International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor,...
Transcript of International Journal of Innovative Technology and Exploring … · 2019-09-11 · Professor,...
Editor-In-Chief Chair Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal
(M.P.), India
Associated Editor-In-Chief Chair Dr. Dinesh Varshney
Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India
Associated Editor-In-Chief Members Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India
Dr. Gamal Abd El-Nasser Ahmed Mohamed Said
Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime
Transport, Egypt
Dr. Mayank Singh
PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.
Scientific Editors Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran
Dr. Moinuddin Sarker
Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.
Dr. Shanmugha Priya. Pon
Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania
Dr. Veronica Mc Gowan
Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.
Dr. Fadiya Samson Oluwaseun
Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.
Dr. Robert Brian Smith
International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia
Dr. Durgesh Mishra
Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India
Executive Editor Chair Dr. Deepak Garg
Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India
Executive Editor Members Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.
Dr. Saber Mohamed Abd-Allah
Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.
Dr. Xiaoguang Yue
Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.
Dr. Hugo A.F.A. Santos
ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.
Dr. Sunandan Bhunia
Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.
Dr. Awatif Mohammed Ali Elsiddieg
Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.
Technical Program Committee Chair Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.
Technical Program Committee Members Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.
Dr. Hasan. A. M Al Dabbas
Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.
Dr. Gabil Adilov
Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.
Dr. Ch.V. Raghavendran
Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.
Dr. Thanhtrung Dang
Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,
Hochiminh, Vietnam.
Dr. Wilson Udo Udofia
Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.
Manager Chair Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India
Editorial Chair Dr. Sameh Ghanem Salem Zaghloul
Department of Radar, Military Technical College, Cairo Governorate, Egypt.
Editorial Members Dr. Uma Shanker
Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India
Dr. Rama Shanker
Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea
Dr. Vinita Kumar
Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India
Dr. Brijesh Singh
Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,
Ahmedabad (Gujarat), India.
S.
No
Volume-8 Issue-9S3, June 2019, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication
Page
No.
1.
Authors: A.G. Arzamascev, A.I. Sharapov, A.V. Peshkova
Paper Title: Analysis of the Efficiency of Circuits Using Natural Gas Additional Energy Potentials on Cogenerating
Boiler Houses with Internal Combustion Engines
Abstract: The article studies the energy efficiency of various circuits using the energy of natural gas excessive
pressure in expander-generator units installed before gas reciprocating engines in cogeneration boiler houses. The
circuits with and without gas heating before the expander are considered. As an energy effect from the expander
use at the cogeneration boiler house fuel economy is taken as compared with the circuits with gas throttling with
constant production schedules of electrical and thermal power. The dependence on specific fuel economy
determination is obtained. For the circuits being compared, the areas of the energy effect magnitude dependence
on the outside temperature are allocated. It is shown that the circuit with heated gas before the expander will have
the greatest energy effect at the outside air temperature up to the value corresponding to the equal values of
specific fuel economy for the considered circuits and with disconnection of gas heating at higher air temperatures.
The method proposed in the paper can be used to calculate the energy effect from various circuits of the expander
application in cogeneration boiler houses with internal combustion engine both in exisiting ones and the ones
which are under design.
Keywords: expander-generator set, cogeneration boiler house, energy efficiency.
References: 1. A.D.Hawkes and M. A. Leach, «Cost-effective operating strategy for residential micro-combined heat and power», Energy, 2007, vol. 32,
no. 5, pp. 711-723.
2. M.Liu, Y.Shi, and F.Fang, «Combined cooling heating and power systems: A survey. Renewable Sustain», Energy, 2014, vol. 35, pp. 1-
22.
3. A.Cleveland, «Power Generation with Turbo-expander», The American Society of Mechanical Engineers», 1990, vol.90, no 2, pp. 26-31.
4. H.P.Bloch and S.Claire, Turboexpander and Process Applications, Boston, Gulf Professional Publishing, 2001.
5. D.Krähenbühl, C.Zwyssig, H.Weser, and J. W. Kolar, «Theoretical and experimental results of a mesoscale electric power generation
system from pressurized gas flow», IOP Publishing, Journal of Micromechanics and Microengineering, 2009, no 19, pp. 1-7.
6. H.Daneshi, Z. Khorashadi, and A. Lotfjou, «Turboexpander as a distributed generator», Power and Energy Society General Meeting -
Conversion and Delivery of Electrical Energy in the 21st Century. New York, 2008, pp. 1–7.
7. J. M.Taleshian, H.Rastegar, and M.Pichan, «Voltage improvement using a new control strategy for turbo-expander driving systems»,
Electrical Power and Energy Systems, 2015, vol. 64, pp. 1176–1184.
8. J.Peirs, D.Reynaerts, and F.Verplaetsen, «A microturbine for electric power generation. Sensors and Actuators», 2004, vol.113, pp. 86–
93, 2004.
9. S.Quoilin, V.Lemort, and J.Lebrun, «Experimental study and modeling of an Organic Rankine Cycle using scroll expander», Applied
Energy, 2010, vol.87, pp. 1260–1268.
10. V.Lemort, S.Quoilin, C.Cuevas, and J.Lebrun, «Testing and modeling a scroll expander integrated into an Organic Rankine Cycle»,
Applied Thermal Engineering, 2009, vol.29, pp. 3094–3102.
11. A. Truston, «Recovering energy in gas pressure reduction», Contr. And Instrum, 1991,vol.23, no 5, pp.115–118.
12. A.Yu.Kartel, V.Ya.Gubarev, and A.G.Arzamascev, «Study of the features of expander-generator units application at cogeneration boiler-
houses with internal combustion engines», Bulletin of CSTU (Chelyabinsk State Technical University),2018,no 1,pp. 20 - 27.
13. B.T.Mehdi and H.Rastegar, «Modular Modeling of Turbo-Expander Driven Generators for Power System Studies», Transactions on
Electrical and Electronic Engineering, IEEJ Trans., 2009, vol.4, pp. 645–653.
14. B.T.Mehdi and H.Rastegar, «Flicker Assessment of Turbo-Expander Driven Synchronous Generator in Power Distribution», Network,
Journal of Iranian Association of Electrical and Electronics Engineers, 2010, no 7, pp. 53-59.
15. T. J. Mehdi, H.Rastegar, and H.Askarian, «Modeling and Power Quality Improvement of Turbo-Expander Driving an Induction»,
Generator,International Journal of Energy Engineering, 2012, no 2, pp. 131-137.
16. M. A.Norouzi, J.Olamaei, and B. G. Gevork, «Compensation of voltage sag and flicker during thermal power -plant turboexpander
operation by dynamic voltage restorer», International Transactions on Electrical Energy Systems, 2015,vol. 26, no 1, pp. 16-31 .
17. T. J.Mehdi, H.Rastegar, and M.Pichan, «Induction generator voltage improvement using a new control strategy for turbo-expander
driving systems», International Journal of Electrical Power & Energy Systems, 2015, vol.64, pp. 68-76.
18. J. D. Maddaloni, and A. M. Rowe, «Natural gas exergy recovery powering distributed hydrogen production», International Journal of
Hydrogen Energy, 2007, vol.32, pp 557–566.
19. Mehdi T. J., Hasan R., A. A. Hossein, «Modeling turbo-expander systems», Simulation, 2013, vol.89, no 2, pp. 234-248.
20. I.Wichterle, and R.Kobayashi, «Vapor-liquid equilibrium of methane-ethanepropane system at low temperatures and high pressures»,
Journal of Chemical and Engineering Data, 1972, vol.17, no 1, pp.13-18.
21. H.C.Weise, J.Jacobs, and B.H. Sage, «Phase equilibria in the hydrocarbon systems», Phase behavior in the methane-propane-n-butane
system, Journal of Chemical and Engineering Data, 1970, vol.15, no 1, pp.82-91.
22. R. Aungier, Turbine aerodynamics: axial-flow and radial-flow turbine design and analysys, NewYork, The American Society of
Mechanical Engineers, 2006.
23. G.V.Nimich, V.A. Mikhailov, and E.S. Bondar, Modern systems of ventilation and air conditioning , Pub.: Ivik, 2003.
1-6
2.
Authors: Viktor Telegin, Igor Telegin
Paper Title: Solid Modeling in Professional Training of Specialists for Machine-building Enterprises
Abstract: The article considers the structure of the discipline “Engineering Graphics” which is based on the
modern solid modeling technologies in the environment of software products made by Autodesk, and on
traditional methods of Descriptive geometry, Mechanical drawing and Design planning. The characteristic of
modern PDM-technologies is given. Special attention is paid to the issues of traditional and modern design
methods compatibility. The objectives of the course “Engineering Graphics” are outlined. Some examples of
graphic work, training and control methods are given. The place of the discipline “Engineering Graphics” in the
7-9
General structure of educational process of training of highly qualified specialists for machine-building enterprises
is defined.
Keywords: Solid Modeling, Professional Training, Machine Building
References: 1. S.A.Smyslov,T N.V.Nosov,T V.N.Mihelkevich,T A.B.Puzankova,T TheT competence-basedT approachT toT theT design-technologyT
preparationT ofT bachelorsT forT theT enterprisesT ofT theT machine-buildingT cluster,T NewsT ofT theT SamaraT ScientificT CenterT ofT theT RussianT AcademyT ofT Sciences,T v.T 15(2-4),T pp.T 930-934T (2013)
2. V.V.T Telegin,T A.M.T Kozlov,T V.I.T Sakalo,T SolidT ModelingT andT DynamicT AnalysisT ofT MechanismsT ofT Press-forgingT
Machines,T ProcediaT Engineering,T v.T 206,T pp.T 1258-1263T (2017) 3. V.V.T Теlegin,T A.M.T Kozlov,T A.V.T Кirichek,T SolidT ModelingT inT AutodeskT InventorT atT InitialT StageT ofT TrainingT ofT
SpecialistsT inT FieldT MechanicalT Engineering,T ICIET 2018:T ProceedingsT ofT theT 4thT InternationalT ConferenceT onT
IndustrialT Engineering,T pp.T 1241-1247T (2018) 4. V.T Telegin,T A.T Kozlov,T T.T Shumilova,T DevelopmentT andT researchT ofT theT rotatingT leverT objectT asT aT dynamicT
modelT ofT aT cycleT mechanism,T MATECT WebT Conf.T InternationalT ConferenceT onT ModernT TrendsT inT ManufacturingT
TechnologiesT andT EquipmentT (ICMTMTET 2018),T v.T 224,T pp.T 02078T (2018) 5. I.V.T Revina,T G.N.T Boyarkin,T SimulationT ofT productionT processT manufacturingT parts,T OmskT scientificT bulletin,T v.T
6(162),T pp.T 230-234T (2018)
6. I.V.T Telegin,T V.V.T Telegin,T MathematicalT modelT ofT theT partT shapeT andT automationT onT itsT basisT ofT theT processT
ofT developingT theT drawingT parametersT ofT theT axisymmetricT forging,T TheT TurkishT OnlineT JournalT ofT Design,T ArtT
andT CommunicationT –T TOJDACT ISSN:T 2146-5193,T v.T 8(MarchT 2018T SpecialT Edition),T pp.T 458-464T (2018)
7. I.T Telegin,T T.T Shumilova,T ComparingT theT efficiencyT ofT flowsheetsT forT hotT dieT forgingT onT crankT presses,T MATECT WebT Conf.T InternationalT ConferenceT onT ModernT TrendsT inT ManufacturingT TechnologiesT andT EquipmentT (ICMTMTET
2018),T v.T 224,T pp.T 01092T (2018)
8. I.V.T Telegin,T I.M.T Volodin,T P.I.T Zolotukhin,T TheT mathematicalT modelingT forT assessingT theT effectivenessT ofT hotT forgingT extrudedT roundT inT planT forgingsT onT crankT presses,T InternationalT JournalT ofT EngineeringT andT
Technology(UAE),T v.T 7(2),T pp.T 30-34T (2018)
9. ProductT LifecycleT ManagementT (TAdviserT –T RussianT InternetT portalT andT analyticalT agency,T 2010) 10. ImprovingT theT efficiencyT ofT designT usingT BIM-technologiesT (StinsT Coman,T 2016)
11. V.I.T Seregin,T L.S.T Senchenkova,T N.G.T Surkova,T T.L.T Beloborodova,T ElectronicT geometricT modelsT inT theT structureT ofT
“EngineeringT Graphics”T course,T InternationalT scientificT researchT journal,T v.T 8(62),T pp.T 88-93T (2017) 12. Yu.A.T Korolev,T S.Yu.T Ustyuzhanin,T EngineeringT Graphics:T TextbookT forT universities.T TheT standardT ofT theT thirdT
generationT (SPb.:T Peter,T 2011)
13. L.G.T Polubinskaya,T A.P.T Fedorenkov,T T.R.T Khusnetdinov,T ComputerT graphicsT inT theT courseT “EngineeringT Graphics”,T VIIT InternationalT ScientificT andT PracticalT InternetT ConferenceT “ProblemsT ofT theT qualityT ofT graphicT trainingT ofT
studentsT inT aT technicalT college:T traditionsT andT innovations”T (KGP-2017)
14. D.A.T Yakhnovets,T LitemanagerT (CertificateT ofT State.T reg.T computerT programsT №2011618072T RussianT Federation,T 2011) 15. I.V.T Demyanovich,T Computer-basedT testingT asT aT meansT ofT assessmentT ofT higherT educationT studentsT competences,T
ModernT educationalT process:T questionsT ofT theoryT andT practice.T CollectionT ofT worksT ofT theT interregionalT scientificT
andT methodologicalT conference:T inT 2T volumes,T pp.T 47-51T (2018)
3.
Authors: Nikolay Ligkiy*
Paper Title: Occupational Safety Control is a Way to Reduce workplace Injuries at Manufacturing Plants
Abstract: This article analysis causes of injury at the manufacturing plants that have a high level of risk and
explains a need to control the occupational safety and comply with work procedures. An author provides
quantitative and qualitative performance indicators at all levels. The article also explains a mathematical model of
observations and evaluates its accuracy and adequacy in the context of the decision-making conditions. Finally,
there are findings on correlation between the number of detected safety violations and experience of an observer.
Keywords: occupational injuries, occupational safety, control, observer, observer experience
References: 1. N.M. Legkiy, I.V. Unchenko, “Formation Of The Direction Diagram In Phased Antenna Array” Rossiyskiy tekhnologicheskiy zhurnal
(Russian Technological Journal). 2019; 7(2): 29-38. (in Russ.). DOI: 10.32362/2500-316X-2019-7-2-29-38.
2. URL https://rtj.mirea.ru/upload/medialibrary/763/RTZH_2_2019_29_38.pdf
3. A.A. Pastushkov, V.K. Batovrin, “Selection Of Solutions For Designing Open Systems Based On Analysis Of Variants With Random
Weights” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal). 2018; 6(4): 78-88. (in Russ.).
4. URL https://rtj.mirea.ru/upload/medialibrary/bf5/RTZH_4_2018_78_88.pdf
5. M.L. Chipman, “Injury Control: A Guide To Research And Program Evaluation” American Journal of Epidemiology. 2001. V. 154. № 3.
P. 285-a.
6. C. Peek-Asa , C. Zwerling, “Role Of Environmental Interventions In Injury Control And Prevention” Epidemiologic Reviews. 2003. V.
25. № 1. P. 77.
7. T. Virén, S. Saarakkala, J.S. Jurvelin, J. Töyräs, V. Tiitu, J. Puhakka, I. Kiviranta, “Ultrasound Evaluation Of Mechanical Injury Of
Bovine Knee Articular Cartilage Under Arthroscopic Control” IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control.
2011. V. 58. № 1. P. 148-155.
8. V.B. Artemyev, A.B. Kilin, G.N. Shapovalenko, A.V. Osharov, S.N. Radionov, I.L. Kravchuk, “The Concept Of Advanced Control As A
Means Of Significantly Reducing Injuries” Magazine “COAL”, May, 2013, P. 82 -85.(in Russ.).
10-12
4.
Authors: Irina Gukova, Dmitry Nechaev, Ludmila Polovneva, Alla Krivets and Ekaterina Berdnik
Paper Title: Youth Political Participation in Russia: Influence of Voluntary Associations
Abstract: Studying the reasons for youth political participation, and how young people get involved in political
activities is an important issue for both developed and developing countries. Research in this area started from
general tendencies and then moved to specific country factors. The purpose of this research is to determine the
relationship, in Russia, between participation in voluntary associations during education and political participation
during adulthood. Previously, there was no research in this field for Russia. In the research non-parametric tests for
13-22
K independent samples, descriptive statistics, logistical regression, and factor analysis were applied. The main data
source is the Russia Longitudinal Monitoring Survey. The key result is that involvement in voluntary associations
during education, especially in political ones, positively affects future youth political participation. Education and
income also have positive effects. Russia is generally similar to other countries, including developed, developing,
and post-soviet ones. In post-soviet countries, the key interdependencies are similar to Russia, but not so clearly
expressed. In Russia, employed young people vote with less probability than unemployed ones, whereas in Belarus
we see the opposite.
Keywords: political participation; voluntary association; extracurricular activities; political involvement; youth;
voting; political opinion expressing; logistics regression; factor analysis.
References: 1. Acharya, Rajib, et al. 2010. "Participation in civil society and political life among young people in Maharashtra: Findings from the Youth
in India-Situation and Needs study." Journal of adolescence 33.4: 553-561.https://doi.org/10.1016/j.adolescence.2009.05.012 2. Andolina, Molly W., et al. 2002. "Searching for the meaning of youth civic engagement: Notes from the field." Applied Developmental
Science 6.4: 189-195.https://doi.org/10.1207/S1532480XADS0604_5.
3. Campbell, David E. 2006"What is education’s impact on civic and social engagement." Measuring the effects of education on health and civic engagement: Proceedings of the Copenhagen symposium,Copenhagen, September 2006.
4. Deth Jan W. van. 2016. "What is Political Participation?" .Subject: Political Behavior, Political Sociology
Onlinehttps://doi.org/10.1093/acrefore/9780190228637.013.68. 5. Ekström, Mats, and Johan Östman. 2015. "Information, interaction, and creative production: The effects of three forms of internet use on
youth democratic engagement." Communication Research 42.6: 796-818.https://doi.org/10.1177/0093650213476295.
6. Eysenck, Hans J.2006.The psychology of politics. Abingdon: Routledge, 2018. ISBN 978-0765804303. 7. Fieulaine, Nicolas, and Frederic Martinez. 2010. "Time under control: Time perspective and desire for control in substance use."
Addictive behaviors 35.8: 799-802.https://doi.org/10.1016/j.addbeh.2010.03.022.
8. Glanville, Jennifer L. 1999. "Political socialization or selection? Adolescent extracurricular participation and political activity in early adulthood." Social science quarterly: 279-290.
9. Hanks, Michael. 1981. "Youth, voluntary associations and political socialization." Social Forces 60.1: 211-
223.https://doi.org/10.1093/sf/60.1.211. 10. Hart, Daniel, et al. 2007. "High school community service as a predictor of adult voting and volunteering." American Educational
Research Journal 44.1: 197-219.https://doi.org/10.3102/0002831206298173.
11. Herrera, Linda. 2012. "Youth and citizenship in the digital age: A view from Egypt." Harvard Educational Review 82.3: 333-352.https://doi.org/10.17763/haer.82.3.88267r117u710300.
12. Holland, Alyce, and Thomas Andre. 1987. "Participation in extracurricular activities in secondary school: What is known, what needs to
be known?" Review of Educational Research 57.4: 437-466.https://doi.org/10.3102/00346543057004437. 13. Kahne, Joseph, and Ellen Middaugh. 2012. "Digital media shapes youth participation in politics." Phi Delta Kappan 94.3 (2012): 52-
56.https://doi.org/10.1177/003172171209400312.
14. Kahne, Joseph, David Crow, and Nam‐Jin Lee. 2013. "Different pedagogy, different politics: High school learning opportunities and
youth political engagement." Political Psychology 34.3: 419-441.https://doi.org/10.1111/j.1467-9221.2012.00936.x. 15. Kahne, Joseph, Ellen Middaugh, and Danielle Allen. 2015. "Youth, new media, and the rise of participatory politics." InFrom voice to
influence: Understanding citizenship in a digital age. Edited by Allen, Danielle, and Jennifer S. Light. Chicago: University of Chicago
Press, pp. 35-56. ISBN 978-0226262260. 16. Marta, Elena, Chiara Guglielmetti, and Maura Pozzi. 2006. "Volunteerism during young adulthood: An Italian investigation into
motivational patterns." Voluntas: International Journal of Voluntary and Nonprofit Organizations 17.3:
221.https://doi.org/10.1007/s11266-006-9015-3. 17. McAllister, Ian, and Stephen White. 1994. "Political participation in Postcommunist Russia: voting, activism, and the potential for mass
protest." Political Studies 42.4: 593-615.https://doi.org/10.1111/j.1467-9248.1994.tb00300.x.
18. McFarland, Daniel A., and Reuben J. Thomas. 2006. "Bowling young: How youth voluntary associations influence adult political participation." American sociological review 71.3: 401-425.https://doi.org/10.1177/000312240607100303.
19. McNeal Jr, Ralph B. 1999. "Participation in high school extracurricular activities: Investigating school effects." Social Science Quarterly:
291-309. 20. Ødegård, Guro, and Frode Berglund. 2008. "Political participation in late modernity among Norwegian youth: an individual choice or a
statement of social class?" Journal of Youth Studies 11.6: 593-610.https://doi.org/10.1080/13676260802247573
21. Pasek, Josh, et al. 2006. "America's youth and community engagement: How use of mass media is related to civic activity and political awareness in 14-to 22-year-olds." Communication Research 33.3: 115-135.https://doi.org/10.1177/0093650206287073.
22. Quintelier, Ellen. 2008. "Who is politically active: The athlete, the scout member or the environmental activist? Young people, voluntary
engagement and political participation." Actasociologica 51.4: 355-370.https://doi.org/10.1177/0001699308097378. 23. Rogers, John, KavithaMediratta, and Seema Shah. 2012. "Building power, learning democracy: Youth organizing as a site of civic
development." Review of Research in Education 36.1: 43-66.https://doi.org/10.3102/0091732X11422328.
24. Settle, Jaime E., Robert Bond, and Justin Levitt. 2011. "The social origins of adult political behavior." American Politics Research 39.2: 239-263.https://doi.org/10.1177/1532673X10382195.
25. Smith, Elizabeth S. 1999. "The effects of investments in thesocial capital of youth on political and civic behavior in young adulthood: A
longitudinal analysis." Political psychology 20.3: 553-580.https://doi.org/10.1111/0162-895X.00156. 26. StarosotskayaEkaterinaV. 2017."Dynamics of political culture of youth: from nihilism by the maturity
[Dinamicapoliticheskoykulturymolodezhi: otnigilizma k zrelosti]." XX International conference in memory of Professor L. N. Kogan
“Culture, personality, society in the modern world: Methodology, experience of empirical research” [XX Mezhdunarodnayakonferenciyapamyatiprofessora L. N. Kogana «Kul'tura, lichnost', obshchestvo v sovremennom mire: Metodologiya,
opytehmpiricheskogoissledovaniya»], Ekaterinburg, 16-18 March 2017.
27. Stolle, Dietlind, and Cesi Cruz. 2005. "Youth Civic Engagement in Canada: implications for public policy." Social Capital in Action 82: 82-144.
28. Wicks, Robert H., et al. 2014. "Correlates of political and civic engagement among youth during the 2012 presidential campaign."
American Behavioral Scientist 58.5 (2014): 622-644.https://doi.org/10.1177/0002764213515226. 29. Wringe, Colin. 2012.Democracy, Schooling and Political Education(RLE Edu K).Abingdon: Routledge. ISBN 978-0415751346.
5.
Authors: D. Shree Jyothi, D. Srinivasa Rao
Paper Title: An Analysis on Perspectives of Investors on Commodity Trading and Risk Management in India
Abstract: Indian commodity market has seen tremendous growth over the past few decades. Investment in
capital market attracts higher risk as the return is higher. It becomes very important to understand the perspectives
of theinvestors in market in order to minimize the risk faced. This will help them accomplish their goal of
22-26
achieving higher return by minimizing the risk. The aim of the paper is to provide the risk management
perspectives of commodity investors in India. The study concentrates on the aspects like the market and exchange
selected for trading, types of risks faced, method of analysis, technique used for managing risk, percentage of the
investment, advantages and disadvantages of trading in commodity trading etc. The results can be used by the
commodity investors in taking wiser decisions in commodity derivatives investment.Also, hedge their risk
accordingly.
Keywords: Commodities, risk, market, exchange, source.
References: 1. Brajesh Kumar, Ajay Pandey, “International Linkages of the Indian commodity Futures Markets, Modern Economy, Vol 2,2011, pp 213-
227
2. X.E.Xu.H.G.Fund, “Cross-Market Linkages between US and Japanese precious Metals Futures Trading”, International Financial Markets,
Institution and Money, Vol 15,No.2, 2005,pp107-124.
3. Eduardoborensztein and Carmen. Reinhar, “The macroeconomic determinants of commodity prices”, IMF Staff papers, Vol.41,No.2,June
1994
4. RogerJ. B.Wets Ignacio Rios, “Modeling and estimating commodity prices: copper prices”,Math FinanEcon ,Vol 9,2015, pp247-270.
5. 5.Isita Mukherjee and Bhaskar Goswami, “The volatility of returns from commodity futures:eveidence from India, Financial Innovation,
Vol 3,No. 15, 2017,pp 1-23.
6. Bojana Vukovic,Kristina Mijic, “Risk Management in the Investment process”, International symposium Engineering Management and
competitiveness, June,2011
7. Dr. Periasamy, “Perception of Investors toward Indian Commodity Derivative Market with Inferential Analysis in Chennai City”,
International Journal of Management Studies, Vol V,No. 3(3), 2018, pp 73-82
8. Lokara, S.M, “Commodity derivatives and price risk management: and empirical anecdote from India”, Reserve Bank of India
Occasional Papers, 28(2), 2017, pp 27-77
9. J.C. Hull, “Options, Futures and other derivatives”, Ninth Edition, 2015, Pearson
6.
Authors: ZyuzinaN.N., KrovopuskovP.A.
Paper Title: Analysis and Assessment of Enterprise “Vtorchermet” Financial Sustainability
Abstract: The success or survival of an organization depends on the information quality provided, at the
modern world. Properly prepared statements will help determine the impact of internal and external factors
affecting the enterprise development. The purpose of the company financial condition analysis is to save financial
resources and increase its financial significance, aimed at improving the use impact, identifying opportunities for
improving the enterprise activities. Any financial statements allow any economic entity to use the adopted system
of financial indicators to attract potential customers, as well as to confirm its reliability as a potential partner.
Making sound management decisions requires the ability to “read” financial statements, which, accordingly,
makes it possible to develop a correct prediction of a future partnership success, since it allows a timely a property
assessment and a partner financial situation. The sustainability assessment of the commercial relationships future
development is necessary both for the companies themselves and for their potential partners who wish to receive
reliable information about the stable financial condition and reliability of their counterparty (client or customer).
For this reason, an increasing potential counterparties circle is involved in conducting research and assessing the
particular company financial sustainability.
Keywords: financial stability, analysis, assessment, financial sustainability indicators.
References: 1. Financial statements analysis: the textbook / Ed. M.A. Vahrushinoy. Moscow: INFRA-M, 2015. 367 pp.
2. Bakanov M.I., Sheremet A.D. Economic analysis theory: the textbook. Moscow: Finance and Statistics, 2014. 416 pp.
3. Barnoglts S.B. Economic analysis of enterprises and associations economic activities. Moscow: Finance and Statistics, 2016. 427 pp.
4. Butynets F.F., SokolovYa.V., Pankov D.D., Goretskaya L.L. Accounting in foreign countries.Zhytomyr: Ruta, 2013. 660 pp.
5. Accounting financial statements: the textbook / Ed. Yu.I. Sigidova and A.I. Trubilin. Moscow: INFRA-M, 2014. 366 pp.
6. Vakulenko T.G., Fomina L.F. Financial statements analysis for management decisions: the textbook. SPb.:Gerda Publishing House, 2015.
457 pp.
7. Vakhrushin M.A. Management accounting. Moscow: Higher Sc., 2014. 528 pp.
8. Vinogradskaya N.A. Diagnostics and optimization of the enterprise financial and economic condition: financial analysis. Moscow:
Publishing House MIS&A, 2014. 217 pp.
9. Voytolovskiy N.V. Economic analysis. Theory Fundamentals.Comprehensive analysis of the organization economic activities. Moscow:
Yurayt, 2014. 576 pp.
10. Wroblewski N.D. Management accounting of production costs and economy production costs in sectors. Moscow: Accounting publishing
house, 2013. 154 pp.
11. Dr. Zyuzina Natalya Nikolaevnais an Assistant Professor at Lipetsk State Technical University, Lipetsk, Russia. Zyuzina Natalya
Nikolaevnais a Candidate of Economic Sciences. E-mail: [email protected]
12. KrovopuskovPavelAnatolyevich is a Head of Science Department at Lipetsk State Technical University, Lipetsk, Russia. E-
mail:[email protected]
27-31
7.
Authors: Telegin Valery Viktorovich
Paper Title: Calculation of Parameters of Energy Flows in a Closed System of Electricity Generation based on
Renewable Sources
Abstract: the article is devoted to the calculation of the generated power in Autonomous power systems based
on wind power plants, photovoltaic panels, small hydroelectric power plants. The model of the designed system is
considered to be closed and contains energy storage modules for accumulating part of the power. The idea of
optimizing the system is based on the determination of the composition of the combined power generation
32-37
complex, in which the efficiency criteria reach an extremum.
Keywords: wind power plants; photovoltaic panels; small hydroelectric power plants.
References: 1. ZatsepinaT V.I.,T ZatsepinT E.P.,T TeleginT V.V.,T "ElectricityT supplyT ofT consumersT usingT renewableT energyT sources",T
NewsT ofT HigherT EducationalT InstitutionsT ofT theT ChernozemT Region,T 2013,T NoT 2,T pp.T 33-35.T
2. ShkradyukT I.E,T TrendsT inT theT developmentT ofT renewableT energyT sourcesT inT RussiaT andT theT world.T Moscow:T
WWFT Russia,T 2010.
3. LarinT V.T TheT stateT andT prospectsT ofT renewableT energyT sourcesT inT Russia.T M.,T 2006.
4. CetoshnikovaT L.M,T Non-traditionalT renewableT energyT sources.T Chelyabinsk:T SUSU,T 2010.
5. RenewableT EnergyT PolicyT NetworkT forT theT 21stT Century:T renewablesT 2012T globalT statusT report,T 2012.T
6. ShpiganovichT A.N,T TeleginT V.V,T "EnergyT savingT usingT autonomousT sourcesT onT theT basisT ofT alternativeT energyT
technologies",T NewsT ofT higherT educationalT institutionsT ofT theT ChernozemT region,T 2011,T NoT 4,T p.T 15-20.
7. TeleginT V.V,T "ModelingT ofT powerT supplyT systemsT inT theT jointT operationT ofT alternativeT andT traditionalT energyT
sources",T CurrentT trendsT inT science,T technology,T education,T 2016,T pp.T 113-114.
8. TeleginT V.V,T ShpiganovichT A.N,T "SystemsT ofT autonomousT powerT supplyT basedT onT alternativeT energyT technologies",T
Elektrika,T 2012,T No.T 2,T pp.T 17-20.
9. KharitonovT V.P.,T AutonomousT wind-electricT installations.T M:T GNUT VIESKH,T 2006.
10. TeleginT V.V,T "ResearchT ofT theT efficiencyT ofT theT autonomousT powerT supplyT complex",T Energy,T electromechanicsT
andT energy-efficientT technologiesT throughT theT eyesT ofT youth,T TomskT PolytechnicalT University,T Vol.2,T 2016,T ppT 202-
206T
11. VissarionovT V.I,T SolarT powerT engineering.T MT .:T PublishingT houseT MEI,T 2008.
12. AlferovT Zh.I.,T AndreevT V.M,T RumyantsevT V.D,T "TrendsT andT prospectsT ofT solarT photovoltaicsT development",T 2004,T
VolumeT 38,T No.T 8,T pp.T 937-948.T
13. KazhinskyT B.B,T Free-flowT hydroelectricT powerT stationsT ofT lowT power.T Moscow:T Gosplanizdat,T 1950..T
14. KartanbaevT B.A,T ZhumadilovT K.A,T ZazulskyT A.A,T GuidelinesT forT constructionT andT operationT ofT microT hydroelectricT
powerT stationsT (microT HPPs).T B:T "DEMI",T 2011.T
15. ShpiganovichT A.N,T TeleginT V.V,T "EnergyT flowsT inT aT closedT powerT supplyT systemT withT deepT dischargeT batteries",T
NewsT ofT TulaT StateT University.T EngineeringT Sciences,T 2016,T No.T 12-3,T pp.T 40-46.
16. TeleginT V.V.,T "PowerT BalanceT inT theT ElectricityT SupplyT SystemT ofT ConsumersT UsingT RenewableT EnergyT SourcesT
(RES)",T ActualT DirectionsT ofT ResearchT inT theT 21stT Century:T TheoryT andT Practice,T 2013,T No.T 1,T pp.T 141-144.
17. TeleginT V.V,T "DesigningT ofT autonomousT consumerT powerT systems",T TheoreticalT andT AppliedT ProblemsT ofT ScienceT
andT Education,T 2015,T p.T 124-125.
18. ShpiganovichT A.N,T TeleginT V.V,T "ParametersT ofT OptimalT PowerT SupplyT SystemsT withT AlternativeT EnergyT Sources",T
NewsT ofT highT educationalT establishmentsT ofT Chernozemie,T 2016,T NoT 3T (45)T стр.T 39-43.
19. TeleginT V.V,T "OnT theT assessmentT ofT theT electricT potentialT ofT renewableT energyT sourcesT inT aT givenT locality",T
Society,T ModernT ScienceT andT Education:T ProblemsT andT Prospects,T 2012,T 115-117.
20. TeleginT V.V,T "ComputerT modelingT ofT theT efficiencyT ofT usingT alternativeT energyT systems",T NaturalT andT TechnicalT
Sciences,T 2012,T No.T 5T (61),T pp.T 309-312.
21. KrivchenkoT G.I.T HydraulicT machines:T TurbinesT andT pumps.T MT .:T Energia,T 1978.
8.
Authors: Natalia P. Nikonova, Larisa N. Gorina, Linar G. Akhmetov
Paper Title: The Use Of Cloud Technologies In The Modern Educational Process
Abstract: The article describes the features of the use of blog technologies in the educational field. The
relevance of the article is to study the influence of computer technologies on the process of computerization of
education, which is accompanied by the introduction of corrections to the content of learning technologies due to
significant changes in the pedagogical theory and practice of the educational process. The purpose of the article is
to study the process of forming the professional competence of students through the use of such Internet
technologies as a blog. Attention is focused on the problem of determining this Internet technology and its essence
in the educational process. The article also highlighted a number of stable characteristics of blogs and described
the functions performed by blogs.
Keywords: cloud technologies, blog, professional competence, blog, informatization, communication
References: 1. Albekova Z.M. Electronic education systems and cloud technologies in education // Historical and socio-educational thought. 2016. No.
S1. Pp. 6-8.
2. Alzhanova D.I. Advantages of using cloud technologies in education // Problems of modern science and education. 2016. № 3 (45). Pp.
75-77.
3. Anokhina E.V., Godina E.Z., Matukhin P.G., Provotorova E.A., Titova E.P. Online tools for information and methodological support of
distant study of the course "human anatomy" for foreign medical students of the pre-university stage of education based on cloud byod-
technologies microsoft onedrive / word-online // Bulletin of the Center for International Education of Moscow State University. Philology. Culturology. Pedagogy. The technique. 2015. No. 4. P. 33-39.
4. Berstneva S.V., Klyueva M.S., Oskin D.N. The use of cloud technologies in additional vocational education // Collected papers on the
problems of additional vocational education. 2018. No. 35. P. 70-76.
5. Bobrova I.I. Study of the problem of intellectual socialization of subjects of vocational education using cloud computing technologies //
Actual problems of modern science, technology and education. 2016. T. 1. S. 195-198.
6. Kanev M.A. The use of cloud technologies to improve the quality of education in higher education // Psychological, economic and
managerial aspects of educational activities Materials of the correspondence scientific-practical conference. 2014. S. 98-100.
7. Kapustina DD, Potanina M.V. Features of the use of cloud technologies in education // World of Computer Technologies. Collection of
articles of the All-Russian Student Scientific and Technical Conference. Scientific editor E.N. Mashchenko. 2018. pp. 93-95.
8. Karaskova N.S., Soldatenkov R.M. Application of cloud technologies in education on the example of microsoft office 365 // Bulletin of
the Moscow State Regional University. Series: Physics and Mathematics. 2016. No. 1. P. 108-116.
9. Krupoderova K.R. Formation of competencies of bachelors of vocational education in the information environment based on cloud
technologies // Problems of modern pedagogical education. 2016. № 51-6. Pp. 181-188.
38-43
10. Kurgan G.S. Self-organization of online education in cloud technologies // Bulletin of Buryat State University. 2014. № 9-3. Pp. 27-31.
11. Lozitsky V.L. Information and communication technologies in high school social and humanities education: didactic aspects of the use of
cloud services // Higher School: Navukov-Metadichny and Public Chastopis. 2014. № 5 (103). Pp. 39-44.
12. Sirotkin A.Yu. Pedagogical potential of cloud technologies in higher education // Psychological and pedagogical journal Gaudeamus.
2014. № 2 (24). Pp. 35-42.
13. Shangina E.I., Shangin G.A. Mobile-cloud technologies in modern education // International Research Journal. 2016. № 12-4 (54). Pp.
117-119.
14. Shekerbekova Sh.T., Nesipkaliev U. Opportunities for the introduction and use of cloud technologies in education // International Journal
of Applied and Fundamental Research. 2015. № 6-1. Pp. 51-55.
15. Yaganova A.A. Cloud technologies in education as an element of the development of the information society // Bulletin of the RSUH.
Series: Documentation and archival studies. Computer science. Information security and information security. 2016. № 1 (3). Pp. 9-13.
16. Akhmetshin, E. M., Ilyina, I. A., Kulibanova, V. V., & Teor, T. R. (2019). 'Employee engagement' management facilitates the recovery
from crisis situations. Paper presented at the Proceedings of the 2019 IEEE Communication Strategies in Digital Society Seminar, ComSDS 2019, 50-55. doi:10.1109/COMSDS.2019.8709645
17. Ibatova, A. Z., & Ippolitova, N. V. (2018). Structuring the content of disciplines in higher school using a block-modular rating system for
future oil and gas engineers. International Journal of Civil Engineering and Technology, 9(3), 394-399.
18. Akhmetshin, E. M., Mueller, J. E., Chikunov, S. O., Fedchenko, E. A., & Pronskaya, O. N. (2019). Innovative technologies in
entrepreneurship education: The case of european and asian countries. Journal of Entrepreneurship Education, 22(1)
19. Bochkareva, T. N., Akhmetshin, E. M., Korotkova, A. L., Lyitkina, N. L., Nasipov, I. S., & Khaliullina, A. G. (2017). Research of
students' cognitive activity. Espacios, 38(60)
20. Ibatova, A. Z., & Ivanova, N. L. (2018). A professionally oriented approach to teaching engineering students: From theory to practice.
International Journal of Mechanical Engineering and Technology, 9(4), 977-982.
9.
Authors: R. Obulakonda Reddy, Dr. K.Reddy Madhavi, V. Nagalakshmi
Paper Title: Moving Objects Detection & Recognition using Hybrid Canny Edge Detection Algorithm in Digital
Image Processing
Abstract: Recognition and detection of an object in the watched scenes is a characteristic organic capacity.
Animals and human being play out this easily in day by day life to move without crashes, to discover sustenance,
dodge dangers, etc. Be that as it may, comparable PC techniques and calculations for scene examination are not all
that direct, in spite of their exceptional advancement. Object detection is the process in which finding or
recognizing cases of articles (for instance faces, mutts or structures) in computerized pictures or recordings. This is
the fundamental task in computer. For detecting the instance of an object and to pictures having a place with an
article classification object detection method usually used learning algorithm and extracted features. This paper
proposed a method for moving object detection and vehicle detection.
Keywords: detection, digital image, object, recognition.
References: 1. Bowlby, J. (1969). Attachment and Loss: Volume I Attachment (2nd ed., Vol. 1). New York: Basic Books.
2. Broch, C., Lurati, F., Zamparini, A., & Mariconda, S. (2017). The Role of Social Capital for Organizational Identification: Implications
for Strategic Communication. International Journal of Strategic Communication, 12(1), 46–66.
3. Brock, D. (2009). Aftersales Management: Creating a Successful Aftersales Strategy to Reduce Costs, Improve Customer Service and
Increase Sales. London, United Kingdom: Kogan Page Publishers.
4. Bryman, A. (2012). Social Research Methods (4th ed.). New York: Oxford University Press Inc. Bryman, A., & Bell, E. (2011). Business
Research Methods 3e. Oxford, UK: OUP Oxford.
5. Bukalapak. (2018). Tentang Bukalapak. Retrieved November 2, 2018, from https://www.bukalapak.com/about
6. Caers, R., De Feyter, T., De Couck, M., Stough, T., Vigna, C., & Du Bois, C. (2013). Facebook: A literature review. New Media and
Society.
7. Chellappa, R. K., & Sin, R. G. (2005). Personalization versus Privacy : An EmpiricalExamination of the Online Consumer ’ s Dilemma.
Information Technology and Management, 6(2–3), 181–202.
8. Church, K., & de Oliveira, R. (2013). What’s up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS.
15th International Conference on Human- Computer Interaction with Mobile Devices and Services (MobileHCI’13), 352–361.
9. Couldry, N. (2012). Media, Society, World: Social Theory and Digital Media Practice.
10. Cambridge: Polity.
11. Creswell, J. W. (2014). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). California: SAGE
Publications, Inc.
12. Daymon, C., & Holloway, I. (2010). Qualitative Research Methods in Public Relations and Marketing Communications (2nd ed.).
Routledge.
13. Denzin, N. K., & Lincoln, Y. S. (2003). Strategis of Qualitative Inquiry (2nd ed.). California: SAGE Publications, Inc.
14. Edwards, D., Ho, L., & Choi, S. (2017). Media , Mobilities and Identity in East and Southeast Asia : Introduction. Cultutral Studies
Review, 23(1), 60–68.
15. Fill, C. (2009). Marketing Communications: Interactivity, Communities and Content. Harlow, Edinburgh: Pearson Education Limited.
16. Fogli, L., & Ukei, J. (2005). Customer Service Delivery: Research and Best Practices. Hoboken, New Jersey: John Wiley & Sons.
17. Galloway, L., Rowbotham, F., & Azhashemi, M. (2012). Operations Management in Context.
18. Abingdon, United Kingdom: Routledge.
19. Jordan, Z. (2016). The effect of promotion mix elements on Consumers Buying Decisions of Mobile Service : The case of Umniah
Telecommunication Company at Zarqa city- Jordan. European Journal of Business and Management, 8(5), 94–100.
20. Kaniewska-Sċba, A., & Pilarczyk, B. (2014). Negative Effects of Personalization in Direct
21. Marketing. International Journal of Arts & Sciences, 7(2), 89–98.
22. Karjaluoto, H., & Mustonen, N. (2015). The Role of Digital Channels in Industrial Marketing Communications. Journal of Business &
Industrial Marketing, 30(6), 703–710.
23. Kemp, S. (2018). Digital In 2018 In Southeast Asia.
24. Kern, F. G. (2018). The Trials and Tribulations of Applied Triangulation: Weighing Different Data Sources. Journal of Mixed Methods
Research, 12(2), 166–181.
25. Kothari, C. R. (2004). Research Methodology: Methods & Techniques. New Age International
26. (2nd ed.). New Delhi: New Age International Publisher.
27. Lee, E., Lee, J.-A., Moon, J. H., & Sung, Y. (2015). Pictures Speak Louder than Words: Motivations for Using Instagram.
44-48
Cyberpsychology, Behavior, and Social Networking 18(9), 552–556.
28. Lister, M., Dovey, J., Giddings, S., Grant, I., & Kelly, K. (2009). New Media: A Critical Introduction. (M. Lister, Ed.). New York: Taylor
& Francis.
29. Liu, Y., & Shrum, L. J. (2002). What is Interactivity and is It Always Such a Good Thing? Implications of Definition, Person, and
Situation for the Influence of Interactivity on Adveritising Effectiveness. Journal of Advertising, 31(4), 53–64.
30. Montag, C., Błaszkiewicz, K., Sariyska, R., Lachmann, B., Andone, I., Trendafilov, B., … Markowetz, A. (2015). Smartphone usage in
the 21st century: Who is active on WhatsApp? BMC Research Notes, 8(1), 4–9.
31. Mulhern, F. (2009). Integrated marketing communications : From media channels to digital
32. connectivity. Journal of Marketing Communications, 15(2009), 85–101.
33. Ng, D. (2017). Evolution of Digital Payments: Early learnings from Singapore’s cashless payment drive. Journal of Payments Strategy &
Systems, 11(4), 306–312.
34. OLX. (2018). Tentang OLX. Retrieved December 2, 2018, from https://help.olx.co.id/hc/id/articles/213746523-Tentang-OLX
35. Osterwalder, A., & Pigneur, Y. (2010). Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers. (Y.
Pigneur, Ed.). Hoboken, New Jersey: John Wiley & Sons.
36. Ouwersloot, H., & Duncan, T. (2008). Integrated Marketing Communication (European).
37. Berkshire: McGraw-Hill Education.
38. Palmatier, R. W. (2000). Relationship Marketing. Emerging Perspectives of Services Marketing.
39. Cambridge, Massachusetts: Marketing Science Institute.
40. Rangaswamy, A., & Bruggen, G. H. Van. (2005). Opportunities and Challenges in Multichannel Marketing : An Introduction to the
Special Issue. Journal of Interactive Marketing, 19(2), 5–11.
41. Sahu, S. (2014). An Analysis of WhatsApp Forensics in Android Smartphones. International Journal of Engineering Research, 5013(3),
349–350.
42. Saunder, M. N. K., Lewis, P., & Thornhill, A. (2015). Research Methods for Business Students
43. (7th ed.). London, England: Pearson Education Limited.
44. Silverman, D. (2010). Doing Qualitative Research. California: SAGE Publications, Inc.
45. Sullivan, Y. W., & Kim, D. J. (2018). Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-
commerce environments. International Journal of Information Management, 39(December 2017), 199–219.
46. Sundqvist, E., Backlund, F., & Chronéer, D. (2014). What is Project Efficiency and Effectiveness? Procedia - Social and Behavioral
Sciences, 119, 278–287.
10.
Authors: Kusumah Arif Prihatna, Rosalin Ayal, Meutia Sistarani,Yunitasari Christanti
Paper Title: What Whatsapp Status Enables Reseller to Do as Channel
Abstract:
This research aims to understand the phenomena that arise from WhatsApp users who utilize WhatsApp Status to
market their products. This research focuses on the background capabilities of WhatsApp Status that allow
resellers to market their products based on capabilities of WhatsApp Status as part of social media, as a channel to
deliver the value proposition to the customer, and as a means of supporting engagement between sellers and
buyers. The qualitative approach was carried out by involving selected active users of WhatsApp Status based on
Snowball Sampling. This research identifies the significant capability of WhatsApp Status as the main digital
marketing channel for resellers in marketing their products where WhatsApp Status allows attachment between
resellers and customers while WhatsApp itself is the most used chat application. However, WhatsApp Status has
limited functionality only as a marketing channel with all the capabilities of social media in general.
Index Terms: WhatsApp, WhatsApp Status, Attachement Theory, Digital Media, Channel, Marketing,
Reseller
References:
1. Bowlby, J. (1969). Attachment and Loss: Volume I Attachment (2nd ed., Vol. 1). New York: Basic Books.
2. Broch, C., Lurati, F., Zamparini, A., & Mariconda, S. (2017). The Role of Social Capital for Organizational Identification: Implications for
Strategic Communication. International Journal of Strategic Communication, 12(1), 46–66.
3. Brock, D. (2009). Aftersales Management: Creating a Successful Aftersales Strategy to Reduce Costs, Improve Customer Service and
Increase Sales. London, United Kingdom: Kogan Page Publishers. 4. Bryman, A. (2012). Social Research Methods (4th ed.). New York: Oxford University Press Inc. Bryman, A., & Bell, E. (2011). Business
Research Methods 3e. Oxford, UK: OUP Oxford.
5. Bukalapak. (2018). Tentang Bukalapak. Retrieved November 2, 2018, from https://www.bukalapak.com/about 6. Caers, R., De Feyter, T., De Couck, M., Stough, T., Vigna, C., & Du Bois, C. (2013). Facebook: A literature review. New Media and
Society.
7. Chellappa, R. K., & Sin, R. G. (2005). Personalization versus Privacy : An EmpiricalExamination of the Online Consumer ’ s Di lemma. Information Technology and Management, 6(2–3), 181–202.
8. Church, K., & de Oliveira, R. (2013). What’s up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS.
15th International Conference on Human- Computer Interaction with Mobile Devices and Services (MobileHCI’13), 352–361. 9. Couldry, N. (2012). Media, Society, World: Social Theory and Digital Media Practice.
10. Cambridge: Polity.
11. Creswell, J. W. (2014). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). California: SAGE Publications, Inc.
12. Daymon, C., & Holloway, I. (2010). Qualitative Research Methods in Public Relations and Marketing Communications (2nd ed.).
Routledge.
13. Denzin, N. K., & Lincoln, Y. S. (2003). Strategis of Qualitative Inquiry (2nd ed.). California: SAGE Publications, Inc.
14. Edwards, D., Ho, L., & Choi, S. (2017). Media , Mobilities and Identity in East and Southeast Asia : Introduction. Cultutral Studies
Review, 23(1), 60–68. 15. Fill, C. (2009). Marketing Communications: Interactivity, Communities and Content. Harlow, Edinburgh: Pearson Education Limited.
16. Fogli, L., & Ukei, J. (2005). Customer Service Delivery: Research and Best Practices. Hoboken, New Jersey: John Wiley & Sons.
17. Galloway, L., Rowbotham, F., & Azhashemi, M. (2012). Operations Management in Context. 18. Abingdon, United Kingdom: Routledge.
19. Jordan, Z. (2016). The effect of promotion mix elements on Consumers Buying Decisions of Mobile Service : The case of Umniah
Telecommunication Company at Zarqa city- Jordan. European Journal of Business and Management, 8(5), 94–100. 20. Kaniewska-Sċba, A., & Pilarczyk, B. (2014). Negative Effects of Personalization in Direct
21. Marketing. International Journal of Arts & Sciences, 7(2), 89–98.
49-51
22. Karjaluoto, H., & Mustonen, N. (2015). The Role of Digital Channels in Industrial Marketing Communications. Journal of Business &
Industrial Marketing, 30(6), 703–710. 23. Kemp, S. (2018). Digital In 2018 In Southeast Asia.
24. Kern, F. G. (2018). The Trials and Tribulations of Applied Triangulation: Weighing Different Data Sources. Journal of Mixed Methods
Research, 12(2), 166–181.
25. Kothari, C. R. (2004). Research Methodology: Methods & Techniques. New Age International
26. (2nd ed.). New Delhi: New Age International Publisher.
27. Lee, E., Lee, J.-A., Moon, J. H., & Sung, Y. (2015). Pictures Speak Louder than Words: Motivations for Using Instagram. Cyberpsychology, Behavior, and Social Networking 18(9), 552–556.
28. Lister, M., Dovey, J., Giddings, S., Grant, I., & Kelly, K. (2009). New Media: A Critical Introduction. (M. Lister, Ed.). New York: Taylor
& Francis. 29. Liu, Y., & Shrum, L. J. (2002). What is Interactivity and is It Always Such a Good Thing? Implications of Definition, Person, and Situation
for the Influence of Interactivity on Adveritising Effectiveness. Journal of Advertising, 31(4), 53–64.
30. Montag, C., Błaszkiewicz, K., Sariyska, R., Lachmann, B., Andone, I., Trendafilov, B., … Markowetz, A. (2015). Smartphone usage in the 21st century: Who is active on WhatsApp? BMC Research Notes, 8(1), 4–9.
31. Mulhern, F. (2009). Integrated marketing communications : From media channels to digital
32. connectivity. Journal of Marketing Communications, 15(2009), 85–101. 33. Ng, D. (2017). Evolution of Digital Payments: Early learnings from Singapore’s cashless payment drive. Journal of Payments Strategy &
Systems, 11(4), 306–312.
34. OLX. (2018). Tentang OLX. Retrieved December 2, 2018, from https://help.olx.co.id/hc/id/articles/213746523-Tentang-OLX 35. Osterwalder, A., & Pigneur, Y. (2010). Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers. (Y.
Pigneur, Ed.). Hoboken, New Jersey: John Wiley & Sons.
36. Ouwersloot, H., & Duncan, T. (2008). Integrated Marketing Communication (European). 37. Berkshire: McGraw-Hill Education.
38. Palmatier, R. W. (2000). Relationship Marketing. Emerging Perspectives of Services Marketing.
39. Cambridge, Massachusetts: Marketing Science Institute. 40. Rangaswamy, A., & Bruggen, G. H. Van. (2005). Opportunities and Challenges in Multichannel Marketing : An Introduction to the Special
Issue. Journal of Interactive Marketing, 19(2), 5–11.
41. Sahu, S. (2014). An Analysis of WhatsApp Forensics in Android Smartphones. International Journal of Engineering Research, 5013(3), 349–350.
42. Saunder, M. N. K., Lewis, P., & Thornhill, A. (2015). Research Methods for Business Students
43. (7th ed.). London, England: Pearson Education Limited. 44. Silverman, D. (2010). Doing Qualitative Research. California: SAGE Publications, Inc.
45. Sullivan, Y. W., & Kim, D. J. (2018). Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-
commerce environments. International Journal of Information Management, 39(December 2017), 199–219. 46. Sundqvist, E., Backlund, F., & Chronéer, D. (2014). What is Project Efficiency and Effectiveness? Procedia - Social and Behavioral
Sciences, 119, 278–287
11.
Authors: K. VinayaLaxmi, Dr. P. Vijaya Kumar, Dr. M. S. Narayana
Paper Title:
Identification and Prioritisation of Impact Factors in Quality Service Of ICICI Bank With Special
Reference To Urban Cities Of Telangana State
Abstract: The research mainly deliberates to examine the influencing level of governing client retail service
satisfaction towards ICICI banking. A five point likert scale was used to construct the questionnaire with 21
multivariate questions and collected data from 502 respondents, correlation and regression were the tools of
statistics used to measure the level of impact of the factors on client satisfaction. Inferences were drawn based on
the findings of the study. Questions were framed based on the SERVQUAL dimensions to examine consumer
service quality provided by ICICI bank in Hyderabad, Rangareddy and Medak districts and data was collected
from concerned account holders in the bank branches. Correlation and regression were used as the tools of
analyses. According to the inferences drawn there is a mere influence of the quality service factor dimensions and
the client contentment level which was considered very significant. The banks to make a increased client share in
the dynamic market has to focus in the stunted areas of development and strengthen their client force.
Keywords: Perception, Tangibility, Assurance, Reliability, Responsiveness, Client satisfaction
References: 1. Yavas and Babakus, “measuring service quality of banks: Scale development and validation”, Journal of Retailing and Consumer
Services 12(5): pp. 373-383. September 2005 2. Winstanley,M., “What Drives Customer Satisfaction in Commercial Banking”, Commercial Lending Review, 1996, 12(3): pp. 36-
42.
3. Churchill Jr. and G.A. Suprenant C“An Investigation into the Determinants of Customer Satisfaction. Journal of Marketing Research (JMR), 1982, 19,pp. 491-504.
4. Parsuraman et.al. , Parasuraman, A., Zeithaml, V.A. and Berry, L.L. , “SERVQUAL: A Multiple Item Scale for Measuring
Consumer Perceptions of Service Quality”, Journal of Retailing, 1988, Vol. 64, No. 1, pp.14-40 5. Gronroos, C., “Quo vadis, marketing? Towards a relationship marketing paradigm”, Journal of Marketing Management, 1994, Vol.
10, pp. 347-60
6. Christian Grönroos "A Service Quality Model and its Marketing Implications", European Journal of Marketing, 1984, Vol. 18 No. 4, pp. 36-44
7. Cadott et al., Inc. “Distinguishing Service Quality and Customer Satisfaction: The Voice of the Consumer”,Journal of Consumer
Psychology,Lawrence Erlbaum Associates, 1987, 4(3), 277-303 Copyright 0 1995 8. Fornell, C., “A National Customer Satisfaction Barometer: The Swedish Experience”, Journal of Marketing,1992, 56, pp. 6-21.,
https://doi.org/10.2307/1252129.
9. Zeithmal et al., “service quality, customer satisfaction in technology - based universities”, African Journal of Business Management, 4 August, 2011 “Vol. 5(15), pp. 6541-6553
10. Oliver, R. L., “Satisfaction: A Behavioural Perspective on the Consumer”, New York, McGraw Hill,1997.
11. Storbacka, K., Strandvik, T. & Grönroos, C., “Managing Customer Relationships for Profit: The Dynamics of Relationship Quality”, International Journal of Service Industry Management, Sept 1994, pp. 21- 38.
52-59
12. Authors: Dr. G. S. Jayesh
Paper Title: An Analysis on Impact of Exchange Rate on Nifty and S&P Sensex
Abstract: In the last two decades, the developments happened in India have led to an interdependency between
the stock market and exchange rate markets. The present study focuses on understanding the impact of the foreign
exchange rate and the stock market interdependency. The indices NIFTY and SENSEX define major movements
in the stock market hence they gain importance in studying. Also, the technical analysis has been done for the
Indices to study the performance of stock. The results obtained from the study will facilitate the decision making
of the investors.
Keywords: Foreign Exchange, Nifty, Stock Market, Sensex
References: 1. TRAN MONG UYEN NGAN (2016) Relationship between Foreign Exchange Rate and Stock Price of Commercial Joint Stock Banks:
Evidence from Vietnam
2. DEEPTIGULATI,MONIKAKAKHANI,(November2012)RelationshipBetween Stock Market and Foreign Exchange Market in India: An
Empirical Study, Volume5, Issue 5
3. Vandana kotai,(2013),IMPACT OF EXCHANGE RATE FLUCTUATION ON STOCK MARKET VOLATILITY-A STUDY TO
PREDICT THE ECONOMIC SCENARIO IN INDIA , volume118.
4. Sankaran Venkateshwar,(1991) The Relationship of Indian Stock Market to Other Stock Markets. Indian Economic Journal, Vol. 39, No.
2 (Oct-Dec), p.105-109.
5. Manish.R.Pathak(2013)Stock Market Seasonality: A Study Of The Indian Stock Market (NSE) PARIPEX – Indian Journal of Research
Vol 2 Issue 3 March(2013).
60-64
13.
Authors: Vera Rogova*
Paper Title: Marketing Model of Professional Orientation
Abstract: In the article it’s discussed the possibility and feasibility of the marketing approach in the organization
and implementation of professional orientation of students as potential students of universities. The tasks facing
modern higher education organizations in Russia are largely similar in nature to the problems of commercial
organizations, which allows us to consider both the existing practical experience and to use the existing theoretical
Foundation of marketing to solve the problems facing Russian higher education today
Keywords: training of engineering and technical personnel, marketing of non-profit organizations, traditional
and marketing model of career guidance, marketing tools
References: 1. “Global innovation index” URL: https://www.globalinnovationindex.org/
2. G.P. Litvintseva, N.G. Nizovkina, N.A. Gakhova, “ Training of engineering and technical personnel, taking into account the achievements
of modern economic science” Education and Science. Vol. 19, № 2. 2017. P.101–123.
3. V.A. Rogova, “Personnel problems of high technology development in Russia in the mirror of the Global innovation index” Rossiyskiy
tekhnologicheskiy zhurnal (Russian Technological Journal). 2018, 6(4), p. 105-116. (in Russ.)
4. “Education in Russia – 2018. Statistical bulletin” Moscow, MIREA — Russian Technological University. 2018. 422 p.
5. P. Druker, Management in a non-profit organization: principles and practice. Moscow, Wiliams. 2007. 304 p.
6. P. Kotler K. Fox, Strategic Marketing for Educational Institutions. 1995. Prentice Hall, Englewood Cliffs, NJ.
7. P. Kotler, A.R. Andreasen, Strategic marketing of non-profit organizations. Rostov-na-Donu, “Feniks”. 2007. 854 p.
8. P. Naudea, J. Ivy “The marketing strategies of universities in the United Kingdom” The International Journal of Educational
Management, 1999, № 13/3. pp. 126-134.
9. A.P. Pankrukhin, Marketing of educational services. URL: http://www.marketologi.ru.
10. G.N. Prozumetova, “Potential of interaction between universities and schools: empirical models” Vestnik TSU. 2012. № 358. P. 182-188.
11. E. Constantinides, M.C.Z. Stagno, “Higher education marketing: A study on the impact of social media on study selection and university
choice” International Journal of Technology and Education Marketing (IJTEM). 2012. Vol. 2, № 1. P.41-58. .
65-67
14.
Authors: Maria Polismakova *1, Vera Ershova2, Alexander Sandulyak1, Anna Sandulyak 1
Paper Title: Induction of the Field at Different Distances from The Permanent Magnet And Between Opposing
Magnets. Testing Of the Superposition Principle
Abstract: The measurement data of the field induction at different distances from the permanent magnet Nd-Fe-
B and between two equivalent magnets on distance are presented. It is shown that the obtained coordinate
dependences are described by exponential function, but for a system of two magnets –only partially: up to the
central area of the system and make 20-30% of the entire area between opposing magnets. Using the example of
the coordinate dependence of induction for one of two identical magnets, it is shown that the use of the
superposition principle makes it possible to obtain a coordinate dependence of induction between opposing
magnets, which is equivalent to experimental one.
Keywords: permanent magnet, system of two magnets, coordinate dependence of induction, superposition
principle
References: 1. A.V. Sandulyak, A.A. Sandulyak, M.N. Polismakova, D.O. Kiselev, D.A. Sandulyak, “Faraday Magnetometer With Sheric Pole Pieces:
Identification Zone With A Stable Force Factor” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal). 2017; 5(6): 43-
54. (in Russ.)
2. A.V. Sandulyak, A.A. Sandulyak, M.N. Polismakova, D.A. Sandulyak, V.A. Ershova, “The approach to the creation and identification of
the positioning zone of the sample in the Faraday magnetometer” Journal of Magnetism and Magnetic MaterialsV.469 (1) 2019, P. 665-
673.
68-77
3. V. Zezulka, P. Straka, P. Mucha, “A magnetic filter with permanent magnets on the basis of rare earth” J. Magn. Magn. Mater. 268 (2004)
P.219–226.
4. J.M.D. Coey, “Permanent magnet applications” J. Magn. Magn. Mater. 248 (2002) P. 441–456.
5. F. Mishima, T. Terada, Y. Akiyama, Y. Zumi, H. Okazaki, S. Nishijima, “Research and development of superconducting magnetic
separation system for powdered products” IEEE Transactions on Applied Superconductivity 2008. 18 (2), art. no.4520245, P. 824-827.
6. C.M. Earhart, R.J. Wilson, R.L. White, N. Pourmand, S.X. Wang, “Microfabricated magnetic sifter for high-throughput and high-gradient
magnetic separation” J. Magn. Magn. Mater. 321 (2009) P. 1436–1439.
7. J. Li, Y. Liu, S.J. Gao, M. Li, Y.Q. Wang, M.J. Tu, “Effect of process on the magnetic properties of bonded NdFeB magnet” J. Magn.
Magn. Mater. 299 (2006) P. 195–204.
8. Y. Liu, H. Peng, Hu. Mingzhen, “Removing iron by magnetic separation from a potash feldspar ore” J. Wuhan Univ. Technol. Mater Sci.
Ed. 28 (2) (2013) P. 362–366.
9. J. N. Darton, B. Hallmark, P. Agrawal, T. James, Vincent H.B. Ho, Nigel K.H. Slater. On the magnetic field architecture required to
capture superparamagnetic nanoparticles in a microcapillary flow, J. Nanoparticle Res.12 (1) (2010) P.307–317.
10. Sandulyak A.V., Polismakova M.N., Sandulyak A.A., Sandulyak D.A., Ershova V.A. Convergence check of data from step-by-step
experimental-computational magnetic control of iron impurities in raw materials using different field sources. Glass and Ceramics. (2018)№ 9-10(74). 332-336. 1.
15.
Authors: Alexander Novikov*1, Nikolay Chekalkin1, Nadezhda Sokolaeva2, Dmitry Miskov1, Ekaterina
Dzhevello1, Evgeniy Larionov1, Vyacheslav Muraviev1, Maxim Nazarenko1
Paper Title: Mathematical Education of A Modern Engineer: Problems Of Integration
Abstract: The article discusses the methods of teaching mathematics at a technical University, focuses on the
means of integration of mathematical and engineering training of students, provides recommendations for the
preparation and use of educational and practical tasks that implement the goals of integration in the educational
process of the University.
Keywords: mathematics teaching, engineering education, knowledge integration
References: 1. N.В. Golovanova et al, “Implementation Of The Practically-Oriented Approach In The Specialists Training On Radio Engineering And
Communication Systems” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal). 2018. 6(1): 73-87. (in Russ.)
2. S.V. Kruchinin et al, “Main Self-Educational Platforms in Russia and Skills that Can Be Develop Via Them” Proceedings of the 2018
International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,
2018, 8525032, p. 669-671. DOI: 10.1109/ITMQIS.2018.8525032
3. E.V. Bagrova et al, Additional Education in Russia. Ways of Development” Proceedings of the 2018 International Conference “Quality
Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524999, p. 561-564. DOI:
10.1109/ITMQIS.2018.8524999
4. S.V. Kruchinin et al, “Simultaneous Development of E-Learning in Russia and Information Society” Proceedings of the 2018
International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524994, p. 666-668. DOI: 10.1109/ITMQIS.2018.8524994
5. A.A. Filippov et al, “Algorithm of End-to-End Integrated Quality Management” Proceedings of the 2018 International Conference
“Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8525039, p. 44-46.
DOI: 10.1109/ITMQIS.2018.8525039
6. M.S. Kostin et al, “Counterreengineering of electronic devices” Rossiyskiy tekhnologicheskiy zhurnal (Russian Technological Journal).
2019; 7(1): 57-79. (in Russ.). DOI: 10.32362/2500-316X-2019-7-1-57-79
7. V.V. Muraviev et al, “Company Life Cycle and Quality Standardization” Proceedings of the 2018 International Conference “Quality
Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8525064, p. 59-62. DOI:
10.1109/ITMQIS.2018.8525064
8. S.V. Kruchinin et al, “Key Ways of Information Technologies for Self-Education Development. Pros and Cons” Proceedings of the 2018
International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,
2018, 8544901, p. 663-665. DOI: 10.1109/ITMQIS.2018.8524901
9. M.A. Nazarenko et al, “Model end-to-end integrated quality management” International Journal of Engineering and Technology (UAE).
2018. Volume 7, Issue 4.36. P. 60-63.
10. E.V. Bagrova et al, “Usage of Information Technologies in Self-Education in Russia” Proceedings of the 2018 International Conference
“Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524940, p. 565-567.
DOI: 10.1109/ITMQIS.2018.8524940
11. M.A. Nazarenko, “Mobile Operating Systems and Integrated Apps Quality Management System” Proceedings of the 2018 International
Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8525022, p. 63-65. DOI: 10.1109/ITMQIS.2018.8525022
12. E.S. Djevello et al, “Specifics of Management Quality Implementation to Information Systems and Products” Proceedings of the 2018
International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,
2018, 8524995, p. 40-43. DOI: 10.1109/ITMQIS.2018.8524995
13. E.V. Bagrova et al, “Quantity Measures of Quality in Higher Education in Russia. How Information Technologies Can Help?”
Proceedings of the 2018 International Conference “Quality Management, Transport and Information Security, Information Technologies”,
IT and QM and IS, 2018, 8525044, p. 557-560. DOI: 10.1109/ITMQIS.2018.8525044
14. M.A. Nazarenko, T.V. Khronusova “Big Data in Modern Higher Education. Benefits and Criticism” Proceedings of the 2017
International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,
2017, 8084914, p. 676-679. DOI: 10.1109/ITMQIS.2017.8085914
15. A.I. Gorobets et al, “Technical and economical analysis of efficiency of electronic means’ quality management” International Journal of
Engineering and Technology (UAE). 2018. Volume 7, Issue 4.20. P. 629-630. DOI: 10.14419/ijet.v7i2.8.10548
16. M.A. Nazarenko, “Some properties of rational approximations of degree (k,1) in the Hardy space H2(D)” Mathematical Notes. 1998.
64(1-2). P. 213-219.
17. M.A. Nazarenko et al, “Main directions of higher education regionalization process as an integral part of social partnership in society
(The problems of inclusive education)” International Journal of Engineering and Technology (UAE). 2018. Volume 7, Issue 4.36. P.
1135-1138. DOI: 10.14419/ijet.v7i4.36.25052
18. Y.Y. Cheremukhina et al, “The process of working with claims in the quality management system of an enterprise of the radio-electronic
industry” International Journal of Engineering and Technology (UAE). 2018. Volume 7, Issue 4.36. P. 67-68. DOI: 10.14419/ijet.v7i4.36.23313
78-82
19. M.A. Nazarenko et al, “Antivirus software and industrial cyber security system certification in Russia” Rossiyskiy tekhnologicheskiy
zhurnal (Russian Technological Journal). 2019; 7(1): 48-56. (in Russ.). DOI: 10.32362/2500-316X-2019-7-1-48-56
16.
Authors: A.P. Kalmegh1, Dr. P.M. Khodke2
Paper Title: Multiparametric Optimization of Low Plasticity Burnishing Process for AISI 4340 by Using Utility
Concept
Abstract: Low plasticity burnishing (LPB®) is an innovative method which provides deep and stable
compressive residual stresses. It improves surface characteristic such as low and high cycle fatigue strength,
surface finish, microhardness, wear resistance, corrosion resistance, etc. The objective of the multi parametric
process optimization for LPB is to find out appropriate levels of process variables i.e. ball diameter, pressure,
speed, initial surface roughness and number of passes for achieving optimum values of surface roughness,
hardness and fatigue life simultaneously. Considering multiple output responses in the present study, multi
response optimization is essential. This paper deals with multi objective LPB process optimization problem of
response characteristics with Utility concept for AISI 4340 steel alloy.
LPB® is a registered trademark of Lambda Technologies group.
Keywords: LPB, surface roughness (Ra), surface hardness (Hw), fatigue life (FL), AISI 4340, Utility Concept
References: 1. M.M. EL-Khabeery ,M.H.EL-Axir, ‘Experimental techniques for studying the effects of milling roller-burnishing parameters on surface
integrity’, International Journal of machine tools and manufacture 41,2001, 1705-1719.
2. Paul S.Prevey , Ravi A.Ravindranath, ‘Case studies of fatigue life improvement using low plasticity burnishing in gas turbine engine
application’, Journal of engineering for gas turbines & power, Vol.128/865 October 2006.
3. Paul S.Prevey , N.Jayaraman ,Ravi A.Ravindranath, Michael Shepard, ‘Improved high cycle fatigue damage tolerance of turbine- engine
compressor components by low plasticity burnishing’, Journal of engineering for gas turbines & power, Vol.130/012102-1, January 2008.
4. P.R.Prabhu, S.M.Kulkarni, S.S.Sharma, ‘Influence of deep cold rolling and low plasticity burnishing on surface hardness and surface
roughness of AISI 4140 Steel’, World Academy of Science, Engineering and Technology 72 ,2010.
5. Paul S.Prevey, Lambda Research, Cincinnati, OH, ‘The effect of cold work on the thermal stability of residual compression in surface
Enhanced IN718’, 20th ASM Materials Solution Conferences & Exposition St.Louis , Missouri, october 10-12,2000.
6. Paul S.Prevey, John T. Cammett, ‘The Influence of surface enhancement by low plasticity burnishing on the corrosion fatigue
performance of AA7075-T6’, International Journal of Fatigue 26, 2004, page975-982.
7. C.Y.Seemikeri ,P.K.Brahmankar , S.B.Mahagaonkar, ‘Investigation on surface integrity of AISI 1045 using LPB tool’, Tribology
International 41, 2008, page724-734.
8. PetruDusa& Gabriel Dumitriu, ‘Analytical method of residual stress evolution into superficial layers at low plasticity burnishing (LPB)’,
international Journal of Materials Processing Technology ISSN 2067-3604, Vol.1,No.1/2009.
9. U.D.Gulhane, S.B.Mishra, P.K.Mishra, ‘Enhancement of surface roughness of 316L stainless steel and TI-6AL-4V using low plasticity
burnishing: DOE approach’, Intyernational journal Mechanical Engineering & Technology, Vol.3, Issue 1, January-April2012, PP.150-
160.
10. Paul S.Prevey, N.Jayaraman, Ravi A.Ravindranath, Michael Shepard, ‘Mitigation of fretting fatigue damage in blade and desk pressure
faces with low plasticity burnishing (LPB)’,
11. A. P. Kalmegh, Dr. P. M. Khodke, ‘Single factor experimentation on low plasticity burnishing process for AISI 4340’, International
journal of advance research in science and engineering, Vol.No. 07, Special issue No. (02), February 2018
12. A. P. Kalmegh, Dr. P. M. Khodke, “Design of Experimentation for Composite Desirability of Low Plasticity Burnishing Process for AISI
4340, International Journal of Pure and Applied Mathematics, Volume 120, No. 6 (2018)
13. RinaChakravorty, Susanta Kumar Gauri and Shankar Chakraborty, ‘Optimization of Multiple Responses of Ultrasonic Machining (USM)
Process: A Comparative Study’ International Journal of Industrial Engineering Computations, 4 (2013),285–296
83-86
17.
Authors: Dmitry Miskov*, Sergey Grodzenskiy, Vyacheslav Muraviev, Irina Vlasova, Alexey Korotkikh,
Alexander Novikov, Irina Baranova, Maxim Nazarenko1
Paper Title: Quality Assurance of Mathematical Education Of The Future Specialist In The Field Of Radio
Engineering
Abstract: The modern pace of changes in the life of society and the change of technology is so high that it
becomes difficult for universities to produce engineers fully ready to work in the specialty. The solution to this
problem is seen in the training of such a specialist, who is able to independently adjust to future activities and
adapt to it, have knowledge that does not become obsolete over time, help to navigate in a new environment and
are, in fact, universal. The priorities of the new educational paradigm are: fundamental, which involves the
orientation to identify the deep intrinsic relationships between the various processes of the surrounding world;
integrity - involving the introduction of the formation of single cycles of the fundamental disciplines, United by a
common objective function-oriented interdisciplinary connections; orientation to the development of the
individual.
Keywords: NA
References: 1. Hines, Peter and Lethbridge, Sarah, “New Development: Creating a Lean University”, Public Money & Management, vol.28, (2008), pp.
53-56.
2. Crute V, Ward Y, Brown S and Graves A., “Implementing Lean in aerospace—challenging the assumptions and understanding the
challenges”, Technovation, vol. 23, no. 12, (2003), pp. 917–928.
3. Womack J P and Jones DT, “Lean thinking: banish waste and create wealth in your corporation”, Free Press, Mumbai, (2003).
4. Murman E M, McManus H and Candido J P, “Enhancing Faculty Competency in Lean Thinking Bodies of Knowledge”, Proc. 3rd Int.
CDIO Conf. CDIO, Cambridge, (2007).
5. Selko A, “Strategies to Help Manufacturers Compete Successfully”, Industry Week, 23 February (2012)
https://www.industryweek.com/companies-amp-executives/strategies-help-manufacturers-compete- successfully.
6. Delbridge R., “Life on the line in contemporary manufacturing”, Oxford University Press, Oxford.
87-90
7. (1998).
8. Cooney R., “Is “lean” a universal production system?” Int. J. Oper. Prod. Manag., vol. 22 no. 10, (2002), pp. 1130–1147.
9. Boyle T A and Scherrer-Rathje M., “An empirical examination of the best practices to ensure manufacturing flexibility” J. Manuf.
Technol. Manag. Vol. 20 no. 3, (2009), pp. 348–366.
10. Wang P, Mohamed Y, Abourizk S, Asce S and Rawa A., “Flow Production of Pipe Spool Fabrication: Simulation to Support
Implementation of Lean Technique”, J. Constr. Eng. Manag., (2009) pp. 1027– 1038.
11. Wall J and Ahmed V., “Use of a simulation game in delivering blended lifelong learning in the construction industry – Opportunities and
Challenges” Comput. Educ., vol. 50 no. 4, (2008), pp. 1383– 1393.
12. Choi B, Park B and Ryu H., “Virtual Factory Simulator Framework for Line Prototyping”, J. Adv. Manuf. Syst., vol. 3, no. 1, (2004), pp.
5–20.
13. Bagchi S and Ritzo C., “A Full-Factory Simulator as a Daily Decision-Support Tool for 300mm Wafer Fabrication Productivity”, Proc.
Wint. Simu. Conf., (2008), pp. 2021–2029.
14. Kadarova J and Demecko M., “New Approaches in Lean Management”, Procedia Econ. Financ., vol.39,
15. (2016), pp. 11–16.
16. Dengiz B and Akbay K S., “Computer simulation of a PCB production line: metamodeling approach” Int. J. Prod. Econ., vol. 63, no. 2,
(2000), pp. 195–205.
17. Moris M, Ng A and Svensson J., “Simplification and Aggregation Strategies Applied For Factory Analysis in Conceptual Phase Using
Simulation” Proc. 2008 Winter Simulation Conference, (2008), pp. 1913–1921.
18. Wan H, Che F and Saygin C., “Simulation and Training for Lean Implementation Using Web-Based Technology”, Int. J. Serv. Oper.
Informatics, vol. 3, no. 1, (2008), pp. 1–14.
19. Andre Fernando Uébe Mansur, Fernando Carvalho Leite and Helvia Pereira Pinto Bastos, “Lean Education for Applied Science
Universities: A Proposal by Federal Institutes of Applied Sciences in Brazil”, Springer International Publishing Switzerland, (2017), pp.
25-39.
20. Gadre A, Cudney E and Corns S., “Model Development of a Virtual Learning Environment to Enhance Lean Education”, Proc. Comp.
Sci. vol. 6, (2011), pp.100–105.
21. Rummler G and Brache A., “Improving Performance: How to Manage the White Space on the Organization Chart”, Wiley, United States,
(1990).
22. Mohamad E, Abdullah R, Hasrulnizzam W and Mahmood W H W., “The level of achievement of Lean Manufacturing Implementation
status before and after the development of KPIs at an Aerospace Manufacturing Company”, Intl. Conf. Rol. Humanit. Soc. Sci. Eng.,
(2008).
23. Fang N, Cook R and Hauser K., “Work in Progress: An Innovative Interdisciplinary Lean Manufacturing Course”, Proc. Front. Edu. 36th
Annual Conference, San Diego, CA., (2006), pp. 13-14.
24. Harris G, Stone K B, Mayeshiba T, Componation P J and Farrington P A., “Transitioning from Teaching Lean Tools To Teaching Lean
Transformation”, J. Enterp. Transform., vol. 4, no. 3, (2014), pp. 191–204.
25. Resta B, Powell D, Gaiardelli P and Dotti S., “Towards a framework for lean operations in product- oriented product service systems”,
CIRP J. Manuf. Sci. Technol., vol. 9, (2015), pp. 12–22.
26. Pearce A, Pons D and Neitzert T., “Implementing lean—Outcomes from SME case studies”, Oper. Res. Perspect, vol. 5, (2018), pp. 94–
104.
27. Alkhoraif A and McLaughlin P. "Lean implementation within manufacturing SMEs in Saudi Arabia: Organizational culture aspects." Jou.
Ki. Sau. Univ. - Eng. Sci. vol. 30, no. 3, (2018), pp. 232–242.
18.
Authors: I.V. Gaidamashko, Y.I. Zhemerikina, O.S. Zhigalov, I.P. Provorova, O.V. Titkova
Paper Title: The Main Aspects of The Formation Of Digital Competence Of Future Civil And Municipal Employees
Abstract: The transmission pricing depends on generator, load levels and transmission line constraints. The
transmission system places an importance on the intensive use interconnected network reliably, which requires
knowledge of the complex capability. Available Transfer Capability (ATC) is a compute of the remaining power
transfer capability of the transmission network for further transactions. Available transfer capability in the
transmission system has become essential quantity to be declared well in advance for its commercial use in a
competitive electricity marketplace. The proposed approach of ATC using AC Power transfer distribution factors
(AC PTDFs) based approach has been used for single and concurrent transactions using power transfer distribution
factor and ATC based Locational Marginal Pricing methodology is used to decide the energy price for transacted
power and to handle the network congestion and marginal losses.
Simulation is carried out on IEEE30 bus system.
Keywords: Locational Marginal Pricing, Optimal Power Flow, transmission pricing, Available Transfer
Capability (ATC), AC Power Transfer Distribution Factor (ACPTDF)
References: 1. Zhemerikina Y.I., Provorova I.P. Positive and negative aspects of information competence // Human capital. 2016. № 6 (90). P. 30-31
2. Malysheva V.V. Formation of professional competence of public servants in the financial sector in the process of continuing education
Text.: author. dis. ...cand. PhD. Volgograd. 2017. 25 p.
3. Decree of the President of the Russian Federation of may 7, 2012 №601 "On the main directions of improving the system of public
administration."
4. Toffler, Alvin. Powershift: Knowledge, Wealth and Violence at the Edge of the 21st Century, 1990.
5. Zhemerikina Y.I., Provorova I.P., Pugacheva E.V. Psychological aspects of the formation of media literacy among students of technical
University// "Modern science: theoretical and practical view: materials of the International scientific and practical conference" (March 28,
2015, Ufa). - Ufa: RIO ICII OMEGA SAINZ, 2015. – P. 202-205
6. Zaytseva O.B. Formation of information competence of future teachers by means of innovative technologies Text.: autoref. dis. ...cand.
PhD. Bryansk. 2002. 19 p.
7. Rogova V.A. Problem of staffing for development of high technologies in russia in the mirror of the global innovation index. // Russian
technological journal. 2018. V 6 № 4, p. 105-116.
8. URL https://rtj.mirea.ru/upload/medialibrary/f3d/RTZH_4_2018_105_116.pdf
91-93
19. Authors: V.N. Krasivskaya
Paper Title: Experience Of Interaction Between The Business And Scientific Community In The Formation Of
Scientific And Technical Potential Of Russia In The Second Half Of The XIX Century
Abstract: The article investigates the main directions of interaction between Russian Industrialists and the
scientific community in the process of formation of the scientific and technical complex of the country during the
forced industrialization of the second half of the XIX century. It is defined as a very significant contribution of a
number of entrepreneurs and scientists in the creation of scientific societies, higher technical education, the
development of conceptual foundations of the state socio-economic and scientific-technical policy of the Russian
Empire.
Keywords: Scientific community, entrepreneurs, Russian modernization, scientific and technical potential.
References: 1. Bodrova E.V., Golovanova N.B. Modernization Of The Higher Technical School: Historical Experience And Prospect // Russian
Technological Journal. 2017. V. 5. №.6. P. 73-97
2. URL: https://rtj.mirea.ru/upload/medialibrary/c19/RTZH_6_2017_73_97.pdf
3. Bodrova E.V., Kalinov V.V., Sergeev S.V. etc. State scientific and technical policy in the modernization strategy of Russia: monograph.
M., 2013. 572 p.
4. Bodrova E.V., Krasivskaya V.N. The Role Of The State In The Development Of Technical Education And Scientific And Technical
Institutions In The Russian Empire // Russian Technological Journal. 2016. V. 4. № 5 (14). P.89-101.
5. URL: https://rtj.mirea.ru/upload/medialibrary/6d1/89_100watermark.pdf
6. Bodrova E.V. Role of “External Support” and Significance of Experience of “Catch-Up Modernization” Implementation. The Social
Sciences. Vol. 10. Is.2. P.143-146.
7. Ivanov B.I. 140 years of Russian Technical Society. URL: http://www.emitent-spb.ru/anniversary/03/
8. Russian State Historical Archive (RGIA) F. 90. Op.1, 272, 326, 191, 321, 155, 635 etc.
9. Proskuryakova N.A. Russia in XIX century. / Education. Science. Culture. M., 2010. P. 52.
10. Dmitry Pavlovich Ryabushinskiy – biography
11. URL: http://www.personbio.com/view_post.php?id_info=268
12. Korepanova S.A. Exhibition activities in Russia in the XIX century (industrial, scientific and industrial exhibitions). Yekaterinburg, 2005.
P. 253.
13. Proceedings of the I Congress of oil industry in Baku. Baku. 1885. P.25-26.
14. Russian State Historical Archive (RGIA) F. 37. Op. 73. D. 290. L. 140.
15. Kalinov V.V. The achievements and failures of the state scientific and technical policy of the USSR in the postwar period // Russian
Technological Journal, 2018. Volume 6, Issue 1, P. 73-87. URL: https://rtj.mirea.ru/upload/medialibrary/6c4/RTZH_2018_1_73_87.pdf
94-101
20.
Authors: T.N. Borovik
Paper Title: Improving the Quality of Welded Joints in Laser Welding of Silver Products
Abstract: Currently, there are many products that are of great value for the cultural heritage of our country and
the world as a whole. A certain number of antique items containing silver details and paying tribute to the time
need restoration. Unfortunately, silver is a corrosion-resistant metal, and when interacting, for example, with
hydrogen sulfide, which is often in the form of an impurity contained in the ambient air, forms sulfur compounds,
the so-called "mobile". Some art products, which have been lying for quite a long time, are sometimes thoroughly
imbued with black. During the restoration of these old products are trying to preserve their original appearance and
design, without replacing it with a "new model", so the choice of restoration method is crucial to preserve the
historical and artistic value of the restored things.
Keywords: NA
References: 1. Struchenkov V.I. Computer Technologies In Line Structure Routing // Russian Technological Journal, 2017. Volume 5, Issue 1, P. 29-41.
URL: https://rtj.mirea.ru/upload/medialibrary/9b4/rtzh_2017_1_29_41.pdf
2. Borovik T.N., Yampolskii V.M., Krasheninnikov A.I. Design repaired products from alloys based on silver with the use of laser welding
// Design. Theoryand Practice, 2012, 10, p. 32-44.
3. Borovik T.N., Belousov I.V. Influence of technological factors on the quality of joints in pulsed laser welding // Research: theory,
methods and practice: materials of the International scientific-practical conference», 2017. – p. 271-273. – ISBN 978-5-9500297-4-5
4. Borovik T.N., Belousov I.V. The effect of defocusing on the occurrence of burns in pulsed laser welding of silver // Research: theory,
methods and practice: materials of the International scientific-practical conference, 2017. – p. 220-221. – ISSN 2412-0537.
5. Borovik T.N., Belousov I.V. Practical application in the educational environment of modern technologies in the field of materials //
Educational environment today: theory and practice: materials of the International scientific-practical conference. 2017. – С. 77-78. – ISBN 978-5-9500127-8-5.
6. Askretkov A.D., Koryakov A.G. The Some Economic Aspects Of Production Of Pharmaceutical Substance Hydroxyethyl Starch In Small
Industrial Scale // Russian Technological Journal, 2018. Volume 6, Issue 1, P. 53-62. URL:
7. https://rtj.mirea.ru/upload/medialibrary/587/RTZH_2018_1_53_62.pdf
8. Djevello E.S., etc. Specifics of Management Quality Implementation to Information Systems and Products // Proceedings of the 2018
International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS,
2018, 8524995, p. 40-43.
9. Cheremukhina Y.Y., etc. The process of working with claims in the quality management system of an enterprise of the radio-electronic
industry // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 67-68.
10. Nazarenko M.A., etc. Main directions of higher education regionalization process as an integral part of social partnership in society (The
problems of inclusive education) // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 1135-
1138.
11. Sukhorukova S.M., Pogorelyi A.M. How To Ensure Environmental And Industrial Safety In Space Exploration? // Russian Technological
Journal, 2017. Volume 5, Issue 1, P. 57-63. URL: https://rtj.mirea.ru/upload/medialibrary/560/rtzh_2017_1_57_63.pdf
102-106
21. Authors: T.N. Borovik1*, V.V. Zuev2, E.V. Preobrazhenskaya3, I.V. Belousov4, N.S. Baranova5, A.V.
Minin6
Paper Title: Fuzzy C-Means Partition Cluster Analysis and Validation Studies On A Subset Of CiteScore Dataset
Abstract: The article deals with promising areas of application of pulsed laser welding for products made of
silver-based alloys. The results of experimental studies to improve the quality of the welded joint and the
efficiency of the welding process with the use of activated absorption additives are presented.
Keywords: weld quality, pulsed laser welding, absorption, reflection
References: 1. Demenkova Т.А., Tomashevskaya V.S., Shirinkin I.S. Mobile Applications For Tasks Of Distance Learning // Russian Technological
Journal, 2018. Volume 6, Issue 1, P. 6-19. URL: https://rtj.mirea.ru/upload/medialibrary/210/RTZH_2018_1_5_19.pdf
2. Borovik T.N., Yampolskii V.M., Krasheninnikov A.I. Design repaired products from alloys based on silver with the use of laser welding
// Design. Theoryand Practice, 2012, 10, p. 32-44.
3. Borovik T.N., Belousov I.V. Influence of technological factors on the quality of joints in pulsed laser welding // Research: theory,
methods and practice: materials of the International scientific-practical conference», 2017. – p. 271-273. – ISBN 978-5-9500297-4-5
4. Borovik T.N., Belousov I.V. The effect of defocusing on the occurrence of burns in pulsed laser welding of silver // Research: theory,
methods and practice: materials of the International scientific-practical conference, 2017. – p. 220-221. – ISSN 2412-0537.
5. Borovik T.N., Belousov I.V. Practical application in the educational environment of modern technologies in the field of materials //
Educational environment today: theory and practice: materials of the International scientific-practical conference,2017. – С. 77-78. – ISBN 978-5-9500127-8-5.
6. Katayama S. Handbook of laser welding, Technosphere, 2015.
7. Djevello E.S., etc. Specifics of Management Quality Implementation to Information Systems and Products // Proceedings of the 2018
International Conference “Quality Management, Transport and Information Security, Information Technologies”, IT and QM and IS, 2018, 8524995, p. 40-43.
8. Nazarenko M.A., etc. Main directions of higher education regionalization process as an integral part of social partnership in society (The
problems of inclusive education) // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 1135-1138.
9. Cheremukhina Y.Y., etc. The process of working with claims in the quality management system of an enterprise of the radio-electronic
industry // International Journal of Engineering and Technology(UAE). 2018. Volume 7, Issue 4.36. P. 67-68.
10. Nazarenko M.A., etc. Model end-to-end integrated quality management // International Journal of Engineering and Technology(UAE).
2018. Volume 7, Issue 4.36. P. 60-63.
107-111
22.
Authors: Rajiv Kalita
Paper Title: The availability and uses of E-resources in the college libraries of Baksa district of Assam: Current
status and prospects
Abstract: The present education system is moving from the traditional to towards the digital and electronic base
environment. The dominance of the ICT has put an effective impact on the college libraries too. In the
development index, the NE Region of India is always lacking behind, which may be due to its socio-economic,
geographical and demographical conditions. Hence, in the educational sector has always a tremendous pressure to
overcome such barriers.
The educational resources available with the academic institutions play a key role in uplifting the quality and
overall development of the students at a large. Therefore, this study try to portrait an actual picture of the current
E-resources available in the college libraries of Baksa district of Assam and as well as, it will try to figure out the
availability and uses of those resources by the library users through some findings.
Keywords: ICT, E-resources, college library, Baksa district
References: 1. Libraries. 5th International CALIBER-2007.Punjab University Chandighar.
2. Chakravarty,R & Singh,S.(2005). E-resources for Indian Universities: New Initiatives. SRELS journal of Information
Management.42(1),pp57-73
3. http://www.INFLIBNET.ac.in
4. https://www.census2011.co.in
5. http://baksa.gov.in/
112-116
1.
Authors: K. Gayathri, M. Thaiyalnayaki
Paper Title: ATTRITION OF EMPLOYEES OF INFORMATION TECHNOLOGY (IT) COMPANIES IN
BANGALORE CITY
Abstract: To manage their business in the competitive environment, management should focus on the
company’s internal power, this internal power is proven based on their attrition rates. Bangalore is called as
IT capital of India, hundreds and thousands of people from different parts of the country come to
Bangalore for their career growth and development. There are nearly 12000+ companies in Bangalore
hence the possibility of employees switching companies is high and hence the HR professionals are
challenged more. It becomes ineluctable for the IT companies of Bangalore to tackle high attrition rate
issue. This study is to with-stand the challenges faced due to high attrition and how to address them. In this
study, the opinions of 200 respondents were taken for the analysis purpose. In this research, structured
questionnaire has been incorporated for collecting data and chi-square test, percentage analysis and
ANOVA were used for analysis.
363-367
Index Terms: Information Technology, Attrition etc
References:
47. Kothari.C.R, RESEARCH METHODOLOGY, Reprint Edition 2004.
48. Agarwala Tanuja, STRATEGIC HRM, Oxford University Press, Edition 2007.
49. Bhattacharyya Kumar Dipak, HUMAN RESOURCE PLANNING, Anurag Jain for Excel Books, second edition 2002.
2.
Authors: Sujata Alegavi , Raghavendra Sedamkar
Paper Title: Hyper spectral image classification using Multi Labelled, Multi-Scale and Multi-Angle CNN with
MS-MA BT Algorithm
Abstract: For classifying the hyperspectral image (HSI), convolution neural networks are used widely as it
gives high performance and better results. For stronger prediction this paper presents new structure that
benefit from both MS - MA BT (multi-scale multi-angle breaking ties) and CNN algorithm. We build a new
MS - MA BT and CNN architecture. It obtains multiple characteristics from the raw image as an input.
This algorithm generates relevant feature maps which are fed into concatenating layer to form combined
feature map. The obtained mixed feature map is then placed into the subsequent stages to estimate the final
results for each hyperspectral pixel. Not only does the suggested technique benefit from improved extraction
of characteristics from CNNs and MS-MA BT, but it also allows complete combined use of visual and
temporal data. The performance of the suggested technique is evaluated using SAR data sets, and the
results indicate that the MS-MA BT-based multi-functional training algorithm considerably increases
identification precision. Recently, convolution neural networks have proved outstanding efficiency on
multiple visual activities, including the ranking of common two-dimensional pictures. In this paper, the MS-
MA BT multi-scale multi-angle CNN algorithm is used to identify hyperspectral images explicitly in the
visual domain. Experimental outcomes based on several SAR image data sets show that the suggested
technique can attain greater classification efficiency than some traditional techniques, such as support
vector machines and conventional deep learning techniques.
Index Terms: Convolution neural networks (CNNs), MS-MA BT (multi-scale multi-angle breaking ties),
Hyperspectral image (HSI), Classification, Synthetic aperture radar (SAR)
References:
[1] Sifan Wu, Junping Zhang, Chunyu Shi, Weike Li, “multiscale spectral-spatial hyperspectral image classification with
adaptive filtering “, IEEE, PP:2591 – 2594, 2018.
[2] Lin He , Jun Li ,Antonio Plaza ,Yuanqing Li ,“Discriminative Low-Rank Gabor Filtering for Spectral–Spatial
Hyperspectral Image Classification”, IEEE,PP:1381 – 1395, Volume:55, 2017.
[3] ShizhiZhao, WeiLi QianDu “Hyperspectral Classification Based on Siamese Neural Network Using Spectral-Spatial
Feature ”, IEEE,PP : 2567- 2570,2017.
[4] LichaoMou , PedramGhamisi ,XiaoXiangZhu,”Fully convdeconv network for unsupervised spectralspatial feature
extraction of hyperspectral imagery via residual learning” , IEEE,PP: 5181-5184, 2017
[5] ShrishBajpa, Harsh Vikram Singh, Naimur Rahman Kidwai, “Feature Extraction & Classification of Hyperspectral
Images using Singular Spectrum Analysis & Multinomial Logistic Regression Classifiers”, IEEE, PP: 97-100, 2018
[6] Miaomiao Liang , Licheng Jiao , Shuyuan Yang , Fang Liu , Biao Hou ,HuanChen,”Deep Multiscale SpectralSpatial
Feature Fusion for HyperspectralImage Classification”IEEE, PP : 2911 – 2924,Volume: 11,2018
[7] Mercedes E. Paoletti, Ruben Fernandez-Beltran, “Deep Pyramidal Residual Networks for Spectral–Spatial Hyperspectral
Image Classification”, IEEE, PP: 740 – 754, Volume: 57 ,2018
[8] Atif Mughees, Linmi Tao,” hyper-pixel based deep learning for hyperspectral image classification”, IEEE, PP:840-844,
2017
[9] Atif Mughees, Ahmad Ali, Linmi Tao, “Hyperspectral image classification via shape-adaptive deep learning”, IEEE,
PP:375-379,2017
[10] Shakati Sharama, rishan Mohan Bhuddhi, Raju, Gaurav Kumarda Shondhi, “Hyper spectrum image classification using
colony optimization algorithm based on joint spectrum special parameters”, IEEE, PP:3210-3213, 2017
[11] Wei Fu ,Shutao Li , Leyuan Fang ,Jón Atli Benediktsson , ”Spectral-spatial online dictionary learning for hyperspectral
image classification”, IEEE, PP:3724-3727, 2017
[12] SenJia, XiupingJia “Spectral–Spatial Gabor Surface Feature Fusion Approach for Hyperspectral Imagery Classification”,
IEEE, PP: 1142 – 1154,2018
[13] Nanjun He , Mercedes E. Paoletti , Juan Mario Haut , Leyuan Fang ,Shutao Li ,Antonio Plaza , Javier Plaza “Feature
ExtractionWith Multiscale Covariance Maps for Hyperspectral Image Classification”, IEEE, Volume:57, PP: 755 –
769,2018
[14] Lin He, Jun Li, Chenying Liu et al., “Recent Advances on Spectral–Spatial Hyperspectral Image Classification: An
Overview and New Guidelines” IEEE, Volume: 56, PP: 1579 – 1597, 2018
[15] Andreia Valentina Miclea, Romulus Terebes, Ioana Ilea, Monica Borda, “Hyperspectral Image Classification using
Combined Spectral-Spatial Denoising and Deep Learning Techniques”, IEEE,2018
368-374
[16] Simranjit Singh, Singara Singh Kasana, “Spectral-Spatial Hyperspectral Image Classification using Deep Learning”,
IEEE,PP:411-417,2017
[17] Cheng Deng, Yumeng Xue ; Xianglong Liu ; Chao Li ; Dacheng Tao “Active Transfer Learning Network: A Unified
Deep Joint Spectral–Spatial Feature Learning Model for Hyperspectral Image Classification”, PP: 1741 –
1754,Volume:57, 2018
[18] Yuemei Ren, Liang Liao, Yanning Zhang, “Hyperspectral Image Spectral-Spatial Feature Extraction via Tensor Principal
Component Analysis”, Volume:14, PP:1431 – 1435,2017
[19] WEN SHU et al “Hyperspectral Image Classification Using Spectral-Spatial Features with Informative Samples”, IEEE,
PP. 20869 – 20878, 2019
[20] YipingDuan et al, “Multi-scale Convolutional Neural Network for SAR Image Semantic Segmentation”, IEEE, 2018
[21] Yanhui Guo, Han Cao, Jianjun Bai and Yu Bai, “High Efficient Deep Feature Extraction and Classification of
Spectral-Spatial Hyperspectral Image Using Cross Domain Convolution Neural Networks” IEEE, vol no: 12, PP: 345 –
356,2019
3.
Authors: K. Beemabai, Dr. K. Krishnakumar
Paper Title: Impact of Goods and Service Tax (GST) on MSMEs in India
Abstract: The Micro, Small and Medium Enterprises (MSMEs) sector has been deliberated as the chief
development driver of the Indian economy for the year(Sunil Mitra 2018). India is a predictable to appear
as one of the important economies in the world over the next decade in the light of a positive political and
economic scenario (Mc Kinsey 2017).The Micro, Small and Medium Enterprises (MSMEs) fragment is
expected to play a significant role in the appearance of the Indian Economy. The development of this part is
very decisive to meet the national imperatives of financial inclusion and generation of significant levels of
employment across urban and rural areas of the country (Annual Report 2017-18). Micro, Small and
Medium Enterprises (MSMEs) can be the backbone for obtainable and future of high growth business with
both domestic and foreign companies. The present paper will focus on existing scenario and trends of
MSMEs in India (ShriMadavLal 2015). There is equally important that the Micro, Small and Medium
Enterprises (MSMEs) sector develops in all areas of agriculture, manufacturing and services sectors
because each of these sectors will continue to be very relevant to the GDP growth as well as employment
generation (ShriR.S.Gujral 2017). The Micro, Small and Medium Enterprises (MSMEs) sectors will act as a
mechanism to bring about this socio-economic renovation. An attempt has been made in this study to find
the sector wise contribution to GDP after Implementation of Goods and Services Tax (GST).
Keywords : GST, MSMEs, Economic Growth, Indian Government.
References:
1. Agogo Mauli (2014) Goods and Service tax in India: problems and prospects, Asian Journal of Management Research, Volume 6 Issue
3, Research Article ISSN: 2229–3795.Page No: 504-510.
2. Annual Report (2017-18) Department of Industries and Commerce, New Delhi).
3. Annual Report of MSME (Year wise 2017-2018).
4. Annual Report Economic Survey (2017-18).
5. Business world (2018-19).
6. CA Rohit Pithisaria (2019) Proscenia Economics and Finance Volume 31, 2015, PgT No:T 373-379.
7. CiobanasuT (2012)T “ContributionT ofT taxesT toT theT makingT upT ofT budgetT revenueT inT EconomicT Growth”,T JournalT ofT knowledgeT
ManagementT EconomicsT andT informationT TechnologyT Vol.2T (IssueT 6)T Pg1-12.
8. DeccanT ChronicleT andT TheT EconomicT TimesT (2019).
9. FourthT AllT IndiaT CensusT ReportT ofT MSME.T (AnnualT ReportT 2017-18).
10. KeatingT ST (2011)T “GoodsT andT ServicesT Tax:T willT theT proposedT indirectT taxT ReformT changeT BusinessT andT TaxT DynamicsT inT
India”,T NUJST lawT ReviewT Vol.4T PgT 625T -638.
11. K.BeemabaiT andT Dr.K.KrishnakumarT (2019)T InternationalT JournalT ofT ManagementT TechnologyT andT Engineering,T Vol-IX,T Issue-
IVT AprilT 2019.T ImpactT factorT 6.3.
12. GoodsT andT ServicesT TaxT (GST)T 2017-18T EconomyT andT PolicyT
13. McT KinseyT (2017)T RBIT &T PressT InformationT BureauT 2017-18T (DGCIS).
14. MinistryT ofT StatisticsT andT ProgrammeT ImplementationT (2018-2019)T Govt.T ofT India.
15. NgwiraT (2019)T ResultsT ofT aT NationwideT SurveyT onT Micro,T Small,T andT MediumT EnterpriseT sinT Malaw.1993.
16. SatatyT PoddarT (2014)T EconomicT SurveyT (2017-18)T Volume-2.
17. ShashankaT (2018)EconomicT TimesT (2019)
ShriMadavLalT (2015)T RBIT &T PressT InformationT BureauT 2017-18T
363-367
4.
Authors: Suraj D. Bhosale, Atul K. Desai
Paper Title: Simulation of Masonry Wall using Concrete Damage Plasticity Model
Abstract: The objective of this article is to study the use of FE (Finite Element) tool in analyzed the masonry
wall. Masonry is made up of highly nonlinear material and its property varies from place to place. It is difficult to
do an experiment on a full-scale model of a masonry wall. Its effect is also underestimated in construction of low
rise building. As if the wall is confined and properly bonded to the beam and column. It enhances the performance
of low rise building during seismic forces. As in low rise building energy is dissipated by cracking. If masonry
wall is cast monolithically (like confined masonry) with the column, it augments the stiffness of building and helps
to sustain additional load compare to conventional construction practice. In this study numerical nonlinear analysis
of wall panel is done by FE tool (ABAQUS). Using Concrete Damage Plasticity Model (CDP). And results are
compared with the existing work done by other researchers and it is observed that results were satisfactory.
Keywords: Finite Element (FE), Concrete Damage Plasticity (CDP), Masonry wall.
References:
1. M. Teguh, “Experimental Evaluation of Masonry Infill Walls of RC Frame Buildings Subjected to Cyclic Loads,”
Procedia Eng., vol. 171, pp. 191–200, 2017.
2. K. F. Abdulla, L. S. Cunningham, and M. Gillie, “Simulating masonry wall behaviour using a simplified micro-
model approach,” Eng. Struct., vol. 151, pp. 349–365, 2017.
3. M. Resta, A. Fiore, and P. Monaco, “Non-Linear Finite Element Analysis of Masonry Towers by Adopting the
Damage Plasticity Constitutive Model,” Adv. Struct. Eng., vol. 16, no. 5, pp. 791–803, May 2013.
4. H. Jiang, X. Liu, and J. Mao, “Full-scale experimental study on masonry infilled RC moment-resisting frames under
cyclic loads,” Eng. Struct., vol. 91, 2015.
5. R. Oyguc and E. Oyguc, “2011 Van Earthquakes: Lessons from Damaged Masonry Structures,” J. Perform. Constr.
Facil., vol. 31, no. 5, p. 04017062, Apr. 2017.
6. N. N. Thaickavil and J. Thomas, “Behaviour and strength assessment of masonry prisms,” Case Stud. Constr. Mater.,
2018.
7. T. Kanayama, “Taxonomy and phylogeny of the family Agonidae (Pisces: Scorpaeniformes).,” Mem. Fac. Fish.
Hokkaido Univ., vol. 38, no. 12, pp. 1–199, 1991.
8. S. Noor-E-Khuda, M. Dhanasekar, and D. P. Thambiratnam, “Out-of-plane deformation and failure of masonry walls
with various forms of reinforcement,” Compos. Struct., vol. 140, pp. 262–277, 2016.
9. T. Sevil, M. Baran, T. Bilir, and E. Canbay, “Use of steel fiber reinforced mortar for seismic strengthening,” Constr.
Build. Mater., vol. 25, no. 2, pp. 892–899, 2011.
10. Y.-F. Wu and M. P. Dare, “Axial and Shear Behavior of Glass Fiber Reinforced Gypsum Wall Panels: Tests,” J.
Compos. Constr., vol. 8, no. 6, pp. 569–578, 2004.
11. T. Stablon, A. Sellier, N. Domede, B. Plu, and L. Dieleman, “Influence of building process on stiffness: Numerical
analysis of a masonry vault including mortar joint shrinkage and crack re-closure effect,” Mater. Struct. Constr., vol.
45, no. 6, pp. 881–898, 2012.
12. S. Noor-E-Khuda and M. Dhanasekar, “Masonry walls under combined in-plane and out-of-plane loadings,” J. Struct.
Eng., vol. 144, no. 2, pp. 1–10, 2018.
13. S. Nazir and M. Dhanasekar, “Modelling the failure of thin layered mortar joints in masonry,” Eng. Struct., vol. 49,
pp. 615–627, 2013.
14. L. C. Silva, P. B. Lourenço, and G. Milani, “Nonlinear Discrete Homogenized Model for Out-of-Plane Loaded
Masonry Walls,” J. Struct. Eng., vol. 143, no. 9, p. 04017099, 2017.
15. T. Yi, F. L. Moon, R. T. Leon, and L. F. Kahn, “Analyses of a Two-Story Unreinforced Masonry Building,” J. Struct.
Eng., vol. 132, no. 5, pp. 653–662, 2006.
16. C. Wang, J. P. Forth, N. Nikitas, and V. Sarhosis, “Retrofitting of masonry walls by using a mortar joint technique;
experiments and numerical validation,” Eng. Struct., vol. 117, pp. 58–70, 2016.
17. J. Proença, A. S. Gago, J. Cardoso, V. Cóias, and R. Paula, “Development of an innovative seismic strengthening
technique for traditional load-bearing masonry walls,” Bull. Earthq. Eng., vol. 10, no. 1, pp. 113–133, 2012.
18. P. Sartaji, A. S. Moghadam, and M. Ghafory Ashtiany, “Interaction of masonry walls and shear walls in masonry
buildings,” Proc. Inst. Civ. Eng. Struct. Build., vol. 171, no. 3, pp. 226–240, 2018.
19. G. de Felice et al., “Experimental characterization of composite-to-brick masonry shear bond,” Mater. Struct. Constr.,
vol. 49, no. 7, pp. 2581–2596, 2016.
20. M. A. Kyriakides and S. L. Billington, “Behavior of unreinforced masonry prisms and beams retrofitted with
engineered cementitious composites,” Mater. Struct. Constr., vol. 47, no. 9, pp. 1573–1587, 2014.
21. B. H. Pandey and K. Meguro, “Simulation of brick masonry wall behavior under in-plane lateral loading using
applied element method,” 13th World Conf. Earthq. Eng. Vancouver, BC, Canada, August, no. 1664, pp. 1–6, 2004.
22. H. Okail, A. Abdelrahman, A. Abdelkhalik, and M. Metwaly, “Experimental and analytical investigation of the
lateral load response of confined masonry walls,” HBRC J., vol. 12, no. 1, pp. 33–46, 2016.
23. H. B. Kaushik, D. C. Rai, and S. K. Jain, “Code approaches to seismic design of masonry-infilled reinforced concrete
frames: A state-of-the-art review,” Earthq. Spectra, vol. 22, no. 4, pp. 961–983, 2006.
24. K. Shahzada et al., “Experimental seismic performance evaluation of unreinforced brick masonry buildings,” Earthq.
Spectra, 2012.
25. M. B. Ravula and K. V. L. Subramaniam, “Investigation of Compression Failure in Brick,” no. 1, pp. 1–9, 2017.
26. K. S. Jagadish, S. Raghunath, and K. S. Nanjunda Rao, “Behaviour of masonry structures during the Bhuj earthquake
of January 2001,” Proc. Indian Acad. Sci. Earth Planet. Sci., vol. 112, no. 3, pp. 431–440, 2003.
27. S. Y. Wang, S. W. Sloan, A. J. Abbo, M. J. Masia, and C. A. Tang, “Numerical simulation of the failure process of
unreinforced masonry walls due to concentrated static and dynamic loading,” Int. J. Solids Struct., vol. 49, no. 2, pp.
377–394, 2012.
28. V. Sarhosis, S. W. Garrity, and Y. Sheng, “Influence of brick-mortar interface on the mechanical behaviour of low
bond strength masonry brickwork lintels,” Eng. Struct., vol. 88, pp. 1–11, 2015.
363-367
29. C. V. R. Murty and S. K. Jain, “Beneficial Influence of Masonry Infill Walls on Seismic Performance of Rc Frame
Buildings,” Twelfth World Conf. Earthq. Eng., pp. 1–6, 2000.
5.
Authors: KADIROVA NASIMA SAIDBURHONOVNA, AKHMEDOVA SHOIRA NE’MATOVNA
Paper Title: STYLE AND SKILL: CRITIC’S ARTISTIC ABILITY
Abstract: The problem of the style of literary scholars or critics is one of the few studies in literature. The
method of literary criticism is the individuality, originality in understanding, researching and analyzing
fiction. The style is formed, first of all, by the nature of the scholar's understanding and perception of the
work of art. A critical or literary scholar's method is to determine the language, genre, composition,
realities and secrets of his article or research, use analysis techniques, pathos, links to life, artistic tastes,
and independent observations about life and reality, human and future. It stems from the specificity of the
description.
The literary critic Ibrohim Haqqulov has his own style, and the article analyzes his work in various ways,
including the understanding of the text, the specificity of the methods, the genre's diversity and the role of
literary criticism.
Keywords : literary critic, critic, classical literature, skill, style, scientist's remarks, critic, method, cultural method,
historical-cultural method, genre, article,essay.
References: 50. Sharafiddinov O. Awesome Understanding of Creation. Tashkent. 2006.
51. B.Nazarov, A.Rasulov, Sh.Ahmedova, Q. Kahramonov. "History of Uzbek Literary Criticism", Textbook. Tashkent, "Wing of the Tafakkur". 2012.
52. Haqqulov I. Fate and obedience. Tashkent. "Sharq". 2007.
53. Hakulov I. Spirituality and Perception. T. "Spirituality", 1998. 54. Back to Navoi. Tashkent. "Fan". 2011. Book 2
55. Ш.Ахмедова.Ўзбек адабий танқидчилиги жанрлари. Тошкент.2008
56. И.Ҳаққул. Ҳаёт, адабиёт ва абадият.Тошкент.2019 57. Қўшжонов М. Қалб ва қиёфа. Тошкент. АСН. 1978. 62-бет.
58. Қаюмов Л. Аср ва наср. Тошкент. АСН. 1975. 251-252-бетлар
363-367
6.
Authors: NAVULUR KRISHNA SURARCHITH & Dr. KRISHNAMOHAN VADDADI
Paper Title: Impact of Human Resource Accounting Practices on Decision Making in the Organization – Evidence
from a Private Company in Kurdistan Region of Iraq
Abstract: The current study aimed at understanding the impact of Human Resource Accounting practices on
decision making in an organization. The research was conducted on a private company in Kurdistan. Researchers
constructed a model where predictor variable is Human Resource Accounting Practices and Predicted variable is
Decision making.
The Research has null hypothesis and alternative hypothesis where the null hypothesis was“There is no
significant relationship between Human Resource Accounting Practices and Decision Making”. The alternative
hypothesis was “There is significant relationship between Human Resource Accounting Practices and Decision
Making”.
The sample size for the current research was 107 where researcher distributed 120 questionnaires where 13
questionnaires were not filled properly. Researchers used quantitative method to analyze the results of the current
research. The questionnaire consists of 20 questions which were organized randomly to avoid bias based responses
from the respondents.
Researchers concluded that HRA hasa strong positive effect on decision making where alternative hypothesis was
accepted and null hypothesis got rejected. The sample size was low as the researcher conducted pilot study on this
area and may get different results by increasing the sample size and demographics. The present research helps the
organization to understand the importance of Human Resource Accounting and the effect of HRA on decision
making.
Keywords: Human Resource Accounting practices, Decision making and private companies.
References:
1. Akindehinde, A., Enyi, P., & Olutokunbo, A. (2015). Human asset accounting aid corporate performance. . American
International Journal of Contemporary Research, 45-52.
2. Bullen, M. (2007). Human Resource Accounting: a Useful Tool for Measurement and Management in Organizations.
Leadership and Organizational Management Journal, 85-103.
3. Davidove, E. A., & Schroeder, P. A. (1992). Demonstrating ROI of training. Training and Development, 46-70.
4. Enyi, E., & Akindehinde, A. (2014). Human Resource Accounting and Decision Making in Post-Industrial Economy.
International Journal of Accounting and Taxation, 19-35.
5. Flamholtz, E. G., Bullen, M. L., & Hua, W. (2002). Human resource accounting: a historical perspective and future
363-367
implications. Management Decision, 947-954.
6. Hossain, A., Akhter, N., & Sadia, N. (2014). An Empirical Analysis on Importance of Human Resource Accounting
(HRA) Practices in the Organizations. International Journal of Ethics in Social Sciences.
7. Sunil, S. P., & Praveen, N. C. (2015). A STUDY OF PERSPECTIVE OF HUMAN RESOURCE EXECUTIVE FOR
APPLICATION OF HUMAN RESOURCE ACCOUNTING IN HOTELS . Indian Journal of Research in
Management, Business and Social Sciences, 1-5.
7.
Authors: Tamminana Kamaraju, Krishna Surarchith Navulur, Yusra Farooq Baqal
Paper Title: Impact of attitude towards Human Resource Accounting on performance of undergraduate students’
education – Evidence from private university students in Kurdistan Region – Iraq
Abstract: The current research was undertaken to find the impact of attitude towards Human Resource
Accounting on performance of undergraduate student’s education. The research was carried out as a pilot study on
accounting department’s students who are pursuing their 3rd year and final year of their under graduation in a
private university which is located in Kurdistan Region – Iraq. The total number of students in accounting
department was 125 where 59 students responded to the questionnaire distributed. Researchers used Delphi
technique where respondents are given chance to choose their responses in the first round randomly. All results of
each item of the survey were shown to the respondents in the second round and requested to re-confirm their
responses and provided freedom to change their responses. Researchers found few differences from first round to
the second round of survey with the same respondents. Researchers constructed a basic model to understand the
impact of predicted variable and predictor variables. The predictor variable for current research is attitude towards
Human Resource Accounting and Predicted variable is performance of undergraduate students’ education. The
null hypothesis got rejected in the study. The research gap was identified by the researchers as literature was
completely focused on reporting, measuring and evaluating the human values but overlooked the attitude part
related to human resource accounting. Current research helps the educational institutions to understand the value
of human resource accounting and implication of it to achieve high level of productivity among student
community.
Keywords: Human Resource Accounting, attitude, performance and students
References:
1. Abeysekera, I., & Guthrie, J. (2004). The British Accounting Review, Vol. 36, No.3. “Human capital reporting in a
developing nation, 251-268.
2. Cordon, B. (1998, January). Gaps In GAAP. Forbes, pp. 26-28.
3. Corrado, C., Hulten, C., & Sichel, D. (2005). Measuring Capital and Technology: An Expanded Framework’. 11-41.
4. Flamholtz, E. G., Maria, L. B., & Wei, H. (2002). Human resource accounting: A historical perspective and future
implications. Management Decisions, 947-954.
5. Mary M. K, .. F. (1977). BEHAVIORAL IMPLICATIONS OF HUMAN RESOURCE ACCOUNTING: A SURVEY
OF POTENTIAL PROBLEMS. Behavioral Implications of HRA, 25-29.
6. Rylander, A. J. (2000). Towards improved information disclosure of intellectual capital. International Journal of
Technology Management, Vol. 20 Nos 5/6/7/8, 715-741.
7. Sen, D., Jain, S., Jat, S., & Saha, R. (2008). Human Resource Accounting Information: Its Impact on Internal
Decision-Making . The Journal of Accounting and Finance, 22(1), 23-46.
8. Toms, J. (2002). Firm resources, quality signals and the determinants of corporate environmental reputation: some
UK evidence. British Accounting Review, Vol. 34 No. 3, 257-282.
9. van der Meer, K. J., & Vosselman, E. (2000). Management control of interfirm transactional relationships: the case of
industrial renovation and maintenance. Accounting organizations and society, 25(1), 51-77.
363-367
8.
Authors: Chaman Verma, Zoltán Illés, Veronika Stoffová
Paper Title: Gender Prediction of Indian and Hungarian Students towards ICT and Mobile Technology for the
Real-Time
Abstract: The present paper focused on the prediction of the university student's gender towards Information
Communication Technology (ICT) and Mobile Technology (MT) in Indian and Hungary.In this paper, four
experiments were performed on dataset using three popular classifiersnamed Support Vector Machine (SVM),
Artificial Neural Network (ANN) and Random Forest (RF) with three numerous testing technique such as K-fold
Cross Validation (KCV), Hold Out (HO) and Leave One Out (LOO).Three different applications named Explorer,
Experimenter and KnowledgeFlow (KF) of Weka 3.9.1 are used for predictive modeling. The class balancing has
been also applied using Synthetic Minority Over-Sampling (SMOTE) to enhance the prediction accuracy of each
algorithm. Further, a significant difference among classifier’s accuracies has also been tested using T-test at the
0.05 confidence level. Also, CPU user time has been calculated to train each model to justify to present real-time
prediction of gender towards ICT and MT.The results of the study inferred that the CPU time is significantly
differed in between RF (0.18 Seconds), SVM (0.06 seconds) and ANN (4.40 seconds).Also, the RF classifier
(89.4%) outperformed others with LOO method in terms of accuracy.The authors recommended these predictive
363-367
models to be deployed as an online prediction for the gender of the student towards ICT and MT at both
universities to track technological activities.
Keywords: Gender Prediction, Machine Learning, LOO, Prediction Accuracy, HO, KCDV, SMOTE.
References: 1. Chaman Verma and Sanjay Dahiya (2016). Gender difference towards information and communication technology
awareness in Indian universities. SpringerPlus, 5:1–7.
2. Chaman Verma, Sanjay Dahiya and Deepak Mehta (2016). An analytical approach to investigate state diversity
towards ICT: A study of six universities of Punjab and Haryana. Indian Journal of Science and Technology,9 (31): 1–
5.
3. Chaman Verma, VeronikaStoffová and ZoltánIllés (2018). Perception difference of Indian students towards
information and communication technology in context of university affiliation. Asian Journal of Contemporary
Education, 2 (1): 36-42.
4. Chaman Verma (2017). Educational data mining to examine mindset of educators towards ICT knowledge. Int. J.
Data Min. Emerg. Technol.,7 (1): 53-60.
5. Chaman Verma, VeronikaStoffová and ZoltánIllés (2018). Analysis of Situation of Integrating Information and
Communication Technology in Indian Higher Education. International Journal of Information and Communication
Technologies in Education, 7 (1): 24-29.
6. Chaman Verma and ZoltánIllés (2019). Attitude Prediction Towards ICT and Mobile Technology for The Real-Time:
An Experimental Study Using Machine Learning. In: Proceedings of The 15th International Scientific Conference
eLearning and Software for Education, 3, pp. 247–254.
7. Chaman Verma, VeronikaStoffová and ZoltánIllés (2019). Prediction of students’ awareness level towards ICT and
mobile technology in Indian and Hungarian University for the real-time: preliminary results. Heliyon, Elsevier, 5 (6):
1-9.
8. Chaman Verma, VeronikaStoffová and ZoltánIllés (2019). Prediction of Residence Country of Student towards
Information, Communication and Mobile Technology for Real-Time: Preliminary Results. Procedia Computer
Science, Elsevier :1-11.
9. Chaman Verma, Ahmad S. Trananweh, VeronikaStoffová and Zoltán. Illés (2018). Forecasting residence state of
Indian student based on responses towards information and communication technology awareness: A primarily
outcomes using machine learning. In: Proceedings of IEEE International Conference on Innovations in Engineering,
Technology and Sciences, In Press.
10. Chaman Verma, Ahmad S. Trananweh, VeronikaStoffová, Zoltán. Illés and Sanjay Dahiya (2018). Gender prediction
of the European school’s teachers using machine learning: Preliminary results. In: Proceedings of IEEE International
Advance Computing Conference, pp. 213–220.
11. Chaman Verma, VeronikaStoffová, ZoltánIllés (2018). An ensemble approach to identifying the student gender
towards information and communication technology awareness in european schools using machine learning.
International Journal of Engineering and Technology, 7 (4): 3392–3396.
12. Chaman Verma, VeronikaStoffová, ZoltánIllés and Sanjay Dahiya (2018). Binary logistic regression classifying the
gender of student towards Computer Learning in European schools. In: Proceedings of THE 11th Conference of Ph.D
students in computer science, pp. 45. Szeged University, 2018.
13. Chaman Verma, VeronikaStoffová, ZoltánIllés (2019). Age group predictive models for the real time prediction of
the university students using machine learning: Preliminary results. In: Proceedings of IEEE International Conference
on Electrical, Computer and Communication, In Press.
14. Chaman Verma, Ahmad S. Trananweh, VeronikaStoffová, Zoltán. Illés and Mandeep Singh (2019). National identity
predictive models for the real time prediction of European schools students: preliminary results. In: Proceedings of
IEEE International Conference on Automation, Computational and Technology Management, UK. In Press.
15. Chaman Verma, VeronikaStoffová, ZoltánIllés (2019). Prediction of Locality Status of the student based on gender
and country towards ICT and Mobile Technology for the real time. In: Proceedings of XXXII-DIDMATTECH,
Slovakia, In Press.
16. Chaman Verma, ZoltánIllés, VeronikaStoffová (2019). Real-time prediction of development and availability of ICT
and Mobile Technology in Indian and Hungarian University. In: Proceedings of InternationalConference on Recent
Innovations in Computing, Springer, In Press.
17. YatishBathla, Chaman Verma and Neerendra Kumar, “Smart Approach for Real Time Gender Prediction of European
School's Principal Using Machine Learning,” In: Proceedings of International Conference on Recent Innovations in
Computing, Springer, In Press.
18. G.Priya and N.Venkatesan (2015). A study of random forest algorithm with implementation using weka. International
Journal of Innovative Research in Computer Science and Engineering,1(6): 156-162.
19. Sushilkumar Ramesh pant Kalmegh (2015). Comparative analysis of weka data mining algorithm random forest,
random tree and lad tree for classification of indigenous news data. International Journal of Emerging Technology
and Advanced Engineering, 5(1): 507-517.
20. Chih-Wei Hsu, Chih-Chung Chang and Chih-Jen Lin (2003). A practical guide to support vector classification.
21. Ali.S (2005). Automated Support Vector Learning Algorithms. PhD dissertation, Monash University, Australia.
22. Christopher JC Burges (1998). A tutorial on support vector machines for pattern recognition. Data mining and
knowledge discovery, 2 (2): 121-167.
23. Ruey Long Cheu, Dipti Srinivasan, and Eng Tian The (2003). Support vector machine models for freeway incident
detection. In: Proceedings of IEEE Intelligent Transportation Systems, vol. 1, pp. 238-243.
24. Marvin Minsky and Seymour APapert (2017). Perceptrons: An introduction to computational geometry. MIT press,
2017.
25. EthemAlpaydin (2009). Introduction to machine learning. MIT press.
9.
Authors: Dr. Fatih Cura
Paper Title: Motivation, Adjustment and Retention of Academic Expatriates: The Case Study of Tishk International
University
Abstract: International organizations represent a dynamic workplace where people from different cultures
and work background are working together to achieve a common goal. Whenever an individual is attracted from
another country in which (expatriation) or giving an opportunity to someone who is living outside his country to
work in his homeland again (repatriation), a set of challenges will rise. Organizations need to guide and control the
process by adopting programs specialized in the expatriation and repatriation in which it will be given after the
arrival of the employee in different or in-home country.
This research paper explores motivations and the expectations that make the academic expatriates join the
international universities in other countries by taking a case study in one of the international private universities in
Kurdistan Region of Iraq. From this point of view, literature review will present benefits of joining teaching in the
host country universities, also identifying the difficulties that they have faced during performing their duties and
their feedbacks and recommendations to the other expats who wants to join such a program. As Tshik International
University (Formerly known as Ishik University) represents one of the top private universities in Kurdistan and has
diverse staff. Data is collected by using method of interview as qualitative approach. The sample of the study
international university staff. The results of the study represented by a set of findings which mainly settled on main
motivation factors to the academic expatriate to join the international assignment like international experience,
research interests, and the interest to discover new cultures.
Keywords: Expatriation, Self-Initiated expatriates, Cross-Cultural Training, OrganizationalExpatriates,
Adjustment, Retention, KRG, TishkInternational University (Formerly known as Ishik University).
References:
1. Beaverstock, J. (. (1996). Lending Jobs to Global Cities: Skilled International Labour Migration Investment Banking
and the City of London. Urban Studies, 33, 8, 1377–1394.
2. Bhaskar-Shrinivas, P., Harrison, D.A., Shaffer, M.A., and Luk, D.M. (2005), ‘Input Based and Time-Based Models
of International Adjustment: Meta-Analytical Evidence and Theoretical Extensions,’ Academy of Management
Journal, 482, 257–281.
3. Bierbrauer, G., & Pedersen, P. (1996). Culture and Migration,’ in Applied Social Psychology, eds. London: Sage,
399–422.
4. Black, J., & Stephens, G.K. (1989). The Influence of the Spouse on American Expatriate Adjustment and Intent to
Stay in Pacific Rim Overseas Assignments .Journal of Management , 15, 529–544. Brett, J., & Stroh, L.K. (1995).
Willingness to Relocate Internationally,.Human ResourceManagement, 34, 405–424.
5. Collings, D., Scullion, H.,,& Morley, M.J. (2007). Changing Patterns of Global Staffing in the Multinational
Enterprise: Challenges to the Conventional Expatriate Assignment and Emerging Alternatives. Journal of World
Business, 42, 198–213.
6. Danisman, S. (2017). Attitudes towards culture in the new home: Self-initiated expatriate academics in Turkey.
British Journal of Middle Eastern Studies, Vol. 44 No. 1, pp. 1-29.
7. Dickmann, M., Doherty, N., Mills, T., & Brewster, C. (2008). Why Do they Go? Individual and Corporate
Perspectives on the Factors Influencing the Decision to Accept an International Assignment. International Journal of
Human Resource Management, 19, 731–751.
8. Froese, F. J. (2012). Motivation and adjustment of self-initiated expatriates: the case of expatriate academics in South
Korea. The International Journal of Human Resource Management,, Vol. 23, No. 6,1095–1112.
9. Froese, F., &Peltokorpi, V. (2009). Cultural Distance and Expatriate Job Satisfaction .InternationalJournal of
Intercultural Relations, 35, 49–60.
10. Gregersen HB, Black JS (1990). A multifaceted approach to expatriate retention in international assignments. Group
and Organization Studies, 15(4), 461-485
11. Hussain, T., &Deery, S. (2018). Why do self-initiated expatriates quit their jobs: The role of job embeddedness and
shocks in explaining turnover intentions.International Business, 27 (1), 281-288. Inkson, K., & Myers, B.A. (2003).
‘“The Big OE”: Self-Directed Travel and Career Development. Career Development International, 8, 170–181.
12. Lee, C. (2005). A Study of Underemployment among Self-Initiated Expatriates. Journal of WorldBusiness, 40, 172–
187.
13. Lent, R., Brown, S.D., & Hackett, G. (1994). Contextual Supports and Barriers to Career Choice: A Social Cognitive
Analysis. Journal of Counseling Psycholog, 47, 36–49.
14. Massey, D., & Espinosa, K. (1997). What’s Driving Mexico-U.S. Migration? A Theoretical, Empirical, and Policy
Analysis .American Journal of Sociology, 102, 939–999.
15. Miller, E., & Cheng, J.L. (1978). A Close Look at the Dispersion to Accept an Overseas Position. Management
International Review, 3, 25–33.
16. Peltokorpi, V., & Froese, F.J. (2009). Organizational Expatriates and Self-Initiated Expatriates Who Adjusts Better to
Work and Life in Japan?’.International Journal of Human Resource Management, 20, 5, 1095–1111.
17. Pringle, J., & Barry, S. (1997). Expatriate assignment versus overseas experience: Contrasting models of international
human resource development. Journal of World Business, 32, 351-368. doi:10.1016/S1090-9516(97)90017-1
18. Ren, H., Shaffer, M.A, Harrison, D.A., Fu, C., &Fodchuk, K.M. (2014). Reactive adjustment or proactive
embedding? Multistudy, multiwave evidence for dual pathways to expatriate retention. Personnel Psychology, 67(1),
203-239.
19. Richardson, C., &wong ,H.W. (2018). Expatirate academics in malaysia :Motivation ,adjusmnet and retention.
Journal of Managmnet development, 3(37), 299-308.
20. Richardson, J., & McKenna. (2003). Leaving and Experiencing: Why Academics Expatriate and How They
363-367
Experience Expatriation. Career Development International, 7, 67–78.
21. Schoepp, K. (2011). The path to development: Expatriate faculty in the UAE. InternationalEducation, Vol. 40 No. 2,
pp. 58-75.
22. Shaffer, M. A., Kraimer, M. L., Chen, Y., &Bolino, M. C. (2012). Choices, challenges, and career consequences of
global work experiences: A review and future agenda. Journal of Management, 38(4), 1282–1327
23. Stahl, G., &Cerdin, J.-L. (2004). Global Careers in French and German Multinational Corporations.
24. Journal of Management Development, 23, 885–902.
25. Suutari, V., & Brewster, C. (2000). Making Their Own Way: International Experience through Self-Initiated Foreign
Assignments .Journal of World Business, 35, 417–436.
26. Takeuchi, Yoshimi (2005a) ‘Asia as Method’. In Richard F. Calichman (ed.) (trans.) What Is Modernity? Writings of
Takeuchi Yoshimi, Columbia University Press, 149–166.
27. Takeuchi, S., Yuki, Y., Ueyama, A., &Kajishima, T. (2010). A conservative momentum-exchange algorithm for
interaction problem between fluid and deformable particles. International Journal for Numerical Methods in Fluids,
64(10-12), 1084-1101.
28. Tharenou, P. (2008). Disruptive Decisions to Leave Home: Gender and Family Differences in Expatriation Choices.
Organizational Behavior and Human Decision Processes, 105, 183–200. Tung, R. (1998). American Expatriates
Abroad: From Neophytes to Cosmopolitans. Journal of WorldBusiness, 33, 125–144.
29. Tungli, Z., and Peiperl, M. (2009), ‘Expatriate Practices in German, Japanese, UK, and US Multinational Companies:
A Comparative Survey of Changes,’ Human Resource Management, 48, 1, 153–171.
10.
Authors: Karwan H. Sherwani
Paper Title: The Effect of Perceived Organizational Support on Employee’s Organizational Commitment and
Employee Behavior. The case of a Construction Company in Erbil City, Kurdistan Region
Abstract: Lately, Perceived Organizational Support, Organizational Commitment and Employee behavior have
given much concentration. The aim of this paper is to analyze the effect of Perceived Organizational Support on
Organizational Commitment, and Employee Behavior. According to the prior research, there are contradicting
findings regarding the relationship and significant effect between the three variables mentioned. The strategy of
this research is quantitative by using an online questionnaire consisted of three validated scales. The online
questionnaire has been sent to employees’ emails of a constructioncompany in Erbil city. There are 64 properly
filled online questionnaires have been received. The author has used Reliability test to determine the Cronbach
Alpha of the scales, the Pearson correlations to measure the relationship and Linear Regression analysis to measure
the effect of independent variable on the dependent variables. The results indicate that Perceived Organizational
Support has a significant effecton Employee Behavior and Organizational Commitment. Moreover, the findings
also indicate a strong relationship exists between Perceived Organizational Support and Organizational
Commitment.
Keywords: Organizational commitment, Perceived Organizational Support, Employee behavior, Erbil
References:
1. Adekola, B. (2012). The Impact of Organizational Commitment on Job Satisfaction: A Study of Employees at
Nigerian Universities. International Journal Of Human Resource Studies, 2(2), 1. doi: 10.5296/ijhrs.v2i2.1740
2. Aguinis, H. (2013). Performance Management. Harlow: Pearson.
3. Ali, N. (2009). Effects of Perceived Organizational Support and Leader-member Exchange on Organizational
Citizenship Behavior, Abasyn University Journal of Social Sciences, 3(2), 53
4. Allen, N., & Meyer, J. (1990). The measurement and antecedents of affective, continuance and normative
commitment to the organization. Journal Of Occupational Psychology, 63(1), 1-18. doi: 10.1111/j.2044-
8325.1990.tb00506.x
5. Allen, N., & Meyer, J. (1996). Affective, Continuance, and Normative Commitment to the Organization: An
Examination of Construct Validity. Journal Of Vocational Behavior, 49(3), 252-276. doi: 10.1006/jvbe.1996.0043
6. Antilla, E. (2014). Components of Organizational Commitment (MSC., Thesis). University of Tampere.
7. Aubé, C., Rousseau, V., & Morin, E. (2007). Perceived organizational support and organizational commitment.
Journal Of Managerial Psychology, 22(5), 479-495. doi: 10.1108/02683940710757209
8. Eisenberger, R., R. Huntington, S. Hutchison, and D. Sowa. 1986. “Perceived Organizational Support.” Journal of
Applied Psychology 71: 500-507.
9. AyimGyekye, S., &Salminen, S. (2007). Workplace Safety Perctions and Perceived Organizational Support: Do
Supportive Perceptions Influence Safety Perceptions?. International Journal Of Occupational Safety And
Ergonomics, 13(2), 189-200. doi: 10.1080/10803548.2007.11076721
10. Lee, C., & Chen, C. (2013). The Relationship between Employee Commitment and Job Attitude and Its Effect on
Service Quality in the Tourism Industry. American Journal Of Industrial And Business Management, 03(02), 196-
208. doi: 10.4236/ajibm.2013.32025
11. Jayasree, K. and Sheela, M.V., (2012). Perceived Organizational Support – An Overview of its Antecedents and
Consequences. International Journal of Multidisciplinary Research. Vol. 2. Issue 4. Pp.1-12
12. Ekowati, D., &Andini, M. (2008). Perceived organizational support (POS) and organizational commitment.
JurnalManajemenTeori Dan Terapan| Journal Of Theory And Applied Management, 1(2), 96-108.
13. Hafiz AZ (2017) Relationship between Organizational Commitment and Employee’s Performance Evidence from
Banking Sector of Lahore. Arabian J Bus Manag Review 7: 304. doi: 10.4172/2223-5833.1000304
14. Kessler, E. H. (2013). The encyclopedia of Management Theory. Los Angeles: Sage Publications.
15. Kont, K., &Jantson, S. (2014). Organizational Commitment in Estonian University Libraries: A Review and Survey.
363-367
New Review Of Academic Librarianship, 20(3), 296-319. doi: 10.1080/13614533.2014.898671
16. Leite, N., Rodrigues, A., & Albuquerque, L. (2014). Organizational Commitment and Job Satisfaction: What Are the
Potential Relationships?. BAR - Brazilian Administration Review, 11(4), 476-495. doi: 10.1590/1807-
7692bar2014276
17. Md. Sahidur, R., & Karan, R. (2012). Perceived Organizational Support and Organizational Commitment:
Bangladesh Perspective. The Chittagong University Journal Of Business Administration, 27(1), 205-220.
18. Meyer, J.P. (2014). Organizational commitment. In D.E. Guest and D. Needle (Eds.). Human
19. Resource Management, (Vol. 5 of the Wiley Encyclopedia of Management, 3rd Edition, pp.
20. 199-201). Chichester, UK: Wiley.
21. Rhoades, L., &Eisenberger, R. (2002). Perceived organizational support: A review of the literature. Journal Of
Applied Psychology, 87(4), 698-714. doi: 10.1037//0021-9010.87.4.698
22. S. McCutcheon, R. (2018). An Academic Review of Employee Behavior Management. Advances In Economics And
Business, 6(5), 291-298. doi: 10.13189/aeb.2018.060502
23. Slocombe, T.E. & Dougherty, T.W. Journal of Business and Psychology (1998) 12: 469.
https://doi.org/10.1023/A:1025055122988
24. Shore, L., & Wayne, S. (1993). Commitment and employee behavior: Comparison of affective commitment and
continuance commitment with perceived organizational support. Journal Of Applied Psychology, 78(5), 774-780. doi:
10.1037//0021-9010.78.5.774
25. Suffian, A.,&Azlan, N.,&Nasiha A., &Fadhilah, A. (2017). The Organizational Commitment towards Employee’s
Performance: A Case Study at Elektro Serve (M) Sdn Bhd. Journal of Biological and Environmental Sciences, 7(12),
134-145.
26. Tahlil Azim, M. (2016). Corporate Social Responsibility and employee behavior: mediating role of organizational
commitment. Review Of Business Management, 18, 207-225. doi: 10.7819/rbgn.v18i60.2319
27. Tevichapong, P. (2012). Individual spirit at work and its relationship with employee work attitudes and organisational
outcomes (Ph.D., dissertation). Aston University.
28. Williams, L. J., & Anderson, S. E. (1991). Job satisfaction and organizational commitment as predictors of
organizational citizenship and in-role behaviors. Journal of Management(17), 601–617.
29. Worley, J., Fuqua, D., & Hellman, C. (2009). The survey of perceived organisational support: Which measure should
we use?. SA Journal Of Industrial Psychology, 35(1). doi: 10.4102/sajip.v35i1.754
11.
Authors: PRAKASH V. PARANDE, Dr. M. K. BANGA
Paper Title: Web-of-Service Software Reusability Prediction Using Heterogenous Ensemble Classifier
Abstract: WoS computing environment is expected to have numerous parallel computing engines. Presently,
software professionals or developers often want to reuse existing software components to exhibit a task with time-
efficient and cost effective solutions. However, software component reusability in uncontrolled manner leads to
failure, pre-mature shutdown and software smells or aging. This paper develops a novel evolutionary computing
assisted ensemble classification system for WoS software reusability prediction. This applies different base
learners such asNaïve Bayes (NB), Linear Regression (LR), Decision Tress (DT),Logarithmic Regression
(LOGR),and Support Vector Machine (SVM),Multivariate Adaptive Regression Spline (MARS). Once training the
base learners, the outputs of each classifier have been processed with majority vote.The computation in
conjunction with weighted sum enabled final labelling of each software class. The performance results affirmed
that the present work ensemble classifier has better performance with respect to base classifiers.
Keywords: Ensemble classifier; heterogeneous ensemble; web-of-service; software reusability prediction.
References:
1. G. Caldiera, and V.R. Basili, “Identifying and qualifying reusable software components,” IEEE Software, vol. 24,
pp. 61-70, 1991.
2. I. Sommerville, “Software Engineering”. 9th Edition, Addison-Wesley, New York, 2011.
3. G. Singh, “Metrics for measuring the quality of object-oriented software,” ACM SIGSOFT Software Engineering
Notes, vol. 38, pp. 1-5, 2013.
4. M. M. Stapic, “Reusability metrics of software components: Survey”, conference paper • September, 2015.
5. S. Srivastava and R. Kumar, "Indirect method to measure software quality using CK-OO suite," Intelligent Systems
and Signal Processing (ISSP), International Conference on, Gujarat, pp. 47-51, 2013.
6. B. M. Goel, Pradeep Kumar Bhatia “ Analysis of reusability of object-oriented system using CK metrics”,
International Journal of Computer Applications, vol. 60, no.10, 2012.
7. N.S. Bakar “The analysis of object-oriented metrics in C++ programs”, Lecture Notes on Software Engineering, vol.
4, no. 1, 2016
8. A. T. Mohammad “Metric suite to evaluate reusability of software product line”, International Journal of Electrical
and Computer Engineering (IJECE), vol. 4, no. 2, pp. 285-294, 2014.
9. L. Nanni, S. Brahnam, S. Ghidoni, and A. Lumini, “Toward a General-PurposeHeterogeneous Ensemble for Pattern
Classification,” Computational Intelligence and Neuroscience, vol. 2015.
10. M. Barghash, “An effective and novel neural network ensemble for shift pattern detection in control charts,”
Computational Intelligence and Neuroscience, vol. 2015, Article ID939248, 2015.
11. G. Tsoumakas, L. Angelis, I. Vlahavas, Selective fusion of heterogeneous classifiers, Intelligent Data Analysis Vol. 9
(6), pp. 511–525, 2005
12. R. R. Brooks, P. Ramanathan; A. M. Sayeed, “Distributed Target Classification and Tracking in Sensor Networks,
Proceedings of the IEEE Vol. 91, pp. 1163-1171, 2003.
13. C. Dong-Sheng, et al., The boosting: a new idea of building models, Elsevier, Amsterdam, PAYS-BAS, 2010, vol.
363-367
100, pp.1–11.
14. K. M. Ting, Z.Zheng, A study of Adaboost with Naïve Bayesian classifiers: weakness and improvement,
Computational Intelligence Vol. 19(2), pp. 186–200, 2003.
15. H. Singhani, R. P. Suri “Testability assessment model for object oriented software based on internal and external
quality factors”, Global Journal of Computer Science and Technology: C Software & Data Engineering, vol. 15,
no.5, 2015.
16. M. Mijac, Z. Stapic, “Reusability metrics of software components: Survey”, Central European conference on
Information and Intelligent system conference paper • September, 2015.
17. S. Srivastava and R. Kumar, "Indirect method to measure software quality using CK-OO suite," Intelligent Systems
and Signal Processing (ISSP), International Conference on, Gujarat, pp. 47-51, 2013.
18. B.M. Goel, and P.K. Bhatia, “Analysis of reusability of object-oriented system using CK metrics,” International
Journal of Computer Applications, Vol.60, No.10, pp.0975–8887, 2012.
19. L.H. Rosenberg, and L.E. Hyatt, “Software quality metrics for object-oriented environments,” Crosstalk Journal, vol.
10, pp. 1-16, 1997
20. S.R. Chidamber, and. C. F. Kemerer, “A metrics suite for object oriented design,” IEEE Transactions on Software
Engineering, vol. 20, pp. 476-493, 1994.IEEE PressPiscataway, NJ, USA.
21. R. Shatnawi, W. Li, J. Swain, and T. Newman, “Finding software metrics threshold values using roc curves,” Journal
of Software Maintenance and Evolution: Research and Practice, vol. 22, pp. 1-16, 2010.John Wiley & Sons, Inc.New
York, NY, USA.
22. P. Neelamdhab, S. Satapathy, R. Singh, (2017). Utility of an Object Oriented Reusability Metrics and Estimation
Complexity. Indian Journal Of Science And Technology, 10(3).
23. Normi Sham Awang Abu Bakar “The analysis of object-oriented metrics in C++ programs”, Lecture Notes on
Software Engineering, Springer ,vol. 4, no. 1, 2016.
24. S. I. Zahara, M. Ilyas, and T. Zia, "A study of comparative analysis of regression algorithms for reusability evaluation
of object oriented based software components," Open Source Systems and Technologies (ICOSST), International
Conference on, Lahore, pp. 75-80, 2013.
25. Torkamani M. A. “Metric suite to evaluate reusability of software product line”, International Journal of Electrical
and Computer Engineering (IJECE), vol. 4, no. 2, pp. 285-294, 2014.
26. A. Aloysius, and K. Maheswar, “A review on component based software metrics”, Intern. J. Fuzzy Mathematical
Archive, vol. 7, no. 2, pp. 185-194, 2015.ISSN: 2320 –3242 (P), 2320 –3250 (online)
27. E.S. Cho, M.S. Kim, and S.D. Kim, (2001) “Component metrics to measure component quality,” Proceedings of the
8th Asia Pacific Software Engineering Conference (APSEC), Macau, vol. 4-7, pp. 419-426, 2001.
28. J. Kittler, Multi-Sensor Integration and Decision Level Fusion. Proc. DERA/IEE Workshop Intelligent Sensor
Processing 2001, 1-6.
29. R. Polikar, D. Parikh; Shreekanth; Mandayam. Multiple Classifier Systems for Multisensor Data Fusion. SAS 2006 -
IEEE Sensors Applications Symposium 2006, 180-184.
30. Schapire, R. E. A Brief Introduction to Boosting. Proceedings of the Sixteenth International Joint Conference on
Artificial Intelligence 1999, 1401-1406.
31. T. G. Dietterich, Machine learning research: Four current directions. AI Magazine 1997, 18, 97- 136.
32. M. Barghash, “An effective and novel neural network ensemble for shift pattern detection in control charts,”
Computational Intelligence and Neuroscience, vol. 2015, Article ID939248, 2015.
33. L. Nanni, S. Brahnam, S. Ghidoni, and A. Lumini, “Toward a General-PurposeHeterogeneous Ensemble for Pattern
Classification,” Computational Intelligence and Neuroscience, vol. 2015.
34. J. A Benediktsson, J. Chanussot, and M. Fauvel, Multiple classifier systems in remote sensing: from basics to recent
developments. In: M. Haindl, J. Heidelberg, Germany: Springer, 501–512, 2007.
35. F. Roli, G. Giacinto, G. Vernazza, Methods for designing multiple classifier systems. Proceedings of the second
international workshop on multiple classifier systems. Cambridge, UK, 78–87, 2001.
36. Banfield, R., et al., A comparison of decision tree ensemble creation techniques. IEEE Transactions on Pattern
Analysis and Machine Intelligence, 29, 173–180, 2007.
37. L. Hansen, P. Salamon, Neural network ensembles. IEEE Transactions on Pattern Analysis and Machine Intelligence,
12, 993–1001, 1990.
38. D. Opitz, J. Shavlik, J., Actively searching for an effective neural-network ensemble. Connection Science, 8 (3/4),
337–353, 1996.
39. G. J. Briem, G.J., Benediktsson, J.A., J. R. Sveinsson, Multiple classifiers applied to multisource remote sensing data.
IEEE Transactions on Geoscience and Remote Sensing, 40 (10), 2291–2299, 2002.
40. B. Waske, J.A. Benediktsson, Fusion of support vector machines for classification of multisensor data. IEEE
Transactions in Geoscience and Remote Sensing, 45, 3858–3866, 2007.
41. L.I. Kuncheva, Combining classifiers: soft computing solution, in: S.K.A. Pal (Ed.), Pattern Recognition: From
Classical to Modern Approaches, World Scientific, Singapore, 2001, pp. 427–451.
42. J. Canul-Reich, L. Shoemaker, L.O. Hall, Ensembles of fuzzy classifiers, in: IEEE International Fuzzy Systems
Conference, pp. 1–6, 2007.
43. J.J. Rodriguez, L.I. Kuncheva, Rotation forest: a new classifier ensemble method, IEEE Transactions on Pattern
Analysis and Machine Intelligence 28 (10) (2006) 1619–1630.
44. K. H. Liu, D. S. Huang, Cancer classification using rotation forest, Computers in Biology and Medicine 38, 601–610,
2008.
45. Chun-Xia Zhang, Jiang-She Zhang, RotBoost: a technique for combining rotation forest and AdaBoost, Pattern
Recognition Letters 29, pp. 1524–1536, 2008.
46. K. Tumer, N.C. Oza, Input decimated ensembles, Pattern Analysis Application, vol. 6, pp. 65–77, 2003.
47. L. Nanni, A. Lumini, Ensemble generation and feature selection for the identification of students with learning
disabilities, Expert Systems with Applications 36, pp.3896–3900, 2009.
48. Loris Nanni, Alessandra Lumini, Input decimated ensemble based on neigh- borhood preserving embedding for
spectrogram classification, Expert Systems with Applications 36,pp. 11257–11261, 2009.
49. X. Zhang, S. Wang, T. Shan, L.C. Jiao, Selective SVMs ensemble driven by immune clonal algorithm, in: Rothlauf,
F. (Ed.) Proceedings of the EvoWork- shops, Springer, Berlin, pp. 325–333, 2005.
50. Z.H. Zhou, J. Wu,W. Tang, Ensembling neural networks: many could be better than all, Artificial Intelligence 137
(1–2), 239–263, 2002.
51. I. Partalas, G. Tsoumakas, I. Vlahavas, Focused ensemble selection: a diversity-based method for greedy ensemble
selection, in: Proceedings of the 18th International Conference on Artificial Intelligence, pp. 117–121, 2008.
52. S. Bothorel, BB. Meunier, S. A. Muller, Fuzzy logic based approach for semilogical analysis of microcalcification in
mammographic images. Int J Intell System, 12:819–848, 1997.
53. AT. Stavros, D. Thickman, CL.Rapp, MA. Dennis, SH Parker, GA Sisney. Solid breast nodules: use of sonography
q1q`to distinguish between benign and malignant lesions. Radiology; 196:123–134, 1995.
54. YS. Dong, KS Han, "A comparison of several ensemble methods for text categorization," Services Computing, (SCC
2004). Proceedings. 2004 IEEE International Conference on, pp. 419-422, 2004.
55. Y. Liu, G. Jaime, Carbonell, and Rong Jin. ECML, volume 2837 of Lecture Notes in Computer Science (Springer),
pp. 277-288, 2003.
56. Y. Bi, D. Bell, H. Wang, G. Guo, J. Guan, Combining Multiple Classifiers Using Dempster's Rule For Text
Categorization. Appl. Artif. Intell. Vol. 21, 211-239, 2007.
12.
Authors: Gita Madhuri, Dr. Mahima Mishra
Paper Title:
An Exploratory Viewpoint on the Perspectives and Practices of Testing Alternative Option Pricing
Models
Abstract: This study examines the perspectives and practices of testing option pricing models, spanning over
four decades of literature across prominent journals. The study reveals that the bulk of research on option pricing
focuses on developing new models, than comparing relative performance of already existing models. The review
has been classified as perspectives and practices in Deterministic and Stochastic Option pricing models to identify
the most frequently compared Option pricing models. The review has been presented in a structured order
consolidating different perspectives of testing pricing performance of Option pricing models with an objective to
gain insights into the existing literature and form a base for developing future research.
Keywords: Option pricing models, empirical performance of option pricing models, deterministic option
pricing models, stochastic option pricing models
References:
1. A.Jarrow, K. I. (1992). Pricing options on risky assets in stochastic ineterest economy. Mathematical Finance.
2. Ait-Sahalia, Y. a. (1996). Nonparametric Estimation of state-price densities implicit in financial asset prices. Working
Paper, University of Chicago and MIT.
3. B Dumas, J. F. (1998). Implied Volatitlity Functions: Empirical tests. Journal of Finance, vol.63, 2059- 2106.
4. Bates, D. (1996a). Jumps and stochastic volatility : Exchange Rate Processess implicit in Deutchemark Options.
Review in financial studies, 69-108.
5. Bates, D. (2003). Empirical Option Pricing : a retrospection. Journal of Econometrics, 387- 404.
6. Black, F. (1975). Fact and Fantasy in the use of Options. Financial Analysts Journal.
7. Bollerslev, T. (1986). Generalized Autoregressive Conditional heteroskedasticity. Journal of Econometrics.
8. Brooks, D. M. (2015). An introduction to Derivatives and Risk Management. Cengage.
9. Courtadon, J. N. (1987). Tests of an American Option Pricing Model on the Foreign currency options market. Journal
of Financial and quantitative Analysis.
10. D Backus, S Foresi & L Wu. (1997). Accounting for biases in Black and Scholes. CRIF working Paper series. New
York University.
11. David.S.Bates. (1998). Post-'87 Crash Fears in the S&P 500 Futures Option Market. Journal of Econometrics.
12. E.Whaley, C. R. (1992). Market volatility prediction and the efficiency of the S&P 100 index option market. Journal
of Financial Economics.
13. E.Whaley, G. B.-A. (1987). Efficient Analytic Approximation of American Option Values. The Journal of Finance.
14. Figlewski, S. (1989). Options arbitrage in Imperfect markets. The Journal of Finance.
15. Fischer Black& Myron Scholes. (1973). The Pricing of Options and Corporate Liabilities. Journal of Political
Economy, vol 81,637-659.
16. Galai, D. (1983). The componenets of Return from Hedging options against stocks. Journal of Business.
17. Gurudip Bakshi, C. C. (1997). Empirical performance of Option pricing models. journal of finance, Vol.52 ,2003-
2049.
18. Heston, S. L. (1993). A Closed form Solution for Options with Stochastic Volatility with applications to Bond and
Currency Options. The Review of Financial studies, Vol 6 No 2, 327-343.
19. Hull, J. C. (2009). Options, Futures and other derivatives. Pearson.
20. J C Cox, S. A. (1979). Option pricing : A Simplified Approach. Journal of Financial economics.
21. Jacobs, P. C. (2004). The Importance of Loss Function in Option Pricing. Journal of Financial Economics, Vol.72,
No 2, 291-318.
22. John C Cox, S. A. (1976). The Valuation of Options for alternative Stochastic Processes. Journal of Financial
Economics.
23. K.C. Chan, G. K. (1992). An Empirical Comparision of Alternative Models of teh Short term Interest rate. The
Journal of Finance.
24. kani, E. d. (1994). The Volatility Smile and Its Implied Tree. Quantitative Strategies .
25. Kani, E. D. (1994b). Riding on Smile. Risk, 7(2) , 32-39.
26. Kim, S. K. (2004). Empirical Comparision ofAlternative Stochastic Models: Evidence from Korean KOSPI 200
Index option market. Pacific Basin Financial Journal, 117-142.
27. Mark Broodie, J. D. (1996). American Options with Stochastic Dividends and Volatility : A Non parametric
Investigation. CIRANO.
28. McDonald, R. L. (2013). Derivatives Markets. Kellogg School of Management: Pearson.
29. McDonald, R. L. (June, 2012). Derivatives Markets. Pearson.
30. N.Ahmad, V. K. (2011). Forecasting performance of Constant Elasticity of Variance model:Empirical Evidence from
India. The International Journal of applied Economics and Finance.
31. Pachori, V. K. (2013). A Kaleidoscopic Study of Pricing performance of STochastic Volatility Option pricing Models
: Evidence from Recent Indian Economic Turbulence. Vikalpa.
32. Roma, C. A. (1994). Stochastic Volatility Option pricing. Journal of Financial and Quantitative Analysis.
33. S L Heston, S. N. (2000). A closed form GARCH option valuation model . Review of Financial studies, Vol 13, No.3
585-625.
34. Singh, P. P. (2013). Empirical competitiveness of deterministic option pricing models : Evidences from the recent
waves of Financial upheavals in India. Journal of Derivatives & Hedge Funds.
35. Stein, E. S. (1991). Stock price distribution with stochastic volatility :An Analytical Approch. Review of Financial
studies, vol.4 727-752.
36. Su, C. C. (1998). An empirical test of Hull -White option pricing model. Journal of Future Markets, 18(4), 363-378.
37. Vipul Kumar Singh, N. A. (2011). Empirical Analysis of GARCH and Practitioner Black Scholes Model for pricing
S&P CNX Nifty 50 index options of India. Decision.
38. White, J. C. (1987). The Pricing of Options with Stochastic Volatilities. Journal of Finance, Vol 42 , 281-300.
13.
Authors: Lalit Kulkarni, JagdishBakal, Urmila Shrawankar
Paper Title: Distributed Misbehavior Detection Scheme for Delay Tolerant Networks
Abstract: Opportunistic forwarding mechanism in Delay Tolerant Networks (DTN), are prone to get
disconnected from the nodes in the network. These types of networks deal with intermittent connectivity, large
delays.Existing routing protocols of DTNs fights with these issues, but fail to integrate the security available for
delay tolerant networks,it is necessary to design a secure routing protocol to overcome these issues. There are
centralized Trust Authority (TA) based security systems but the disconnection or failure of TA, affects the security
model and network performance. It becomes crucial to have the distributed approach for security system and have
multiple TAs working on security model. This reduces the possibility of poor network performance. The paper
presents a distributed misbehavior detection system, and implements multiple TAs for implementing the security
model for DTN.
Keywords: Delay Tolerant Networks, DTN, Trust based scheme
References:
1. P. Asuquo, H. Cruickshank, C. P. A. Ogah, A. Lei and Z. Sun, "A Distributed Trust Management Scheme for Data
Forwarding in Satellite DTN Emergency Communications," in IEEE Journal on Selected Areas in Communications,
vol. 36, no. 2, pp. 246-256, Feb. 2018.
2. H. Zhu, S. Du, Z. Gao, M. Dong and Z. Cao, A Probabilistic Misbehavior Detection Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, pp 22-32, vol.
25, no. 1, January 2014
3. L. Kulkarni, D. Mukhopadhyay and J. Bakal, “Analyzing Security Schemes in Delay Tolerant Networks.” In
Proceedings of the International Conference on Data Engineering and Communication Technology (pp. 613-620).
Springer Singapore, March 2016
4. L. Zhang, J. Song and J. Pan, "A Privacy-Preserving and Secure Framework for Opportunistic Routing in DTNs," in
IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7684-7697, Sept. 2016.
5. H. Chen, W. Lou, Z. Wang and Q. Wang, "A Secure Credit-Based Incentive Mechanism for Message Forwarding in
Noncooperative DTNs," in IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6377-6388, Aug. 2016.
6. M. N. M. Bhutta, H. Cruickshank and Z. Sun, "Public-key infrastructure validation and revocation mechanism
suitable for delay/disruption tolerant networks," in IET Information Security, vol. 11, no. 1, pp. 16-22, Jan 2017.
7. T. N. D. Pham and C. K. Yeo, "Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks,"
in IEEE Transactions on Mobile Computing, vol. 15, no. 5, pp. 1116-1129, May 2016.
8. Y. Cai, Y. Fan and D. Wen, "An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks," in
IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 266-277, Jan. 2016.
9. Z. Li, Y. Liu, H. Zhu and L. Sun, "Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant
Networks," in IEEE Transactions on Vehicular Technology, vol. 64, no. 11, pp. 5257-5268, Nov. 2015.
10. L. Kulkarni, N. Ukey, J. Bakal and N. Chavan, “A Survey on Energy-Efficient Techniques to Reduce Energy
Consumption in Delay Tolerant Networks”. In Computing and Network Sustainability (pp. 83-91). Springer,
Singapore, July 2017
11. X. Lv, Y. Mu and H. Li, "Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs," in IEEE
Transactions on Dependable and Secure Computing, vol. 12, no. 6, pp. 615-625, Nov.-Dec. 2015.
12. S. Eshghi, M. H. R. Khouzani, S. Sarkar, N. B. Shroff and S. S. Venkatesh, "Optimal Energy-Aware Epidemic
Routing in DTNs," in IEEE Transactions on Automatic Control, vol. 60, no. 6, pp. 1554-1569, June 2015.
13. J. Zhou, X. Dong, Z. Cao and A. V. Vasilakos, "Secure and Privacy Preserving Protocol for Cloud-Based Vehicular
DTNs," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1299-1314, June 2015.
363-367
14.
Authors: Madhavi Wairagade, Dr. Preeti Shukla
Paper Title:
Measuring Industry Readiness of Engineering Students of Nagpur Region with Reference to Social
Skills
Abstract: Most of the students of Engineering colleges in Vidarbha region select their employment through
campus placements. It is thus the responsibility of the colleges to make the students skilled to enhance the chances
of their employability. The paper divided the skill sets into and Social skills and measured its impact on
Employability Test Scores viz. Aptitude Test Score, Group Discussion Score and Personal Interview Score. It is
found that social skills viz. Industry Institute Interaction and Leadership Quality of the students play an important
role in deciding Employability Test Scores of the students. The results were arrived at by taking the sample 629
students of engineering colleges of Nagpur region. Hence the mapping of various parameters in their past social
skill superimposed with current assessment of their potential on the basis of aptitude test, group discussion and
personal interview can generate certain indicators of success in future placement/ higher education/
entrepreneurship in engineering profession.
Keywords: Employability skills, Social skills, CART Analysis
References:
1. RICHARD M. FELDER , GARY N. FELDER, MEREDITH MAUNEY & E. JACQUELIN DIETZ, “ A
Longitudinal Study of Engineering Student Performance and Retention. Gender Differences in Student Performance
and Attitudes”, In a continuing study under way at North Carolina State University.
2. Journal of Engineering Education, 84(2), 151-163 (1995). AUSTRALASIAN JOURNAL OF ENGINEERING
EDUCATION, Published in Australia by the Australasian Association for Engineering Education Inc AAEE, 2003
ISSN 1324-5821, “ENGINEERING EDUCATION – IS PROBLEMBASED OR PROJECT-BASED LEARNING
THE ANSWER?” Julie E. Mills School of Geoliescience, Minerals & Civil Engineering University of South
Australia, Adelaide, South Australia, Australia, David F. Treagust Science and Mathematics Education Centre Curtin
University, Perth, Western Australia, Australia
3. MacLachlan, Anne J, Center for Studies in Higher Education, UC Berkeley Publication Date: 03-01-2006 Series:
Research and Occasional Papers Series Permalink: http://escholarship.org/uc/item/3892k4rm, “Developing Graduate
Students of Color for the Professoriate in Science, Technology, Engineering, and Mathematics (STEM)”
363-367
15.
Authors: Shivani Tyagi, Dr.Manjula Shastri
Paper Title: Portfolio Management and Investment Strategy of Institutional Investor: An overview in Indian Capital
Market
Abstract: The purpose of current study is to examine the most preferred investment option among institutional
investor in India and analysis the factors which impact their investment strategy in India. The study also attempts
to better understand the impact of certain demographic factors such as age, area of operation, type of operation,
asset under management, experience and qualification on the behaviour of institutional investor in India .A semi
structured questionnaire was used to obtain a total of 30 valid responses was collected from January 2019 to March
2019. Cronbach alpha test and normality test was used to check reliability and consistency in the responses.
Descriptive Analysis was done for various variables. Result was presented in the tabular form.
Keywords: Institutional Investors, Preference, Investment Strategy, India.
References: 1. , B. (2016).FII Inflows into Indian IPOs and its impact on the Indian Stock Market
2. Bland, J .M., & Altman, D.G. (1997) .Statistics notes: Cronbach’s Alpha .B (7080), 572.
3. 3.Bushee, B.J., Carter, M.E. & Gerakos, J., 2014 .Institutional Investor Preferences for Corporate Governance
Mechanisms .Journal of Management Accounting Research ,26 (2) ,pp.123-149.
4. Fachrudin, K.A., & Fachrudin, H.T. (2015) .The Study of Investment Portfolio Management and Sustainability of
Property and Real Estate Companies in Indonesia Stock Exchange .Procedia-Social and Behavioural Sciences,
211,117-183.
5. Hutchinson, M., Seamer, M. & Chapple, L (Ellie) .2015 .Institutional Investors, Risk/Performance and Corporate
Governance .The international Journal of Accounting, 50(1), pp.31-52.
6. Isaksson, M. & Celik, S., 2014 .Institutional investors and Owner Engagement .OECD JOURNAL: Financial Market
Trend, 2013, pp.93-114.
7. Johannes, R.L.(2017) .U.S. Patent Application No .15/369,486.
https://patents.google.com/patent/US20170213284A1/en.
8. Joseph, A., &Varghese, J. (2017). A Study on Factors Affecting Investment Decision Making in the context of
Portfolio Management.
9. Jault, J.B. (2015) .Investment Portfolio Management.
10. Koh,P.-S.,2007.Institutional Investor type ,earnings management and benchmarks beaters .Journal of Accounting and
Public policy ,26(3) ,pp.267-99 .
11. Keloharju (2000).The Investment behaviour and performance of various investor type: A study of Finland‘s unique
data set .Journal of Financial Economics, Vol.55, Issue 1, 43-67.
12. Luo, Y., 2002.Contract, cooperation and performance in international joint ventures. Strategic Management Journal,
23(10), pp. 903-919.Avaialble at http://doi.wiley.com/10.1002/smj.261
13. Nielsen, K.M., 2008.Instiutional Investors and Private Equity .Review of Finance, 12(1), pp.185-219.
14. Nicole Choi et.al, 2017. Portfolio Concentration and performance of institutional investor worldwide. Journal of
financial economics, Vol.123 (1), pp.189-208.
15. OECD, 2011.The Role of Institutional Investors in Promoting Good Corporate Governance .OECD Reports
25November 2011, 61, p.299.
16. Priyanka Sharma and Payal Agarwal (2015). “Investor Perception and Attitude towards Mutual Fund as an
Investment option” .Journal of Business Management & Social Science Research (JBM&$$R) .Volume 4, No.2, pp:
115-119s
17. RaviVyas, Suresh Chandra Moonat (2012). Perception and Behaviour of Mutual Funds Investors in Indore, Madhya
Pradesh. Indian Journal of Finance .Volume 6, Issue8 .
18. Sarkar, J. & Sarkar, S., 2000.Large Shareholder Activism in Corporate Governance in Developing Countries:
Evidence from India .International Review of Finance, 1(3), pp.161-194.
19. Sudalaimuthu, s.and Senthil Kumar, P., (2008). “A Study on investors perception towards mutual fund investments.”
Journal of Management Trends, Volume 1.5(1), September 2007-March 2008, pp.106-17
20. Gopikumar, Smitha Nair, S Sreevathsava & Raja Sreedharan V, David McMillan (Reviewing editor :) (2019)
Financial Strength Information and Institutional Investor Demand: Evidence from India, Cogent Economics &
Finance.DOI:10.1080/23322039.2019.1623751.
16.
Authors: Shubham Shukla, Himanshu Shukla
Paper Title: Optimization of Process Parameters for Friction Stir Welding Of Dissimilar Aluminium Alloy AA6061
to AA5183 Using TOPSIS Technique
Abstract: Friction stir welding has proven to be the most promising solid state joining process. It can be used to
get high weldability in joining of high strength aerospace aluminium alloys and other metallic alloys which used to
be low with traditional fusion welding process. This paper emphasises on finding the optimum process parameter
for friction stir welding of dissimilar aluminium alloy AA6061 to AA5183 using multi criteria decision making
method (MCDM). Friction stir welding was done at different tool rotational speed and transverse velocity and
mechanical properties such as tensile strength, percentage elongation and hardness were studied for each weld
specimen. Finally optimization was done using TOPSIS (Techniqueof Ordered Preference by Similarity to Ideal
Solution). The result revealed that the tool rotational speed of 1200 rpm and welding speed of 80mm/min are the
optimum welding parameters.
Keywords: Friction stir welding, TOPSIS, Process parameter
References:
1. 5. Prasad M, kumar Namala K. Process Parameters Optimization in Friction Stir Welding by ANOVA. Materials
Today: Proceedings. 2018; 5(2):4824-4831.
2. 2. Koilraj M, Sundareswaran V, Vijayan S, Koteswara Rao S. Friction stir welding of dissimilar aluminium alloys
AA2219 to AA5083 – Optimization of process parameters using Taguchi technique. Materials & Design. 2012; 42:1-
7.
3. 6. Sudhagar S, Sakthivel M, Mathew P, Daniel S. A multi criteria decision making approach for process improvement
in friction stir welding of aluminium alloy. Measurement. 2017;108:1-8..
4. 3. Chien C, Lin W, Chen T. Optimal FSW process parameters for aluminum alloys AA5083. Journal of the Chinese
Institute of Engineers. 2011;34(1):99-105.
5. 7. Çalışkan H, Kurşuncu B, Kurbanoğlu C, Güven Ş. Material selection for the tool holder working under hard
milling conditions using different multi criteria decision making methods. Materials & Design. 2013;45:473-479.
6. 8. Mishra R, Ma Z. Friction stir welding and processing. Materials Science and Engineering: R: Reports. 2005;50(1-
2):1-78.
7. 9. Shojaeefard M, Behnagh R, Akbari M, Givi M, Farhani F. Modelling and Pareto optimization of mechanical
properties of friction stir welded AA7075/AA5083 butt joints using neural network and particle swarm algorithm.
Materials & Design. 2013;44:190-198.
8. 10. Krohling R, Pacheco A. A-TOPSIS – An Approach Based on TOPSIS for Ranking Evolutionary Algorithms.
Procedia Computer Science. 2015;55:308-317.
9. 11. Shukla A, Agarwal P, Rana R, Purohit R. Applications of TOPSIS Algorithm on various Manufacturing
Processes: A Review. Materials Today: Proceedings. 2017;4(4):5320-5329.
10. 12. Graff W, Sargent D. A new grain-boundary etchant for aluminum alloys. Metallography. 1981;14(1):69-72.
17.
Authors: Dr. Rajeshree Rokade, Dr. Ketki Kshirsagar, Ms. Jayashree Sonawane and Ms. Sunita Munde
Paper Title: Analysis of Human-Machine interaction through Facial Expression and Hand-Gesture Recognition
This paper focuses on a review of recent work on facial expression and hand gesture recognitions. Facial
expressions and hand gestures are used to express emotions without oral communication. The human brain
has the ability to identify the emotions of persons using expressions or hand gestures within a fraction of a
second. Research has been conducted on human–machine interactions (HMIs), and the expectation is that
systems based on such HMI algorithms should respond similarly. Furthermore, when a person intends to
express emotions orally, he or she automatically uses complementary facial expressions and hand gestures.
Extant systems are designed to express these emotions through HMIs without oral communication. Other
systems have added various combinations of hand gestures and facial expressions as videos or images. The
meaning or emotions conveyed by particular hand gestures and expressions are predefined in these cases.
Accordingly, the systems were trained and tested. Further, certain extant systems have separately defined
the meanings of such hand gestures and facial expressions.
Keywords : Facial gesture, Hand gesture, Segmentation, Feature extraction, Classification, Experimentation
[1] Qing Chen; Marius D. Cordea; Emil M. Petriu; Thomas E. Whalen; Imre J. Rudas; Annamaria, Varkonvi-Koczy, “Hand-Gesture and
Facial-Expression Human-Computer Interfaces for Intelligent Space Applications”, 2008 IEEE International Workshop on Medical Measurements and Applications, 2008 PP: 1 - 6.
[2] Thomas James Tiam-Lee; Kaoru Sumi, “Analyzing Facial Expressions and Hand Gestures in Filipino Students' Programming
Sessions”, 2017 IEEE Conference on Culture and Computing (Culture and Computing) , 2017, PP: 75 - 81 [3] Zhipeng Zhao and Ahmed Elgammal, “Spatiotemporal pyramid representation for recognition of facial expressions and hand gestures”,
8th IEEE International Conference on Automatic Face & Gesture Recognition, 2008, PP: 1 - 6
[4] Mihai Gavrilescu, “Recognizing emotions from videos by studying facial expressions, body postures and hand gestures”, 23rd Telecommunications Forum Telfor (TELFOR), 2015, PP: 720 – 723
[5] Kimberly J. Montgomery and James V. Haxby, “Mirror Neuron System Differentially Activated by Facial Expressions and Social Hand
Gestures: A Functional Magnetic Resonance Imaging Study”, Journal of Cognitive Neuroscience, Vol.: 20 (10), PP: 1866 - 1877, 2008 [6] Swapna Agarwal and Saiyed Umer, “MP-FEG: Media Player controlled by Facial Expressions and Gestures”, Fifth National
Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2015, PP: 1- 4
[7] Naresh Kumar, “Motion trajectory based human face and hands tracking for sign language recognition”, 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), 2017, PP: 211 – 216, 2017
[8] Hatice Gunes, Massimo Piccardi and Tony Jan, “Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer”, Pan-
Sydney Area Workshop on Visual Information Processing (VIP2003), Sydney, 2003 [9] Kostas Karpouzis, Amaryllis Raouzaiou, Athanasios Drosopoulos, Spiros Ioannou, Themis Balomenos, Nicolas Tsapatsoulis, and
Stefanos Kolli, “Facial Expression and Gesture Analysis for emotionally-rich Man-Machine interaction”, Chapter V, Emotionally-Rich
Man-Machine Interaction, 2014 [10] Mahesh Krishnananda Prabhu and Dinesh Babu Jayagopi, “Real Time Multimodal Emotion Recognition System using Facial
Landmarks and Hand over Face Gestures”, International Journal of Machine Learning and Computing, Vol. 7, No. 2, 2017
[11] Myung-Ho Ju and Hang-Bong Kang, “Emotional Interaction with a Robot Using Facial Expressions, Face Pose and Hand Gestures”, Int J Adv Robotic Sy , Vol. 9, 2012
[12] Amit Pimpalkar, Chaitali Nagalkar, Sonal Waghmare, Keshari Ingole, “Gesture Recognition of Human Behavior using Multimodal
Approach”, IJCAT – International Journal of Computing and Technology, Vol. 1, No.1, February 2014 [13] Maria Pateraki and Haris Baltzakis and Panos Trahanias, “An integrated approach for visual tracking of hands, faces and facial
features”, Proc. of the Workshop on Measuring and Understanding Human Movements and Emotions, held within the IEEE
International Conference on Robotics and Automation (ICRA), Shanghai, China, 2011 [14] A. Kapoor and R. W. Picard. “Real-time, fully automatic upper facial feature tracking” Proceedings of 5th International Conference
on Automatic Face and Gesture Recognition, May 2002
[15] A. Bobick, “Movement, activity, and action: the role of knowledge in the perception of motion,” Royal Society Workshop on Knowledge based Vision in Man and Machine London, England, February, 1997.
[16] P. Doll´ar, V. Rabaud, G. Cottrell, and S. Belongie, “Behavior recognition via sparse spatio-temporal features”, VS-PETS, October 2005.
[17] Wong, T. Kim, and R. Cipolla “Learning motion categories using both semantic and structural information”, CVPR07, pages 1–6, 2007.
[18] Kanade, T., Cohn, J. F., Tian, Y., “Comprehensive database for facial expression analysis”, 4th IEEE International Conference on Automatic Face and Gesture Recognition, pp. 46-53, Grenoble, 2000.
[19] Pantic, M., Valstar, M. F., Rademaker, R., Maat, L., “Web-based database for facial expression analysis”, IEEE International
Conference on Multimedia and Expo, pp. 317 - 321, July 2005. [20] P. Ekman and W. V. Friesen. “The Facial Action Coding System: A Technique for Measurement of Facial Movement” Consulting
Psychologists Press, San Francisco, CA, 1978.
[21] P. Ekman. “Emotions in the Human Faces”, Studies in Emotion and Social Interaction. Cambridge University Press, second edition, 1982.
[22] J. N. Bassili “Facial motion in the perception of faces and of emotional expression”, Journal of Experimental Psyschology, PP:373–
379,1978. [23] A. Kendon, “How gestures can become like words”, Cross-cultural perspectives in nonverbal communication, New York, 1988.
[24] Affectiva Developer Portal. Available: https://developer.affectiva.com/
[1] [25] Wilson, P. I. ,Fernandez, J., “Facial feature detection using Haar classifiers”, Journal of Computing Sciences in Colleges, 21(4), pp.
127-133, April 2006.
[26] Valstar M. and Pantic M, “Fully Automatic Facial Action Unit Detection and Temporal Phases of Factial Actions”, IEEE Transactions on Systems, Man, and Cybernetics, 42(1), pp. 28-43, February 2012.
[27] James Jenn-Jier Lien, Kanade Takeo, Cohn Jeffrey and Ching-chang Li, “Detection, Tracking, and Classification of Action Units in
Facial Expression”, Journal of Robotics and Autonomous Systems, 31(3), pp. 131-146, 1999 [28] Pantic M., Tomc M., Rothkrantz L and J. M., “A hybrid approach to mouth features detection”, Proceedings of IEEE International
Conference on Systems, Man, Cybernetics, pp. 1188 - 1193, Tucson, Arizona, October 2001.
[29] Wilson P. I. and Fernandez J., “Facial feature detection using Haar classifiers”, Journal of Computing Sciences in Colleges, 21(4), pp.127-133, April 2006
[30] Feijun Jiang, Ekenel H. K. and Shi B. E., “Efficient and robust integration of face detection and head pose estimation”, 21st
International Conference on Pattern Recognition (ICPR), pp.1578- 1581, Tsukuba, 11-15 Nov. 2012.
18.
Authors:
Nor Baizura Hamid, Siti Noraiza Ab Razak, Mardiha Mokhtar, Mohd Erwan Sanik, Masiri Kaamin,
Ahmad Hakimi Mat Nor, Mohd Zakwan Ramli
Paper Title: Development of Paving Blocks Using Waste Materials
Abstract
Nowadays, the paving blocks that in the market are heavy and the price are costly. This study will introduce the
lightweight paving blocks and more affordable because the waste materials such as tins, plastic and quarry dust are
use in the development of the concrete paving blocks namely as Eco-Friendly Paving Block. Eco paving blocks
will be compared to control paving blocks due to its durability and compressive strength. Based on the past
research, tin and plastic are used as coarse aggregate while quarry dust will act as fine aggregate. The method and
test for concrete work was conducted which is slump test, density test and compressive strength test. The result
shows that Eco-Friendly Paving Block can be used at non-traffic area based on their compressive strength with the
value of 13.3275N/mm² compared to control paving block with value of 72.3845N/mm². The uses of this waste
material also can reduce the amount of environmental pollutants such as water and soil pollution.
Index Terms: Paving, tins and plastic, quarry dust, eco-friendly
References:
59. Koli Nishikant, Aiwale Nachiket, Inamdar Avadhut, Abhishek Sangar, “Manufacturing of concrete paving block by using waste glass
material”, International Journal of Scientific and Research Publications Volume 6, issue 6, 61, June 2016.
60. Kevin Klarens, Michael Indranata, Luthfi Al Jamali, and Djwantoro Hardjito, “The use of bottom ash for replacing fine aggregate in
concrete paving blocks”, Matec Web of conferences 138, 01005, 2017.
61. Radhikesh P. Nanda, Amiya K. Das, Moharana.n.c, “ Stone crusher dust as a fine aggregate in concrete for paving blocks”, International
Journal of Civil and Structural Engineering , Volume 1, No 3, 2010.
62. Muhammad Fauzi Mohd. Zain, Sudharshan Naidu Raman, Azimin Samsul Tazilan, Abdul Halim Ismail, Mazlan Tahir dan Zulhairuse Md Darus, “Penggantian sebahagian pasir dengan debu kuari ke atas ciri konkrit prestasi tinggi baru”, Jurnal Kejuruteraan 17 page 3-12,
2005.
63. Ashish Patanwadia, Hardik Solanki , “Effect of replacement of natural sand by quarry dust on mechanical Properties”, Volume5, issue 4, International Journal of engineering technology science and research, April 2018.
64. Anzar Hamid Mir, March, “Improved concrete properties using quarry dust as replacement for natural Sand”, International Journal of
engineering research and development, Volume 11, issue 03, pp.46-52, 2015. 65. B. Shanmugavalli, “Reuse of plastic waste in paver blocks”, International Research Journal of Engineering and Technology (irjet), Vol. 6
issue 02, February 2017.
66. Uroosa Iqbal, Muhammad Akram, Abdullah Saand, “Soft drink tins as fibre reinforcement in concrete”, Proceedings of Ampe, 14-15, 2015.
67. M. Achitra, R. Ambika Rajasree, R. Vijayalakshmi Pandit, V.Saranya, “Recycled Plastic and Coconut fibre used in concrete paver block”,
Volume 8 issue no.4 Research Article, 2018. 68. Naushad Khan, Ruchi Chandrakar, “An experimental study on uses of quarry dust to replace sand in concrete”, International research
journal of engineering and technology Volume: 04 issue: 11, Nov 2017.
363-367
19.
Authors: Airul Azizan Zainudin, Hazwani Mohd Mohadis, Norfadzilah Ahmad
Paper Title: Mobile-based Interventions in Nursing Education among Undergraduate Nursing Students: An
Analysis
Abstract: There is an enormous pressure for nursing education institution to become more dynamic to engage in
fast-growing educational technology into the curriculum. This study discussed the literature on the implementation
of mobile learning intervention in undergraduate nursing education mainly targeting learning outcomes and
understanding the features and elements of mobile technology that lead to the success and failure of the
interventions. Four main online databases searched; there were Ovid, Scopus, CINAHL and ProQuest. Citation
tracking and scrutiny of reference lists were also undertaken in the search for additional papers. We included
twelve papers reporting on mobile-based intervention with nursing learning activities. Seven out of twelve reported
the employment of quasi-experimental pre-posttest, meanwhile four used randomized-controlled trial, and one
experimental pre-posttest. Eight studies were from South Korea, two were from Taiwan, and one was from
Finland and Brazil. Four implemented video-based, while the other three were virtual learning object, auditory-
based content and communication-based intervention. Among the advantages of mobile technology addressed
were easy access and promote learning feedback, which has subsequently resulted in improved retention of
knowledge, skill performance, satisfaction and self-efficacy. Meanwhile, the disadvantages were lack of user
satisfaction among video-based intervention studies and low skill practice score in auditory- and social network-
based intervention studies. In summary, there were no single study claimed that their study as effective for clinical
skill learning since the outcomes were unclear, but there is still room for improvement with better intervention
design.
Index Terms: Education, Mobile Applications, Nursing, Review, Smartphone
References: 69. Bentrcia, Mohamed, Mohammed Alshitawi, and Hanafy Omar. "Development of alternative systems for automotive air
conditioning-A review." Journal of Mechanical Science and Technology 32.4 (2018): 1857-1867.
70. Lethwala, Y., and P. Garg. "Development of auxiliary automobile air conditioning system by solar energy." International
Research Journal of Engineering and Technology (IRJET) 4.7 (2017).
71. Ladke, Parikshit A., and C. S. Choudhari. "Design Optimization and Performance Analysis of Condenser for HVAC
Automobile System for R-290." International Journal of Current Engineering and Technology. Available at
http://inpressco. com/category/ijcet (2016).
368-374
72. Shete, Kaustubh. "Influence of automotive air conditioning load on fuel economy of ic engine vehicles." International
Journal of Scientific & Engineering Research 6.8 (2015): 1367-1372.
73. Cao, Y. H., and X. M. Cui. "Investigation on the Effect of Fin Width on the Heat Transfer Performance of the Condenser
Used in the Automotive Air Conditioning System." Chemical Engineering Transactions 46 (2015): 1003-1008.
74. Kilic, M., and S. M. Akyol. "Experimental investigation of thermal comfort and air quality in an automobile cabin during
the cooling period." Heat and Mass Transfer 48.8 (2012): 1375-1384.
75. Khayyam, Hamid, Abbas Z. Kouzani, and Eric J. Hu. "Reducing energy consumption of vehicle air conditioning system by
an energy management system." 2009 IEEE intelligent vehicles symposium. IEEE, 2009.
76. Rugh, J. P., Chaney, L., Lustbader, J., & Meyer, J. “Reduction in vehicle temperatures and fuel use from cabin ventilation,
solar-reflective paint, and a new solar-reflective glazing.” (No. 2007-01-1194). SAE Technical Paper, 2007.
77. Yoo, Seong Yeon, and Dae Woong Lee. "An Experimental Study on Performance of Automotive Condenser and
Evaporator.",International Refrigeration and Air Conditioning Conference (2004).
78. Kampf, Hans, and Dieter Schmadl. "Parking Cooling Systems for Truck Cabins." SAE Transactions (2002): 80-89.
79. Pritchard, Philip J., John W. Mitchell, and John C. Leylegian, “Fox and McDonald's Introduction to Fluid Mechanics,
Binder Ready Version." John Wiley & Sons, 2016.
80. Duffie, John A., and William A. Beckman “Solar engineering of thermal processes.” John Wiley & Sons, 2013.
81. Kakaç, Sadik, Hongtan Liu, and Anchasa Pramuanjaroenkij, “Heat exchangers: selection, rating, and thermal design.” CRC
press, 2012.
82. American Society of Heating, et al., “Thermal environmental conditions for human occupancy.” Vol. 55. No. 2004.
American Society of Heating, Refrigerating and Air-Conditioning Engineers, 2004.
83. Handbook, A. S. H. R. A. E. "HVAC systems and equipment." American Society of Heating, Refrigerating, and Air
Conditioning Engineers, Atlanta, GA (1996): 1-10.
20.
Authors:
Nur Raihan Esa, Firdaus Yusof @ Alias, Mohd Zulfaezal Che Azemin, Norsham Ahmad,
Nor Azwani Mohd Shukri
Paper Title: RETINAL IMAGE QUALITY ASSESSMENT: PORTABLE EYE EXAMINATION KIT RETINA
(PEEK RETINA)TM VERSUS 3D-PRINTED OPHTHALMOSCOPE (3DPO)
Abstract: Portable Eye Examination Kit retina (Peek Retina™, Peek Vision Ltd, UK) and 3D Printed
Ophthalmoscope (3DPO) were identified to have acceptable image for retinal evaluation, however the
retinal images quality in term of blood vessels visibility between both devices was uncertain. This study was
conducted to compare the quality of image based on blood vessels visibility between Peek Retina and 3DPO
for fractal dimension (Df) analysis. In this study, a total of 40 retinal images (nPEEK=20, n3DPO=20) of 20
participants were captured on random eyes. The best retinal images with good focus and significant retinal
blood vessels visibility of Peek Retina and 3DPO were selected for image quality analysis. The retinal images
were cropped approximately following the size of the cornea and resized to 900 by 900 pixels of resolution
using GNU Image Manipulation Program Version 2.8.18 (GIMP). The images were randomly sorted as
Retinal Image Quality Assessment (RIQA) generated by Google form. Likert scale was implemented to
assess the preferences scale of retinal image quality in determining the visibility of retinal vasculature to be
traced with four choices of response options (1; very difficult, 2; difficult, 3; easy and 4; very easy). Prior to
the retinal image assessment, ten optometrists were asked to experience retinal blood vessels tracing and
consequently evaluate the 40 images by choosing the scale options (1 to 4) based on visibility retinal blood
vessels. Mann-Whitney test indicated that the blood vessel tracing was easier for Peek Retina (median = 3)
than for 3DPO (median = 2), p < 0.0001. Retinal image captured by Peek Retina was rated as very easy
(43.5%) for blood vessels tracing as compared to the image from 3DPO (17.0%). Only 1.5% of the image
captured by PEEK was considered as a very difficult for blood vessel tracing. Difficult and easy preference
scales of blood vessel tracing for PEEK were 16.5% and 38.5% respectively. 34% of 3DPO retinal image
was graded as difficult for blood vessel tracing followed by 28.5% (easy), 20.5% (very difficult) and 17.0%
(very easy). The results indicate that a retinal image photographed by Peek Retina was more preferable in
tracing retinal vascular network for Df analysis as compared to 3DPO.
Keywords: Peek Retina, 3DPO, retinal vessels, image quality
References:
1. Strehle EM, Shabde N. One hundred years of telemedicine: Does this new technology have a place in paediatrics? Arch Dis Child.
2006;91(12):956–9.
2. Shirzadfar H. The Evolution and Transformation of Telemedicine. Int J Biosens Bioelectron. 2017;3(4):303–6.
3. Mosa ASM, Yoo I, Sheets L. A systematic review of healthcare applications for smartphones. BMC Med Inform Decis Mak.
2012;12(67):1–31.
4. Haddock LJ, Kim DY, Mukai S. Simple, inexpensive technique for high-quality smartphone fundus photography in human and
animal eyes. J Ophthalmol. 2013;2013(518479):1–6.
5. Lord RK, Shah VA, San Filippo AN, Krishna R. Novel Uses of Smartphones in Ophthalmology. Ophthalmology. 2010;117(6):1274.
6. Maamari RN, Keenan JD, Fletcher DA, Margolis TP. A mobile phone-based retinal camera for portable wide fi eld imaging. Br J
363-367
Ophtalmol. 2013;(0):2–5.
7. Shanmugam MP, Kailash D, Mishra C, Rajesh R, Madhukumar R. Symposium ‑ Retinochoroidal Imaging Unconventional
techniques of fundus imaging : A review Indirect Ophthalmoscopy with a Hand ‑ held Slit ‑ lamp Based Retinal Imaging
Smartphone as an Ophthalmoscope. 2015;582–5.
8. Barikian A, Haddock LJ. Smartphone Assisted Fundus Fundoscopy/Photography. Curr Ophthalmol Rep. 2018;6(1):46–52.
9. Russo A, Morescalchi F, Costagliola C, Delcassi L, Semeraro F. A Novel Device to Exploit the Smartphone Camera for Fundus
Photography. J Ophthalmol. 2015;2015(823139):1–6.
10. Russo A, Morescalchi F, Delcassi L, Costagliola C, Semeraro F. Comparison of smartphone ophthalmoscopy with slit-lamp
biomicroscopy for undilated glaucoma screening. Investig Ophthalmol Vis Sci. 2015;56(7):4105.
11. Bastawrous A, Giardini ME, Bolster NM, Peto T, Shah N, Livingstone IAT, et al. Clinical Validation of Smartphone Based Adapter:
Peek Retina for Optic Disc Imaging in Kenya. J AMA Ophthalmol. 2016;134(2):151–8.
12. Navitsky C. The portable eye examination kit [Internet]. Retina Today. 2013. Available from: http://retinatoday.com/2013/12/the-
portable-eye-examination-kit
13. Bastawrous A. Smartphone fundoscopy. Ophthalmology. 2012;119(2):433.
14. Myung D, Jais A, He L, Blumenkranz MS, Chang RT. 3D Printed Smartphone Indirect Lens Adapter for Rapid, High Quality Retinal
Imaging. J Mob Technol Med. 2014;3(1):9–15.
15. Hong SC. 3D printable retinal imaging adapter for smartphones could go global. Graefe’s Arch Clin Exp Ophthalmol.
2015;253(10):1831–3.
16. Russell SR, Abramoff V MD, Radosevich MD, Heffron E, Stone EM, Barriga ES, et al. Quantitative Assessment of Retinal Image
Quality Compared to Subjective Determination. Invest Ophthalmol Vis Sci. 2007;48(13):2607.
17. Shanmugam M, Mishra D, Madhukumar R, Ramanjulu R, Reddy S, Rodrigues G. Fundus imaging with a mobile phone: A review of
techniques. Indian J Ophthalmol. 2014;62(9):960.
18. Timberlake GT, Kennedy M. The Direct Ophthalmoscope How it Works and How to Use It. In: Introduction to the Direct
Ophthalmoscope. 2005. p. 9–11.
19. Singh D, Saxena R, Sharma P, Menon V. Understanding your Direct Ophthalmoscope. Delhi J Ophthalmol. 2011;21(3):40–4.
20. Panwar N, Huang P, Lee J, Keane PA, Chuan TS, Richhariya A. Fundus Photography in the 21st Century—A Review of Recent
Technological Advances and Their Implications for Worldwide Healthcare. Telemed e-HEALTH 1. 2016;22(3):1–11.
21. PEEK VISION Ltd. How to use PEEK Retina [Internet]. Dorset Digital. 2018. p. Available from: www.peekvision.org
22. Bethke W. Retinal Imaging On the Cheap [Internet]. Review Ophthalmology. 2015. Available from:
https://www.reviewofophthalmology.com/article/retinal-imaging-on-the-cheap
23. Ab Hamid F, Che Azemin MZ, Salam A, Aminuddin A, Mohd Daud N, Zahari I. Retinal Vasculature Fractal Dimension Measures
Vessel Density. Curr Eye Res. 2016;41(6):823–31.
24. Siegenthaler E, Bochud Y, Bergamin P, Wurtz P. Reading on LCD vs e-Ink displays : effects on fatigue and visual strain.
2012;32:367–74.
25. Wang S, Jin K, Lu H, Cheng C, Ye J, Qian D. Human Visual System-Based Fundus Image Quality Assessment of Portable Fundus
Camera Photographs. IEEE Trans Med Imaging. 2016;35(4):1046–55.
26. Bastawrous A, Mathenge W, Peto T, Weiss HA, Rono H, Foster A, et al. The Nakuru eye disease cohort study: Methodology &
rationale. BMC Ophthalmol. 2014;14(1):1–10.
27. Nazari Khanamiri H, Nakatsuka A, El-Annan J. Smartphone Fundus Photography. J Vis Exp. 2017;(125):1–5.
28. Abdel Hamid L, El-Rafei A, El-Ramly S, Michelson G, Hornegger J. No-reference wavelet based retinal image quality assessment.
In: Proceedings of 5th Eccomas Thematic Conference on Computational Vision and Medical Image Processing. 2015. p. 123–30.
29. Ludwig CA, Shan MX, Nguyen NPH, Choi DY, Ku V, Lam CK. The Future of Automated Mobile Eye Diagnosis. J Mob Technol
Med. 2016;5(2):44–50.
21.
Authors: Nur Raihan Esa, Siti Noor Hakimah Saidi, Mohd Zulfaezal Che Azemin, Nor Azwani Mohd Shukri,
Norsham Ahmad, Firdaus Yusof @ Alias
Paper Title: RELIABILITY OF MANUAL VASCULAR SEGMENTATION FOR RETINAL FRACTAL
DIMENSION USING PEEK RETINATM
Abstract: Fractal dimension (Df) has been identified as indirect measure in quantifying the complexity of
retinal vessel network which is useful for early detection of vascular changes. Reliability studies of Df
measurement on retinal vasculature, has been conducted on retinal images processed by using semi-
automated software which only permits image with 45ᵒ field of view (FOV). Smartphone-assisted fundus
camera retinal image has a maximum 30ᵒ FOV which warrant manual processing in measuring the Df.
Retinal blood vessels need to be manually segmented to produce binary images for retinal vasculatures Df
measurement. Therefore, this study was conducted to determine the intragrader and intergrader reliability
of manual segmentation of the retinal vasculature Df measurement from retinal images taken using a
smartphone-assisted fundus camera Forty-five retinal images were captured using the Portable Eye
Examination Kit Retina (Peek Retina™, Peek Vision Ltd, UK). Suitable image for Df analysis were selected
based on gradable retinal image criteria which included; i) good image focus, ii) centered position of optic
nerve head (ONH) and iii) significant blood vessel visibility. The images were cropped 0.5 disc diameters
away from disc margin and resized to 500x500 pixels using GNU Image Manipulation Program Version
2.8.18 (GIMP, The GIMP Team, United States). Retinal vessels were manually traced by using layering
capabilities for blood vessel segmentation. Df values of segmented blood vessels were measured by using
Image J (National Institutes of Health, USA) and its plugin software, FracLac Version 2.5. Intragrader and
intergrader reliability was determined by comparing the Df values between; two readings measured one
week apart by a grader and readings from two different graders, respectively, using intraclass correlation
coefficient (ICC) and Bland-Altman graphical plots. Intragrader agreement for retinal Df showed good
reliability with ICC of 0.899 (95% CI: 0.814–0.945). Bland Altman analysis indicated good agreement
between Df values at different grading time (mean difference 0.0050; 95% CI:-0.0001–0.0101). Intergrader
reliability for retinal Df was high with ICC of 0.814 (95% CI: 0.459–0.919). Bland Altman plot revealed
good intergrader agreement for retinal Df between two graders with a bias value of 0.0158 (95% CI:
0.0092–0.0223). In conclusion, manual segmentation of retinal image captured by smartphone-assisted
fundus camera has good reliability (0.75 < ICC < 0.9) for Df analysis to study the morphology of retinal
vasculatures.
Keywords: fractal dimension, retinal vascular, smartphone-assisted fundus camera, Peek retina, reliability
References:
1. Avakian A, Kalina R, Sage E, Rambhia A, Elliott K, Chuang E, et al. Fractal analysis of region-based vascular change in the normal
and non-proliferative diabetic retina. Curr Eye Res. 2002;24(4):274–80.
2. Talu S. Fractal analysis of normal retinal vascular network. Oftalmologia. 2011;55(4):11–6.
3. Liew G, Wang JJ, Mitchell P, Wong TY. Retinal vascular imaging: a new tool in microvascular disease research. Circ Cardiovasc
Imaging. 2008;1(2):156–61.
4. Huang F, Dashtbozorg B, Zhang J, Bekkers E, Abbasi-Sureshjani S, Berendschot TTJM, et al. Reliability of Using Retinal Vascular
Fractal Dimension as a Biomarker in the Diabetic Retinopathy Detection. J Ophthalmol. 2016;2016.
5. Cheng SC, Huang YM. A Novel Approach to Diagnose Diabetes Based on the Fractal Characteristics of Retinal Images. IEEE Trans
Inf Technol Biomed. 2003;7(3):163–70.
6. Jelinek H, Mendonça M De, Oréfice F, Garcia C, Nogueira R, Soares J, et al. Fractal Analysis Of The Normal Human Retinal
Vasculature. Internet J Ophthalmol Vis Sci. 2009;8(2):1–5.
7. Bartlett JW, Frost C. Reliability , repeatability and reproducibility : analysis of measurement errors in continuous variables.
Ultrasound Obs Gynecol. 2008;31:466–75.
8. MacGillivray TJ, Patton N. A reliability study of fractal analysis of the skeletonised vascular network using the “box-counting”
technique. In: Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings. IEEE; 2006. p.
4445–8.
9. Popovic N, Radunovic M, Badnjar J, Popovic T. Fractal dimension and lacunarity analysis of retinal microvascular morphology in
hypertension and diabetes. Microvasc Res. 2018;118:36–43.
10. Liew G, Wang JJ, Cheung N, Zhang YP, Hsu W, Lee ML, et al. The Retinal Vasculature as a Fractal: Methodology, Reliability, and
Relationship to Blood Pressure. Ophthalmology. 2008;115(11):1951–7.
363-367
11. Ab Hamid F, Che Azemin MZ, Salam A, Aminuddin A, Mohd Daud N, Zahari I. Retinal Vasculature Fractal Dimension Measures
Vessel Density. Curr Eye Res. 2016;41(6):823–31.
12. Macgillivray TJ, Trucco E, Cameron JR, Dhillon B, Houston JG, Van Beek EJR. Retinal imaging as a source of biomarkers for
diagnosis , characterization and prognosis of chronic illness or long-term conditions. Br J Radiol. 2014;87(20130832):1–16.
13. Bonaldi L, Menti E, Ballerini L, Ruggeri A, Trucco E. Automatic Generation of Synthetic Retinal Fundus Images : Vascular Network
Automatic Generation of Synthetic Retinal Fundus Images : Vascular Network. Procedia Comput Sci. 2016;90:54–60.
14. Huang F, Dashtbozorg B, Bart M, Romeny H. Artery / vein classification using reflection features in retina fundus images. Mach Vis
Appl. 2017;1–12.
15. Kipli K, Hoque ME, Lim LT, Mahmood MH, Sahari SK, Sapawi R, et al. A Review on the Extraction of Quantitative Retinal
Microvascular Image Feature. Comput Math Methods Med. 2018;2018(4019538):1–21.
16. Li X, Wong WL, Cheung CY, Cheng C, Ikram MK, Li J, et al. Racial Differences in Retinal Vessel Geometric Characteristics : A
Multiethnic Study in Healthy Asians. Clin Epidemiol Res. 2013;54(5):3650–6.
17. Azemin MZ ulfaezal C, Daud NM ohamad, Ab Hamid F, Zahari I, Sapuan AH alim. Influence of refractive condition on retinal
vasculature complexity in younger subjects. ScientificWorldJournal. 2014;2014:783525.
18. Lim LS, Cheung CY, Lin X, Mitchell P. Influence of Refractive Error and Axial Length on Retinal Vessel Geometric Characteristics.
Invest Ophthalmol Vis Sci. 2011;52(2):669–978.
19. Acharya AS, Prakash A, Nigam A. Sampling : Why and How of it ? INDIAN J Med Spec. 2013;4(2):330–3.
20. Abràmoff MD, Magalhães PJ, Ram SJ. Image Processing with ImageJ. Biophotonics Int. 2004;11(7):36–41.
21. Mainster MA. The fractal properties of retinal vessels: Embryological and clinical implications. Eye. 1990;4(1):235–41.
22. Losa GA. Fractals in Biology and Medicine. Second. Meyers RA, editor. Switzerland: Wiley-VCH Verlag GmbH & Co. KGaA;
2011. 6-9 p.
23. Family F, Masters BR, Platt DE. Fractal pattern formation in human retinal vessels. Phys D Nonlinear Phenom. 1989;38(1–3):98–
103.
24. Fraz MM, Remagnino P, Hoppe A, Uyyanonvara B, Rudnicka AR, Owen CG, et al. Blood vessel segmentation methodologies in
retinal images - A survey. Comput Methods Programs Biomed. 2012;108(1):407–33.
25. Huang F, Zhang J, Bekkers EJ, Bart M, Romeny H, Dashtbozorg B, et al. Stability Analysis of Fractal Dimension in Retinal
Vasculature. In: Proceedings of the Ophthalmic Medical Image Analysis Second International Workshop. 2015. p. 1–8.
26. Koo TK, Li MY. A Guideline of Selecting and Reporting Intraclass Correlation Coefficients for Reliability Research. J Chiropr Med
[Internet]. 2016;15(2):155–63. Available from: http://dx.doi.org/10.1016/j.jcm.2016.02.012
27. Giavarina D. Understanding Bland Altman analysis Lessons in biostatistics. Biochem Medica [Internet]. 2015;25(2):141–51.
Available from: http://dx.doi.org/10.11613/BM.2015.015
22.
Authors:
Iffah Syafiqah Meor Badi’auzzaman, Moey Soo Foon, Mohd. Zulfaezal Che Azemin , Mohd. Izzuddin
Mohd. Tamrin
Paper Title: The use of decision tree in breast cancer-related research: A scoping analysis based on Scopus-indexed
articles
Abstract: Breast cancer is the leading cancer that occurs in women globally. The use of machine learning
has been introduced to supplement the work in breast cancer studies. There are undisputed pieces of
evidence of the existence of publications pertaining to the use of decision tree in breast cancer-related
research. However, little is known regarding the types and frequencies of the searched articles. The main
objective of this paper is to unearth the broad variety of articles related to breast cancer research that
utilized decision trees. The Scopus database was chosen to examine the trend, frequencies and themes of the
related publications from the year 2013 until 2018. The study was also intended to disclose the categories of
articles based on the areas of breast cancer that have employed the decision trees method. A total of 259
articles from Scopus database were found to meet the inclusion criteria. The analysis of the frequency of
published articles generally shows an upward trend. The majority of articles targeted diagnosis of breast
cancer (37.8%) in comparisons with other categories. Even though the number of articles found is adequate,
several categories of breast cancer are lacking in publications specifically the survivability, incidence, and
recurrence of breast cancer among patients. There is a need to redirect the focus of breast cancer research
on these categories for future efforts.
363-367
Index Terms: Breast Cancer, Mammography, Machine Learning, Decision Tree
References:
84. International Agency for Research on Cancer, Latest global cancer data: Cancer burden rises to 18.1 million new cases and 9.6 million
cancer deaths in 2018, 2018.
85. American Institute for Cancer Research, New Global Cancer Data: GLOBOCAN 2018 | UICC, Uicc.Org. (2018).
86. National Cancer Institute, Financial Burden of Cancer Care Cancer Trends Progress Report, Progressreport.Cancer.Gov. (2018). 87. National Breast Cancer Foundation, How research is making a difference to breast cancer risk, (n.d.).
88. Machine Learning: What it is and why it matters, Sas.Com. (2019).
89. Hackartist, What is the difference between data mining, statistics, machine learning and AI? [Msg 2]. Message posted at
https://stats.stackexchange.com/questions/5026/what-is-the-difference-between-data-mining-statistics-machine-learning-and-ai. (2017).
90. S. K. Sajan, M. Germanus Alex, A Comparative Study to Evaluate the Performance of Classification Algorithms in Mammogram Analysis,
International Journal Of Engineering & Technology. 7 (2018) 154.
91. H. Shin, Y. Nam, A coupling approach of a predictor and a descriptor for breast cancer prognosis, BMC Medical Genomics. 7 (2014) S4.
92. D. Rew, An Introduction to the Scopus Content Selection and Advisory Board. (2015).
93. H. Arksey, L. O'Malley, Scoping studies: towards a methodological framework, International Journal of Social Research Methodology. 8
(2005) 19-32.
94. N. Mays, E. Roberts, J. Popay, Synthesizing research evidence. In: Fulop N, Allen P, Clarke A, Black N, editors. Studying the
Organisation and Delivery of Health Services: Research methods. London: Routledge; pp. 188–219. (2001).
95. A. Gupta, I. Banerjee, D. Rubin, Automatic information extraction from unstructured mammography reports using distributed semantics,
Journal of Biomedical Informatics. 78 (2018) 78-86.
96. L. Sun, J. He, X. Yin, Y. Zhang, J. Chen, T. Kron et al., An image segmentation framework for extracting tumors from breast magnetic
resonance images, Journal of Innovative Optical Health Sciences. 11 (2018) 1850014.
97. A. Rodríguez-Cristerna, W. Gómez-Flores, W. de Albuquerque Pereira, A computer-aided diagnosis system for breast ultrasound based on
weighted BI-RADS classes, Computer Methods and Programs in Biomedicine. 153 (2018) 33-40.
98. J. Shan, S. Alam, B. Garra, Y. Zhang, T. Ahmed, Computer-Aided Diagnosis for Breast Ultrasound Using Computerized BI-RADS
Features and Machine Learning Methods, Ultrasound In Medicine & Biology. 42 (2016) 980-988.
99. L. Silva, A. Santos, R. Bravo, A. Silva, D. Muchaluat-Saade, A. Conci, Hybrid analysis for indicating patients with breast cancer using
temperature time series. Computer Methods and Programs in Biomedicine, 130, (2016).142-153.
100. M. Santana, J. Pereira, F. Silva, N. Lima, F. Sousa, G. Arruda et al., Breast cancer diagnosis based on mammary thermography and
extreme learning machines, Research On Biomedical Engineering. 34 (2018) 45-53.
101. Q. Liu, M. Gan, R. Jiang, A sequence-based method to predict the impact of regulatory variants using random forest, BMC Systems
Biology. 11 (2017).
102. S. Wang, Y. Cai, Identification of the functional alteration signatures across different cancer types with support vector machine and feature
analysis, Biochimica Et Biophysica Acta (BBA) - Molecular Basis Of Disease. 1864 (2018) 2218-2227.
103. A.G.Floares, G.A.Calin, F.B. Manolache, Bigger Data Is Better for Molecular Diagnosis Tests Based on Decision Trees. In: Tan Y., Shi Y.
(eds) Data Mining and Big Data. DMBD 2016. Lecture Notes in Computer Science, vol 9714. Springer, Cham. (2016).
104. D. Castillo, J. Gálvez, L. Herrera, B. Román, F. Rojas, I. Rojas, Integration of RNA-Seq data with heterogeneous microarray data for
breast cancer profiling, BMC Bioinformatics. 18 (2017).
105. S. Kim, H. Lee, M. Kon, Comparisons of cancer classifiers based on RNA_seq and miRNA_seq, International Journal of Data Mining and
Bioinformatics. 17 (2017) 359.
106. S. Ali, A. Majid, Can–Evo–Ens: Classifier stacking based evolutionary ensemble system for prediction of human breast cancer using
amino acid sequences, Journal Of Biomedical Informatics. 54 (2015) 256-269.
107. S. Ali, A. Majid, S. Javed, M. Sattar, Can-CSC-GBE: Developing Cost-sensitive Classifier with Gentleboost Ensemble for breast cancer
classification using protein amino acids and imbalanced data, Computers in Biology and Medicine. 73 (2016) 38-46.
108. A. Mohanty, M. Senapati, S. Beberta, S. Lenka, Texture-based features for classification of mammograms using decision tree, Neural
Computing And Applications. 23 (2012) 1011-1017.
109. A. Midya, R. Rabidas, A. Sadhu, J. Chakraborty, Edge Weighted Local Texture Features for the Categorization of Mammographic Masses,
Journal Of Medical And Biological Engineering. 38 (2017) 457-468.
110. A. Vadivel, B. Surendiran, A fuzzy rule-based approach for characterization of mammogram masses into BI-RADS shape categories,
Computers in Biology and Medicine. 43 (2013) 259-267.
111. N. Uniyal, H. Eskandari, P. Abolmaesumi, S. Sojoudi, P. Gordon, L. Warren et al., Ultrasound RF Time Series for Classification of Breast
Lesions, IEEE Transactions On Medical Imaging. 34 (2015) 652-661.
112. P. Kapetas, R. Woitek, P. Clauser, M. Bernathova, K. Pinker, T. Helbich et al., A Simple Ultrasound Based Classification Algorithm
Allows Differentiation of Benign from Malignant Breast Lesions by Using Only Quantitative Parameters, Molecular Imaging And
Biology. 20 (2019) 1053-1060.
113. M. Hammer, E. Mortani Barbosa, Predictive factors for malignancy in incidental pulmonary nodules detected in breast cancer patients at
baseline CT, European Radiology. 27 (2016) 2802-2809.
114. Y. Li, X. Tang, Z. Bai, X. Dai, Exploring the intrinsic differences among breast tumor subtypes defined using immunohistochemistry
markers based on the decision tree, Scientific Reports. 6 (2016).
115. Z. Gandomkar, P. Brennan, C. Mello-Thoms, MuDeRN: Multi-category classification of breast histopathological image using deep
residual networks, Artificial Intelligence in Medicine. 88 (2018) 14-24.
116. L. Dalton, Invasive breast cancer: stratification of histological grade by gene-based assays: a still relevant example from an older data set,
Histopathology. 65 (2014) 429-433.
117. C. Chang, S. Kuo, H. Wu, Y. Huang, D. Chen, Stellate Masses and Histologic Grades in Breast Cancer, Ultrasound In Medicine &
Biology. 40 (2014) 904-916.
118. A. Paul, D. Mukherjee, Mitosis Detection for Invasive Breast Cancer Grading in Histopathological Images, IEEE Transactions on Image
Processing. 24 (2015) 4041-4054.
23.
Authors:
Mohd Zulfaezal Che Azemin, Mohd Afiq Ariffin Azman, Muhammad Hafizuddin Bahrain,
Mohd Izzuddin Mohd Tamrin
Paper Title: 3D-Printed Model Enhances Learning Experience in Optometric Education
Abstract: Three-dimensional (3D) printed model becomes more popular as the flexibility to print 3D 363-367
model has become cheaper to produce. This research sought to assess the effect of using 3D printed model as
a tool in teaching on optometry students. Another primary focus of this research was to assess the
confidence level and enjoyment level among the second-year optometry students on traditional lecture
method and compared it with the use of 3D printed model as a teaching aid. Confidence is important as an
optometrist, especially when making the right clinical judgement. Enjoyment is also important as it may
help learning process become effective and fast. A total of 36 second-year optometry students were selected
to participate in this research. The 3D printed model was based on ophthalmoscope that had been printed
using PRUSA 3000 3D printer. The students were divided into two groups – one group was exposed to the
lecture only and another group was exposed to 3D model in addition to the traditional lecture. Two sets of
questionnaires were given to assess their confidence and enjoyment level before and after each learning
session. The confidence level assessment and the enjoyment level comprise of three statements on each topic
answered by the students using 5-point Likert scale. The results showed that there are significance
differences between lecture only group and lecture with 3D-printed model group especially as a
visualization tool (P = 0.001) and it is considered to be enjoyable and stimulating (P = 0.008). This study
demonstrates that the usage of 3D printed model as teaching aid does affect the confidence level and
enjoyment level of students.
Index Terms: 3D-Printed Model, Biomedical Engineering.
References:
119. M. N. Lee. (2002). Teacher education in Malaysia: Current issues and future prospects. Teacher education: dilemmas and
prospects. 8(57).
120. M. N. Van den Berg, and W. H. A. Hofman, (2005). Student success in university education: A multi-measurement study of the impact of student and faculty factors on study progress. Higher education.50(3), 413-446.
121. J. C. Bernhard, S. Isotani, T. Matsugasumi, V. Duddalwar, A. J. Hung, E. Suer, and B. Hu. (2016). Personalized 3D printed model
of kidney and tumor anatomy: a useful tool for patient education. World journal of urology. 34(3), 337-345. 122. L. Kiraly, M. Tofeig, N. K. Jha, and H. Talo. (2015). Three-dimensional printed prototypes refine the anatomy of post-modified
Norwood-1 complex aortic arch obstruction and allow presurgical simulation of the repair. Interactive cardiovascular and thoracic
surgery. 22(2), 238-240. 123. V. Waran, V. Narayanan, R. Karuppiah, D. Pancharatnam, H. Chandran, R. Raman, T. Z. Aziz. (2014). Injecting Realism in
Surgical Training—Initial Simulation Experience With Custom 3D Models. Journal of Surgical Education. 71(2), 193-197.
124. K. H. A. Lim, Z. Y. Loo, S. J. Goldie, , J. W. Adams, and P. G. McMenamin. (2016). Use of 3D printed models in medical education: A randomized control trial comparing 3D prints versus cadaveric materials for learning external cardiac anatomy. Anatomical
sciences education. 9(3), 213-221.
125. M. K. Oreilly, S. Reese, T. Herlihy, T. Geoghegan, C. P. Cantwell, R. N. Feeney, and J. F. Jones. (2015). Fabrication and assessment of 3D printed anatomical models of the lower limb for anatomical teaching and femoral vessel access training in
medicine. Anatomical Sciences Education. 9(1), 71-79.
126. D. Preece, S. B. Williams, R. Lam, and R. Weller (2013). Lets Get Physical: Advantages of a physical model over 3D computer models and textbooks in learning imaging anatomy. Anatomical Sciences Education. 6(4), 216-224.
127. J. Al-Ramahi, H. Luo, R. Fang, A. Chou, J. Jiang, and T. Kille. (2016). Development of an innovative 3D printed rigid
bronchoscopy training model. Annals of Otology, Rhinology & Laryngology. 125(12), 965-969. 128. C. Bengtsson, M. Persson, and P. Willenhag. (2005). Gender and overconfidence. Economics letter. 86(2), 199-203.
129. I. Al-Shara. (2015). Learning and teaching between enjoyment and boredom as realized by the students: A survey from the
educational field. European Scientific Journal, ESJ. 11(19).
24.
Authors: Mohd Erwan Sanik, Ahmad Hakimi Mat Nor, Nor Baizura Hamid
Paper Title: Effectiveness Analysis of Transverse Rumble Strip Using the Image Processing Technique
Abstract: Transverse rumble strip is a traffic calming device which usually installed at the vicinity of schools and
accident prone spots. The Malaysia Public Work Department has introduced the latest high performance
thermoplastic rumble strips as an intervention along blackspot stretches in Malaysia. This study was carried out to
investigate the effectiveness of the new rumble strips installed at SMK Sri Lalang in Kluang, Johor, with respect to
the operational speed variation immediately upstream and downstream of the rumble strips area. Operational speed
data acquisition was carried out by using the unmanned aerial vehicle or drone and image processing technique.
Drone can be used as an alternative to other image recording devices such as telescopic mast. The presence of a
drone is often unnoticed by drivers thus giving the advantage of obtaining naturalistic data. The footages from
drone were analysed using the image processing technique to ensure every vehicles were taken into account,
compare to handheld device such as speed laser gun that can only detect speed of selected vehicles. The
operational speeds were analyzed to obtain parameters namely pace, median, and 85th percentiles speed. The
results proved that the new rumble strips succeed to reduce speed of vehicles from 7 to 13 kilometer per hour,
which are 7 to 18 percent from the initial speed, respectively.
Index Terms: High Performance Thermoplastic, Image Processing, transverse rumble strips, Unmanned Aerial
Vehicle
References:
1. Malaysian Institute of Road Safety Research (MIROS), MRR 05/2012: MIROS Crash Investigation and Reconstruction Annual
363-367
Statistical Report 2007–2010. (2012).
2. Jabatan Keselamatan Jalan Raya (JKJR), Statistik Keselamatan Jalan Raya Edisi 2016. (2017) pp. 9.
3. Ministry of Transport Malaysia (MOT), Road Safety Plan 2014-2020. (2004).
4. The International Road Assessment Programme (iRAP), Treatment – Rumble Strips. (2010), Accessed on 29 October 2017. url:
http://toolkit.irap.org/default.asp?page=treatment&id=30
5. Barmpounakis, E.N., Vlahogianni, E.I., Golias, J.C., Unmanned Aerial Aircraft Systems for Transportation Engineering: Current
practice and future challenges, International Journal of Transportation Science and Technology (2016), Vol. 5, pp. 111–122.
6. Mirchandani, P., Hickman, M., Angel, A., Chandnani, D., Hickman, M., Application of aerial video for traffic flow monitoring and
management. ASCE 7th Int. Conf. Appl. Adv. Technol. Transp. (2002).
7. Salvo, G., Caruso, L., Scordo, A., Urban traffic analysis through an UAV. Proc. – Soc. Behav. Sci. 111, (2014). pp 1083–1091.
8. Salvo, G., Caruso, L., Scordo, A., Guido, G., Comparison between vehicle speed profiles acquired by differential GPS and UAV,
17th Meet. EURO Work. Gr. Transp. EWGT (2014).
9. Xin, Z., Yun-tao, C., Li, L., Jia-ning, G. Algorithm of Vehicle Speed Detection in Unmanned Aerial Vehicle Videos. In:
Transportation Research Board 93rd Annual Meeting Compendium of Papers. Washington, D.C. (2014).
10. Braut, V., Culjak, M., Vukotic, V., Segvic, S., Sevrovic, M., Gold, H. Estimating OD matrices at intersections in airborne video – a
pilot study. MIPRO, (2012). Proc. 35th Int. Conv., pp. 977–982.
11. Coifman, B., McCord, M., Mishalani, R.G.R. Traffic flow data extracted from imagery collected using a micro unmanned aerial
vehicle. Appl. Adv. Technol. Transp. Ninth Int. Conf., pp. 298–303. doi:10.1061/40799(213)47. (2006).
12. Gao, H., Kong, S.L., Zhou, S., Lv, F., Chen, Q. Automatic Extraction of Multi-Vehicle Trajectory Based on Traffic Videotaping
from Quadcopter Model. Appl. Mech. Mater. 552, 232–239. http://dx.doi.org/10.4028/www.scientific.net/AMM.552.232. (2014).
13. Li, Y. Fuzzy Image Segmentation from High Resolution UAV Aerial, ISPRS08. p. B3b 529. (2008).
14. Puri, A., Valavanis, K., Kontitsis, M. Statistical profile generation for traffic monitoring using real-time UAV based video data.
Mediterr. Conf. Control Autom. 1–6. http://dx.doi.org/10.1109/MED.2007.4433658. (2007).
15. Reinartz, P., Lachaise, M., Schmeer, E., Krauss, T., Runge, H. Traffic Monitoring with Serial Images from Airborne Cameras.
ISPRS J. Photogramm. Remote Sens. 61, 149–158. http://dx.doi.org/10.1016/j.isprsjprs.2006.09.009. (2006).
16. Salvo, G., Caruso, L., Scordo, A. Gap acceptance analysis in an urban intersection through a video acquired by an UAV 199–205.
(2013).
17. Wang, H., Duan, S., Zheng, Y., Liu, S., Dong, C., Li, Y.. Using model aircraft to collect vehicle trajectory data. Transp. Res. Board
93rd Annu. Meet. Compend. Pap. (2014).
18. Zhang, L., Peng, Z., Sun, D.D.J., Liu, X. A UAV-based automatic traffic incident detection system for low volume roads. Transp.
Res. Board 92nd Annu. Meet. pp. 1–19. (2013).
19. Filippo, G.P. & Marinella, G., Modeling Operating Speed of Two Lane Rural Roads. Procedia - Social and Behavioral Sciences 53
(2012) pp. 664 – 671.
20. Center for Transportation Research and Education, Handbook of Simplified Practice for Traffic Studies: Spot Speed Study. (2009).
21. Manual on Uniform Traffic Control Devices for Streets and Highways (Millennium Edition), Federal Highway Administration, U.S.
Department of Transportation, Washington, DC (2000).
22. American Association of State Highway and Transportation Officials. A Policy on Geometric Design of Highways and Streets
(2001).
23. Transportation Research Board (TRB), NCHRP Report 504: Design Speed, Operating Speed, and Posted Speed Practices. (2003).
24. Tyrell D.T., Mark W.B., and Paul J.C., Speed Changes Due to Transverse Rumble Strips on Approaches to High-Speed Stop-
Controlled Intersections. Transportation Research Record: Journal of the Transportation Research Board, No. 1973, Transportation Research
Board of the National Academies, Washington, D.C., 2006, pp. 1–9.
25. Dudek, C. L., R. D. Huchingson, F. T. Creasey, and O. J. Pendleton. Field Studies of Temporary Pavement Markings at Overlay
Project Work Zones on Two-Lane, Two-Way Rural Highways. In Transportation Research Record 1160, TRB, National Research Council,
Washington, D.C., 1988, pp. 22–34.
26. Paul, J.C, Jeff, D.M., Effectiveness of Rumble Strips on Texas Highways: First Year Report. Texas Transportation Institute. (2003).
25.
Authors:
Siti Nooraiin Mohd Razali, Masiri Kaamin, Siti Noraiza Ab Razak, Nor Baizura Hamid, Nor Farah
Atiqah Ahmad, Mardiha Mokhtar, Norhayati Ngadiman, Suhaila Sahat
Paper Title: APPLICATION OF UAV AND CSP1 MATRIX FOR BUILDING INSPECTION AT MUZIUM
NEGERI, SEREMBAN
Abstract: Building inspection is really essential to determine the condition of a building and one of the key
components of building maintenance. To determine the defect, visual inspection will be conducted as early
phase of building inspection. Usually, binocular and camera will be used as main devices in visual
inspection. This research aims to study Museum Negeri defects at exterior structure especially the roof
structure by using the Unmanned Aerial Vehicles (UAV) or as known as Drone. The data collected will be
analyzed using Condition Survey Protocol 1 Matrix to obtain an overall rating of the building’s condition.
The process involved in this study are site visit, planning and preparation before the flight, data collection
using UAV, image processing and analyzing data from image. The results of analysis, a total numbers of 53
363-367
locations have been identified and documented suffer from defects or faults such as cracking, corrosion and
wall perforated. All defects information obtained using UAV visual inspection can help the museum
maintenance to do maintenance work. The overall condition of this building structure is 5, where the overall
performance of the building is fair.
Index Terms: Building inspection, drone, CSP1.
References:
1. A. A (2009). Mapping using small format digital imagery and unmanned aerial vehicle platform.
2. A. G. Ahmad (2004). Understanding common building defects: the dilapidation survey report.
3. Z. Sharuddin (2016) Understanding common building defects: the dilapidation survey report.
4. L. M. N. Sembilan, Sejarah Penubuhan Muzium Negeri.
5. A. G. Ahmad (2006). Rangka Kerja Pemuliharaan Bangunan Warisan di Malaysia.
6. A. K. Parida (2006). Maintenance Performance Measurement (MPM): Issues and Challenges. J. Qual. Maint. Eng.
12(3): 239-251.
7. A. &. A. A. A. R. Olanweraju (2015). Building maintenance processes, principles, procedures, practices and
strategies. In Building Maintenance Processes and Practices(pp. 79-129).
8. Yacob (2005). Maintenance Management System through Strategic Planning for Public School in Malaysia, in
Construction Management.
9. J. R. M. &. H. C. Unger(2014). UAV-based photogrammetry: monitoring of a building zone. International Archives
of the Photogrammetry, Remote Sensing and Spatial Information Sciences-ISPRS Archives 40 (2014), 40(5), 601-606.
10. N. A. A. &. Z. O. Darwin(2014). The potential of unmanned aerial vehicle for large scale mapping of coastal area. In
IOP Conference Series: Earth and Environmental Science (Vol. 18, No. 1, p. 012031). IOP Publishing.
11. Masiri Kaamin, Nurunnazifah Abd. Aziz, Saifullizan Mohd Bukari, Zaurin Ali, Norhafiza Samion, Aslila Abd Kadir,
Norhayati Ngadiman. (2016). KAEDAH PEMERIKSAAN BANGUNAN TINGGI MENGGUNAKAN PESAWAT TANPA
PEMANDU (UAV). Jurnal Teknologi. 78: 5–10; 83–89
12. A. T. A. K. K. Che Ani (2011). The Development of a Condition Survey Protocol Matrix. Structural Survey, 29(1),
35-45.
13. M. Mokhtar, M. Kaamin, N. Ngadiman, & N. B. Hamd (2018). The application of UAV and CSP1 matrix for
building inspection at mosques in area of Pagoh – Muar, Johor. AIP Conference Proceedings, Vol. 2016.
26.
Authors: Rakesh Kumar Sharma, Anupam Sharma
Paper Title: Forecasting Monthly Gold Prices Using ARIMA Model: Evidence from Indian Gold Market
Abstract: In this paper an attempt has been made to give an overview of the Indian gold market so as to
develop a model enabling the forecast of gold prices in India. One troy ounce is equal to 31.103 grams. The
monthly sample data of gold price (in INR per troy ounce) is taken from December 1997 to December
2017.The entire data has been divided into two segments for estimation and validation sample and to find
out the efficiency and accuracy of forecasting models. Since the gold price data series have shown much
deviation after March 2006 the first segment of the data is taken from the time period of December 1997 to
March 2006 and second segment from April 2006 to December 2017.Due to a larger value and a huge time
span of the sample data, the natural logarithm of gold price has been taken to conduct the study and build
an effective model to forecast future gold prices. The unit root tests of Augmented Dickey Fuller‖ and
Philips Perron have been used to test the gold price series as stationary or non-stationary. It is observed that
series are stationary at first difference in both the methods. At first difference the ACFs and PACFs were
pattern less and statistically not significant. Box-Jenkins’s Autoregressive Integrated Moving Average of
Box-Jenkins methodology has been used for developing a forecasting model of gold price in India. Different
models of ARIMA have been used to obtain best suitable model for forecasting using Eviews software 10 for
both time periods i.e., December 1997 to March 2006 & April 2006 to December 2017
Keywords : AIC- Akaike Information Criteria, SIC- Schwarz Information criteria, Correglram
References
1. Agnon, Y., Golan, A., and Shearer, M., Nonparametric, Nonlinear, Short-Term Forecasting: Theory and
Evidence for Nonlinearities in the Commodity Markets, Econ. Lett. 65 ((1999), pp. 293-299.
2. Baker, S.A. and Van Tassel, R.C., Forecasting the Price of Gold: A Fundamentalist Approach, Atla Econ
Jour. 13 (1985), pp. 43-51.
3. Bankbazaar.com (2011,October25). Investing in gold? Retrieved from the website:
http://www.rediff.com/business/slide-show/slide-show-1-perfin-investing-in-gold-must-read-
this/20111025.htm
4. Bankbazaar.com (2013, May 13). Investing in gold? 7 facts you should know. Retrieved from the NDTV
Profit website: http://profit.ndtv.com/news/your-money/article-investing-in-gold-7-facts-you-should-
know-317318
5. Batchelor, R., Gulley, D., (1995). Jewellery demand and the price of gold. Resources Policy, Vol. 21 No.
1, pp. 37–42.
6. Baur, D. G. and Glover, K. J. (2014). Heterogeneous expectations in the gold market: Specification and
363-367
estimation. Journal of Economic Dynamics and Control, Vol. 40, pp. 116-133.
7. Bera, A. & Jarque, C. (1982).Model specification tests: A simultaneous approach. Journal of
Econometrics, Vol. 20, pp.59–82.
8. Blose, L.E., (1996). Gold price risk and the returns on gold mutual funds. Journal of Economics and
Business, Vol. 48 No. 5, pp. 499–513.
9. Blose, L.E., Shieh, J.C.P., (1995). The impact of gold price on the value of gold mining stock. Review of
Financial Economics, Vol. 4 No.2, pp 125–39.
10. Bowman, K. & Shenton, L.R. (1975). Omnibus contours for departures from normality based on 1b and 2
b. Biometrika, Vol. 62, pp. 243–50.
11. Kennedy Peter, (2008). A Guide to Econometrics' 6th Edition, Blackwell Publishing USA.
12. Levin, E.J. and Wright, R.E. (2006). Short-run and Long-run Determinants of the Price of Gold. World
Gold Council Report, Research Study No. 32, Cass Business School, London.
13. Malhotra, K. Neresh and Dash, Satyabhushab (2009). Marketing Research: An Applied Orientation,
PEARSON Education.
14. Nathan Narendra (2013). Gold in 2014: No longer a safe investment. Retrieved from the Economic Times
website:http://articles.economictimes.indiatimes.com/2013-12-30/news/45711297_1_gold-imports-paper-
gold-gold-prices, ET Bureau Dec 30, 2013, 10.45AM IST.
15. Ntungo C. and Boyd M. (1998). Commodity Futures Trading Performance Using Neural Network Models
versus ARMA Models. The Journal of Futures Markets, Vol.18, 965-83.
16. Parisi, F.; Parisi, A. and Guerrero J.L. (2003). Rolling and Recursive Neural Network Models: The Gold
Price. Working Paper, Universidad de Chile.
17. Peter C. B. Phillips and Pierre Perron (1988). Testing for a Unit Root in Time Series Regression.
Biometrika, Vol. 75, No. 2, pp. 335-46
18. Ranson, D.; (2005). Inflation Protection: Why Gold Works Better Than Linkers. World Gold Council
Report, Wainwright H.C., World Gold Council Publications, London.
19. Rockerbie, D.W., (1999). Gold prices and gold production: evidence for South Africa. Resources Policy,
Vol. 25 No. 2, 69–76.
20. Selvanathan, S., Selvanathan, E.A., (1999). The effect of the price of gold on its production: a time-series
analysis. Resources Policy, Vol. 25 No.4, pp. 265–275.
21. Shafiee Shahriar & Topal Erkan (2010). An overview of global gold market and gold price forecasting.
Resources Policy, Vol. 35, 178–89
27.
Authors: Zaynalov N.R, Narzullaev U.Kh, Muhamadiev A.N, Bekmurodov U.B
Paper Title: FEATURES OF USING INVISIBLE SIGNS IN THE WORD ENVIRONMENT FOR HIDING DATA
Abstract. Considered digital steganography is the direction of classical steganography based on concealing or
introducing additional information into digital objects, while causing some distortions of these objects. At the same
time, images, audio, video, network packets, etc. can be used as objects or containers. Recently, there has been a
lot of publication in the field of information hiding in a text container. To embed a secret, steganographic methods
rely on redundant information about the used covering media or properties that the human perception system
cannot distinguish. Since text documents are widely used in organizations, using a text document as a storage
medium may be the preferred choice in such an environment. On the other hand, the choice of using a text
document as a storage medium is the most difficult, since it contains less redundant information. In this article, we
present textual steganography using invisible characters in a word processor.
Keywords: Cryptography, Information hiding, Steganography, Text steganography
[1] Changder S, Ghosh D, Debnath N.C. (2010). Linguistic approach for text steganography through Indian text.
In: 2010 2nd international conference on computer technology and development, pp. 318-322
[2] Ross J.Anderson, Fabien A.P. Petitcolas. (1998). On the limits of steganography. IEEE J Sel Areas Commun
16(4):474-481
[3] Fabien A.P. Petitcolas, Ross J.Anderson, Markus G.Kuhn. (1999). Information hiding—a survey. In: Proc
IEEE 87(7):1062-1078
[4] Por LY, Ang TF, Delina B (2008) WhiteSteg-a new scheme in information hiding using text steganography.
WSEAS Trans Comput 7(6):735-745
[5] Wikipedia, The Free Encyclopedia / http://wikipedia.org/
[6] M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2006) A new approach to persian/arabic text
steganography. In: 5th IEEE/ACIS international conference on computer and information science and 1st
IEEE/ACIS international workshop on component-based software engineering, software architecture and reuse, pp
310-315
[7] R. Bala Krishnan, Prasanth Kumar Thandra, M. Sai Baba. An overview of text steganography. 4th International
Conference on Signal Processing, Communications and Networking (ICSCN -2017), March 16 - 18, 2017,
Chennai, INDIA
363-367
[8] Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 3(3&4):313-336
[9] M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2008) A new dynonym text steganography. In:
International conference on intelligent information hiding and multimedia signal processing, pp 1524-1526
[10]. Brassil JT, Low SH, Maxemchuk NF, O’Gorman L (1995) Document marking and identifi-cation using
both line and word shifting. In: Proceedings of INFOCOM ’95 proceedings of the fourteenth annual joint
conference of the IEEE computer and communication societies, pp 853-860
[11] Cummins J, Diskin P, Lau S, Parlett R (2004) Steganography and digital watermarking. School of
Computer Science, pp 1-24
[12] E. A. Blinova. Steganographic method based on the line-shift coding method on non-displayed symbols of the
electronic text document. Belarusian State Technological University. BGTU. № 6 2016, p.166-169
[13] Kabetta H, Dwiandiyanta BY (2011) Suyoto: information hiding in CSS: a secure scheme text steganography
using public key cryptosystem. Int J Cryptogr Inf Secur 1(1):13-22
[14] Simmons G.J. The prisoner`s problem and the subliminal channel, Proc. Workshop on Communications
Security (Crypto`83), 1984, 51-67.
28.
Authors: Norinov M.U.*, Abdukadirov B.A.**, Gofurov M.R.***
Paper Title: APPLICATION OF FOURIER METHODS AND DISCRETE-COSINUS TRANSFORMATION IN
THE PROCESS OF PROCESSING OF TV IMAGES
Abstract
This article describes the Fourier and discrete-cosine transform methods in the processing of TV images. The
methods used in the processing of color and TV images, based on different physical effects, information
processing technologies and hardware. The images obtained using these methods will have their own specifics.
This, in turn, causes a wide variety of approaches both to the assessment of the quality of TV images and to the
processing of such images.
Keywords: Fourier series, Fourier transform, Fourier domain, wavelet transform, fast Fourier transform, discrete
cosine transform.
References:
57. Berezkin E.F. Fundamentals of information theory and coding: Tutorial. - M .: NIIUU MEPhI, 2010. - 312 page.
58. Gaiduk A.R. Continuous and discrete dynamical systems. –2nd ed. Pererab.-M .: Educational-methodical and
publishing center "Educational literature". 2004.- 252 page.
59. Egorov, V.A. Synthesis of an arrhythmic continuous-discrete controller for a linear object [Text] // Samar Bulletin.
state tech. un-that. - Ser. Technical science. - № 3 (31). - Samara State Technical University: 2011. - pp.44-51 .;
60. Zigler K. Methods of designing software systems. –M .: Mir, 1995
61. Kirillov S.N., Pospelov A.V. Discrete signals in radio systems. Tutorial. Ryazan. RGRTA, 2003. 60page.
62. Kirillov, S.N., Vinogradov, OL, Lotsmanov, A.A. Algorithms for the adaptation of digital filters in radio devices.
Tutorial. Ryazan. RGRTA, 2004. 80s.
63. Kobern A. Modern methods of describing the functional requirements for systems: Per. from English-M .: LORI,
2002
64. Lande D.V. Basics of information flow integration / D.V. Lande - K: Engineering, 2006. - 240 seconds.
65. Fatrell, R., et al. Software Project Management: Achieving Optimal Quality with Minimal Cost / R. Fatrell, D.
Schafer, L. Schafer: Translation from English. - M .: Williams, 2003.
66. Maltsev A.I. Algorithms and recursive functions. M. "Science", 1985.
363-367
29.
Authors: 1L. Chandana, 2P. Radhika
Paper Title: A Proficient Technique For Extraction The High Average-Utility Itemsets With Enhanced Bounds
From Transactional Database
Abstract: HUIM has turned into a well known knowledge extraction, as it can uncover designs that have
a highutility, conversely to continuous example extraction, which spotlights on finding incessant examples.
High average-utility itemset extraction (HAUIM) is different with HUIM gives an elective quantify, called
the average utility, to choose designs by considering their utilities and lengths. In the most recent decades, a
few calculations have been created to mine HAUIs. However majorly it takes lot of memory and time, since
they for the most part use the average-utility upper-bound model to miscalculate the average utilities of
itemsets. To enhance HAUIM here proposes four average utility upper bounds, in view of structure
database portrayal, and three proficient prune techniques. Furthermore, a novel conventional system for
looking at average-utility upper-bounds is displayed. In view of these theoretical outcomes, a proficient
calculation named dHAUIM is presented for extraction the total arrangement of HAUIs. dHAUIM speaks
to the inquiry space and rapidly process upper-bounds utilizing a novel IDUL structure. Broad
investigations demonstrate that dHAUIM beats three algorithms for extraction HAUIs as far as runtime on
both reality and artificial databases.
Keywords : Pattern extraction, utility extraction, high average-utility
References: [1] Unil Yun, John J, Leggett, “WFIM: Weighted Frequent Itemset Extraction with a weight range and a minimum
weight” in SIAM International Conference on Data Extraction, 2005
[2] Unil Yun, “Efficient extraction of weighted interesting patterns with a strong weight and/or support affinity,” in
information science, volume 177, issue 17, 1 September 2007
[3] Chowdhury Farhan Ahmed , Syed Khairuzzaman Tanbeer , Byeong-Soo Jeong , Young-Koo Lee, “Efficient Tree
Structures for Highutility Pattern Extraction in Incremental
Databases,” in IEEE Transactions on Knowledge and Data Engineering ,volume 21, No (12) , January 2010
[4] Tzung-PeiHong , Cho-HanLee , Shyue-LiangWang, “Effective utility extraction with the measure of average utility ”
in Expert Systems with Applications Volume 38, Issue 7, July 2011.
[5] Mengchi Liu, Junfeng Qu, “Extraction Highutility Itemsets without Candidate Generation”, in ACM international
conference on Information and knowledge management, October 2012
[6] Guo-Cheng Lan, Tzung-Pei Hong, Hong Yu Lee, Shyue-Liang Wang, Chun-Wei Tsai, “Enhancing the Efficiency in
Extraction Weighted Frequent Itemsets”, in Systems Man and Cybernetics (SMC) IEEE International Conference, 2013.
[7] R. Agrawal, T. Imielinksi and A. Swami, "Extraction Association Rules between Sets of Items in Large Database," in
The ACM SIGMOD International Conference on Management of Data, 1993.
[8] V. Torres, K. Chiu and M. Vasudeva, "WFIM: weighted frequent itemset extraction with a weight range and a
minimum weight," in The 2005 SIAM International Conference on Data Extraction, 2005.
[9] U. Yun, "Efficient extraction of weighted interesting patterns
30.
Authors: S.Neelima*, R.Brindha**
Paper Title: A Low Power, Area efficient implementation of AES algorithm
Abstract: Encryption is a procedure of convert readable information into encoded appearance so that it
can’t be interpreted by the intruder. Paper presents the FPGA implementation of a low power,
neighborhood efficient AES algorithm for encrypting data. From the results it has been experimental that
the enhanced technique has reduced the power consumption and area compared to the existing methods.
The implementation is done in 90 nm and 65 nm CMOS technology using Quartus for Cyclone II and
Cyclone III.
Keywords : Advanced Encryption Standard, Security, FPGA implementation, Low power, and area efficiency.
References: [2] Raaed K. Ibraheem, Roula AJ. Kadhim and Ali SH. Alkhalid, ‘Anti-Collision Enhancement of a SHA-1 Digest Using AES
Encryption By LABVIEW’, World Congress on Information Technology and Computer Application, 2015. [3] Benjamin Buhrow, Karl Fritz, Barry Gilbert and Erik Daniel, ‘A Highly Parallel AES-GCM Core for Authenticated Encryption of
400 Gb/s Network Protocols’, International Conference on ReConFigurable Computing and FPGAs, Pp. 1 – 7, 2015.
[4] Neha Dalakoti , Nidhi Gaury and Anu Mehra z, ‘Hardware Efficient AES for Image Processing with High Throughput’, 1st International Conference on Next Generation Computing Technologies (NGCT), Pp. 932 – 935, 2015.
[5] Pournima U. Deshpande and Smita A. Bhosale, ‘AES Encryption Engines of Many Core Processor Arrays on FPGA by Using Parallel, Pipeline andSequential Technique’, International Conference on Energy Systems and Applications (ICESA), Pp. 75-80,
2015.
[6] Qiang Liu, Zhenyu Xu and Ye Yuan, ‘High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion’, IET Computers & Digital Techniques, Vol. 9, No. 3, Pp. 175–184, 2015.
[7] Anane Nadjia and Anane Mohamed, ‘AES IP for Hybrid Cryptosystem RSA-AES’, 12th International Multi-Conference on Systems,
Signals & Devices, Pp. 1-6, 2015.
[8] Ankit Dhananjay Khedlekar, Tejas Mahadev Shelke, Shraddha Walhekar and Nikhita Nerkar, ‘Smart Secure System Using Parallel
AES’, International Journal of Advance Research And Innovative Ideas In Education, Vol. 3, No. 3, 2017, Pp. 1517-1522.
[9] Ashwini R. Tonde and Akshay P. Dhande, ‘Implementation of Advanced Encryption Standard (AES) Algorithm Based on FPGA’, International Journal of Current Engineering and Technology, Vol.4, No.2, Pp. 1048-1050, April 2014.
[10] Yang.J, Ding.J, Li.N and Guo.Y,’FPGA-based design and implementation of reduced AES algorithm’, IEEE Inter.Conf. Chal Envir
Sci Com Engin(CESCE).,Vol.02, No.5-6, Pp.67 70, June 2010. [11]
[12] Mateur.K, Alareqi.M, and Elgouri.R, ‘Design and hardware implementation of AES algorithm on FPGA ‘, WITS, The international
conference on Wireless Technologies embedded and intelligent systems ENSA of kenitra, April 2016. [13] Prachi bhalero v et el, ‘Hardware implementation of cryptosystem by AES algorithm using FPGA’ journal of Computer Science and
information Technology IJCSMC, vol 6, issue 5, may 2017.
[14] Pravin Ghewari B, Jayamaka Patil K and Amit Chougule B ‘Efficient hardware design and implementation of AES cryptosystem’, International Journal of Engineering Science and Technology, Vol. 2(3), 2010.
[15] Shihai zhu ‘Hardware implementation of AES encryption and decryption system based on FPGA’ The open cybernetics & Systemic
journal, 2015.
363-367
31.
Authors: Dharmaveer P. Choudhari 1 Dr. S. S. Dorle 2
Paper Title: Hybridizing network attack detection and prevention via integrated DADCQ Protocol
Abstract: Distribution adaptive distance with channel quality or DADCQ is a protocol used for checking
the fitness of a node for communication by utilizing node specific parameters in a distributed environment.
The major purpose of the protocol is to check if the node should be given preference in re-broadcasting
when a lot of nodes are trying the communicate in the network, DADCQ does this by accessing the node
363-367
distribution, channel quality and distance from the target nodes. In this paper, we modify the DADCQ
protocol in order to detect and remove abnormalities like distributed denial of service (DDOS) and eves-
dropping attacks in a distributed network. The attacked network is evaluated for pre and post application
of the modified protocol and the Quality of Service (QoS) parameters are evaluated. It is observed that the
proposed protocol improves the QoS and is successful in removal of the aforementioned attacks from the
network.
Keywords : DADCQ, nodes, network attack, DDOS, eves-dropping, QoS
References:
1. Changder S, Ghosh D, Debnath N.C. (2010). Linguistic approach for text steganography through Indian text. In: 2010 2nd
international conference on computer technology and development, pp. 318-322
2. Ross J.Anderson, Fabien A.P. Petitcolas. (1998). On the limits of steganography. IEEE J Sel Areas Commun 16(4):474-481
3. Fabien A.P. Petitcolas, Ross J.Anderson, Markus G.Kuhn. (1999). Information hiding—a survey. In: Proc IEEE 87(7):1062-1078
4. Por LY, Ang TF, Delina B (2008) WhiteSteg-a new scheme in information hiding using text steganography. WSEAS Trans Comput
7(6):735-745
5. Wikipedia, The Free Encyclopedia / http://wikipedia.org/
6. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2006) A new approach to persian/arabic text steganography. In: 5th
IEEE/ACIS international conference on computer and information science and 1st IEEE/ACIS international workshop on component-based
software engineering, software architecture and reuse, pp 310-315
7. R. Bala Krishnan, Prasanth Kumar Thandra, M. Sai Baba. An overview of text steganography. 4th International Conference on
Signal Processing, Communications and Networking (ICSCN -2017), March 16 - 18, 2017, Chennai, INDIA
8. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 3(3&4):313-336
9. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza (2008) A new dynonym text steganography. In: International conference
on intelligent information hiding and multimedia signal processing, pp 1524-1526
10. 10.. Brassil JT, Low SH, Maxemchuk NF, O’Gorman L (1995) Document marking and identifi-cation using both line and
word shifting. In: Proceedings of INFOCOM ’95 proceedings of the fourteenth annual joint conference of the IEEE computer and
communication societies, pp 853-860
11. Cummins J, Diskin P, Lau S, Parlett R (2004) Steganography and digital watermarking. School of Computer Science, pp 1-24
12. E. A. Blinova. Steganographic method based on the line-shift coding method on non-displayed symbols of the electronic text
document. Belarusian State Technological University. BGTU. № 6 2016, p.166-169
13. Kabetta H, Dwiandiyanta BY (2011) Suyoto: information hiding in CSS: a secure scheme text steganography using public key
cryptosystem. Int J Cryptogr Inf Secur 1(1):13-22
14. Simmons G.J. The prisoner`s problem and the subliminal channel, Proc. Workshop on Communications Security (Crypto`83), 1984,
51-67.
32.
Authors: Muhamediyeva D.T., Urokov Sh.
Paper Title: APPLICATION OF A MULTI-AGENT SYSTEM FOR RISK ASSESSMENT WITH FUZZY
BACKGROUND INFORMATION
Abstract: The article offers the results of a study of various multi-agent systems on the example of a number of
models and multi-agent implementations for risk assessment with fuzzy initial information. General construction
methods and issues are related to their behavior, criteria for the quality of system performance that highlighted.
The regularities, interrelations between the properties and parameters used when specifying a multi-agent
intelligent system are defined. Developed approaches for processing complexly structured information. Algorithms
for constructing a multi-agent intelligent risk assessment system have been developed.
Keywords. Artificial intelligence, hybrid intellectual systems, neuro-fuzzy models, evolutionary algorithms, multi-
agent intelligent system
References:
1. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT
ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.
2. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT
decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.
3. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.
4. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT
methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -
№2.TT -WITH.TT 121-138.
363-367
5. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.
6. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT
InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.
7. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT
H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.
8. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT
LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.
9. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT
JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.
10. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT
University,TT 2015.41TT (4):TT pp.67-74.
11. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT
Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.
12. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT
ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.
13. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT
decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.
14. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.
15. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT
methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -
№2.TT -WITH.TT 121-138.
16. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.
17. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT
InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.
18. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT
H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.
19. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT
LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.
20. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT
JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.
21. intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.
22. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT
decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.
23. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.
24. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT
methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -
№2.TT -WITH.TT 121-138.
25. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.
26. intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.
27. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT
decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.
28. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.
29. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT
methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -
№2.TT -WITH.TT 121-138.
30. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.
31. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT
InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.
32. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT
H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.
33. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT
LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.
34. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT
JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.
35. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT
University,TT 2015.41TT (4):TT pp.67-74.
36. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT
Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.
37. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT
ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.
38. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT
decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.
39. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.
40. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT
methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -
№2.TT -WITH.TT 121-138.
41. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.
42. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT
InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.
43. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT
H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.
44. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT
LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.
45. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT
JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.
46. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT
University,TT 2015.41TT (4):TT pp.67-74.
47. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT
Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.
48. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT
2008.TT -TT 437TT p.
49. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT
ComputerTT ScienceTT Issues,TT November,TT 2012.
50. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT
University,TT 2012.33TT (1):TT pp.117-123
51. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT
2008.TT -TT 437TT p.
52. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT
ComputerTT ScienceTT Issues,TT November,TT 2012.
53. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT
University,TT 2012.33TT (1):TT pp.117-123
54.
55. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT
InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.
56. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT
H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.
57. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT
LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.
58. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT
JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.
59. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT
University,TT 2015.41TT (4):TT pp.67-74.
60. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT
Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.
61. R.A.TT Aliev,TT R.R.TT AlievTT TheTT theoryTT ofTT intelligentTT systemsTT andTT itsTT application.TT -TT Baku,TT
ChashyoglyTT PublishingTT House,TT 2001.TT -720TT p.
62. Rear.TT L.A.TT TheTT conceptTT ofTT aTT linguisticTT variableTT andTT itsTT applicationTT toTT makingTT approximateTT
decisions,TT trans.TT fromTT theTT English.TT -MTT .:TT Mir,TT 1976.TT -165с.
63. YermolievYu.M.TT MethodsTT ofTT stochasticTT programming.TT -MTT .:TT Science,TT 1976.TT -240TT p.
64. Mikhalevich,TT VS,TT Knopov,TT PS,TT Golodnikov,TT ANTT MathematicalTT modelsTT andTT riskTT assessmentTT
methodsTT forTT environmentallyTT hazardousTT industriesTT //TT CyberneticsTT andTT systemsTT analysis.TT 1994.TT -
№2.TT -WITH.TT 121-138.
65. NedosekinTT A.O.TT Fuzzy-multipleTT riskTT analysisTT ofTT stockTT investments.TT SPb:TT Sesame.TT 2002.TT -181TT p.
66. ZadehTT L.TT TheTT InformationTT principleTT //TT InTT Proc.TT theTT 15thTT IEEETT InternationalTT ConferenceTT onTT
InformationTT ReuseTT andTT Integration,TT SanTT Francisco,TT CA,TT USA;TT AugustTT 13-15,TT 2014.
67. BordiniTT RafaelTT H.TT Multi-AgentTT Programming:TT Languages,TT PlatformsTT andTT ApplicationsTT /TT RafaelTT
H.TT Bordini,TT MehdiTT Dastani,TT JurgenTT Dix,TT AmalTT ElTT FallahSeghrouchni.TT -TT Springer,TT 2005.TT -TT 296TT p.
68. HongTT Huang,TT ZhengxiongTT Zhang.TT ResearchTT StatusTT andTT ProspectTT ofTT VehicleTT RoutingTT ProblemTT //TT
LogisticsTT technology,TT 2010.10TT (227):TT pp.21-24.
69. NourossanaTT S,TT ErfaniTT H.TT BeeTT colonyTT system:TT safetyTT andTT discretionTT optimizationTT //TT InternationalTT
JournalTT onTT ArtificialTT IntelligenceTT Tools,TT 2012,21TT (1):TT pp.6-16.
70. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT
University,TT 2015.41TT (4):TT pp.67-74.
71. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT
Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.
72. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT
2008.TT -TT 437TT p.
73. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT
ComputerTT ScienceTT Issues,TT November,TT 2012.
74. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT
University,TT 2012.33TT (1):TT pp.117-123
75. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT
2008.TT -TT 437TT p.
76. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT
ComputerTT ScienceTT Issues,TT November,TT 2012.
77. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT
University,TT 2012.33TT (1):TT pp.117-123
78. HuiLan,TT QinfeiTT He.TT OptimizationTT ofTT theTT RoadTT AccessoryTT //TT JournalTT ofTT DalianTT MaritimeTT
University,TT 2015.41TT (4):TT pp.67-74.
79. LinTT Hong.TT ArchitecturalTT DesignTT ofTT Multi-AgentTT SystemsTT //TT PremierTT ReferenceTT SeriesTT /TT HongTT
Lin.TT -TT IGITT Global,TT 2007.TT -TT 421TT p.
80. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT
2008.TT -TT 437TT p.
81. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT
ComputerTT ScienceTT Issues,TT November,TT 2012.
82. XiaojunTT Bi.TT ImprovedTT ArtificialTT BeeTT ColonyTT AlgorithmTT //TT JournalTT ofTT HarbinTT EngineeringTT
University,TT 2012.33TT (1):TT pp.117-123
83. ShammaTT Jeff.TT CooperativeTT ControlTT ofTT DistributedTT Multi-AgentTT Systems.TT -TT JohnTT WileyTT &TT Sons,TT
2008.TT -TT 437TT p.
84. AlainTT Fougires.TT ATT ModelingTT ApproachTT BasedTT OnTT FuzzyTT AgentsTT //TT InternationalTT JournalTT OfTT
ComputerTT ScienceTT Issues,TT November,TT 2012.
33.
Authors: Pundlik N. Patil1, Dheeraj S. Dehmukh2, Vilas S. Patil3
Paper Title: Analysis of the effect of LPG on the Performance and Frictional Power Loss for SI Engine
Abstract:Due to the depletion of conventional fossil fuels and the energy crises with emission problems
today, research and development have been concentrated on reducing fuel consumption by using different
alternative fuel and reducing a toxic component in combustion products. Liquefied petroleum gas is a
suitable fuel for internal combustion engine since the octane number is also high nearly 109 and therefore
cars, medium and heavy duty vehicles have been using propane or propane/butane mixture successfully.
The engine parameter like engine speed, load, viscosity of oil, cylinder size, brake power, frictional power,
indicated power, are considered for comparative analysis for bi-fuel engine fueled by petrol and liquefied
petroleum gas for the performance of the test engine and frictional losses. The experiment was carried out
with morse procedure to compare the frictional power losses which are always more for liquefied petroleum
gas than the petrol.
Keyword-Frictional power loss, liquefied petroleum gas, morse test, mechanical efficiency,fuel consumption
130. John.T B.T Heywood,T “InternalT CombustionT EngineT Fundamentals”,T TataT McGrawT Hill,T ISBNT -T 13:978T –T 1T -25-900207-6,PPT
725-T 741,T 2011.
131. V.T Ganeshan,T “InternalT combustionT engine”T TataT McGrawT Hill,T 2006.
132. C.T S.T Mistry,T “ComparativeT assessmentT onT performanceT ofT multiT cylinderT engineT usingT CNG,LPGT andT PetrolT asT aT fuel”T SAET
TechnicalT PaperT ,T 2005-01-1056,2005
133. HakanT Bayraktar,T OrhanT DurgunT “T InvestigatingT theT effectT ofT LPGT onT sparkT ignitionT engineT combustionT andT performance,T "T
EnergyT ConversionT andT managementT Vol.T 46,T PP.T 2317-2333,T 2005 134. AliT M.T PourkhesalianT ,T AmirT H.T Shamekhi,T FarhadT Salimi,T "PerformanceT andT emissionT comparisonT andT investigationT ofT
alternativeT fuelsT inT SIT engines,"T SAET International,T ISSN:T 0148-719.1,T 2009.
135. R.T R.T Saraf,T S.T S.T ThipseT ,T P.T K.T Saxsena,T “ComparativeT emissionT analysisT ofT Gasolene/T LPGT automotiveT bi-fuelT engine.”,T
WordT academyT ofT Science,T EngineeringT andT Technology,T Vol.T 3,,T 2009.
136. PundlikT NivruttiT Patil,T DheerajT SheshraoT Deshmukh,T “EffectT ofT LiquefiedT PetroleumT GasT asT aT FuelT onT SparkT IgnitionT EngineT
Performance:T AT CriticalT Review”T PRATIBHA:T INTERNATIONALT JOURNALT OFT SCIENCE,T SPIRITUALITY,T BUSINESST
ANDT TECHNOLOGYT (IJSSBT),T Vol.T 4,T No.T 1.T Nov.T 2015T ISSNT 2277-7261T PP.T 50-55
137. PundliT kT NivruttiT Patil,T DheerajSheshraoT Deshmukh,T JitendraT GulabraoT Patil,T “AT ReviewT onT LiquidT PetroleumT GasT asT aT FuelT
inT SparkT IgnitionT EngineT Application”T InternationalT ConferenceT onT GlobalT TrendsT inT Engineering,T TechnologyT andT
ManagementT (IJETT),T 2016,T ISSN:T 2231-5381T ppT 124-128.2016
138. DhirajT S.Deshmukh,T PundlikT N.T Patil,T Vilas,T S.T Patil,T “DesignT ofT ExperimentalT planT forT effectT ofT liquefiedT petroleumT gasT
analysisT onT frictionT powerT lossT inT sparkT ignitionT engine.”,T InternationalT ConferenceT onT GlobalT TrendsT inT Engineering,T
TechnologyT andT ManagementT (ICGTETM),T 2017,T ISSN:T 2320-2882T ppT 199-205.,2017
139. MassimoT Massi,T “ExperimentalT analysisT onT aT sparkT ignitionT petrolT engineT fuelledT withT LPG(liquefiedT petroleumT gas)”,T EnergyT
41ElsevierT Limited,T ppT 252-260.T 2012 140. VenkataT RameshT Mamilla,T V.T Gopinath,T C.T V.T Subbarao,T “PerformanceandEmissioncharacteristicsof4strokepetrolengineT fueledT
368-374
withT Biogas/L.P.G.T BLENDS”,T IJAET/T /Vol.T II/IssueT -IT PPT 209-213.T MarchT 2011
141. FarazT AT Khan,T SameerT Usmani,OmarT AT Siddiqui,T SalmanT MT Khan,T “PerformanceT evaluationT ofT ambassadorT carT SparkT
IgnitionT engineT UsingT aniline-petrolT blends”,T IJERT,T Vol.T IT issueT 8,ISSNT 2278-0181,pp1-9T OctoberT 2012
142. M.T Gumus,T "EffectsT ofT volumetricT efficiencyT onT theT performanceT andT emissionsT characteristicsT ofT aT dualT fueledT -gasolineT andT
LPGT sparkT ignitionT engine,"T FuelT ProcessingT Technology,Vol.T 92,T PP.T 1862-1867,T MayT 2011.
143. SanjayT DT Bisen,.T YogeshT R.T SupleT ,T "PerformanceT evaluationT ofT fourT strokeT SIT engineT byT directT injectionT ofT LPG,"T Vol.T
1,ISSN:T 2321-8134,10T octoberT 2013
34.
Authors: Avijeet Kumar Biswas, Dr. B. Krishnamurthy
Paper Title: Democratization of the United Nations: What is expected of India and the European Union?
Abstract:The United Nations Security Council reflects a setup of the past rather than the reality of the
present world order. There has been a clamour for the induction of new countries as permanent members
into the council to render it truly universal. But would the expansion of the permanent members naturally
lead to the democratization of the most important international organization?India has been one of the
claimants for permanent membership. Even though India’s demand is legitimate, it must first seek and
secure its place at the global high table and should play a role in helping shape the global order.The
European Union tries to lead and influence the international politics by its example and intends to replicate
its success at the global level. Just like India, the EU is a votary of ‘multilateralism’ and it stands for the UN,
and insists on the need for international laws, agreements, rules and institutions. India is part of EU’s global
security strategy and is considered as one among the ‘key’ strategic partners. EU can thus be the perfect
and reliable partner for India to achieve its foreign and strategic policy goals. India should join hands with
the EU to formulate new global democratic laws and norms, thereby becoming a norm setter on its own
right.
Keywords: Democratization, European Union, India, United Nation
References: 1. Shashi Tharoor, PaxIndica. India and the World of the 21st Century, Penguin Books India, New Delhi, 2012, pp. 366-7.
2. B.Krishnamurthy, “India and the European Union: Common Quest for Multilateralism and a Multipolar World Order”, in Rajendra Jain
(ed.), India and the European Union in a Changing World, Aakar Books, Delhi, 2014, pp. 18-39. 3. Jean-Luc Racine, “Pakistan and the ‘India Syndrome’: Between Kashmir and the Nuclear Predicament”, in Christophe Jaffrelot (ed.),
Pakistan. Nationalism without a Nation?,Zed Books Ltd., New Delhi, 2004, pp. 195-227, at p. 217.
4. Jan Wouters, The EU as a Multilateral Security Actor After Lisbon: Constitutional And Institutional Aspects, Louven Centre, Working Paper 80, 2012, p. 5.
5. ShairiMathur, “Voting for the Veto:India in a Reformed UN”, September 2005, The Foreign Policy Centre, London, 2005, p. 22, available
at www.fpc.org.uk/publications. 6. Sunil Khilnani, “India as a Bridging Power”, Prasenjit K. Basu et al, India as a New Global Leader, The Foreign Policy Centre, London,
2005, p. 8.
7. David M. Malone, Does the Elephant Dance? Contemporary Indian Foreign Policy, Oxford University Press, Oxford, 2011, p. 252. 8. Angela Stephens, Public Opinion in India and America, March 1, 2006. Avaialbe:
http://www.worldpublicopinion.org/pipa/articles/brasiapacificra/176.php?lb=bras&pnt=176&nid=&id=
9. ChinmayaR.Gharekhan, “India and the United Nations”, in Atish Sinha and MadhupMohta (eds.), Indian Foreign Policy: Challenges and Opportunities, Foreign Service Institute/Academic Foundation, New Delhi, 2007, p. 200.
10. Tharoor, n. 1, pp. 419, 427.
11. Sunil Khilnani et al.,Nonalignment 2.0. A Foreign and Strategic Policy for India in the TwentyFirst Century, Centre for Policy Research, New Delhi, 2012, pp. 7-8, 69-70.
12. B.Krishnamurthy and S.Jeeva,“European Union as a Global Actor: In Perception and Action”, in Jayaraj Amin (ed.), European Union in
Changing International Order, Kaveri Books, New Delhi, 2013, pp.3-32.
13. Álvaro de Vasconcelos, ‘Multilateralising’ multipolarity, in Giovanni and Alvaro de Vasconcelos (eds.), Partnerships for Effective
Multilateralism – EU Relations with Brazil, China, India and Russia, Chaillot Paper, No. 109, May 2008.
14. Charlotte Bretherton and John Vogler, The European Union as a Global Actor, Routledge, London, 2006, Second Edition,p.218. 15. Secure Europe in a Better World”, European Security Strategy (Brussels, December 12, 2003). Available:
www.consilium.europa.eu/uedocs/cmsUpload/78367.pdf
16. Desmond Dinan, Ever Closer Union—An Introduction to European Integration, Palgrave Macmillan, 2005, p. 604. 17. Vasconcelos, n. 8, p. 30.
18. Ibid., pp. 25-6.
19. “Developing Europe’s External Policy in the Age of Globalization” (Speech by Chris Patten, the then European Commissioner for External Relations on April 4, 2002). Available: http://europe.eu.int/comm/external_relationss/nfewss/patten/sp02_134.htm (14-06-02)
20. Stephan Keukeleire and Jennifer MacNaughtan,The Foreign Policy of the European Union, Palgrave, Macmillan, London and New York,
2008, p. 59.
363-367
35.
Authors:
Maxim A. Velichko, Lyudmila V. Krasovskaya, Ivan S. Starovoytov, Irina А. Starovoytova, Nataliya A.
Korenkova, Irina N. Galtseva
Paper Title: The Development of Radio and 3G Based Telemetry System for the Remote Gas Accounting and
Control Nodes
Abstract: In this article we have described the use of vortex and recently developed ultrasonic flowmeters
with high dynamic range of 1 to 1500 for industrial applications. Its software and the software of
corresponding computing device is able to avoid gas leakage, to minimize energy consumption and to save
human resources while maintaining metrological data. Described is the low power consumption that makes
it possible to use this ultrasonic flowmeter in hard remote environment without direct management for a
period of several months. Shown is the new telemetry system that was developed to unite flowmeters in the
363-367
severe conditions of the desert with power supply problems and low GPRS signal quality. Experiments held
in Turkmenistan have shown that device indications didn’t drift and remained stable during the year, that
is a great advantage in comparison to rotary and turbine flowmeters. Also described is the mobile ultrasonic
calibration stand that uses the same physical principles and similar software. Outlined is the usage of
modern wireless technologies to collect and transmit metrological data.
Index Terms: telemetry, ultrasonic flowmeter, signal transmission, calibration stand, Wi-Fi, HTTP.
References: 144. G. O. Young, “Synthetic structure of industrial plastics (Book style with Velichko, M., Satler, O., Krasovskaya, L., Bronnikova, M.,
Belyaeva, I., Kostina, I., Gladkikh, Yu., 2018. Calibration of Ultrasonic Flow Meter on Wi-Fi Network Using a Web Browser. J. Advanced
Research in Dynamical and Control Systems, 08 (SI), Issue: 08-Special Issue: 1593-1596. 145. Velichko, M., Satler, O., Krasovskaya, L., Erina, T., Belyaeva, I., Gladkikh, Yu., 2017. Using Drone as WiFi Access Point During
Infrared Thermography for Subsidiary Data Acquisition. J. Fundam. Appl. Sci., 9(1S): 1279-128.
146. Velichko, M., Satler, O., 2018. The use of the HX711 ADC Module to Reduce the Error in the Verification of Gas Meters. Digest of scientific articles of the II International scientific-practical conference, Belgorod.
147. Hamidullin, V., Malakhanov, R., Khamidoullina, E., 2001. Statics and Dynamics of Ultrasonic Flowmeters as Sensing Elements for
Power Control Systems. Digest: IEEE Conference on Control Applications, IEEE International Conference on Control Applications CCA '01. sponsors: IEEE Control Systems Society (CSS): 680-685.
148. Fraņa, D.R., Ono, Y., Jen, C.-K., 2011. Contrapropagating Ultrasonic Flowmeter Using Clad Buffer Rods for High Temperature
Measurements. Journal of Dynamic Systems, Measurement and Control, Transactions of the ASME, Т. 133, # 1.: 011007. 149. Hu, L., Qin, L., Mao, K., Chen, W., Fu, X., 2016. Optimization of Neural Network by Genetic Algorithm for Flowrate
Determination in Multipath Ultrasonic Gas Flowmeter. IEEE Sensors Journal, Т. 16, # 5: 1158-1167.
150. Luca, A., Marchiano, R., Chassaing, J.-C., 2016. Numerical Simulation of Transit-time Ultrasonic Flowmeters by a Direct Approach. IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, Т.63, #6: 886-897.
151. Gryshanova, I., 2007. The Effect of Duct Cross-sectional Shapes on Metrological Performance of Ultrasonic Flowmeters. Digest:
Proceedings of the 5th Joint ASME/JSME Fluids Engineering Summer Conference, FEDSM: 27-31. 152. Hamidullin, V., 1995. Dynamics of Ultrasonic Flowmeters. Digest: Proceedings of the IEEE Ultrasonics Symposium: 1109-1113.
153. Gerasimov, S., Glushnev, V., Serov, N., 2018. Analysis of Calibration and Verification Indirect Methods of Ultrasonic Flowmeters.
Digest: 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications, TELSIKS - Proceeding 13: 451-454.
154. Bates, R., et al., 2013. Development of a Custom On-line Ultrasonic Vapour Analyzer/Flowmeter for the Atlas Inner Detector, with
Application to Gaseous Tracking and Cherenkov Detectors. Journal of Instrumentation, Т.8, #1: C01002. 155. Gershman, E. M., Kruglo D. S., Fafurin V. A., Borisov A. M., Sabirzyanov A. N. Flow measurement of two-phase flow by
ultrasonic flow meters. Transactions Of Academenergo. 2017. 1. 30-41.
156. Mansfeld, D. A., Sanin, A. G., Volkov, G. P., Belyaev, R. V., Morozkin, D. V., 2017. Ultrasonic flow of gas from overhead sensors, Scientific notes of the physics faculty of Moscow University, 5: 1751201.
157. Kuranov, K. N., Sergeev, S. S., 1996. Automated calculation of parameters of ultrasonic flowmeters. The Creation of resource-
saving machines and technologies, Abstracts of the Republican scientific and technical conference, Ministry of education and science of the Republic of Belarus, Mogilev machine-building Institute: 99.
158. Strelnikov, E. A., Eremin, I. Yu.,2016. The issue of improving the accuracy of ultrasonic flowmeters, Legislative and applied
Metrology, 1 (140): 41-44. 159. Abzalilova, E. R., Galimullina, E., 2017. Reducing the influence of vibration on the measurement accuracy of ultrasonic flowmeters.
Bulletin of science and education, 1 (25): 33-35.
160. Tyryshkin, R. A., Sabirzyanov, A. N., Fafurin, V. A., 2016. Numerical simulation of the correction coefficient of ultrasonic flowmeters. Mathematical methods in technics and technologies, 9 (91): 17-23.
161. Biryukov, E. A., 2018. The transducers of ultrasonic flowmeters. Traditional and innovative science: history, modern condition and
prospects collection of papers of International scientific-practical conference: 10-12. 162. Borisov, V. A., Gershman, E. M., Pruglo, D. S., Fafurin, V., Yavkin., 2017. Experimental study of the influence of heterogeneity of
the temperature field on metrological characteristics of the ultrasonic flowmeter. Transactions Of Academenergo, 2: 7-18. 163. Vasilyev, T. R., Kokuev, A. G., 2018. Control of oil consumption based on artificial neural network. Bulletin of Astrakhan state
technical University, Series: Management, computer engineering and Informatics, 2: 43-52.
164. Abzalilova, Y. R., Vydrin, D. F., Galimullina, E. E., Vdovin, A. K., 2017. Methods of flow measurement. Scientific research, 2 (13): 20-21.
165. Terekhin, A., Pashnina, N., 2016. Evaluation of the effect of the number of beams of ultrasonic flow transducers on the quality
characteristics of measurement. Digest: Prom-Engineering proceedings of the II international scientific and technical conference: 404-407. 166. Polovneva, S. I., Yelshin, V. V., Tolstoy, M. Y., 2009. Flow measurement of gases and liquids. Teaching aid / national research
Irkutsk state technical University: 235-238.
167. Kositsyn, N. I., Petrov, V. V., Petrov, A. V., 2016. The calculation of the distribution of the field amplitude of the ultrasonic wave beam in a moving medium. News of Saratov University, New series, Series: Physics, Vol. 16, 1: 27-33.
168. Sheshukov, I. Y., 2015. Metering devices, errors of measurement and calculation algorithms. Legislative and applied Metrology, 3
(136): 24-40.
36.
Authors: Nur Ain Hamiruddin and Siti Amira Othman
Paper Title: The Feasibility of Irradiated Bioplastics As Future Packaging Material
Abstract: For bioplastic materials, the role of radiation in shaping their performance has received growing
scholarly interest. Notably, bioplastic materials refer to substances manufactured using organic biomass
components. To prepare these substances, different processes are implemented. For high-technology firms,
specialty plastics are required, especially those with specific responses upon being exposed to radiation. In the
recent years, the majority of food packaging materials have received approval relative to the aspect of
irradiation. However, the extent to which these substances could be safe has proved challenging to unearth;
with the industry charged with food and regulation guidelines on focus. of importance to note is that the
bioplastic materials come with several benefits. Some of these merits include the affirmation that they do not
generate toxic fumes and that they also reduce the emission of carbon dioxide, which would be the case if other
unrelated materials were used. The central aim of this review paper is to examine the degree to which irradiated
bioplastic materials could prove feasible relative to their use as packaging materials in the future.
363-367
Index Terms: Irradiated, Bioplastics, Packaging, Food.
References:
• Urbain, W.M. 1986. Food irradiation. Orlando, FL., Academic Press, Inc
• Komolprasert, V. 2007. Packaging for food treated with ionizing radiation. In: Packaging for non-thermal processing of food, (Ed.) J.H.
Han, Blackwell Publishing. Ames, IA, pp. 1-16.
• O’Donnell, American Chemical Society. Washington, D.C., pp. 1-13. O’Donnell, J.H., Sangster, D.F. 1970. Principles of radiation
chemistry, Edward Arnold, London.
• Raghu, R, Archana, K., Sharanappa,C., Ganesh., S, Devendrappa., H (2016). Electron beam and gamma ray irradiated polymer electrolyte
films: Dielectric properties. Journal of Radiation Research and Applied Sciences. Volume 9, Issue 2, April 2016, Pages 117-12
• Park, H., Li, X., Jin, C., Park, C.-Y., & Cho, W.-J. (2002). Preparation and properties of biodegradable thermoplastic starch/clay hybrids.
Macromolecular Materials and Engineering, 287, 553–558. http://dx.doi.org/10.1002/1439- 2054(20020801)287:83.0.CO;2-3
• Mensitieri, G., Di Maio, E., Buonocore, G. G., Nedi, I., Oliviero, M., Sansone, L., & Iannace, S. (2011). Processing and shelf life issues
of selected food packaging materials and structures from renewable resources. Trends in Food Science & Technology, 22, 72–80.
• Jamshidian, M., Tehrany, E. A., Imran, M., Jacquot, M., & Desobry, S. (2010). Poly-lactic acid: Production, applications,
nanocomposites, and release studies.
• Rhim, J. W., Hong, S. I., & Ha, C. S. (2009). Tensile, water vapour barrier and antimicrobial properties of PLA/nanoclay composite films.
Food Science and Technology, 42, 612–617.
• Rasal, R. M., Janorkar, A. V., & Hirt, D. E. (2010). Poly(lactic acid) modifications. Progress in Polymer Science, 35, 338–356.
http://dx.doi.org/10.1016/j.progpolymsci.2009.12.003.
1. Clough, R., Shalaby, S. W., eds., (1990) "Radiation Effects on Polymers, (1991) " ACS Symposium Series 475, ACS Washington, D.C.,
2. Potter, N. N., & Hotchkiss, J. H. (1995). Food science. New York: Chapman & Hall.
3. McKown K.M. Laura D. Carbone, Juan Bustillo, Jerome M. Seyer, Andrew H. Kang, Arnold E. Postlethwaite (2001). Induction of
immune tolerance to human type I collagen in patients with systemic sclerosis by oral administration of bovine type I collagen.
4. Van- willige R. W. G., Linssen J. P. H., Meinders M. B .J., Vander S. H. J., and Voragen A. G. J. (2002). Influence of flavor absorption
on oxygen permeation through LDPE, PP, PC and PET plastics food packaging. Food Additives and Contaminants. 19:303–13.
5. Tharanathan, R. N. (2003). Review e biodegradable films and composite coatings: Past, present and future. Trends in Food Science &
Technology, 14, 71–78.
6. Patel, V.R. and Amiji, M.M. (1996). Preparation and characterization of freeze dried chitosan poly(ethylene oxide) hydrogels for site-
specific antibiotic delivery in the stomach. Pharmaceut. Res. 13: 588–593.
7. Potter, N.N. and Hotchkiss, J.H. (1995). Food Science, Fifth Edition. Chapman & Hall, New.
8. Guilbert, S. (1986). Technology and application of edible protective films. In Mathlouthi, M. (Ed.), Food Packaging and Preservation,
London, UK: Elsevier Applied Science.371–394.
9. Kester, J. J. and Fennema, O. R. (1986). Edible films and coatings: A review. Food Technology 40(12): 47-59.
10. Bourtoom, T. (2008). Edible film and coatings: Characterstics and properties. Int. Food Res. J. 15(3). 1-12.
11. Food and Drug Administration (FDA). (2002) Guidance for industry: Preparation of premarket submission for food contact substances:
Chemistry recommendations, Center for food safety and applied nutrition, Office of food additive safety: College Park, MD. U.S. Food and
Drug Administration..
12. Bailey, Allan B., Chanderbhan, Ronald, Collazo-Braier, Nancy, Cheeseman, Mitchell A., Twaroski, Michelle L. 2005. The use of
structure-activity relationship analysis in the food contact notification program. Regulatory Toxicology and Pharmacology 42(2):225-235.
37.
Authors:
Masiri Kaamin, Nur Fadzly Md Zaid, Mohd Effendi Daud, Rosdi Ab Rahman, Hairul Mubarak
Hassim, Nor Baizura Hamid, Mardiha Mokhtar
Paper Title: Analysis on Absorption Sound Acoustic Panels from Egg Tray with Corn Husk and Sugar Cane
Abstract: In the contemporary world, one of the areas that have gained growing attention entails sound control. The
motivation has been to respond to the increasing demand to improve sound waves in various contexts. One of the sound
absorbing agents entails natural fiber, a platform that has led to the growing development of sound absorbers. Hence, this
study’s central purpose is to examine the potentiality of sound absorber panels developed from materials such as egg trays
with corn husks, egg trays with sugar cane, and egg trays combined. For the selected materials, two tests that are
implemented include reverberation room test towards achieving noise reduction coefficients (NRCs) and the impedance tube
test – towards achieving the sound absorption coefficients (SACs). For the impedance experiment, findings indicate that the
frequency of the absorption values ranges from 0 Hz to 1000 Hz. For the respective forms of the acoustic panels, the SAC
values are seen to be 0.9600, 0.9700, and 0.8900; findings that are achieved under low-frequency conditions. In relation to
the case of NRC, the values obtained for the selected panels include 0.5500, 0.5900, and 0.5000. Indeed, the absorption
aspect is seen to be pronounced when the experimental platform entails a combination of egg trays with sugar cane stacks.
Regarding the results gained from the case of the reverberation room test, the echo time is likely to be shortened by the
acoustic panel. Whereas the maximum time for the egg tray panel is observed to be 4.800 seconds, the case of an empty
room depicts a maximum of 6.280 seconds. For the egg tray panels with corn skins and sugar cane, the results point to the
maximum times of 3.990 seconds and 4.210 seconds respectively. Hence, it is concluded that the egg tray panel with corn
husks depicts lower NRC values. Overall, it is evident that the three materials exhibit a promising state of eco-friendliness,
complemented by the affirmation that in the market, they are easily available.
Keywords : Sound, Corn husk, Sugar cane, Egg tray.
References:
1. Cox, T., & Antonio, J. (2004). Acoustics Absorbers and Diffusors.
363-367
2. Fagbemigun, & Taiwo, K. (2014). Pulp and Paper-Making Potential of Cornhusk. Lagos-Nigeria International Journal of Agri Science Vol
4(4), 209-213. 3. Hosseini, Ayub, Jailani, F, M.N, & M. (2011). Analysis of coir fiber acoustical characteristics. Applied Acoustics 72(1), 35-42.
4. Koizumi, T., Tsujiuchi, N., & Adachi, A. (2002). WTT Press, Southampton, UK. High Performance Structures and Composite Book, 127-
166.
5. Lee, & Chen W. (2003). Sound Absorption Properties Of Recycled Polyester Fibrous Assembly Absorbers. AUTEX Research Journal 3(2).
6. Nick, B., & Thomas,W. (2002). Improved acoustic behavior of interior part of renewable resources in the automotive industry. journal of
polymers and the environment, 115-118. 7. Nunez, D. G. (1998). causes and effect of noise pollution. Retrieved from student paper: UK.ask.com/.../causes-and-effect-of-noise-
pollution-United-Kingdom
8. SadatniaM, Ebrahimi, G., & Tajvidi , M. (2008). Proceedings of the 17th World Conference on Nondestructive Testing. Comparing sound absorption characteristic of acoustic board made of Aspen particles and different percentage of wheat and barley straws., 1-6.
9. Slamet. (2002). Tebu. Available: http://warintek.progresio.or.id/tebu/perkebun/warintek/merintisbisnis/progresio.html
10. Tipler, P. A. (1998). Physics for Scientists and Engineer Vol 1. Mechanics, Oscillations and Waves and Thermodynamics, London. 11. Wambua, P., J. Ivens, & I. Verpoest. (2003). Composite Science and Technology. Natural Fibres: Can They Replace Glass In Fibre
Reinforced Plastics?, 1259-12646.
12. Wang C. N, & J. H. Torng. (2001). Experimental study of the absorption characteristic of some porous fibrous materials. applied acoustic, 447-459.
13. Wassilieff, C. (2003). Applied Acoustics 48. 339-356.
14. Yang, H., Kim, D., & Kim, H. (2003). Bioresource Technology. Rice straw-wood particle composite for sound absorbing wooden construction material, 117-121.
Zulkarnain, Z. R., & J, M. M. (2010). American Journal of Applied Science. 260-264.
38.
Authors: Challa Chaitanya Chowdary, Udaya Kiran
Paper Title: LICENSE PLATE CHARACTER RECOGNITION USING RIESZ FRACTIONAL AND
CONVOLUTIONAL NEURAL NETWORK
Abstract: Automatic license plate recognition system is mostly used for identification of vehicles. This
system is used in traffic monitoring, parking management and identification of theft vehicles. As in India
the license plate regulations are not strictly followed, it is often difficult to identify the plate with different
font type and character size. One more major problem in license plate recognition is low quality of images
which affected via severe illumination condition. In this paper, a Riesz fractional mathematical model is
proposed for enhancing the edges, which results in improving the performance of text recognition. The text
in the license plate is recognized using the convolution neural network and the results showed better
accuracy.
Keywords: Character recognition, convolutional neural network, license plate recognition
References:
1. Abolghasemi, V. and Ahmadyfard, A., 2009. An edge-based color-aided method for license plate detection. Image and Vision Computing,
27(8), pp.1134-1142. 2. Baohua, Z., Dahua, Y., Hongmei, H. and Lanying, G., 2010, June. License plate location algorithm based on histogram equalization. In
2010 International Conference On Computer Design and Applications (Vol. 1, pp. V1-517). IEEE.
3. Al-Ghaili, A.M., Mashohor, S., Ramli, A.R. and Ismail, A., 2012. Vertical-edge-based car-license-plate detection method. IEEE transactions on vehicular technology, 62(1), pp.26-38.
4. Azam, S. and Islam, M.M., 2016. Automatic license plate detection in hazardous condition. Journal of Visual Communication and Image
Representation, 36, pp.172-186. 5. Vicente, A.N. and Pedrini, H., 2016, October. A learning-based single-image super-resolution method for very low quality license plate
images. In 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (pp. 000515-000520). IEEE.
6. Yu, S., Li, B., Zhang, Q., Liu, C. and Meng, M.Q.H., 2015. A novel license plate location method based on wavelet transform and EMD analysis. Pattern Recognition, 48(1), pp.114-125.
7. Saha, S., Basu, S. and Nasipuri, M., 2015. iLPR: an Indian license plate recognition system. Multimedia Tools and Applications, 74(23),
pp.10621-10656. 8. Gou, C., Wang, K., Yao, Y. and Li, Z., 2015. Vehicle license plate recognition based on extremal regions and restricted Boltzmann
machines. IEEE Transactions on Intelligent Transportation Systems, 17(4), pp.1096-1107.
9. Tian, J., Wang, R., Wang, G., Liu, J. and Xia, Y., 2015. A two-stage character segmentation method for Chinese license plate. Computers & Electrical Engineering, 46, pp.539-553.
10. Raghunandan, K.S., Shivakumara, P., Jalab, H.A., Ibrahim, R.W., Kumar, G.H., Pal, U. and Lu, T., 2017. Riesz fractional based model for
enhancing license plate detection and recognition. IEEE Transactions on Circuits and Systems for Video Technology, 28(9), pp.2276-2288.
11. Jain, V., Sasindran, Z., Rajagopal, A., Biswas, S., Bharadwaj, H.S. and Ramakrishnan, K.R., 2016. Deep Automatic Licence Plate
Recognition system.
363-367
39.
Authors: Dr. Kriti Bhaswar Singh, Dr. Abhishek Singh
Paper Title: University Autonomy and Sustainable Finance: A Case of Royal University of Bhutan
Abstract: Royal University of Bhutan was established in 2003 through Royal Charter. RUB is a
decentralized university with eight colleges distributed across the country. In the year 2011, RUB became
fully autonomous university. After two years of successful autonomy, the RUB was beginning to sense the
gradual decline in government funding. This has put to test the future sustainability of the university.
Colleges under RUB have saved the funds that was granted by the royal government of Bhutan (RGoB) to
sustain in the future as there began gradual decline in grants during the coming years (Rigyal, 2013). This
363-367
study is aimed to find the present investment policy of the colleges under RUB and recommend investment
products for them to generate future sustainable income for the colleges & university. In order to assess the
knowledge of the investment, expected return & risk and the preference of the colleges under RUB a set of
questionnaire was administered. A total of 20 respondents, including President, finance personal and
administrative officer, from 5 colleges (representing more than 60% of colleges) under RUB were taken for
the study. Responses reveal the general investment policy of the colleges, present investment avenues
adopted and return on them. All these facts were analyzed to propose portfolio for the colleges, which can
help them to generate sustainable incomes.
Keywords : University autonomy, governance, Royal University of Bhutan, Sustainability
.
References: 1. Awalakki, M. S. (2015). A Study on Investment Patterns and Awareness of Salaried Class Investors. International Journal of Scientific
Research (IJSR), 4(8), 348-350. 2. Bahl, S. (2012). The Role of Green Banking in Sustainable Growth. International Journal of Marketing, Financial Services & Management
Research, 2(2), 27-35.
3. Black, F. (1976). The Investment Policy Spectrum: Individuals, Endowment Funds and Pension Funds. Charlottesville: CFA Institute.
4. BNBL. (2017). Bhutan National Bank Ltd. Retrieved October 2017, from http://www.bnb.bt
5. Boyer, E. (1990). Scholarship reconsidered. Princeton, NJ: Carnegie Foundation.
6. BusinessBhutan. (2017, February). Business Bhutan. Retrieved from businessbhutan website: http://businessbhutan.bt/bhutans-liquidity-hang-up/
7. David Engberg, M. F. (2002). Promising Practices: Spotlighting Excellence in Comprehensive Internationalization. Washington, DC.:
American Council on Education. 8. David S. P. Hopkins, W. F. (January, 1981). Planning Models for Colleges and Universities. California: Stanford University Press.
9. Dimmock, S. G. (August 2012). Background Risk and University Endowment Funds. The Review of Economics and Stastistics, 94(3),
789-799. Retrieved from http://hdl.handle.net/10220/12203 10. DoI, MoEA. (2006). Investment Opportunity Study. Thimphu: Author.
11. Dresner, S. (2003). PIPE: A Guide to Private Investments in Public Equity. Bloomberg Press.
12. Fabozzi, F. J. (1999). Investment Management. New Jersey: Prentince Hall, Inc. 13. Fishman, J. (2014). What Went Wrong: Prudent Management of Endowment Funds and Imprudent Endowment Investing Policies. Journal
of College and University Law, 40(2), 49.
14. Frank Reilly, K. B. (2002). Investment Analysis & Portfolio Management. Mason, OH: South-Western Cengage Learning. 15. Hansmann, H. (1990). Why Do Universities Have Endowments? The Journal of Legal Studies, 3-42.
16. Iyiola Omisore, M. Y. (March 2012). The modern portfolio theory as an investment decision tool. Journal of Accounting and Taxation,
4(2), 19-28. 17. Jones, C. P. (2007). Investment Analysis and Management. New Delhi: Wiley India Pvt. Ltd.
18. Jr., J. P. (2009). Business incubation as strategy. Business Strategy Series, 10(3), 156-166.
19. Jr., W. O. (1999). Sources of Funds and Quality Effects in Higher Education. ECONSTOR Make Your Publication Visible, 35. 20. Keith C. Brown, L. G. (2010). Asset allocation and portfolio performance: Evidence from University endowments funds. Journal of
Financial Markets, 268-294.
21. Lawrence J. Gitman, M. D. (2007). Planning Your Personal Finances. Massachusetts, US: Cengage Learning. 22. Mark A. Youndt, M. S. (March 2004). Intellectual Capital Profiles: An Examination of Investments and Returns*. Journal of Management
Studies, 335-361.
23. Maxwell, T. W. (2012). Academic Work in an Autonomous Royal University of Bhutan: Challenges and Responsibilities Regarding Research. Bhutan Journal of Research & Development, 37-49.
24. Merton, R. C. (1993). Optimal Investment Strategies for University Endowments Funds. In M. R. Charles T. Clotfelter, Studies of Supply
and Demand in Higher Education (pp. 211-242). Chicago: University of Chicago Press. 25. N. Walia, R. K. (2009). An Analysis of Investor's Risk Perception towards Mutual Funds Services. International Journal of business
Management, 4(5), 106-120.
26. PCAL. (2017). Penden Cement Authority Ltd. Retrieved February 25, 2017, from http://www.pcal.bt 27. Rigyal, D. S. (2013). University autonomy and sustainability: Faculty perceptions on the sustained growth of the Royal niversity of Bhutan.
Bhutan Journal of Research & Development, 17-29.
28. RMA. (2014-2015). Annual Report. Thimphu: Author. 29. RMA. (2015-16). Annual Report. Thimphu
30. RMA. (2016). Monetary Policy Statement. Thimphu
31. RMA. (2017, February). Royal Monetary Authority of Bhutan. Retrieved from https://www.rma.org.bt/db_noticetp.jsp 32. RSEBL. (2009). Introducing the Stock Market. Thimphu
33. RSEBL. (August 2009). Introducing the Stock Market. Thimphu
34. RUB. (2011). Research Guidelines. Retrieved 2017, from Royal University of Bhutan: http://www.rub.edu.bt/index.php/research-guidelines
35. RUB. (2014). Annual Report. Thimphu 36. Soderbaum, J. (2017). Research and development - government, business and universities. Retrieved February 20, 2017, from ACIL
ALLEN Consulting: http://www.acilallen.com.au/sector/3/research-and-development-government-business-and-universities
37. Thomas Gilbert, S. K. (2012). Investor inattention and the market impact of summary statistics. Management Science, Special Issue on Behavioral Economucs and Finance, 58, 336-350.
38. Thomas, J. C. (2001). Equity premium as low as 3 percent? Evidence from analysts earnings forecasts for domestic and international stock
markets. Journal of Finance, 1629-1666. 39. Todor Stoilov, V. I. (2003). Portfolio Optimization of Investment Decisions on the Securities Market in Bulgaria. Bulgaria: CompSystech.
40. Wilcox, J. W. (1999). Investing By The Numbers. USA: Frank J. Fabozzi Associates.
41. Zvi Bodie, A. K. (1999). The Investment Environment. In A. K. Zvi Bodie, Investments (p. 3). US: Irwin/McGraw-Hill.
40.
Authors: Dr Trishu Sharma
Paper Title: Women and Media: An Analysis of Role of Women Journalist in Indian Media
363-367
Abstract: This research is conducted on five different Hindi news channels and five different Newspapers.
The purpose of this research was to know the representation of women journalist in print and television
media in the form of byline, anchor, reporter, voice-over artist and Piece to Camera. News being covered by
women journalist is also being analyzed on source based also. Content analysis method is used to conduct
this study. Journalists were also categorized on the basis of covering hard news and soft news also.
Keywords : Women Journalist, Representation of Women Journalist.
References
1. Kumar, K.J, (2002), Mass Communication in India, Jaico Publication.
2. Steiner, Linda, ”Gender in the Newsroom”, in Handbook of Journalism Studies, ed. Thomas Hanitzsch and Karin Wahl-Jorgensen (e-book, New York and London, 2009), p. 123, 126
3. Vaishali H.B 2015,” Changing Face of Women Journalists in Leading Kannada Television Channels: A Study”, International
Journal of Scientific Research, Volume : 4, Issue : 8, Aug 2015, pp 663-665, ISSN No 2277 – 8179 4. Jha Rama (1992). Women and The Indian Print Media: Portrayal & performance. Chanakya Publication.
5. Sharma K., Dr.Sanjeev, (2005), “Depiction of women in Indian media-A case of introspection for media planners” Samaj bigyan
shodh Patrica, Amroha, Vol.1, no.1 April-Sept. pp.32-36.
6. Tomar, Ranu in her seminar paper (2011). “Gender and Media: Status of women journalist in Hindi Print Media in India” presented
at University of Work, 19- ‘22 sept
41.
Authors: Sumeet Gill and Renu Saroha
Paper Title: Recognition of Text CAPTCHA by using Back Propagation Algorithm of Artificial Neural network
Abstract: Text-based CAPTCHA is a very simple type of CAPTCHA which are most widely used. It uses
only a group of characters. In this paper, we focus on how Text based CAPTCHA is recognized by machine
learning techniques. This paper proposed a method based on Back Propagation algorithm to identify the
Text based CAPTCHA. The proposed technique improves the security level of Text-based CAPTCHA
storage system by using the Back-propagation method of Artificial Neural Network. We used NNToolbox to
train the network in MATLAB software.
Keywords: Text-based CAPTCHA, Back-propagation Algorithm, Artificial Neural Networks.
References
1. Tomoka Azakami, Chihiro Shibata, Ryuya Uda, “Challenge of Deep Learning against CAPTCHA with
Amodal Completion and After-effects by Colors” 2016, 2157-0426.
2. Shailaja Tingre, Debajyoti Mukhopadhyay, “An Approach for Segmentation of Characters in
CAPTCHA”, ICCCA 2015,978-1-4799-8890.
3. Yu Hu1,2, Li Chen1,2*, Jun Cheng3 , “ A CAPTCHA recognition technology based on deep learning” IEEE
2018,978-1-5386.
4. Xiao Ling-Zi, ZHANG Yi-Chun , “ A Case Study of Text –Based CAPTCHA Attacks” ,IEEE 2012, 978-
0-7695.
5. Mengyuan Wang1, Yuliang Yang1, Mengyu Zhu2, Jiaming Liu3, “CAPTCHA Identification Based on
Convolution Neural Network”, IMCES 2018, 978-1-5386-1803.
6. Brian Cheung, “Convolutional Neural Networks Applied to Human Face Classification” International
Conference on Machine Learning and Application, 2012, 978-0-7695 .
7. Yanping Lv1,2, Feipeng Cai1,2, Dazhen Lin1,2*, Donglin Cao 1,2*, “Chinese Character CAPTCHA
Recognition Based on Convolution Neural Network”,IEEE 2016, 978-1-5090-0623.
8. Ye Wang, Yuanjiang Huang, Wu Zheng, Zhi Zhou, Debin Liu, Mi Lu “Combining convolutional neural
network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA” IEEE 2017,
978-1-5090-5320.
9. Mengyun Tang, Haichang Gao, Yang Zhang , Yi Liu, Ping Zhang, Ping Wang “ Research on Deep
Learning Techniques in Breaking Text –Based CAPTCHAs and Designing Image –Based CAPTCHA”,
IEEE Transaction on Information Forensics and Security, October-2018 Vol. 13 , No.-10.
10. Rafaqat Hussain , Hui Gao, Raiz Ahmed Shaikh, Shazia Parveen Soomro, “ Recognition Based
Segmentation of Connected Characters in Text Based CAPTCHAs” IEEE International Conference on
Communication Software and Networks, 2016, 978-1-5090-1781.
11. Tao Zhang1, Honglei Zheng2, Lele Zhang3, “ Verification CAPTCHA Based on Deep Learning”,
Proceeding of the 37th Chinese Control Conference “,July 25-27, 2018.
363-367
42.
Authors: Syahpawia,*, Amiur Nuruddinb, and Sri Sudiartic
Paper Title: Syirkah Amlak’s Implications in Building Community Economic Independence (Case Study in Meranti
Islands Regency, Riau Province)
Abstract. This research discusses Syirkah Amlak’s Implications in Building Community Economic
Independence in Meranti Islands Regency. Islam as the religion of rahmatan lil-‘alamin regulates all aspects
of the lives of its people. Syirkah Amlak is a maqasid syariah translation of property maintenance and an
alternative in solving problems that have occurred in society, where poverty is caused by various factors,
one of which is not having the capital to do business. The case that occurred in the Meranti Islands Regency
was that inheritance was used as capital in building a business of economic independence, so far the
community assumed that inheritance had to be divided based on the understanding of the meaning of the
verses in the Qur'an and the hadith of the Prophet. In addition, researchers want to see the implications of
syirkah amlak in building community economic independence from aspects of its Islamic principles. The
research method used is a qualitative approach (in-depth interviews), sources are carried out by
observation, interviews, documentation, history, and questionnaires. While analyzing the data the
researcher used descriptive analytic (analytic descriptive research). The results of this study found that the
implications of syirkah amlak in building the economic independence of the community have an impact on
increasing income, labor, education, religion and blessings / salvation (al-falah), where there are most
people who do syirkah amlak already able to develop industry and some again in the form of additional
gardens in the Meranti Islands Regency.
Keywords: Implications, syirkah amlak, economic independence..
1. Departemen Agama RI, Al-Quran Dan Terjemahannya, (Bandung: PT Diponogoro, 2014).
2. Acho-chi, C. 1998. “Sustainable self-development efforts in Cameroon grass fields.” Development in
Practice, 8(3).
3. Ahmad, Khurshid. Studies in Islamic Economics. (Leicester, U.K: The International Centre for Research
in Islamic Foundation, 1980).
4. Algaoud, Mervyn K. Lewis dan Lativa M. Islamic Banking. (Massachusetts: Edward Elgar, 2001).
5. al’Alim, Yusuf Hamid. al-Maqashid al-‘Ammah Li al-Syari’ah al-Islamiyah, (Horndon: al-Ma’had al-
‘Alami Li al-Fikiri al-Islamy, 1991).
6. Avilliani. Kemandirian Ekonomi. (UIN: Institute for Development of Economics and Finance. 2012).
7. Chapra, M. Umer (1985), Towards a Just Monetary Sistem. Terj. Ismail bin Omar. Kearah Sistem
Kewangan yang Adil. (Kuala Lumpur: Dewan Bahasa dan Pustaka, 1990).
8. Collins, W. A., Gleason, T., & Sesma, A. Jr., 1997, Internalization, Autonomy, and Relationships:
Development during Adolescence. dalam J. E. Grusec & L. Kuczynski (Eds.), Handbook of Parenting and
the Transmission of Values (New York: Wiley, 1997).
9. Fonchingong, C.C., dan Fonjong, Lotsmart. N. (2003). “The Concept of Self-Reliance in Community
Development Initiatives in The Cameroon Grassfields”. Nordic Journal of African Studies, Vol. 12(2).
10. Galtung, J. et al. (eds.). Self-Reliance: a Strategy for Development. (London: Bogle L’Ouverture
publications. 1980)
11. Gooneratne, W. and Mbilinyi, M. (eds.) 1992. “People’s Responses to the Economic Crisis in Eastern and
Southern Africa.” Reviving Local Self-Reliance. UNCRD, Japan.
12. Haroen, Nasrun. Figh Muamlah. (Jakarta: Gaya Media Pratama, 2000).
13. Hubeis, H.V.S. (2002). Tantangan dan Prospek Teknologi Informasi dan Komunikasi dalam Otonomi
Daerah. Dalam Pambudy, R., dan Adhi, A.K. (ed). Pemberdayaan Sumber Daya Manusia Menuju
Terwujudnya Masyarakat Madani, (Bogor: Pustaka Wirausaha Muda,tt).
14. Hyden, G. No Shortcuts to Progress: African Development Management in Perspective. (London:
Heinemann, 1983)
15. Idoma Kim, Muhammad Isma’il, “Self-Reliance: Key to Sustainable Rural Development in Nigeria”,
ARPN Journal of Science and Technology, VOL. 3, NO. 6, June 2013.
16. Ismail, Muhammad Syah. Falsafah Hukum Islam, (Jakarta: Bina Aksara, 1992).
17. al-Iwadhi, Rif’at Sayyid. Kitab al-Ummah fi al-Istishad al-Islamy al-Murtakaza al-Tauzi’ al-Istimar.
18. Kahf, Monzer. “Islamic Economic System – A Review” dalam Aidit Ghazali dan Syed Omar (ed),
Reading in The concept and Methodology of Islamic Economics. (Pataling Jaya: Pelanduk Publications,
1989).
19. Khalaf, Abdul Wahab. Mashadir al-Tasyri’ fi Ma la Nashsha Fiki, (Ttp: Ma’had al-Dirazah al-
A’rabiyah).
20. Khaldun, Abdur Rahman Ibn. Mugaddimah, (Ttp: Matbaah al-Azhariyah, 1348 H).
21. Mannan, M. A. Islamic Economics; Theory and Practice, (Cambridge: Houder and Stoughton Ltd, tt).
22. Mustaqim, Rizal. “Kemandirian Dan Pemberdayaan Ekonomi Berbasis Pesantren (Studi Atas Peran
Pondok Pesantren Al-Ittifaq Kecamatan Rancabali Kabupaten Bandung Terhadap Kemandirian Eknomi
Santri Dan Pemberdayaan Ekonomi Masyarakat Sekitarnya)”, dalam Jurnal Ekonomi Syari’ah Indonesia.
Volume I, No.2 Desember 2011.
23. Mu’tadin, Zainun (2002), Kemandirian Sebagai Kebutuhan Psikologis pada Remaja, http://www.e-
psikologi.com/epsi/search.asp, diakses tanggal 27 April 2017.
24. An-Nabahan, Faruq. Sistim Ekonomi Islam: Pilihan Setelah Kegagalan Sistim Kapitalis dan Sosialis,
363-367
(Yogyakarta: UII Press, 2000). Cetakan Kedua.
25. Njoh, A. 2002. “Barriers to Community Participation in Development Planning: Lessons from the
Mutengene (Cameroon) Self-help Water Project.” Community Development Journal, 37(3).
26. Ojameruaye, E. “Strategies for Self-reliant Economic Development of Urhobo land: A Paper Presented at
the 5th Annual Conference of Urhobo Historical Society at PTI Conference Centre”. Effurun, Delta:
2004.
27. Pradja, Juhaya S. Ekonomi Syariah, (Bandung: Pustaka Setia, 2012).
28. Pronk, Jan. “Globalization: A Developmental Approach”, dalam Jan Nederveen Pieterse (ed), Global
Future, Shaping Globalization, (London: Zed Books, 2001).
29. al-Risuni, Ahmad. Nadhariyah al-Maqasid ‘Inda al-Imam al-Syatibi, (Virginia: The International Institute
of Islamic Thought, 1995).
30. Rofiq, Romdin A., A. Icep Fadlil Yani dan R.B. Widodo, Pemberdayaan Pesantren Menuju Kemandirian
dan Profesionalisme Santri dengan Metode Daurah Kebudayaan, (Yogyakarta: Pustaka Pesantren, 2005).
31. Sabiq, Sayyid. Figih Sunnah, Terj. Kamaluddin A. Marzuki, (Bandung: Al Ma’arif, 1988).
32. Saddiqi, Muhammad Nejatullah. Muslim Economic Thinking: A Survey of Contemporary Literature.
(Leicerter, United Kingdom: The Islamic Foundation, 1989).
33. ash Shawi, Abdullah al Mushlih dan Shalah. Fikih Ekonomi Keuangan Islam, terj. Abu Umar Basyir.
Judul asli: Ma ia Yasa’ut Tajiru Jahluhu, (Jakarta: Darul Haq, 2004).
34. Shomedran, (2016), “Pemberdayaan Partisipatif Dalam Membangun Kemandirian Ekonomi dan Perilaku
Warga Masyarakat (Studi Pada Bank Sampah Wargi Manglayang RT 01 RW 06 Kelurahan Palasari
Kecamatan Cibiru Bandung)”, http://ejournal.upi.edu/index.php/pls/article/view/3086, diakses: tanggal 5
Mei 2017.
35. Sumodiningrat, Gunawan. Pemberdayaan Masyarakat dan Jaring Pengamanan Sosial, (Yogyakarta:
Ghalia Indonesia, 1999).
43.
Authors: Aditya Tandon
Paper Title: Mélange of IoT and Ransomware
Abstract: The use of IoT devices are increasing rapidly. Since it integrates lots of devices, it provides lots
of benefits to the users. Large companies also have started using it for coordination between the people and
machines. However, Security is a major issue faced by IoT network. Trust is something that is necessary
between the devices, which means that the data is transmitted without any tests to the trusted devices. IoT
devices have very less security features since upgrades and patches are virtually non-existent. This makes it
vulnerable to various attacks like Ransomware. Hackers will simply be able to take control of an IoT device
and demand ransom for letting it go. This may get problematic especially in household devices. It is
necessary to identify a solution for this this since IoT is still in the budding stage. Hence this work will
analyse various available attacks in IoT and provide solutions to combat the ransomware.
Keywords: Internet of Things, Ransomware, Security, Network, Malware, Threats
References: 1. Tobias RJ. Wireless communication of real-time ultrasound data and control. In: In SPIE Medical Imaging
International Society for Optics and Photonics [Internet]. SPIE; 2015. Available from: http://sci-
hub.tw/10.1016/j.comnet.2017.09.003
2. Ahmed E, Yaqoob I, Gani A, Imran M, Guizani M. Internet-of-things-based smart environments: state of the art,
taxonomy, and open research challenges. IEEE Wirel Commun. 2016 Oct;23(5):10–6.
3. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of Things: A Survey on Enabling
Technologies, Protocols, and Applications. IEEE Commun Surv Tutorials. 2015;17(4):2347–76.
4. Lin D, Tang Y, Labeau F, Yao Y, Imran M, Vasilakos A V. Internet of Vehicles for E-Health Applications: A
Potential Game for Optimal Network Capacity. IEEE Syst J [Internet]. 2017 Sep;11(3):1888–96. Available from:
http://ieeexplore.ieee.org/document/7174983/
5. Ghosh AM, Halder D, Hossain SKA. Remote health monitoring system through IoT. In: 2016 5th International
Conference on Informatics, Electronics and Vision (ICIEV) [Internet]. IEEE; 2016. p. 921–6. Available from:
http://ieeexplore.ieee.org/document/7760135/
6. Khoi NM, Saguna S, Mitra K, Ahlund C. IReHMo: An efficient IoT-based remote health monitoring system for smart
regions. In: 2015 17th International Conference on E-health Networking, Application & Services (HealthCom) [Internet].
IEEE; 2015. p. 563–8. Available from: http://ieeexplore.ieee.org/document/7454565/
7. Perera C, Zaslavsky A, Christen P, Georgakopoulos D. Context Aware Computing for The Internet of Things: A
Survey. IEEE Commun Surv Tutorials [Internet]. 2014;16(1):414–54. Available from:
http://ieeexplore.ieee.org/document/6512846/
8. Sanduleac M, Chimirel CL, Eremia M, Toma L, Cristian C, Stanescu D. Unleashing Smart Cities efficient and
sustainable energy policies with IoT based Unbundled Smart Meters. In: 2016 IEEE International Conference on
Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech) [Internet].
IEEE; 2016. p. 112–7. Available from: http://ieeexplore.ieee.org/document/7737321/
9. Yaqoob I, Ahmed E, Rehman MH ur, Ahmed AIA, Al-garadi MA, Imran M, et al. The rise of ransomware and
emerging security challenges in the Internet of Things. Comput Networks [Internet]. 2017 Dec 24 [cited 2019 May
1];129:444–58. Available from: https://www.sciencedirect.com/science/article/abs/pii/S1389128617303468
10. Wamala F. The ITU National Cybersecurity Strategy Guide [Internet]. ITU. 2011 [cited 2018 May 3]. Available
from: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
11. Jain K. These Top 7 Brutal Cyber Attacks Prove “No One is Immune to Hacking” [Internet]. The Hacker News. 2015
[cited 2018 May 3]. Available from: https://thehackernews.com/2015/09/top-cyber-attacks-1.html
12. Lohrmann D. 2015: The Year Data Breaches Became Intimate [Internet]. Govtech. 2015 [cited 2019 May 3].
Available from: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/2015-the-year-data-breaches-became-
intimate.html
13. ENISA. ENISA Threat Landscape 2015 [Internet]. 2016 [cited 2019 May 3]. Available from:
https://www.enisa.europa.eu/publications/etl2015
14. Jing Q, Vasilakos A V., Wan J, Lu J, Qiu D. Security of the Internet of Things: perspectives and challenges. Wirel
Networks [Internet]. 2014 Nov 17;20(8):2481–501. Available from: http://link.springer.com/10.1007/s11276-014-0761-7
15. Pacheco J, Satam S, Hariri S, Grijalva C, Berkenbrock H. IoT Security Development Framework for building
trustworthy Smart car services. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI) [Internet]. IEEE;
2016. p. 237–42. Available from: http://ieeexplore.ieee.org/document/7745481/
16. Wen Q, Dong X, Zhang R. Application of dynamic variable cipher security certificate in Internet of Things. In: 2012
IEEE 2nd International Conference on Cloud Computing and Intelligence Systems [Internet]. IEEE; 2012. p. 1062–6.
Available from: http://ieeexplore.ieee.org/document/6664544/
17. Ketema G, Hoebeke J, Moerman I, Demeester P, Tao LS, Jara AJ. Efficiently Observing Internet of Things
Resources. In: 2012 IEEE International Conference on Green Computing and Communications [Internet]. IEEE; 2012. p.
446–9. Available from: http://ieeexplore.ieee.org/document/6468349/
18. Granjal J, Monteiro E, Sa Silva J. Security for the Internet of Things: A Survey of Existing Protocols and Open
Research Issues. IEEE Commun Surv Tutorials [Internet]. 2015;17(3):1294–312. Available from:
http://ieeexplore.ieee.org/document/7005393/
19. Zhao K, Ge L. A Survey on the Internet of Things Security. In: 2013 Ninth International Conference on
Computational Intelligence and Security [Internet]. IEEE; 2013. p. 663–7. Available from:
http://ieeexplore.ieee.org/document/6746513/
20. Yan Z, Zhang P, Vasilakos A V. A survey on trust management for Internet of Things. J Netw Comput Appl
[Internet]. 2014 Jun;42:120–34. Available from: https://linkinghub.elsevier.com/retrieve/pii/S1084804514000575
21. Alaba FA, Othman M, Hashem IAT, Alotaibi F. Internet of Things security: A survey. J Netw Comput Appl
[Internet]. 2017 Jun;88:10–28. Available from: https://linkinghub.elsevier.com/retrieve/pii/S1084804517301455
22. Weber RH. Internet of Things – New security and privacy challenges. Comput Law Secur Rev [Internet]. 2010
Jan;26(1):23–30. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0267364909001939
23. Suo H, Wan J, Zou C, Liu J. Security in the Internet of Things: A Review. In: 2012 International Conference on
Computer Science and Electronics Engineering [Internet]. IEEE; 2012. p. 648–51. Available from:
http://ieeexplore.ieee.org/document/6188257/
24. Roman R, Zhou J, Lopez J. On the features and challenges of security and privacy in distributed internet of things.
Comput Networks. 2013 Jul;57(10):2266–79.
25. Kumar JS, Patel DR. A Survey on Internet of Things: Security and Privacy Issues. Int J Comput Appl [Internet]. 2014
Mar 26;90(11):20–6. Available from: http://research.ijcaonline.org/volume90/number11/pxc3894454.pdf
26. Bertino E, Islam N. Botnets and Internet of Things Security. Computer (Long Beach Calif) [Internet]. 2017
Feb;50(2):76–9. Available from: http://ieeexplore.ieee.org/document/7842850/
27. Chen L, Thombre S, Jarvinen K, Lohan ES, Alen-Savikko A, Leppakoski H, et al. Robustness, Security and Privacy
in Location-Based Services for Future IoT: A Survey. IEEE Access [Internet]. 2017;5:8956–77. Available from:
http://ieeexplore.ieee.org/document/7903611/
28. Bradshaw S. Combatting Cyber Threats: CSIRTs and Fostering International Cooperation on Cybersecurity
[Internet]. GCIG. 2015 [cited 2019 May 3]. Available from: https://www.cigionline.org/publications/combatting-cyber-
threats-csirts-and-fostering-international-cooperation-cybersecurity
29. Donston-Miller D. The Internet Of Things Poses New Security Challenges [Internet]. Forbes. 2014 [cited 2019 May
3]. Available from: https://www.forbes.com/sites/sungardas/2014/02/25/the-internet-of-things-poses-new-security-
challenges/#276cf9062c6f
30. Davis G. Brace Yourselves: The ‘Perfect Security Storm’ is Coming [Internet]. 2015 [cited 2019 May 3]. Available
from: https://sci-hub.tw/10.1016/j.clsr.2016.07.002
31. Rezendes CJ, Stephenson WD. Cyber Security in the Internet of Things. 2013.
32. Lee J-H, Kim H. Security and privacy challenges in the internet of things [security and privacy matters]. IEEE
Consum Electron Mag [Internet]. 2017;6(3):134– 136. Available from: https://sci-hub.tw/10.1016/j.comnet.2017.09.003
33. Liu C, Yang C, Zhang X, Chen J. External integrity verification for outsourced big data in cloud and IoT: A big
picture. Futur Gener Comput Syst. 2015 Aug;49:58–67.
34. Gao M, Wang Q, Arafin MT, Lyu Y, Qu G. Approximate computing for low power and security in the internet of
things. Computer (Long Beach Calif) [Internet]. 2017;50(6):27–34. Available from:
https://ieeexplore.ieee.org/document/7945174
35. Salami S Al, Baek J, Salah K, Damiani E. Lightweight encryption for smart home,” in Availability, Reliability and
Security (ARES). In: 2016 11th International Conference on [Internet]. IEEE; 2016. p. 382–388. Available from:
https://ieeexplore.ieee.org/document/7784596
36. Raza S, Shafagh H, Hewage K, Hummen R, Voigt T. Lithe: Lightweight Secure CoAP for the Internet of Things.
IEEE Sens J [Internet]. 2013 Oct;13(10):3711–20. Available from: http://ieeexplore.ieee.org/document/6576185/
37. Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, et al. Secure signature-based authenticated key
establishment scheme for future iot applications. IEEE Access [Internet]. 2017;5:3028–3043. Available from: https://sci-
hub.tw/10.1016/j.comnet.2017.09.003
38. Ko H, Jin J, Keoh SL. Secure service virtualization in iot by dynamic service dependency verification. IEEE Internet
Things J [Internet]. 2016;3(6):1006–1014. Available from: https://ieeexplore.ieee.org/document/7439733
39. Cheng C, Lu R, Petzoldt A, Takagi T. Securing the internet of things in a quantum world. IEEE Commun Mag
[Internet]. 2017;55(2):116–120. Available from: https://sci-hub.tw/10.1016/j.comnet.2017.09.003
40. Alkeem E Al, Yeun CY, Zemerly MJ. Security and privacy framework for ubiquitous healthcare IoT devices. In:
2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) [Internet]. London, UK:
IEEE; 2016. Available from: https://ieeexplore.ieee.org/document/7412059
41. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in internet of things: The road ahead.
Comput Networks [Internet]. 2015;76:146–164. Available from:
https://www.sciencedirect.com/science/article/abs/pii/S1389128614003971
42. Tian C, Chen X, Guo D, Sun J, Liu L, Hong J. Analysis and design of security in internet of things. In: In 2015 8th
International Conference on Biomedical Engineering and Informatics (BMEI) [Internet]. Shenyang, China: IEEE; 2015. p.
678–684. Available from: https://ieeexplore.ieee.org/document/7401589
43. Premnath SN, Haas ZJ. Security and privacy in the internet-of-things under time-and-budget-limited adversary
model. IEEE Wirel Commun Lett [Internet]. 2015;4(3):277–280. Available from:
https://ieeexplore.ieee.org/document/7054433
44. Chen R, Bao F, Guo J. Trust-based service management for social internet of things systems. IEEE Trans Dependable
Secur Comput [Internet]. 2016;13(6):684–696. Available from: https://ieeexplore.ieee.org/document/7097037
45. Gu L, Jingpei W, Bin S. Trust management mechanism for internet of things. China Commun [Internet].
2014;11(2):148–156. Available from: https://ieeexplore.ieee.org/document/6821746
46. Nassi B, Shamir A, Elovici Y. Oops!... i think i scanned a malware [Internet]. 2017 [cited 2018 May 3]. Available
from: https://www.semanticscholar.org/paper/Oops!...I-think-I-scanned-a-malware-Nassi-
Shamir/ee538c0da7709c8d376749e74fc2451c70fb8d90
47. Bertino E, Islam N. Botnets and Internet of Things Security. Computer (Long Beach Calif). 2017 Feb;50(2):76–9.
48. Richardson R, North M. Ransomware: Evolution, mitigation and prevention. Int Manag Rev [Internet].
2017;13(1):10–21. Available from: http://scholarspress.us/journals/IMR/pdf/IMR-1-2017. pdf/IMR-v13n1art2.pdf
49. Bugeja J, Jacobsson A, Davidsson P. An analysis of malicious threat agents for the smart connected home. In: 2017
IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
[Internet]. IEEE; 2017. p. 557–62. Available from: https://ieeexplore.ieee.org/document/7917623/
50. Kavya D. Ransomware of things (rot). Fuzzy Syst [Internet]. 2017;9(2):29–32. Available from: http://sci-
hub.tw/10.1016/j.comnet.2017.09.003
51. Adat V, Gupta BB. Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun Syst
[Internet]. 2018 Mar 13;67(3):423–41. Available from: http://link.springer.com/10.1007/s11235-017-0345-9
52. D’Orazio CJ, Choo K-KR, Yang LT. Data Exfiltration From Internet of Things Devices: iOS Devices as Case
Studies. IEEE Internet Things J [Internet]. 2017 Apr;4(2):524–35. Available from:
http://ieeexplore.ieee.org/document/7470257/
53. Ring T. Connected cars–the next target for hackers. Netw Secur [Internet]. 2015;(11):11–16. Available from:
http://sci-hub.tw/10.1016/j.comnet.2017.09.003
54. Gostev A, Unuchek R, Garnaeva M, Makrushin D, Ivanov A. IT Threat Evolution in Q1 2016 [Internet]. Kaspersky
Lab. 2016 [cited 2019 May 23]. Available from: https://securelist.com/it-threat-evolution-in-q1-2016/74640/
55. Gonzalez D, Hayajneh T. Detection and prevention of crypto-ransomware. In: 2017 IEEE 8th Annual Ubiquitous
Computing, Electronics and Mobile Communication Conference (UEMCON) [Internet]. IEEE; 2017. p. 472–8. Available
from: http://ieeexplore.ieee.org/document/8249052/
56. Kong JH, Ang L-M, Seng KP. A comprehensive survey of modern symmetric cryptographic solutions for resource
constrained environments. J Netw Comput Appl [Internet]. 2015;49:15–50. Available from:
https://www.sciencedirect.com/science/article/pii/S1084804514002136?via%3Dihub
57. Shim KA. A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks. IEEE Commun Surv
Tutorials [Internet]. 2016;18(1):577–601. Available from: https://sci-
hub.se/https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS016740481830004X
58. Ahmadian MM, Shahriari HR, Ghaffarian SM. Connection-monitor and connection-breaker: A novel approach for
prevention and detection of high survivable ransomwares. In: Paper presented at the 12th International ISC Conference on
Information Security and Cryptology, ISCISC 2015 [Internet]. 2015. p. 79–84. Available from: https://sci-
hub.se/https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS016740481830004X
59. Al-rimy BAS, Maarof MA, Shaid SZM. Ransomware threat success factors, taxonomy, and countermeasures: A
survey and research directions. Comput Secur [Internet]. 2018 May;74:144–66. Available from:
https://linkinghub.elsevier.com/retrieve/pii/S016740481830004X
60. Savage K, Coogan P, Lau H. The evolution of ransomware [Internet]. 2015 [cited 2019 May 18]. Available from:
https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-
ransomware.pdf
61. Cheng S-M, Chen P-Y, Lin C-C, Hsiao H-C. Traffic-Aware Patching for Cyber Security in Mobile IoT. IEEE
Commun Mag [Internet]. 2017;55(7):29–35. Available from: http://ieeexplore.ieee.org/document/7981520/
62. Cabaj K, Gregorczyk M, Mazurczyk W. Software-defined networking-based crypto ransomware detection using
HTTP traffic characteristics. Comput Electr Eng [Internet]. 2018 Feb;66:353–68. Available from:
https://linkinghub.elsevier.com/retrieve/pii/S0045790617333542
63. Castilho SD, Godoy EP, Castilho TWL, Salmen AF. Proposed model to implement high-level Information Security in
Internet of Things. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) [Internet].
IEEE; 2017. p. 165–70. Available from: http://ieeexplore.ieee.org/document/7946425/
64. Stewart CE, Vasu AM, Keller E. Communityguard: A crowdsourced home cyber-security system. In: Proceedings of
the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization - SDN-
NFVSec ’17 [Internet]. New York, New York, USA: ACM Press; 2017. p. 1–6. Available from:
http://dl.acm.org/citation.cfm?doid=3040992.3040997
65. Solangi ZA, Solangi YA, Chandio S, bt. S. Abd. Aziz M, bin Hamzah MS, Shah A. The future of data privacy and
security concerns in Internet of Things. In: 2018 IEEE International Conference on Innovative Research and Development
(ICIRD) [Internet]. IEEE; 2018. p. 1–4. Available from: https://ieeexplore.ieee.org/document/8376320/
66. Hayajneh T, Mohd B, Imran M, Almashaqbeh G, Vasilakos A. Secure Authentication for Remote Patient Monitoring
with Wireless Medical Sensor Networks. Sensors [Internet]. 2016 Mar 24;16(4):424. Available from:
http://www.mdpi.com/1424-8220/16/4/424
67. Shu Z, Wan J, Li D, Lin J, Vasilakos A V., Imran M. Security in Software-Defined Networking: Threats and
Countermeasures. Mob Networks Appl [Internet]. 2016 Oct 12;21(5):764–76. Available from:
http://link.springer.com/10.1007/s11036-016-0676-x
68. Rizzardi A, Sicari S, Miorandi D, Coen-Porisini A. AUPS: An Open Source AUthenticated Publish/Subscribe system
for the Internet of Things. Inf Syst [Internet]. 2016 Dec;62:29–41. Available from:
http://linkinghub.elsevier.com/retrieve/pii/S030643791630237X
69. Tao M, Zuo J, Liu Z, Castiglione A, Palmieri F. Multi-layer cloud architectural model and ontology-based security
service framework for IoT-based smart homes. Futur Gener Comput Syst [Internet]. 2018 Jan;78:1040–51. Available
from: https://linkinghub.elsevier.com/retrieve/pii/S0167739X16305775
70. Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, et al. End-to-end security scheme for
mobility enabled healthcare Internet of Things. Futur Gener Comput Syst [Internet]. 2016 Nov;64:108–24. Available
from: https://linkinghub.elsevier.com/retrieve/pii/S0167739X16300334
71. Sicari S, Rizzardi A, Miorandi D, Cappiello C, Coen-Porisini A. A secure and quality-aware prototypical architecture
for the Internet of Things. Inf Syst [Internet]. 2016 Jun;58:43–55. Available from:
https://linkinghub.elsevier.com/retrieve/pii/S0306437916300072
72. Perumal S, Norwawi NM, Raman V. Internet of Things(IoT) digital forensic investigation model: Top-down forensic
approach methodology. In: 2015 Fifth International Conference on Digital Information Processing and Communications
(ICDIPC) [Internet]. IEEE; 2015. p. 19–23. Available from: http://ieeexplore.ieee.org/document/7323000/
73. Arias O, Wurm J, Hoang K, Jin Y. Privacy and Security in Internet of Things and Wearable Devices. IEEE Trans
Multi-Scale Comput Syst [Internet]. 2015 Apr 1;1(2):99–109. Available from:
http://ieeexplore.ieee.org/document/7321811/
74. Ali Z, Imran M, Alsulaiman M. An Automatic Digital Audio Authentication/Forensics System. IEEE Access
[Internet]. 2017;5:2994–3007. Available from: http://ieeexplore.ieee.org/document/7864411/
75. Imran M, Ali Z, Bakhsh ST, Akram S. Blind Detection of Copy-Move Forgery in Digital Audio Forensics. IEEE
Access [Internet]. 2017;5:12843–55. Available from: http://ieeexplore.ieee.org/document/7954589/
76. Sundaram BV, Ramnath M, Prasanth M, Sundaram VJ. Encryption and hash based security in Internet of Things. In:
2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN) [Internet]. IEEE;
2015. p. 1–6. Available from: http://ieeexplore.ieee.org/document/7219926/
77. Santos GL dos, Guimaraes VT, da Cunha Rodrigues G, Granville LZ, Tarouco LMR. A DTLS-based security
architecture for the Internet of Things. In: 2015 IEEE Symposium on Computers and Communication (ISCC) [Internet].
IEEE; 2015. p. 809–15. Available from: http://ieeexplore.ieee.org/document/7405613/
78. Alcon J-AS, Lopez L, Martinez J-F, Castillejo P. Automated determination of security services to ensure personal
data protection in the Internet of Things applications. In: Third International Conference on Innovative Computing
Technology (INTECH 2013) [Internet]. IEEE; 2013. p. 71–6. Available from:
http://ieeexplore.ieee.org/document/6653704/
79. Raza S, Seitz L, Sitenkov D, Selander G. S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment
for the Internet of Things. IEEE Trans Autom Sci Eng [Internet]. 2016 Jul;13(3):1270–80. Available from:
http://ieeexplore.ieee.org/document/7373695/
80. Hernandez-Ramos JL, Bernabe JB, Skarmeta A. ARMY: architecture for a secure and privacy-aware lifecycle of
smart objects in the internet of my things. IEEE Commun Mag [Internet]. 2016 Sep;54(9):28–35. Available from:
http://ieeexplore.ieee.org/document/7565269/
81. Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R. Learning internet-of-things security hands-on. IEEE Secur Priv
[Internet]. 2016;14(1):37–46. Available from: https://ieeexplore.ieee.org/document/7397713
82. Xiaohui X. Study on security problems and key technologies of the internet of things. In: In Computational and
Information Sciences (ICCIS), 2013 Fifth International Conference on [Internet]. Shiyang, China: IEEE; 2013. p. 407–
410. Available from: https://ieeexplore.ieee.org/document/6643029
83. Kozlov D, Veijalainen J, Ali Y. Security and privacy threats in iot architectures. In: In Proceedings of the 7th
International Conference on Body Area Networks [Internet]. Oslo: ICST; 2012. p. 256–262. Available from:
https://dl.acm.org/citation.cfm?id=2442750
84. Ning H, Liu H, Yang LT. Cyberentity security in the internet of things. Computer (Long Beach Calif) [Internet].
2013;46(4):46–53. Available from: https://ieeexplore.ieee.org/document/6475947
85. Kim D-Y. Cyber security issues imposed on nuclear power plants. Ann Nucl Energy [Internet]. 2014;65:141– 143.
Available from: https://www.sciencedirect.com/science/article/pii/S0306454913005781
86. Li S, Xu L Da, Zhao S. The internet of things: a survey. Inf Syst Front [Internet]. 2015;17(2):243. Available from:
https://link.springer.com/article/10.1007/s10796-014-9492-7
87. Bostani H, Sheikhan M. Hybrid of anomaly-based and specification-based IDS for Internet of Things using
unsupervised OPF based on MapReduce approach. Comput Commun [Internet]. 2017 Jan;98:52–71. Available from:
https://linkinghub.elsevier.com/retrieve/pii/S0140366416306387
88. Savola RM, Abie H, Sihvonen M. Towards metrics-driven adaptive security management in e-health iot applications.
In: In Proceedings of the 7th International Conference on Body Area Networks ICST (Institute for Computer Sciences,
Social-Informatics and Telecommunications Engineering), 2012 [Internet]. ICST; 2012. p. 276–281. Available from:
https://dl.acm.org/citation.cfm?id=2442753
89. Kanuparthi A, Karri R, Addepalli S. Hardware and embedded security in the context of internet of things. In: In
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles [Internet]. M New York:
ACM; 2013. p. 61–64. Available from: https://dl.acm.org/citation.cfm?id=2517976
44.
Authors: Aditya Tandon
Paper Title: An Empirical Analysis of Using Blockchain Technology with Internet of Things and its Ap-plication
Abstract. Blockchain technology uses the crypto-graphic technique to create expanding list of data
records called blocks. Along with transaction and timestamp data, each block holds a hash value ob-tained
using cryptographic technique. Blockchain gains importance for its decentralized data transaction and
authorization without the need for third-party intervention. Although, it is mostly used in Finance sector
these days, due to its inherent ability to protect data it can be applied to every field of computation
especially in fields where data transaction is volumi-nous. Internet of Things (IoT) is one such area where it
involves collection, transfer and processing of real time data from objects, humans and sensors to auto-mate
363-367
various tasks. Hence, this paper reviews the blockchain technology, and how it can be coupled with IoT to
overcome the privacy and security issues. This paper first systematically introduces the concept of
blockchain technology, its applications along with the need for IoT devices and its implementation. Fi-nally,
it discusses the blockchain based IoT (BIoT) its architecture, advantages, challenges in implementa-tion.
Keywords: Blockchain, IoT, Review, BIoT, Applica-tions
References: 1. T. M. Fernández-Caramés, P. Fraga-Lamas.: A Review on the Use of Blockchain for the Internet of Things. IEEE Access (6),
32979-33001 (2018). https://doi.org/10.1109/ACCESS.2018.2842685
2. Ioannis Andrea, Chrysostomos Chrysostomou, George Hadjichristofi. Internet of Things: Security vulnerabilities and challenges. In: IEEE Symposium on Computers and Communication (ISCC), pp. 180-187. IEEE, Larnaca, Cyprus (2015).
https://doi.org/10.1109/iscc.2015.7405513
3. Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, Dechao Qiu.: Security of the Internet of Things: Perspec-tives and Challenges. Wireless Networks 20(8), 2481–2501 (2014). https://doi.org/10.1007/s11276-014-0761-7
4. Heng Hou.: The Application of Blockchain Technology in E-Government in China. In: 26th International Con-ference on Computer
Communication and Networks (ICCCN), pp. 1-4. IEEE, Vancouver, BC, Canada (2017). https://doi.org/10.1109/ICCCN.2017.8038519 5. Abid Sultan, Muhammad Sheraz Arshad Malik, Azhar Mushtaq.: Internet of Things Security Issues and Their Solutions with
Blockchain Technology Characteristics: A Systematic Literature Review. Am J Compt Sci Inform Technol 6(3), 1-5 (2018).
https://doi.org/10.21767/2349-3917.100027 6. Arshdeep Bahga, Vijay Madisetti.: Blockchain Applica-tions: A Hands-On Approach. 1st edn. VPT, Delhi (2017).
7. Daniel Drescher.: Blockchain Basics: A Non-Technical Introduction in 25 Steps. 1st edn. Apress, Germany (2017).
8. Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, Huaimin Wang.: An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In: IEEE International Congress on Big Data (BigData Congress), pp. 557-564. IEEE, Honolulu, HI, USA
(2017). https://doi.org/10.1109/BigDataCongress.2017.85
9. Svein Ølnes.: Beyond Bitcoin Enabling Smart Govern-ment Using Blockchain Technology. In: H.J. Scholl et al. (eds.) EGOV 2016, LNCS 9820, pp. 253–264. Springer, Switzerland (2016).
10. Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, Xiwei Xu.: Comparing Block-chain and Cloud
Services for Business Process Execution. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 257-260. IEEE, Gothenburg, Sweden (2017). https://doi.org/10.1109/ICSA.2017.44
11. Lakshmi Siva Sankar, M. Sindhu, M. Sethumadhavan.: Survey of consensus protocols on blockchain applica-tions. In: 4th
International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 250-255. IEEE, Coimbatore, India (2017). https://doi.org/10.1109/ICACCS.2017.8014672
12. Quoc Khanh Nguye.: Blockchain - A Financial Technol-ogy for Future Sustainable Development. In: 3rd Inter-national
Conference on Green Technology and Sustain-able Development (GTSD), pp. 51-54. IEEE, Kaohsiung, Taiwan (2016). https://doi.org/10.1109/GTSD.2016.22
13. Ashiq Anjum, Manu Sporny, Alan Sill.: Blockchain Standards for Compliance and Trust. IEEE Cloud Com-puting 4(4), 84-90
(2017). https://doi.org/10.1109/MCC.2017.3791019
14. Coin Sutra Homepage, https://coinsutra.com/different-types-blockchains/, last accessed 2019/03/26.
15. Xin Wang, Libo Feng, Hui Zhang , Chan Lyu, Li Wang, Yue You.: Human Resource Information Management Model based on
Blockchain Technology. In: IEEE Sym-posium on Service-Oriented System Engineering (SOSE), pp. 168-173. IEEE, San Francisco, CA, USA (2017). https://doi.org/10.1109/SOSE.2017.34
16. Qun Lin, Hongyang Yan, Zhengan Huang, Wenbin Chen, Jian Shen, Yi Tang .: An ID-Based Linearly Homomor-phic Signature
Scheme and Its Application in Block-chain. IEEE Access (6), 20632 - 20640 (2018). https://doi.org/10.1109/ACCESS.2018.2809426 17. Seyoung Huh, Sangrae Cho, Soohyung Kim.: Managing IoT devices using blockchain platform. In: 19th Interna-tional Conference
on Advanced Communication Tech-nology (ICACT), pp. 464-467. IEEE, Bongpyeong, South Korea (2017).
https://doi.org/10.23919/ICACT.2017.7890132 18. Block Chain Homepage, https://blockchain.wtf/what-the-faq/blockchain-cryptocurrency-difference/, last ac-cessed 2019/03/26.
19. The Motley Fool. https://www.fool.com/investing/general/2015/02/06/17-internet-of-things-statistics-you-dont-know.aspx, last ac-
cessed 2019/03/26. 20. New Gen Apps. https://www.newgenapps.com/blog/iot-statistics-internet-of-things-future-research-data, last ac-cessed 2019/03/26.
21. Forbes. https://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers-market-estimates-and-
forecasts/#1050cf63b919, last accessed 2019/03/26. 22. Intel. https://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html, last accessed 2019/03/26.
23. Arshdeep Bahga, Vijay Madisetti.: Internet of Things: A Hands-On Approach. 1st edn. Universities Press, Delhi (2014).
24. Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash.: Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys & Tu-torials 17(4), 2347 - 2376 (2015).
https://doi.org/10.1109/COMST.2015.2444095 25. Zheng, S., Apthorpe, N., Chetty, M. and Feamster, N.: User Perceptions of Smart Home IoT Privacy. In: Pro-ceedings of the ACM
on Human-Computer Interaction. ACM, 2(CSCW), pp. 1-20. IEEE, New York, NY, USA (2018). https://doi.org/10.1145/3274469
26. Siboni, S., Shabtai, A., Tippenhauer, N. O., Lee, J., Elovici, Y.: Advanced Security Testbed Framework for Wearable IoT Devices. In: CM Transactions on Internet Technolo-gy, pp. 1-25. ACM, New York, NY, USA (2018). https://doi.org/10.1145/2981546
27. Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese.: Future scenarios and challenges for securi-ty and privacy. In:
IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), pp. 28-36. IEEE, Bologna, Italy (2016). https://doi.org/10.1109/RTSI.2016.7740625
28. Meredydd Williams, Jason R. C. Nurse, Sadie Creese.: Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-
Things. In: 15th Annual Conference on Privacy, Security and Trust (PST), pp. 181-190. Calgary, AB, Canada (2017). https://doi.org/10.1109/PST.2017.00029
29. Ching K. W., Singh M. M.: Wearable Technology Devic-es Security and Privacy Vulnerability Analysis. Interna-tional Journal of
Network Security & Its Applications (IJNSA) 8(3), 25-32 (2018). https://doi.org/10.5121/ijnsa.2016.8302 30. Wencheng Sun, Zhiping Cai, Fang Liu, Shengqun Fang, Guoyan Wang.: A survey of data mining technology on electronic medical
records. In: 19th International Con-ference on e-Health Networking, Applications and Ser-vices (Healthcom), pp. 205-220. Dalian, China
(2017). https://doi.org/10.1109/ HealthCom.2017.8210774 31. The Federal Trade Commission. https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-
november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf, last accessed 2019/03/26.
32. Seyoung Huh, Sangrae Cho, Soohyung Kim.: Managing IoT devices using blockchain platform. In: 19th Interna-tional Conference on Advanced Communication Tech-nology (ICACT), pp. 464-467. IEEE, Bongpyeong, South Korea (2017).
https://doi.org/10.23919/ICACT.2017.7890132
33. Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gaurav-aram.: Blockchain for IoT security and privacy: The case study of a smart home. In: International Confer-ence on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 235-240. IEEE,
Kona, HI, USA (2017). https://doi.org/10.1109/PERCOMW.2017.7917634
34. Mayra Samaniego, Ralph Deters.: Blockchain as a Ser-vice for IoT. In: International Conference on Internet of Things (iThings) and IEEE Green Computing and Com-munications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), pp. 433-436. IEEE, Chengdu, China (2017). https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102
35. Oscar Novo.: Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet of Things Journal 5(2), 1184 - 1195 (2018). https://doi.org/10.1109/JIOT.2018.2812239
36. Ali Dorri, Salil S. Kanhere, Raja Jurdak.: Towards an Op-timized BlockChain for IoT. In: Second International Conference on
Internet-of-Things Design and Implemen-tation (IoTDI), pp. 173-178. IEEE, Pittsburgh, PA, USA (2017).
https://doi.org/10.1145/3054977.3055003
37. Chun-Feng Liao, Sheng-Wen Bao, Ching-Ju Cheng, Kung Chen.: On design issues and architectural styles for blockchain-driven
IoT services. In: International Con-ference on Consumer Electronics - Taiwan (ICCE-TW), pp. 351-353. IEEE, Taipei, Taiwan (2017). https://doi.org/10.1109/ICCE-China.2017.7991140
38. Cheng Li, Liang-Jie Zhang.: A Blockchain Based New Secure Multi-Layer Network Model for Internet of Things. In: International
Congress on Internet of Things (ICIOT), pp. 33-41. IEEE, Taipei, Taiwan (2017). https://doi.org/10.1109/IEEE.ICIOT.2017.34 39. Alexandru Stanciu.: Blockchain Based Distributed Con-trol System for Edge Computing. In: 21st International Conference on
Control Systems and Computer Science (CSCS), pp. 667-671. IEEE, Bucharest, Romania (2017). https://doi.org/10.1109/CSCS.2017.102
40. Elena Karafiloski, Anastas Mishev.: Blockchain solutions for big data challenges: A literature review. In: 17th In-ternational Conference on Smart Technologies (EUROCON), pp. 763-768. IEEE, Ohrid, Macedoniaa (2017).
https://doi.org/10.1109/EUROCON.2017.8011213
41. Ana Reyna, Cristian & Martín, Jaime Chen, Enrique Sol-er, Manuel Díaz.: BOn blockchain and its integration with IoT- Challenges and opportunities. Future Genera-tion Computer Systems 88(1), 173-190 (2018). https://doi.org/10.1016/j.future.2018.05.046
42. Chain of Things. https://www.chainofthings.com/, last accessed 2019/03/26.
43. Trusted IoT Alliance. https://www.trusted-iot.org/, last accessed 2019/03/26. 44. Postcapes. https://www.postscapes.com/blockchains-and-the-internet-of-things/, last accessed 2019/03/26.
45.
Authors: Aditya Tandon
Paper Title: Challenges of Integrating Blockchain with Internet of Things
Abstract— There is no doubt that Internet of Things (IoT) and blockchain technology will a major
impact in the automated futuristic world. Even though the usage of IoT is increasing rapidly, it is riddled
with scalability, security, privacy and integrity issues. Even though blockchain was initially created for
managing cryptocurrencies, its decentralised nature, higher security, integrity and privacy has led to being
integrated with IoT in order to improve it. There are multiple challenges arising from this integration which
increases the complexities. It is necessary to study these challenges involved in this integration before
carrying it out. Hence, this paper has carried out a systematic study of the various challenges involved in
IoT individually and also the advantages and challenges of integrating it with the blockchain system.
Keywords— Blockchain, IoT, challenges, security, integration
References:
[1] N. Kshetri, “Can Blockchain Strengthen the Internet of Things?,” IT Prof., vol. 19, no. 4, pp. 68–72, 2017.
[2] H. Orman, “Blockchain: the Emperors New PKI?,” IEEE Internet Comput., vol. 22, no. 2, pp. 23–28, Mar. 2018.
[3] Satoshi Nakamoto, “Bitcoin Whitepaper,” Satoshi Nakamoto, 2019. .
[4] R. Henry, A. Herzberg, and A. Kate, “Blockchain Access Privacy: Challenges and Directions,” IEEE Secur. Priv., vol. 16, no. 4, pp.
38–45, Jul. 2018.
[5] V. Buterin, “A Next Generation Smart Contract and Decentralized Application Platform,” Ethereum, 2014. .
[6] G. Wood, “Ethereum: A Secure Decentralised Generalised Transaction Ledger,” gavwood, 2017. .
[7] Cardano, “What Is Cardano?,” cardano, 2019. .
[8] F. Casino, T. K. Dasaklis, and C. Patsakis, “A systematic literature review of blockchain-based applications: Current status,
classification and open issues,” Telemat. Informatics, vol. 36, pp. 55–81, Mar. 2019.
[9] X. Wang et al., “Survey on blockchain for Internet of Things,” Comput. Commun., vol. 136, pp. 10–29, Feb. 2019.
[10] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito, “Blockchain and IoT Integration: A Systematic Survey,” Sensors, vol.
18, no. 8, p. 2575, Aug. 2018.
[11] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. .
[12] Coindesk, “How do Bitcoin Transactions Work?,” Coindesk, 2018. .
[13] O. Wyman, “Blockchain in capital markets,” 2016. .
[14] M. Swan, “Blockchain,” O’Reilly Media, 2015. .
[15] F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies,” IEEE Commun.
Surv. Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.
[16] Bitcoin, “Bitcoin Developer Guide,” Bitcoin, 2017. .
[17] R. C. Merkle, “Protocols for Public Key Cryptosystems,” in 1980 IEEE Symposium on Security and Privacy, 1980, pp. 122–122.
363-367
[18] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies: A Comprehensive
Introduction. Princeton: Princeton University Press, 2016.
[19] M. Apostolaki, A. Zohar, and L. Vanbever, “Hijacking Bitcoin: Routing Attacks on Cryptocurrencies,” in 2017 IEEE Symposium on
Security and Privacy (SP), 2017, pp. 375–392.
[20] W. Mougayar, The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. New Jersey: John
Wiley and Sons, 2016.
[21] M. Iansiti and K. R. Lakhani, “The truth about blockchain,” Harv. Bus. Rev., vol. 95, no. 1, pp. 118–127, 2017.
[22] Y. Lu, “The blockchain: State-of-the-art and research challenges,” J. Ind. Inf. Integr., Apr. 2019.
[23] D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, “Internet of things security: A top-down survey,” Comput. Networks, vol. 141, pp.
199–221, Aug. 2018.
[24] N. M. Kumar and P. K. Mallick, “Blockchain technology for security issues and challenges in IoT,” Procedia Comput. Sci., vol. 132,
pp. 1815–1823, 2018.
[25] Fabric, “Join GitHub today,” GitHub, Inc, 2019. .
[26] Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kondoz, “Privacy-preserving blockchain based IoT ecosystem
using attribute-based encryption,” in 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems
(ANTS), 2017, pp. 1–6.
[27] A. Dorri, S. Kanhere, and R. Jurdak, “Towards an Optimized BlockChain for IoT,” in 2017 IEEE/ACM Second International
Conference on Internet-of-Things Design and Implementation (IoTDI), 2017.
[28] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,”
in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2017, pp.
618–623.
[29] G. Yang and C. Li, “A Design of Blockchain-Based Architecture for the Security of Electronic Health Record (EHR) Systems,” in
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2018, pp. 261–265.
[30] L. Mertz, “(Block) Chain Reaction: A Blockchain Revolution Sweeps into Health Care, Offering the Possibility for a Much-Needed
Data Solution,” IEEE Pulse, vol. 9, no. 3, pp. 4–7, May 2018.
[31] D. Cohen, S. Keller, G. Hayes, D. Dorr, J. Ash, and D. Sittig, “Integrating patient-generated health data into clinical care settings or
clinical decision-making: Lessons learned from project HealthDesign,” JMIR Hum Factors, 2016.
[32] A. E. Chung et al., “Harnessing person-generated health data to accelerate patient-centered outcomes research: the Crohn’s and
Colitis Foundation of America PCORnet Patient Powered Research Network (CCFA Partners),” J. Am. Med. Informatics Assoc., vol.
23, no. 3, pp. 485–490, May 2016.
[33] E. Joffe et al., “Optimized dual threshold entity resolution for electronic health record databases--training set size and active
learning,” AMIA ... Annu. Symp. proceedings. AMIA Symp., vol. 2013, pp. 721–30, 2013.
[34] W. J. Gordon and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,”
Comput. Struct. Biotechnol. J., vol. 16, pp. 224–230, 2018.
[35] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A Survey on Enabling Technologies,
Protocols, and Applications,” IEEE Commun. Surv. Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
[36] D. Evans, “The internet of things: How the next evolution of the internet is changing everything,” Cisco, 2011. .
[37] S. Sicari, A. Rizzardi, D. Miorandi, and A. Coen-Porisini, “Internet of Things: Security in the Keys,” in Proceedings of the 12th ACM
Symposium on QoS and Security for Wireless and Mobile Networks - Q2SWinet ’16, 2016, pp. 129–133.
[38] Internet Society, “The Internet of Things: An Overview: Understanding the Issues and Challenges of a More Connected World,”
Internet Society, 2015. .
[39] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain and its integration with IoT. Challenges and opportunities,”
Futur. Gener. Comput. Syst., vol. 88, pp. 173–190, Nov. 2018.
[40] M. Díaz, C. Martín, and B. Rubio, “State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud
computing,” J. Netw. Comput. Appl., vol. 67, pp. 99–117, May 2016.
[41] J. C. Buzby and T. Roberts, “The Economics of Enteric Infections: Human Foodborne Disease Costs,” Gastroenterology, vol. 136,
no. 6, pp. 1851–1862, May 2009.
[42] H. Malviya, “How Blockchain will Defend IOT,” SSRN, 2016. .
[43] P. Veena, S. Panikkar, S. Nair, and P. Brody, “Empowering the edge-practical insights on a decentralized internet of things,” 2015.
[44] S. Gan, “An IoT simulator in NS3 and a key-based authentication architecture for IoT devices using blockchain,” Kanpur, 2017.
[45] Blockchain of Things, “The Ultimate Blockchain Technology,” 2017. .
[46] Filament, “Filaments’ blockchain technology creates new value for today’s businesses,” Filament, 2019. .
[47] Modum, “Next Generation Supply Chain Automation and Intelligence: Trusted digital ecosystems powered by IoT Sensing and
blockchain,” 2017. .
[48] G. Prisco, “Slock, it to Introduce Smart Locks Linked to Smart Ethereum Contracts, Decentralize the Sharing Economy,” BTC, 2019.
.
[49] M. Samaniego and R. Deters, “Hosting Virtual IoT Resources on Edge-Hosts with Blockchain,” in 2016 IEEE International
Conference on Computer and Information Technology (CIT), 2016, pp. 116–119.
[50] LO3Energy, “Reshaping The Energy Future,” 2018. .
[51] Aigang, “Android device dataset,” 2017. .
[52] Mybit, “Leaders in Distributing Wealth,” 2017. .
[53] M. Aazam and E.-N. Huh, “Fog Computing and Smart Gateway Based Communication for Cloud of Things,” in 2014 International
Conference on Future Internet of Things and Cloud, 2014, pp. 464–470.
[54] Ethembedded, “Ethereum Computer Built On Embedded Devices,” Ethembedded, 2017. .
[55] Raspnode, “DIY Raspberry Pi Cryptocurrency Node,” Raspnode, 2017. .
[56] K. Wüst and A. Gervais, “Do you need a blockchain?,” IACR Cryptol. EPrint Arch., 2017.
[57] Trusted IoT Alliance, “Securing IoT Products With Blockchain,” 2017. .
[58] Bitmain, “Ant Router R1-LTC The WiFi router that mines Litecoin,” Bitmain, 2017. .
[59] Ethraspbian, “Ethraspbian custom Image for NANOPC-T4,” 2017. .
[60] I. Eyal, A. E. Gencer, E. G. Sirer, and R. van Renesse, “Bitcoin-NG: A Scalable Blockchain Protocol,” in 13th USENIX Symposium
on Networked Systems Design and Implementation (NSDI ’16) is sponsored by USENIX, 2016, pp. 1–16.
[61] R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges,”
Futur. Gener. Comput. Syst., vol. 78, pp. 680–698, Jan. 2018.
[62] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput.
Networks, vol. 57, no. 10, pp. 2266–2279, Jul. 2013.
[63] J. Lopez, R. Rios, F. Bao, and G. Wang, “Evolving privacy: From sensors to the Internet of Things,” Futur. Gener. Comput. Syst.,
vol. 75, pp. 46–57, Oct. 2017.
[64] M. Banerjee, J. Lee, and K.-K. R. Choo, “A blockchain future for internet of things security: a position paper,” Digit. Commun.
Networks, vol. 4, no. 3, pp. 149–160, Aug. 2018.
[65] I. Makhdoom, M. Abolhasan, H. Abbas, and W. Ni, “Blockchain’s adoption in IoT: The challenges, and a way forward,” J. Netw.
Comput. Appl., vol. 125, pp. 251–279, Jan. 2019.
[66] L. Touati, Y. Challal, and A. Bouabdallah, “C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of
Things,” in 2014 International Conference on Advanced Networking Distributed Systems and Applications, 2014, pp. 64–69.
[67] N. Oualha and K. T. Nguyen, “Lightweight Attribute-Based Encryption for the Internet of Things,” in 2016 25th International
Conference on Computer Communication and Networks (ICCCN), 2016, pp. 1–6.
[68] F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CP-ABE With Constant-Size Keys for Lightweight Devices,” IEEE
Trans. Inf. Forensics Secur., vol. 9, no. 5, pp. 763–771, May 2014.
[69] X. Yao, Z. Chen, and Y. Tian, “A lightweight attribute-based encryption scheme for the Internet of Things,” Futur. Gener. Comput.
Syst., vol. 49, pp. 104–112, Aug. 2015.
[70] J. Su, D. Cao, B. Zhao, X. Wang, and I. You, “ePASS: An expressive attribute-based signature scheme with privacy and an
unforgeability guarantee for the Internet of Things,” Futur. Gener. Comput. Syst., vol. 33, pp. 11–18, Apr. 2014.
[71] D. Thatmann, S. Zickau, A. Forster, and A. Kupper, “Applying Attribute-Based Encryption on Publish Subscribe Messaging Patterns
for the Internet of Things,” in 2015 IEEE International Conference on Data Science and Data Intensive Systems, 2015, pp. 556–563.
[72] W. Chen, “An IBE-based security scheme on Internet of Things,” in 2012 IEEE 2nd International Conference on Cloud Computing
and Intelligence Systems, 2012, pp. 1046–1049.
[73] Y. Mao, J. Li, M.-R. Chen, J. Liu, C. Xie, and Y. Zhan, “Fully secure fuzzy identity-based encryption for secure IoT
communications,” Comput. Stand. Interfaces, vol. 44, pp. 117–121, Feb. 2016.
[74] D. Evans and D. M. Eyers, “Efficient Data Tagging for Managing Privacy in the Internet of Things,” in 2012 IEEE International
Conference on Green Computing and Communications, 2012, pp. 244–248.
[75] R. Zhang, Y. Zhang, and K. Ren, “Distributed Privacy-Preserving Access Control in Sensor Networks,” IEEE Trans. Parallel
Distrib. Syst., vol. 23, no. 8, pp. 1427–1438, Aug. 2012.
[76] A. Alcaide, E. Palomar, J. Montero-Castillo, and A. Ribagorda, “Anonymous authentication for privacy-preserving IoT target-driven
applications,” Comput. Secur., vol. 37, pp. 111–123, Sep. 2013.
[77] X. Huang, R. Fu, B. Chen, and T. Zhang, “User interactive internet of things privacy preserved access control,” in in: 2012
International Conference for Internet Technology And Secured Transactions, 2012, pp. 597–602.
[78] A. F. Skarmeta, J. L. Hernandez-Ramos, and M. V. Moreno, “A decentralized approach for security and privacy challenges in the
Internet of Things,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014, pp. 67–72.
[79] S. Tonyali, O. Cakmak, K. Akkaya, M. M. E. A. Mahmoud, and I. Guvenc, “Secure Data Obfuscation Scheme to Enable Privacy-
Preserving State Estimation in Smart Grid AMI Networks,” IEEE Internet Things J., vol. 3, no. 5, pp. 709–719, Oct. 2016.
[80] Y. Maleh, A. Ezzati, and M. Belaissaoui, “DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things,” in
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies - BDAW ’16, 2016, pp. 1–7.
[81] P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, “Denial-of-Service detection in 6LoWPAN based Internet of Things,” in
2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, pp.
600–607.
[82] F. M. de Almeida, A. de R. Ribeir, E. . Moreno, and C. A. Montesco, “Performance evaluation of an artificial neural network
multilayer perceptron with limited weights for detecting denial of service attack on internet of things,” in AICT 2016 : The Twelfth
Advanced International Conference on Telecommunications, 2016.
[83] P. Machaka, A. McDonald, F. Nelwamondo, and A. Bagula, “Using the Cumulative Sum Algorithm Against Distributed Denial of
Service Attacks in Internet of Things,” in ICCASA 2015: Context-Aware Systems and Applications, Springer, 2016, pp. 62–72.
[84] D. Shreenivas, S. Raza, and T. Voigt, “Intrusion Detection in the RPL-connected 6LoWPAN Networks,” in Proceedings of the 3rd
ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS ’17, 2017, pp. 31–38.
[85] T. Hardjono and N. Smith, “Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains,” in Proceedings
of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS ’16, 2016, pp. 29–36.
[86] K. Gaurav, P. Goyal, V. Agrawal, and S. Rao, “Iot transaction security,” in 8th International Conference on the Internet of Things,
2015.
[87] S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, “World of Empowered IoT Users,” in 2016 IEEE First International
Conference on Internet-of-Things Design and Implementation (IoTDI), 2016, pp. 13–24.
[88] E. Kokoris-Kogias, L. Gasser, I. Khoffi, P. Jovanovic, N. Gailly, and B. Ford, “Managing Identities Using Blockchains and CoSi,”
2016. .
[89] K. Biswas and V. Muthukkumarasamy, “Securing Smart Cities Using Blockchain Technology,” in 2016 IEEE 18th International
Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd
International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016, pp. 1392–1393.
[90] O. Flauzac, C. Gonzalez, A. Hachani, and F. Nolot, “SDN Based Architecture for IoT and Improvement of the Security,” in 2015
IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, 2015, pp. 688–693.
[91] P. Bull, R. Austin, E. Popov, M. Sharma, and R. Watson, “Flow Based Security for IoT Devices Using an SDN Gateway,” in 2016
IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 2016, pp. 157–163.
[92] C. Vandana, “Security improvement in iot based on software defined networking,” Int. J. Sci. Eng. Technol ogy Res., vol. 5, no. 1, pp.
291–295, 2016.
[93] C. Gonzalez, S. M. Charfadine, O. Flauzac, and F. Nolot, “SDN-based security framework for the IoT in distributed grid,” in 2016
International Multidisciplinary Conference on Computer and Energy Science (SpliTech), 2016, pp. 1–5.
[94] P. Ruckebusch, E. De Poorter, C. Fortuna, and I. Moerman, “GITAR: Generic extension for Internet-of-Things ARchitectures
enabling dynamic updates of network and application modules,” Ad Hoc Networks, vol. 36, pp. 127–151, Jan. 2016.
[95] A. Taherkordi, F. Loiret, R. Rouvoy, and F. Eliassen, “Optimizing Sensor Network Reprogramming via In-situ Reconfigurable
Components,” ACM Trans. Sens. Networks, vol. 9, no. 2, pp. 1–38, 2013.
[96] M. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener. Comput. Syst., 2018.
[97] C. Fernandez-Gago, F. Moyano, and J. Lopez, “Modelling trust dynamics in the Internet of Things,” Inf. Sci. (Ny)., vol. 396, pp. 72–
82, Aug. 2017.
[98] C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, and J. Chen, “MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree
Based Secure Public Auditing for Dynamic Big Data Storage on Cloud,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2609–2622, Sep.
2015.
[99] C. Liu, C. Yang, X. Zhang, and J. Chen, “External integrity verification for outsourced big data in cloud and IoT: A big picture,”
Futur. Gener. Comput. Syst., vol. 49, pp. 58–67, Aug. 2015.
[100] C. Wang, Q. Wang, and K. Ren, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM,
2010 Proceedings IEEE, 2010.
[101] V. Sapovadia, “Legal Issues in Cryptocurrency,” in Handbook of Digital Currency, Elsevier, 2015, pp. 253–266.
[102] R. Böhme, N. Christin, B. Edelman, and T. Moore, “Bitcoin: Economics, Technology, and Governance,” J. Econ. Perspect., vol. 29,
no. 2, pp. 213–238, May 2015.
[103] R. Anderson, “Making Bitcoin Legal (Transcript of Discussion),” in Cambridge International Workshop on Security Protocols,
Springer, 2018, pp. 254–265.
[104] A. Khanna, “Information Technology Act, 2000: International Perspective with special reference to Bitcoin,” Natl. J. Cyber Secur.
Law, vol. 1, no. 1, 2018.
[105] R. Dorbala, O. Gautam, S. Pullabhatla, and G. N. P. V Babu, “The Orphaned Status of Cryptocurrencies in India,” ZENITH Int. J.
Multidiscip. Res., vol. 8, no. 10, pp. 364–374, 2018.
46.
Authors: Anika Zafiah M. Rus, Nur Munirah Abdullah, M. F. L. Abdullah
Paper Title: Segmented Phase of Ultraviolet (UV) Curable Thermoset Polyurethanes-Graphite (TPU-G) Composites
Abstract: Segmented thermoset polymeric materials properties mainly classified through its carbonyl
hydrogen bonding. The addition of graphite particle loading in polymeric materials tailored the functional
characteristic of the composites. Therefore, the carbonyl hydrogen bonding in the hard segments of the
synthesized segmented ultraviolet (UV) curable thermoset polyurethanes-graphite (TPU-G) composites was
identified. This composites based green polymer incorporated with varying graphite particles loading were
prepared through slip casting method which cure upon UV light. These result in an enhancement of the
carbonyl hydrogen bonding which tribute to degree of phase separation (DPS %) in the TPU-G composites
ranged from 10-20%, as compared to that in the pure TPU. In addition, the spectroscopy detects the
formation of carbonyl hydrogen groups within the TPU-G composites although they are prone to chain
scission and undergo photo oxidation subjected to ultraviolet (UV) curing. Upon UV curing, higher graphite
weight loading (TPU-G20, TPU-G25 and TPU-G30 composites), shows higher and stable DPS% value,
attribute to soft segment- soft segment and hard segment- hard segment establishment. Therefore, the
graphite particles dominantly absorb the incident radiation instead of thermoset polyurethane without
changing its based.
Index Terms: Thermoset polyurethane, graphite, segmented phase, ultraviolet curing, carbonyl hydrogen index.
References:
363-367
[1] S. Li, C. Xu, W. Yang, Q. Tang, Thermoplastic Polyurethanes Stemming From Castor Oil : Green Synthesis And Their Application In
Wood Bonding, Coatings. 7 (2017) 10.
[2] M. Kurańska, U. Cabulis, M. Auguścik, A. Prociak, J. Ryszkowska, M. Kirpluks, Bio-Based Polyurethane-Polyisocyanurate Composites
With An Intumescent Flame Retardant, Polym. Degrad. Stab. 127 (2015).
[3] H. Kim, Y. Miura, C.W. Macosko, Graphene/Polyurethane Nanocomposites For Improved Gas Barrier And Electrical Conductivity, Chem.
Mater. 22 (2010) 3441–3450.
[4] E. Sancaktar, L. Bai, Electrically Conductive Epoxy Adhesives, Polymers (Basel). 3 (2011) 427–466.
[5] T.F. Garrison, M.R. Kessler, R.C. Larock, Effects Of Unsaturation And Different Ring-Opening Methods On The Properties Of Vegetable
Oil-Based Polyurethane Coatings, Polymer (Guildf). 55 (2014) 1004–1011. Doi:10.1016/J.Polymer.2014.01.014.
[6] C. Zhang, T.F. Garrison, S.A. Madbouly, M.R. Kessler, Progress In Polymer Science Recent Advances In Vegetable Oil-Based Polymers
And Their Composites, Prog. Polym. Sci. 71 (2017) 91–143.
[7] Y. Zhang, W. Li, W. Wang, Rsc Advances Pu / Pmma Composites Synthesized By Reaction- Induced Phase Separation : A General
Approach To Achieve A Shape Memory E Ff Ect †, Rsc Adv. 7 (2017) 33701–33707.
[8] A.Z.M. Rus, N.M. Abdullah, M.F.L. Abdullah, M.I.F. Idris, Graphite/Bio-Based Epoxy Composites: Structural, Optical And Electrical
Properties, Appl. Mech. Mater. 799–800 (2015) 153–157.
[9] A.Z.M. Rus, N.M. Abdullah, M.F.L. Abdullah, Interconnected Interface Enhanced Electrical Properties Of Graphite In Bio-Based Epoxy
From Insulating To Conductor Composites, Indian J. Sci. Technol. 8 (2015) 8–12.
[10] A.Z.M. Rus, N.M. Abdullah, M.F.L. Abdullah, M.I.F. Idris, Graphite/ Bio-Based Epoxy Composites: The Mechanical Properties Interface,
Appl. Mech. Mater. 799–800 (2015) 115–119.
[11] N.M. Abdullah, M.F.L. Abdullah, Mechanical Reinforcement Of Conductive Graphite / Biopolymer Thin Film Composite, Arpn J. Eng.
Appl. Sci. 10 (2015) 9772–9775.
[12] N.M. Abdullah, A.Z.M. Rus, M.F.L. Abdullah, Enhancement Of Graphite Functionality In Renewable Polymer Composite Properties, Int.
J. Eng. Technol. 7 (2018) 215–220.
[13] N. Munirah, A. Zafiah, M. Rus, M.F.L. Abdullah, Synergistic Influence Of Graphite On Biopolymer Composites Properties, J. Teknol. 77
(2015) 11–19.
[14] N.M. Abdullah, M.S. Kamarudin, A.Z.M. Rus, M.F.L. Abdullah, Preparation Of Conductive Polymer Graphite ( Pg ) Composites, Iop
Conf. Ser. Mater. Sci. Eng. 226 (2017).
[15] A.Z.M. Rus, N. Munirah Abdullah, M.F.L. Abdullah, Mechanical Behavior Of Ultra Violet (Uv) Curable Renewable Polymer/Graphite
(Pg), Indian J. Sci. Technol. 9 (2016) 1–4.
[16] A. Syafiq, A. Hazmi, Understanding Intrinsic Plasticizer In Vegetable Oil-Based Polyurethane Elastomer As Enhanced Biomaterial, J.
Therm. Anal. Calorim. (2017).
[17] K. Liu, B. He, L. Qian, J. Li, Conducting Graphite / Cellulose Composite Film As A Candidate For Chemical Vapor-Sensing Material,
Bioresources. 9 (2014) 5279–5289.
[18] D. Cai, K. Yusoh, M. Song, The Mechanical Properties And Morphology Of A Graphite Oxide Nanoplatelet/Polyurethane Composite,
Nanotechnology. 20 (2009) 85712.
[19] J. Vega-Baudrit, S.M. Carballo, L. De Adhesión, U. De Alicante, C. Rica, Thermoplastic Polyurethanes-Fumed Silica Composites :
Influence Of Nco / Oh In The Study Of Thermal And Rheological Properties And Morphological Characteristics, Thermoplast. - Compos.
Mater. (2012) 12–24.
[20] T. Xu, Uv-Curable Hybrid Polyurethanes, Master Of Science, 2014.
[21] S.I. Khan, A Study On Graphene Based Nanocomposite Coatings Subjected To Uv Degradation, Master Of Engineering, 2007.
[22] N. Rajagopalan, A.S. Khanna, Effect Of Methyltrimethoxy Silane Modification On Yellowing Of Epoxy Coating On Uv ( B ) Exposure, J.
Coatings. 2014 (2014) 7.
47.
Authors: Hanani Abdul Wahab, Anika Zafiah M. Rus, M. F. L. Abdullah, Nur Munirah Abdullah
Paper Title: Sound Absorption Coefficient and Water Content Responses in Acoustic Analysis Based on
Renewable Polyurethane Foam Composites
Abstract: In physiological health, negative effects are felt when unwanted noise is present. Given the
negative effects of the unwanted noise, it become important to examine how environmentally-friendly and
efficient sound absorbing materials could be developed. Some of the materials associated with acoustic
absorption properties entail polymer foams. Particularly, the foams aid in controlling noise. The central
purpose of this study was to examine renewable polymer (PU) foam composites’ aspects of moisture content
and acoustical properties. Four major parameters that were evaluated included the thickness of the sample,
the type of filler, the ratio of the fillers, and the nature of the monomer. A design of experiment (DoE)
technique was employed. To prepare the PUs foams, 28 mm and 100 mm were selected as diameters for the
cylindrical shapes on focus. Plotting the main effects was achieved through ANOVA, upon which variations
in the role and performance of the selected input factors were discerned. From the findings, it was
established that when bio-epoxy (B) was used in conjunction with renewable PU foams, the moisture content
was greater than the case involving petroleum based PU foam synthesis. Hence, renewable PU foam
composite is seen to be realized at 0.9, especially if the filler ratios and size are increased; with the
experimental conditions set at 3 kHz. Overall, the study established that the renewable Pus’ state of sound
absorption exhibits good agreement with the case of synthetic PU foam.
368-374
Index Terms: Acoustic; ANOVA; DoE; PU foams; Renewable
References: [1] L. Peng, B. Song, J. Wang, and D. Wang, “Mechanic and acoustic properties of the sound-absorbing material made from natural fiber and
polyester,” Adv. Mater. Sci. Eng., 2015.
[2] E. M. Samsudin, L. H. Ismail, and A. A. Kadir, “A review on physical factors influencing absorption performance of fibrous sound absorption material from natural fibers,” ARPN Journal of Engineering and Applied Sciences. 2016.
[3] S. Liu, W. Chen, and Y. Zhang, “Design optimization of porous fibrous material for maximizing absorption of sounds under set frequency bands,” Appl. Acoust., 2014.
[4] L. Egab, X. Wang, and M. Fard, “Acoustical characterisation of porous sound absorbing materials: a review,” Int. J. Veh. Noise Vib., 2014.
[5] S. Chen, X. Lu, T. Wang, and Z. Zhang, “Preparation and characterization of urea-formaldehyde resin/reactive kaolinite composites,” Particuology, 2016.
[6] S. Amares, E. Sujatmika, T. W. Hong, R. Durairaj, and H. S. H. B. Hamid, “A Review: Characteristics of Noise Absorption Material,” in Journal of Physics: Conference Series, 2017.
[7] R. Gayathri and R. Vasanthakumari, “Nanomaterials in PU Foam for Enhanced Sound Absorption at Low Frequency Region,” Adv. Mater. Res., 2014.
[8] J. G. Gwon, S. K. Kim, and J. H. Kim, “Sound absorption behavior of flexible polyurethane foams with distinct cellular structures,” Quat. Int., 2015.
[9] S. Adnan et al., “Development of Flexible Polyurethane Nanostructured Biocomposite Foams Derived from Palm Olein-Based Polyol,” Adv. Mater. Sci. Eng., 2016.
[10] S. Kormin, A. Z. M. Rus, and M. S. M. Azahari, “Preparation of polyurethane foams using liquefied oil palm mesocarp fibre (OPMF) and renewable monomer from waste cooking oil,” in AIP Conference Proceedings, 2017.
[11] A. Z. M. Rus, M. S. M. Azahari, S. Kormin, L. B. Soon, M. T. Zaliran, and M. L. F. Ahraz Sadrina, “Hybrid waste filler filled bio-polymer foam composites for sound absorbent materials,” in AIP Conference Proceedings, 2017.
[12] E. Papa et al., “Porosity and insulating properties of silica-fume based foams,” Energy Build., 2016.
[13] M. N. A. A. Nordin, L. M. Wan, M. H. Zainulabidin, A. S. M. Kassim, and A. M. Aripin, “Research finding in natural fibers sound absorbing material,” ARPN J. Eng. Appl. Sci., 2016.
[14] Y. Jiang, S. Chen, D. Wang, and J. Chen, “Multi-Objective Optimization of Acoustical Properties of PU-Bamboo-Chips Foam Composites,” Arch. Acoust., 2017.
[15] M. Barad, “Design of Experiments (DOE)—A Valuable Multi-Purpose Methodology,” Appl. Math., 2014.
[16] P. M. Murray, F. Bellany, L. Benhamou, D. K. Bučar, A. B. Tabor, and T. D. Sheppard, “The application of design of experiments (DoE) reaction optimisation and solvent selection in the development of new synthetic chemistry,” Organic and Biomolecular Chemistry. 2016.
[17] J. Y. Lau, M. H. T. Nguyen, W. Liang, and K. K. Tan, “Application of design of experiments to feature selection in ventilation tube applicator,” in IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society, 2015.
[18] Abd Wahab, Hanani, Anika Zafiah Mohd Rus, & M. Taufiq Zaliran. "Design of Experiment for In-Situ Synthesis of Waste Vegetable Oils and Synthetic Based Polyurethane (PU) Foam Composites." International Journal of Engineering & Technology [Online], 7.4.34 (2018): 413-416. Web. 7 Mar. 2019
[19] N. N. M. Hassan and A. Z. M. Rus, “Acoustic performance of green polymer foam from renewable resources after UV exposure,” Int. J. Automot. Mech. Eng., 2014.
[20] S. Bell, N. Boese, R. Bosma, M. Buzoianu, P. Carroll, V. Fernicola, E. Georgin, M. Heinonen, A. Kentved, C. Melvad and J. Nielsen, METefnet: developments in metrology for moisture in materials. 2015.
[21] N. Q. A. Adnan and A. Z. M. Rus, “Sound Absorption of Laminated BiopolymerFoam and Epoxy Foam,” Key Eng. Mater., vol. 594–595, pp. 291–295, 2014.
48.
Authors: Nesreen Ibrahim Awada, Fadillah Ismail
Paper Title: Happiness in the Workplace
Abstract: Recently, the United Arab Emirates (UAE) government has worked towards establishing a
national program for happiness and wellbeing. Workplace-related happiness has become a topic of interest
in today’s employment world. Administrators need to look at the ingredients within the recipe to address
happiness and happiness in an organization. However, in the Middle East Region, there is still the absence
of an empirical Islamic happiness scale which also encapsulates the spiritual and emotional wellness
element, employee happiness and performance in one scale. Also, empirical studies on employee spiritual
and emotional happiness at work are still lacking. Thus, the researcher will explore these ideas in greater
detail This paper reviews what is known about the definition, causes and consequences of happiness at
work, The interest in happiness has also extended to workplace experiences. drawing also on insights from
the expanding positive psychology literature on happiness in general. Happiness at work includes, but is far
more than, job satisfaction. A comprehensive measure of individual-level happiness might include work
engagement, job satisfaction, and effective organizational commitment. We will be focusing on happiness
Importance and Impact of Happiness at Work by highlighting the Advantages & Disadvantages.
Index Terms: Employee, Happiness, Management, Workplace
References:
169. Al Maktoum, M. B. R. (2017). Reflections on happiness & positivity. Dubai, UAE: Explorer Publishing.
170. Bader, H. A., Hashim, I. H., & Zaharim, N. M. (2013). Workplace friendships among bank employees in
Eastern Libya. Digest of Middle East Studies, 22(1), 94-116.
363-367
171. Dimitrov, D. (2012). Sources of meaningfulness in the workplace: A study in the US hospitality sector.
European Journal of Training and Development, 36(2/3), 351-371.
172. Hosie, P. J., & Sevastos, P. (2009). Does the “happy-productive worker” thesis apply to managers?
International Journal of Workplace Health Management, 2(2), 131-160.
173. Joo, B. K., & Lee, I. (2017). Workplace happiness: Work engagement, career satisfaction, and subjective
well-being. Evidence-based HRM: A Global Forum for Empirical Scholarship, 5(2), 206-221.
174. Liu, C. H., & Robertson, P. J. (2011). Spirituality in the workplace: Theory and measurement. Journal of
Management Inquiry, 20(1), 35-50.
175. Pawar, S. B. (2008). Two approaches to workplace spirituality facilitation: A comparison and
implications. Leadership & Organization Development Journal, 29(6), 544-567.
176. Petchsawang, P., & Duchon, D. (2009). Measuring workplace spirituality in an Asian context. Human
Resource Development International, 12(4), 459-468.
177. Samnani, A. K., & Singh, P. (2014). Performance-enhancing compensation practices and employee
productivity: The role of workplace bullying. Human Resource Management Review, 24(1), 5-16.
178. Thompson, G. M., & Goodale, J. C. (2006). Variable employee productivity in workforce scheduling.
European Journal of Operational Research, 170(2), 376-390.
49.
Authors:
Fedoseyeva Natalya Anatolyevna *, Sanova Zoya Sergeevna , Myshkina Maya Sergeevna, Kiselev
Leonid Yuryevich, Kiselyov Vladimir Leonidovich
Paper Title: Animals Breeding Efficiency According to the Phenotype of their Offspring
Abstract: The paper aims to identify the best animals with the optimal variant of selection traits in dairy
cattle breeding by studying the breeding and genetic parameters (M, m, σ, Cv, r) of the basic dairy and
reproductive traits of individuals and genetic groups, which make it possible to comprehensively assess the
breeding efficiency of animals according to the phenotype of their offspring. The paper justifies
characteristics of the seed bulls fixed for the breeding stock, and proposes basic principles of selection. The
range of evaluated traits was expanded – from milk productivity and reproductive qualities to health
indicators (longevity, somatic cell content in milk) and estimate of the animal body type (exterior). The
correlation coefficient (g) between fat and protein was not standard: when selecting animals with a high
content of protein in milk, only in 20% of cases the selected cows have a high level of fat.
Keywords: Breed; Genetic groups; Genetic potential; Genetic progress through selection; Productivity
References: 1. Amerkhanov Kh A (2017). Status and development of dairy cattle breeding in the Russian Federation [Состояние и развитие
молочного скотоводства в Российской Федерации]. Dairy and Beef Cattle Breeding 1: 2-5. (in Russian)
2. Beever D E (2006). The impact of controlled nutrition during the dry period on dairy cow health, fertility and performance. Animal
Reproduction Science 96: 212-226.
3. Gaworski M & Rocha A G F (2016). Effect of management practices on time spent by cows in waiting area before milking. In
Engineering for Rural Development: 15th International Scientific Conference Proceedings: Vol. 15. Jelgavas Tipogrāfija, Jelgava, Latvia, pp.
1300-1304.
4. Hayes B (2013). 1000 Bull genomes Consortium. The 1000 Bull Genomes project-toward genomic selection from whole
genomesequence data in dairy and beef cattle. In: B Hayes, H D Daetwyler. R Fries & B Guldbrandtsen (Eds), Proceedings of Plant and Animal Genome XXI Conference. Wageningen, San Diego, USA, W150.
5. Igna V, Moje A, Mircu C, Roman M, Ghiurca C, Casalean D, & Cernescu H (2010). The influence of some environmental factors and age on semen production of fleckvieh bulls. Lucrari Stiinlifice Medicina Veterinara XLIII (2): 57-63
6. Lawlor T (2012, January 21). Haplotypes impacting fertility. In: Holstein USA 2012. All Breeds Convention, Syracuse, NY, USA, pp. 1-41.
7. Phillips C J C (1993). Cattle Behaviour. Farming Press Books, Ipswich, England.
8. Rodriguez S M, Florins A, Gillet N, de Brogniez A, Sanchez-Alcara M-T., Boxus M, Boulanger F, Gutierrez G, Trono K, Alvarez I,
Vagnoni L, & Willems L (2011). Preventive and therapeutic strategies for bovine leukemia virus: Lessons for HTLV. Viruses 3: 1210-1248.
9. Saksa, E. I. (2018). The effectiveness of the use of bulls, evaluated by different methods, in the improvement of highly productive
herds. Dairy and Beef Cattle Breeding 1: 5-9.
10. Saragusty J (2011). Current progress in oocyte and embryo cryopreservation by slow freezing and vitrification. Reproduction 141:
1-19.
11. Selex Program, Database of the Dairy Cattle (2018). In: Regional Center for Information Support of Livestock Breeding in the
Leningrad Region "PLINOR", Informational and Analytical System "SELEX". Retrieved from http://plinor.spb.ru/index.php?l=0&p=3
12. Sørensen L P, Bjerring M & Løvensdahl P (2016). Monitoring individual cow udder health in automated milking systems using online somatic cell counts. Journal of Dairy Science 99 (1): 608-620.
13. Statistical indicators (2012). Breeding value estimation of milk production traits with test-day model. Manual CRV, Chapter E7.
363-367
Retrieved on February, 2019 from https://www.crv4all-international.com/wp-content/uploads/2016/03/E-7-milk-production.pdf
14. Stelvagen K (2001). Effect of milking frequency on mammary functioning and shape of the lactation curve. Journal of Dairy
Science 84: 204-211.
15. Vajta G (2012). Vitrification in human and domestic animal embryology: work in progress. Reproduction, Fertility and
Development 25: 719-727.
50.
Authors: Dr. Alka Maurya
Paper Title: 'Solve for India, Solve for the World’: Strategies of India to lead with new age disruptive technologies
Abstract: New age technologies like Blockchain, Artificial Intelligence, Data Analytics, Internet of Things,
Cloud Computing, Data Analytics, also known as Industry 4.0 has become integral part of business
organizations in developed countries. India along with other developing countries is also in the race to adopt
these new disruptive technologies to bring in more efficiencies in the business processes. Though India was
late to get into the 4IR wagon but it is trying hard to catch up with the major players globally.
Establishment of Center for the Fourth Industrial Revolution, by World Economic Forum is a major
achievement of the Government of India to catch up with the other countries globally, but there are several
challenges which needs to addressed simultaneously, This paper focus on the level of adoption of these
technologies in India, future prospects and the challenges being faced in successful adoption of these
technologies.
Keywords: Industry 4.0, Blockchain, Artificial Intelligence, Data Analytics, Internet of Things, World Economic
Forum
References:
1. What is the fourth industrial revolution?, (2016), Available at,
https://www.weforum.org/agenda/2016/01/what-is-the-fourth-industrial-revolution/
2. Venkatesan Ravi, Is India ready for the fourth industrial revolution? Live Mint, (September 2016), Available
at, https://www.livemint.com/Opinion/nWG88na6rgg72p07vV5tLN/Is-India-ready-for-the-fourth-industrial-
revolution.html
3. Shah Vijay, Industry 4.0: How India can build for the future, (2019), Available at,
http://www.forbesindia.com/blog/technology/industry-4-0-how-india-can-build-for-the-future/
4. Blockchain Market Shares, Market Strategies, and Market Forecasts, 2018 to 2024, WinterGreen Research,
Inc., (2018), Available at, https://www.ibm.com/downloads/cas/PPRR983X
5. Stewart Duncan, 3D printing growth accelerates again, (December 2018), Available at,
https://www2.deloitte.com/insights/us/en/industry/technology/technology-media-and-telecom-predictions/3d-
printing-market.html
6. Joshi Mansi, 3D printing in manufacturing: Where does India stand?, (April 2018), Available at,
https://www.computerworld.in/feature/3d-printing-manufacturing-where-does-india-stand
7. Prasad Rachita, 3D printing makes slow but steady inroads into industry, (June 2018), Available at,
economictimes.indiatimes.com/articleshow/64706881.cms?utm_source=contentofinterest&utm_medium=text
&utm_campaign=cppst
8. Executive Summary World Robotics 2018 Industrial Robots, Available at,
https://ifr.org/downloads/press2018/Executive_Summary_WR_2018_Industrial_Robots.pdf
9. How India is harnessing technology to lead the Fourth Industrial Revolution, (October 2018), World
Economic Forum, Available at
a. https://www.weforum.org/agenda/2018/10/how-india-is-harnessing-technology-to-lead-the-fourth-industrial-
revolution/
10. WEF launches Center for the Fourth Industrial Revolution in India, (October 2018), Times of India, Available
at, https://timesofindia.indiatimes.com/business/india-business/wef-launches-centre-for-fourth-industrial-
revolution-in-india/articleshow/66166216.cms
11. Incentives for green tech, AI likely in new industrial policy - The Hindu Business Line, 2018), Available at,
https://www.thehindubusinessline.com/economy/incentives-for-green-tech-ai-likely-in-new-industrial-
policy/article22789065.ece
12. Ministry of Electronics and Information Technology, Available at, https://meity.gov.in/content/internet-things
13. Gaur Seema, Shaping the future of manufacturing in India, (July 2017), Available at,
https://www.livemint.com/Opinion/mQqYAAL52lvVUqdIkeLTON/Shaping-the-future-of-manufacturing-in-
India.html
14. Smart Cities Mission, Available at, http://smartcities.gov.in/content/, https://www.pwc.com/us/en/library/4ir-
ready.html
15. Atal Innovation Mission, NITI Ayog, Available at, https://niti.gov.in/content/atal-innovation-mission-aim
16. Indian Tech start-up Ecosystem approaching escape velocity, (2018), NASSCON-Zinnov, Available at,
https://www.nasscom.in/system/files/secure-pdf/Indian_Start-up_Ecosystem_2018-Final_Report.pdf
17. India can play pivotal role in global fourth Industrial revolution, Economic Times, (April 2018), Available at,
//economictimes.indiatimes.com/articleshow/63700143.cms?utm_source=contentofinterest&utm_medium=tex
t&utm_campaign=cppst
363-367
18. India can Lead the World into the Fourth Industrial Revolution: World Economic Forum, (February 2019),
Available at, https://www.dqindia.com/india-can-lead-world-fourth-industrial-revolution-world-economic-
forum/
19. IoT in India : Next Big Wave, (July 2016), NASSCOM, Available at,
https://www.nasscom.in/system/files/secure-pdf/IoT_in_India_report_05072016.pdf
20. Big data analytics to become $16 billion industry by 2025, (July 2017), Available at,
economictimes.indiatimes.com/articleshow/59410695.cms?utm_source=contentofinterest&utm_medium=text
&utm_campaign=cppst
21. What is Industry 4.0, why it offers huge opportunity for India? (2019), Available at,
https://www.financialexpress.com/industry/what-is-industry-4-0-why-it-offers-huge-opportunity-for-
india/1452171/
22. Columbus Louis, 2018, Roundup Of Internet Of Things Forecasts And Market Estimates, (December 2018),
Available at, Forbes https://www.forbes.com/sites/louiscolumbus/2018/12/13/2018-roundup-of-internet-of-
things-forecasts-and-market-estimates/#32b3c4927d83
51.
Authors: Anandika Sharma, Dr. Anupam Sharma
Paper Title: HANDWRITING RECOGNITION BY MACHINE LEARNING
Abstract— Handwriting is one of the most natural ways of communication among people. The
handwriting recognition task is the main concern of scientific community because handwriting can be varies
with the same person or from one person to another hence the prediction of human behavior through
handwriting is a complex task. Earlier the handwriting analysis has been done by graphologists but due to
the modernization and the arrival of digital world the handwriting analysis can be done with the help of
computer aided machines. Different software and algorithms has been defined to do the analysis. In the new
world of machine learning handwriting recognition and the prediction of human behavior can be done by
using different techniques of machine learning which increase the speed of analysis This paper studies the
recent advances and the trends in the field of handwriting recognition by machine learning.
Keywords— handwriting, graphologist, machine learning
References:
1. Hemlata, Manoj Sachan, Shailendra Kumar Singh, “Personality Detection using Handwriting Analysis: Review
”,The Seventh International Conference on Advances in Computing, Electronics and Communication - ACEC 2018.
2. Prachi desai, aayush agarwal, ajinkya dhavale, “Handwriting Analysis for Detection of Personality Traits using
Machine Learning Approach”, International Journal of Computer Applications (0975 – 8887), Volume 130 – No.15,
November2015.
3. Champa HN and Dr KR anandakumar, “Artificial Neural Network for Human Behaviour Prediction through
Handwriting Analysis, International Journal of Computer Applications (0975 – 8887)”, Volume 2 – No.2, May 2010.
4. Manimala, meghashree, poornima gokhale and sindhu chandrashekhar, “AUTOMATED HANDWRITING
ANALYSIS FOR HUMAN BEHAVIOR PREDICTION”, International Journal of Computer Science and Engineering (IJCSE)
, Vol. 5, Issue 5, Aug - Sep 2016 .
5. Umang gupta, niladri chatterjee, “Personality Traits Identification using Rough sets based Machine Learning”,
International Symposium on Computational and Business Intelligence, 2013.
6. Cleber Zanchettin, Byron Leite Dantas Bezerra and Washington W. Azevedo, “A KNN-SVM Hybrid Model for
Cursive Handwriting Recognition”, WCCI 2012 IEEE World Congress on Computational Intelligence, June 10-15, 2012 -
Brisbane, Australia.
7. Sargur N srihari, sung-hyunk cha, hina arora and sangjik lee, “Individuality of Handwriting: A Validation Study”,
2001 IEEE.
8. Prof. Akshita Chanchlani1, Pratima Kharade, Rutuja Kapase, Sonal Janvalka, Aakanksha Jaitly, “International
Journal for Research in Applied Science & Engineering Technology (IJRASET)”, Volume 5 Issue X, October 2017.
363-367
52.
Authors: Dr Anupam Sharma
Paper Title: Technological Upgradation on Educational Reforms in India
Abstract: The moment journey of life starts education starts from that day. The moment baby born tries to adapt
to outside world from that moment itself learning starts, along with activities liking crying, expressing, smiling,
recognizing mothers touch etc. and the process goes on through lifetime. John Dewey said: “Education is not
preparation for life, education is life itself.” Over the years India has emerged as one of the largest education
systems. However, witnessing the changes and developments in and around the world are forcing and demanding
the further changes in the existing educational practices and delivery system if education. In the 21st century the
government of India has recognized the true importance of imparting education to the children of country and
brought some legislative changes.
Index Terms—education, learning, developments, government
References:
1. VERNAL, Louis: Drive reforms in education system. In: The Times of India, August 7, 2014
363-367
http://timesofindia.indiatimes.com/home/education/news/Drive-reforms-in-education-system/articleshow/39779780.cms (2016.04.25).
2. KUMAR, Sasi V.: The Education System in India. GNU Operating System http://www.gnu.org/education/edu-system-india.html
(2016.04.19)
3. RAMAN, S. A.: Woman’s Education. in: Stanley, Wolpert (edit): Encyclopedia of India, Vol 4. Thomson Gale, 2006. 236.
4. National Council of Educational Research and Training: Leading the Change. New Delhi, 2011.
http://www.ncert.nic.in/oth_anoun/leading_the_change.pdf (2016.04.25)
5. Sarva Shiksha Abhiyan. Ministry of Human Resource Development. http://ssa.nic.in/ (2016.04.25).
6. Annual Reports, 2010-11, (2011) Department of School Education & Literacy and Department of Higher
53.
Authors: EKTA NARWAL SUMEET GILL
Paper Title: MODELING ELLIPTICAL CURVE CRYPTOGRAPHY KEYS USING BACK PROPAGATION
ALGORITHM
ABSTRACT: Vehicular Ad Hoc Networks (VANETs) are the newest for of Ad Hoc Networks in which
moving vehicles act as routers and nodes to form a network. VANETs use many cryptographic approaches
like symmetric key approaches, public key approaches, certificate revocation, pseudonym based
approaches, identity-based cryptography, identity-based signature, Elliptical Curve Cryptography (ECC)
etc. for secure communication. These techniques use public and private keys for enhancing the security of
messages and all these keys are stored on hardware devices like TPDs (Temper Proof Devices) in VANETs.
TPDs are protected by the cryptographic algorithms. In this present era of technology these algorithms and
their online simulators are freely available on internet and can be easily intruded. There is a potential need
to enhance the security of these keys. In this paper we worked on enhancing the security of ECC keys stored
in TPDs of VANETs using a specific network of Artificial Neural Networks.
KEYWORDS: VANETs (Vehicular Ad Hoc Networks), TPD (Temper Proof Devices), ECC (Elliptical Curve
Cryptography), ANN (Artificial Neural Networks)
References:
[1] H. Handschuh, P. Paillier, and J. Stern, “Probing Attacks on Tamper-Resistant Devices,” Igarss 2014, vol.
1717, no. 1(2014) pp. 1–5.
[2] E. Narwal and S. Gill, “Secure and Faster Key Management of Elliptical Curve Cryptography in Vanets,”
Int. J. Comput. Sci. Eng. Inf. Technol. Res., vol. 7, no. 4,( 2017) pp. 25–30.
[3] M. Aarts, “Hardware Attacks Tamper Resistance , Tamper Response and Tamper Evidence.”
[4] J. Domingo-Ferrer and Q. Wu, “Safety and privacy in vehicular communications,” CEUR Workshop Proc.,
vol. 397(2008) pp. 6–11.
[5] A. Naveena and K. R. Reddy, “A Review : Elliptical Curve Cryptography in Wireless Ad-hoc Networks,”
(2016) pp. 1786–1789.
[6] J. Singh and G. Singh, “Clustering Based Routing Protocols in WSNs : A Review,” vol. 8491, no. 2 (2014)
pp. 191–194.
[7] S. Gandhi and Shalini, “Routing Protocols for Vehicular Adhoc Networks (VANETs ): A Review,” Int. J.
of Computer Science and Mobile Computing, vol. 5, no. 1 (2014) p. 948-953.
[8] Y. Liu, L. Wang, and H.-H. Chen, “Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc
Networks,” IEEE Trans. Veh. Technol., vol. 64, no. 8 (2015) pp. 3697–3710.
[9] H. A. Selma, “Elliptic Curve Cryptographic Processor Design using FPGAs,” pp. 1–6.
[10] S. S. Manvi, M. S. Kakkasageri, and D. G. Adiga, “Message Authentication in Vehicular Ad Hoc
Networks: ECDSA Based Approach,” 2009 Int. Conf. Futur. Comput. Commun., 2009.
[11] R.Singh and S. Miglani, “Efficient and Secure Message Transfer in VANET,” no. June, 2016.
[12] Daniel R. L. Brown, “Standards for Efficient Cryptography 2 (SEC 2) : Recommended Elliptic Curve
Domain Parameters,” Stand. Effic. Cryptogr., vol. 2, no. Sec 2 (2010) p. 37.
[13] G. Mart, “Encryption Scheme,” vol. 2, no. 2 (2010) pp. 7–13.
[14] E. Engineers, H. Networks, C. Networks, B. Propagation, and M. Tasks, “3 . The Back Propagation
Algorithm,” Neural Networks, pp. 16–27.
[15] R.C. Chakraborty, “Back Propagation Network Soft Computing Back Propagation Network,”
www.myreaders.info,(2010).
[16] I. C. Lin, H. H. Ou, and M. S. Hwang, “A user authentication system using back-propagation network,”
Neural Comput. Appl., vol. 14, no. 3(2005) pp. 243–249.
[17] R. R. Al-nima, L. Muhanad, and S. Q. Hassan, “Data encryption Using Backpropagation Neural Network,”
(2009).
[18] E. Narwal and S. Gill, “Perceptrons Helping to Secure VANETs,” Int. J. Adv. Res. Comput. Sci., vol. 8, no.
3(2017) pp. 3–6.
363-367
54.
Authors: Zarnigor Sohibova, Dilrabo Quvvatova
Paper Title: SYMBOLIC DESCRIPTION OF THE YEAR SEASONS IN UZBEK POETRY
Abstract: Eastern selected poetry took its long roots in literary description of year seasons. In X-XII
century there were Uzbek literature examples, after that period in the works of our poets each season was
compared to the human’s life and had peculiar meaning with the description of the mental position of lyric
hero. This article deals with defining symbolic meaning of spring and autumn in the poems of Alisher
Navoiy and Abdulhamid Chulpon.
Keywords : symbolic meaning, selected poetry, modern poetry, tradition, lyric hero, imitation, metaphorical
meaning
References:
1. Alisher Navoiy. Gurbatda g`arib shodmon bo`lmas emish. – Toshkent: Yangi asr avlodi, 2018. – 1… b.
2. Алишер Навоий.МАТ. 6-том. Фавойид ул-кибар. – Тошкент, Фан, 1990. – 566 б.
3. Алишер Навоий. Қаро кўзум. – Тошкент: Ғ.Ғулом номидаги Адабиёт ва санъат нашриёти, 1988. – 768 б. 4. Навоий асарлари луғати. – Тошкент: Ғ.Ғулом номидаги Адабиёт ва санъат нашриёти, 1972.– 782 б.
5. Чўлпон ижоди ва замонавий адабий жараён. Конференция материаллари. –Тошкент: Mashhur-press, 2018, - 326 б.
6. Чўлпон. Асарлар. I жилд. –Тошкент: Akademnashr, 2013. -372 б. 7. Улуғбек Ҳамдам. Янги ўзбек шеърияти. – Тошкент: Адиб, 2012, -304 б.
8. А.ОриповТанланганасарлар. 4 жилдлик. 1 жилд. Шеърлар ва достонлар. – Т.: Ғафур Ғулом номидаги адабиёт ва санъат
нашриёти, 2000 (www.ziyonetkutubxonasi). – 432 б. 9. А.Орипов. Танланган асарлар. 4 жилдлик. 2 жилд. Шеърлар ва достонлар. Т.:Ғафур Ғулом номидаги адабиёт ва санъат
нашриёти, 2001 (www.ziyonetkutubxonasi) . – 496 б. 10. Ҳаққулов И. Тақдир ва тафаккур. – Т.: “Шарқ” 2007 – 336 б.
11. Раҳимжонов Н. Истиқлол ва бугунги адабиёт. –Тошкент: Ўқитувчи, 2012. –328 б.
12. Сулаймон Т. Гул бир ён, чаман бир ён (қўшиқлар). –Тошкент: Чўлпон, 1996. –18 б. 13. www.ziyouz.com
363-367
55.
Authors: Akhmedova Mehrinigor Bahodirovna, Baqoyeva Muhabbat Kayumovna
Paper Title: Analysis of “Spirituality” category and its structure in the English language
Abstract: Lexico-semantic category of “spirituality” is usually analyzed by the ways of defining concepts
of the term. On the one hand, it seems to us that using these concepts simultaneously makes opposed ideas
towards the meaning, however, the term “ spirituality” is defined in different ways by different authors and
it makes the concept complicated. The main point of the article is to analyze and categorize the term
“spirituality” and give full answer to the readers about the English concept “spirituality”.
Keywords : spirituality, religious level, faith, hope, peace, empowerment, lexica- semantic category, moral values,
concept, human mind, definition
References:
1. Brown L. Oxford English Dictionary; Clarendon Press: Oxford, UK, 1993. – P. 2. Chapman, L. Developing a useful perspective on spiritual health: Wellbeing, spiritual potential and the search for meaning. Am. J. Health
Prom. 1987 – P.39 – P.1.
3. Fisher, J.W. Spiritual health: Its nature and place in the school curriculum. PhD thesis, University of Melbourne, 1998, Melbourne, Australia, 2010 Available from http://eprints.unimelb.edu.au/archive/00002994/ & Melbourne University Custom Book Centre:
Melbourne, Australia, 2010 – P.107
4. Hay D.; Reich, K.H.; Utsch, M. Spiritual development: Intersections and divergence with religious development. In The Handbook of Spiritual Development in Childhood and Adolescence Roehlkepartain, E.C., King, P.E., Wagener, L.M., Benson, P.L., Eds.; Sage
Publications: Thousand Oaks, CA, USA, 2006 – P.59. – P.44.
5. Hill V. Spiritual development in the Education Reform Act: A source of acrimony, apathy or accord. Brit. J. Educ. Stud.1989, – P. 182. – P. 37.
6. Jose, N.; Taylor, E. Spiritual health: A look at barriers to its inclusion in the health education curriculum. Eta Sigma Gamman 1986, – P.18, 16-19
7. Muldoon M.; King, N. Spirituality, health care, and bioethics. – J. Relig. Health, 1995, – P 34.
8. Priestley, J.G. Towards finding the hidden curriculum: A consideration of the spiritual dimension of experience in curriculum planning. Brit. J. Relig. Educ. 1985, – P. 119 – P. 7.
9. Tanyi R. Nursing theory and concept development or analysis. Towards clarification of the meaning of spirituality. – Blackwell Science
Ltd, Journal of Advanced Nursing, EBSCO Publishing, 2002. – P 509. – P. 506
363-367
56.
Authors:
Miftachul Huda, Azmil Hashim, Kamarul Shukri Mat Teh, K. Shankar, B. Ayshwarya, Phong Thanh
Nguyen, Wahidah Hashim, Andino Maseleno
Paper Title: Learning Quality Innovation through Integration of Pedagogical Skill and Adaptive Technology
Abstract: This paper aims to explore the modern learning environment (MLE) which may emerge from the
secondary education into the tertiary education. This integration usually derives from enhancing the
pedagogical skill and adaptive technology to strengthen the teaching and learning process. Literature
review from referred books and journals was conducted with thematic analysis. The investigation was
employed in depth analysis from referred books, journals and conferences using the keywords of
pedagogical skill and adaptive technology and modern learning environment. The multiple finding from
met-synthesis was conducted by searching for the information which is organised using substantive
keywords. The findings reveal that the role of MLE can be divided into attempting to perform learning
quality, integrating the learning with continuous process, making easy in getting the sources, creating
flexibility in learning. This study is expected to contribute the way of maintaining inside factor within the
human being which is significantly necessary to make effort in assisting spirit performance in teaching
process. To assist students across learning environment by pedagogical skills with encouraging higher
teaching and learning, making convince into the pedagogy might be necessary a way to promote a range of
pedagogical skills continuing integration with technological tools. In addition, using experience to boost the
abstract ideas acquired in certain subjects as the source of knowledge itself can become a particular
principle for the enhancement of learning in higher education.
Index Terms: learning quality, innovation, pedagogical skill, adaptive technology, 21 century learning,
modern learning environment, openness in education, access to resources, flexibility in learning
References:
1. Keppell, M., Souter, K., & Riddle, M. (2012). Physical and virtual learning spaces in higher education: concepts for the modern learning
environment [Preface] (pp. xvi-xx). PIGI Publishing (IGI Global). 2. Anderson, T. (2008). The theory and practice of online learning. Edmonton, Canada: Athabasca University Press.
3. Beetham, H., & Sharpe, R. (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. New York and London:
Routledge. 4. Sankey, M., Birch, D., & Gardiner, M. (2010). Engaging students through multimodal learning environments: The journey continues.
In Proceedings ASCILITE 2010: 27th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education:
Curriculum, Technology and Transformation for an Unknown Future (pp. 852-863). University of Queensland. 5. Anshari, M., Almunawar, M. N., Shahrill, M., Wicaksono, D. K., & Huda, M. (2017). Smartphones usage in the classrooms: Learning aid
or interference?. Education and Information Technologies, 1-17.
6. Anshari, Alas, Y., & Guan, L. S. (2015). Developing online learning resources: Big data, social networks, and cloud computing to support pervasive knowledge. Education and Information Technologies, 1-15.
7. Anshari, M., Alas, Y., Sabtu, N. I. P. H., & Hamid, M. H. S. A. (2016a). Online Learning: trends, issues and challenges in the Big Data
Era. Journal of e-Learning and Knowledge Society, 12(1). 8. Anshari, M., Alas, Y., Hamid, M. H. S. A., & Smith, M. (2016b). Learning Management System 2.0: Higher Education. Handbook of
Research on Engaging Digital Natives in Higher Education Settings, 265.
9. Brown, M. R. (2007). Educating all students: Creating culturally responsive teachers, classrooms, and schools. Intervention in school and clinic, 43(1), 57.
10. Duhaney, D. C. (2001). Teacher education: Preparing teachers to integrate technology. International Journal of Instructional Media, 28(1),
23. 11. Garrison, D. R. (2011). E-learning in the 21st century: A framework for research and practice. London, UK: Taylor & Francis.
12. Gültekin, M. (2005). The Effect of Project Based Learning on Learning Outcomes in the 5th Grade Social Studies Course in Primary
Education.Educational Sciences: Theory & Practice, 5(2). 13. Huda, M., Anshari, M., Almunawar, M. N., Shahrill, M., Tan, A., Jaidin, J. H. & Masri, M. (2016). Innovative Teaching in Higher
Education: The Big Data Approach. The Turkish Online Journal of Educational Technology, 15(Special issue), 1210-1216.
14. Huda, M., Sabani, N., Shahrill, M., Jasmi, K. A., Basiron, B., & Mustari, M. I. (2017a). Empowering Learning Culture as Student Identity Construction in Higher Education. In Student Culture and Identity in Higher Education (pp. 160-179). IGI Global.
15. Huda, M., Jasmi, K. A., Hehsan, A., Shahrill, M., Mustari, M. I., Basiron, B., & Gassama, S. K. (2017b). Empowering Children with
Adaptive Technology Skills: Careful Engagement in the Digital Information Age. International Electronic Journal of Elementary Education, 9(3), 693-708.
16. Huda, M., Shahrill, M., Maseleno, A., Jasmi, K. A., Mustari, I., & and Basiron, B. (2017c). Exploring Adaptive Teaching Competencies in
Big Data Era. International Journal of Emerging Technologies in Learning, 12(3), 68-83. 17. Huda, M., Jasmi, K. A., Mustari, M. I., Basiron, B., Mohamed, A. K., Embong, W., ... & Safar, J. (2017d). Innovative E-Therapy Service
in Higher Education: Mobile Application Design. International Journal of Interactive Mobile Technologies, 11(4), 83-94.
18. Huda, M., Jasmi, K. A., Basiran, B., Mustari, M. I. B., & Sabani, A. N. (2017d). Traditional Wisdom on Sustainable Learning: An Insightful View From Al-Zarnuji's Ta 'lim al-Muta 'allim. SAGE Open, 7(1), 1-8.
19. Kayes, D. C. (2002). Experiential learning and its critics: Preserving the role of experience in management learning and
education. Academy of Management Learning & Education, 1(2), 137-149. 20. Koehler, M. J., & Mishra, P. (2009). What is technological pedagogical content knowledge. Contemporary issues in technology and
teacher education, 9(1), 60-70.
21. Lejeune, A., Ney, M., Weinberger, A., Pedaste, M., Bollen, L., Hovardas, T. & De Jong, T. (2009, July). Learning Activity Spaces: Towards flexibility in learning design?. In 2009 Ninth IEEE International Conference on Advanced Learning Technologies (pp. 433-437).
IEEE.
22. McPhail, G., & Rata, E. (2016). Comparing curriculum types:‘Powerful knowledge’and ‘21st century learning’. New Zealand Journal of Educational Studies, 51(1), 53-68.
23. McPhail, G. J. (2015). Conceptual Progression in Innovative Learning Spaces. New Zealand Journal of Teachers' Work, 12(1), 6-8.
24. Mishra, P., & Koehler, M. J. (2007). Technological pedagogical content knowledge (TPCK): Confronting the wicked problems of teaching with technology. Technology and Teacher Education Annual, 18(4), 2214.
25. Othman, R., Shahrill, M., Mundia, L., Tan, A., & Huda, M. (2016). Investigating the Relationship Between the Student’s Ability and
Learning Preferences: Evidence from Year 7 Mathematics Students. The New Educational Review, 44(2), 125-138. 26. Ramsden, P. (2003). Learning to teach in higher education. London and New York: Routledge.
27. Rata, E. (2016). A pedagogy of conceptual progression and the case for academic knowledge. British Educational Research Journal, 42(1), 168-184.
363-367
28. Sharma, G., & Kolb, D. A. (2010). The learning flexibility index: Assessing contextual flexibility in learning style. Style differences in
cognition, learning and management: Theory, research and practice, 60-77. 29. Shernoff, D. J., & Csikszentmihalyi, M. (2009). Cultivating engaged learners and optimal learning environments. Handbook of positive
psychology in schools, 131-145.
30. Elena V. Smirnova, B. Ayshwarya, Phong Thanh Nguyen, Wahidah Hashim, Andino Maseleno, Using Shell Programs in Educational and
Methodological Support for Learning Foreign Language, International Journal of Applied Exercise Physiology, Vol. 8 (2.1), 2019. pp.
1027-1032.
31. Inga E. Rakhimbaeva, Aleksandr A. Korostelev, Indira A. Shakirova, B. Ayshwarya, Phong Thanh Nguyen, Wahidah Hashim, Andino Maseleno, Integration of the Educational and Didactic Systems in the Training of Future Teachers, International Journal of Applied
Exercise Physiology, Vol. 8 (2.1), 2019. pp. 1033-1038.
32. Alla L. Busygina, Elena M. Chertakova, Darya B. Shtrikova, B. Ayshwarya, Phong Thanh Nguyen, Wahidah Hashim, Andino Maseleno, Professional forms of Employment in the Russian Federation: Problems and Challenges, International Journal of Applied Exercise
Physiology, Vol. 8 (2.1), 2019. pp. 1039-1045.
33. Olga I. Pugach, Andrei V. Оchepovsky, Wahidah Hashim, Andino Maseleno, B.Ayshwarya, Phong Thanh Nguyen, To the use of English Words When Learning Programming, Information Systems and Technologies, International Journal of Applied Exercise Physiology, Vol.
8 (2.1), 2019. pp. 1046-1051.
34. Trilling, B., & Fadel, C. (2009). 21st century skills: Learning for life in our times. San Fransisco, Canada: John Wiley & Sons. 35. Zakirillah, Noorminshah, A. I., Huda, M., Fathoni, & and Heroza, R. I. (2016). Design of a Mobile based Academic Cyber Counselling
Application in Higher Education. Journal of Information Systems Research and Innovation, 10(3), 1-9.
36. Grigory Olegovich Yarygin, Aleksandr Aleeksevich Korostelev, Rafis H. Mukhutdinov, Andino Maseleno, Elections and Russian Citizens Residing Overseas: Prospects for Internet Voting, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5,
pp. 52-57, 2019.
37. Larisa Akhunzhanovna Apanasyuk, Elena Vladimirovna Smirnova, Rafis H. Mukhutdinov, Andino Maseleno, The Problem of the Organization of Socio-Cultural Environment for Adaptation and Development of a Student-Migrant’s Bilingual Identity in the Conditions
of the Russian Higher Education, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 63-70, 2019.
38. Alla L. Busygina, Liliya A. Meteleva, Darya B. Shtrikova, Rafis H. Mukhutdinov, Andino Maseleno, Bases of Formation of Women's Professional Mentality in Russia, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 71-77, 2019.
39. Oleg N. Yarygin, Aleksandr A. Korostelev, Linar G. Akhmetov, Andino Maseleno, Modeling of Competence as a Tool of Goal Setting for
Education in Modern Society, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 78-86, 2019. 40. Raven John, Aleksandr A. Korostelev, Oleg N. Yarygin, Rafis H. Mukhutdinov, Andino Maseleno, The Genesys and Base Concepts of
Competentology, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 87-95, 2019.
41. Bogdanova Anna Vladimirovna, Aleksandr Alekseevich Korostelev, Rafis H. Mukhutdinov, Indira A. Shakirova, Andino Maseleno, Formulation of the Problem of Mathematical Modeling of Accommodation of Basic Stations of Cellular Communication in Residential
Territories for Students of It-Directions of Preparation, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue
6S5, pp. 96-100, 2019. 42. Bogdanova A. Vladimirovna, Aleksandr A. Korostelev, Olga L. Shepelyuk, Anna E. Rodionova, Irina N. Fardeeva, Andino Maseleno,
Reengineering of Business Processes of the Higher School: Its Prerequisites, International Journal of Recent Technology and Engineering
(IJRTE), Vol. 7, Issue 6S5, pp. 101-104, 2019. 43. Rustem R. Vakhitov, Anna E. Rodionova, Elena V. Smirnova, Rafis H. Mukhutdinov, Mariya I. Arzhakova, Andino Maseleno, Crisis of
Higher Education in Russia, International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S5, pp. 105-109, 2019.
57.
Authors: Kadirova Nargiza Arivovna
Paper Title:
Similarities in Addressing the Complex Nature of Love and Devotion in Methamorphosis by Kafka and
in ghazals of Mir Alisher Navoiy
Abstract: The great European novelist and short-story writer, Franz Kafka, and one of the most famous
eastern poets of Middle ages, Alisher Navoiy, at first blush seem to have absolutely nothing in common. But
a detailed analysis of two distinguished works of the writers, reveals their surprisingly similar views in
regard to interpretation of love and devotion concepts. Step-by-step comparison of one of the Mir Alisher
Navoiy’s ghazals with The Metamorphosis of Kafka allows to correlate the messages of each masterpiece,
and thus define the similarities in personal traits of each author.
Keywords : Love, devotion, The Metamorphosis, Ghazal, Kafka, Alisher Navoiy, comparative analysis, world
literature
References: 179. Merriam-Webster Dictionary at https://www.merriam-webster.com /dictionary/love. Consulted online on June, 26 2019
180. Richards, John F., The Mughal Empire. Cambridge University Press, Cambridge, UK, 1995. - p. 6,
181. Subtelny, Maria E., “ʿAli Shir Navai”, in: Encyclopaedia of Islam, THREE, Edited by: Kate Fleet, Gudrun Krämer, Denis Matringe, John Nawas, Everett Rowson. Consulted online on June, 26 2019
182. McHenry, Robert, ed., "Navoiy, (Mir) Alisher". Encyclopedia Britannica 8 (15th ed.) Encyclopedia Britannica, Inc. Chicago, USA, 1993. - pp. 90-93
183. Wikipedia The Free encyclopedia at https://en.wikipedia.org/wiki/Ali-Shir_Nava%27i. Consulted online on June, 26 2019
184. Lovell-Hoare Sophie, Lovell-Hoare Max, Uzbekistan. Bradt Travel Guides. Chalfont St Peter, UK, 2013. - p.26
185. Gilman, Sander, Franz Kafka, the Jewish Patient. Psychology Press, East Sussex, UK, 1995. - p.88
186. Nervi, Mauro, Kafka's Life (1883-1924). 2011. at http://www.kafka.org/index.php?biography. Consulted online on June, 26 2019
187. John P. Anderson, Kafka's the Metamorphosis: Unwelcome at Home. Universal-Publishers, CA, USA, 2016. - p.66 188. Spindler, William, Magic Realism: A Typology, Forum for Modern Language Studies. Vol. XXIX, iss. 1. Oxford University Press,
Oxford, UK, 1993 - pp. 75-80
189. Luebering, Juan Gelman, Franz Kafka, Biography & Works. Encyclopedia Britannica at https://www.britannica.com/biography/Franz-Kafka. Consulted online on June 26, 2019
190. Kayumov Aziz, Alisher Navoiy, History of the World Literature in 9 volumes. v.3. Nauka, Moscow, USSR, 1985 - pp. 576-582
191. Neider, Charles, The Frozen Sea: A Study of Franz Kafka. Russell & Russell, NY, USA, 1962 - p.29 192. Nabokov, Vladimir, Die Kunst des Lesens: Meisterwerke der europäischen Literatur. Fischer S. Verlag GmbH, Berlin, Germany, 1984. -
pp. 313–352.
193. Pelikan Straus, Nina, Transforming Franz Kafka's Metamorphosis, Signs Journal of Women in Culture and Society, 14(3). The
University of Chicago Press, Chicago, USA, 1989. - pp. 651-667.
194. Sudau, Ralf, Franz Kafka: Kurze Prosa, Erzählungen. Klett, Stuttgart, Germany, 2007. - pp. 158-162. 195. Arutyunov, L., Taneev, V., Poetry of the USSR nations of 5-18th Centuries. Library of World literature. v.55 Khudozhestvennaya
Literatura, Moscow, USSR, 1972. - p.330-331
196. David, Claude, Franz Kafka. Molodaya Gvardiya, Moscow, Russia, 2008. - p.60
197. Camus, Albert, The Myth of Sisyphus, Appendix, Hope and the Absurd in the Work of Franz Kafka, Penguin, London, UK, 2013. -
pp.195-205
198. Franz Kafka, The Metamorphosis. GlobalGrey. London, UK, 2018. - p.12 199. Lecture on "The Metamorphosis" by Vladimir Nabokov at http://www.kafka.org/index.php?id=191,209,0,0,1,0. Consulted online on
June, 26 2019
200. Richard T Kelly. Kafka’s Metamorphosis: 100 thoughts for 100 years. The Guardian. International edition. July 18, 2015. Consu lted online on June, 26 2019.
58.
Authors: Kholikova Nozima Nematilloyevna, Saidov Khayrulla Shavkatovich
Paper Title:
Comparative observation of the peculiarities of English and Uzbek detective genre (in the examples of
J.H.Chase’s works)
Abstract: Observation of English modern detective genre and peculiarities of Uzbek detective genre is the
main topic of this article. Comparative analysis of the Uzbek and English detective genres have been
studied in the novels of James Hedley Chase and Uzbek translations of his works. Some similarities and
differences between Uzbek and English detective genres have been shown in this paper.
Keywords: detective story, evidence, unexpected denouement, puzzle, superficially convincing, crime, private,
defeat, opponents, murder, adventure.
References:
1. Alpomish. Sharq. – T.: 1998. 231-bet
2. I. Qalandarov. Shohidamas, bargida… O‘Zadabiynashr – T.: 1962.
3. O‘. Umarbekov. Tanlangan asarlar. 1–jild. Sharq. – T.: 2002. 11-bet
4. T. Malik. Shaytanat. Sharq. – T.: 2006.
5. T. Malik. Qiyomat qarz. Sharq. – T.: 2007.
6. “O‘zbekiston adabiyoti va san’ati” gazetasi. 2007 yil, 2-son.
7. Chase J.H. The vulture is a patient bird. Royallib.ru. p-3
8. Чейз Ж.Х. Кузгун сабрли куш. Тошкент-“O’zbekiston”, 2012. b-8
363-367
59.
Authors: Jeyren Mizrabova
Paper Title:
TRANSLATIONS OF WILLIAM SHAKESPHEARE'S TRAGEDY "HAMLET" IN UZBEK
LITERATURE STUDIES
Abstract: Shakespeare's works are classics in literature and have many translations. The aim of the work
is to study the peculiarities of the translations of William Shakespeare's tragedy "Hamlet" in Uzbek
literary criticism. In particular, the history of the creation of translations of this work into the Uzbek
language, their quality and personality of the authors, the distinctive features of each of them and the
circumstances of their origin have been studied. Particular attention is paid to the personality of Jamal
Kamal, the author of the first translation of William Shakespeare directly from the original language. Also,
the history of Uzbek indirect and direct transfers is briefly outlined, and a study is made about their
extremely important influence in the development of culture. An important source of information here are
various scientific works that cover and analyze the works of Uzbek translators with the works of William
Shakespeare. A comparative-analysis of the peculiarities of translation of verbal images in the speech of the
main characters into Russian and Uzbek languages is carried out, their correspondence to the original and
the used interpreting techniques are analyzed. The conclusion about quality and prospects of development
of the Uzbek direct translation are outlined.
Keywords : tragedy, Hamlet, translation, character, direct translation, literary movement, stage, Shakespeare,
features of translation, independence
References: 1. Чўлпон. Асарлар: Уч жилдлик / О.Шарафиддинов таҳрири остида. Ж.I. Шеърлар. Драмалар. Таржима. – T.: Ғафур Ғулом
номидаги Адабиёт ва санъат нашриёти, 1994. – 448 б.
2. Вильям Шекспир. Ҳамлет, Дания Шаҳзодаси. Тошкент, 1948 – 148 б. 3. Вильям Шекспир. Сайланма. Уч жилдлик. Учиничи жилд. (Инглиз тилидан
4. Ғ. Саломов. Тил ва таржима.Ўзбекистон ССР “Фан” нашриёти. Тошкент -1966.
363-367
5. Иброҳим Ҳаққул. Ижод иқлими. Тошкент.Ўзбекистон Республикаси. Фанлар академияси.”Фан” нашриёти 2009 Б.-388. б. 71.
6. Шекспир В. Гамлет. Дания шаxзодаси. Жамол Камол таржимаси ( в рукописи). - Тошкент, 1977, -156 б. 7. http//Shakespeare/mit/edu/hamlet/ful/html/
8. http://thelib.ru/books/shekspir_uilyam/gamlet_princ_datskiy_permlozinskiy-read.html
9. http://www.theatre-library.ru/files/sh/shakespeare/shakespeare_20.html Вильям Шекспир. Гамлет, принц датский (пер.Б.Пастернак)
60.
Authors: Kayumova Nigora Muxtorovna, Shukurova Nigora Shavkatovna, Safoeva Sadokat Nasilloevna
Paper Title:
THE ROLE OF THE ETHNOGRAPHIC VOCABULARY IN THE ENGLISH AND UZBEK
LANGUAGES
Abstract: Various aspects of language and culture are currently the focus of attention of linguists,
ethnolinguists, sociolinguists, psycholinguists, and cultural studies. It is the reflection in the language of
ethnic and personal self-knowledge, ways of perceiving and conceptualizing the world, the formation of
symbols and stereotypes inherent in certain people. Culture of a people is reflected in the values of linguistic
units i.e. that stably fixed in them is invariant in content, knowledge of the language, and in terms of their
ability to convey information over time, ranging in size and connotations, knowledge of which may not be
necessary for the knowledge of the language. Cultural studies of vocabulary and in whole the language is the
main point of our paper.
Keywords: Ethnolinguistics, cultural studies, language units, vocabulary, lacune, variants, ethnology, culture,
linguistics, descriptive, statistical method.
References: 1. Abazov R. Culture and Customs of the Central Asian Republics. – London. Greenwood Press, 2007 – 325 p 2. Raul George Geiss. Mahallah and kinship relation. Central Asian Survey (2001) , 20 (1), p.97.
3. Central Asian Survey magazine (2002).21 (1) p.60.
4. Underhill, J.Ethnolinguistics and Cultural Concepts: Truth, Love, Hate and War (pp. 17-40). Cambridge: Cambridge University Press. 2012 doi:10.1017/CBO9780511862540.003
5. Ferraro, Gary. Cultural Anthropology: An Applied Perspective. Cengage Learning. 2006
6. Лучинина Е.Н. Лингвокультурология в системе гуманитарного знания. ТГУ. Критика и семиотика. Вып. 7, 2004.http://www.nsu.ru/education/virtual/cs7luchinina.htm
7. Маслова В.А. Лингвокультурология. - М.: Академия, 2001. http://www.englspace.com/dl/files/maslova.zip
8. Oxford Learner –Oxford Advanced Learner’s Dictionary of Current English:In 2v. V1. Oxford UP, 1980
1.
Authors:
Vasanth Mundargi, Dr. Siva Yellampalli
Paper Title:
Accounting for PVT Variations in Design Timing Closure
Abstract: The On Chip Variation (OCV) refers to changes in the behavior of parameters like process,
voltage and temperatures on a chip. In this paper, we go through different approaches followed to compensate
for PVT variations on chip during design timing closure. We review the dominant approaches used for
accounting such variations. We also review the advantages and disadvantages of these approaches used based on
the ease of use, implementation, power, area, and the overheads involved in adopting them.
Keywords: Delays, PVT variation, Static Timing Analysis, On-Chip Variation, Derating, AOCV, LOCV,
GBA, PBA, IR Drop, Voltage Aware STA .
References: 1. J. Bhasker and Rakesh Chadha, Static Timing Analysis for Nanometer Designs: A Practical Approach, New York: Springer, 2009.
2. Ang Boon Chang, “ASIC design margin methodology,” TENCON Spring Conference, April 2013, doi:
10.1109/TENCONSpring.2013.6584434
3. http://www.idc-
online.com/technical_references/pdfs/electrical_engineering/Process_Voltage_Temperature_PVT_Variations_and_Static_Timing_Analysis.pdf
4. Franco Stellari at al, “Mapping systematic and random process variations using light emission from Off-Stage Leakage”, Reliability
Physics Symposium, April 2009, doi: 10.1109/IRPS.2009.5173323 5. Vinod Kumar Singh, “Improvement in Static Timing Analysis for Early TA-Signoff Closure in SOC flow at Very Deep Submicron
Nodes”, M.Tech thesis, Dept of Elec. & Comm., IIIT, New Delhi, 2014
https://repository.iiitd.edu.in/jspui/bitstream/123456789/174/1/MT12110.pdf 6. Susumu Kobayashi and Kenichi Horiuchi, “An LOCV-based static timing analysis considering spatial correlations of power supply
variations”, Design, Automation & Test in Europe Conference & Exhibition, March 2011, doi : 10.1109/DATE.2011.5763283
7. Pua Siaw Fuang and Nor Muzlifah Mahyuddin, “Implementation study of path-based AOCV model on pessimism reduction for 20nm technology”, ICCSCE 2014, Nov 2015, doi : 10.1109/ICCSCE.2014.7072693
8. Naman Gupta, “Timing Analysis: Graph Based v’s Path Based”, July 2014, http://vlsi-soc.blogspot.in/2014/07/timing-analysis-graph-
based-vs-path.html 9. IR Drop Analysis, Cadence Design Systems, Inc., San Jose, USA
1-5
2.
Authors:
P. Naveen Sundar Kumar, V. V. Nagendra Kumar, K. E. Naresh Kumar
Paper Title: An Analysis on Ensemble Classifiers in Ensemble Classification Problems
Abstract: Day to Day the amount of data was increasing rapidly. Due to analyzing the huge amount of data
various technologies are also introduced. Traditional data mining approaches can be used to perform data
analysis through classification algorithms. In data mining a single classifier can be used to perform data analysis.
Sometimes, multiple or combined classifier can also be used to perform data analysis. But, the performance of
ensemble classifier is better than single classifier. Based on improved accuracy the various number of ensemble
classifiers are introduced. Now, this paper can reviews various ensemble classifiers based on their accuracy.
Keywords: Classification, Classifier Ensemble, Ensemble Classification.
References: 1. Baesens, B., Van Gestel, T., Viaene, S., Stepanova, M., Suykens, J., & Vanthienen, J. (2003). Benchmarking state-of-the-art
classification algorithms for credit scoring. Journal of the Operational Research Society, 54, 627-635.
2. Breiman, L. (1996). Bagging predictors. Machine Learning, 24, 123-140
3. Breiman, L. (2001). Random forests. Machine Learning, 45, 5-32. 4. Freund, Y., & Schapire, R. E. (1996). Experiments with a New Boosting Algorithm. In L. Saitta (Ed.), Proc. of the 13th Intern. Conf.
on Machine Learning (pp. 148-156). Bari, Italy: Morgan Kaufmann.
5. Friedman, J. H. (2002). Stochastic gradient boosting. Computational Statistics & Data Analysis, 38, 367-378. 6. Finlay, S. (2011). Multiple classifier architectures and their application to credit risk assessment. European Journal of Operational
Research, 210, 368-378.
7. Lessmann, S.,Baesens, B.,Seow, HV and Thomas, LC., (2015). Benchmarking state-of-the-art classification algorithms for credit scoring: An update of research. European Journal of Operational Research, 247 (1), 124-136
8. Myoung-Jong, K., Sung-Hwan, M. and Ingoo, H.(2006). An evolutionary approach to the combination of multiple classifiers to predict
a stock price index. Expert Systems with Applications 31(2):241-247 9. Paleologo, G., Elisseeff, A., & Antonini, G. (2010). Subagging for credit scoring models. European Journal of Operational Research,
201, 490-499.
10. Rodriguez, J. J., Kuncheva, L. I., & Alonso, C. J. (2006). Rotation forest: A new classifier ensemble method. IEEE Transactions on
Pattern Analysis and Machine Intelligence, 28, 1619-1630. 11. Tsai, C.-F. , & Hsiao, Y.-C. (2011). Combining multiple feature selection methods for stock prediction: Union, intersection, and multi-
intersection approaches. Decision Support Systems, 50 ,258–269
12. Zhang,G., Patuwo, B.E., and Hu, M.Y.,(1998). Forecasting with artificial neural networks: The state of the art. International Journal of Forecasting 14 (1998) 35–62.
6-8
Authors: Reshma, G. Shivaprasad
Paper Title: Research and Development of User Authentication using Graphical Passwords: A Prospective
Methodology
Abstract: Nowadays in information security user authentication is a very important task. In most of the
computer, user authentication depends on the alphanumeric username and password. It means text-based
password. But, this is not highly secure because of hackers can easily break the password. Brute force attack,
dictionary attack, guessing attack etc. these all are some possible attacks on the password. If the user chooses a
3.
difficult password to prevent the system from the attackers which is very much harder for the user to remember
such a difficult password. So, to resolve this problem introduced a new technique called graphical password
authentication. This paper presents a detailed survey of user authentication techniques using a graphical
password. It contains basically two type approaches. They are recognition-based and recall-based approaches.
This survey discusses the different techniques about Graphical password authentication and their advantages and
limitations. The survey provides a roadmap for the development of new graphical authentication scheme.
Keywords: Authentication, CaRP, Cryptography, Cued click, Graphical passwords, Security
References: 16. S. Tabrez and D. J. Sai, Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical
password authentication system, In: Intelligent Computing and Control Systems (ICICCS), 2017 International Conference on,
IEEE, 2017, 776-781. 17. M. S. Umar and M. Q. Rafiq, Select-to-Spawn: A Novel Recognition-based Graphical User Authentication Scheme, In: Signal
Processing, Computing and Control, 2012 IEEE International Conference on, IEEE, 2012, 1-5.
18. A.Almulhem, A graphical password authentication system, In: Internet Security (WorldCIS-2011), London, 2011 World Congress on, IEEE, 2011, 223-225.
19. S. Kaja and D. Gupta, Graphical password scheme using persuasive cued click points, In: Smart Technologies For Smart Nation
(SmartTechCon), Bangalore, 2017 International Conference On, IEEE, 2017, 639-643.
20. M. S. Umar, M. Q. Rafiq and J. A. Ansari, Graphical user authentication: A time interval based approach, In: Signal Processing,
Computing and Control, Waknaghat Solan, 2012 IEEE International Conference on, IEEE, 2012, 1-6.
21. P. Chellaiah, B. Nair, K. Achuthan, S. Diwakar, Using Theme-based Narrative Construct of Images as Passwords: Implementation and Assessment of Remembered Sequences, International Journal of Online Engineering 13(11) (2017) 77-93.
22. Bhand, V. Desale, S. Shirke and S. P. Shirke, Enhancement of password authentication system using graphical images, In: Information Processing (ICIP), Pune, 2015 International Conference on, IEEE, 2015, 217-219.
23. S. S. S. Ahmed and N. M. Shekokar, Cued click authentication, In: Wireless and Optical Communications Networks (WOCN),
Mumbai, 2017 Fourteenth International Conference on, IEEE, 2017,1-5. 24. Gowraj N., Avireddy S., Prabhu S., GAS: A Novel Grid Based Authentication System, In: Quality, Reliability, Security and
Robustness in Heterogeneous Networks, QShine, (Singh K., Awasthi A.K.), Lecture Notes of the Institute for Computer
Sciences, Social Informatics and Telecommunications Engineering, Springer, Berlin, Heidelberg, 115, 2013, 578-590. 25. K. Irfan, A. Anas, S. Malik and S. Amir, Text based graphical password system to obscure shoulder surfing, In: Applied Sciences
and Technology (IBCAST), 2018 15th International Bhurban Conference on, IEEE, 2018, 422-426.
26. M. Mihajlov, B. Jerman-Blazič and M. Ilievski, ImagePass - Designing graphical authentication for security, In: Next Generation Web Services Practices, 2011 7th International Conference on, IEEE, 2011, 262-267.
27. L. Chee Yeung, B. Lee Weng Wai, C. H. Fung, F. Mughal and V. Iranmanesh, Graphical password: Shoulder-surfing resistant
using falsification, In: 9th Malaysian Software Engineering Conference (MySEC), IEEE, 2015, 145-148.
28. G. Yang, PassPositions: A secure and user-friendly graphical password scheme, In: Computer Applications and Information
Processing Technology (CAIPT), 2017 4th International Conference on, IEEE, 2017, 1-5.
29. S. Biswas and S. Biswas, Password security system with 2-way authentication, In: Research in Computational Intelligence and Communication Networks (ICRCICN), 2017 Third International Conference on, IEEE, 2017, 349-353.
30. K. Kolekar and M. B. Vaidya, Click and session based — Captcha as graphical password authentication schemes for smart phone
and web, In: Information Processing (ICIP), 2015 International Conference on, IEEE, 2015, 669-674. 31. B. K. Alese, A. Akindele, F. M. Dahunsi, A. F. Thompson and T. Adesuyi, A graphic-based cryptographic model for
authentication, In: Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017 International Conference On,
IEEE, 2017, 1-10. 32. M. R. Albayati and A. H. Lashkari, A New Graphical Password Based on Decoy Image Portions (GP-DIP), In: Mathematics and
Computers in Sciences and in Industry, 2014 International Conference on, IEEE, 2014, 295-298.
33. M. Mathapati, T. S. Kumaran, A. K. Kumar and S. V. Kumar, Secure online examination by using graphical own image password scheme, In: Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM),
2017 IEEE International Conference on, IEEE, 2017, 160-164.
34. R. Sudha and M. Shanmuganathan, An Improved Graphical Authentication System to Resist the Shoulder Surfing Attack, In: Technical Advancements in Computers and Communications (ICTACC), 2017 International Conference on, IEEE, 2017, 53-55.
35. G. Agarwal, S. Singh and A. Indian, Analysis of knowledge based graphical password authentication, In: Computer Science &
Education (ICCSE), 2011 6th International Conference on, IEEE, 2011, 588-591. 36. P. S. S. Princes and J. Andrews, Analysis of various authentication schemes for passwords using images to enhance network
security through online services, In: Information Communication and Embedded Systems (ICICES), 2017 International
Conference on, IEEE, 2017, 1-8. 37. J. S. Vorster, R. P. van Heerden and B. Irwin, The pattern-richness of Graphical passwords, In: Information Security for South
Africa (ISSA), 2016 Conference on, IEEE, 2016, 69-76.
38. Chiasson S., van Oorschot P.C., Biddle R. Graphical Password Authentication Using Cued Click Points, In: Computer Security – ESORICS, (Biskup J., López J.), Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 4734, 2007, 359-374.
39. Almulhem, A graphical password authentication system, In: Internet Security (WorldCIS-2011), 2011 World Congress on, IEEE,
2011, 223-225. 40. H. Lashkari, A. A. Manaf and M. Masrom, A Secure Recognition Based Graphical Password by Watermarking, In: Computer and
Information Technology, 2011 IEEE 11th International Conference on, IEEE, 2011, 164-170.
9-14
4.
Authors:
M. Sravan Kumar Reddy, K.E. Naresh Kumar, Dr. Dharmendra Singh Rajput
Paper Title: Improving Ada-boost as a popular Ensemble in Classification Problems
Abstract: In Data Mining, several classification algorithms are used to perform classification based on
single learner but classification accuracy is not in an effective manner. To increase the accuracy of the
classification then multiple learners are combined to get better results. The multiple learners are trained and
combined into an ensemble. The ensemble can increase generalization ability and robustness [3]. Based on the
advantage of ensemble, the ensemble classification is a major concern in research directions of machine
learning. Another importance of ensemble is that it is much stronger than single base learner to produce accurate
hypothesis. The ensembles are divided into homogeneous or heterogeneous, dependent or independent
ensembles. The dependent ensemble methods like boosting and AdaBoost algorithms are promisingly provide an
accurate hypothesis. Finally, AdaBoost can be a better classifier ensemble to generate accurate results.
15-17
Keywords: AdaBoost, ensemble classification, classifier ensemble, accuracy, bagging.
References:
1. Epicurus' Scientific Method. Cornell University Press, 1984. Asmis, Shadi Bartsch, and Martha Nussbaum, Seneca’s Complete
Works, 2010- 17, University of Chicago Press. 2. Ensemble Methods: Foundations and Algorithms, by Zhi-Hua Zhou (New York: Chapman & Hall/CRC, 2012, 222 pp.) ISBN: 978-1-
4398-3003-1.
3. Lior Rokach, Ensemble based Classifiers, Artificial Intelligence Rev (2010) 33:1-39. 4. R. Polikar, Ensemble based systems in decision making, IEEE Circuits and Systems Magazine, Volume 6 Issue 3 • Third Quarter
2006.
5. Provost and Koplluri, 1997. 6. Keans, Valiant, “Thoughts on Hypothesis Boosting”, 1988
7. Jesse Read , Albert Bifet , Bernhard Pfahringer , Geoff Holmes, Batch-Incremental vs. Instance-Incremental Learning in Dynamic and
Evolving Data, UC3M,UoW. 8. L.Valiant, “A theory of the learnable”, Comm. ACM, 27(100), 1984.
9. Robert E. Scaphire, “The Strength of weak learnability”, 1990.
10. L. Brieman, Bagging Predictors,Machine Learning, 24(2):123-140, 199. 11. Yoav Freund , Robert E.Scaphire, “A Decision theoretic generalization of online learning and an application to boosting”, 1995.
12. Yoav Freund , Robert E.Scaphire, Experiments with a New Boosting Algorithm , 1996.
13. Jiawei Han, Micheline Kamber, Jian Pei, “Data Mining Concepts and Techniques”, 2011.
14. C. Domingo, O. Watanabe, Madaboost: A modification of Adaboost, 2000.
15. Bradley, Scaphire, 2008
16. Merler, 2007 17. Peter L. Bartlett, Mikhali Traskin, “Adaboost is Consistent”, Journal of Machine Learning 8 (2007) 2347-2368.
18. Artur Ferreria, Mario Figueiredo, Boosting Algorithms: A Review of Methods, Theory and Applications.
19. Rushi, Snehlatha, Latesh Malik, Class Imbalance Problem in Data Mining: Review, IJCSN, Vol 2, Feb 2013. 20. J. Xu, Q. Wu, J. Zhang, Z. Tang, “Exploiting Universum data in AdaBoost using gradient descent,” Image and Vision Computing,
vol. 32, pp. 550-557, 2014.
21. B. Sun, S. Chen, J. Wang, H. Chen, “A robust multi-class AdaBoost algorithm for mislabelled noisy data,” Knowledge-Based Systems, vol. 102, pp. 87-102, 2016.
22. M. Baig, M .M. Awais, E. M. El-Alfy, “AdaBoost-based artificial neural network learning,” Neurocomputing, vol. 16, pp. 22 – 41,
2017. 23. L. D. Miller and L. K. Soh, "Cluster-Based Boosting," IEEE Transactions on Knowledge and Data Engineering, vol. 27, pp. 1491-
1504, 2015.
24. Jasmina D. Novakovic, Alempije Veljovic, Adaboost as Classifier ensemble in Classification Problems, Infoteh-Jahorina, Vol 13, March 2014.
25. B. Lipinska, A. Wosiak, Classification of Medical Data Derived from Diagnostic devices ensembles of Classifiers, 2015.
26. Matteo Re, Giorgio Valentini, Ensemble Methods: a Review, 2001.
5.
Authors: Vikram Neerugatti, Dr. A. Rama Mohan Reddy
Paper Title: Machine Learning Based Technique for Detection of Rank attack in RPL based Internet of Things
Networks
Abstract: Internet of Things (IoT) is a new Paradiagram in the network technology. It has the vast
application in almost every field like retail, industries, and healthcare etc. It has challenges like security and
privacy, robustness, weak links, less power, etc. A major challenge among these is security. Due to the weak
connectivity links, these Internet of Things network leads to many attacks in the network layer. RPL is a routing
protocol which establishes a path particularly for the constrained nodes in Internet of Things based networks.
These RPL based network is exposed to many attacks like black hole attack, wormhole attack, sinkhole attack,
rank attack, etc. This paper proposed a detection technique for rank attack based on the machine learning
approach called MLTKNN, based on K-nearest neighbor algorithm. The proposed technique was simulated in
the Cooja simulation with 30 motes and calculated the true positive rate and false positive rate of the proposed
detection mechanism. Finally proved that, the performance of the proposed technique was efficient in terms of
the delay, packet delivery rate and in detection of the rank attack.
Keywords: Internet of Things, RPL, rank attack, KNN, security
References: 1. Mattern, Friedemann, and Christian Floerkemeier. "From the Internet of Computers to the Internet of Things." From active data
management to event-based systems and more. Springer, Berlin, Heidelberg, 2010. 242-259.
2. Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation computer systems 29.7 (2013): 1645-1660.
3. Al-Fuqaha, Ala, et al. "Internet of things: A survey on enabling technologies, protocols, and applications." IEEE Communications
Surveys & Tutorials 17.4 (2015): 2347-2376. 4. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks 54.15 (2010): 2787-2805.
5. Stankovic, John A. "Research directions for the internet of things." IEEE Internet of Things Journal 1.1 (2014): 3-9.
6. Deogirikar, Jyoti, and Amarsinh Vidhate. "Security attacks in IoT: a survey." I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on. IEEE, 2017.
7. Yang, Yuchen, et al. "A survey on security and privacy issues in internet-of-things." IEEE Internet of Things Journal 4.5 (2017):
1250-1258. 8. Le, Anhtuan, et al. "Specification-based IDS for securing RPL from topology attacks." Wireless Days (WD), 2011 IFIP. IEEE, 2011.
9. Rehman, Abdul, et al. "Rank attack using objective function in RPL for low power and lossy networks." Industrial Informatics and
Computer Systems (CIICS), 2016 International Conference on. IEEE, 2016. 10. Le, Anhtuan, et al. "The impact of rank attack on network topology of routing protocol for low-power and lossy networks." IEEE
Sensors Journal 13.10 (2013): 3685-3692.
11. Wallgren, Linus, Shahid Raza, and Thiemo Voigt. "Routing Attacks and Countermeasures in the RPL-based Internet of Things." International Journal of Distributed Sensor Networks9.8 (2013): 794326.
18-22
6. Authors: S. B. Rashmi, Dr. Siva S Yellampalli
Paper Title: Design and Implementation of Low Noise Amplifier At 60ghz Using Current Mirror Feedback
Abstract: This discourse used 45nm CMOS technology to design a Low noise amplifier for a Noise figure <
2dB and gain greater than 13dB at the 60GHz unlicensed band of frequency. A single stage, primary cascode
LNA is modeled and its small signal model is analyzed. Common source structure is hired in the driver stage to
escalate the output power with single stage contours. To enhance small signal gain, simple active transistor
feedback and cascode feedback configurations are designed and appended to the basic LNA. In addition to this,
current re-use inductor is designed and added to the cascode amplifier which is deliberated to give low power
and low noise figure. Small signal analysis of simple active transistor feedback and current re-use inductor has
been presented. The measurement results indicated that the input match and the output gain at 60GHz achieves -
8dB and 13dB respectively with the supply voltage of 900mV. The frequency response obtained is a narrow
band response with 6GHz of bandwidth. The circuit is simulated by Cadence Virtuoso tool. The layout of the
related circuit is drawn by means of the Virtuoso Layout editor with total size of 0.1699μm2.
Keywords: 60GHz, Current mirror feedback, LNA, low noise figure, RF amplifier.
References: 1. Ahmed, M., Shoaib, N., & Mahmood, I. (2011). Design, Analysis and Optimization of Multistage LNA at KU Band. Journal of Space
Technology, 1, 95-100. 2. Borremans, J., Raczkowski, K., & Wambacq, P. (2009). A Digitally Controlled Compact 57-to-66 GHz Front-End in 45 nm Digital
CMOS. Paper presented at the Solid-State Circuits Conference - Digest of Technical Papers, San Francisco, CA.
3. Chunhua, W., & Qiuzhen, W. (2011). A 0.18 um CMOS Low Noise Amplifier Using a Current Reuse Technique for 3.1–10.6 GHz UWB Receivers. Journal of Semiconductors, 32.
4. Cohen, E., Ravid, S., & Ritter, D. (2008). An Ultra Low Power LNA with 15dB Gain and 4.4 dB NF in 90nm CMOS Process for 60
GHz Phase Array Radio. Paper presented at the Radio Frequency Integrated Circuits Symposium, Atlanta, GA. 5. Fan, X., Zhang, H., & Sinencio, E. S. (2008). A Noise Reduction and Linearity Improvement Technique for a Differential Cascode
LNA. IEEE Journal of Solid-State Circuits, 43(3), 588–599. doi:10.1109/JSSC.2007.916584
6. Feng, C., Yu, X. P., Lim, W. M., & Yeo, K. S. (2013). Compact 2.1–39 GHz Self-Biased Low-Noise Amplifier in 65 nm CMOS Technology. IEEE Microwave and Wireless Components Letters, 23(12), 662–664. doi:10.1109/LMWC.2013.2284778
7. Hsieh, C. A., Lin, Y. H., Hsiao, Y. H., & Wang, H. (2013). A 60 GHz Low Noise Amplifier with BuiltinLinearizer. Paper presented at
the Microwave Symposium Digest (IMS), Seattle, WA. doi:10.1109/MWSYM.2013.6697369 8. Hsu, M. T., Du, J. H., & Chiu, W. C. (2012). Design of Low Power CMOS LNA with Current-Reused and Notch Filter Topology for
DS-UWB Application. Wireless Engineering and Technology, 3(03), 167–174. doi:10.4236/wet.2012.33024
9. Huang, B. J., Wang, C. H., Chen, C. C., Lei, M. F., Huang, P. C., Lin, K. Y., & Wang, H. (2009). Designand Analysis for 60GHz Low Noise Amplifier with RF ESD Protection. IEEE Transactions on Microwave Theory and Techniques, 57(2), 298–305.
doi:10.1109/TMTT.2008.2011158 10. Inui, C., Lai, I. C. H., & Fujishima, M. (2007). 60GHz CMOS Current-Reuse Cascade Amplifier. Paper presented at the Asia-Pacific
Microwave Conference, Bangkok.
11. Kim, N., Aparin, V., Barnett, K., & Persico, C. (2006). A Cellular-Band CDMA CMOS LNA Linearized Using Active Post-Distortion. IEEE Journal of Solid-State Circuits, 41(7), 1530–1534. doi:10.1109/ JSSC.2006.873909
12. Kim, T. S., & Kim, B. S. (2006). Post-Linearization of Cascode CMOS LNA using Folded PMOS IMD Sinker. IEEE Microwave and
Wireless Components Letters, 16(4), 182–184. doi:10.1109/LMWC.2006.872131 13. Kim, Y. M., Han, H., & Kim, T. W. (2013). A 0.6-V +4 dBm IIP3 LC Folded Cascode CMOS LNA With gm Linearization. IEEE
Transactions on Circuits and Wystems. II, Express Briefs, 60(3), 122–126. doi:10.1109/TCSII.2013.2240811
14. Kuo, H. C., & Chuang, H. R. (2013). A 60-GHz High-Gain, Low-Power, 3.7-dB Noise-Figure. Paper presented at the 8th European Microwave Integrated Circuits Conference, Nuremberg.
15. Kuo, J. J., Tsai, Z. M., Lin, K. Y., & Wang, H. (2011). Design and Analysis of Novel Linearization Technique of Cascode Cell in a 60-
GHz CMOS Demodulator. IEEE Transactions on Microwave Theory and Techniques, 59(2), 456–465. doi:10.1109/TMTT.2010.2095424
16. Lee, J. Y., Park, H. K., Chang, H. J., & Yun, T. Y. (2012). Low-Power UWB LNA with Common-Gate and Current-Reuse Techniques.
IET Microwaves. Antennas & Propagation, 6, 793–799.
23-28
7.
Authors: H. N. Shwethashree, C. Kanagasabhapati, Dr. Siva S Yellampalli
Paper Title: Design of CABAC Entropy Decoding, Inverse Quantization, Inverse Transform Blocks of H.264
Decoder Using Verilog HDL
Abstract: Video compression/decompression is a term used to define a method for compressing or
decompressing digital video. There are different video compression /decompression standards. H.264 which is
also known as Advanced Video Coding is a paradigm, most commonly used these days. The objective of
developing H.264 is to devise a standard which can impart good quality of video at a nether bit rates as
compared to previous standards. To improve compression efficiency, H.264 encoders/decoders uses complex
algorithms and modes which require more power. From studies we know that software-based implementations
of these encoders/decoders on DSPs and CPUs suffer by few real time limitations. Hence hardware
implementation of video encoders and decoders are necessary. Here in this paper Entropy decoding, Inverse
Transform and Inverse Quantization blocks of H.264 Video decoder are designed using Verilog and simulated
by Xilinx ISE Simulator.
Keywords: H.264, CABAC, Inverse Quantization, Inverse Transform, Xilinx ISE.
References: 1. Shriram K Vasudevan, Subashri V, Sasikumar P, “H.264 Decoder Design using Verilog", International Journal of Computer
Applications, Volume 1 - No.4, pp. 0975 – 8887, 2010. 2. B. Juurlink et al., “Scalable Parallel Programming Applied to H.264/AVC Decoding”, Springer Briefs in Computer Science, DOI
10.1007/978-1-4614-2230-3_2, © The Author(s) 2012. 3. Yi-Tsen Chen, Chun-Jen Tsai, “Design of a Unified Entropy IP for H.264 CAVLC/CABAC Decoding”, National Chiao Tung
University, July. 2008.
4. Detlev Marpe, Thomas Wiegand and Gary J. Sullivan, “The H.264/MPEG4 Advanced video coding standard and its Applications”,
29-33
IEEE Communications Magazine, vol.44, no.8, pp.134-144, Aug.2006.
5. M. Bariani, P. Lambrushchini, M. Raggio, L. Pezzoni, “An optimized SIMD implementation of the HEVC/H.265 video decoder”, IEEE Trans. On Wireless Telecommunications Symposium (WTS), pp:1934-5070, June. 2014.
6. D. Marpe, T. Wiegand and H. Schwarz, “Context-based adaptive binary arithmetic coding in the H.264/AVC Video compression
standard”, IEEE Trans. on circuits and systems for video technology, vol.13, no. 7, pp.620-636, July.2003.
7. Varan Jain, Manisha Ingle, “Hardware Software co-design for CABAC Entropy Decoder”, International Conference on Inventive Computation Technologies (ICICT), 26-27 Aug.2016.
8. Ozgur Tasdzen, Ilker Hamzaoglu, “A high performance and low-cost hardware architecture for H.264 Transform and Quantization algorithms”, Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey, 13th European Signal Processing Conference, 2005.
9. Tiago Dis, Luis Rosario, Nuno Roma, Leonel Sousa, “High Performance Unified Architecture for Forward and Inverse Quantization in H.264/AVC”, 15th Euro micro Conference on Digital System Design, 2012.
10. Yi-Chih Cao, Shih-Tse Wei, Bin-Da Liu, Jar-Ferr Yang, “Combined CAVLC Decoder, Inverse Quantizer, and Transform Kernel in
Compact H.264/AVC Decoder”, IEEE Transactions on Circuits and Systems for Video Technology, Volume: 19, Issue: 1, Jan. 2009. 11. Taheni Damak, Hassen Loukil, Ahmed Ben Atitallah, Nouri Masmoudi, “Software and Hardware Architecture of H.264/AVC
Decoder”, International Journal of Computer Applications (0975-8887), Volume: 59, No. 19, Dec. 2012.
12. Richardson, I.E.G, ”H.264/AVC and MPEG4 video compression. Video Coding for Next Generation Multimedia”, Wiley editor, 2003. 13. G. Dileep Vamshi, P. Ramakrishna,” VLSI Implementation of H.264 Transform and Quantization Algorithms”, International Journal
of Science and Research (IJSR), India Online ISSN: 2319-7064, Volume: 2, Issue 3, March. 2013.
14. Henrique S. Malvar, Antti Hallapuro, Marta Karczewicz, Louis Kerofsky,” Low Complexity Transform and Quantization in H.264/AVC”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, no. 7, July. 2003.
8.
Authors: A. Pallavi, C. Kanagasabapathi, Dr. Siva S Yellampalli
Paper Title: Host Based SystemC-TLM2.0 Simulation Model for Memory Device Driver Verification
Abstract: With increasing complexity in SoC architecture in today’s embedded systems demand for more
software applications is increasing. Time to market plays an important role for any product to win the market.
Device drivers and stability pre-silicon (prior to silicon arrival) plays a very important role. To develop,
integrate, system test and debug device drivers like Memory, I2C, PCIE, USB etc. with real world use cases,
availability of hardware board is necessity. Availability of hardware board traditionally happens towards the
later stages of the project life cycle. The best solution is using SystemC-TLM2.0 simulation models to verify
device drivers early. This ensures the readiness of device drivers even before the hardware availability and
effectively reduces time to market (TTM). Aim of this thesis is to develop Host based SystemC-TLM2.0
simulation model for Memory device driver verification.
Keywords: System C, TLM2.0, TTM, Memory device drivers.
References: 1. Jon Connell, ARM , Bruce Johnson, Synopsys, Inc , “Early Hardware/Software Integration Using SystemC 2.0” , Class 552, ESC
San Francisco 2002
2. Luca Fossati, Politecnico di Milano (Italy): 2009-2010 , European Space Agency/ESTEC: 2010-2012, “Development of the SystemC model of the LEON2/3 Processor”, ESA contract 20921/07/NL/JD
3. Claude Helmstetter, Vania Joloboff, “SimSoC: A SystemC TLM integrated ISS for full system simulation”, INRIA
4. Sammidi Mounika and Renuka B S, “An Approach to Reduce Time to Market in today’s Mobile Market”, IEEE Computer Society, IEEE Standard for Standard, SystemC® Language Reference Manual, IEEE Std 1666™-2011
5. M. Caldari*, M. Conti*, M. Coppola**, S. Curaba**, L. Pieralisi*, C. Turchetti*, “Transaction-Level Models for AMBA Bus Architecture Using SystemC 2.0”, 1530-1591/03, IEEE 2003
6. David C.Black, Jack Danovan, “SystemC: From the Ground Up”©2004 Kluwer Academic Publishers,Eklectic Ally,Inc
34-37
9.
Authors: Mr. Guru Kumar Lokku, Dr. G. Harinatha Reddy, Dr. M. N. Giri Prasad
Paper Title: Automatic Face Recognition for Various Expressions and Facial Details
Abstract: Face Recognition Technique (FRT) was a unique Biometric Technique which tries to spot the
people from still images or video frames by using techniques of pattern recognition. Face recognition includes
both face identification and face verification (authentication). The FR Design system follows two basic steps i.e.
Feature extraction and classification of patterns. Automated FR finds many applications in real time
environment ranging from Social Media, surveillance to biometric authentications. Many state-of-the-art face
recognition techniques had been implemented, but the Automated Face Recognition (AFR) taken by digital
cameras in unconstraint real‐world environment continues to be terribly difficult, since it involves vital
variations in each acquisition conditions, yet as in facial expressions and in pose variations. Thus, this paper
presents the theme of computer based automatic face recognition in lightweight of the most contests therein
areas with developed solutions that supports applications of signal, image processing and computing strategies.
Keywords: Face acknowledgement, HOG, Machine learning, PCA, Wild.
References: 1. M. A. Abuzneid and A. Mahmood, "Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation
Neural Network," in IEEE Access, vol. 6, pp. 20641-20651, 2018.
2. C. Ding and D. Tao, "Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face Recognition," in IEEE
Transactions on Pattern Analysis and Machine Intelligence, vol. 40, no. 4, pp. 1002-1014, 1 April 2018.
3. J. Lei, Q. Han, L. Chen, Z. Lai, L. Zeng and X. Liu, "A Novel Side Face Contour Extraction Algorithm for Driving Fatigue Statue
Recognition," in IEEE Access, vol. 5, pp. 5723-5730, 2017.
4. S. P. Mudunuri and S. Biswas, "Low Resolution Face Recognition Across Variations in Pose and Illumination," in IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 38, no. 5, pp. 1034-1040, 1 May 2016.
5. A.Punnappurath, A. N. Rajagopalan, S. Taheri, R. Chellappa and G. Seetharaman, "Face Recognition Across Non-Uniform Motion
38-42
Blur, Illumination, and Pose," in IEEE Transactions on Image Processing, vol. 24, no. 7, pp. 2067-2082, July 2015.
6. F. Juefei-Xu, K. Luu and M. Savvides, "Spartans: Single-Sample Periocular-Based Alignment-Robust Recognition Technique Applied
to Non-Frontal Scenarios," in IEEE Transactions on Image Processing, vol. 24, no. 12, pp. 4780-4795, Dec. 2015.
7. W. Deng, J. Hu, J. Lu and J. Guo, "Transform-Invariant PCA: A Unified Approach to Fully Automatic Face Alignment,
Representation, and Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 6, pp. 1275-1284,
June 2014.
8. H. T. Ho and R. Chellappa, "Pose-Invariant Face Recognition Using Markov Random Fields," in IEEE Transactions on Image
Processing, vol. 22, no. 4, pp. 1573-1584, April 2013.
9. M. Yang, L. Zhang, S. C. Shiu and D. Zhang, "Robust Kernel Representation With Statistical Local Features for Face Recognition,"
in IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 6, pp. 900-912, June 2013.
10. W. W. W. Zou and P. C. Yuen, "Very Low-Resolution Face Recognition Problem," in IEEE Transactions on Image Processing, vol.
21, no. 1, pp. 327-340, Jan. 2012.
11. Geng, Z. Zhou and K. Smith-Miles, "Individual Stable Space: An Approach to Face Recognition Under Uncontrolled Conditions,"
in IEEE Transactions on Neural Networks, vol. 19, no. 8, pp. 1354-1368, Aug. 2008.
12. X. Chai, S. Shan, X. Chen and W. Gao, "Locally Linear Regression for Pose-Invariant Face Recognition," in IEEE Transactions on
Image Processing, vol. 16, no. 7, pp. 1716-1725, July 2007.
13. M. Pantic and I. Patras, "Dynamics of facial expression: recognition of facial actions and their temporal segments from face profile
image sequences," in IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 36, no. 2, pp. 433-449, April
2006.
14. Dagher and R. Nachar, "Face recognition using IPCA-ICA algorithm," in IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 28, no. 6, pp. 996-1000, June 2006.
15. M.Turk, A.P. Pentland, "Face Recognition Using Eigenfaces", Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 586-
591, 1991.
16. Y. Chen, C. Han, C. Wang and K. Fan, "Face Recognition Using Nearest Feature Space Embedding," in IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 33, no. 6, pp. 1073-1086, June 2011.
10.
Authors: C. Kanagasabapathi, Siddamma, Siva S Yellampalli
Paper Title: Design of Programmable Pixel Shader Computing Unit
Abstract: With increased focus on improved Graphics, the gaming industries for computer and mobile devices
requires more complex graphical algorithms, which in need of better computational resources. In general
graphical computation requires more computational units, which will be major constraint in mobile devices as it
demands for more power. In order to develop such efficient computational units, one need to focus on the
Graphical pipeline to have better visual effects. In this paper design of programmable Pixel shader computing
unit is discussed. In GPU, the Pixel shaders are used to process and manipulate the each pixel. Also the Pixel
Shaders are used to provide final coloring to the processed data. Here the programmable Pixel shader computing
unit design is discussed, which help the programmer to add his own code for achieving better visual effects or
results. The possible Instructions of Pixel shader are designed using Verilog HDL. The SIMD (Single Instruction
Multiple Data) concept is adopted for the designing of each instruction.
Keywords: GPU, Pixels, Pixel Shader, Graphical Rendering, SIMD.
References: 1. J. Nickolls and W. J. Dally, “The GPU Computing Era,” IEEE Mirco, pp. 56-69, Mar./Apr., 2010.
2. B.-G. Nam, H. Kim, and H.-J. Yoo, “A Low-Power Unified Arithmetic Unit for Programmable Handheld 3-D Graphics Systems,” IEEE Journal of Solid-State Circuits, vol. 42, no. 8, pp. 1767-1778, Aug. 2007.
3. B.-G. Nam, H. Kim, and H.-J. Yoo, “Power and Area-Efficient Unified Computation of Vector and Elementary Functions for Handheld
3D Graphics Systems,” IEEE Trans. Computers, vol. 57, no. 4, pp. 490-504, Apr. 2008.
4. B.-G. Nam and H.-J.Yoo “An Embedded Stream Processor Core Based on Logarithmic Arithmetic for a Low-Power 3-D Graphics
SoC,” IEEE Journal of Solid-State Circuits, vol. 44, no. 5, pp. 1554-1570, May 2009. 5. By Jason Zink, Matt Pettineo, Jack Hoxley, “Practical Rendering and Computation with Direct3D 11” 2011
6. Ed Angel (University of New Mexico), Dave Shreiner(ARM) , “Teaching a Shader-Based Introduction to Computer Graphics”, IEEE
Computer Graphics and Application. Revised 10 Feb. 2011. 7. Shen-Fu Hsiao, Po-Han Wu, Chia-Sheng Wen, and Li-Yao Chen, “Design of a Programmable Vertex Processor in OpenGL ES 2.0
Mobile Graphics Processing Units” 2013 International Symposium on VLSI Design, Automation, and Test (VLSI-DAT)2013.
8. James C. Leiterman, “Learn Vertex and Pixel Shader Programming with DirectX® 9” 2004. 9. Yu-Jung Chen, Chao-Hsien Hsu, Chung-Yao Hung, Chia-Ming Chang, Shan-YiChuang, Liang-Gee Chen, and Shao-Yi Chien, “A
130.3 mW 16-Core Mobile GPU With Power-Aware Pixel Approximation Techniques”, IEEE Journal Of Solid-State Circuits, Vol.50,
No.9, September 2015. 10. Ian Bratt, “The ARM® Mali-T880 Mobile GPU”, 2015 IEEE Hot Chips 27 Symposium (HCS), 2015.
11. Kwang-Yeob Lee, Tae-Ryoung Park, Jae-Chang Kwak, Yong-Seo Koo, “A Design of Multi-threaded Shader Processor with Dual-
Phase Pipeline Architecture”, 2009 First International Conference on Advances in Multimedia 2009.
43-46
11.
Authors: Shaik. Muqthiar Ali, Dr. Mareddy Padma Lalitha, Dr. N. Visali
Paper Title: Analysis of Transmission Cost Allocation Strategies with Reliability for Deregulated Systems
Abstract: This paper presents a learning review of various strategies related to the improvement of the
reliability for the deregulated system, for instance, Genetic Algorithms (GA), Tabu Search (TS), heuristic
calculations and system based techniques. These methodologies were produced for advancing reliability as either
software or hardware exclusively. Besides, the cost segments related with limit utilize and reliability advantage
charges are resolved and various optimization techniques are acknowledged of action of the goal work.
Keywords: Transmission cost allocation (TCA), Allocation Tier (AL) Transacted Power(TPO) deregulated
47-54
electricity market, loss cost, Genetic algorithm, TS, SA
References: 1. Moradi, Mohammad Hasan and M. Abedini, "A combination of genetic algorithm and particle swarm optimization for optimal
DG location and sizing in distribution systems", An International Journal of Electrical Power & Energy Systems, Vol.34, No.1,
pp.66-74, 2012 2. Amanulla, B., SaikatChakrabarti and S. N. Singh, "Reconfiguration of power distribution systems considering reliability and
power loss", IEEE transactions on power delivery, Vol.27, No.2, pp.918-926, 2012
3. Borges and Carmen Lucia Tancredo, "An overview of reliability models and methods for distribution systems with renewable energy distributed generation", An International Journal of Renewable and sustainable energy reviews, Vol.16, No.6, pp.4008-
4015, 2012
4. Awad, Ahmed SA, Tarek HM El-Fouly and Magdy MA Salama, "Optimal distributed generation allocation and load shedding for improving distribution system reliability", An International Journal of Electric Power Components and Systems, Vol.42, No.6,
pp.576-584, 2014
5. da Silva, Armando M. Leite, Joao Guilherme de Carvalho Costa and Luis Henrique Lopes Lima, "A new methodology for cost allocation of transmission systems in interconnected energy markets", IEEE Transactions on Power Systems, Vol.28, No.2,
pp.740-748, 2013 Usaola, Julio, "A transaction-based method for allocation of transmission grid cost and losses", An
International Journal of Electric power systems research, Vol.76, No.6-7, pp.395-403, 2006 6. Abdelkader and Sobhy M, "Transmission loss allocation through complex power flow tracing", IEEE transactions on Power
Systems, Vol.22, No.4, pp.2240-2248, 2007
7. Mutale, J., G. Strbac, S. Curcic and N. Jenkins, "Allocation of losses in distribution systems with embedded generation", IET
Proceedings-Generation, Transmission and Distribution, Vol.147, No.1, pp.7-14, 2000
8. Reta, R. and A. Vargas, "Electricity tracing and loss allocation methods based on electric concepts", IEE Proceedings-Generation,
Transmission and Distribution, Vol.148, No.6, pp.518-522, 2001 9. Chung, Koo-Hyung, Balho H. Kim, Don Hur and Jong-Keun Park, "Transmission reliability cost allocation method based on
market participants’ reliability contribution factors", An International Journal of Electric power systems research, Vol.73, No.1,
pp.31-36, 2005 10. Gross, George and Shu Tao, "A physical-flow-based approach to allocating transmission losses in a transaction framework",
IEEE Transactions on Power Systems, Vol.15, No.2, pp.631-637, 2000
11. Mezger, Alfredo J. and Katia C. de Almeida, "Short term hydrothermal scheduling with bilateral transactions via bundle method", An International Journal of Electrical Power & Energy Systems, Vol.29, No.5, pp.387-396, 2007
12. Roh, Jae Hyung, Mohammad Shahidehpour and Lei Wu. "Market-based generation and transmission planning with
uncertainties", IEEE Transactions on Power Systems, Vol.24, No.3, pp.1587-1598, 2009 13. Abhyankar, A. R., S. A. Soman and S. A. Khaparde, "Optimization approach to real power tracing: an application to transmission
fixed cost allocation", IEEE transactions on power systems, Vol.21, No.3, pp.1350-1361, 2006
14. Conejo, Antonio J., Francisco D. Galiana and IvanaKockar, "Z-bus loss allocation" IEEE Transactions on Power Systems, Vol.16, No.1, pp.105-110, 2001
15. Kang, Qin-Ma, Hong He, Hui-Min Song and Rong Deng, "Task allocation for maximizing reliability of distributed computing
systems using honeybee mating optimization", An International Journal of Systems and Software, Vol.83, No.11, pp.2165-2174, 2011
16. Orfanos, George A., Pavlos S. Georgilakis and Nikos D. Hatziargyriou, "A more fair power flow based transmission cost
allocation stragey plan considering maximum line loading for N-1 security", IEEE Transactions on Power Systems, Vol.28, No.3, pp.3344-3352, 2013
17. Abdala and Manuel A, "Transmission pricing in privately-owned electricity grids: An illustration from the Argentine electricity
pool", An International Journal of Energy Economics, Vol.30, No.4, pp.1284-1305, 2008 18. Radzi, N. H., R. C. Bansal, Z. Y. Dong, M. Y. Hassan and K. P. Wong, "RETRACTED: An efficient distribution factors
enhanced transmission pricing method”, An International Journal of NEM transmission charging stragey plan, pp.319-328, 2013
12.
Authors: K. Naresh, Dr. P. Umapathi Reddy, Dr. P. Sujatha
Paper Title: Wind Based Doubly Fed Induction Generator for Effective Rotor Side Converter Control
Abstract: The presence of voltage swells over the DC connection of the successful rotor side converter of a
Doubly Fed Induction Generator (DFIG) is natural because of vulnerability in twist vitality and in addition the
variety of rotor precise speed. This can weaken the execution of the consecutive converter associated on the
rotor side of the DFIG. Subsequently, the principle goal of this paper is to plan a criticism linearization
procedure to dispose of the dc-interface voltage swell and additionally acquire solidarity control factor. In this
paper, the dynamic demonstrating of DFIG alongside the viable rotor side converter is performed. The criticism
linearization strategy controls the inward elements of the successful rotor side converter by considering the rotor
q-pivot current and DC connect voltage. The MATLAB recreation results portray the viability of the voltage
control strategy, through the varieties of rotor side channel, DC interface capacitance and vulnerabilities in the
DC connect voltage.
Keywords: Effective rotor side converters, DC connect voltage, feedback linearization, voltage control.
References: 1. G. abad, J. Lopez, M. A. Rodriguez, L. Marroyo, G. Iwanski, “ Double Fed Induction Machine”, IEEE press.
2. V. Blasko and V. Kaura., “A New Mathematical model and Control of a three phase AC-DC voltage source Converter”, IEEE Transactions on Power Electronics., vol. 12, no. 1, pp. 116-123, Jan. 1997.
3. Yang.Ye,M.Kazerani,V.H.Quintana “Modeling,Control and Implementation of Three phase PWM Converters”, IEEE
Transactions on Power electornics,vol.18,no.3,pp 857-863,May 2003. 4. M. T. T sai and W. I. Tsai, “Analysis and design of three-phase AC-to-DC converters with high power factor and near optimum
feed forward,” IEEE Transactions Industrial Electronics, vol.46, pp. 263–273, June 1999.
5. R. Wu, S. B. Dewan, G. R. Slemon, “A PWM ac/dc converter with fixed switching frequency,” IEEE Transactions on Industry. Applications, vol. 26,pp. 880–885, Sept. 1990.
6. P. Verdelho and G. D. Marques, “DC voltage control and stability analysis of PWM voltage type reversible rectifiers,” IEEE
Transactions on Industrial Electron.,vol.45, pp.263–273, Apr.1998. 7. A.Draou, Y. Sato, and T. Kataoka, “A new state feedback based transient control of PWM AC to DC type converters,” IEEE
Transactions on Power Electronics. vol. 10, pp. 716– 724, Nov. 1995.
8. H.Komurcugil,O.Kukrer,”A Novel Current- Control Method for Three Phase AC-DC Voltage- Source Converters ”IEEE Transactions on Industrial Electronics,Vol.46,No.3,June 1999.
55-60
9. B.Deng Ge Li,J.Wang,X.Wei,Fei Su,” Dynamic Control of Seizure States with Input Output Linearization Method Based on
The Pinsky- Rinzel Model” 7th International conference on Bio Medical Engineering and Informatics 2014. 10. Rusong Wu, Shashi.B.D,Gordon.R.S,”Analysis of a PWM ac to dc Voltage Source Converter under the Predicted Current
Control with a Fixed Switching Frequency” IEEE Transactions on Industry applications,Vol.27,No.4,July/Aug 1991.
11. T.-S. Lee, “Input output linearization and zero dynamics control of three phase AC/DC voltage source converters”, IEEE
Transactions on Power Electronics, vol. 18, no. 1, January 2003.
12. J. Sheok. Kim and S. Ki. Sul, “New control scheme for ac/dc/ac converter without dc link electrolytic capacitor,” in IEEE
pesc’93, Seattle, WA,pp.300-306, June 1993. 13. L. Malesani, L. Rossetto, P. Tenti, and P. Tomasin, “AC- DC-AC PWM converter with reduced energy storage in the dc link,”
IEEE Transactions inIndustry.Applications.,vol.31,pp. 287-292, Mar/Ap 1995.
14. E.sehirli,M.Altinay,”Input- outputLinearization”Kastamonu University online www.intechopen.com. 15. H.komurcugil,O.kukrer”Lyapunov based control for three phase PWM AC/DC voltage-source inverters”, IEEE Transactions on
Power Electronics,Vol.13,no.5,pp.801- 813,Sep.1998.
16. D.C.Lee,G,M. Lee, Ki-do.Lee, “DC Bus voltage control of Three phase AC/DC PWM converters using feedback linearization”,IEEE Transactions. Industry. Applications., vol.36, no.3, pp. 826-833, May/June 2000.
17. T.s.Lee,T.kune shiang”Input output Linearization control with load estimator of Three phase AC/DC voltage source
converters”IEEE PSEC,Vol.2,pp.791-795,2002. 18. Shuai, Xiaoping Zhang” Input Output Linearization and Stabilization Analysis of Internal Dynamics of Three Phase AC/DC
Voltage Source Converters” International Conference on Electrical Machines and Systems (ICEMS), 2010.
19. P. Rioual, H. Pouliquen, and J. P. Louis, “Non linear control of PWM rectifier by feedback linearization and exact PWM control,” in Proc.IEEE PESC’94 Conference, June 1994, pp. 1095–1102.
13.
Authors: J. A. Ganeswari, Dr. R. Kiranmayi
Paper Title: PV with Boost Converter Integrated Three-Level Inverter Fed PMSM Drive for Agricultural
Application
Abstract: Apprehension of inverter fed electric motors is made possible with the trends in power electronic
technology. Permanent magnet synchronous motor (PMSM) is one motor replaced conventional electric motors
with attractive features like compactness, lightweight and efficiency. This paper presents a PV (Photo-voltaic)
fed PMSM drive system for water pumping application. Photo-voltaic system is one among the renewable
sources available free from atmosphere which can generate electricity with ease. Output of PV is fed to a boost
converter to generate required level of voltage to PMSM. Boost output is fed to a driving inverter to PMSM.
Closed-loop boost converter feeding PMSM drive is analyzed. PMSM drive is a closed-loop system design to
run at commanded speed. PV fed PMSM drive is validated with fixed speed and variable speed conditions.
Keywords: PV, PMSM Drive, Boost, Inverter, Closed Loop Controller.
References: 1. R. Krishnan, “Permanent Magnet Synchronous and Brushless DC Motor Drives,” CRC Press, Taylor and Francis Group. ISBN-978-
0-8247-53849
2. Paul C.Krause, Oleg Wasynczuk, Scott D.Sundhoff, “Analysis of Electric Machinery and Drive Systems,” IEEE Press Power Engineering society ISBN-0-471-14326-X
3. H,Madadi Kojabad, G.Ahrabian, “Simulation and analysis of the interior permanent magnet synchronous motor as a brushless AC-
drive,” Science direct / Simulation practice and theory 7(2000) 691-707 4. Pragasan Pillay, R.Krishnan.” Modeling of Permanent Magnet Motor Drives”, IEEE vol.35,no.4,november 1988
5. R. Dhaouadi, N. Mohan and L. Norum, "Design and implementation of an extended Kalman filter for the state estimation of a
permanent magnet synchronous motor," IEEE Trans. Industrial Electronics, vol. 6, Jul. 1991, pp.491- 497. 6. K. Rajashekara, A. Kawamura and K. Matsuse, "Sensorless control of AC motor drives", New York: IEEE Press, 1996.
7. G. Sree Lakshmi, S. Kamakshaiah and T. R. Das, "Closed loop PI control of PMSM for hybrid electric vehicle using three level diode
clamped inverter for optimal efficiency," Energy Efficient Technologies for Sustainability (ICEETS), 2013 International Conference on, Nagercoil, 2013, pp. 754-759.
8. H. H. Lee and U. H. Jeong "A Study on Speed Synchronization for Multi Motors using Controller Area Network" IEEE Trans. Ind. Appl., vol. 44 no. 4 2000.
9. L. Feng Y. Koren and J. Borenstein "Cross-Coupling Motion Controller for Mobile Robots" IEEE Trans. on Control Systems
Technology, vol. 1 December 1993. 10. D. Noel, F. Sozinho, D. Wilson and K. Hatipoglu, "Analysis of large scale photovoltaic power system integration into the existing
utility grid using PSAT," SoutheastCon 2016, Norfolk, VA, 2016, pp. 1-7.
11. M. Ouada M. S. Meridjet N. Talbi "Optimization photovoltaic pumping system based BLDC using fuzzy logic MPPT control" Proc. Int. Renew. Sustain. Energy Conf. (IRSEC) pp. 27-31 Mar. 2013.
12. Terki A. Moussi A. Betka N. Terki "An improved efficiency of fuzzy logic control of PMBLDC for PV pumping system" Appl.
Math. Model. vol. 36 no. 3 pp. 934-944 Mar. 2012. 13. Anurag, N. Deshmukh, A. Maguluri and S. Anand, "Integrated DC-DC Converter Based Grid-Connected Transformerless
Photovoltaic Inverter with Extended Input Voltage Range," in IEEE Transactions on Power Electronics, vol. PP, no. 99, pp. 1-1.
14. J. A. Ganeswari, Dr. R. Kiranmayi, 'Performance Improvement for DC Boost Converter with Fuzzy Controller, 2nd International Conference on Inventive Systems and Control (ICISC 2018).
61-64
14.
Authors: A. Geetha, N. P. Subramaniam
Paper Title: PI CONTROL OF CURRENT-FED DUAL ACTIVE BRIDGE CONVERTER FOR DC
MICROGRID
Abstract: A detailed modelling of soft-switching isolated current-fed dual active bridge (CFDAB) DC/DC
converter is presented. This converter is suitable for an interface between two DC buses in a microgrid but is not
controlled. The model of the converter is derived with the help of state space averaging method. Based on this
modelling, the PI controller designed to improve the operation of the CFDAB converter. Simulation results using
MATLAB/Simulink with controller design to verify the stability of the converter and validated performance of
the system used for DC microgrid applications of between two buses. The effectiveness of the controller has
justified in terms of line, load variation and tracking the reference values.
Keywords: Bidirectional, Current-fed, DC Microgrid, Dual Active Bridge, PI control.
65-70
References: 1. Rocabert, J., Luna, A., Blaabjerg, F., & Rodriguez, P. (2012). Control of power converters in AC microgrids. IEEE transactions on
power electronics, 27(11), 4734-4749.
2. Hossain, M., Pota, H., & Issa, W. (2017). Overview of AC microgrid controls with inverter-interfaced generations. Energies, 10(9),
1300. 3. Dragičević, T., Lu, X., Vasquez, J. C., & Guerrero, J. M. (2016). DC microgrids—Part I: A review of control strategies and
stabilization techniques. IEEE Transactions on power electronics, 31(7), 4876-4891.
4. Elsayed, A. T., Mohamed, A. A., & Mohammed, O. A. (2015). DC microgrids and distribution systems: An overview. Electric Power Systems Research, 119, 407-417.
5. Justo, J. J., Mwasilu, F., Lee, J., & Jung, J. W. (2013). AC-microgrids versus DC-microgrids with distributed energy resources: A
review. Renewable and sustainable energy reviews, 24, 387-405. 6. Lucia, O., Cvetkovic, I., Sarnago, H., Boroyevich, D., Mattavelli, P., & Lee, F. C. (2013). Design of home appliances for a DC-
based nanogrid system: An induction range study case. IEEE Journal of Emerging and Selected Topics in Power Electronics, 1(4),
315-326. 7. Symanski, D. P. (2011, April). Residential & Commercial Use Of DC Power. In UL & NFPA-Low Voltage Direct Current
Workshop. Arlington, Virginia: EPRI.
8. Song, W., Hou, N., & Wu, M. (2018). Virtual Direct Power Control Scheme of Dual Active Bridge DC–DC Converters for Fast Dynamic Response. IEEE Transactions on Power Electronics, 33(2), 1750-1759.
9. Wu, T. F., Yang, J. G., Kuo, C. L., & Wu, Y. C. (2014). Soft-switching bidirectional isolated full-bridge converter with active and
passive snubbers. IEEE Transactions on Industrial Electronics, 61(3), 1368-1376.
10. Zhang, K., Shan, Z., & Jatskevich, J. (2017). Large-and small-signal average-value modeling of dual-active-bridge DC–DC
converter considering power losses. IEEE Transactions on Power Electronics, 32(3), 1964-1974.
11. Gammeter, C., Krismer, F., & Kolar, J. W. (2016). Comprehensive conceptualization, design, and experimental verification of a weight-optimized all-SiC 2 kV/700 V DAB for an airborne wind turbine. IEEE Journal of Emerging and Selected Topics in Power
Electronics, 4(2), 638-656. 12. Xue, F., Yu, R., & Huang, A. Q. (2017). A 98.3% Efficient GaN Isolated Bidirectional DC–DC Converter for DC Microgrid Energy
Storage System Applications. IEEE Transactions on Industrial Electronics, 64(11), 9094-9103.
13. Wu, H., Ding, S., Sun, K., Zhang, L., Li, Y., & Xing, Y. (2017). Bidirectional Soft-Switching Series-Resonant Converter With Simple PWM Control and Load-Independent Voltage-Gain Characteristics for Energy Storage System in DC Microgrids. IEEE J.
Emerg. Sel. Top. Power Electron, 5, 995-1007.
14. Aguilar, O., Tapia, R., Valderrabano, A., & Minor, H. (2015). Design and performance comparison of PI and adaptive current controllers for a WECS. IEEE Latin America Transactions, 13(5), 1361-1368.
15. Sira-Ramirez, H. (1991). Nonlinear PI controller design for switchmode DC-to-DC power converters. IEEE Transactions on Circuits
and Systems, 38(4), 410-417. 16. Zhang, Y., Wang, Z., & Liu, P. (2017, October). Optimized modulation for current-fed dual active bridge to achieve high efficiency
in wide load range. In Industrial Electronics Society, IECON 2017-43rd Annual Conference of the IEEE (pp. 1381-1386). IEEE.
17. Guacaneme, J., Garcerá, G., Figueres, E., Patrao, I., & González‐Medina, R. (2015). Dynamic modeling of a dual active bridge DC
to DC converter with average current control and load‐current feed‐forward. International Journal of Circuit Theory and
Applications, 43(10), 1311-1332.
18. Alvarez-Ramirez, J., Cervantes, I., Espinosa-Perez, G., Maya, P., & Morales, A. (2001). A stable design of PI control for DC-DC converters with an RHS zero. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 48(1), 103-106.
19. Jaafar, A., Alawieh, A., Ortega, R., Godoy, E., & Lefranc, P. (2013). PI stabilization of power converters with partial state
measurements. IEEE Transactions on control systems technology, 21(2), 560-568. 20. Yau, H. T., Lin, C. J., & Liang, Q. C. (2013). PSO based PI controller design for a solar charger system. The Scientific World
Journal, 2013.
15.
Authors: Harshit R. Das, Potti. Srinivasa Rao, Giridhar B Kamath, Shiva Prasad H. C
Paper Title: Influence of E-marketing strategy on Customer Satisfaction
Abstract: Over the past two decades, several attempts were made to provide best practices for e-service
quality measurement and e-marketing strategy. It is always necessary to measure the performance quality of web
services using different means such as E-SERVQUAL model. The customer satisfaction gets enhanced after
measuring the E-service quality in a service-based company. The proposed study uses E-SERVQUAL model for
measuring the service quality of an E-commerce Company. The survey questionnaire method is used to collect
responses from customers of the company via email and newsletters. The results indicate that factors: efficiency,
reliability, assurance and security in the e-service system are in favorable condition and factor: responsibility is
not in the favorable condition that affects the customer satisfaction level of the company. Managerial
implications are proposed with the help of theoretical study of e-marketing strategy 2P+2C+3S to enhance
customer satisfaction of the company.
Keywords: E-SERVQUAL model, customer satisfaction, customer experience, e-service quality, e-marketing
strategy.
References: 1. S. Sahadev, K. Purani, “Modelling the consequences of e‐service quality,” Marketing Intelligence & Planning, vol. 26 no. 6,
2008, pp.605–620.
2. F. F. Reichheld, and P. Schefter, “E-loyalty: your secret weapon on the web,” Harvard Business Review, vol. 78, no. 4, 2000, pp.
105–113. 3. A.Parasuraman, V. A. Zeithaml, and L. L. Berry, L.L. “SERVQUAL: a multiple-item scale for measuring consumer perceptions
of service quality,” Journal of Retailing, Spring, 1988 pp. 12–40.
4. G. S. Sureshchandar, C. Rajendran, and R. N. Anantharaman, "The relationship between service quality and customer satisfaction – a factor approach,"Journal of Services Marketing, vol. 14, no. 4, 2002, pp. 363–379.
5. J. Hasan, “Analysis of E-Marketing Strategies,” Studia commercial Bratislavensia, vol. 14, no. 4, 2011, pp. 221-226.
6. K. Beamish, and R. Ashford, Marketing Planning 2007-2008, Routledge, 2007. 7. R. Saravanan, and K. S. P. Rao, “Measurement of service quality from the customer’s perspective – An empirical study,” Total
Quality Management, vol. 18, no. 4, 2007, pp. 435–449.
8. A.M. Wicks, and C. J. Roethlein, “A Satisfaction-Based Definition of Quality,” Journal of Business & Economic Studies, vol. 15, no. 1, 2009, pp. 223–255.
9. M. M. Akbar, and N. Parvez, “Impact of Service quality, trust and customer satisfaction on customer’s loyalty,” ABAC journal,
71-74
vol. 29, no. 1, 2009, pp. 24–38.
10. V. A. Zeithaml, A. Parasuraman, and A. Malhotra, “A conceptual framework for understanding e-service quality: implications for future research and managerial practice,” MSI Working Paper Series, No. 00-115, Cambridge, MA, 2001, pp. 1-49.
11. V. A. Zeithaml, “Consumer perceptions of price, quality and value: A means–end model and synthesis of evidence,” Journal of
Marketing, vol. 52, 1988, pp. 2–22.
12. A.Parasuraman, V. A. Zeithaml, and L. L. Berry, “SERVQUAL: a multiple-item scale for measuring consumer perceptions of
service quality,” Journal of Retailing, vol. 64 no. 1, 1988, pp. 12-40.
13. V. A. Zeithaml, A. Parasuraman, and A. Malhotra, “Service quality delivery through Websites: a critical review of extant knowledge,” Journal of the Academic of Marketing Science, vol. 30 no. 4, 2002, pp. 362–75.
14. A.Nemati, H. Gazor, S. MirAshrafi and K Ameleh, “Analyzing e-service quality in
service-based website by E-SERVQUAL,” Management Science Letters, vol. 2, no. 2,
2002, pp.727–734. 15. C R. Kothari, Research Methodology: Methods and Techniques, (2nd Ed), New Age International Publishers. 2004.
16. W. W. Chin, “The Partial Least Squares Approach for Structural Equation Modeling,” In GA Marcoulides (ed.), Modern Methods for Business Research, 1998, pp. 295–336. Lawrence Erlbaum Associates, London.
16.
Authors: Obulesu Varikunta, Dr. M. Sudheer Kumar, K. Kishore Naidu
Paper Title: Analysis on Rural and Urban Employee Job Satisfaction towards SBI Bank in Rayalaseema
Division
Abstract: Job satisfaction, in simple words is the level of content with the job an employee is in. Since many
years in numerous studies have been conducted on the level of rural and urban employees of job satisfaction in
the organization. Job satisfaction is the favorableness or un-favorableness with which employees view their
work. Rural and urban Job satisfaction is a psychological concept and it is mostly depend upon the internal
feeling of employees. Job satisfaction is a general attitude which is the result of many specific attitudes in these
areas. The gradual preeminence of employee in the power hierarchy, overcoming workplace discrimination in
the corporate sector displays not the change in the outlook and the perception of the management, job
satisfaction of the employees in the State Bank of India.
Keywords: Banking sector, Employees, Rural and urban job satisfaction, Human resource.
References: 1. Robins, S.P., & Judge, T.P. (2013). Organizational Behaviour. Pearson Education Inc. 2. Khalid Salman & Irshad Muhammad,( 2011) “ Factor Affecting Job Satisfaction” Journal of Management Research, 6(2), 84– 101.
3. Alam (2013) Wages and Employees Satisfaction Management and Labour Studies. 23(3), pp. 421-427.
4. Zeal, Anwar and Nazrul (2012). “Work Experience and relationship with Job Satisfaction”. Journal of Psychology, Vol. 132. 5. Neelamegam Mallika (2010), “Job Satisfaction & Demographic Variables – Is there a Link?”, Perspectives of Innovation , Economics
& Business, Volume 6, Issue 3, pg 108 -111,;www.pieb.cz.
6. Nguyen, A.N., Taylor, J & Bradley, S., (2003), Relative pay and employee satisfaction: some new evidence. https.mpra.ub.uni-muenchen.de/1382,01 (43).
7. Gill, A., Sharma, S. P., Mathur, N., & Bhutani, S. (2012). The effects of job satisfaction and work experience on employee-desire for
empowerment: A comparative study in Canada and India. International Journal Of Management, 29, 190-200. 8. Bhandari, K., & Soni, H. (2015). Impact of Gender, Age and Work Experience on Satisfaction. IOSR Journal of Business and
Management, 17 (3), 48-53.
9. Indian Journal of Banking Review. Vol 24. No. 2. 10. Singh. G. Janak and Namita Dewans (2003): "Job satisfaction among bank employees.
11. Keller, (2008), Satisfaction from job facilities, Journal of IMS group, 5(1).
12. Singh, S., & Tewari, V. (2011). Realtionship between motivation and job satisfaction of white collar employees:a case study. Management insights, 7 (2).
75-78
17.
Authors: Chethana K.Y, M. G. Patil, Y. S. Rammohan
Paper Title: Effect Of Fiber Mat Density And Crushing Mechanism On The Energy Absorption Capacity of
GFRP Crashworthy Tubes
Abstract: The aim of this study is to examine the effect of fiber mat’s density and deformation mechanism
of tubes with and without die compression. In this study a new mode of deformation mechanism of density
graded GFRP circular tube is examined when they are subjected to axial compression on to a die and without die
to examine its energy absorbing capacity. Theoretical calculations were made to predict the crushing stress of
different specimens. It is observed that increasing density of fiber increases energy absorption value but
decreases the specific energy absorption and the die could trigger progressive crushing additionally decreasing
peak load. Here the compressed tube wall is compelled to be deformed towards the end of compression die with
a little range of bending curvature which was forced by the radius of the die at high crushing stress and the
major part of the deformation takes place at a nearly constant load, which leads to high energy absorption
capacity. Comparison between theoretical prediction values by derived equations and the experimental results
shows good correlation.
Keywords: GFRP, Experimentation, Energy absorption, Theoretical Calculations
References: 1. T.Y.Reddy and S.R. Reid, Axial splitting of circular metal tubes, International Journal of Mechanical Sciences, 28 (2)( 1986). 2. S.R.Reid, Plastic deformation mechanisms in axially compressed metal tubes used as impact energy absorbers, International Journal of
Mechanical Sciences 35 (12) ( 1993).
3. A.G.Mamalis, D.E.Manolakos, Demosthenous and M.B. Ioannidis,Experimental determination of splitting in axially collapsed thick-walled fibre-reinforced composite frusta, Thin-Walled Structure 28 (3)(1997).
4. G.L.Farley,Energy absorption of composite materials, Journal of Composite Materials 17 (3) (1983).
5. Thornton P.H.,Energy absorption in composite structures, Journal of Composite Materials 13(3) (1979).
79-83
6. A.G.Mamalis,M.Robinson,D.E.Manolakos,G.A.Demosthenous,M.B.Ioannidis&.Carruthersb,Crashworthy capability of composite
material structures, Composite Structures 37(3)( 1997). 7. D. Hull, A Unified Approach to Progressive Crushing of Fibre-Reinforced Composite Tubes, Composites Science and Technology 40
(4)(1991).
8. Wang, Y., Feng J., Wu J., Hu D., Effects of fiber orientation and wall thickness on energy absorption characteristics of carbon-
reinforced composite tubes under different loading conditions, Composite Structures 153(1)(2016).
9. Ang soon Lim, Predicting the crushing stress of composite materials, A dissertation, university of southern Queensland, Nov 2006.
10. M.S. Sham Prasad, C.S. Venkatesha, T. Jayaraju, Experimental Methods of Determining Fracture Toughness of Fiber Reinforced Polymer Composites under Various Loading Conditions, Journal of Minerals & Materials Characterization & Engineering 10 (13)(
2011).
11. Chiu LNS, et al. Crush responses of composite cylinder under quasi-static and dynamic loading. Composite Structures 131(4) 2015. 12. Alkbir MFM, Sapuan SM, Nuraini AA, Ishak MR. Effect of geometry on crashworthiness parameters of natural kenaf fibre reinforced
composite hexagonal tubes. Material Design 60(12) (2014).
13. Sebaey, T.A. and Mahdi, E. Filler Strengthening of Foam-Filled Energy Absorption Devices Using CFRP Beams, Composite Structures 160 (1) (2017).
18.
Authors: P. Naresh, Syed Altaf Hussain, B. Durga Prasad
Paper Title: Optimization of Cutting Force in Turning of AA 7068/TiC MMCs Using Taguchi Technique
Abstract: Metal Matrix Composites (MMCs) are widely used in variety of engineering applications. The
usage of aluminium based composites in modern automobile and aerospace sectors is enormous due to superior
Mechanical properties as compared to other materials. In this investigation Taguchi and Response surface
methodologies have been used to minimize the cutting force in turning of AA7068/TiC MMCs. The experiments
are planned and executed according to central composite design technique on all geared lathe machine using
TiCN-Al2O3 tool insert (KCP05). The process parameters used are wt. % of TiC, cutting speed, feed and depth
of cut. The objective of this experiment is to optimize the process parameters and evaluate the effect of process
parameters. A second-order mathematical predictive model has developed between the process parameters &
cutting force based on response surface methodology (RSM). The conclusions of this experiment is give that the
most influenced process parameter for cutting force is depth of cut (d) and is followed by wt.% of TiC.
Precision is observed between the predicted values and experimental results; therefore, the evaluated model is fit
to predict the cutting force in machining of AMMCs.
Keywords: Cutting force, CCD Technique, RSM, TiCN-Al2O3.
References: 1. K.Rajkumar, P.Rajan and J. Marian Antony Charles, Procedia Engineering, vol 86, pp 34-41, 2014.
2. S.Sivasankarana, P.T. Harisagarb, E. Saminathanb, S. Siddharthb,P. Sasikumarb, Procedia Engineering 97, pp 582-589, 2014. 3. Bonollo F, Guemero R, Sentimanti E, Tangenni I and Yang V L, Material Science and Engineering, A 144, pp 303-310. 1991.
4. Morteza Alizadeh, Mostafa Alizadeh, Rasool Amini, Journal of Materials Science & Technology, Volume 29, Issue 8, Pages 725–730,
2013. 5. S Basavarajappa1, G Chandramohan, K V Narasimha Rao, R Radhakrishanan, and V Krishnaraj, doi:
10.1243/09544054JEM304.Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture July 1,
vol. 220 no. 7 1189-1204, 2006. 6. D. Sai Chaitanya Kishore , K. Prahlada Rao , A. Mahamani , Investigation of cutting force, surface roughness and flank wear in turning
of In-situ Al6061-TiC metal matrix composite Procedia Materials Science, Volume 6, , Pages 1040–1050, 2014.
7. Biswajit Das, Susmita Royb, R.N.Rai, S.C. Saha , Procedia Computer Science, Volume 45, Pages 745–752, 2015. 8. Mahamani, A., Machinability Study of Al-5Cu-TiB2 In-situ Metal Matrix Composites Fabricated by Flux-assisted Synthesis. Journal
of Minerals & Materials Characterization & Engineering, Vol. 10, No. 13, 1243-1254, 2011.
9. Birol, Y. In situ synthesis of Al-TiCp composites by reacting K2TiF6 and particulate graphite in molten aluminium. Journal of Alloys and Compounds, 454, 110-117, 2008.
10. Syed Altaf Hussain, Pandurangadu V,Palanikumar K, “Surface Roughness Analysis in machining of GFRP Composites using Carbide
Tool(K20), European journal of Scientific research, Vol.41 No.1, pp.84-98, 2010.
11. Syed Altaf Hussain, Pandurangadu V,Palanikumar K, Optimal Machining Parameters for Minimal Surface Roughness in Turning of
GFRP Composites by PCD Tooling, IJAER, vol 5, issue 13, pp 2227-2239, 2010.
12. Syed Altaf Hussain, V.Pandurangadu, K.Palani kumar “Cutting power prediction model for turning of GFRP composites using response surface methodology”, International journal of Engineering, Science and Technology, vol.3,No.6, pp-161-171, 2011.
13. K.Palanikumar, “Appliaction of Taguchi and Response Surface Methodologies for Surfaceroughness in Machining Glass Fiber
Reinforced Plastics by PCD Tooling”, International Journal of Advanced Manufacturing Technology,DOI:10.1007/s00170-006-0811-0, 2006.
14. Syed Altaf Hussain, V.Pandurangadu, K.Palani kumar “Machining parameters optimisation in turning of GFRP composites by
desirability function analysis embedded with Taguchi method”, International journal of Engineering, Science and Technology, vol.17,No.2, pp-95-107, 2015.
84-88
19.
Authors: Vidya Chandran, M Sekar, Sheeja Janardhanan
Paper Title: Influence of Frequency Ratio on the Hydroelastic Response of a Cylinder with Degrees of Freedom
under Vortex Induced Vibration
Abstract: Vortex induced vibration of cylindrical structures is an extensively researched topic. Most of the
studies have concentrated on the response of the cylinder in the cross flow (CF) direction. In a realistic ocean
environment, structures such as drilling and marine risers are more or less free to vibrate both in CF and in line
(IL) directions. It has also been observed that the IL vibrations have significant influence on the CF response.
Interaction between the responses in inline and cross flow directions has still been not fully understood. This
paper addresses the same through a simplified numerical method for understanding the interaction between these
two responses using two dimensional computational fluid dynamics (CFD) simulations. Here analyzes two cases
have been considered; where in the cylinder is modeled with two different values of ratio of natural frequency of
the cylinder in the IL direction to that in the CF direction. The trends of variation of hydrodynamic and structural
parameters have been analyzed to comprehend the effect of directional natural frequency ratio on the cylinder
89-94
response and hydrodynamic force coefficients. The shedding pattern has also been studied in this paper. An
increase by 18% in the value of the lift coefficient and 38 % of that in the drag coefficient has been observed
when the frequency ratio is increased from 1 to 2. The results show that the cylinder with frequency ratio 2 is
more prone to lock in vibration. This phenomenon may be related to the shifting of shedding pattern from 2S to
P + S mode when the frequency ratio is 2.
Keywords: CFD, cross flow vibration, hydroelastic response, inline vibration, vortex induced vibration.
References: 1. Khalak, A. and Williamson, C. H. K. Investigation of the relative effects of mass and damping in vortex induced vibration of a
circular cylinder, Journal of Wind Engineering. Ind. Aerodyn. 69-71 (1997) 341 – 350.
2. Jauvtis, N. and Williamson, C. H. K. The effect of two degrees of freedom on vortex-induced vibration at low mass and damping. Journal of Fluid Mechanics 509, (2004) 23 – 62.
3. Moe, G. and Wu, Z. J. The lift force on a cylinder vibrating in a current. Journal of Offshore Mechanics and Arctic Engineering 112
(1990) 297- 303. 4. Sarpkaya, T. Hydrodynamic damping, flow-induced oscillations, and biharmonic response. ASME Journal of Offshore Mechanics
and Arctic Engineering. 117 (1995) 232-238.
5. Yin, D. Experimental and Numerical Analysis of Combined In-line and Cross-flow Vortex Induced Vibrations. Ph D Thesis, Norwegian University of Science and Technology. 2013.
6. Narendran, K., Murali, K., Sundar, V., Vortex-induced vibrations of elastically mounted circular cylinder at Re of the O (105).
Journal of Fluids and Structures. 54 (2015) 503 – 521. 7. Naudascher, E. and Rockwell, D. Flow induced vibration – An engineering guide. Dover Publications Inc, Mineola, New York,
USA, 2005.
8. Gabbai, R. D. and Benaroya, H. An overview of modeling and experiments of vortex-induced vibration of circular cylinders. Journal of Sound and Vibration, 282(3-5) (2005) 575–616.
9. Sekar, M., Srinivas, J., Kotaiah, K. R., Yang, S, H., Stability analysis of turning process with tailstock-supported workpiece, Int J Adv Manuf Technol, 43( 9–10) (2009) 862–871.
10. Sekar, M., Kantharaj, I., Savale A.S, Machining Chatter Analysis for High Speed Milling Operations 2017 IOP Conf. Ser.: Mater.
Sci. Eng. 247 012014. 11. Schlichting, H. Boundary layer theory. McGraw-Hill Book Company, New York, 1979.
12. Chandran, V., Sekar, M., Janardhanan, S., Menon, V., A numerical study on the influence of mass and stiffness ratios on the vortex
induced motion of an elastically mounted cylinder for harnessing power. Energies. 11 (2018) 2580.
13. Chandran, V., Janardhanan, S., Sekar, M., Prediction of Hydro-dynamic Force Coefficients and Shedding Frequency during Vortex
Shedding Behind a Stationary Cylinder. International Journal of Structural Mechanics and Finite Elements. 4(1) (2018).
14. Jie, W., Halvor, L., Larsen, M. L., Stergios, L., Rolf. B. Vortex-induced vibration of a flexible cylinder: Interaction of the in-line and cross-flow responses. Journal of Fluids and Structures 63 (2016) 238–258.
20.
Authors: T. Raghavendra, C. Ramanjaneyulu, V. Bhuvaneswar Reddy
Paper Title: An Experimental Model on the Mechanical Properties of Reactive Powder Concrete by using
Cement Replacement of Glass Powder
Abstract: Reactive Powder Concrete is a creating composite material that enables the solid business to
advance material utilizes Generate financial advantages and building structures which are solid, strong and
delicate to condition. RPC is ultra-elite cement with extensive variety of capacities. RPC was created in the
1990s by Bouygues' research center in France. RPC speaks to another class of Portland concrete based material
with compressive qualities of 120-200 MPa go. By presenting fine steel filaments. It has no coarse materials and
contains little steel filaments that give extra strength. RPC incorporate Portland concrete, silica rage, fine sand,
super plasticizer, water and steel strands. In this investigation, RPC by utilizing cement substitution of glass
powder up to 30%. Likewise mechanical properties, compressive strength and split tensile strength were
considered.
Keywords: Quartz powder, silica fume, steel fibers, Glass powder, compressive strength, split tensile strength.
References: 1. Pierre Richard, Marcel Cheyrezy, “Composition of Reactive Powder Concrete”, Cement and Concrete Research Journal, 25(7), pp
1501-1511. 1995. 2. W. Kushartomo, Stabilization of Reactive Powder Concrete Strength Using Quartz Powder, Doctoral Dissertation, Tarumanagara
University, Jakarta, 2014 (in Bahasa). H. Du, and K. H. Tan, Concrete with Recycled Glass as Fine Aggregates, ACI Materials Journal,
Jan-Feb 2014, pp. 47-57. 3. K. M. Nag, C. M. Tam and V. W. Y. Tam “Studying the production process and mechanical Properties of reactive powder concrete”,
Magazine of Concrete Research, 2010, 62, No. 9, September, 647–654.
4. Harish K V, Dattatreya J K and Neelamegam M "Impact of fiber expansion, warm treatment, and preset weight on mechanical properties of ultra-high-quality mortars". 2011 Transportation Res. Rec. J. Transp.Res. Board 2240: 59– 69.
5. Tam .C. M, Tam .V. W. Y., and. Ng K. M, “Optimal conditions for producing reactive Powder concrete” Magazine of Concrete
Research, 2010, 62, No. 10, October, 701–716. 6. Maroliya M.K., “Mechanical Behaviour of modified of Reactive powder concrete”, International journal of engineering research and
applications, vol.2, sep-oct (2012),pp 2062-2067.
7. Prema Kumar W P, Ananthayya M B and Vijay K “Effect of Partial Replacement of Cement with Waste Glass Powder on the Properties of Concrete”, IJSCER, Vol. 3, Issue. 2, pp.1-6, May 2014, ISSN: 2319-6009.
8. Dr. G. Vijayakumar, Ms H. Vishaliny and Dr. D. Govindarajulu, "Concentrates on Glass Powder as Partial Replacement of Cement in
Concrete Production", International Journal of Engineering and Advanced Engineering (IJETAE), Vol. 3, Issue 2, Feb. 2013, pp. 153 – 157, ISSN: 2250-2459.
9. Prabhat R P, Bharatkumar B H and Iyer N R 2012 Mechanical properties of ultra high performance concrete. Proceedings of World
Academy of Science, Engineering and Technology. No. 68. World Acad. Sci. Eng. Technol. 351(68): 1969. 10. Yang L S, Millard G S, Soutsos NM, Barnett J S and Le T T 2009 Influence of aggregate and curing regime on the mechanical
properties of ultra-high performance fiber reinforced concrete (UHPFRC). Constr. Build. Mater. 23(6): 2291–2298.
11. Graybeal B A 2007 Compressive behavior of ultra-high-performance fiber-reinforced concrete. ACI Mater. J. 104(2): 146–152. 12. S. Snigdha Malya,V. K. Visweswara Rao A Study on the mechanical properties of reactive powder concrete using Granite powder and
95-99
Nano silica IJIRSET AN ISO 3297:2007 certified organization vol. 5, Issue 11, NOV 2016.
21.
Authors: Dr. V. Anantharama, Dr. K. Gajalakshmi, Dr. M. Lokeshwari
Paper Title: Spatial and Temporal Drought Analysis in Sitanadi Basin, Udupi District Karnataka, Using SPI
Abstract: Knowledge of trends and variations of current and historical hydro-climatological variables are
pertinent to the future development and sustainable management of water resources of a given region. Rainfall
is a principal element of the hydrological cycle, so that understanding its behavior may be of profound social and
economic significance. The detection of trends and oscillations in precipitation time series yields important
information for the understanding of climate. However, rainfall changes are particularly hard to gauge, because
rainfall is not uniform and varies considerably from place to place and time to time, even on small scales. The
Sitanadi basin has a tropical monsoon climate. The highland of the district experiences mainly orographic
rainfall. Rainfall data for 42 years were considered for the study and SPI was calculated for the whole period.
SPI values of the rain gauge stations of the Sitanadi basin were found to vary from +2.43 to -2.50. In all rain
gauge stations higher abnormality is observed in pre monsoon season compared to post monsoon season. The
validation based on station gauge rainfall data showed that the SPIs calculated were reliable for monitoring
drought regions.
Keywords: Rainfall, Sitanadi basin, Standardized precipitation index.
References: 1. Al-Obaidy A (2012) Estimation of Impacts of Rainfall on Cereal Production in the Northern Region of Iraq for the Period 1992–2008.
Bus Econ Res. 2. Al-Qinna MI, Hammouri NA, Obeidat MM, Ahmed F (2011) Drought analysis in Jordan under current and future climates. Clim
Change 106:421–440.
3. Halwatura D, Lechner AM, Arnold S (2015) Drought severity–duration–frequency curves: a foundation for risk assessment and planning tool for ecosystem establishment in post-mining landscapes. Hydrol Earth Syst Sci 19(2):1069–1091.
4. Hao ZC, AghaKouchak A (2013) Multivariate standardized drought index: a parametric multi-index model. Adv Water Resour 57:12–
18. 5. Global Information and Early Warning System on Food and Agriculture (GIEWS) (2014) Serious food security concerns following
escalation of conflict. Special Alert No. 332. IRAQ.
6. Liu L, Hong Y, Bednarczyk CN, Yong B, Shafer MA, Riley R, Hocker JE (2012) Hydro-Climatological drought analyses and projections using meteorological and hydrological drought indices: a case study in blue river basin, Oklahoma. Water Resour Manag
26(10):2761–2779.
7. Lloyd-Hughes B (2014) The impracticality of a universal drought definition. Theor Appl Climatol 117:607–611. 8. Lorenzo-Lacruz J, Morán-Tejeda E (2016) Spatio-temporal patterns of meteorological droughts in the Balearic Islands (Spain).
Cuadernos de Investigación Geográfica.
9. Zhang, M.; He, J.; Wang, B.; Wang, S.; Li, S.; Liu, W.; Ma, X. Extreme drought changes in Southwest China from 1960 to 2009. J. Geogr. Sci. 2013, 23, 3–16.
10. Yu, M.; Li, Q.; Hayes, M.J.; Svoboda, M.D.; Heim, R.R. Are droughts becoming more frequent or severe in China based on the
standardized precipitation evapotranspiration index: 1951–2010. Int. J. Climatol. 2014, 34, 545–558. 11. Tao, H.; Fischer, T.; Zeng, Y.; Fraedrich, K. Evaluation of TRMM 3B43 precipitation data for drought monitoring in Jiangsu Province,
China. Water 2016, 8, 221.
12. Zeng, H.; Li, L.; Li, J. The evaluation of TRMM Multisatellite Precipitation Analysis (TMPA) in drought monitoring in the Lancang River Basin. J. Geogr. Sci. 2012, 22, 273–282.
100-106
22.
Authors: Ms. Manaswini B and Dr. Rama Mohan Reddy A
Paper Title: A Regression Test Based On the Test Case Prioritization Techniques by Using the Nature of Bees
Abstract: The software testing is a crucial role in the software development lifecycle. Testing can be done by
the user who have full knowledge on the software, who has no knowledge and who has knowledge little bit on
the software and the software testing can be tested in various level with various tests like unit, integrate, user,
regression, acceptance etc.. The major and most important test is the regression testing. To perform the
regression testing it takes more time. The current paper was focused on the regression testing to reduce the
execution time and to improve the faults detection rate by considering the parameter of change coverage. The
proposed system uses the test case prioritization techniques by using the nature of the bees. After performing the
experimental study on an open source applications, the proposed system shows the efficiency and effectiveness
in terms of the runtime and detecting faults when compared with the traditional system.
Keywords: Software Testing, Regression Test, Change Coverage, Honey bee, Runtime.
References: 1. Ramya, Paruchuri, Vemuri Sindhura, and P. Vidya Sagar. "Clustering Based Prioritization of Test Cases." 2018 Second International
Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018.
2. Azizi, Maral, and Hyunsook Do. "Graphite: A greedy graph-based technique for regression test case prioritization." 2018 IEEE
International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2018. 3. de Souza, Jerffeson Teixeira, et al. "The human competitiveness of search based software engineering." 2nd International Symposium
on Search Based Software Engineering. IEEE, 2010.
4. Harman, Mark. "Making the case for MORTO: Multi objective regression test optimization." 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. IEEE, 2011.
5. Gu, Qing, Bao Tang, and DaoXu Chen. "Optimal regression testing based on selective coverage of test requirements." International
Symposium on Parallel and Distributed Processing with Applications. IEEE, 2010. 6. Li, Zheng, et al. "A fine-grained parallel multi-objective test case prioritization on gpu." International Symposium on Search Based
Software Engineering. Springer, Berlin, Heidelberg, 2013.
7. Yoo, Shin, and Mark Harman. "Pareto efficient multi-objective test case selection." Proceedings of the 2007 international symposium on Software testing and analysis. ACM, 2007.
107-111
8. Ulewicz, Sebastian, and Birgit Vogel-Heuser. "Industrially applicable system regression test prioritization in production automation."
IEEE Transactions on Automation Science and Engineering 99 (2018): 1-13. 9. Luo, Qi, et al. "How do static and dynamic test case prioritization techniques perform on modern software systems? an extensive study
on github projects." IEEE Transactions on Software Engineering (2018).
10. Lu, Yafeng, et al. "How does regression test prioritization perform in real-world software evolution?." 2016 IEEE/ACM 38th
International Conference on Software Engineering (ICSE). IEEE, 2016.
11. Zhang, Lingming, et al. "Prioritizing JUnit test cases in absence of coverage information." 2009 IEEE International Conference on
Software Maintenance. IEEE, 2009. 12. Di Nucci, Dario, et al. "A Test Case Prioritization Genetic Algorithm guided by the Hypervolume Indicator." IEEE Transactions on
Software Engineering (2018).
13. Kwon, Jung-Hyun, In-Young Ko, and Gregg Rothermel. "Prioritizing browser environments for web application test execution." 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE). IEEE, 2018.
14. Bower 2017 bower . https://bower.io/search/2017
15. Mahmood, Md Hasan, and Md Shazzad Hosain. "Improving test case prioritization based on practical priority factors." 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2017.
16. Zhou, Jianyi, and Dan Hao. "Impact of Static and Dynamic Coverage on Test-Case Prioritization: An Empirical Study." 2017 IEEE
International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2017. 17. Kim, Jung-Min, and Adam Porter. "A history-based test prioritization technique for regression testing in resource constrained
environments." Proceedings of the 24th international conference on software engineering. ACM, 2002.
18. Jones, James A., and Mary Jean Harrold. "Test-suite reduction and prioritization for modified condition/decision coverage." IEEE Transactions on software Engineering 29.3 (2003): 195-209.
19. Walcott, Kristen R., et al. "Timeaware test suite prioritization." Proceedings of the 2006 international symposium on Software testing
and analysis. ACM, 2006. 20. Zhang, Lingming, et al. "Bridging the gap between the total and additional test-case prioritization strategies." Proceedings of the 2013
International Conference on Software Engineering. IEEE Press, 2013. 21. Hao, Dan, et al. "A unified test case prioritization approach." ACM Transactions on Software Engineering and Methodology (TOSEM)
24.2 (2014): 10.
22. Hao, Dan, Lu Zhang, and Hong Mei. "Test-case prioritization: achievements and challenges." Frontiers of Computer Science10.5 (2016): 769-777.
23. Mei, Hong, et al. "A static approach to prioritizing junit test cases." IEEE Transactions on Software Engineering 38.6 (2012): 1258-
1275. 24. Thomas, Stephen W., et al. "Static test case prioritization using topic models." Empirical Software Engineering 19.1 (2014): 182-212.
25. Ansari, Ahlam, et al. "TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSIO
26. Ma, Zengkai, and Jianjun Zhao. "Test case prioritization based on analysis of program structure." 2008 15th Asia-Pacific Software Engineering Conference. IEEE, 2008.
27. Kulkarni, Nandakishore J., et al. "Test case optimization using artificial bee colony algorithm." International Conference on Advances
in Computing and Communications. Springer, Berlin, Heidelberg, 2011.. 28. Wagner, Israel A., Michael Lindenbaum, and Alfred M. Bruckstein. "Ants: agents on networks, trees, and subgraphs." Future
Generation Computer Systems 16.8 (2000): 915-926.
29. Alaya, Ines, Christine Solnon, and Khaled Ghedira. "Ant colony optimization for multi-objective optimization problems." 19th IEEE international conference on tools with artificial intelligence (ICTAI 2007). Vol. 1. IEEE, 2007.
30. Michael, Christoph C., et al. "Genetic algorithms for dynamic test data generation." Proceedings 12th IEEE International Conference
Automated Software Engineering. IEEE, 1997. 31. Bern, D., et al. "Breeding software test cases with genetic algorithm." Proc. 36th Hawaii Int. Conf. on System Sciences. 2003.
32. Michael, Christoph C., Gary McGraw, and Michael A. Schatz. "Generating software test data by evolution." IEEE transactions on
software engineering 27.12 (2001): 1085-1110. 33. Rosero, Raúl H., Omar S. Gómez, and Glen Rodríguez. "Regression Testing of Database Applications Under an Incremental Software
Development Setting." IEEE Access 5 (2017): 18419-18428.
34. Indumathi, C. P., and S. Madhumathi. "Cost aware test suite reduction algorithm for regression testing." 2017 International Conference on Trends in Electronics and Informatics (ICEI). IEEE, 2017.
35. Tahvili, Sahar, et al. "Towards Execution Time Prediction for Manual Test Cases from Test Specification." 2017 43rd Euromicro
Conference on Software Engineering and Advanced Applications (SEAA). IEEE, 2017. 36. Bian, Yi, et al. "Epistasis based aco for regression test case prioritization." IEEE Transactions on Emerging Topics in Computational
Intelligence 1.3 (2017): 213-223.
37. Kwon, Jung-Hyun, and In-Young Ko. "Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments." 2017 24th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2017.
38. Sharma, Sonia, and Ajmer Singh. "Model-based test case prioritization using ACO: A review." 2016 Fourth International Conference
on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2016. 39. Cho, Younghwan, Jeongho Kim, and Eunseok Lee. "History-based test case prioritization for failure information." 2016 23rd Asia-
Pacific Software Engineering Conference (APSEC). IEEE, 2016.
40. Knauss, Eric, et al. "Supporting continuous integration by code-churn based test selection." Proceedings of the Second International Workshop on Rapid Continuous Software Engineering. IEEE Press, 2015.
41. Ma, Tingting, Hongwei Zeng, and Xiaolin Wang. "Test case prioritization based on requirement correlations." 2016 17th IEEE/ACIS
International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE, 2016.
42. Sun, Chang-ai, et al. "dμreg: A path-aware mutation analysis guided approach to regression testing." Proceedings of the 12th
International Workshop on Automation of Software Testing. IEEE Press, 2017. 43. Guo, Shengjian, Markus Kusano, and Chao Wang. "Conc-iSE: Incremental symbolic execution of concurrent software." 2016 31st
IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2016.
23.
Authors: Vikram Neerugatti, Dr. A. Rama Mohan Reddy
Paper Title: Detection and Prevention of Black Hole Attack in RPL Protocol Based on the Threshold Value of
Nodes in the Internet of Things Networks
Abstract: Due to the technology of IOT the human daily life services were became easier. With this
technology the scalability will become very more to handle this kind of networks 6LOWPAN protocol was used,
In this 6LOWPAn networks the RPL protocol was used to route the packets. The RPL protocol is constrain
protocol particularly suits for the constrain node. Due to this constrain behavior this protocol may leads to many
attacks. The attacks may be a black hole, wormhole, sinkhole etc. This paper was focused on Black hole attack.
The black hole attack was simulated in the Contiki cooja simulator and proposed an detection approach based on
the threshold value of each node in the network, to this black hole attack and the results was generated by using
the contiki cooja simulator the results shows the effectiveness of the proposed technique in terms of the packet
112-116
delivery rate, detection rate of attack.
Keywords: IOT, attack, black-hole, detection, prevention, Threshold Value
References: 1. Chugh, Karishma, L. Aboubaker, and Jonathan Loo. "Case study of a black hole attack on LoWPAN-RPL." Proc. of the Sixth
International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy (August 2012). 2012.
2. Frustaci, Mario, et al. "Evaluating critical security issues of the IoT world: present and future challenges." IEEE Internet of Things
Journal 5.4 (2018): 2483-2495. 3. Al-Fuqaha, Ala, et al. "Internet of things: A survey on enabling technologies, protocols, and applications." IEEE Communications
Surveys & Tutorials 17.4 (2015): 2347-2376.
4. Mayzaud, Anthéa, et al. "A study of RPL DODAG version attacks." IFIP international conference on autonomous infrastructure, management and security. Springer, Berlin, Heidelberg, 2014.
5. Pongle, Pavan, and Gurunath Chavan. "A survey: Attacks on RPL and 6LoWPAN in IoT." Pervasive Computing (ICPC), 2015
International Conference on. IEEE, 2015. 6. Mayzaud, Anthéa, Rémi Badonnel, and Isabelle Chrisment. "A Taxonomy of Attacks in RPL-based Internet of Things." International
Journal of Network Security 18.3 (2016): 459-473.
7. Matsunaga, Takumi, Kentaroh Toyoda, and Iwao Sasase. "Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements." IEICE Communications Express 4.2 (2015): 44-49.
8. Mayzaud, Anthéa, et al. "Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks." International
Journal of Network Management 25.5 (2015): 320-339.
9. Wallgren, Linus, Shahid Raza, and Thiemo Voigt. "Routing Attacks and Countermeasures in the RPL-based Internet of Things." International Journal of Distributed Sensor Networks9.8 (2013): 794326.
10. Le, Anhtuan, et al. "The impact of rank attack on network topology of routing protocol for low-power and lossy networks." IEEE
Sensors Journal 13.10 (2013): 3685-3692. 11. Perrey, Heiner, et al. "TRAIL: Topology authentication in RPL." arXiv preprint arXiv:1312.0984 (2013).
12. Dvir, Amit, and Levente Buttyan. "VeRA-version number and rank authentication in rpl." Mobile Adhoc and Sensor Systems (MASS),
2011 IEEE 8th International Conference on. IEEE, 2011.
13. Ahmed, Firoz, and Young‐Bae Ko. "Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy
Networks." Security and Communication Networks 9.18 (2016): 5143-5154. 14. Airehrour, David, Jairo Gutierrez, and Sayan Kumar Ray. "Securing RPL routing protocol from blackhole attacks using a trust-based
mechanism." Telecommunication Networks and Applications Conference (ITNAC), 2016 26th International. IEEE, 2016.
15. Chugh, Karishma, L. Aboubaker, and Jonathan Loo. "Case study of a black hole attack on LoWPAN-RPL." Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy (August 2012).
2012.
16. Verma, Abhishek, and Virender Ranga. "Analysis of Routing Attacks on RPL based 6LoWPAN Networks." INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING 11.8 (2018): 43-56.
17. Yavuz, Furkan Yusuf, Devrim Ünal, and Ensar Gül. "Deep learning for detection of routing attacks in the internet of
things." International Journal of Computational Intelligence Systems 12.1 (2018): 39-58. 18. Semedo, Felisberto, Naghmeh Moradpoor, and Majid Rafiq. "Vulnerability Assessment of Objective Function of RPL Protocol for
Internet of Things." Proceedings of the 11th International Conference on Security of Information and Networks. ACM, 2018.
24.
Authors: Ch. Pratyusha Chowdari, Dr. J. B. Seventline
Paper Title: An Efficient FIR Filter Architecture Implementation Using Distributed Arithmetic (DA) for DSP
Applications
Abstract: In this paper the proposed efficient FIR filter architecture using a distributed arithmetic (DA)
algorithm in which two issues are discussed in the conventional FIR filter. The FIR filter is well known to
include delay elements, multipliers and adders. Due to the need for multipliers, this results in 2 demerits which
are (i) increased in area and (ii) delayed increases that eventually lead to low efficiency (low speed). A notable
feature of the proposed technique is to substitute a trivial amount of indexed LUT pages instead of conventional
LUT based DA that it helps to maintain the access time lower. Also, significant idea connected with the
proposed technique is required page can be thoroughly selected with the selection module without needing
adders that result in reduced computation time. Furthermore, the proposed fast FIR filter is used for the powerful
ECG noise elimination technique, which is prevalently used in biomedical and healthcare applications. The
designs are simulated and synthesized by using Xilinx ISE. It can be seen from reports that our proposed DA
consumes 30% less power for 11-tap FIR filters with a 40% shorter area, while the saving in power consumption
for 8-tap FIR filters is 30% to 80% and 35% to 80% in the area. Especially in contrast with all the above-
mentioned DA techniques, our enhanced quick FIR filters require less area and less power intake due to their
lower memory requirements. All architectures are designed for FIR filters with 4 and 8 taps.
Keywords: Distributed arithmetic · Multiplier-less filter; VLSI design; FIR filter; LUT; ECG noise removal.
References: 1. M. S. Chavan, R. Agarwala, and M. Upland, “Design and implementation of digital FIR equiripple notch filter on ECG signal for
removal of power line interference,” WSEAS transactions on signal processing, vol. 4, no. 4, pp. 221–230, 2008.
2. S.A. White, “Applications of Distributed arithmetic to digital signal processing: A tutorial review,” IEEE ASSP Magazine, vol.6,
no. 3, pp.a5-19 Jul. 1989.
3. D.J. Allred, H.Yoo, V.krishnan, W.Huang and D.V. Anderson, “LMS adaptive filters using distributed arithmetic for high throughput,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 52, no. 7, pp. 1327-1337, July 2005.
4. A.Peled and B.Liu, “A new hardware realization of digital filters,” IEEE Transaction Acoust. Speech, Signal Process. vol. 22, pp. 456-462, Dec. 1974.
5. S.Y. Park and P.K. Meher, “Low-Power, High –Throughput, and Low Area Adaptive FIR Filter Based on Distributed
Arithmetic”, IEEE Transactions on Circuits and Systems-II, pp. 346-350, 2013. 6. P.K. Meher and S.Y. Park, “High-throughput pipelined realization of adaptive FIR filter based on distributed arithmetic,” in IEEE
International Conference on Very Large Scale Integration, pp. 428-433, Oct.2011.
7. G.A. Clark, S.K. Mitra and S.R. Parker, “Block implementation of adaptive digital filters,” IEEE Trans. Circuits Systems, vol.28, pp. 584-592, Jun. 1981.
117-124
8. S.Baghel and R. Shaik, “FPGA implementation of fast block LMS adaptive filter using distributed arithmetic for high
throughput,” Proc. Int. Conf. Commun. Signal Process (ICCSP), pp. 443-447, Feb. 10-12, 2011. 9. B.K. Mohanty and P.K. Meher, “A high- performance energy efficient architecture for FIR adaptive filter based onthe new
distributed arithmetic formulation of block LMS algorithm,” IEEE Trans. Signal Processing, vol .61, no. 4, pp. 921-932, Feb
2013.
10. B.K. Mohanty, P.K. Meher and S.K. Patel, “LUT Optimization for Distributed Arithmetic -Based Block Least Mean Square
Adaptive Filter,” IEEE Transactions on Very Large Scale Integration(VLSI) Systems, vol. 24, no. 5, pp.1926-1935, April 2016.
11. H. Yoo, and D. Anderson, “Hardware-Efficient Distributed Arithmetic Architecture for High-Order Digital Filters”, in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05), 2005, Vol. 5, pp. 125 – 128.
12. Özalevli E, Huang W, Hasler PE, Anderson DV.A Reconfigurable Mixed-Signal VLSI Implementation of Distributed Arithmetic
Used for Finite-Impulse ResponseFiltering. IEEE Transactions on Circuits and Systems I, Regular Papers. 2008 Mar; 55(2):510–21.
13. Meher PK. New Approach to Look-Up-Table Design and
Memory-Based Realization of FIR Digital Filter. IEEE Transactions on Circuits and Systems I, Regular Papers.
2010 Mar; 57(3):592–603.
14. Peled A, Liu B. A new hardware realization of digital filters. IEEE Transactions on Acoustics Speech and Signal Processing. 1974 Dec; ASSP-22(6):456–62.
15. B. Pradeep Kumar and S. Balambigai, February 2012, ‘ A Survey on ECG De-Noising Techniques, Bonfring International
Journal of advances in Image Processing’, Vol. 2, Special Issue 1, Part 1.
25.
Authors: Dr. K. Praveen Kumar, Gautam Rampalli
Paper Title: An Efficient Design for Multiple Data Stores Cloud Applications
Abstract: New data management prerequisites have been released by massive data development and cloud
computing. Numerous applications really need to interact on the basis of the types they really need to control
with a lot of heterogeneous data stores: standard data types, documents, social network graph data, simple key-
value data, etc. A unifying data model is attracting considerable for developers due to flexible communication
with heterogeneous relations and NoSQL data stores. The OPEN-PaaS-DataBase API (ODBAPI), which is a
well-accepted REST API, allows developers to code their implementation software in the target data storage
system separately. Secondly, we propose virtual data stores that interact with the integrated data store wrapped
in ODBAPI. It was shown that this prototype responsible for probable solution technologically advanced capable
to introduce OpenPaaS circumstances.
Keywords: NoSQL Data Stores, Relational Data Stores, ODBAPI
References: 1. C. Baun, M. Kunze, J. Nimis, and S. Tai, Cloud Computing - Web-Based Dynamic IT Services. Springer, 2011. 2. C. Fay and et al., “Bigtable: A distributed storage system for structured data,” ACM Trans. Comput. Syst., vol. 26, no. 2, 2008.
3. B. F. Cooper and et al., “Pnuts: Yahoo!’s hosted data serving platform,” PVLDB, vol. 1, no. 2, pp. 1277–1288, 2008.
4. G. DeCandia and et al., “Dynamo: amazon’s highly available key-value store,” in Proceedings of the 21st ACM Symposium on Operating Systems Principles, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007, pp. 205–220.
5. D. Agrawal, A. El Abbadi, S. Das, and A. J. Elmore, “Database scalability, elasticity, and autonomy in the cloud - (extended
abstract),” in Database Systems for Advanced Applications - 16th International Conference, DASFAA 2011, Hong Kong, China, April 22-25, 2011, Proceedings, Part I, 2011, pp. 2–15.
6. P. Sadalage and M. Fowler, NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, ser. always learning.
Addison Wesley Professional, 2012. 7. R. Sellami and B. Defude, “Using multiple data stores in the cloud: Challenges and solutions,” in Data Management in Cloud, Grid
and P2P Systems - 6th International Conference, Globe 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings, 2013, pp.
87–98. 8. M. Stonebraker, “Stonebraker on nosql and enterprises,” Commun. ACM, vol. 54, no. 8, pp. 10–11, 2011.
9. M. Fisher, J. Ellis, and J. C. Bruce, JDBC API Tutorial and Reference, 3rd ed. Pearson Education, 2003.
10. A. B. M. Moniruzzaman and S. A. Hossain, “Nosql database: New era of databases for big data analytics - classification, characteristics and comparison,” CoRR, vol. abs/1307.0191, 2013.
11. M. Pollack, O. Gierke, T. Risberg, J. Brisbin, and M. Hunger, Eds., Spring Data. O’Reilly Media, October 2012.
12. P. Atzeni, F. Bugiotti, and L. Rossi, “Uniform access to nonrelational database systems: The SOS platform,” in Advanced Information Systems Engineering - 24th International Conference, CAiSE 2012, Gdansk, Poland, June 25-29, 2012. Proceedings,
2012, pp. 160–174.
13. L. Cabibbo, “Ondm: an object-NOSQL data store mapper,” Faculty of Engineering, Roma Tre University. Retrieved June 15th, 2013. 14. T. Haselmann, G. Thies, and G. Vossen, “Looking into a rest based universal API for database-as-a-service systems,” in 12th IEEE
Conference on Commerce and Enterprise Computing, CEC 2010, Shanghai, China, November 10-12, 2010, 2010, pp. 17–24.
125-129
26.
Authors: P. Venkatapathi, Dr. Habibulla Khan, Dr. S. Srinivasa Rao
Paper Title: Performance of Threshold Detection in Cognitive Radio with Improved Otsu’s and Recursive One-
Sided Hypothesis Testing Technique
Abstract: Cognitive radio (CR) is a new technology proposed to enhance spectrum efficiency by enabling
unlicensed secondary users to access the licensed frequency bands without getting involved with the primary
users licensed. Although considered optimal, in order to calculate the signal threshold, this approach requires
prior noise statistics information. Even though considered optimal, in order to calculate the signal threshold, this
approach requires prior noise statistics information. A prominent example of an Adaptive Threshold Estimation
Technique (ATT) for energy detection in Cognitive Radio (CR) is the Recursive One-sided Hypothesis Testing
Technique (ROHT). Accurate threshold values are known to be calculated based on the correct choice of their
parameter values, which include the standard deviation coefficient and the stop criteria. In this paper, for
efficient threshold estimation, the improved Otsu and ROHT are combined for estimating threshold even in the
presence of noise floor without need of prior knowledge. The proposed methodology for enactment in cognitive
radio sensor networks (CRSN) system based on the adaptive threshold energy detection model with noise
130-133
variance estimation. The simulation is carried out with the help of Matlab 2017a with the improved Otsu and
ROHT techniques. The results obtained shows that improved Otsu and ROHT techniques outperforms that of
fixed threshold energy detection in terms of different probability of false alarm rates and miss detections..
Keywords: Adaptive, Cognitive Radio, Energy Detector, Recursive One‐sided Hypothesis Testing, Threshold.
References: 1. M. H. Islam, C. L. Koh, S. W. Oh, X. Qing, Y. Y. Lai, C. Wang, Y.-C. Liang, B. E. Toh, F. Chin, G. L. Tan, and W. Toh, “Spectrum
Survey in Singapore: Occupancy Measurements and Analyses,” in 3rd International Conference on Cognitive Radio Oriented Wireless
Networks and Communications (Crowcon 2008), 2008, pp. 1–7.
2. R. I. C. Chiang, G. B. Rowe, and K. W. Sowerby, “A Quantitative Analysis of Spectral Occupancy Measurements for Cognitive Radio,” in IEEE 65th Vehicular Technology Conference - VTC2007-Spring, 2007, pp. 3016–3020.
3. R. Gonzalez and R. Woods, Digital image processing, 3rd ed. Pearson Prentice Hall, 2002.
4. W. K. Pratt, Digital Image Processing, 3rd ed., vol. 5. John Wiley & Sons, Inc., 2001. 5. S. D. Barnes, P. A. Jansen Van Vuuren, and B. T. Maharaj, “Spectrum occupancy investigation: Measurements in South Africa,”
Measurement: Journal of the International Measurement Confederation, 2013.
6. S. V Vaseghi, Advanced Digital Signal Processing and Noise Reduction, 4th ed. John Wiley & Sons, Inc., 2008. 7. D. Datla, A. M.Wyglinski, and G. J. Minden, “A Spectrum Surveying Framework for Dynamic Spectrum Access Networks,” IEEE
Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4158–4168, 2009.
8. F. Weidling, D. Datla, V. Petty, P. Krishnan, and G. J. Minden, “A framework for R.F. spectrum measurements and analysis,” in First
IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005, pp. 573–576.
9. D. Datla, A. Wyglinski, and G. Minden, “A Statistical Approach to Spectrum Measurement Processing,” Information and
Telecommunication Technology Center, 2005. 10. D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” in Conference
Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, vol. 1, (Pacific Grove, CA, USA), pp. 772–
776, November 2004. 11. R. Tandra and A. Sahai, “Fundamental Limits on Detection in Low SNR Under Noise Uncertainty,” in International Conference on
Wireless Networks, Communications and Mobile Computing, vol. 1, pp. 464– 469, 2005.
12. C. Liu, M. Li, and M.‐L. Jin, “Blind energy‐based detection for spatial spectrum sensing,” IEEE Wireless Communications Letters,
vol. 4, no. 1, pp. 98–101, feb 2015. 13. B. K. Jariwala and V. R. Manilal, “A Survey: A Cognitive Radio for Wireless Communication,” IOSR Journal of Electronics and
Communication Engineering, vol. 9, no. 1, pp. 57–63, 2014.
14. R. K. Dubey and G. Verma, “Improved spectrum sensing for cognitive radio based on adaptive double threshold,” International Journal of Emerging Trends in Electrical and Electronics (IJETEE), vol. 11, no. 2, pp. 1–6, 2015.
15. A.Chavez, R. Littman‐Quinn, K. Ndlovu, and C. L. Kovarik, “Using TV white space spectrum to practice telemedicine: A promising
technology to enhance broadband internet connectivity within healthcare facilities in rural regions of developing countries,” Journal of
telemedicine and telecare, vol. 22, no. 4, pp. 260–263, 2016.
16. D. Datla, A. M. Wyglinski, and G. J. Minden, “A statistical approach to spectrum measurement processing,” Information and
Telecommunications Technology, 2007.
17. D. Datla, A. M. Wyglinski, and G. Minden, “A spectrum surveying framework for dynamic spectrum access networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4158–4168, 2009.
18. A.J. Onumanyi, E. N. Onwuka, A. M. Aibinu, O. C. Ugweje, and M. J. Salami, “A modified Otsu’s algorithm for improving the
performance of the energy detector in cognitive radio,” AEU ‐ International Journal of Electronics and Communications, vol. 79, pp.
53–63, 2017.
19. J. Onumanyi, E. N. Onwuka, A. M. Aibinu, O. C. Ugweje, and M. J. E. Salami, “A real valued neural network based autoregressive energy detector for cognitive radio application,” International Scholarly Research Notices, vol. 2014, pp. 1–11, 2014.
27.
Authors: K. Sumalatha, Dr. Ch. R. Phani Kumar
Paper Title: Recent Advances in Conformal Antennas and its Design Issues
Abstract: With the rapid progress of the use of miniature sized antennas, wireless communication
technology has quickly risen. Not only have the size of the antenna but also its cost, efficiency and ease of
assembly all been taken into account during the antenna design. Conformal antennas are suggested to satisfy all
these requirements. Conformal antennas have broad commercial, defense and several civil services
applications. In aircraft and boats it is the most important and necessary time. Patch antennas are often regarded
the best choice for such conformal antennas. In this paper, we address the conformal transmitters with different
substrates used for antenna design. With this article, we create a modeling of conformal antennas with latest
developments by examining early events.
Keywords: Conformal antennas, wireless communication technology, Patch antennas, commercial, defense.
References: 1. Polegre. A, G. Caille, L. Boyer and A. Roederer, "Semi-active conformal array for ESA's GAIA mission", IEEE Antennas and
Propagation Society Symposium, 2004.
2. Y. Wu and Y. Cheng, "Conical Conformal Shaped-Beam Substrate-Integrated Waveguide Slot Array Antenna with Conical-to-
Cylindrical Transition", IEEE Transactions on Antennas and Propagation, vol. 65, no. 8, pp. 4048-4056, 2017. 3. H. Schippers, "Radiation analysis of conformal phased array antennas on distorted structures", 2018.
4. H. Schippers, J. Verpoorte, P. Jorna, A. Hulzinga, A. Meijerink, C. Roeloffzen, R. Heideman, A. Leinse and M. Wintels, "Conformal phased array with beam forming for airborne satellite communication", 2008 International ITG Workshop on Smart Antennas, 2008.
5. L. Vaskelainen, "Phase synthesis of conformal array antennas", IEEE Transactions on Antennas and Propagation, vol. 48, no. 6, pp.
987-991, 2000. 6. H. Schippers, J. Verpoorte, P. Jorna, A. Hulzinga, A. Meijerink, C. Roeloffzen, R. Heideman, A. Leinse and M. Wintels, "Conformal
phased array with beam forming for airborne satellite communication", 2008 International ITG Workshop on Smart Antennas, 2008.
7. L. Vaskelainen, "Phase synthesis of conformal array antennas", IEEE Transactions on Antennas and Propagation, vol. 48, no. 6, pp. 987-991, 2000.
8. P. Li, W. Xu, L. Song and Y. Qiu, "A Novel Inversion Method of Manufacturing Flaws in the Packaging of Conformal Load-Bearing
Antenna Structure", 2018. 9. M. Klemm and G. Troester, "Textile UWB Antennas for Wireless Body Area Networks", IEEE Transactions on Antennas and
Propagation, vol. 54, no. 11, pp. 3192-3197, 2006.
134-139
10. T. Kennedy, P. Fink, A. Chu, N. Champagne, G. Lin and M. Khayat, "Body-Worn E-Textile Antennas: The Good, the Low-Mass, and
the Conformal", IEEE Transactions on Antennas and Propagation, vol. 57, no. 4, pp. 910-918, 2009. 11. P. Saone, Y. Rahmat-Samii, M. Schaffrath and M. Kivikoski, "Effect of textile materials on wearable antenna performance: a case
study of GPS antennas", IEEE Antennas and Propagation Society Symposium, 2004.
12. Zheyu Wang, Lanlin Zhang, Y. Bayram and J. Volakis, "Multilayer printing of embroidered RF circuits on polymer composites",
2011 IEEE International Symposium on Antennas and Propagation (APSURSI), 2011.
13. Y. Bayram, Y. Zhou, B. Shim, S. Xu, J. Zhu, N. Kotov and J. Volakis, "E-Textile Conductors and Polymer Composites for Conformal
Lightweight Antennas", IEEE Transactions on Antennas and Propagation, vol. 58, no. 8, pp. 2732-2736, 2010. 14. S. Morris, Y. Bayram, L. Zhang, Z. Wang, M. Shtein and J. Volakis, "High-Strength, Metalized Fibers for Conformal Load Bearing
Antenna Applications", IEEE Transactions on Antennas and Propagation, vol. 59, no. 9, pp. 3458-3462, 2011.
15. K. Wincza and S. Gruszczynski, "Influence of Curvature Radius on Radiation Patterns in Multibeam Conformal Antennas", 2006 European Microwave Conference, 2006.
16. G. Oliveri, P. Rocca and A. Massa, "Differential evolution as applied to electromagnetics: Advances, comparisons, and applications",
2012 6th European Conference on Antennas and Propagation (EUCAP), 2012. 17. Xu, "Robust adaptive neural control of flexible hypersonic flight vehicle with dead-zone input nonlinearity", Nonlinear Dynamics,
vol. 80, no. 3, pp. 1509-1520, 2015.
18. J. Helander, K. Zhao, Z. Ying and D. Sjoberg, "Performance Analysis of Millimeter-Wave Phased Array Antennas in Cellular Handsets", IEEE Antennas and Wireless Propagation Letters, vol. 15, pp. 504-507, 2016.
19. Braaten, S. Roy, S. Nariyal, M. Al Aziz, N. Chamberlain, I. Irfanullah, M. Reich and D. Anagnostou, "A Self-Adapting Flexible
(SELFLEX) Antenna Array for Changing Conformal Surface Applications", IEEE Transactions on Antennas and Propagation, vol. 61, no. 2, pp. 655-665, 2013.
20. Y. Cheng, H. Xu, D. Ma, J. Wu, L. Wang and Y. Fan, "Millimeter-Wave Shaped-Beam Substrate Integrated Conformal Array
Antenna", IEEE Transactions on Antennas and Propagation, vol. 61, no. 9, pp. 4558-4566, 2013. 21. Braaten, S. Roy, I. Irfanullah, S. Nariyal and D. Anagnostou, "Phase-Compensated Conformal Antennas for Changing Spherical
Surfaces", IEEE Transactions on Antennas and Propagation, vol. 62, no. 4, pp. 1880-1887, 2014. 22. M. Khan, B. Ijaz, D. Anagnostou, B. Braaten, A. Capobianco and S. Asif, "Frequency reconfigurable self-adapting conformal array
for changing surfaces", IET Microwaves, Antennas & Propagation, vol. 10, no. 8, pp. 897-901, 2016.
23. Y. Zhao, Z. Shen and W. Wu, "Conformal SIW H-Plane Horn Antenna on a Conducting Cylinder", IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 1271-1274, 2015.
24. X. Lan, L. Wang, Y. Wang, C. Choi and D. Choi, "Tensor 2-D DOA Estimation for a Cylindrical Conformal Antenna Array in a
Massive MIMO System Under Unknown Mutual Coupling", IEEE Access, vol. 6, pp. 7864-7871, 2018. 25. L. Wan, G. Han, J. Jiang, C. Zhu and L. Shu, "A DOA Estimation Approach for Transmission Performance Guarantee in D2D
Communication", Mobile Networks and Applications, vol. 22, no. 6, pp. 998-1009, 2017.
26. L. Wan, W. Si, L. Liu, Z. Tian and N. Feng, "High Accuracy 2D-DOA Estimation for Conformal Array Using PARAFAC", International Journal of Antennas and Propagation, vol. 2014, pp. 1-14, 2014.
27. R. Li, L. Xu, X. Shi, L. Chen and C. Cui, "Two-Dimensional NC-Music DOA Estimation Algorithm with a Conformal Cylindrical
Antenna Array", Journal of Electromagnetic Waves and Applications, vol. 25, no. 5-6, pp. 805-818, 2011. 28. Y. Zou, H. Xie, L. Wan, G. Han and W. Li, "2D-DOA and Mutual Coupling Estimation in Vehicle Communication System via
Conformal Array", Mobile Information Systems, vol. 2015, pp. 1-10, 2015.
29. Z. Liang, J. Ouyang and F. Yang, "A hybrid GA-PSO optimization algorithm for conformal antenna array pattern synthesis", Journal of Electromagnetic Waves and Applications, vol. 32, no. 13, pp. 1601-1615, 2018.
30. M. Comisso and R. Vescovo, "Fast 3D Pattern Synthesis with Polarization and Dynamic Range Ratio Control for Conformal Antenna
Arrays", International Journal of Antennas and Propagation, vol. 2014, pp. 1-9, 2014. 31. R. Karimzadeh Baee, K. Forooraghi and S. Chamaani, "Conformal Array Pattern Synthesis Using a Hybrid WARP/2LB-MOPSO
Algorithm", International Journal of Antennas and Propagation, vol. 2012, pp. 1-7, 2012
32. M. Comisso and R. Vescovo, "Fast Co-Polar and Cross-Polar 3D Pattern Synthesis With Dynamic Range Ratio Reduction for Conformal Antenna Arrays", IEEE Transactions on Antennas and Propagation, vol. 61, no. 2, pp. 614-626, 2013.
33. K. Yang, Z. Zhao, J. Ouyang, Z. Nie and Q. Liu, "Optimization method on conformal array element positions for low side lobe pattern
synthesis", IET Microwaves, Antennas & Propagation, vol. 6, no. 6, p. 646, 2012. 34. J. Ouyang, J. Zhang, K. Zhi Zhang, J. Yang, X. Luo and F. Yang, "Analysis and synthesis of conformal conical surface linear phased
array with volume surface integral equation+AEP (Active Element Pattern) and INSGA-II", IET Microwaves, Antennas &
Propagation, vol. 6, no. 11, pp. 1277-1285, 2012. 35. Y. Bai, S. Xiao, C. Liu and B. Wang, "A Hybrid IWO/PSO Algorithm for Pattern Synthesis of Conformal Phased Arrays", IEEE
Transactions on Antennas and Propagation, vol. 61, no. 4, pp. 2328-2332, 2013.
36. Z. Huang, H. Zhang and J. Zhou, "Full polarimetric sum and difference patterns synthesis for conformal array", Electronics Letters, vol. 51, no. 8, pp. 602-604, 2015.
37. W. Hu, X. Wang, Y. Li and S. Xiao, "Synthesis of Conformal Arrays With Matched Dual-Polarized Patterns", IEEE Antennas and
Wireless Propagation Letters, vol. 15, pp. 1341-1344, 2016. 38. Luk, K., K.-F. Lee, and J.S. Dahele, “Analysis of the cylindrical rectangular patch antenna,” IEEE Trans. Antennas Propag., Vol. 37,
No. 2, 143–147, Feb. 1989.
39. “ANSYS high frequency electromagnetic field simulator HFSS (version 18.1),” Canonsburg, PA.
40. Tanzeela Mitha and Maria Pour, “Conformal Wideband Microstrip Patch Antennas on Cylindrical Platforms”, Progress In Electromagnetics Research Letters, Vol. 80, 1–6, 2018.
28.
Authors: J. Ganesh Prasad Reddy, Dr. K. Ramesh Reddy
Paper Title: IRP Control Based LSCPWM-Multilevel DSTATCOM for Power Quality Improvement
Abstract: Majority of the consumer loads are of non-linear in nature and bring about deprived quality of power
in distribution system. FACTS based DSTATCOM is a compensating device placed in shunt to power line to
improve the power quality eliminating the effect of harmonics in source components. The paper presents multi-
level DSTATCOM in distribution system to enrich the quality of power. Five-level cascaded H-Bridge
structures DSTATCOM is employed to drive with compensating signals for power quality improvement. Five-
level DSTATCOM is triggered from multi-carrier LSCPWM pattern. Reference signals are generated from IRP
based control theory. The proposed system is capable to compensate for system unbalance, power factor and
harmonics in the system. Simulation work of the proposed concept is carried out and the results are presented
using MATLAB/SIMULINK software.
Keywords: Power Quality, Multi-Level, DSTATCOM, LSCPWM, IRP Theory.
References: 1. Luo H. Xiao F. Ma et al. "Distribution static compensator based on an improved direct power control strategy" IET Power Electron.
140-145
vol. 7 no. 4 pp. 957-964 2014.
2. R. Kalpana, S. C. Khimavath, S. P. P and B. Singh, "Power Quality Enhancement Using Current Injection Technique in a Zigzag Configured Autotransformer Based 12-Pulse Rectifier," in IEEE Transactions on Industry Applications, 2018 (early access).
3. C. Kumar M.K. Mishra "An improved hybrid DSTATCOM topology to compensate reactive and nonlinear loads" IEEE Trans. Ind.
Electron. vol. 61 no. 12 pp. 6517-6527 2014.
4. A. Patel and A. A. Patel, "Application of DSTATCOM for harmonics elimination and power quality improvement," 2017
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 2017, pp.
3007-3011. 5. T. Zaveri B. Bhalja N. Zaveri "Comparison of control strategies for DSTATCOM in three-phase four-wire distribution system for
power quality improvement under various source voltage and load conditions" Electr. Power Energy Syst. vol. 43 pp. 582-594 2012.
6. G. Mallesham and C. S. Kumar, "Enhancement of power quality using UPQC for hybrid PEMFC and DFIG based wind energy system connected to weak grid," 2017 International Conference on Technological Advancements in Power and Energy ( TAP
Energy), Kollam, India, 2017, pp. 1-6.
7. T. S. Saggu, L. Singh and B. Gill, "Harmonics Mitigation in a Steel Industry Using 11-Level Cascaded Multilevel Inverter-Based DSTATCOM," in Canadian Journal of Electrical and Computer Engineering, vol. 40, no. 2, pp. 110-115, Spring 2017.
8. Y. R. Ashtekar, A. A. Mude and S. A. Khubalkar, "Power quality improvement by using modular multilevel cascade converter
based STATCOM," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2018, pp. 169-173.
9. M. Pradhan and M. K. Mishra, "Dual P-Q Theory based Energy Optimized Dynamic Voltage Restorer for Power Quality
Improvement in Distribution System," in IEEE Transactions on Industrial Electronics, 2018 (early access). 10. H. Akagi, Y. Kanazawa, A. Nabae , “Generalized Theory of the Instantaneous Reactive Power in Three Phase Circuits”, in Proc.
IPECTokyo’83 Int. Conf. Power Electronics, Tokyo, pp. 1375-1386
29.
Authors: P. V. V. Satyanarayana, P. V. Ramana Rao
Paper Title: Parallel Connected Multi-DSTATCOM for Power Quality Improvement in Distribution System
Abstract: Sending power with good quality is the main objective of electrical transmission system. The load
nature, in particular non-linear loads, makes the current at the point of common coupling (PCC) to include
harmonics which further affects the other loads connected at PCC. Power quality improvement and management
is an important study for the enhancement of electrical transmission and distribution systems to enrich the
quality of power delivered at the utilization point. DSTATCOM is one among the FACTS controllers to improve
the power quality by nullifying the effect of harmonics at PCC. This paper presents the analysis of dual
DSTATCOM topology. In this each DSTATCOM is burdened such that the total compensating currents is
shared between the two. Dual STATCOM topology is tested and the result analysis is shown with varying non-
linear type loading conditions. Dual DSTATCOM is controlled using Instantaneous Reactive Power theory
control logic. Parallel DSTATCOM has the advantage of reduction of switch rating and switching losses. The
simulation work is carried out using Matlab/Simulink software.
Keywords: Reactive power, Harmonics, parallel DSTATCOM, non-linear loads
References: 1. Marcos Sacasqui, Jaime Luyo, Alexi Delgado, "A Unified Index for Power Quality Assessment in Distributed Generation Systems
Using Grey Clustering and Entropy Weight", ANDESCON 2018 IEEE, pp. 1-4, 2018.
2. J. Meyer, A. Blanco, S. Rönnberg, M. Bollen and J. Smith, "CIGRE C4/C6.29: survey of utilities experiences on power quality issues
related to solar power," in CIRED - Open Access Proceedings Journal, vol. 2017, no. 1, pp. 539-543, 10 2017. 3. R. Guzman L. G. De Vicuña J. Morales M. Castilla J. Miret "Model-based control for a three-phase shunt active power filter" IEEE
Trans. Ind. Electron. vol. 63 no. 7 pp. 3998-4007 July 2016.
4. M. Panoiu, C. Panoiu and L. Ghiormez, "Neuro-fuzzy modeling and prediction of current total harmonic distortion for high power nonlinear loads," 2018 Innovations in Intelligent Systems and Applications (INISTA), Thessaloniki, 2018, pp. 1-7.
5. J. Rodriguez Maldonado, "Total Harmonic Distortion Estimation, Minimization Inter Harmonic Amplitude and Expanding Bands
Rejection in TKF filters," in IEEE Latin America Transactions, vol. 14, no. 2, pp. 652-656, Feb. 2016. 6. M. A. Chitsazan and A. M. Trzynadlowski, "Harmonic mitigation in interphase power controller using passive filter-based phase
shifting transformer," 2016 IEEE Energy Conversion Congress and Exposition (ECCE), Milwaukee, WI, 2016, pp. 1-5
7. D. Suresh, D. M. Rao and G. D. Sukumar, "Reduced rating hybrid DSTATCOM for three phase four wire distribution system," 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), Delhi, 2016, pp. 1-4.
8. B. Singh, M. Kandpal and I. Hussain, "Control of Grid Tied Smart PV-DSTATCOM System Using an Adaptive Technique," in IEEE
Transactions on Smart Grid, vol. 9, no. 5, pp. 3986-3993, Sept. 2018 9. R. R. Chilipi, B. Singh and S. S. Murthy, "Performance of a Self-Excited Induction Generator With DSTATCOM-DTC Drive-Based
Voltage and Frequency Controller," in IEEE Transactions on Energy Conversion, vol. 29, no. 3, pp. 545-557, Sept. 2014.
10. G. Deep Srivastava and R. D. Kulkarni, "Design, simulation and analysis of Shunt Active Power Filter using instantaneous reactive power topology," 2017 International Conference on Nascent Technologies in Engineering (ICNTE), Navi Mumbai, 2017, pp. 1-6.
146-151
30.
Authors: R. Sasidhar, Dr. A. Lakshmi Devi
Paper Title: Speed Control of PMSM Drive fed with Nine Level Inverter
Abstract: Power electronic technology made possible to evolve inverter fed electric drives. Permanent
magnet synchronous motors (PMSM) are in much importance and are used often due to its performance
characteristics. PMSM gives less noisy operation with faster and more efficient operation. PMSM needs a digital
inverter for its operation. The paper analyzes nine-level inverter fed PMSM drive. Multi-carrier level-shifted
technique is used to generate control pulses. Simulation work of the proposed concept is carried out and the
results are presented using MATLAB/SIMULINK software.
Keywords: PMSM, Multi-Level Inverter, LSCPWM, Speed control
References: 1. R. Krishnan, “Permanent Magnet Synchronous and Brushless DC Motor Drives,” CRC Press, Taylor and Francis Group. ISBN-978-0-
8247-53849
152-157
2. Paul C.Krause, Oleg Wasynczuk, Scott D.Sundhoff, “Analysis of Electric Machinery and Drive Systems,” IEEE Press Power
Engineering society ISBN-0-471-14326-X
3. H,Madadi Kojabad, G.Ahrabian, “Simulation and analysis of the interior permanent magnet synchronous motor as a brushless AC-
drive,” Science direct / Simulation practice and theory 7(2000) 691-707
4. Pragasan Pillay, R.Krishnan.” Modeling of Permanent Magnet Motor Drives”, IEEE vol.35,no.4,november 1988
5. R. Dhaouadi, N. Mohan and L. Norum, "Design and implementation of an extended Kalman filter for the state estimation of a
permanent magnet -50 l synchronous motor," IEEE Trans. Industrial Electronics, vol. 6, no. 3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Jul.
1991, pp.491 497.
6. K. Rajashekara, A. Kawamura and K. Matsuse, "Sensorless control of AC motor drives", New York: IEEE Press, 1996.
7. G. Sree Lakshmi, S. Kamakshaiah and T. R. Das, "Closed loop PI control of PMSM for hybrid electric vehicle using three level
diode clamped inverter for optimal efficiency," Energy Efficient Technologies for Sustainability (ICEETS), 2013 International
Conference on, Nagercoil, 2013, pp. 754-759.
8. L. Samaranayake, Y. K. Chin and U. S. K. Alahakoon, "Distributed control of permanent magnet synchronous motor drive
systems," Power Electronics and Drive Systems, 2003. PEDS 2003. The Fifth International Conference on, 2003, pp. 710-715 Vol.1.
9. H. H. Lee and U. H. Jeong "A Study on Speed Synchronization for Multi Motors using Controller Area Network" IEEE Trans. Ind.
Appl., vol. 44 no. 4 2000.
10. L. Feng Y. Koren and J. Borenstein "Cross-Coupling Motion Controller for Mobile Robots" IEEE Trans. on Control Systems
Technology, vol. 1 December 1993.
11. R. Sasidhar, Dr. A. Lakshmi Devi, “Analysis of Five-Level Diode Clamped Multi-
12. Level Inverter Fed Permanent Magnet Synchronous Machine Drive” Jour of Adv Research in Dynamical & Control Systems, Vol. 10,
07-Special Issue, 2018, pp. (220-233)
13. R. Sasidhar, Dr. A. Lakshmi Devi, “Speed Control Analysis Of Lscpwm Driven Seven-Level Inverter Fed Permanent Magnet
Synchronous Motor Drive”, ARPN Journal of Engineering and Applied Sciences, VOL. 14, NO. 1, JANUARY 2019, pp 299-306.
31.
Authors: S. V. R. Lakshmi Kumari, Dr. M. Uma Vani
Paper Title: Analysis of Various Control Schemes of Dynamic Voltage Restorer for Power Quality Improvement
in Distribution System
Abstract: One among the contemporary power electronic controller in distribution system is Dynamic voltage
restorer (DVR) used to guard the customers from the voltage variations. DVR output compensating signals
organize the voltage signal in distribution system. DVR is triggered from the control pulses generated from the
control methodology. The paper presents the different control methodologies for DVR to regulate the voltage
wave in distribution system from sag/swell. Simulation analysis is conveyed by using MATLAB/SIMULINK
tool and simulation results indicate the ability of DVR to regulate sag/swell in distribution system.
Keywords: Compensation, voltage sag, voltage swell, sensitive load, DVR.
References: 1. Dong-Jun Won, Seon-Ju Ahn, 11-Yop Chung, Joong-Moon Kim and Seung-I1 Moon, “A New Definition of Voltage Sag Duration
Considering The Voltage Tolerance Curve” Bologna Power Tech Conference, IEEE 2003, June 23-26, Bologpa, Italy.
2. M.R. Banaei, S.H. Hosseini, G.B. Gharehpetian “Inter-Line Dynamic Voltage Restorer Control Using A Novel Optimum Energy Consumption Strategy” Volume 14, Issue 7, Pages 989-999, October 2006.
3. A.Sannino, G. Michelle and M. Bollen, “Overview of Voltage Sag Mitigation” IEEE Power Engineering Society 2000 Winter Meeting,
January 2000, Vol. 4, pp.23-27,. 4. Trevor L. Grant and Deepak M. Divan, “Power Quality Solutions to Mitigate the Impact of Voltage Sags in Manufacturing Facilities,
AEE-WEEC 2002.
5. D.K. Tanti, M.K. Verma, Brijesh Singh, O.N. Mehrotra, “Optimal Placement of Custom Power Devices in Power System Network to Mitigate Voltage Sag under Faults,” International Journal of Power Electronics and Drive Systems (IJPEDS), Vol 2 No 3, 2012 pages
267-276
6. Haniyeh Marefatjou, Mohammad Sarvi, “Compensation Of Single-Phase and Three-Phase Voltage Sag and Swell Using Dynamic Voltage Restorer,” International Journal of Applied Power Engineering (IJAPE), 2012, Vol 1 No 3, pages 129-144
7. Mohammad Sarvi, Haniyeh Marefatjou, “Compensation of Voltage Single-Phase SAG and SWELL Using Dynamic Voltage Restorer
and Difference Per-Unit Value Method,” International Journal of Electrical and Computer Engineering (IJECE), 2013, Vol 3 No 1, pages 83-92
8. C.S.Chang, Y.S. ho and P.C. Loh, “Voltage Quality Enhancement with Power Electronics Based Devices” IEEE 2000. 9. A.Benachaiba and B. Ferdi, “Power Quality Improvement Using DVR”, American Journal of Applied Sciences, March, 2009.
10. G. Ramya, V. Ganapathy, P. Suresh, “Power Quality Improvement Using Multi-Level Inverter Based DVR and DSTATCOM Using
Neuro-Fuzzy Controller,” International journal of power electronics and drive systems (IJPEDS), March 2017, Vol 8, No 1:, pp 316-324.
11. Brahim Ferdi, Samira Dib, Brahim Berbaoui, Rachid Dehini, “Design and Simulation of Dynamic Voltage Restorer Based on Fuzzy
Controller Optimized by ANFIS,” International journal of power electronics and drive systems (IJPEDS), June 2014, Vol 4, No 2:, pp 212-222.
12. D.K. Tanti, M.K. Verma, Brijesh Singh, O.N. Mehrotra, “Optimal Placement of Custom Power Devices in Power System Network to
Mitigate Voltage Sag under Faults,” International journal of power electronics and drive systems (IJPEDS), September 2012, Vol 2, No 3:, pp 267-276.
13. Ezoji, A.Sheikholeslami, M. Tabasi and M.M. Saeednia“Simulation of Dynamic Voltage Restorer Using Hysteresis Voltage Control”
European Journal of Scientific Research ISSN 1450-216X Vol.27 2009, No.1 pp.152-166,.
158-163
32.
Authors: S. Neelophar Begum, CH. Ravi kiran, K. Vasundara
Paper Title: Design Analysis and Fabrication of Solar Vapour Absorption
Abstract: Solar energy is one of the greenest sources of electricity and the idea of using it to power
transportation is not new. In this work, parabolic dish is used to collect the solar irradiation, instead of Photo
voltaic cells (PVC). This radiation is focused on to a point, where the water is heated to the required temperature
and this heat energy is transferred to vapour absorption unit through the heat exchanger. In vapour absorption
system (Three fluid systems) consists of a combination of three fluids ammonia and water and hydrogen. These
fluids complete the vapour absorption cycle and provide the sufficient cooling. The experiments are conducted
on the Solar Vapour absorption unit from 9:00A.M to 5:00P.M. For two days. Temperature readings of
164-169
generator, Evaporator are taken on an hourly basis and C.O.P of the system at the minimum evaporator
temperature is calculated. The system had attained a minimum evaporator temperature of 23⁰C at its peak
generator temperature of 92⁰C.
Keywords: Photo-Voltaic Cells, Temperature, Three-Fluid System, Vapour Absorption System.
References: 1. Celina Maria Cunha Ribeiro, Evânia Celeste da Costa Moreira, Carlos Antonio Cabral dos Santos, Wilson Luciano de Souza,
Rodrigode Almeida Leal. Study of a diffusion-absorption refrigeration cycle using ammonia-water-heliumas working fluids,18th
International Congress of Mechanical Engineering November 6-11, 2005 2. Velmurugan V, RajaBalayanan S.R, Surendhra Babu K and Sakthivadivel D, Investigation of a novel solar powered absorption
refrigeration system with solar point collector, Research Journal of Chemical Sciences Vol. 1(7), Oct. 2011,p. 51-56
3. Joshua FOLARANMI Leonardo, Design Construction and Testing of a Parabolic Solar Steam Generator, Electronic Journal of Practices and Technologies ISSN 1583-1078 Issue 14, January-June 2009, p. 115-133.
4. Ali benhmidene, bechir chaouachi, mahmoud bourouis,and slimane gabsi, Effect of operating conditions on the performance of the
bubble pump of absorption diffusion refrigeration cycles, Thermalscience, year 2011, vol.15, no.3, pp.793806 5. V Mittal, K S Kasana, N S Thakur, Modeling and simulation of a solar absorption cooling system for India,Journal of Energy in
Southern Africa, Vol 17, No 3, August 2006
6. S. Gabsi ,B. Chaouachi, Design and simulation of an absorption diffusion solar refrigeration unit, American Journal of Applied Sciences, FEB, 2007
7. Ali Benhmidene, Bechir Chaouachi, Slimane Gabsi, Mahmoud Bourouis, Modeling of heat flux received by a bubble pump of
absorption-diffusion refrigeration cycles, Heat Mass Transfer (2011) 47:1341–1347, DOI10.1007/s00 8. Subhadip Roy, M. P. Maiya,” Analysis of R134a-DMAC vapour absorption refrigeration system with add on
components”,IJTS1(1):26-35,june 2012.
9. R. Sankar, T srinivas,” Solar thermalbased power and vapour absorption refrigeration system”,proceedia engineering,38,730-736,2012. 10. K. P. Tyagi ,” Ammonia –salts vapour absorption refrigeration systems”, Jounal of heat recovery systems, 4(6),427-431,2013.
11. Makena Harish, Reddy ANR,”Design of solar based vapour absorption system”, DOI:10.13140/RG.2.1.3284.7120/1ISBN: 978-93-
83038-28-2,ICEMS, Pg No: 104-110-2014. 12. Dilip kumar Mohanty, Abhijit padiary,” Thermodynamic performance analysis of a solar vapour absorption refrioration system”,
IJERSTE, ISSN:2319-7463,4(4),45-54,April 2015.
33.
Authors: Dr. R. Vara Prasad, D. Subhashini
Paper Title: Women Street Vendors, Challenges and Opportunities: An Superlative Analysis with Special
Reference to Chittoor District of Andhra Pradesh, India
Abstract: Informal Sector is the most important part of the workforce in India and other developing
countries works. It has become a progressively more popular subject of study, not just in economics, but also in
Social Work, Sociology and Anthropology. The term of “Informal Sector” was first coined by Keith Hart. There
are many informal sectors in our country working for their own livelihood. The most frequently and regularly
they must work to earn their daily bread Street Vending is a major self-employment provider in and around the
world. It is an occupation perused by the middle and lower middle class as a full time and part time employment
for source of living. There is very few number of studies being conducted on street vendors. The present study is
undertaken to project the various issues that the women street vendors face in their everyday occupation. In men
dominated society women are always considered to be inferior and there are number of cases of harassment and
abuse which not only make women to leave their bread earning occupation but also suffer financial loss. The
present study comes at a time when the living and working environment for women are deteriorating; this study
presents the various issues and problems faced by women street vendors.
Keywords: Women street vendors, economic conditions, informal sector, reasons for street vending
References: 1. Adhikari, D. B. (2012). Income generation in informal sector: A case study of the street vendors of Kathmandu Metropolitan City.
Economic Journal of Development Issues, 13(0). doi:10.3126/ejdi.v13i0.7193
2. Roever, S., & Skinner, C. (2016). Street vendors and cities. Environment and Urbanization, 28(2), 359–374. doi:10.1177/0956247816653898
3. Shalini Sinha and Sally Roever (2011).Women in Informal Employment: Globalizing and Organizing, WIEGO Policy Brief (Urban
Policies) No2 4. Inclusive design for street vendors in India centre for urban equity & Cardiff University (2014)
5. Ar. Manoj Panwar and Vikas Garg (2015) Issues and challenges faced by vendors on urban on urban street, International Journal of
Engineering Technology, Management and Applied Science. 6. DR. Satyaki Sarkar (2016) Street vendors in the urban care of Kolkata-problems and prospects of their rehabilitation
7. Karthikeyan, R., & Mangaleswaran, R. (2013). Quality of Life Among Street Vendors in Tiruchirappalli City, Tamil Nadu, India.
International Research Journal of Social Sciences, 2(12), 18-28; 8. Karthikeyan, R., & Mangaleswaran, R. (2014). A study on socio-economic conditions and working patterns of street vendors in
Tiruchirappalli city, Tamil Nadu, India
9. Jain, Priyank (2013), "Neoliberalizing The Streets Of Urban India: Engagements Of A Free Market Think Tank In The Politics Of Street Hawking". Theses and Dissertations--Geography. 14.
10. Tignor, R. L. (2006). W. Arthur Lewis and the birth of development economics. Princeton university press.
11. Bhowmik, Sharit K. and Debdulal Saha (2012). Street Vending in ten cities in India, National Alliance of Street Vendors of India (NASVI)
170-178
34.
Authors: Kurakula Vimala Kumar, V. Ganesh
Paper Title: FOSSMC for AGC of Multi-Area Power System in Open Market Environment
Abstract: This paper presents a Fractional Order based Second Order Sliding Mode Controller (FOSSMC) for
Load Frequency Control (LFC) of Deregulated Multi Area Power System (DMAPS). In this paper a new control
strategy have been proposed to improve dynamic response of multi area power system under one possible
179-184
contract scenario by considering bilateral contracts. This proposed new FOSSMC strategy capable of dealing
with frequency deviations for sudden change of load on DISCOs. The advantage of FOSSMC in terms of
exhibiting dynamic response compared to group of factional order controllers such as Fractional Order
PI(FOPI), Fractional Order Fuzzy Controller(FOFLC) and Fractional Order Sliding Mode Controller(FOSMC)
and conventional PI controller.
Keywords: Fractional Order based Second Order Sliding Mode Controller, Load Frequency Control,
Deregulated Multi Area Power System, Fractional Order PI Controller, Fractional Order Fuzzy Controller, and
Fractional Order Sliding Mode Controller.
References: 1. Sadeh J., and Rakhshani E., “Simulation of two-area AGC system in a competitive environment using reduced-order observer
method, 5th International Conference on European Electricity Market,2008,PP 1-6. 2. T. Anil Kumar; G. Venu; N. Venkata Ramana, “Load frequency control of multi area power system in deregulated environment
with robust Controllers in coordination with frequency controllable HVDC link”, International Conference on EnergyEfficient
Technologies for Sustainability (ICEETS), Year: 2016, Pages: 473 – 478. 3. Ramesh Kumar Selvaraju, Ganapathy Somaskandan, ACS algorithm tuned ANFIS-based controller for LFC in deregulated
environment, Journal of Applied Research and Technology, Volume 15, Issue 2, April 2017, Pages 152-166, ISSN 1665-6423.
4. Rabindra Kumar Sahu, G.T. Chandra Sekhar, Sidhartha Panda, DE optimized fuzzy PID controller with derivative filter for LFC
of multi source power system in deregulated environment, Ain Shams Engineering Journal, Volume 6, Issue 2, June 2015, Pages
511-530, ISSN 2090-4479.
5. Nagendra Kumar, Vishal Kumar, Barjeev Tyagi, Multi area AGC scheme using imperialist competition algorithm in restructured power system, Applied Soft Computing, Volume 48, November 2016, Pages 160-168.
6. Pal, A.K.; Bera, P.; Chakraborty, K. "AGC in two-area deregulated power system using reinforced learning neural network
controller", Automation, Control, Energy and Systems (ACES), 2014 First International Conference on, Year: 2014, Pages: 1 - 6. 7. Demiroren A, Sengor NS, Zeynelgil HL “Automatic generation control by using ANN technique” Electrical Power Component
System 2001; 29(10):883–96.
8. Javad Morsali, Kazem Zare, Mehrdad Tarafdar Hagh, Performance comparison of TCSC with TCPS and SSSC controllers in AGC of realistic interconnected multi-source power system, Ain Shams Engineering Journal, Volume 7, Issue 1, March 2016,
Pages 143-158.
9. Mahendra Nandi, C.K. Shiva, V. Mukherjee,"TCSC based automatic generation control of deregulated power system using quasi-oppositional harmony search algorithm",Engineering Science and Technology, an International Journal, Volume 20, Issue 4,
August 2017, Pages 1380-1395.
10. D. Lakshmi1, A. Peer Fathima and Ranganath Muthu,"Simulation of the Two-Area Deregulated Power System using Particle Swarm Optimization", International Journal on Electrical Engineering and Informatics - Volume 8, Number 1, March 2016, PP
93-107.
11. Shayeghi H, Shayanfar HA, Jalili A. LFC-Design-of-a-Deregulated-Power-System with TCPS-Using-PSO. International Journal of Electrical Computer Energetic Electronc and Communication Engineering 2009; Vol:3 (No:4). pp 691-699.
12. Abedinia O., Naderi M S. and Ghasemi., “A Robust LFC in deregulated environment: Fuzzy PID using HBMO”, 10th
International Conference on Environment and Electrical Engineering (EEEIC),2011, PP 1–4. 13. Rabindra Kumar Sahu, Sidhartha Panda, Umesh Kumar Rout, DE optimized parallel 2-DOF PID controller for load frequency
control of power system with governor dead-band nonlinearity, International Journal of Electrical Power & Energy Systems,
Volume 49, July 2013, Pages 19-33, ISSN 0142-0615. 14. Puja Dash, Lalit Chandra Saikia, Nidul Sinha, "Comparison of performances of several FACTS devices using Cuckoo search
algorithm optimized 2DOF controllers in multi-area AGC", International Journal of Electrical Power & Energy Systems, Volume
65, February 2015, Pages 316-324. 15. Rabindra Kumar Sahu, Sidhartha Panda, Saroj Padhan, A novel hybrid gravitational search and pattern search algorithm for load
frequency control of nonlinear power system, Applied Soft Computing, Volume 29, April 2015, Pages 310-327, ISSN 1568-4946.
16. Puja Dash, Lalit Chandra Saikia, Nidul Sinha, Flower Pollination Algorithm Optimized PI-PD Cascade Controller in Automatic
Generation Control of a Multi-area Power System, International Journal of Electrical Power & Energy Systems, Volume 82, November 2016, Pages 19-28, ISSN 0142-0615.
17. Dipayan Guha, Provas Kumar Roy, Subrata Banerjee, Load frequency control of large scale power system using quasi-
oppositional grey wolf optimization algorithm, Engineering Science and Technology, an International Journal, Volume 19, Issue 4, December 2016, Pages 1693-1713, ISSN 2215-0986.
18. K. P. S. Parmar, S. Majhi and D. P. Kothari, “Optimal Load Frequency Control of an Interconnected Power System,”
International Journal of Electrical and Instrumentation Engineering, Vol. 1, No. 1, pp. 1-5, January 2011. 19. Ibraheem and P. Kumar, “A Novel Approach to the Matrix Riccati Equation Solution: An Application to Optimal Control of
Interconnected Power Systems,” Electric Power Components and Systems, Vol. 32, No. 1, pp. 33-52, 2004.
20. T. Anil Kumar, Dr. N. V. Ramana, “Design of Optimal Sliding mode Controller for Load Frequency Control in Multi-area Deregulated Thermal System”, International Conference on Emerging Trends in Electrical Engineering and Energy Management
(ICETEEEM–2012), ICETEEEM-2012 Proceedings, PS-13, Page No: 64-71.
21. Farzin Piltan, Ali Hosainpour, Ebrahim Mazlomian, Mohammad Shamsodini, Mohammad HosseinYarmahmoudi Online Tuning Chattering Free Sliding Mode Fuzzy Control Design: Lyapunov Approach, International Journal of Robotics and Automation
(IJRA), Volume (3),Issue (3) : 2012.
22. A.shingame, T. Furukawa, S. Kawamoto, T. Taniguchi, Sliding mode controller design
based on fuzzy inference for nonlinear systems, IEEE Trans. Ind. Electron. 40 (1993)
64-70.[55]
23. Hidekazu K., Yuya S. and Shinichi I., “A Load frequency control design using sliding mode controller theory with VSS observer
2009.
24. S. Baghya Shree, N. Kamaraj, Hybrid Neuro Fuzzy approach for automatic generation control in restructured power system,
International Journal of Electrical Power & Energy Systems, Volume 74, January 2016, Pages 274-285, ISSN 0142-0615. 25. Sanjoy Debbarma, Member, IEEE, and Arunima Dutta, “Utilizing Electric Vehicles for LFC in Restructured Power Systems
Using Fractional Order Controller”, IEEE Transactions On Smart Grid, Year: 2017 , Volume: 8 , Issue:6,Pages: 2554 – 2564.
26. 1.Shivam Jain and Yogesh V. Hote, " Design of fractional PID for Load frequency control via Internal model control and Big bang Big crunch optimization"Preprints of the 3rd IFAC Conference on Advances in Proportional-Integral-Derivative Control,
Ghent, Belgium, May 9-11, 2018, pages 610-615.
27. T.Dinesh,PalleJayabharath Reddy and Thalluru Anil Kumar, " A Coordinated V2GControl For LFC Of Multi Area Power System With HVDC Link In Deregulated Environment", International Journal of Pure and Applied Mathematics, Volume 120 No. 6
2018, pages.567-586,ISSN: 1314-3395
28. Swati Sondhi , Yogesh V. Hote,S. Sondhi, Y.V. Hote ," Fractional order PID controller for load frequency control", Energy
Conversion and Management 85 (2014) 343–353.
29. A.Jakovljevi, A. Pisano1,M. R. Rapai and E. Usai1," On the sliding-mode control of
fractional-order nonlinearuncertaindynamics", International Journal of Robust and
nonlinear control,Int. J. Robust Nonlinear Control (2015),Published online in Wiley
Online Library (wileyonlinelibrary.com). DOI: 10.1002/rnc.3337. 30. Abdelali Boughaba, Mabrouk Chaabane And Said Benaggoune,"Robust Sensorless Control Of BLDC Motor Using Second
Derivative Function of The Sum Of Terminal Voltages", Serbian Journal of Electrical Engineering Vol. 10, No. 2, June 2013,
275-291,PP-275-291.
35.
Authors: C. RAMANJANEYULU
Paper Title: Experimental Methodology of Optimum Coagulation Activity on River Water using Chemical and
Natural Coagulants for Different pH Ranges
Abstract: The present study is related to determination of optimum dosage of natural coagulant and
chemical coagulant to bring down the turbidity of the considered river water by maintaining different pH ranges.
The conversion of waste water into unpolluted water as became challenge now a days. In the present
investigation, a focus is made on Turbidity characteristic of waste water and an attempt is made to treat water so
as to utilize it by removing its turbidity. After removal of turbidity, the water should undergo again some stages
of purification. Before undergoing further purification, water should be made turbid free. To make water a turbid
free, two types of coagulants are considered in this present study which are natural coagulant and chemical
coagulant. The coagulant is orange peel powder natural one and the other is Alum, a chemical coagulant. Three
series of water samples were considered by varying pH values (6, 7 and 8.5). Other qualities of water like
Turbidity, alkalinity and acidity were also tested before and after the process of coagulation. In this study an
optimum dosage of coagulant was determined. The samples of river were collected from nearby flowing Kundu
River, Nandyal (M), Kurnool (Dist)-A.P. The test results show that the optimum dosage of orange peel powder
was found at 103 mg/l with 0.3 NTU Turbidity with Turbidity removal efficiency of 98.68%and by using Alum
the optimum dosage was found at 26 mg/l with 0.3 NTU Turbidity with Turbidity removal efficiency of 98.68%.
Keywords: Orange Peel powder, Alum, Coagulation, Turbidity, Optimum dosage.
References: 1. Wafai El-Hosseni Ahmed and Hanaa M. Sherif, “Effect of irrigation water PH on some soil properties and growth of some pear
rootstocks grow on sand and calcareous soils” International Journal of Plant & Soil Science, 4(5): 475-493, 2015; Article
no.IJPSS.2015.047, ISSN: 2320-7035.
2. Akbar Baghvand, Ali Daryabeigi Zand, Nasser Mehrdadi and Abdolreza Karbassi, “Optimizing Coagulation Process for Low to High Turbidity Waters Using Aluminum and Iron Salts” American Journal of Environmental Sciences 6 (5): 442-448, 2010 ISSN 1553-
345X.
3. BaiChuan Cao,BaoYu Gao, ChunHua Xu, Ying Fu, Xin Liu, “Effects of pH on coagulation behavior and floc properties in Yellow River water treatment using ferric based coagulants” Chinese Science Bulletin, May 2010, Volume 55, Issue 14, pp 1382–1387.
4. R.Subashree, N.Surya Praba, Dr.G.Anusha, “Investigation of Coagulation Activity of Lemon and Banana Peel Powder in Water
Treatment” International Journal on Advanced Research in Science and Engineering, Volume No. 6, Issue No. 10, October 2017 pp 852-855.
5. Anju S and K.Mophin-Kani, “Exploring the Use of Orange Peel and Neem Leaf Powder as Alternative Coagulant in Treatment of
Dairy Wastewater” International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016, ISSN 2229-5518, pp 238-244.
6. Joseph Marie Sieliechi, Guifo Joseph Kayem, Ion Sandu, “Effect of Water Treatment Residuals (Aluminum and Iron Ions) on Human Health and Drinking Water Distribution Systems”, International Journal of Conservation Science, Volume 1, Issue 3, July-September
2010, pp 175-182.
7. IS 10500:2012- Drinking Water Standards.
185-190
36.
Authors: Samanthaka Mani Kuchibhatla, Padmavathi Devasetty, Srinivasa Rao Rayapudi
Paper Title: A New Meta Heuristic Algorithm based FACTs SSFC Implementation for Power Quality
Enrichment in Grid Inter connected system with Renewable Energy Sources
Abstract: This paper projects A Most modern Meta Heuristic based BAT algorithm for enhancing Power
Quality (PQ) furthermore to diminish the harmonic falsification using the Flexible AC Transmission (FACTs)
based Static Switched Filter Compensator (SSFC) in the proposed Grid Interconnected System with Photo
Voltaic (PV) and Wind Energy (WE) Sources. The uniqueness of the this system is enhancing the performance
of the grid associated Renewable energy system such as soothe the voltage, diminish the power losses and
lessen the harmonic distortion using the SSFC with a BAT algorithm in the Controller . Here, the proposed
controller is in a job to optimize the control pulses of SSFC. To attain optimal function of the controller, errors
are narrowed and generating the optimal control signals. SSFC with BAT algorithm controller takes part in
improving Stability of the system along with Enriched power quality. MATLAB/Simulink platform is used for
the Implementation part and its performance is adequate.
Keywords: Power Quality (PQ); Photo voltaic (PV); wind energy conversion system (WECS); Flexible AC
Transmission System (FACTS); Static Switched Filter Compensation (SSFC); Proportional Integral Derivative
(PID) Controller
References: 1. T. Ackermann, Wind power in power systems. John Wiley and sons, New York,USA,2005,pp.742.
2. N.G.Hingorani and L. Gyugyi , Understanding FACTS: Concepts and Technolgy of Flexible AC Transmission Systems, New York: IEEE Press,2000,pp.432.
191-194
3. A. Rashad, S. Kamel and F. Jurado, "Stability improvement of power systems connected with developed wind farms using SSSC controller", Ain Shams Engineering Journal, DOI:10.1016/j.asej.2017.03.015.
4. A.M. Sharaf “A FACTS based dynamic capacitor scheme for voltage compensation and power quality enhancement”, Proceedings of the IEEE International Symposium on Industrial Electronics, Canada, Vol.2, pp.1200-1205, July 2006.
5. A.M.Sharaf , A.A. Abdelsalam , A.A.Eldesouky and A.A. Sallam , “A novel FACTS based modulated power filter compensation
scheme for smart electric grid stabilization and effective utilization” , International journal of Distributed Energy Resources,
Vol.7,pp.311-327,March2011, 6. K.S.Mani, D.Padmavathi and R.Srinivasa Rao, "Power Quality Improvement in Wind Smart Grid Using Facts SSFC", An International
Journal of Electrical and Electronics Engineering, Vol.11, No.3, PP.57-66, May-June2016.
7. S.Rajashekaran and G.A.VijayaLakshmi Pai, “Neural Networks,Fuzzy Logic,and Genetic Algorithms,Synthesis and Applications”,ISBN-81-203-2186-3,pages.439.
8. T. Yuvaraj, K. Ravi and K.R. Devabalaji, “DSTATCOM allocation in distribution networks considering load variations using bat algorithm”, in Electrical Engineering, Ain Shams Engineering Journal, Vol.8, pp.391-403, 2017.
9. L. Chaib , A. Choucha and S. Arif , “Optimal design and tuning of novel fractional order PID power system stabilizer using a new meta heuristic Bat algorithm”, in Electrical Engineering, Ain Shams Engineering Journal, Vol.8, pp. 113–125, 2017.
10. Y. N. Vijay Kumar, S. Sivanagaraju , and Ch. V. Suresh , “Security constrained economic load dispatch in the presence of interline
power flow controller using modified BAT algorithm” ,in Electrical Engineering, Ain Shams Engineering Journal, Vol.7, pp. 1029-1043, 2016.
37.
Authors: R. Sri Uma Suseela, Dr. KSN Murthy, Hima Bindu Valiveti
Paper Title: Performance Analysis of Cross-layer Efficient Selfishness Prevention Routing Protocol for the
Dynamic CR Networks
Abstract: As wireless communication is very dependent on the use of spectrum, increased demand for and
practical application of new wireless services generally leads to spectrum shortages. A remarkable feature of
protocols in the cognitive radio is to, to detect the selfish behaviour of node and discard the abnormal packets.
However, minimize transmission latency and enhance energy efficiency are two main issues in multi-hop
Cognitive Radio Networks (CRN) where it is difficult to gain knowledge of topology and spectrum statistics.
The misconduct of selfish nodes such as not participating in the routing process, delaying RREQ packet
intentionally, removing the data packet, not responding or sending hello messages. This misconduct of the
selfish nodes will affect efficiency, trustworthiness, and fairness. This paper proposes the cognitive radio
dynamic nature, associate with that of selfish nodes, the cross-layer efficient Selfish Prevention Routing Protocol
(ESPRP). All the above characteristics are simulated with help of NS-2.35 simulator, and our proposed protocol
attains good enactment in terms of lower delays, higher throughput and better packet delivery ratios for
collaborative node traffic related to traditional routing protocols in the cognitive radio.
Keywords: Cognitive radio, Selfish attack, Decentralized Trust Model, Layer Modelling, and routing protocol.
References: 1. Hossain, E.; Niyato, D.; Kim, D.I. Evolution and Future Trends of Research in Cognitive Radio: A Contemporary Survey. Wirel.
Commun. Mob. Comput. 2015, 15, 1530–1564.
2. Ahmad, A.; Ahmad, S.; Rehmani, M.H.; Hassan, N.U. A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks.
IEEE Commun. Surv. Tutor. 2015, 17, 888–917. 3. Ma, Y.; Zhou, L.; Liu, K. A Subcarrier-Pair based Resource Allocation Scheme Using Proportional Fairness for Cooperative OFDM-
based Cognitive Radio Networks. Sensors 2013, 13, 10306–10332.
4. Huang, J.; Zeng, X.; Jian, X.; Tan, X.; Zhang, Q. Opportunistic Capacity-based Resource Allocation for Chunk-based Multi-carrier Cognitive Radio Sensor Networks. Sensors 2017, 17, 175.
5. Sufyan, Nadeem, Saqib, Nazar Abbass, Zia, Muhammad, “Detection of jamming attacks in 802.11b wireless networks”, EURASIP
Journal on Wireless Communications and Networking 2013.
6. I.Ngomane ; M. Velempini ; S. V. Dlamini, “The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc
networks”, 2018 Conference on Information Communications Technology and Society (ICTAS), May 2018.
7. L. Senecal, “Understanding and preventing attacks at layer 2 of the OSI reference model”, 4th Annual Communication Networks and Services Research Conference (CNSR'06), June 2006.
8. Guillermo Mario Marro, “Attacks at the Data Link Layer”, CiteSeerX 2003.
9. Kiam Cheng How1, Maode Ma1, and Yang Qin, “A Cross-layer Selfishness Avoidance Routing Protocol for the Dynamic Cognitive Radio Networks”, IEEE International Workshop on Recent Advances in Cognitive Communications and Networking 2011, pp. 942-
946.
10. Khyati Patel, Aslam Durvesh, “Research Paper on Detection of Multiple Selfish Attack Nodes Using RSA in Cognitive Radio”, IJARIIE, Vol-2 Issue-3 2016
195-199