010- 17, University of Chicago Press. 2. Ensemble Methods: Foundations and Algorithms, by Zhi-Hua Zhou (New York: Chapman & Hall/CRC, 2012, 222 pp.) ISBN: 978-1-

4398-3003-1.

3. Lior Rokach, Ensemble based Classifiers, Artificial Intelligence Rev (2010) 33:1-39. 4. R. Polikar, Ensemble based systems in decision making, IEEE Circuits and Systems Magazine, Volume 6 Issue 3 • Third Quarter

2006.

5. Provost and Koplluri, 1997. 6. Keans, Valiant, “Thoughts on Hypothesis Boosting”, 1988

7. Jesse Read , Albert Bifet , Bernhard Pfahringer , Geoff Holmes, Batch-Incremental vs. Instance-Incremental Learning in Dynamic and

Evolving Data, UC3M,UoW. 8. L.Valiant, “A theory of the learnable”, Comm. ACM, 27(100), 1984.

9. Robert E. Scaphire, “The Strength of weak learnability”, 1990.

10. L. Brieman, Bagging Predictors,Machine Learning, 24(2):123-140, 199. 11. Yoav Freund , Robert E.Scaphire, “A Decision theoretic generalization of online learning and an application to boosting”, 1995.

12. Yoav Freund , Robert E.Scaphire, Experiments with a New Boosting Algorithm , 1996.

13. Jiawei Han, Micheline Kamber, Jian Pei, “Data Mining Concepts and Techniques”, 2011.

14. C. Domingo, O. Watanabe, Madaboost: A modification of Adaboost, 2000.

15. Bradley, Scaphire, 2008

16. Merler, 2007 17. Peter L. Bartlett, Mikhali Traskin, “Adaboost is Consistent”, Journal of Machine Learning 8 (2007) 2347-2368.

18. Artur Ferreria, Mario Figueiredo, Boosting Algorithms: A Review of Methods, Theory and Applications.

19. Rushi, Snehlatha, Latesh Malik, Class Imbalance Problem in Data Mining: Review, IJCSN, Vol 2, Feb 2013. 20. J. Xu, Q. Wu, J. Zhang, Z. Tang, “Exploiting Universum data in AdaBoost using gradient descent,” Image and Vision Computing,

vol. 32, pp. 550-557, 2014.

21. B. Sun, S. Chen, J. Wang, H. Chen, “A robust multi-class AdaBoost algorithm for mislabelled noisy data,” Knowledge-Based Systems, vol. 102, pp. 87-102, 2016.

22. M. Baig, M .M. Awais, E. M. El-Alfy, “AdaBoost-based artificial neural network learning,” Neurocomputing, vol. 16, pp. 22 – 41,

2017. 23. L. D. Miller and L. K. Soh, "Cluster-Based Boosting," IEEE Transactions on Knowledge and Data Engineering, vol. 27, pp. 1491-

1504, 2015.

24. Jasmina D. Novakovic, Alempije Veljovic, Adaboost as Classifier ensemble in Classification Problems, Infoteh-Jahorina, Vol 13, March 2014.

25. B. Lipinska, A. Wosiak, Classification of Medical Data Derived from Diagnostic devices ensembles of Classifiers, 2015.

26. Matteo Re, Giorgio Valentini, Ensemble Methods: a Review, 2001.

5.

Authors: Vikram Neerugatti, Dr. A. Rama Mohan Reddy

Paper Title: Machine Learning Based Technique for Detection of Rank attack in RPL based Internet of Things

Networks

Abstract: Internet of Things (IoT) is a new Paradiagram in the network technology. It has the vast

application in almost every field like retail, industries, and healthcare etc. It has challenges like security and

privacy, robustness, weak links, less power, etc. A major challenge among these is security. Due to the weak

connectivity links, these Internet of Things network leads to many attacks in the network layer. RPL is a routing

protocol which establishes a path particularly for the constrained nodes in Internet of Things based networks.

These RPL based network is exposed to many attacks like black hole attack, wormhole attack, sinkhole attack,

rank attack, etc. This paper proposed a detection technique for rank attack based on the machine learning

approach called MLTKNN, based on K-nearest neighbor algorithm. The proposed technique was simulated in

the Cooja simulation with 30 motes and calculated the true positive rate and false positive rate of the proposed

detection mechanism. Finally proved that, the performance of the proposed technique was efficient in terms of

the delay, packet delivery rate and in detection of the rank attack.

Keywords: Internet of Things, RPL, rank attack, KNN, security

References: 1. Mattern, Friedemann, and Christian Floerkemeier. "From the Internet of Computers to the Internet of Things." From active data

management to event-based systems and more. Springer, Berlin, Heidelberg, 2010. 242-259.

2. Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation computer systems 29.7 (2013): 1645-1660.

3. Al-Fuqaha, Ala, et al. "Internet of things: A survey on enabling technologies, protocols, and applications." IEEE Communications

Surveys & Tutorials 17.4 (2015): 2347-2376. 4. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks 54.15 (2010): 2787-2805.

5. Stankovic, John A. "Research directions for the internet of things." IEEE Internet of Things Journal 1.1 (2014): 3-9.

6. Deogirikar, Jyoti, and Amarsinh Vidhate. "Security attacks in IoT: a survey." I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on. IEEE, 2017.

7. Yang, Yuchen, et al. "A survey on security and privacy issues in internet-of-things." IEEE Internet of Things Journal 4.5 (2017):

1250-1258. 8. Le, Anhtuan, et al. "Specification-based IDS for securing RPL from topology attacks." Wireless Days (WD), 2011 IFIP. IEEE, 2011.

9. Rehman, Abdul, et al. "Rank attack using objective function in RPL for low power and lossy networks." Industrial Informatics and

Computer Systems (CIICS), 2016 International Conference on. IEEE, 2016. 10. Le, Anhtuan, et al. "The impact of rank attack on network topology of routing protocol for low-power and lossy networks." IEEE

Sensors Journal 13.10 (2013): 3685-3692.

11. Wallgren, Linus, Shahid Raza, and Thiemo Voigt. "Routing Attacks and Countermeasures in the RPL-based Internet of Things." International Journal of Distributed Sensor Networks9.8 (2013): 794326.

18-22

6. Authors: S. B. Rashmi, Dr. Siva S Yellampalli

Page 80: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Paper Title: Design and Implementation of Low Noise Amplifier At 60ghz Using Current Mirror Feedback

Abstract: This discourse used 45nm CMOS technology to design a Low noise amplifier for a Noise figure <

2dB and gain greater than 13dB at the 60GHz unlicensed band of frequency. A single stage, primary cascode

LNA is modeled and its small signal model is analyzed. Common source structure is hired in the driver stage to

escalate the output power with single stage contours. To enhance small signal gain, simple active transistor

feedback and cascode feedback configurations are designed and appended to the basic LNA. In addition to this,

current re-use inductor is designed and added to the cascode amplifier which is deliberated to give low power

and low noise figure. Small signal analysis of simple active transistor feedback and current re-use inductor has

been presented. The measurement results indicated that the input match and the output gain at 60GHz achieves -

8dB and 13dB respectively with the supply voltage of 900mV. The frequency response obtained is a narrow

band response with 6GHz of bandwidth. The circuit is simulated by Cadence Virtuoso tool. The layout of the

related circuit is drawn by means of the Virtuoso Layout editor with total size of 0.1699μm2.

Keywords: 60GHz, Current mirror feedback, LNA, low noise figure, RF amplifier.

References: 1. Ahmed, M., Shoaib, N., & Mahmood, I. (2011). Design, Analysis and Optimization of Multistage LNA at KU Band. Journal of Space

Technology, 1, 95-100. 2. Borremans, J., Raczkowski, K., & Wambacq, P. (2009). A Digitally Controlled Compact 57-to-66 GHz Front-End in 45 nm Digital

CMOS. Paper presented at the Solid-State Circuits Conference - Digest of Technical Papers, San Francisco, CA.

3. Chunhua, W., & Qiuzhen, W. (2011). A 0.18 um CMOS Low Noise Amplifier Using a Current Reuse Technique for 3.1–10.6 GHz UWB Receivers. Journal of Semiconductors, 32.

4. Cohen, E., Ravid, S., & Ritter, D. (2008). An Ultra Low Power LNA with 15dB Gain and 4.4 dB NF in 90nm CMOS Process for 60

GHz Phase Array Radio. Paper presented at the Radio Frequency Integrated Circuits Symposium, Atlanta, GA. 5. Fan, X., Zhang, H., & Sinencio, E. S. (2008). A Noise Reduction and Linearity Improvement Technique for a Differential Cascode

LNA. IEEE Journal of Solid-State Circuits, 43(3), 588–599. doi:10.1109/JSSC.2007.916584

6. Feng, C., Yu, X. P., Lim, W. M., & Yeo, K. S. (2013). Compact 2.1–39 GHz Self-Biased Low-Noise Amplifier in 65 nm CMOS Technology. IEEE Microwave and Wireless Components Letters, 23(12), 662–664. doi:10.1109/LMWC.2013.2284778

7. Hsieh, C. A., Lin, Y. H., Hsiao, Y. H., & Wang, H. (2013). A 60 GHz Low Noise Amplifier with BuiltinLinearizer. Paper presented at

the Microwave Symposium Digest (IMS), Seattle, WA. doi:10.1109/MWSYM.2013.6697369 8. Hsu, M. T., Du, J. H., & Chiu, W. C. (2012). Design of Low Power CMOS LNA with Current-Reused and Notch Filter Topology for

DS-UWB Application. Wireless Engineering and Technology, 3(03), 167–174. doi:10.4236/wet.2012.33024

9. Huang, B. J., Wang, C. H., Chen, C. C., Lei, M. F., Huang, P. C., Lin, K. Y., & Wang, H. (2009). Designand Analysis for 60GHz Low Noise Amplifier with RF ESD Protection. IEEE Transactions on Microwave Theory and Techniques, 57(2), 298–305.

doi:10.1109/TMTT.2008.2011158 10. Inui, C., Lai, I. C. H., & Fujishima, M. (2007). 60GHz CMOS Current-Reuse Cascade Amplifier. Paper presented at the Asia-Pacific

Microwave Conference, Bangkok.

11. Kim, N., Aparin, V., Barnett, K., & Persico, C. (2006). A Cellular-Band CDMA CMOS LNA Linearized Using Active Post-Distortion. IEEE Journal of Solid-State Circuits, 41(7), 1530–1534. doi:10.1109/ JSSC.2006.873909

12. Kim, T. S., & Kim, B. S. (2006). Post-Linearization of Cascode CMOS LNA using Folded PMOS IMD Sinker. IEEE Microwave and

Wireless Components Letters, 16(4), 182–184. doi:10.1109/LMWC.2006.872131 13. Kim, Y. M., Han, H., & Kim, T. W. (2013). A 0.6-V +4 dBm IIP3 LC Folded Cascode CMOS LNA With gm Linearization. IEEE

Transactions on Circuits and Wystems. II, Express Briefs, 60(3), 122–126. doi:10.1109/TCSII.2013.2240811

14. Kuo, H. C., & Chuang, H. R. (2013). A 60-GHz High-Gain, Low-Power, 3.7-dB Noise-Figure. Paper presented at the 8th European Microwave Integrated Circuits Conference, Nuremberg.

15. Kuo, J. J., Tsai, Z. M., Lin, K. Y., & Wang, H. (2011). Design and Analysis of Novel Linearization Technique of Cascode Cell in a 60-

GHz CMOS Demodulator. IEEE Transactions on Microwave Theory and Techniques, 59(2), 456–465. doi:10.1109/TMTT.2010.2095424

16. Lee, J. Y., Park, H. K., Chang, H. J., & Yun, T. Y. (2012). Low-Power UWB LNA with Common-Gate and Current-Reuse Techniques.

IET Microwaves. Antennas & Propagation, 6, 793–799.

23-28

7.

Authors: H. N. Shwethashree, C. Kanagasabhapati, Dr. Siva S Yellampalli

Paper Title: Design of CABAC Entropy Decoding, Inverse Quantization, Inverse Transform Blocks of H.264

Decoder Using Verilog HDL

Abstract: Video compression/decompression is a term used to define a method for compressing or

decompressing digital video. There are different video compression /decompression standards. H.264 which is

also known as Advanced Video Coding is a paradigm, most commonly used these days. The objective of

developing H.264 is to devise a standard which can impart good quality of video at a nether bit rates as

compared to previous standards. To improve compression efficiency, H.264 encoders/decoders uses complex

algorithms and modes which require more power. From studies we know that software-based implementations

of these encoders/decoders on DSPs and CPUs suffer by few real time limitations. Hence hardware

implementation of video encoders and decoders are necessary. Here in this paper Entropy decoding, Inverse

Transform and Inverse Quantization blocks of H.264 Video decoder are designed using Verilog and simulated

by Xilinx ISE Simulator.

Keywords: H.264, CABAC, Inverse Quantization, Inverse Transform, Xilinx ISE.

References: 1. Shriram K Vasudevan, Subashri V, Sasikumar P, “H.264 Decoder Design using Verilog", International Journal of Computer

Applications, Volume 1 - No.4, pp. 0975 – 8887, 2010. 2. B. Juurlink et al., “Scalable Parallel Programming Applied to H.264/AVC Decoding”, Springer Briefs in Computer Science, DOI

10.1007/978-1-4614-2230-3_2, © The Author(s) 2012. 3. Yi-Tsen Chen, Chun-Jen Tsai, “Design of a Unified Entropy IP for H.264 CAVLC/CABAC Decoding”, National Chiao Tung

University, July. 2008.

4. Detlev Marpe, Thomas Wiegand and Gary J. Sullivan, “The H.264/MPEG4 Advanced video coding standard and its Applications”,

29-33

Page 81: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

IEEE Communications Magazine, vol.44, no.8, pp.134-144, Aug.2006.

5. M. Bariani, P. Lambrushchini, M. Raggio, L. Pezzoni, “An optimized SIMD implementation of the HEVC/H.265 video decoder”, IEEE Trans. On Wireless Telecommunications Symposium (WTS), pp:1934-5070, June. 2014.

6. D. Marpe, T. Wiegand and H. Schwarz, “Context-based adaptive binary arithmetic coding in the H.264/AVC Video compression

standard”, IEEE Trans. on circuits and systems for video technology, vol.13, no. 7, pp.620-636, July.2003.

7. Varan Jain, Manisha Ingle, “Hardware Software co-design for CABAC Entropy Decoder”, International Conference on Inventive Computation Technologies (ICICT), 26-27 Aug.2016.

8. Ozgur Tasdzen, Ilker Hamzaoglu, “A high performance and low-cost hardware architecture for H.264 Transform and Quantization algorithms”, Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey, 13th European Signal Processing Conference, 2005.

9. Tiago Dis, Luis Rosario, Nuno Roma, Leonel Sousa, “High Performance Unified Architecture for Forward and Inverse Quantization in H.264/AVC”, 15th Euro micro Conference on Digital System Design, 2012.

10. Yi-Chih Cao, Shih-Tse Wei, Bin-Da Liu, Jar-Ferr Yang, “Combined CAVLC Decoder, Inverse Quantizer, and Transform Kernel in

Compact H.264/AVC Decoder”, IEEE Transactions on Circuits and Systems for Video Technology, Volume: 19, Issue: 1, Jan. 2009. 11. Taheni Damak, Hassen Loukil, Ahmed Ben Atitallah, Nouri Masmoudi, “Software and Hardware Architecture of H.264/AVC

Decoder”, International Journal of Computer Applications (0975-8887), Volume: 59, No. 19, Dec. 2012.

12. Richardson, I.E.G, ”H.264/AVC and MPEG4 video compression. Video Coding for Next Generation Multimedia”, Wiley editor, 2003. 13. G. Dileep Vamshi, P. Ramakrishna,” VLSI Implementation of H.264 Transform and Quantization Algorithms”, International Journal

of Science and Research (IJSR), India Online ISSN: 2319-7064, Volume: 2, Issue 3, March. 2013.

14. Henrique S. Malvar, Antti Hallapuro, Marta Karczewicz, Louis Kerofsky,” Low Complexity Transform and Quantization in H.264/AVC”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, no. 7, July. 2003.

8.

Authors: A. Pallavi, C. Kanagasabapathi, Dr. Siva S Yellampalli

Paper Title: Host Based SystemC-TLM2.0 Simulation Model for Memory Device Driver Verification

Abstract: With increasing complexity in SoC architecture in today’s embedded systems demand for more

software applications is increasing. Time to market plays an important role for any product to win the market.

Device drivers and stability pre-silicon (prior to silicon arrival) plays a very important role. To develop,

integrate, system test and debug device drivers like Memory, I2C, PCIE, USB etc. with real world use cases,

availability of hardware board is necessity. Availability of hardware board traditionally happens towards the

later stages of the project life cycle. The best solution is using SystemC-TLM2.0 simulation models to verify

device drivers early. This ensures the readiness of device drivers even before the hardware availability and

effectively reduces time to market (TTM). Aim of this thesis is to develop Host based SystemC-TLM2.0

simulation model for Memory device driver verification.

Keywords: System C, TLM2.0, TTM, Memory device drivers.

References: 1. Jon Connell, ARM , Bruce Johnson, Synopsys, Inc , “Early Hardware/Software Integration Using SystemC 2.0” , Class 552, ESC

San Francisco 2002

2. Luca Fossati, Politecnico di Milano (Italy): 2009-2010 , European Space Agency/ESTEC: 2010-2012, “Development of the SystemC model of the LEON2/3 Processor”, ESA contract 20921/07/NL/JD

3. Claude Helmstetter, Vania Joloboff, “SimSoC: A SystemC TLM integrated ISS for full system simulation”, INRIA

4. Sammidi Mounika and Renuka B S, “An Approach to Reduce Time to Market in today’s Mobile Market”, IEEE Computer Society, IEEE Standard for Standard, SystemC® Language Reference Manual, IEEE Std 1666™-2011

5. M. Caldari*, M. Conti*, M. Coppola**, S. Curaba**, L. Pieralisi*, C. Turchetti*, “Transaction-Level Models for AMBA Bus Architecture Using SystemC 2.0”, 1530-1591/03, IEEE 2003

6. David C.Black, Jack Danovan, “SystemC: From the Ground Up”©2004 Kluwer Academic Publishers,Eklectic Ally,Inc

34-37

9.

Authors: Mr. Guru Kumar Lokku, Dr. G. Harinatha Reddy, Dr. M. N. Giri Prasad

Paper Title: Automatic Face Recognition for Various Expressions and Facial Details

Abstract: Face Recognition Technique (FRT) was a unique Biometric Technique which tries to spot the

people from still images or video frames by using techniques of pattern recognition. Face recognition includes

both face identification and face verification (authentication). The FR Design system follows two basic steps i.e.

Feature extraction and classification of patterns. Automated FR finds many applications in real time

environment ranging from Social Media, surveillance to biometric authentications. Many state-of-the-art face

recognition techniques had been implemented, but the Automated Face Recognition (AFR) taken by digital

cameras in unconstraint real‐world environment continues to be terribly difficult, since it involves vital

variations in each acquisition conditions, yet as in facial expressions and in pose variations. Thus, this paper

presents the theme of computer based automatic face recognition in lightweight of the most contests therein

areas with developed solutions that supports applications of signal, image processing and computing strategies.

Keywords: Face acknowledgement, HOG, Machine learning, PCA, Wild.

References: 1. M. A. Abuzneid and A. Mahmood, "Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation

Neural Network," in IEEE Access, vol. 6, pp. 20641-20651, 2018.

2. C. Ding and D. Tao, "Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face Recognition," in IEEE

Transactions on Pattern Analysis and Machine Intelligence, vol. 40, no. 4, pp. 1002-1014, 1 April 2018.

3. J. Lei, Q. Han, L. Chen, Z. Lai, L. Zeng and X. Liu, "A Novel Side Face Contour Extraction Algorithm for Driving Fatigue Statue

Recognition," in IEEE Access, vol. 5, pp. 5723-5730, 2017.

4. S. P. Mudunuri and S. Biswas, "Low Resolution Face Recognition Across Variations in Pose and Illumination," in IEEE Transactions

on Pattern Analysis and Machine Intelligence, vol. 38, no. 5, pp. 1034-1040, 1 May 2016.

5. A.Punnappurath, A. N. Rajagopalan, S. Taheri, R. Chellappa and G. Seetharaman, "Face Recognition Across Non-Uniform Motion

38-42

Page 82: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Blur, Illumination, and Pose," in IEEE Transactions on Image Processing, vol. 24, no. 7, pp. 2067-2082, July 2015.

6. F. Juefei-Xu, K. Luu and M. Savvides, "Spartans: Single-Sample Periocular-Based Alignment-Robust Recognition Technique Applied

to Non-Frontal Scenarios," in IEEE Transactions on Image Processing, vol. 24, no. 12, pp. 4780-4795, Dec. 2015.

7. W. Deng, J. Hu, J. Lu and J. Guo, "Transform-Invariant PCA: A Unified Approach to Fully Automatic Face Alignment,

Representation, and Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 6, pp. 1275-1284,

June 2014.

8. H. T. Ho and R. Chellappa, "Pose-Invariant Face Recognition Using Markov Random Fields," in IEEE Transactions on Image

Processing, vol. 22, no. 4, pp. 1573-1584, April 2013.

9. M. Yang, L. Zhang, S. C. Shiu and D. Zhang, "Robust Kernel Representation With Statistical Local Features for Face Recognition,"

in IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 6, pp. 900-912, June 2013.

10. W. W. W. Zou and P. C. Yuen, "Very Low-Resolution Face Recognition Problem," in IEEE Transactions on Image Processing, vol.

21, no. 1, pp. 327-340, Jan. 2012.

11. Geng, Z. Zhou and K. Smith-Miles, "Individual Stable Space: An Approach to Face Recognition Under Uncontrolled Conditions,"

in IEEE Transactions on Neural Networks, vol. 19, no. 8, pp. 1354-1368, Aug. 2008.

12. X. Chai, S. Shan, X. Chen and W. Gao, "Locally Linear Regression for Pose-Invariant Face Recognition," in IEEE Transactions on

Image Processing, vol. 16, no. 7, pp. 1716-1725, July 2007.

13. M. Pantic and I. Patras, "Dynamics of facial expression: recognition of facial actions and their temporal segments from face profile

image sequences," in IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 36, no. 2, pp. 433-449, April

2006.

14. Dagher and R. Nachar, "Face recognition using IPCA-ICA algorithm," in IEEE Transactions on Pattern Analysis and Machine

Intelligence, vol. 28, no. 6, pp. 996-1000, June 2006.

15. M.Turk, A.P. Pentland, "Face Recognition Using Eigenfaces", Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 586-

591, 1991.

16. Y. Chen, C. Han, C. Wang and K. Fan, "Face Recognition Using Nearest Feature Space Embedding," in IEEE Transactions on Pattern

Analysis and Machine Intelligence, vol. 33, no. 6, pp. 1073-1086, June 2011.

10.

Authors: C. Kanagasabapathi, Siddamma, Siva S Yellampalli

Paper Title: Design of Programmable Pixel Shader Computing Unit

Abstract: With increased focus on improved Graphics, the gaming industries for computer and mobile devices

requires more complex graphical algorithms, which in need of better computational resources. In general

graphical computation requires more computational units, which will be major constraint in mobile devices as it

demands for more power. In order to develop such efficient computational units, one need to focus on the

Graphical pipeline to have better visual effects. In this paper design of programmable Pixel shader computing

unit is discussed. In GPU, the Pixel shaders are used to process and manipulate the each pixel. Also the Pixel

Shaders are used to provide final coloring to the processed data. Here the programmable Pixel shader computing

unit design is discussed, which help the programmer to add his own code for achieving better visual effects or

results. The possible Instructions of Pixel shader are designed using Verilog HDL. The SIMD (Single Instruction

Multiple Data) concept is adopted for the designing of each instruction.

Keywords: GPU, Pixels, Pixel Shader, Graphical Rendering, SIMD.

References: 1. J. Nickolls and W. J. Dally, “The GPU Computing Era,” IEEE Mirco, pp. 56-69, Mar./Apr., 2010.

2. B.-G. Nam, H. Kim, and H.-J. Yoo, “A Low-Power Unified Arithmetic Unit for Programmable Handheld 3-D Graphics Systems,” IEEE Journal of Solid-State Circuits, vol. 42, no. 8, pp. 1767-1778, Aug. 2007.

3. B.-G. Nam, H. Kim, and H.-J. Yoo, “Power and Area-Efficient Unified Computation of Vector and Elementary Functions for Handheld

3D Graphics Systems,” IEEE Trans. Computers, vol. 57, no. 4, pp. 490-504, Apr. 2008.

4. B.-G. Nam and H.-J.Yoo “An Embedded Stream Processor Core Based on Logarithmic Arithmetic for a Low-Power 3-D Graphics

SoC,” IEEE Journal of Solid-State Circuits, vol. 44, no. 5, pp. 1554-1570, May 2009. 5. By Jason Zink, Matt Pettineo, Jack Hoxley, “Practical Rendering and Computation with Direct3D 11” 2011

6. Ed Angel (University of New Mexico), Dave Shreiner(ARM) , “Teaching a Shader-Based Introduction to Computer Graphics”, IEEE

Computer Graphics and Application. Revised 10 Feb. 2011. 7. Shen-Fu Hsiao, Po-Han Wu, Chia-Sheng Wen, and Li-Yao Chen, “Design of a Programmable Vertex Processor in OpenGL ES 2.0

Mobile Graphics Processing Units” 2013 International Symposium on VLSI Design, Automation, and Test (VLSI-DAT)2013.

8. James C. Leiterman, “Learn Vertex and Pixel Shader Programming with DirectX® 9” 2004. 9. Yu-Jung Chen, Chao-Hsien Hsu, Chung-Yao Hung, Chia-Ming Chang, Shan-YiChuang, Liang-Gee Chen, and Shao-Yi Chien, “A

130.3 mW 16-Core Mobile GPU With Power-Aware Pixel Approximation Techniques”, IEEE Journal Of Solid-State Circuits, Vol.50,

No.9, September 2015. 10. Ian Bratt, “The ARM® Mali-T880 Mobile GPU”, 2015 IEEE Hot Chips 27 Symposium (HCS), 2015.

11. Kwang-Yeob Lee, Tae-Ryoung Park, Jae-Chang Kwak, Yong-Seo Koo, “A Design of Multi-threaded Shader Processor with Dual-

Phase Pipeline Architecture”, 2009 First International Conference on Advances in Multimedia 2009.

43-46

11.

Authors: Shaik. Muqthiar Ali, Dr. Mareddy Padma Lalitha, Dr. N. Visali

Paper Title: Analysis of Transmission Cost Allocation Strategies with Reliability for Deregulated Systems

Abstract: This paper presents a learning review of various strategies related to the improvement of the

reliability for the deregulated system, for instance, Genetic Algorithms (GA), Tabu Search (TS), heuristic

calculations and system based techniques. These methodologies were produced for advancing reliability as either

software or hardware exclusively. Besides, the cost segments related with limit utilize and reliability advantage

charges are resolved and various optimization techniques are acknowledged of action of the goal work.

Keywords: Transmission cost allocation (TCA), Allocation Tier (AL) Transacted Power(TPO) deregulated

47-54

Page 83: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

electricity market, loss cost, Genetic algorithm, TS, SA

References: 1. Moradi, Mohammad Hasan and M. Abedini, "A combination of genetic algorithm and particle swarm optimization for optimal

DG location and sizing in distribution systems", An International Journal of Electrical Power & Energy Systems, Vol.34, No.1,

pp.66-74, 2012 2. Amanulla, B., SaikatChakrabarti and S. N. Singh, "Reconfiguration of power distribution systems considering reliability and

power loss", IEEE transactions on power delivery, Vol.27, No.2, pp.918-926, 2012

3. Borges and Carmen Lucia Tancredo, "An overview of reliability models and methods for distribution systems with renewable energy distributed generation", An International Journal of Renewable and sustainable energy reviews, Vol.16, No.6, pp.4008-

4015, 2012

4. Awad, Ahmed SA, Tarek HM El-Fouly and Magdy MA Salama, "Optimal distributed generation allocation and load shedding for improving distribution system reliability", An International Journal of Electric Power Components and Systems, Vol.42, No.6,

pp.576-584, 2014

5. da Silva, Armando M. Leite, Joao Guilherme de Carvalho Costa and Luis Henrique Lopes Lima, "A new methodology for cost allocation of transmission systems in interconnected energy markets", IEEE Transactions on Power Systems, Vol.28, No.2,

pp.740-748, 2013 Usaola, Julio, "A transaction-based method for allocation of transmission grid cost and losses", An

International Journal of Electric power systems research, Vol.76, No.6-7, pp.395-403, 2006 6. Abdelkader and Sobhy M, "Transmission loss allocation through complex power flow tracing", IEEE transactions on Power

Systems, Vol.22, No.4, pp.2240-2248, 2007

7. Mutale, J., G. Strbac, S. Curcic and N. Jenkins, "Allocation of losses in distribution systems with embedded generation", IET

Proceedings-Generation, Transmission and Distribution, Vol.147, No.1, pp.7-14, 2000

8. Reta, R. and A. Vargas, "Electricity tracing and loss allocation methods based on electric concepts", IEE Proceedings-Generation,

Transmission and Distribution, Vol.148, No.6, pp.518-522, 2001 9. Chung, Koo-Hyung, Balho H. Kim, Don Hur and Jong-Keun Park, "Transmission reliability cost allocation method based on

market participants’ reliability contribution factors", An International Journal of Electric power systems research, Vol.73, No.1,

pp.31-36, 2005 10. Gross, George and Shu Tao, "A physical-flow-based approach to allocating transmission losses in a transaction framework",

IEEE Transactions on Power Systems, Vol.15, No.2, pp.631-637, 2000

11. Mezger, Alfredo J. and Katia C. de Almeida, "Short term hydrothermal scheduling with bilateral transactions via bundle method", An International Journal of Electrical Power & Energy Systems, Vol.29, No.5, pp.387-396, 2007

12. Roh, Jae Hyung, Mohammad Shahidehpour and Lei Wu. "Market-based generation and transmission planning with

uncertainties", IEEE Transactions on Power Systems, Vol.24, No.3, pp.1587-1598, 2009 13. Abhyankar, A. R., S. A. Soman and S. A. Khaparde, "Optimization approach to real power tracing: an application to transmission

fixed cost allocation", IEEE transactions on power systems, Vol.21, No.3, pp.1350-1361, 2006

14. Conejo, Antonio J., Francisco D. Galiana and IvanaKockar, "Z-bus loss allocation" IEEE Transactions on Power Systems, Vol.16, No.1, pp.105-110, 2001

15. Kang, Qin-Ma, Hong He, Hui-Min Song and Rong Deng, "Task allocation for maximizing reliability of distributed computing

systems using honeybee mating optimization", An International Journal of Systems and Software, Vol.83, No.11, pp.2165-2174, 2011

16. Orfanos, George A., Pavlos S. Georgilakis and Nikos D. Hatziargyriou, "A more fair power flow based transmission cost

allocation stragey plan considering maximum line loading for N-1 security", IEEE Transactions on Power Systems, Vol.28, No.3, pp.3344-3352, 2013

17. Abdala and Manuel A, "Transmission pricing in privately-owned electricity grids: An illustration from the Argentine electricity

pool", An International Journal of Energy Economics, Vol.30, No.4, pp.1284-1305, 2008 18. Radzi, N. H., R. C. Bansal, Z. Y. Dong, M. Y. Hassan and K. P. Wong, "RETRACTED: An efficient distribution factors

enhanced transmission pricing method”, An International Journal of NEM transmission charging stragey plan, pp.319-328, 2013

12.

Authors: K. Naresh, Dr. P. Umapathi Reddy, Dr. P. Sujatha

Paper Title: Wind Based Doubly Fed Induction Generator for Effective Rotor Side Converter Control

Abstract: The presence of voltage swells over the DC connection of the successful rotor side converter of a

Doubly Fed Induction Generator (DFIG) is natural because of vulnerability in twist vitality and in addition the

variety of rotor precise speed. This can weaken the execution of the consecutive converter associated on the

rotor side of the DFIG. Subsequently, the principle goal of this paper is to plan a criticism linearization

procedure to dispose of the dc-interface voltage swell and additionally acquire solidarity control factor. In this

paper, the dynamic demonstrating of DFIG alongside the viable rotor side converter is performed. The criticism

linearization strategy controls the inward elements of the successful rotor side converter by considering the rotor

q-pivot current and DC connect voltage. The MATLAB recreation results portray the viability of the voltage

control strategy, through the varieties of rotor side channel, DC interface capacitance and vulnerabilities in the

DC connect voltage.

Keywords: Effective rotor side converters, DC connect voltage, feedback linearization, voltage control.

References: 1. G. abad, J. Lopez, M. A. Rodriguez, L. Marroyo, G. Iwanski, “ Double Fed Induction Machine”, IEEE press.

2. V. Blasko and V. Kaura., “A New Mathematical model and Control of a three phase AC-DC voltage source Converter”, IEEE Transactions on Power Electronics., vol. 12, no. 1, pp. 116-123, Jan. 1997.

3. Yang.Ye,M.Kazerani,V.H.Quintana “Modeling,Control and Implementation of Three phase PWM Converters”, IEEE

Transactions on Power electornics,vol.18,no.3,pp 857-863,May 2003. 4. M. T. T sai and W. I. Tsai, “Analysis and design of three-phase AC-to-DC converters with high power factor and near optimum

feed forward,” IEEE Transactions Industrial Electronics, vol.46, pp. 263–273, June 1999.

5. R. Wu, S. B. Dewan, G. R. Slemon, “A PWM ac/dc converter with fixed switching frequency,” IEEE Transactions on Industry. Applications, vol. 26,pp. 880–885, Sept. 1990.

6. P. Verdelho and G. D. Marques, “DC voltage control and stability analysis of PWM voltage type reversible rectifiers,” IEEE

Transactions on Industrial Electron.,vol.45, pp.263–273, Apr.1998. 7. A.Draou, Y. Sato, and T. Kataoka, “A new state feedback based transient control of PWM AC to DC type converters,” IEEE

Transactions on Power Electronics. vol. 10, pp. 716– 724, Nov. 1995.

8. H.Komurcugil,O.Kukrer,”A Novel Current- Control Method for Three Phase AC-DC Voltage- Source Converters ”IEEE Transactions on Industrial Electronics,Vol.46,No.3,June 1999.

55-60

Page 84: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

9. B.Deng Ge Li,J.Wang,X.Wei,Fei Su,” Dynamic Control of Seizure States with Input Output Linearization Method Based on

The Pinsky- Rinzel Model” 7th International conference on Bio Medical Engineering and Informatics 2014. 10. Rusong Wu, Shashi.B.D,Gordon.R.S,”Analysis of a PWM ac to dc Voltage Source Converter under the Predicted Current

Control with a Fixed Switching Frequency” IEEE Transactions on Industry applications,Vol.27,No.4,July/Aug 1991.

11. T.-S. Lee, “Input output linearization and zero dynamics control of three phase AC/DC voltage source converters”, IEEE

Transactions on Power Electronics, vol. 18, no. 1, January 2003.

12. J. Sheok. Kim and S. Ki. Sul, “New control scheme for ac/dc/ac converter without dc link electrolytic capacitor,” in IEEE

pesc’93, Seattle, WA,pp.300-306, June 1993. 13. L. Malesani, L. Rossetto, P. Tenti, and P. Tomasin, “AC- DC-AC PWM converter with reduced energy storage in the dc link,”

IEEE Transactions inIndustry.Applications.,vol.31,pp. 287-292, Mar/Ap 1995.

14. E.sehirli,M.Altinay,”Input- outputLinearization”Kastamonu University online www.intechopen.com. 15. H.komurcugil,O.kukrer”Lyapunov based control for three phase PWM AC/DC voltage-source inverters”, IEEE Transactions on

Power Electronics,Vol.13,no.5,pp.801- 813,Sep.1998.

16. D.C.Lee,G,M. Lee, Ki-do.Lee, “DC Bus voltage control of Three phase AC/DC PWM converters using feedback linearization”,IEEE Transactions. Industry. Applications., vol.36, no.3, pp. 826-833, May/June 2000.

17. T.s.Lee,T.kune shiang”Input output Linearization control with load estimator of Three phase AC/DC voltage source

converters”IEEE PSEC,Vol.2,pp.791-795,2002. 18. Shuai, Xiaoping Zhang” Input Output Linearization and Stabilization Analysis of Internal Dynamics of Three Phase AC/DC

Voltage Source Converters” International Conference on Electrical Machines and Systems (ICEMS), 2010.

19. P. Rioual, H. Pouliquen, and J. P. Louis, “Non linear control of PWM rectifier by feedback linearization and exact PWM control,” in Proc.IEEE PESC’94 Conference, June 1994, pp. 1095–1102.

13.

Authors: J. A. Ganeswari, Dr. R. Kiranmayi

Paper Title: PV with Boost Converter Integrated Three-Level Inverter Fed PMSM Drive for Agricultural

Application

Abstract: Apprehension of inverter fed electric motors is made possible with the trends in power electronic

technology. Permanent magnet synchronous motor (PMSM) is one motor replaced conventional electric motors

with attractive features like compactness, lightweight and efficiency. This paper presents a PV (Photo-voltaic)

fed PMSM drive system for water pumping application. Photo-voltaic system is one among the renewable

sources available free from atmosphere which can generate electricity with ease. Output of PV is fed to a boost

converter to generate required level of voltage to PMSM. Boost output is fed to a driving inverter to PMSM.

Closed-loop boost converter feeding PMSM drive is analyzed. PMSM drive is a closed-loop system design to

run at commanded speed. PV fed PMSM drive is validated with fixed speed and variable speed conditions.

Keywords: PV, PMSM Drive, Boost, Inverter, Closed Loop Controller.

References: 1. R. Krishnan, “Permanent Magnet Synchronous and Brushless DC Motor Drives,” CRC Press, Taylor and Francis Group. ISBN-978-

0-8247-53849

2. Paul C.Krause, Oleg Wasynczuk, Scott D.Sundhoff, “Analysis of Electric Machinery and Drive Systems,” IEEE Press Power Engineering society ISBN-0-471-14326-X

3. H,Madadi Kojabad, G.Ahrabian, “Simulation and analysis of the interior permanent magnet synchronous motor as a brushless AC-

drive,” Science direct / Simulation practice and theory 7(2000) 691-707 4. Pragasan Pillay, R.Krishnan.” Modeling of Permanent Magnet Motor Drives”, IEEE vol.35,no.4,november 1988

5. R. Dhaouadi, N. Mohan and L. Norum, "Design and implementation of an extended Kalman filter for the state estimation of a

permanent magnet synchronous motor," IEEE Trans. Industrial Electronics, vol. 6, Jul. 1991, pp.491- 497. 6. K. Rajashekara, A. Kawamura and K. Matsuse, "Sensorless control of AC motor drives", New York: IEEE Press, 1996.

7. G. Sree Lakshmi, S. Kamakshaiah and T. R. Das, "Closed loop PI control of PMSM for hybrid electric vehicle using three level diode

clamped inverter for optimal efficiency," Energy Efficient Technologies for Sustainability (ICEETS), 2013 International Conference on, Nagercoil, 2013, pp. 754-759.

8. H. H. Lee and U. H. Jeong "A Study on Speed Synchronization for Multi Motors using Controller Area Network" IEEE Trans. Ind. Appl., vol. 44 no. 4 2000.

9. L. Feng Y. Koren and J. Borenstein "Cross-Coupling Motion Controller for Mobile Robots" IEEE Trans. on Control Systems

Technology, vol. 1 December 1993. 10. D. Noel, F. Sozinho, D. Wilson and K. Hatipoglu, "Analysis of large scale photovoltaic power system integration into the existing

utility grid using PSAT," SoutheastCon 2016, Norfolk, VA, 2016, pp. 1-7.

11. M. Ouada M. S. Meridjet N. Talbi "Optimization photovoltaic pumping system based BLDC using fuzzy logic MPPT control" Proc. Int. Renew. Sustain. Energy Conf. (IRSEC) pp. 27-31 Mar. 2013.

12. Terki A. Moussi A. Betka N. Terki "An improved efficiency of fuzzy logic control of PMBLDC for PV pumping system" Appl.

Math. Model. vol. 36 no. 3 pp. 934-944 Mar. 2012. 13. Anurag, N. Deshmukh, A. Maguluri and S. Anand, "Integrated DC-DC Converter Based Grid-Connected Transformerless

Photovoltaic Inverter with Extended Input Voltage Range," in IEEE Transactions on Power Electronics, vol. PP, no. 99, pp. 1-1.

14. J. A. Ganeswari, Dr. R. Kiranmayi, 'Performance Improvement for DC Boost Converter with Fuzzy Controller, 2nd International Conference on Inventive Systems and Control (ICISC 2018).

61-64

14.

Authors: A. Geetha, N. P. Subramaniam

Paper Title: PI CONTROL OF CURRENT-FED DUAL ACTIVE BRIDGE CONVERTER FOR DC

MICROGRID

Abstract: A detailed modelling of soft-switching isolated current-fed dual active bridge (CFDAB) DC/DC

converter is presented. This converter is suitable for an interface between two DC buses in a microgrid but is not

controlled. The model of the converter is derived with the help of state space averaging method. Based on this

modelling, the PI controller designed to improve the operation of the CFDAB converter. Simulation results using

MATLAB/Simulink with controller design to verify the stability of the converter and validated performance of

the system used for DC microgrid applications of between two buses. The effectiveness of the controller has

justified in terms of line, load variation and tracking the reference values.

Keywords: Bidirectional, Current-fed, DC Microgrid, Dual Active Bridge, PI control.

65-70

Page 85: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

References: 1. Rocabert, J., Luna, A., Blaabjerg, F., & Rodriguez, P. (2012). Control of power converters in AC microgrids. IEEE transactions on

power electronics, 27(11), 4734-4749.

2. Hossain, M., Pota, H., & Issa, W. (2017). Overview of AC microgrid controls with inverter-interfaced generations. Energies, 10(9),

1300. 3. Dragičević, T., Lu, X., Vasquez, J. C., & Guerrero, J. M. (2016). DC microgrids—Part I: A review of control strategies and

stabilization techniques. IEEE Transactions on power electronics, 31(7), 4876-4891.

4. Elsayed, A. T., Mohamed, A. A., & Mohammed, O. A. (2015). DC microgrids and distribution systems: An overview. Electric Power Systems Research, 119, 407-417.

5. Justo, J. J., Mwasilu, F., Lee, J., & Jung, J. W. (2013). AC-microgrids versus DC-microgrids with distributed energy resources: A

review. Renewable and sustainable energy reviews, 24, 387-405. 6. Lucia, O., Cvetkovic, I., Sarnago, H., Boroyevich, D., Mattavelli, P., & Lee, F. C. (2013). Design of home appliances for a DC-

based nanogrid system: An induction range study case. IEEE Journal of Emerging and Selected Topics in Power Electronics, 1(4),

315-326. 7. Symanski, D. P. (2011, April). Residential & Commercial Use Of DC Power. In UL & NFPA-Low Voltage Direct Current

Workshop. Arlington, Virginia: EPRI.

8. Song, W., Hou, N., & Wu, M. (2018). Virtual Direct Power Control Scheme of Dual Active Bridge DC–DC Converters for Fast Dynamic Response. IEEE Transactions on Power Electronics, 33(2), 1750-1759.

9. Wu, T. F., Yang, J. G., Kuo, C. L., & Wu, Y. C. (2014). Soft-switching bidirectional isolated full-bridge converter with active and

passive snubbers. IEEE Transactions on Industrial Electronics, 61(3), 1368-1376.

10. Zhang, K., Shan, Z., & Jatskevich, J. (2017). Large-and small-signal average-value modeling of dual-active-bridge DC–DC

converter considering power losses. IEEE Transactions on Power Electronics, 32(3), 1964-1974.

11. Gammeter, C., Krismer, F., & Kolar, J. W. (2016). Comprehensive conceptualization, design, and experimental verification of a weight-optimized all-SiC 2 kV/700 V DAB for an airborne wind turbine. IEEE Journal of Emerging and Selected Topics in Power

Electronics, 4(2), 638-656. 12. Xue, F., Yu, R., & Huang, A. Q. (2017). A 98.3% Efficient GaN Isolated Bidirectional DC–DC Converter for DC Microgrid Energy

Storage System Applications. IEEE Transactions on Industrial Electronics, 64(11), 9094-9103.

13. Wu, H., Ding, S., Sun, K., Zhang, L., Li, Y., & Xing, Y. (2017). Bidirectional Soft-Switching Series-Resonant Converter With Simple PWM Control and Load-Independent Voltage-Gain Characteristics for Energy Storage System in DC Microgrids. IEEE J.

Emerg. Sel. Top. Power Electron, 5, 995-1007.

14. Aguilar, O., Tapia, R., Valderrabano, A., & Minor, H. (2015). Design and performance comparison of PI and adaptive current controllers for a WECS. IEEE Latin America Transactions, 13(5), 1361-1368.

15. Sira-Ramirez, H. (1991). Nonlinear PI controller design for switchmode DC-to-DC power converters. IEEE Transactions on Circuits

and Systems, 38(4), 410-417. 16. Zhang, Y., Wang, Z., & Liu, P. (2017, October). Optimized modulation for current-fed dual active bridge to achieve high efficiency

in wide load range. In Industrial Electronics Society, IECON 2017-43rd Annual Conference of the IEEE (pp. 1381-1386). IEEE.

17. Guacaneme, J., Garcerá, G., Figueres, E., Patrao, I., & González‐Medina, R. (2015). Dynamic modeling of a dual active bridge DC

to DC converter with average current control and load‐current feed‐forward. International Journal of Circuit Theory and

Applications, 43(10), 1311-1332.

18. Alvarez-Ramirez, J., Cervantes, I., Espinosa-Perez, G., Maya, P., & Morales, A. (2001). A stable design of PI control for DC-DC converters with an RHS zero. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 48(1), 103-106.

19. Jaafar, A., Alawieh, A., Ortega, R., Godoy, E., & Lefranc, P. (2013). PI stabilization of power converters with partial state

measurements. IEEE Transactions on control systems technology, 21(2), 560-568. 20. Yau, H. T., Lin, C. J., & Liang, Q. C. (2013). PSO based PI controller design for a solar charger system. The Scientific World

Journal, 2013.

15.

Authors: Harshit R. Das, Potti. Srinivasa Rao, Giridhar B Kamath, Shiva Prasad H. C

Paper Title: Influence of E-marketing strategy on Customer Satisfaction

Abstract: Over the past two decades, several attempts were made to provide best practices for e-service

quality measurement and e-marketing strategy. It is always necessary to measure the performance quality of web

services using different means such as E-SERVQUAL model. The customer satisfaction gets enhanced after

measuring the E-service quality in a service-based company. The proposed study uses E-SERVQUAL model for

measuring the service quality of an E-commerce Company. The survey questionnaire method is used to collect

responses from customers of the company via email and newsletters. The results indicate that factors: efficiency,

reliability, assurance and security in the e-service system are in favorable condition and factor: responsibility is

not in the favorable condition that affects the customer satisfaction level of the company. Managerial

implications are proposed with the help of theoretical study of e-marketing strategy 2P+2C+3S to enhance

customer satisfaction of the company.

Keywords: E-SERVQUAL model, customer satisfaction, customer experience, e-service quality, e-marketing

strategy.

References: 1. S. Sahadev, K. Purani, “Modelling the consequences of e‐service quality,” Marketing Intelligence & Planning, vol. 26 no. 6,

2008, pp.605–620.

2. F. F. Reichheld, and P. Schefter, “E-loyalty: your secret weapon on the web,” Harvard Business Review, vol. 78, no. 4, 2000, pp.

105–113. 3. A.Parasuraman, V. A. Zeithaml, and L. L. Berry, L.L. “SERVQUAL: a multiple-item scale for measuring consumer perceptions

of service quality,” Journal of Retailing, Spring, 1988 pp. 12–40.

4. G. S. Sureshchandar, C. Rajendran, and R. N. Anantharaman, "The relationship between service quality and customer satisfaction – a factor approach,"Journal of Services Marketing, vol. 14, no. 4, 2002, pp. 363–379.

5. J. Hasan, “Analysis of E-Marketing Strategies,” Studia commercial Bratislavensia, vol. 14, no. 4, 2011, pp. 221-226.

6. K. Beamish, and R. Ashford, Marketing Planning 2007-2008, Routledge, 2007. 7. R. Saravanan, and K. S. P. Rao, “Measurement of service quality from the customer’s perspective – An empirical study,” Total

Quality Management, vol. 18, no. 4, 2007, pp. 435–449.

8. A.M. Wicks, and C. J. Roethlein, “A Satisfaction-Based Definition of Quality,” Journal of Business & Economic Studies, vol. 15, no. 1, 2009, pp. 223–255.

9. M. M. Akbar, and N. Parvez, “Impact of Service quality, trust and customer satisfaction on customer’s loyalty,” ABAC journal,

71-74

Page 86: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

vol. 29, no. 1, 2009, pp. 24–38.

10. V. A. Zeithaml, A. Parasuraman, and A. Malhotra, “A conceptual framework for understanding e-service quality: implications for future research and managerial practice,” MSI Working Paper Series, No. 00-115, Cambridge, MA, 2001, pp. 1-49.

11. V. A. Zeithaml, “Consumer perceptions of price, quality and value: A means–end model and synthesis of evidence,” Journal of

Marketing, vol. 52, 1988, pp. 2–22.

12. A.Parasuraman, V. A. Zeithaml, and L. L. Berry, “SERVQUAL: a multiple-item scale for measuring consumer perceptions of

service quality,” Journal of Retailing, vol. 64 no. 1, 1988, pp. 12-40.

13. V. A. Zeithaml, A. Parasuraman, and A. Malhotra, “Service quality delivery through Websites: a critical review of extant knowledge,” Journal of the Academic of Marketing Science, vol. 30 no. 4, 2002, pp. 362–75.

14. A.Nemati, H. Gazor, S. MirAshrafi and K Ameleh, “Analyzing e-service quality in

service-based website by E-SERVQUAL,” Management Science Letters, vol. 2, no. 2,

2002, pp.727–734. 15. C R. Kothari, Research Methodology: Methods and Techniques, (2nd Ed), New Age International Publishers. 2004.

16. W. W. Chin, “The Partial Least Squares Approach for Structural Equation Modeling,” In GA Marcoulides (ed.), Modern Methods for Business Research, 1998, pp. 295–336. Lawrence Erlbaum Associates, London.

16.

Authors: Obulesu Varikunta, Dr. M. Sudheer Kumar, K. Kishore Naidu

Paper Title: Analysis on Rural and Urban Employee Job Satisfaction towards SBI Bank in Rayalaseema

Division

Abstract: Job satisfaction, in simple words is the level of content with the job an employee is in. Since many

years in numerous studies have been conducted on the level of rural and urban employees of job satisfaction in

the organization. Job satisfaction is the favorableness or un-favorableness with which employees view their

work. Rural and urban Job satisfaction is a psychological concept and it is mostly depend upon the internal

feeling of employees. Job satisfaction is a general attitude which is the result of many specific attitudes in these

areas. The gradual preeminence of employee in the power hierarchy, overcoming workplace discrimination in

the corporate sector displays not the change in the outlook and the perception of the management, job

satisfaction of the employees in the State Bank of India.

Keywords: Banking sector, Employees, Rural and urban job satisfaction, Human resource.

References: 1. Robins, S.P., & Judge, T.P. (2013). Organizational Behaviour. Pearson Education Inc. 2. Khalid Salman & Irshad Muhammad,( 2011) “ Factor Affecting Job Satisfaction” Journal of Management Research, 6(2), 84– 101.

3. Alam (2013) Wages and Employees Satisfaction Management and Labour Studies. 23(3), pp. 421-427.

4. Zeal, Anwar and Nazrul (2012). “Work Experience and relationship with Job Satisfaction”. Journal of Psychology, Vol. 132. 5. Neelamegam Mallika (2010), “Job Satisfaction & Demographic Variables – Is there a Link?”, Perspectives of Innovation , Economics

& Business, Volume 6, Issue 3, pg 108 -111,;www.pieb.cz.

6. Nguyen, A.N., Taylor, J & Bradley, S., (2003), Relative pay and employee satisfaction: some new evidence. https.mpra.ub.uni-muenchen.de/1382,01 (43).

7. Gill, A., Sharma, S. P., Mathur, N., & Bhutani, S. (2012). The effects of job satisfaction and work experience on employee-desire for

empowerment: A comparative study in Canada and India. International Journal Of Management, 29, 190-200. 8. Bhandari, K., & Soni, H. (2015). Impact of Gender, Age and Work Experience on Satisfaction. IOSR Journal of Business and

Management, 17 (3), 48-53.

9. Indian Journal of Banking Review. Vol 24. No. 2. 10. Singh. G. Janak and Namita Dewans (2003): "Job satisfaction among bank employees.

11. Keller, (2008), Satisfaction from job facilities, Journal of IMS group, 5(1).

12. Singh, S., & Tewari, V. (2011). Realtionship between motivation and job satisfaction of white collar employees:a case study. Management insights, 7 (2).

75-78

17.

Authors: Chethana K.Y, M. G. Patil, Y. S. Rammohan

Paper Title: Effect Of Fiber Mat Density And Crushing Mechanism On The Energy Absorption Capacity of

GFRP Crashworthy Tubes

Abstract: The aim of this study is to examine the effect of fiber mat’s density and deformation mechanism

of tubes with and without die compression. In this study a new mode of deformation mechanism of density

graded GFRP circular tube is examined when they are subjected to axial compression on to a die and without die

to examine its energy absorbing capacity. Theoretical calculations were made to predict the crushing stress of

different specimens. It is observed that increasing density of fiber increases energy absorption value but

decreases the specific energy absorption and the die could trigger progressive crushing additionally decreasing

peak load. Here the compressed tube wall is compelled to be deformed towards the end of compression die with

a little range of bending curvature which was forced by the radius of the die at high crushing stress and the

major part of the deformation takes place at a nearly constant load, which leads to high energy absorption

capacity. Comparison between theoretical prediction values by derived equations and the experimental results

shows good correlation.

Keywords: GFRP, Experimentation, Energy absorption, Theoretical Calculations

References: 1. T.Y.Reddy and S.R. Reid, Axial splitting of circular metal tubes, International Journal of Mechanical Sciences, 28 (2)( 1986). 2. S.R.Reid, Plastic deformation mechanisms in axially compressed metal tubes used as impact energy absorbers, International Journal of

Mechanical Sciences 35 (12) ( 1993).

3. A.G.Mamalis, D.E.Manolakos, Demosthenous and M.B. Ioannidis,Experimental determination of splitting in axially collapsed thick-walled fibre-reinforced composite frusta, Thin-Walled Structure 28 (3)(1997).

4. G.L.Farley,Energy absorption of composite materials, Journal of Composite Materials 17 (3) (1983).

5. Thornton P.H.,Energy absorption in composite structures, Journal of Composite Materials 13(3) (1979).

79-83

Page 87: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

6. A.G.Mamalis,M.Robinson,D.E.Manolakos,G.A.Demosthenous,M.B.Ioannidis&.Carruthersb,Crashworthy capability of composite

material structures, Composite Structures 37(3)( 1997). 7. D. Hull, A Unified Approach to Progressive Crushing of Fibre-Reinforced Composite Tubes, Composites Science and Technology 40

(4)(1991).

8. Wang, Y., Feng J., Wu J., Hu D., Effects of fiber orientation and wall thickness on energy absorption characteristics of carbon-

reinforced composite tubes under different loading conditions, Composite Structures 153(1)(2016).

9. Ang soon Lim, Predicting the crushing stress of composite materials, A dissertation, university of southern Queensland, Nov 2006.

10. M.S. Sham Prasad, C.S. Venkatesha, T. Jayaraju, Experimental Methods of Determining Fracture Toughness of Fiber Reinforced Polymer Composites under Various Loading Conditions, Journal of Minerals & Materials Characterization & Engineering 10 (13)(

2011).

11. Chiu LNS, et al. Crush responses of composite cylinder under quasi-static and dynamic loading. Composite Structures 131(4) 2015. 12. Alkbir MFM, Sapuan SM, Nuraini AA, Ishak MR. Effect of geometry on crashworthiness parameters of natural kenaf fibre reinforced

composite hexagonal tubes. Material Design 60(12) (2014).

13. Sebaey, T.A. and Mahdi, E. Filler Strengthening of Foam-Filled Energy Absorption Devices Using CFRP Beams, Composite Structures 160 (1) (2017).

18.

Authors: P. Naresh, Syed Altaf Hussain, B. Durga Prasad

Paper Title: Optimization of Cutting Force in Turning of AA 7068/TiC MMCs Using Taguchi Technique

Abstract: Metal Matrix Composites (MMCs) are widely used in variety of engineering applications. The

usage of aluminium based composites in modern automobile and aerospace sectors is enormous due to superior

Mechanical properties as compared to other materials. In this investigation Taguchi and Response surface

methodologies have been used to minimize the cutting force in turning of AA7068/TiC MMCs. The experiments

are planned and executed according to central composite design technique on all geared lathe machine using

TiCN-Al2O3 tool insert (KCP05). The process parameters used are wt. % of TiC, cutting speed, feed and depth

of cut. The objective of this experiment is to optimize the process parameters and evaluate the effect of process

parameters. A second-order mathematical predictive model has developed between the process parameters &

cutting force based on response surface methodology (RSM). The conclusions of this experiment is give that the

most influenced process parameter for cutting force is depth of cut (d) and is followed by wt.% of TiC.

Precision is observed between the predicted values and experimental results; therefore, the evaluated model is fit

to predict the cutting force in machining of AMMCs.

Keywords: Cutting force, CCD Technique, RSM, TiCN-Al2O3.

References: 1. K.Rajkumar, P.Rajan and J. Marian Antony Charles, Procedia Engineering, vol 86, pp 34-41, 2014.

2. S.Sivasankarana, P.T. Harisagarb, E. Saminathanb, S. Siddharthb,P. Sasikumarb, Procedia Engineering 97, pp 582-589, 2014. 3. Bonollo F, Guemero R, Sentimanti E, Tangenni I and Yang V L, Material Science and Engineering, A 144, pp 303-310. 1991.

4. Morteza Alizadeh, Mostafa Alizadeh, Rasool Amini, Journal of Materials Science & Technology, Volume 29, Issue 8, Pages 725–730,

2013. 5. S Basavarajappa1, G Chandramohan, K V Narasimha Rao, R Radhakrishanan, and V Krishnaraj, doi:

10.1243/09544054JEM304.Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture July 1,

vol. 220 no. 7 1189-1204, 2006. 6. D. Sai Chaitanya Kishore , K. Prahlada Rao , A. Mahamani , Investigation of cutting force, surface roughness and flank wear in turning

of In-situ Al6061-TiC metal matrix composite Procedia Materials Science, Volume 6, , Pages 1040–1050, 2014.

7. Biswajit Das, Susmita Royb, R.N.Rai, S.C. Saha , Procedia Computer Science, Volume 45, Pages 745–752, 2015. 8. Mahamani, A., Machinability Study of Al-5Cu-TiB2 In-situ Metal Matrix Composites Fabricated by Flux-assisted Synthesis. Journal

of Minerals & Materials Characterization & Engineering, Vol. 10, No. 13, 1243-1254, 2011.

9. Birol, Y. In situ synthesis of Al-TiCp composites by reacting K2TiF6 and particulate graphite in molten aluminium. Journal of Alloys and Compounds, 454, 110-117, 2008.

10. Syed Altaf Hussain, Pandurangadu V,Palanikumar K, “Surface Roughness Analysis in machining of GFRP Composites using Carbide

Tool(K20), European journal of Scientific research, Vol.41 No.1, pp.84-98, 2010.

11. Syed Altaf Hussain, Pandurangadu V,Palanikumar K, Optimal Machining Parameters for Minimal Surface Roughness in Turning of

GFRP Composites by PCD Tooling, IJAER, vol 5, issue 13, pp 2227-2239, 2010.

12. Syed Altaf Hussain, V.Pandurangadu, K.Palani kumar “Cutting power prediction model for turning of GFRP composites using response surface methodology”, International journal of Engineering, Science and Technology, vol.3,No.6, pp-161-171, 2011.

13. K.Palanikumar, “Appliaction of Taguchi and Response Surface Methodologies for Surfaceroughness in Machining Glass Fiber

Reinforced Plastics by PCD Tooling”, International Journal of Advanced Manufacturing Technology,DOI:10.1007/s00170-006-0811-0, 2006.

14. Syed Altaf Hussain, V.Pandurangadu, K.Palani kumar “Machining parameters optimisation in turning of GFRP composites by

desirability function analysis embedded with Taguchi method”, International journal of Engineering, Science and Technology, vol.17,No.2, pp-95-107, 2015.

84-88

19.

Authors: Vidya Chandran, M Sekar, Sheeja Janardhanan

Paper Title: Influence of Frequency Ratio on the Hydroelastic Response of a Cylinder with Degrees of Freedom

under Vortex Induced Vibration

Abstract: Vortex induced vibration of cylindrical structures is an extensively researched topic. Most of the

studies have concentrated on the response of the cylinder in the cross flow (CF) direction. In a realistic ocean

environment, structures such as drilling and marine risers are more or less free to vibrate both in CF and in line

(IL) directions. It has also been observed that the IL vibrations have significant influence on the CF response.

Interaction between the responses in inline and cross flow directions has still been not fully understood. This

paper addresses the same through a simplified numerical method for understanding the interaction between these

two responses using two dimensional computational fluid dynamics (CFD) simulations. Here analyzes two cases

have been considered; where in the cylinder is modeled with two different values of ratio of natural frequency of

the cylinder in the IL direction to that in the CF direction. The trends of variation of hydrodynamic and structural

parameters have been analyzed to comprehend the effect of directional natural frequency ratio on the cylinder

89-94

Page 88: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

response and hydrodynamic force coefficients. The shedding pattern has also been studied in this paper. An

increase by 18% in the value of the lift coefficient and 38 % of that in the drag coefficient has been observed

when the frequency ratio is increased from 1 to 2. The results show that the cylinder with frequency ratio 2 is

more prone to lock in vibration. This phenomenon may be related to the shifting of shedding pattern from 2S to

P + S mode when the frequency ratio is 2.

Keywords: CFD, cross flow vibration, hydroelastic response, inline vibration, vortex induced vibration.

References: 1. Khalak, A. and Williamson, C. H. K. Investigation of the relative effects of mass and damping in vortex induced vibration of a

circular cylinder, Journal of Wind Engineering. Ind. Aerodyn. 69-71 (1997) 341 – 350.

2. Jauvtis, N. and Williamson, C. H. K. The effect of two degrees of freedom on vortex-induced vibration at low mass and damping. Journal of Fluid Mechanics 509, (2004) 23 – 62.

3. Moe, G. and Wu, Z. J. The lift force on a cylinder vibrating in a current. Journal of Offshore Mechanics and Arctic Engineering 112

(1990) 297- 303. 4. Sarpkaya, T. Hydrodynamic damping, flow-induced oscillations, and biharmonic response. ASME Journal of Offshore Mechanics

and Arctic Engineering. 117 (1995) 232-238.

5. Yin, D. Experimental and Numerical Analysis of Combined In-line and Cross-flow Vortex Induced Vibrations. Ph D Thesis, Norwegian University of Science and Technology. 2013.

6. Narendran, K., Murali, K., Sundar, V., Vortex-induced vibrations of elastically mounted circular cylinder at Re of the O (105).

Journal of Fluids and Structures. 54 (2015) 503 – 521. 7. Naudascher, E. and Rockwell, D. Flow induced vibration – An engineering guide. Dover Publications Inc, Mineola, New York,

USA, 2005.

8. Gabbai, R. D. and Benaroya, H. An overview of modeling and experiments of vortex-induced vibration of circular cylinders. Journal of Sound and Vibration, 282(3-5) (2005) 575–616.

9. Sekar, M., Srinivas, J., Kotaiah, K. R., Yang, S, H., Stability analysis of turning process with tailstock-supported workpiece, Int J Adv Manuf Technol, 43( 9–10) (2009) 862–871.

10. Sekar, M., Kantharaj, I., Savale A.S, Machining Chatter Analysis for High Speed Milling Operations 2017 IOP Conf. Ser.: Mater.

Sci. Eng. 247 012014. 11. Schlichting, H. Boundary layer theory. McGraw-Hill Book Company, New York, 1979.

12. Chandran, V., Sekar, M., Janardhanan, S., Menon, V., A numerical study on the influence of mass and stiffness ratios on the vortex

induced motion of an elastically mounted cylinder for harnessing power. Energies. 11 (2018) 2580.

13. Chandran, V., Janardhanan, S., Sekar, M., Prediction of Hydro-dynamic Force Coefficients and Shedding Frequency during Vortex

Shedding Behind a Stationary Cylinder. International Journal of Structural Mechanics and Finite Elements. 4(1) (2018).

14. Jie, W., Halvor, L., Larsen, M. L., Stergios, L., Rolf. B. Vortex-induced vibration of a flexible cylinder: Interaction of the in-line and cross-flow responses. Journal of Fluids and Structures 63 (2016) 238–258.

20.

Authors: T. Raghavendra, C. Ramanjaneyulu, V. Bhuvaneswar Reddy

Paper Title: An Experimental Model on the Mechanical Properties of Reactive Powder Concrete by using

Cement Replacement of Glass Powder

Abstract: Reactive Powder Concrete is a creating composite material that enables the solid business to

advance material utilizes Generate financial advantages and building structures which are solid, strong and

delicate to condition. RPC is ultra-elite cement with extensive variety of capacities. RPC was created in the

1990s by Bouygues' research center in France. RPC speaks to another class of Portland concrete based material

with compressive qualities of 120-200 MPa go. By presenting fine steel filaments. It has no coarse materials and

contains little steel filaments that give extra strength. RPC incorporate Portland concrete, silica rage, fine sand,

super plasticizer, water and steel strands. In this investigation, RPC by utilizing cement substitution of glass

powder up to 30%. Likewise mechanical properties, compressive strength and split tensile strength were

considered.

Keywords: Quartz powder, silica fume, steel fibers, Glass powder, compressive strength, split tensile strength.

References: 1. Pierre Richard, Marcel Cheyrezy, “Composition of Reactive Powder Concrete”, Cement and Concrete Research Journal, 25(7), pp

1501-1511. 1995. 2. W. Kushartomo, Stabilization of Reactive Powder Concrete Strength Using Quartz Powder, Doctoral Dissertation, Tarumanagara

University, Jakarta, 2014 (in Bahasa). H. Du, and K. H. Tan, Concrete with Recycled Glass as Fine Aggregates, ACI Materials Journal,

Jan-Feb 2014, pp. 47-57. 3. K. M. Nag, C. M. Tam and V. W. Y. Tam “Studying the production process and mechanical Properties of reactive powder concrete”,

Magazine of Concrete Research, 2010, 62, No. 9, September, 647–654.

4. Harish K V, Dattatreya J K and Neelamegam M "Impact of fiber expansion, warm treatment, and preset weight on mechanical properties of ultra-high-quality mortars". 2011 Transportation Res. Rec. J. Transp.Res. Board 2240: 59– 69.

5. Tam .C. M, Tam .V. W. Y., and. Ng K. M, “Optimal conditions for producing reactive Powder concrete” Magazine of Concrete

Research, 2010, 62, No. 10, October, 701–716. 6. Maroliya M.K., “Mechanical Behaviour of modified of Reactive powder concrete”, International journal of engineering research and

applications, vol.2, sep-oct (2012),pp 2062-2067.

7. Prema Kumar W P, Ananthayya M B and Vijay K “Effect of Partial Replacement of Cement with Waste Glass Powder on the Properties of Concrete”, IJSCER, Vol. 3, Issue. 2, pp.1-6, May 2014, ISSN: 2319-6009.

8. Dr. G. Vijayakumar, Ms H. Vishaliny and Dr. D. Govindarajulu, "Concentrates on Glass Powder as Partial Replacement of Cement in

Concrete Production", International Journal of Engineering and Advanced Engineering (IJETAE), Vol. 3, Issue 2, Feb. 2013, pp. 153 – 157, ISSN: 2250-2459.

9. Prabhat R P, Bharatkumar B H and Iyer N R 2012 Mechanical properties of ultra high performance concrete. Proceedings of World

Academy of Science, Engineering and Technology. No. 68. World Acad. Sci. Eng. Technol. 351(68): 1969. 10. Yang L S, Millard G S, Soutsos NM, Barnett J S and Le T T 2009 Influence of aggregate and curing regime on the mechanical

properties of ultra-high performance fiber reinforced concrete (UHPFRC). Constr. Build. Mater. 23(6): 2291–2298.

11. Graybeal B A 2007 Compressive behavior of ultra-high-performance fiber-reinforced concrete. ACI Mater. J. 104(2): 146–152. 12. S. Snigdha Malya,V. K. Visweswara Rao A Study on the mechanical properties of reactive powder concrete using Granite powder and

95-99

Page 89: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

Nano silica IJIRSET AN ISO 3297:2007 certified organization vol. 5, Issue 11, NOV 2016.

21.

Authors: Dr. V. Anantharama, Dr. K. Gajalakshmi, Dr. M. Lokeshwari

Paper Title: Spatial and Temporal Drought Analysis in Sitanadi Basin, Udupi District Karnataka, Using SPI

Abstract: Knowledge of trends and variations of current and historical hydro-climatological variables are

pertinent to the future development and sustainable management of water resources of a given region. Rainfall

is a principal element of the hydrological cycle, so that understanding its behavior may be of profound social and

economic significance. The detection of trends and oscillations in precipitation time series yields important

information for the understanding of climate. However, rainfall changes are particularly hard to gauge, because

rainfall is not uniform and varies considerably from place to place and time to time, even on small scales. The

Sitanadi basin has a tropical monsoon climate. The highland of the district experiences mainly orographic

rainfall. Rainfall data for 42 years were considered for the study and SPI was calculated for the whole period.

SPI values of the rain gauge stations of the Sitanadi basin were found to vary from +2.43 to -2.50. In all rain

gauge stations higher abnormality is observed in pre monsoon season compared to post monsoon season. The

validation based on station gauge rainfall data showed that the SPIs calculated were reliable for monitoring

drought regions.

Keywords: Rainfall, Sitanadi basin, Standardized precipitation index.

References: 1. Al-Obaidy A (2012) Estimation of Impacts of Rainfall on Cereal Production in the Northern Region of Iraq for the Period 1992–2008.

Bus Econ Res. 2. Al-Qinna MI, Hammouri NA, Obeidat MM, Ahmed F (2011) Drought analysis in Jordan under current and future climates. Clim

Change 106:421–440.

3. Halwatura D, Lechner AM, Arnold S (2015) Drought severity–duration–frequency curves: a foundation for risk assessment and planning tool for ecosystem establishment in post-mining landscapes. Hydrol Earth Syst Sci 19(2):1069–1091.

4. Hao ZC, AghaKouchak A (2013) Multivariate standardized drought index: a parametric multi-index model. Adv Water Resour 57:12–

18. 5. Global Information and Early Warning System on Food and Agriculture (GIEWS) (2014) Serious food security concerns following

escalation of conflict. Special Alert No. 332. IRAQ.

6. Liu L, Hong Y, Bednarczyk CN, Yong B, Shafer MA, Riley R, Hocker JE (2012) Hydro-Climatological drought analyses and projections using meteorological and hydrological drought indices: a case study in blue river basin, Oklahoma. Water Resour Manag

26(10):2761–2779.

7. Lloyd-Hughes B (2014) The impracticality of a universal drought definition. Theor Appl Climatol 117:607–611. 8. Lorenzo-Lacruz J, Morán-Tejeda E (2016) Spatio-temporal patterns of meteorological droughts in the Balearic Islands (Spain).

Cuadernos de Investigación Geográfica.

9. Zhang, M.; He, J.; Wang, B.; Wang, S.; Li, S.; Liu, W.; Ma, X. Extreme drought changes in Southwest China from 1960 to 2009. J. Geogr. Sci. 2013, 23, 3–16.

10. Yu, M.; Li, Q.; Hayes, M.J.; Svoboda, M.D.; Heim, R.R. Are droughts becoming more frequent or severe in China based on the

standardized precipitation evapotranspiration index: 1951–2010. Int. J. Climatol. 2014, 34, 545–558. 11. Tao, H.; Fischer, T.; Zeng, Y.; Fraedrich, K. Evaluation of TRMM 3B43 precipitation data for drought monitoring in Jiangsu Province,

China. Water 2016, 8, 221.

12. Zeng, H.; Li, L.; Li, J. The evaluation of TRMM Multisatellite Precipitation Analysis (TMPA) in drought monitoring in the Lancang River Basin. J. Geogr. Sci. 2012, 22, 273–282.

100-106

22.

Authors: Ms. Manaswini B and Dr. Rama Mohan Reddy A

Paper Title: A Regression Test Based On the Test Case Prioritization Techniques by Using the Nature of Bees

Abstract: The software testing is a crucial role in the software development lifecycle. Testing can be done by

the user who have full knowledge on the software, who has no knowledge and who has knowledge little bit on

the software and the software testing can be tested in various level with various tests like unit, integrate, user,

regression, acceptance etc.. The major and most important test is the regression testing. To perform the

regression testing it takes more time. The current paper was focused on the regression testing to reduce the

execution time and to improve the faults detection rate by considering the parameter of change coverage. The

proposed system uses the test case prioritization techniques by using the nature of the bees. After performing the

experimental study on an open source applications, the proposed system shows the efficiency and effectiveness

in terms of the runtime and detecting faults when compared with the traditional system.

Keywords: Software Testing, Regression Test, Change Coverage, Honey bee, Runtime.

References: 1. Ramya, Paruchuri, Vemuri Sindhura, and P. Vidya Sagar. "Clustering Based Prioritization of Test Cases." 2018 Second International

Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018.

2. Azizi, Maral, and Hyunsook Do. "Graphite: A greedy graph-based technique for regression test case prioritization." 2018 IEEE

International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2018. 3. de Souza, Jerffeson Teixeira, et al. "The human competitiveness of search based software engineering." 2nd International Symposium

on Search Based Software Engineering. IEEE, 2010.

4. Harman, Mark. "Making the case for MORTO: Multi objective regression test optimization." 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. IEEE, 2011.

5. Gu, Qing, Bao Tang, and DaoXu Chen. "Optimal regression testing based on selective coverage of test requirements." International

Symposium on Parallel and Distributed Processing with Applications. IEEE, 2010. 6. Li, Zheng, et al. "A fine-grained parallel multi-objective test case prioritization on gpu." International Symposium on Search Based

Software Engineering. Springer, Berlin, Heidelberg, 2013.

7. Yoo, Shin, and Mark Harman. "Pareto efficient multi-objective test case selection." Proceedings of the 2007 international symposium on Software testing and analysis. ACM, 2007.

107-111

Page 90: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

8. Ulewicz, Sebastian, and Birgit Vogel-Heuser. "Industrially applicable system regression test prioritization in production automation."

IEEE Transactions on Automation Science and Engineering 99 (2018): 1-13. 9. Luo, Qi, et al. "How do static and dynamic test case prioritization techniques perform on modern software systems? an extensive study

on github projects." IEEE Transactions on Software Engineering (2018).

10. Lu, Yafeng, et al. "How does regression test prioritization perform in real-world software evolution?." 2016 IEEE/ACM 38th

International Conference on Software Engineering (ICSE). IEEE, 2016.

11. Zhang, Lingming, et al. "Prioritizing JUnit test cases in absence of coverage information." 2009 IEEE International Conference on

Software Maintenance. IEEE, 2009. 12. Di Nucci, Dario, et al. "A Test Case Prioritization Genetic Algorithm guided by the Hypervolume Indicator." IEEE Transactions on

Software Engineering (2018).

13. Kwon, Jung-Hyun, In-Young Ko, and Gregg Rothermel. "Prioritizing browser environments for web application test execution." 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE). IEEE, 2018.

14. Bower 2017 bower . https://bower.io/search/2017

15. Mahmood, Md Hasan, and Md Shazzad Hosain. "Improving test case prioritization based on practical priority factors." 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2017.

16. Zhou, Jianyi, and Dan Hao. "Impact of Static and Dynamic Coverage on Test-Case Prioritization: An Empirical Study." 2017 IEEE

International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2017. 17. Kim, Jung-Min, and Adam Porter. "A history-based test prioritization technique for regression testing in resource constrained

environments." Proceedings of the 24th international conference on software engineering. ACM, 2002.

18. Jones, James A., and Mary Jean Harrold. "Test-suite reduction and prioritization for modified condition/decision coverage." IEEE Transactions on software Engineering 29.3 (2003): 195-209.

19. Walcott, Kristen R., et al. "Timeaware test suite prioritization." Proceedings of the 2006 international symposium on Software testing

and analysis. ACM, 2006. 20. Zhang, Lingming, et al. "Bridging the gap between the total and additional test-case prioritization strategies." Proceedings of the 2013

International Conference on Software Engineering. IEEE Press, 2013. 21. Hao, Dan, et al. "A unified test case prioritization approach." ACM Transactions on Software Engineering and Methodology (TOSEM)

24.2 (2014): 10.

22. Hao, Dan, Lu Zhang, and Hong Mei. "Test-case prioritization: achievements and challenges." Frontiers of Computer Science10.5 (2016): 769-777.

23. Mei, Hong, et al. "A static approach to prioritizing junit test cases." IEEE Transactions on Software Engineering 38.6 (2012): 1258-

1275. 24. Thomas, Stephen W., et al. "Static test case prioritization using topic models." Empirical Software Engineering 19.1 (2014): 182-212.

25. Ansari, Ahlam, et al. "TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSIO

26. Ma, Zengkai, and Jianjun Zhao. "Test case prioritization based on analysis of program structure." 2008 15th Asia-Pacific Software Engineering Conference. IEEE, 2008.

27. Kulkarni, Nandakishore J., et al. "Test case optimization using artificial bee colony algorithm." International Conference on Advances

in Computing and Communications. Springer, Berlin, Heidelberg, 2011.. 28. Wagner, Israel A., Michael Lindenbaum, and Alfred M. Bruckstein. "Ants: agents on networks, trees, and subgraphs." Future

Generation Computer Systems 16.8 (2000): 915-926.

29. Alaya, Ines, Christine Solnon, and Khaled Ghedira. "Ant colony optimization for multi-objective optimization problems." 19th IEEE international conference on tools with artificial intelligence (ICTAI 2007). Vol. 1. IEEE, 2007.

30. Michael, Christoph C., et al. "Genetic algorithms for dynamic test data generation." Proceedings 12th IEEE International Conference

Automated Software Engineering. IEEE, 1997. 31. Bern, D., et al. "Breeding software test cases with genetic algorithm." Proc. 36th Hawaii Int. Conf. on System Sciences. 2003.

32. Michael, Christoph C., Gary McGraw, and Michael A. Schatz. "Generating software test data by evolution." IEEE transactions on

software engineering 27.12 (2001): 1085-1110. 33. Rosero, Raúl H., Omar S. Gómez, and Glen Rodríguez. "Regression Testing of Database Applications Under an Incremental Software

Development Setting." IEEE Access 5 (2017): 18419-18428.

34. Indumathi, C. P., and S. Madhumathi. "Cost aware test suite reduction algorithm for regression testing." 2017 International Conference on Trends in Electronics and Informatics (ICEI). IEEE, 2017.

35. Tahvili, Sahar, et al. "Towards Execution Time Prediction for Manual Test Cases from Test Specification." 2017 43rd Euromicro

Conference on Software Engineering and Advanced Applications (SEAA). IEEE, 2017. 36. Bian, Yi, et al. "Epistasis based aco for regression test case prioritization." IEEE Transactions on Emerging Topics in Computational

Intelligence 1.3 (2017): 213-223.

37. Kwon, Jung-Hyun, and In-Young Ko. "Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments." 2017 24th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2017.

38. Sharma, Sonia, and Ajmer Singh. "Model-based test case prioritization using ACO: A review." 2016 Fourth International Conference

on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2016. 39. Cho, Younghwan, Jeongho Kim, and Eunseok Lee. "History-based test case prioritization for failure information." 2016 23rd Asia-

Pacific Software Engineering Conference (APSEC). IEEE, 2016.

40. Knauss, Eric, et al. "Supporting continuous integration by code-churn based test selection." Proceedings of the Second International Workshop on Rapid Continuous Software Engineering. IEEE Press, 2015.

41. Ma, Tingting, Hongwei Zeng, and Xiaolin Wang. "Test case prioritization based on requirement correlations." 2016 17th IEEE/ACIS

International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE, 2016.

42. Sun, Chang-ai, et al. "dμreg: A path-aware mutation analysis guided approach to regression testing." Proceedings of the 12th

International Workshop on Automation of Software Testing. IEEE Press, 2017. 43. Guo, Shengjian, Markus Kusano, and Chao Wang. "Conc-iSE: Incremental symbolic execution of concurrent software." 2016 31st

IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2016.

23.

Authors: Vikram Neerugatti, Dr. A. Rama Mohan Reddy

Paper Title: Detection and Prevention of Black Hole Attack in RPL Protocol Based on the Threshold Value of

Nodes in the Internet of Things Networks

Abstract: Due to the technology of IOT the human daily life services were became easier. With this

technology the scalability will become very more to handle this kind of networks 6LOWPAN protocol was used,

In this 6LOWPAn networks the RPL protocol was used to route the packets. The RPL protocol is constrain

protocol particularly suits for the constrain node. Due to this constrain behavior this protocol may leads to many

attacks. The attacks may be a black hole, wormhole, sinkhole etc. This paper was focused on Black hole attack.

The black hole attack was simulated in the Contiki cooja simulator and proposed an detection approach based on

the threshold value of each node in the network, to this black hole attack and the results was generated by using

the contiki cooja simulator the results shows the effectiveness of the proposed technique in terms of the packet

112-116

Page 91: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

delivery rate, detection rate of attack.

Keywords: IOT, attack, black-hole, detection, prevention, Threshold Value

References: 1. Chugh, Karishma, L. Aboubaker, and Jonathan Loo. "Case study of a black hole attack on LoWPAN-RPL." Proc. of the Sixth

International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy (August 2012). 2012.

2. Frustaci, Mario, et al. "Evaluating critical security issues of the IoT world: present and future challenges." IEEE Internet of Things

Journal 5.4 (2018): 2483-2495. 3. Al-Fuqaha, Ala, et al. "Internet of things: A survey on enabling technologies, protocols, and applications." IEEE Communications

Surveys & Tutorials 17.4 (2015): 2347-2376.

4. Mayzaud, Anthéa, et al. "A study of RPL DODAG version attacks." IFIP international conference on autonomous infrastructure, management and security. Springer, Berlin, Heidelberg, 2014.

5. Pongle, Pavan, and Gurunath Chavan. "A survey: Attacks on RPL and 6LoWPAN in IoT." Pervasive Computing (ICPC), 2015

International Conference on. IEEE, 2015. 6. Mayzaud, Anthéa, Rémi Badonnel, and Isabelle Chrisment. "A Taxonomy of Attacks in RPL-based Internet of Things." International

Journal of Network Security 18.3 (2016): 459-473.

7. Matsunaga, Takumi, Kentaroh Toyoda, and Iwao Sasase. "Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements." IEICE Communications Express 4.2 (2015): 44-49.

8. Mayzaud, Anthéa, et al. "Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks." International

Journal of Network Management 25.5 (2015): 320-339.

9. Wallgren, Linus, Shahid Raza, and Thiemo Voigt. "Routing Attacks and Countermeasures in the RPL-based Internet of Things." International Journal of Distributed Sensor Networks9.8 (2013): 794326.

10. Le, Anhtuan, et al. "The impact of rank attack on network topology of routing protocol for low-power and lossy networks." IEEE

Sensors Journal 13.10 (2013): 3685-3692. 11. Perrey, Heiner, et al. "TRAIL: Topology authentication in RPL." arXiv preprint arXiv:1312.0984 (2013).

12. Dvir, Amit, and Levente Buttyan. "VeRA-version number and rank authentication in rpl." Mobile Adhoc and Sensor Systems (MASS),

2011 IEEE 8th International Conference on. IEEE, 2011.

13. Ahmed, Firoz, and Young‐Bae Ko. "Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy

Networks." Security and Communication Networks 9.18 (2016): 5143-5154. 14. Airehrour, David, Jairo Gutierrez, and Sayan Kumar Ray. "Securing RPL routing protocol from blackhole attacks using a trust-based

mechanism." Telecommunication Networks and Applications Conference (ITNAC), 2016 26th International. IEEE, 2016.

15. Chugh, Karishma, L. Aboubaker, and Jonathan Loo. "Case study of a black hole attack on LoWPAN-RPL." Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy (August 2012).

2012.

16. Verma, Abhishek, and Virender Ranga. "Analysis of Routing Attacks on RPL based 6LoWPAN Networks." INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING 11.8 (2018): 43-56.

17. Yavuz, Furkan Yusuf, Devrim Ünal, and Ensar Gül. "Deep learning for detection of routing attacks in the internet of

things." International Journal of Computational Intelligence Systems 12.1 (2018): 39-58. 18. Semedo, Felisberto, Naghmeh Moradpoor, and Majid Rafiq. "Vulnerability Assessment of Objective Function of RPL Protocol for

Internet of Things." Proceedings of the 11th International Conference on Security of Information and Networks. ACM, 2018.

24.

Authors: Ch. Pratyusha Chowdari, Dr. J. B. Seventline

Paper Title: An Efficient FIR Filter Architecture Implementation Using Distributed Arithmetic (DA) for DSP

Applications

Abstract: In this paper the proposed efficient FIR filter architecture using a distributed arithmetic (DA)

algorithm in which two issues are discussed in the conventional FIR filter. The FIR filter is well known to

include delay elements, multipliers and adders. Due to the need for multipliers, this results in 2 demerits which

are (i) increased in area and (ii) delayed increases that eventually lead to low efficiency (low speed). A notable

feature of the proposed technique is to substitute a trivial amount of indexed LUT pages instead of conventional

LUT based DA that it helps to maintain the access time lower. Also, significant idea connected with the

proposed technique is required page can be thoroughly selected with the selection module without needing

adders that result in reduced computation time. Furthermore, the proposed fast FIR filter is used for the powerful

ECG noise elimination technique, which is prevalently used in biomedical and healthcare applications. The

designs are simulated and synthesized by using Xilinx ISE. It can be seen from reports that our proposed DA

consumes 30% less power for 11-tap FIR filters with a 40% shorter area, while the saving in power consumption

for 8-tap FIR filters is 30% to 80% and 35% to 80% in the area. Especially in contrast with all the above-

mentioned DA techniques, our enhanced quick FIR filters require less area and less power intake due to their

lower memory requirements. All architectures are designed for FIR filters with 4 and 8 taps.

Keywords: Distributed arithmetic · Multiplier-less filter; VLSI design; FIR filter; LUT; ECG noise removal.

References: 1. M. S. Chavan, R. Agarwala, and M. Upland, “Design and implementation of digital FIR equiripple notch filter on ECG signal for

removal of power line interference,” WSEAS transactions on signal processing, vol. 4, no. 4, pp. 221–230, 2008.

2. S.A. White, “Applications of Distributed arithmetic to digital signal processing: A tutorial review,” IEEE ASSP Magazine, vol.6,

no. 3, pp.a5-19 Jul. 1989.

3. D.J. Allred, H.Yoo, V.krishnan, W.Huang and D.V. Anderson, “LMS adaptive filters using distributed arithmetic for high throughput,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 52, no. 7, pp. 1327-1337, July 2005.

4. A.Peled and B.Liu, “A new hardware realization of digital filters,” IEEE Transaction Acoust. Speech, Signal Process. vol. 22, pp. 456-462, Dec. 1974.

5. S.Y. Park and P.K. Meher, “Low-Power, High –Throughput, and Low Area Adaptive FIR Filter Based on Distributed

Arithmetic”, IEEE Transactions on Circuits and Systems-II, pp. 346-350, 2013. 6. P.K. Meher and S.Y. Park, “High-throughput pipelined realization of adaptive FIR filter based on distributed arithmetic,” in IEEE

International Conference on Very Large Scale Integration, pp. 428-433, Oct.2011.

7. G.A. Clark, S.K. Mitra and S.R. Parker, “Block implementation of adaptive digital filters,” IEEE Trans. Circuits Systems, vol.28, pp. 584-592, Jun. 1981.

117-124

Page 92: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

8. S.Baghel and R. Shaik, “FPGA implementation of fast block LMS adaptive filter using distributed arithmetic for high

throughput,” Proc. Int. Conf. Commun. Signal Process (ICCSP), pp. 443-447, Feb. 10-12, 2011. 9. B.K. Mohanty and P.K. Meher, “A high- performance energy efficient architecture for FIR adaptive filter based onthe new

distributed arithmetic formulation of block LMS algorithm,” IEEE Trans. Signal Processing, vol .61, no. 4, pp. 921-932, Feb

2013.

10. B.K. Mohanty, P.K. Meher and S.K. Patel, “LUT Optimization for Distributed Arithmetic -Based Block Least Mean Square

Adaptive Filter,” IEEE Transactions on Very Large Scale Integration(VLSI) Systems, vol. 24, no. 5, pp.1926-1935, April 2016.

11. H. Yoo, and D. Anderson, “Hardware-Efficient Distributed Arithmetic Architecture for High-Order Digital Filters”, in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05), 2005, Vol. 5, pp. 125 – 128.

12. Özalevli E, Huang W, Hasler PE, Anderson DV.A Reconfigurable Mixed-Signal VLSI Implementation of Distributed Arithmetic

Used for Finite-Impulse ResponseFiltering. IEEE Transactions on Circuits and Systems I, Regular Papers. 2008 Mar; 55(2):510–21.

13. Meher PK. New Approach to Look-Up-Table Design and

Memory-Based Realization of FIR Digital Filter. IEEE Transactions on Circuits and Systems I, Regular Papers.

2010 Mar; 57(3):592–603.

14. Peled A, Liu B. A new hardware realization of digital filters. IEEE Transactions on Acoustics Speech and Signal Processing. 1974 Dec; ASSP-22(6):456–62.

15. B. Pradeep Kumar and S. Balambigai, February 2012, ‘ A Survey on ECG De-Noising Techniques, Bonfring International

Journal of advances in Image Processing’, Vol. 2, Special Issue 1, Part 1.

25.

Authors: Dr. K. Praveen Kumar, Gautam Rampalli

Paper Title: An Efficient Design for Multiple Data Stores Cloud Applications

Abstract: New data management prerequisites have been released by massive data development and cloud

computing. Numerous applications really need to interact on the basis of the types they really need to control

with a lot of heterogeneous data stores: standard data types, documents, social network graph data, simple key-

value data, etc. A unifying data model is attracting considerable for developers due to flexible communication

with heterogeneous relations and NoSQL data stores. The OPEN-PaaS-DataBase API (ODBAPI), which is a

well-accepted REST API, allows developers to code their implementation software in the target data storage

system separately. Secondly, we propose virtual data stores that interact with the integrated data store wrapped

in ODBAPI. It was shown that this prototype responsible for probable solution technologically advanced capable

to introduce OpenPaaS circumstances.

Keywords: NoSQL Data Stores, Relational Data Stores, ODBAPI

References: 1. C. Baun, M. Kunze, J. Nimis, and S. Tai, Cloud Computing - Web-Based Dynamic IT Services. Springer, 2011. 2. C. Fay and et al., “Bigtable: A distributed storage system for structured data,” ACM Trans. Comput. Syst., vol. 26, no. 2, 2008.

3. B. F. Cooper and et al., “Pnuts: Yahoo!’s hosted data serving platform,” PVLDB, vol. 1, no. 2, pp. 1277–1288, 2008.

4. G. DeCandia and et al., “Dynamo: amazon’s highly available key-value store,” in Proceedings of the 21st ACM Symposium on Operating Systems Principles, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007, pp. 205–220.

5. D. Agrawal, A. El Abbadi, S. Das, and A. J. Elmore, “Database scalability, elasticity, and autonomy in the cloud - (extended

abstract),” in Database Systems for Advanced Applications - 16th International Conference, DASFAA 2011, Hong Kong, China, April 22-25, 2011, Proceedings, Part I, 2011, pp. 2–15.

6. P. Sadalage and M. Fowler, NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, ser. always learning.

Addison Wesley Professional, 2012. 7. R. Sellami and B. Defude, “Using multiple data stores in the cloud: Challenges and solutions,” in Data Management in Cloud, Grid

and P2P Systems - 6th International Conference, Globe 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings, 2013, pp.

87–98. 8. M. Stonebraker, “Stonebraker on nosql and enterprises,” Commun. ACM, vol. 54, no. 8, pp. 10–11, 2011.

9. M. Fisher, J. Ellis, and J. C. Bruce, JDBC API Tutorial and Reference, 3rd ed. Pearson Education, 2003.

10. A. B. M. Moniruzzaman and S. A. Hossain, “Nosql database: New era of databases for big data analytics - classification, characteristics and comparison,” CoRR, vol. abs/1307.0191, 2013.

11. M. Pollack, O. Gierke, T. Risberg, J. Brisbin, and M. Hunger, Eds., Spring Data. O’Reilly Media, October 2012.

12. P. Atzeni, F. Bugiotti, and L. Rossi, “Uniform access to nonrelational database systems: The SOS platform,” in Advanced Information Systems Engineering - 24th International Conference, CAiSE 2012, Gdansk, Poland, June 25-29, 2012. Proceedings,

2012, pp. 160–174.

13. L. Cabibbo, “Ondm: an object-NOSQL data store mapper,” Faculty of Engineering, Roma Tre University. Retrieved June 15th, 2013. 14. T. Haselmann, G. Thies, and G. Vossen, “Looking into a rest based universal API for database-as-a-service systems,” in 12th IEEE

Conference on Commerce and Enterprise Computing, CEC 2010, Shanghai, China, November 10-12, 2010, 2010, pp. 17–24.

125-129

26.

Authors: P. Venkatapathi, Dr. Habibulla Khan, Dr. S. Srinivasa Rao

Paper Title: Performance of Threshold Detection in Cognitive Radio with Improved Otsu’s and Recursive One-

Sided Hypothesis Testing Technique

Abstract: Cognitive radio (CR) is a new technology proposed to enhance spectrum efficiency by enabling

unlicensed secondary users to access the licensed frequency bands without getting involved with the primary

users licensed. Although considered optimal, in order to calculate the signal threshold, this approach requires

prior noise statistics information. Even though considered optimal, in order to calculate the signal threshold, this

approach requires prior noise statistics information. A prominent example of an Adaptive Threshold Estimation

Technique (ATT) for energy detection in Cognitive Radio (CR) is the Recursive One-sided Hypothesis Testing

Technique (ROHT). Accurate threshold values are known to be calculated based on the correct choice of their

parameter values, which include the standard deviation coefficient and the stop criteria. In this paper, for

efficient threshold estimation, the improved Otsu and ROHT are combined for estimating threshold even in the

presence of noise floor without need of prior knowledge. The proposed methodology for enactment in cognitive

radio sensor networks (CRSN) system based on the adaptive threshold energy detection model with noise

130-133

Page 93: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

variance estimation. The simulation is carried out with the help of Matlab 2017a with the improved Otsu and

ROHT techniques. The results obtained shows that improved Otsu and ROHT techniques outperforms that of

fixed threshold energy detection in terms of different probability of false alarm rates and miss detections..

Keywords: Adaptive, Cognitive Radio, Energy Detector, Recursive One‐sided Hypothesis Testing, Threshold.

References: 1. M. H. Islam, C. L. Koh, S. W. Oh, X. Qing, Y. Y. Lai, C. Wang, Y.-C. Liang, B. E. Toh, F. Chin, G. L. Tan, and W. Toh, “Spectrum

Survey in Singapore: Occupancy Measurements and Analyses,” in 3rd International Conference on Cognitive Radio Oriented Wireless

Networks and Communications (Crowcon 2008), 2008, pp. 1–7.

2. R. I. C. Chiang, G. B. Rowe, and K. W. Sowerby, “A Quantitative Analysis of Spectral Occupancy Measurements for Cognitive Radio,” in IEEE 65th Vehicular Technology Conference - VTC2007-Spring, 2007, pp. 3016–3020.

3. R. Gonzalez and R. Woods, Digital image processing, 3rd ed. Pearson Prentice Hall, 2002.

4. W. K. Pratt, Digital Image Processing, 3rd ed., vol. 5. John Wiley & Sons, Inc., 2001. 5. S. D. Barnes, P. A. Jansen Van Vuuren, and B. T. Maharaj, “Spectrum occupancy investigation: Measurements in South Africa,”

Measurement: Journal of the International Measurement Confederation, 2013.

6. S. V Vaseghi, Advanced Digital Signal Processing and Noise Reduction, 4th ed. John Wiley & Sons, Inc., 2008. 7. D. Datla, A. M.Wyglinski, and G. J. Minden, “A Spectrum Surveying Framework for Dynamic Spectrum Access Networks,” IEEE

Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4158–4168, 2009.

8. F. Weidling, D. Datla, V. Petty, P. Krishnan, and G. J. Minden, “A framework for R.F. spectrum measurements and analysis,” in First

IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005, pp. 573–576.

9. D. Datla, A. Wyglinski, and G. Minden, “A Statistical Approach to Spectrum Measurement Processing,” Information and

Telecommunication Technology Center, 2005. 10. D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” in Conference

Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, vol. 1, (Pacific Grove, CA, USA), pp. 772–

776, November 2004. 11. R. Tandra and A. Sahai, “Fundamental Limits on Detection in Low SNR Under Noise Uncertainty,” in International Conference on

Wireless Networks, Communications and Mobile Computing, vol. 1, pp. 464– 469, 2005.

12. C. Liu, M. Li, and M.‐L. Jin, “Blind energy‐based detection for spatial spectrum sensing,” IEEE Wireless Communications Letters,

vol. 4, no. 1, pp. 98–101, feb 2015. 13. B. K. Jariwala and V. R. Manilal, “A Survey: A Cognitive Radio for Wireless Communication,” IOSR Journal of Electronics and

Communication Engineering, vol. 9, no. 1, pp. 57–63, 2014.

14. R. K. Dubey and G. Verma, “Improved spectrum sensing for cognitive radio based on adaptive double threshold,” International Journal of Emerging Trends in Electrical and Electronics (IJETEE), vol. 11, no. 2, pp. 1–6, 2015.

15. A.Chavez, R. Littman‐Quinn, K. Ndlovu, and C. L. Kovarik, “Using TV white space spectrum to practice telemedicine: A promising

technology to enhance broadband internet connectivity within healthcare facilities in rural regions of developing countries,” Journal of

telemedicine and telecare, vol. 22, no. 4, pp. 260–263, 2016.

16. D. Datla, A. M. Wyglinski, and G. J. Minden, “A statistical approach to spectrum measurement processing,” Information and

Telecommunications Technology, 2007.

17. D. Datla, A. M. Wyglinski, and G. Minden, “A spectrum surveying framework for dynamic spectrum access networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4158–4168, 2009.

18. A.J. Onumanyi, E. N. Onwuka, A. M. Aibinu, O. C. Ugweje, and M. J. Salami, “A modified Otsu’s algorithm for improving the

performance of the energy detector in cognitive radio,” AEU ‐ International Journal of Electronics and Communications, vol. 79, pp.

53–63, 2017.

19. J. Onumanyi, E. N. Onwuka, A. M. Aibinu, O. C. Ugweje, and M. J. E. Salami, “A real valued neural network based autoregressive energy detector for cognitive radio application,” International Scholarly Research Notices, vol. 2014, pp. 1–11, 2014.

27.

Authors: K. Sumalatha, Dr. Ch. R. Phani Kumar

Paper Title: Recent Advances in Conformal Antennas and its Design Issues

Abstract: With the rapid progress of the use of miniature sized antennas, wireless communication

technology has quickly risen. Not only have the size of the antenna but also its cost, efficiency and ease of

assembly all been taken into account during the antenna design. Conformal antennas are suggested to satisfy all

these requirements. Conformal antennas have broad commercial, defense and several civil services

applications. In aircraft and boats it is the most important and necessary time. Patch antennas are often regarded

the best choice for such conformal antennas. In this paper, we address the conformal transmitters with different

substrates used for antenna design. With this article, we create a modeling of conformal antennas with latest

developments by examining early events.

Keywords: Conformal antennas, wireless communication technology, Patch antennas, commercial, defense.

References: 1. Polegre. A, G. Caille, L. Boyer and A. Roederer, "Semi-active conformal array for ESA's GAIA mission", IEEE Antennas and

Propagation Society Symposium, 2004.

2. Y. Wu and Y. Cheng, "Conical Conformal Shaped-Beam Substrate-Integrated Waveguide Slot Array Antenna with Conical-to-

Cylindrical Transition", IEEE Transactions on Antennas and Propagation, vol. 65, no. 8, pp. 4048-4056, 2017. 3. H. Schippers, "Radiation analysis of conformal phased array antennas on distorted structures", 2018.

4. H. Schippers, J. Verpoorte, P. Jorna, A. Hulzinga, A. Meijerink, C. Roeloffzen, R. Heideman, A. Leinse and M. Wintels, "Conformal phased array with beam forming for airborne satellite communication", 2008 International ITG Workshop on Smart Antennas, 2008.

5. L. Vaskelainen, "Phase synthesis of conformal array antennas", IEEE Transactions on Antennas and Propagation, vol. 48, no. 6, pp.

987-991, 2000. 6. H. Schippers, J. Verpoorte, P. Jorna, A. Hulzinga, A. Meijerink, C. Roeloffzen, R. Heideman, A. Leinse and M. Wintels, "Conformal

phased array with beam forming for airborne satellite communication", 2008 International ITG Workshop on Smart Antennas, 2008.

7. L. Vaskelainen, "Phase synthesis of conformal array antennas", IEEE Transactions on Antennas and Propagation, vol. 48, no. 6, pp. 987-991, 2000.

8. P. Li, W. Xu, L. Song and Y. Qiu, "A Novel Inversion Method of Manufacturing Flaws in the Packaging of Conformal Load-Bearing

Antenna Structure", 2018. 9. M. Klemm and G. Troester, "Textile UWB Antennas for Wireless Body Area Networks", IEEE Transactions on Antennas and

Propagation, vol. 54, no. 11, pp. 3192-3197, 2006.

134-139

Page 94: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

10. T. Kennedy, P. Fink, A. Chu, N. Champagne, G. Lin and M. Khayat, "Body-Worn E-Textile Antennas: The Good, the Low-Mass, and

the Conformal", IEEE Transactions on Antennas and Propagation, vol. 57, no. 4, pp. 910-918, 2009. 11. P. Saone, Y. Rahmat-Samii, M. Schaffrath and M. Kivikoski, "Effect of textile materials on wearable antenna performance: a case

study of GPS antennas", IEEE Antennas and Propagation Society Symposium, 2004.

12. Zheyu Wang, Lanlin Zhang, Y. Bayram and J. Volakis, "Multilayer printing of embroidered RF circuits on polymer composites",

2011 IEEE International Symposium on Antennas and Propagation (APSURSI), 2011.

13. Y. Bayram, Y. Zhou, B. Shim, S. Xu, J. Zhu, N. Kotov and J. Volakis, "E-Textile Conductors and Polymer Composites for Conformal

Lightweight Antennas", IEEE Transactions on Antennas and Propagation, vol. 58, no. 8, pp. 2732-2736, 2010. 14. S. Morris, Y. Bayram, L. Zhang, Z. Wang, M. Shtein and J. Volakis, "High-Strength, Metalized Fibers for Conformal Load Bearing

Antenna Applications", IEEE Transactions on Antennas and Propagation, vol. 59, no. 9, pp. 3458-3462, 2011.

15. K. Wincza and S. Gruszczynski, "Influence of Curvature Radius on Radiation Patterns in Multibeam Conformal Antennas", 2006 European Microwave Conference, 2006.

16. G. Oliveri, P. Rocca and A. Massa, "Differential evolution as applied to electromagnetics: Advances, comparisons, and applications",

2012 6th European Conference on Antennas and Propagation (EUCAP), 2012. 17. Xu, "Robust adaptive neural control of flexible hypersonic flight vehicle with dead-zone input nonlinearity", Nonlinear Dynamics,

vol. 80, no. 3, pp. 1509-1520, 2015.

18. J. Helander, K. Zhao, Z. Ying and D. Sjoberg, "Performance Analysis of Millimeter-Wave Phased Array Antennas in Cellular Handsets", IEEE Antennas and Wireless Propagation Letters, vol. 15, pp. 504-507, 2016.

19. Braaten, S. Roy, S. Nariyal, M. Al Aziz, N. Chamberlain, I. Irfanullah, M. Reich and D. Anagnostou, "A Self-Adapting Flexible

(SELFLEX) Antenna Array for Changing Conformal Surface Applications", IEEE Transactions on Antennas and Propagation, vol. 61, no. 2, pp. 655-665, 2013.

20. Y. Cheng, H. Xu, D. Ma, J. Wu, L. Wang and Y. Fan, "Millimeter-Wave Shaped-Beam Substrate Integrated Conformal Array

Antenna", IEEE Transactions on Antennas and Propagation, vol. 61, no. 9, pp. 4558-4566, 2013. 21. Braaten, S. Roy, I. Irfanullah, S. Nariyal and D. Anagnostou, "Phase-Compensated Conformal Antennas for Changing Spherical

Surfaces", IEEE Transactions on Antennas and Propagation, vol. 62, no. 4, pp. 1880-1887, 2014. 22. M. Khan, B. Ijaz, D. Anagnostou, B. Braaten, A. Capobianco and S. Asif, "Frequency reconfigurable self-adapting conformal array

for changing surfaces", IET Microwaves, Antennas & Propagation, vol. 10, no. 8, pp. 897-901, 2016.

23. Y. Zhao, Z. Shen and W. Wu, "Conformal SIW H-Plane Horn Antenna on a Conducting Cylinder", IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 1271-1274, 2015.

24. X. Lan, L. Wang, Y. Wang, C. Choi and D. Choi, "Tensor 2-D DOA Estimation for a Cylindrical Conformal Antenna Array in a

Massive MIMO System Under Unknown Mutual Coupling", IEEE Access, vol. 6, pp. 7864-7871, 2018. 25. L. Wan, G. Han, J. Jiang, C. Zhu and L. Shu, "A DOA Estimation Approach for Transmission Performance Guarantee in D2D

Communication", Mobile Networks and Applications, vol. 22, no. 6, pp. 998-1009, 2017.

26. L. Wan, W. Si, L. Liu, Z. Tian and N. Feng, "High Accuracy 2D-DOA Estimation for Conformal Array Using PARAFAC", International Journal of Antennas and Propagation, vol. 2014, pp. 1-14, 2014.

27. R. Li, L. Xu, X. Shi, L. Chen and C. Cui, "Two-Dimensional NC-Music DOA Estimation Algorithm with a Conformal Cylindrical

Antenna Array", Journal of Electromagnetic Waves and Applications, vol. 25, no. 5-6, pp. 805-818, 2011. 28. Y. Zou, H. Xie, L. Wan, G. Han and W. Li, "2D-DOA and Mutual Coupling Estimation in Vehicle Communication System via

Conformal Array", Mobile Information Systems, vol. 2015, pp. 1-10, 2015.

29. Z. Liang, J. Ouyang and F. Yang, "A hybrid GA-PSO optimization algorithm for conformal antenna array pattern synthesis", Journal of Electromagnetic Waves and Applications, vol. 32, no. 13, pp. 1601-1615, 2018.

30. M. Comisso and R. Vescovo, "Fast 3D Pattern Synthesis with Polarization and Dynamic Range Ratio Control for Conformal Antenna

Arrays", International Journal of Antennas and Propagation, vol. 2014, pp. 1-9, 2014. 31. R. Karimzadeh Baee, K. Forooraghi and S. Chamaani, "Conformal Array Pattern Synthesis Using a Hybrid WARP/2LB-MOPSO

Algorithm", International Journal of Antennas and Propagation, vol. 2012, pp. 1-7, 2012

32. M. Comisso and R. Vescovo, "Fast Co-Polar and Cross-Polar 3D Pattern Synthesis With Dynamic Range Ratio Reduction for Conformal Antenna Arrays", IEEE Transactions on Antennas and Propagation, vol. 61, no. 2, pp. 614-626, 2013.

33. K. Yang, Z. Zhao, J. Ouyang, Z. Nie and Q. Liu, "Optimization method on conformal array element positions for low side lobe pattern

synthesis", IET Microwaves, Antennas & Propagation, vol. 6, no. 6, p. 646, 2012. 34. J. Ouyang, J. Zhang, K. Zhi Zhang, J. Yang, X. Luo and F. Yang, "Analysis and synthesis of conformal conical surface linear phased

array with volume surface integral equation+AEP (Active Element Pattern) and INSGA-II", IET Microwaves, Antennas &

Propagation, vol. 6, no. 11, pp. 1277-1285, 2012. 35. Y. Bai, S. Xiao, C. Liu and B. Wang, "A Hybrid IWO/PSO Algorithm for Pattern Synthesis of Conformal Phased Arrays", IEEE

Transactions on Antennas and Propagation, vol. 61, no. 4, pp. 2328-2332, 2013.

36. Z. Huang, H. Zhang and J. Zhou, "Full polarimetric sum and difference patterns synthesis for conformal array", Electronics Letters, vol. 51, no. 8, pp. 602-604, 2015.

37. W. Hu, X. Wang, Y. Li and S. Xiao, "Synthesis of Conformal Arrays With Matched Dual-Polarized Patterns", IEEE Antennas and

Wireless Propagation Letters, vol. 15, pp. 1341-1344, 2016. 38. Luk, K., K.-F. Lee, and J.S. Dahele, “Analysis of the cylindrical rectangular patch antenna,” IEEE Trans. Antennas Propag., Vol. 37,

No. 2, 143–147, Feb. 1989.

39. “ANSYS high frequency electromagnetic field simulator HFSS (version 18.1),” Canonsburg, PA.

40. Tanzeela Mitha and Maria Pour, “Conformal Wideband Microstrip Patch Antennas on Cylindrical Platforms”, Progress In Electromagnetics Research Letters, Vol. 80, 1–6, 2018.

28.

Authors: J. Ganesh Prasad Reddy, Dr. K. Ramesh Reddy

Paper Title: IRP Control Based LSCPWM-Multilevel DSTATCOM for Power Quality Improvement

Abstract: Majority of the consumer loads are of non-linear in nature and bring about deprived quality of power

in distribution system. FACTS based DSTATCOM is a compensating device placed in shunt to power line to

improve the power quality eliminating the effect of harmonics in source components. The paper presents multi-

level DSTATCOM in distribution system to enrich the quality of power. Five-level cascaded H-Bridge

structures DSTATCOM is employed to drive with compensating signals for power quality improvement. Five-

level DSTATCOM is triggered from multi-carrier LSCPWM pattern. Reference signals are generated from IRP

based control theory. The proposed system is capable to compensate for system unbalance, power factor and

harmonics in the system. Simulation work of the proposed concept is carried out and the results are presented

using MATLAB/SIMULINK software.

Keywords: Power Quality, Multi-Level, DSTATCOM, LSCPWM, IRP Theory.

References: 1. Luo H. Xiao F. Ma et al. "Distribution static compensator based on an improved direct power control strategy" IET Power Electron.

140-145

Page 95: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

vol. 7 no. 4 pp. 957-964 2014.

2. R. Kalpana, S. C. Khimavath, S. P. P and B. Singh, "Power Quality Enhancement Using Current Injection Technique in a Zigzag Configured Autotransformer Based 12-Pulse Rectifier," in IEEE Transactions on Industry Applications, 2018 (early access).

3. C. Kumar M.K. Mishra "An improved hybrid DSTATCOM topology to compensate reactive and nonlinear loads" IEEE Trans. Ind.

Electron. vol. 61 no. 12 pp. 6517-6527 2014.

4. A. Patel and A. A. Patel, "Application of DSTATCOM for harmonics elimination and power quality improvement," 2017

International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 2017, pp.

3007-3011. 5. T. Zaveri B. Bhalja N. Zaveri "Comparison of control strategies for DSTATCOM in three-phase four-wire distribution system for

power quality improvement under various source voltage and load conditions" Electr. Power Energy Syst. vol. 43 pp. 582-594 2012.

6. G. Mallesham and C. S. Kumar, "Enhancement of power quality using UPQC for hybrid PEMFC and DFIG based wind energy system connected to weak grid," 2017 International Conference on Technological Advancements in Power and Energy ( TAP

Energy), Kollam, India, 2017, pp. 1-6.

7. T. S. Saggu, L. Singh and B. Gill, "Harmonics Mitigation in a Steel Industry Using 11-Level Cascaded Multilevel Inverter-Based DSTATCOM," in Canadian Journal of Electrical and Computer Engineering, vol. 40, no. 2, pp. 110-115, Spring 2017.

8. Y. R. Ashtekar, A. A. Mude and S. A. Khubalkar, "Power quality improvement by using modular multilevel cascade converter

based STATCOM," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2018, pp. 169-173.

9. M. Pradhan and M. K. Mishra, "Dual P-Q Theory based Energy Optimized Dynamic Voltage Restorer for Power Quality

Improvement in Distribution System," in IEEE Transactions on Industrial Electronics, 2018 (early access). 10. H. Akagi, Y. Kanazawa, A. Nabae , “Generalized Theory of the Instantaneous Reactive Power in Three Phase Circuits”, in Proc.

IPECTokyo’83 Int. Conf. Power Electronics, Tokyo, pp. 1375-1386

29.

Authors: P. V. V. Satyanarayana, P. V. Ramana Rao

Paper Title: Parallel Connected Multi-DSTATCOM for Power Quality Improvement in Distribution System

Abstract: Sending power with good quality is the main objective of electrical transmission system. The load

nature, in particular non-linear loads, makes the current at the point of common coupling (PCC) to include

harmonics which further affects the other loads connected at PCC. Power quality improvement and management

is an important study for the enhancement of electrical transmission and distribution systems to enrich the

quality of power delivered at the utilization point. DSTATCOM is one among the FACTS controllers to improve

the power quality by nullifying the effect of harmonics at PCC. This paper presents the analysis of dual

DSTATCOM topology. In this each DSTATCOM is burdened such that the total compensating currents is

shared between the two. Dual STATCOM topology is tested and the result analysis is shown with varying non-

linear type loading conditions. Dual DSTATCOM is controlled using Instantaneous Reactive Power theory

control logic. Parallel DSTATCOM has the advantage of reduction of switch rating and switching losses. The

simulation work is carried out using Matlab/Simulink software.

Keywords: Reactive power, Harmonics, parallel DSTATCOM, non-linear loads

References: 1. Marcos Sacasqui, Jaime Luyo, Alexi Delgado, "A Unified Index for Power Quality Assessment in Distributed Generation Systems

Using Grey Clustering and Entropy Weight", ANDESCON 2018 IEEE, pp. 1-4, 2018.

2. J. Meyer, A. Blanco, S. Rönnberg, M. Bollen and J. Smith, "CIGRE C4/C6.29: survey of utilities experiences on power quality issues

related to solar power," in CIRED - Open Access Proceedings Journal, vol. 2017, no. 1, pp. 539-543, 10 2017. 3. R. Guzman L. G. De Vicuña J. Morales M. Castilla J. Miret "Model-based control for a three-phase shunt active power filter" IEEE

Trans. Ind. Electron. vol. 63 no. 7 pp. 3998-4007 July 2016.

4. M. Panoiu, C. Panoiu and L. Ghiormez, "Neuro-fuzzy modeling and prediction of current total harmonic distortion for high power nonlinear loads," 2018 Innovations in Intelligent Systems and Applications (INISTA), Thessaloniki, 2018, pp. 1-7.

5. J. Rodriguez Maldonado, "Total Harmonic Distortion Estimation, Minimization Inter Harmonic Amplitude and Expanding Bands

Rejection in TKF filters," in IEEE Latin America Transactions, vol. 14, no. 2, pp. 652-656, Feb. 2016. 6. M. A. Chitsazan and A. M. Trzynadlowski, "Harmonic mitigation in interphase power controller using passive filter-based phase

shifting transformer," 2016 IEEE Energy Conversion Congress and Exposition (ECCE), Milwaukee, WI, 2016, pp. 1-5

7. D. Suresh, D. M. Rao and G. D. Sukumar, "Reduced rating hybrid DSTATCOM for three phase four wire distribution system," 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), Delhi, 2016, pp. 1-4.

8. B. Singh, M. Kandpal and I. Hussain, "Control of Grid Tied Smart PV-DSTATCOM System Using an Adaptive Technique," in IEEE

Transactions on Smart Grid, vol. 9, no. 5, pp. 3986-3993, Sept. 2018 9. R. R. Chilipi, B. Singh and S. S. Murthy, "Performance of a Self-Excited Induction Generator With DSTATCOM-DTC Drive-Based

Voltage and Frequency Controller," in IEEE Transactions on Energy Conversion, vol. 29, no. 3, pp. 545-557, Sept. 2014.

10. G. Deep Srivastava and R. D. Kulkarni, "Design, simulation and analysis of Shunt Active Power Filter using instantaneous reactive power topology," 2017 International Conference on Nascent Technologies in Engineering (ICNTE), Navi Mumbai, 2017, pp. 1-6.

146-151

30.

Authors: R. Sasidhar, Dr. A. Lakshmi Devi

Paper Title: Speed Control of PMSM Drive fed with Nine Level Inverter

Abstract: Power electronic technology made possible to evolve inverter fed electric drives. Permanent

magnet synchronous motors (PMSM) are in much importance and are used often due to its performance

characteristics. PMSM gives less noisy operation with faster and more efficient operation. PMSM needs a digital

inverter for its operation. The paper analyzes nine-level inverter fed PMSM drive. Multi-carrier level-shifted

technique is used to generate control pulses. Simulation work of the proposed concept is carried out and the

results are presented using MATLAB/SIMULINK software.

Keywords: PMSM, Multi-Level Inverter, LSCPWM, Speed control

References: 1. R. Krishnan, “Permanent Magnet Synchronous and Brushless DC Motor Drives,” CRC Press, Taylor and Francis Group. ISBN-978-0-

8247-53849

152-157

Page 96: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

2. Paul C.Krause, Oleg Wasynczuk, Scott D.Sundhoff, “Analysis of Electric Machinery and Drive Systems,” IEEE Press Power

Engineering society ISBN-0-471-14326-X

3. H,Madadi Kojabad, G.Ahrabian, “Simulation and analysis of the interior permanent magnet synchronous motor as a brushless AC-

drive,” Science direct / Simulation practice and theory 7(2000) 691-707

4. Pragasan Pillay, R.Krishnan.” Modeling of Permanent Magnet Motor Drives”, IEEE vol.35,no.4,november 1988

5. R. Dhaouadi, N. Mohan and L. Norum, "Design and implementation of an extended Kalman filter for the state estimation of a

permanent magnet -50 l synchronous motor," IEEE Trans. Industrial Electronics, vol. 6, no. 3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Jul.

1991, pp.491 497.

6. K. Rajashekara, A. Kawamura and K. Matsuse, "Sensorless control of AC motor drives", New York: IEEE Press, 1996.

7. G. Sree Lakshmi, S. Kamakshaiah and T. R. Das, "Closed loop PI control of PMSM for hybrid electric vehicle using three level

diode clamped inverter for optimal efficiency," Energy Efficient Technologies for Sustainability (ICEETS), 2013 International

Conference on, Nagercoil, 2013, pp. 754-759.

8. L. Samaranayake, Y. K. Chin and U. S. K. Alahakoon, "Distributed control of permanent magnet synchronous motor drive

systems," Power Electronics and Drive Systems, 2003. PEDS 2003. The Fifth International Conference on, 2003, pp. 710-715 Vol.1.

9. H. H. Lee and U. H. Jeong "A Study on Speed Synchronization for Multi Motors using Controller Area Network" IEEE Trans. Ind.

Appl., vol. 44 no. 4 2000.

10. L. Feng Y. Koren and J. Borenstein "Cross-Coupling Motion Controller for Mobile Robots" IEEE Trans. on Control Systems

Technology, vol. 1 December 1993.

11. R. Sasidhar, Dr. A. Lakshmi Devi, “Analysis of Five-Level Diode Clamped Multi-

12. Level Inverter Fed Permanent Magnet Synchronous Machine Drive” Jour of Adv Research in Dynamical & Control Systems, Vol. 10,

07-Special Issue, 2018, pp. (220-233)

13. R. Sasidhar, Dr. A. Lakshmi Devi, “Speed Control Analysis Of Lscpwm Driven Seven-Level Inverter Fed Permanent Magnet

Synchronous Motor Drive”, ARPN Journal of Engineering and Applied Sciences, VOL. 14, NO. 1, JANUARY 2019, pp 299-306.

31.

Authors: S. V. R. Lakshmi Kumari, Dr. M. Uma Vani

Paper Title: Analysis of Various Control Schemes of Dynamic Voltage Restorer for Power Quality Improvement

in Distribution System

Abstract: One among the contemporary power electronic controller in distribution system is Dynamic voltage

restorer (DVR) used to guard the customers from the voltage variations. DVR output compensating signals

organize the voltage signal in distribution system. DVR is triggered from the control pulses generated from the

control methodology. The paper presents the different control methodologies for DVR to regulate the voltage

wave in distribution system from sag/swell. Simulation analysis is conveyed by using MATLAB/SIMULINK

tool and simulation results indicate the ability of DVR to regulate sag/swell in distribution system.

Keywords: Compensation, voltage sag, voltage swell, sensitive load, DVR.

References: 1. Dong-Jun Won, Seon-Ju Ahn, 11-Yop Chung, Joong-Moon Kim and Seung-I1 Moon, “A New Definition of Voltage Sag Duration

Considering The Voltage Tolerance Curve” Bologna Power Tech Conference, IEEE 2003, June 23-26, Bologpa, Italy.

2. M.R. Banaei, S.H. Hosseini, G.B. Gharehpetian “Inter-Line Dynamic Voltage Restorer Control Using A Novel Optimum Energy Consumption Strategy” Volume 14, Issue 7, Pages 989-999, October 2006.

3. A.Sannino, G. Michelle and M. Bollen, “Overview of Voltage Sag Mitigation” IEEE Power Engineering Society 2000 Winter Meeting,

January 2000, Vol. 4, pp.23-27,. 4. Trevor L. Grant and Deepak M. Divan, “Power Quality Solutions to Mitigate the Impact of Voltage Sags in Manufacturing Facilities,

AEE-WEEC 2002.

5. D.K. Tanti, M.K. Verma, Brijesh Singh, O.N. Mehrotra, “Optimal Placement of Custom Power Devices in Power System Network to Mitigate Voltage Sag under Faults,” International Journal of Power Electronics and Drive Systems (IJPEDS), Vol 2 No 3, 2012 pages

267-276

6. Haniyeh Marefatjou, Mohammad Sarvi, “Compensation Of Single-Phase and Three-Phase Voltage Sag and Swell Using Dynamic Voltage Restorer,” International Journal of Applied Power Engineering (IJAPE), 2012, Vol 1 No 3, pages 129-144

7. Mohammad Sarvi, Haniyeh Marefatjou, “Compensation of Voltage Single-Phase SAG and SWELL Using Dynamic Voltage Restorer

and Difference Per-Unit Value Method,” International Journal of Electrical and Computer Engineering (IJECE), 2013, Vol 3 No 1, pages 83-92

8. C.S.Chang, Y.S. ho and P.C. Loh, “Voltage Quality Enhancement with Power Electronics Based Devices” IEEE 2000. 9. A.Benachaiba and B. Ferdi, “Power Quality Improvement Using DVR”, American Journal of Applied Sciences, March, 2009.

10. G. Ramya, V. Ganapathy, P. Suresh, “Power Quality Improvement Using Multi-Level Inverter Based DVR and DSTATCOM Using

Neuro-Fuzzy Controller,” International journal of power electronics and drive systems (IJPEDS), March 2017, Vol 8, No 1:, pp 316-324.

11. Brahim Ferdi, Samira Dib, Brahim Berbaoui, Rachid Dehini, “Design and Simulation of Dynamic Voltage Restorer Based on Fuzzy

Controller Optimized by ANFIS,” International journal of power electronics and drive systems (IJPEDS), June 2014, Vol 4, No 2:, pp 212-222.

12. D.K. Tanti, M.K. Verma, Brijesh Singh, O.N. Mehrotra, “Optimal Placement of Custom Power Devices in Power System Network to

Mitigate Voltage Sag under Faults,” International journal of power electronics and drive systems (IJPEDS), September 2012, Vol 2, No 3:, pp 267-276.

13. Ezoji, A.Sheikholeslami, M. Tabasi and M.M. Saeednia“Simulation of Dynamic Voltage Restorer Using Hysteresis Voltage Control”

European Journal of Scientific Research ISSN 1450-216X Vol.27 2009, No.1 pp.152-166,.

158-163

32.

Authors: S. Neelophar Begum, CH. Ravi kiran, K. Vasundara

Paper Title: Design Analysis and Fabrication of Solar Vapour Absorption

Abstract: Solar energy is one of the greenest sources of electricity and the idea of using it to power

transportation is not new. In this work, parabolic dish is used to collect the solar irradiation, instead of Photo

voltaic cells (PVC). This radiation is focused on to a point, where the water is heated to the required temperature

and this heat energy is transferred to vapour absorption unit through the heat exchanger. In vapour absorption

system (Three fluid systems) consists of a combination of three fluids ammonia and water and hydrogen. These

fluids complete the vapour absorption cycle and provide the sufficient cooling. The experiments are conducted

on the Solar Vapour absorption unit from 9:00A.M to 5:00P.M. For two days. Temperature readings of

164-169

Page 97: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

generator, Evaporator are taken on an hourly basis and C.O.P of the system at the minimum evaporator

temperature is calculated. The system had attained a minimum evaporator temperature of 23⁰C at its peak

generator temperature of 92⁰C.

Keywords: Photo-Voltaic Cells, Temperature, Three-Fluid System, Vapour Absorption System.

References: 1. Celina Maria Cunha Ribeiro, Evânia Celeste da Costa Moreira, Carlos Antonio Cabral dos Santos, Wilson Luciano de Souza,

Rodrigode Almeida Leal. Study of a diffusion-absorption refrigeration cycle using ammonia-water-heliumas working fluids,18th

International Congress of Mechanical Engineering November 6-11, 2005 2. Velmurugan V, RajaBalayanan S.R, Surendhra Babu K and Sakthivadivel D, Investigation of a novel solar powered absorption

refrigeration system with solar point collector, Research Journal of Chemical Sciences Vol. 1(7), Oct. 2011,p. 51-56

3. Joshua FOLARANMI Leonardo, Design Construction and Testing of a Parabolic Solar Steam Generator, Electronic Journal of Practices and Technologies ISSN 1583-1078 Issue 14, January-June 2009, p. 115-133.

4. Ali benhmidene, bechir chaouachi, mahmoud bourouis,and slimane gabsi, Effect of operating conditions on the performance of the

bubble pump of absorption diffusion refrigeration cycles, Thermalscience, year 2011, vol.15, no.3, pp.793806 5. V Mittal, K S Kasana, N S Thakur, Modeling and simulation of a solar absorption cooling system for India,Journal of Energy in

Southern Africa, Vol 17, No 3, August 2006

6. S. Gabsi ,B. Chaouachi, Design and simulation of an absorption diffusion solar refrigeration unit, American Journal of Applied Sciences, FEB, 2007

7. Ali Benhmidene, Bechir Chaouachi, Slimane Gabsi, Mahmoud Bourouis, Modeling of heat flux received by a bubble pump of

absorption-diffusion refrigeration cycles, Heat Mass Transfer (2011) 47:1341–1347, DOI10.1007/s00 8. Subhadip Roy, M. P. Maiya,” Analysis of R134a-DMAC vapour absorption refrigeration system with add on

components”,IJTS1(1):26-35,june 2012.

9. R. Sankar, T srinivas,” Solar thermalbased power and vapour absorption refrigeration system”,proceedia engineering,38,730-736,2012. 10. K. P. Tyagi ,” Ammonia –salts vapour absorption refrigeration systems”, Jounal of heat recovery systems, 4(6),427-431,2013.

11. Makena Harish, Reddy ANR,”Design of solar based vapour absorption system”, DOI:10.13140/RG.2.1.3284.7120/1ISBN: 978-93-

83038-28-2,ICEMS, Pg No: 104-110-2014. 12. Dilip kumar Mohanty, Abhijit padiary,” Thermodynamic performance analysis of a solar vapour absorption refrioration system”,

IJERSTE, ISSN:2319-7463,4(4),45-54,April 2015.

33.

Authors: Dr. R. Vara Prasad, D. Subhashini

Paper Title: Women Street Vendors, Challenges and Opportunities: An Superlative Analysis with Special

Reference to Chittoor District of Andhra Pradesh, India

Abstract: Informal Sector is the most important part of the workforce in India and other developing

countries works. It has become a progressively more popular subject of study, not just in economics, but also in

Social Work, Sociology and Anthropology. The term of “Informal Sector” was first coined by Keith Hart. There

are many informal sectors in our country working for their own livelihood. The most frequently and regularly

they must work to earn their daily bread Street Vending is a major self-employment provider in and around the

world. It is an occupation perused by the middle and lower middle class as a full time and part time employment

for source of living. There is very few number of studies being conducted on street vendors. The present study is

undertaken to project the various issues that the women street vendors face in their everyday occupation. In men

dominated society women are always considered to be inferior and there are number of cases of harassment and

abuse which not only make women to leave their bread earning occupation but also suffer financial loss. The

present study comes at a time when the living and working environment for women are deteriorating; this study

presents the various issues and problems faced by women street vendors.

Keywords: Women street vendors, economic conditions, informal sector, reasons for street vending

References: 1. Adhikari, D. B. (2012). Income generation in informal sector: A case study of the street vendors of Kathmandu Metropolitan City.

Economic Journal of Development Issues, 13(0). doi:10.3126/ejdi.v13i0.7193

2. Roever, S., & Skinner, C. (2016). Street vendors and cities. Environment and Urbanization, 28(2), 359–374. doi:10.1177/0956247816653898

3. Shalini Sinha and Sally Roever (2011).Women in Informal Employment: Globalizing and Organizing, WIEGO Policy Brief (Urban

Policies) No2 4. Inclusive design for street vendors in India centre for urban equity &amp; Cardiff University (2014)

5. Ar. Manoj Panwar and Vikas Garg (2015) Issues and challenges faced by vendors on urban on urban street, International Journal of

Engineering Technology, Management and Applied Science. 6. DR. Satyaki Sarkar (2016) Street vendors in the urban care of Kolkata-problems and prospects of their rehabilitation

7. Karthikeyan, R., & Mangaleswaran, R. (2013). Quality of Life Among Street Vendors in Tiruchirappalli City, Tamil Nadu, India.

International Research Journal of Social Sciences, 2(12), 18-28; 8. Karthikeyan, R., & Mangaleswaran, R. (2014). A study on socio-economic conditions and working patterns of street vendors in

Tiruchirappalli city, Tamil Nadu, India

9. Jain, Priyank (2013), "Neoliberalizing The Streets Of Urban India: Engagements Of A Free Market Think Tank In The Politics Of Street Hawking". Theses and Dissertations--Geography. 14.

10. Tignor, R. L. (2006). W. Arthur Lewis and the birth of development economics. Princeton university press.

11. Bhowmik, Sharit K. and Debdulal Saha (2012). Street Vending in ten cities in India, National Alliance of Street Vendors of India (NASVI)

170-178

34.

Authors: Kurakula Vimala Kumar, V. Ganesh

Paper Title: FOSSMC for AGC of Multi-Area Power System in Open Market Environment

Abstract: This paper presents a Fractional Order based Second Order Sliding Mode Controller (FOSSMC) for

Load Frequency Control (LFC) of Deregulated Multi Area Power System (DMAPS). In this paper a new control

strategy have been proposed to improve dynamic response of multi area power system under one possible

179-184

Page 98: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

contract scenario by considering bilateral contracts. This proposed new FOSSMC strategy capable of dealing

with frequency deviations for sudden change of load on DISCOs. The advantage of FOSSMC in terms of

exhibiting dynamic response compared to group of factional order controllers such as Fractional Order

PI(FOPI), Fractional Order Fuzzy Controller(FOFLC) and Fractional Order Sliding Mode Controller(FOSMC)

and conventional PI controller.

Keywords: Fractional Order based Second Order Sliding Mode Controller, Load Frequency Control,

Deregulated Multi Area Power System, Fractional Order PI Controller, Fractional Order Fuzzy Controller, and

Fractional Order Sliding Mode Controller.

References: 1. Sadeh J., and Rakhshani E., “Simulation of two-area AGC system in a competitive environment using reduced-order observer

method, 5th International Conference on European Electricity Market,2008,PP 1-6. 2. T. Anil Kumar; G. Venu; N. Venkata Ramana, “Load frequency control of multi area power system in deregulated environment

with robust Controllers in coordination with frequency controllable HVDC link”, International Conference on EnergyEfficient

Technologies for Sustainability (ICEETS), Year: 2016, Pages: 473 – 478. 3. Ramesh Kumar Selvaraju, Ganapathy Somaskandan, ACS algorithm tuned ANFIS-based controller for LFC in deregulated

environment, Journal of Applied Research and Technology, Volume 15, Issue 2, April 2017, Pages 152-166, ISSN 1665-6423.

4. Rabindra Kumar Sahu, G.T. Chandra Sekhar, Sidhartha Panda, DE optimized fuzzy PID controller with derivative filter for LFC

of multi source power system in deregulated environment, Ain Shams Engineering Journal, Volume 6, Issue 2, June 2015, Pages

511-530, ISSN 2090-4479.

5. Nagendra Kumar, Vishal Kumar, Barjeev Tyagi, Multi area AGC scheme using imperialist competition algorithm in restructured power system, Applied Soft Computing, Volume 48, November 2016, Pages 160-168.

6. Pal, A.K.; Bera, P.; Chakraborty, K. "AGC in two-area deregulated power system using reinforced learning neural network

controller", Automation, Control, Energy and Systems (ACES), 2014 First International Conference on, Year: 2014, Pages: 1 - 6. 7. Demiroren A, Sengor NS, Zeynelgil HL “Automatic generation control by using ANN technique” Electrical Power Component

System 2001; 29(10):883–96.

8. Javad Morsali, Kazem Zare, Mehrdad Tarafdar Hagh, Performance comparison of TCSC with TCPS and SSSC controllers in AGC of realistic interconnected multi-source power system, Ain Shams Engineering Journal, Volume 7, Issue 1, March 2016,

Pages 143-158.

9. Mahendra Nandi, C.K. Shiva, V. Mukherjee,"TCSC based automatic generation control of deregulated power system using quasi-oppositional harmony search algorithm",Engineering Science and Technology, an International Journal, Volume 20, Issue 4,

August 2017, Pages 1380-1395.

10. D. Lakshmi1, A. Peer Fathima and Ranganath Muthu,"Simulation of the Two-Area Deregulated Power System using Particle Swarm Optimization", International Journal on Electrical Engineering and Informatics - Volume 8, Number 1, March 2016, PP

93-107.

11. Shayeghi H, Shayanfar HA, Jalili A. LFC-Design-of-a-Deregulated-Power-System with TCPS-Using-PSO. International Journal of Electrical Computer Energetic Electronc and Communication Engineering 2009; Vol:3 (No:4). pp 691-699.

12. Abedinia O., Naderi M S. and Ghasemi., “A Robust LFC in deregulated environment: Fuzzy PID using HBMO”, 10th

International Conference on Environment and Electrical Engineering (EEEIC),2011, PP 1–4. 13. Rabindra Kumar Sahu, Sidhartha Panda, Umesh Kumar Rout, DE optimized parallel 2-DOF PID controller for load frequency

control of power system with governor dead-band nonlinearity, International Journal of Electrical Power & Energy Systems,

Volume 49, July 2013, Pages 19-33, ISSN 0142-0615. 14. Puja Dash, Lalit Chandra Saikia, Nidul Sinha, "Comparison of performances of several FACTS devices using Cuckoo search

algorithm optimized 2DOF controllers in multi-area AGC", International Journal of Electrical Power & Energy Systems, Volume

65, February 2015, Pages 316-324. 15. Rabindra Kumar Sahu, Sidhartha Panda, Saroj Padhan, A novel hybrid gravitational search and pattern search algorithm for load

frequency control of nonlinear power system, Applied Soft Computing, Volume 29, April 2015, Pages 310-327, ISSN 1568-4946.

16. Puja Dash, Lalit Chandra Saikia, Nidul Sinha, Flower Pollination Algorithm Optimized PI-PD Cascade Controller in Automatic

Generation Control of a Multi-area Power System, International Journal of Electrical Power & Energy Systems, Volume 82, November 2016, Pages 19-28, ISSN 0142-0615.

17. Dipayan Guha, Provas Kumar Roy, Subrata Banerjee, Load frequency control of large scale power system using quasi-

oppositional grey wolf optimization algorithm, Engineering Science and Technology, an International Journal, Volume 19, Issue 4, December 2016, Pages 1693-1713, ISSN 2215-0986.

18. K. P. S. Parmar, S. Majhi and D. P. Kothari, “Optimal Load Frequency Control of an Interconnected Power System,”

International Journal of Electrical and Instrumentation Engineering, Vol. 1, No. 1, pp. 1-5, January 2011. 19. Ibraheem and P. Kumar, “A Novel Approach to the Matrix Riccati Equation Solution: An Application to Optimal Control of

Interconnected Power Systems,” Electric Power Components and Systems, Vol. 32, No. 1, pp. 33-52, 2004.

20. T. Anil Kumar, Dr. N. V. Ramana, “Design of Optimal Sliding mode Controller for Load Frequency Control in Multi-area Deregulated Thermal System”, International Conference on Emerging Trends in Electrical Engineering and Energy Management

(ICETEEEM–2012), ICETEEEM-2012 Proceedings, PS-13, Page No: 64-71.

21. Farzin Piltan, Ali Hosainpour, Ebrahim Mazlomian, Mohammad Shamsodini, Mohammad HosseinYarmahmoudi Online Tuning Chattering Free Sliding Mode Fuzzy Control Design: Lyapunov Approach, International Journal of Robotics and Automation

(IJRA), Volume (3),Issue (3) : 2012.

22. A.shingame, T. Furukawa, S. Kawamoto, T. Taniguchi, Sliding mode controller design

based on fuzzy inference for nonlinear systems, IEEE Trans. Ind. Electron. 40 (1993)

64-70.[55]

23. Hidekazu K., Yuya S. and Shinichi I., “A Load frequency control design using sliding mode controller theory with VSS observer

2009.

24. S. Baghya Shree, N. Kamaraj, Hybrid Neuro Fuzzy approach for automatic generation control in restructured power system,

International Journal of Electrical Power & Energy Systems, Volume 74, January 2016, Pages 274-285, ISSN 0142-0615. 25. Sanjoy Debbarma, Member, IEEE, and Arunima Dutta, “Utilizing Electric Vehicles for LFC in Restructured Power Systems

Using Fractional Order Controller”, IEEE Transactions On Smart Grid, Year: 2017 , Volume: 8 , Issue:6,Pages: 2554 – 2564.

26. 1.Shivam Jain and Yogesh V. Hote, " Design of fractional PID for Load frequency control via Internal model control and Big bang Big crunch optimization"Preprints of the 3rd IFAC Conference on Advances in Proportional-Integral-Derivative Control,

Ghent, Belgium, May 9-11, 2018, pages 610-615.

27. T.Dinesh,PalleJayabharath Reddy and Thalluru Anil Kumar, " A Coordinated V2GControl For LFC Of Multi Area Power System With HVDC Link In Deregulated Environment", International Journal of Pure and Applied Mathematics, Volume 120 No. 6

2018, pages.567-586,ISSN: 1314-3395

Page 99: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

28. Swati Sondhi , Yogesh V. Hote,S. Sondhi, Y.V. Hote ," Fractional order PID controller for load frequency control", Energy

Conversion and Management 85 (2014) 343–353.

29. A.Jakovljevi, A. Pisano1,M. R. Rapai and E. Usai1," On the sliding-mode control of

fractional-order nonlinearuncertaindynamics", International Journal of Robust and

nonlinear control,Int. J. Robust Nonlinear Control (2015),Published online in Wiley

Online Library (wileyonlinelibrary.com). DOI: 10.1002/rnc.3337. 30. Abdelali Boughaba, Mabrouk Chaabane And Said Benaggoune,"Robust Sensorless Control Of BLDC Motor Using Second

Derivative Function of The Sum Of Terminal Voltages", Serbian Journal of Electrical Engineering Vol. 10, No. 2, June 2013,

275-291,PP-275-291.

35.

Authors: C. RAMANJANEYULU

Paper Title: Experimental Methodology of Optimum Coagulation Activity on River Water using Chemical and

Natural Coagulants for Different pH Ranges

Abstract: The present study is related to determination of optimum dosage of natural coagulant and

chemical coagulant to bring down the turbidity of the considered river water by maintaining different pH ranges.

The conversion of waste water into unpolluted water as became challenge now a days. In the present

investigation, a focus is made on Turbidity characteristic of waste water and an attempt is made to treat water so

as to utilize it by removing its turbidity. After removal of turbidity, the water should undergo again some stages

of purification. Before undergoing further purification, water should be made turbid free. To make water a turbid

free, two types of coagulants are considered in this present study which are natural coagulant and chemical

coagulant. The coagulant is orange peel powder natural one and the other is Alum, a chemical coagulant. Three

series of water samples were considered by varying pH values (6, 7 and 8.5). Other qualities of water like

Turbidity, alkalinity and acidity were also tested before and after the process of coagulation. In this study an

optimum dosage of coagulant was determined. The samples of river were collected from nearby flowing Kundu

River, Nandyal (M), Kurnool (Dist)-A.P. The test results show that the optimum dosage of orange peel powder

was found at 103 mg/l with 0.3 NTU Turbidity with Turbidity removal efficiency of 98.68%and by using Alum

the optimum dosage was found at 26 mg/l with 0.3 NTU Turbidity with Turbidity removal efficiency of 98.68%.

Keywords: Orange Peel powder, Alum, Coagulation, Turbidity, Optimum dosage.

References: 1. Wafai El-Hosseni Ahmed and Hanaa M. Sherif, “Effect of irrigation water PH on some soil properties and growth of some pear

rootstocks grow on sand and calcareous soils” International Journal of Plant & Soil Science, 4(5): 475-493, 2015; Article

no.IJPSS.2015.047, ISSN: 2320-7035.

2. Akbar Baghvand, Ali Daryabeigi Zand, Nasser Mehrdadi and Abdolreza Karbassi, “Optimizing Coagulation Process for Low to High Turbidity Waters Using Aluminum and Iron Salts” American Journal of Environmental Sciences 6 (5): 442-448, 2010 ISSN 1553-

345X.

3. BaiChuan Cao,BaoYu Gao, ChunHua Xu, Ying Fu, Xin Liu, “Effects of pH on coagulation behavior and floc properties in Yellow River water treatment using ferric based coagulants” Chinese Science Bulletin, May 2010, Volume 55, Issue 14, pp 1382–1387.

4. R.Subashree, N.Surya Praba, Dr.G.Anusha, “Investigation of Coagulation Activity of Lemon and Banana Peel Powder in Water

Treatment” International Journal on Advanced Research in Science and Engineering, Volume No. 6, Issue No. 10, October 2017 pp 852-855.

5. Anju S and K.Mophin-Kani, “Exploring the Use of Orange Peel and Neem Leaf Powder as Alternative Coagulant in Treatment of

Dairy Wastewater” International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016, ISSN 2229-5518, pp 238-244.

6. Joseph Marie Sieliechi, Guifo Joseph Kayem, Ion Sandu, “Effect of Water Treatment Residuals (Aluminum and Iron Ions) on Human Health and Drinking Water Distribution Systems”, International Journal of Conservation Science, Volume 1, Issue 3, July-September

2010, pp 175-182.

7. IS 10500:2012- Drinking Water Standards.

185-190

36.

Authors: Samanthaka Mani Kuchibhatla, Padmavathi Devasetty, Srinivasa Rao Rayapudi

Paper Title: A New Meta Heuristic Algorithm based FACTs SSFC Implementation for Power Quality

Enrichment in Grid Inter connected system with Renewable Energy Sources

Abstract: This paper projects A Most modern Meta Heuristic based BAT algorithm for enhancing Power

Quality (PQ) furthermore to diminish the harmonic falsification using the Flexible AC Transmission (FACTs)

based Static Switched Filter Compensator (SSFC) in the proposed Grid Interconnected System with Photo

Voltaic (PV) and Wind Energy (WE) Sources. The uniqueness of the this system is enhancing the performance

of the grid associated Renewable energy system such as soothe the voltage, diminish the power losses and

lessen the harmonic distortion using the SSFC with a BAT algorithm in the Controller . Here, the proposed

controller is in a job to optimize the control pulses of SSFC. To attain optimal function of the controller, errors

are narrowed and generating the optimal control signals. SSFC with BAT algorithm controller takes part in

improving Stability of the system along with Enriched power quality. MATLAB/Simulink platform is used for

the Implementation part and its performance is adequate.

Keywords: Power Quality (PQ); Photo voltaic (PV); wind energy conversion system (WECS); Flexible AC

Transmission System (FACTS); Static Switched Filter Compensation (SSFC); Proportional Integral Derivative

(PID) Controller

References: 1. T. Ackermann, Wind power in power systems. John Wiley and sons, New York,USA,2005,pp.742.

2. N.G.Hingorani and L. Gyugyi , Understanding FACTS: Concepts and Technolgy of Flexible AC Transmission Systems, New York: IEEE Press,2000,pp.432.

191-194

Page 100: International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence

3. A. Rashad, S. Kamel and F. Jurado, "Stability improvement of power systems connected with developed wind farms using SSSC controller", Ain Shams Engineering Journal, DOI:10.1016/j.asej.2017.03.015.

4. A.M. Sharaf “A FACTS based dynamic capacitor scheme for voltage compensation and power quality enhancement”, Proceedings of the IEEE International Symposium on Industrial Electronics, Canada, Vol.2, pp.1200-1205, July 2006.

5. A.M.Sharaf , A.A. Abdelsalam , A.A.Eldesouky and A.A. Sallam , “A novel FACTS based modulated power filter compensation

scheme for smart electric grid stabilization and effective utilization” , International journal of Distributed Energy Resources,

Vol.7,pp.311-327,March2011, 6. K.S.Mani, D.Padmavathi and R.Srinivasa Rao, "Power Quality Improvement in Wind Smart Grid Using Facts SSFC", An International

Journal of Electrical and Electronics Engineering, Vol.11, No.3, PP.57-66, May-June2016.

7. S.Rajashekaran and G.A.VijayaLakshmi Pai, “Neural Networks,Fuzzy Logic,and Genetic Algorithms,Synthesis and Applications”,ISBN-81-203-2186-3,pages.439.

8. T. Yuvaraj, K. Ravi and K.R. Devabalaji, “DSTATCOM allocation in distribution networks considering load variations using bat algorithm”, in Electrical Engineering, Ain Shams Engineering Journal, Vol.8, pp.391-403, 2017.

9. L. Chaib , A. Choucha and S. Arif , “Optimal design and tuning of novel fractional order PID power system stabilizer using a new meta heuristic Bat algorithm”, in Electrical Engineering, Ain Shams Engineering Journal, Vol.8, pp. 113–125, 2017.

10. Y. N. Vijay Kumar, S. Sivanagaraju , and Ch. V. Suresh , “Security constrained economic load dispatch in the presence of interline

power flow controller using modified BAT algorithm” ,in Electrical Engineering, Ain Shams Engineering Journal, Vol.7, pp. 1029-1043, 2016.

37.

Authors: R. Sri Uma Suseela, Dr. KSN Murthy, Hima Bindu Valiveti

Paper Title: Performance Analysis of Cross-layer Efficient Selfishness Prevention Routing Protocol for the

Dynamic CR Networks

Abstract: As wireless communication is very dependent on the use of spectrum, increased demand for and

practical application of new wireless services generally leads to spectrum shortages. A remarkable feature of

protocols in the cognitive radio is to, to detect the selfish behaviour of node and discard the abnormal packets.

However, minimize transmission latency and enhance energy efficiency are two main issues in multi-hop

Cognitive Radio Networks (CRN) where it is difficult to gain knowledge of topology and spectrum statistics.

The misconduct of selfish nodes such as not participating in the routing process, delaying RREQ packet

intentionally, removing the data packet, not responding or sending hello messages. This misconduct of the

selfish nodes will affect efficiency, trustworthiness, and fairness. This paper proposes the cognitive radio

dynamic nature, associate with that of selfish nodes, the cross-layer efficient Selfish Prevention Routing Protocol

(ESPRP). All the above characteristics are simulated with help of NS-2.35 simulator, and our proposed protocol

attains good enactment in terms of lower delays, higher throughput and better packet delivery ratios for

collaborative node traffic related to traditional routing protocols in the cognitive radio.

Keywords: Cognitive radio, Selfish attack, Decentralized Trust Model, Layer Modelling, and routing protocol.

References: 1. Hossain, E.; Niyato, D.; Kim, D.I. Evolution and Future Trends of Research in Cognitive Radio: A Contemporary Survey. Wirel.

Commun. Mob. Comput. 2015, 15, 1530–1564.

2. Ahmad, A.; Ahmad, S.; Rehmani, M.H.; Hassan, N.U. A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks.

IEEE Commun. Surv. Tutor. 2015, 17, 888–917. 3. Ma, Y.; Zhou, L.; Liu, K. A Subcarrier-Pair based Resource Allocation Scheme Using Proportional Fairness for Cooperative OFDM-

based Cognitive Radio Networks. Sensors 2013, 13, 10306–10332.

4. Huang, J.; Zeng, X.; Jian, X.; Tan, X.; Zhang, Q. Opportunistic Capacity-based Resource Allocation for Chunk-based Multi-carrier Cognitive Radio Sensor Networks. Sensors 2017, 17, 175.

5. Sufyan, Nadeem, Saqib, Nazar Abbass, Zia, Muhammad, “Detection of jamming attacks in 802.11b wireless networks”, EURASIP

Journal on Wireless Communications and Networking 2013.

6. I.Ngomane ; M. Velempini ; S. V. Dlamini, “The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc

networks”, 2018 Conference on Information Communications Technology and Society (ICTAS), May 2018.

7. L. Senecal, “Understanding and preventing attacks at layer 2 of the OSI reference model”, 4th Annual Communication Networks and Services Research Conference (CNSR'06), June 2006.

8. Guillermo Mario Marro, “Attacks at the Data Link Layer”, CiteSeerX 2003.

9. Kiam Cheng How1, Maode Ma1, and Yang Qin, “A Cross-layer Selfishness Avoidance Routing Protocol for the Dynamic Cognitive Radio Networks”, IEEE International Workshop on Recent Advances in Cognitive Communications and Networking 2011, pp. 942-

946.

10. Khyati Patel, Aslam Durvesh, “Research Paper on Detection of Multiple Selfish Attack Nodes Using RSA in Cognitive Radio”, IJARIIE, Vol-2 Issue-3 2016

195-199